Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-22458 |
5.3 (3.1)
|
WordPress Wanderland theme <= 1.5 - Broken Access Cont… |
Mikado-Themes |
Wanderland |
2026-01-22T16:52:39.562Z | 2026-01-28T17:01:47.729Z |
| CVE-2025-68058 |
7.6 (3.1)
|
WordPress Institutions Directory plugin <= 1.3..4 - Br… |
e-plugins |
Institutions Directory |
2026-01-22T16:52:06.554Z | 2026-01-28T17:00:49.571Z |
| CVE-2025-68059 |
7.6 (3.1)
|
WordPress Hotel Listing plugin <= 1.4.2 - Broken Acces… |
e-plugins |
Hotel Listing |
2026-01-22T16:52:06.756Z | 2026-01-28T16:54:18.281Z |
| CVE-2025-68912 |
8.6 (3.1)
|
WordPress HDForms plugin <= 1.6.1 - Arbitrary File Del… |
Harmonic Design |
HDForms |
2026-01-22T16:52:15.047Z | 2026-01-28T16:53:38.047Z |
| CVE-2025-69037 |
8.1 (3.1)
|
WordPress Pippo theme <= 1.2.3 - Local File Inclusion … |
goalthemes |
Pippo |
2026-01-22T16:52:17.366Z | 2026-01-28T16:51:46.225Z |
| CVE-2025-68909 |
9.9 (3.1)
|
WordPress Blogistic theme <= 1.0.5 - Arbitrary File Up… |
blazethemes |
Blogistic |
2026-01-22T16:52:14.365Z | 2026-01-28T16:48:12.303Z |
| CVE-2025-58150 |
8.8 (3.1)
|
x86: buffer overrun with shadow paging + tracing |
Xen |
Xen |
2026-01-28T15:33:17.316Z | 2026-01-28T16:46:04.355Z |
| CVE-2025-13917 |
7 (3.1)
|
Elevation of Privileges in Web Security Services (WSS) Agent |
Broadcom |
Symantec Web Security Services Agent |
2026-01-28T16:29:59.092Z | 2026-01-28T16:43:08.704Z |
| CVE-2025-68986 |
9.9 (3.1)
|
WordPress Miion theme <= 1.2.7 - Arbitrary File Upload… |
zozothemes |
Miion |
2026-01-22T16:52:15.450Z | 2026-01-28T16:42:32.633Z |
| CVE-2026-1522 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Open5GS SGWC s5c-handler.c sgwc_s5c_handle_modify_bear… |
n/a |
Open5GS |
2026-01-28T16:32:07.267Z | 2026-01-28T16:42:10.044Z |
| CVE-2026-23553 |
2.9 (3.1)
|
x86: incomplete IBPB for vCPU isolation |
Xen |
Xen |
2026-01-28T15:33:44.782Z | 2026-01-28T16:41:14.803Z |
| CVE-2025-68999 |
8.5 (3.1)
|
WordPress Happy Addons for Elementor plugin <= 3.20.4 … |
HappyMonster |
Happy Addons for Elementor |
2026-01-22T16:52:15.685Z | 2026-01-28T16:40:31.836Z |
| CVE-2025-8890 |
9.3 (4.0)
|
Authenticated RCE in SDMC NE6037 router |
SDMC |
NE6037 |
2025-11-27T13:42:53.664Z | 2026-01-28T16:39:21.574Z |
| CVE-2025-69001 |
5.3 (3.1)
|
WordPress FluentForm plugin <= 6.1.11 - Arbitrary Shor… |
Shahjahan Jewel |
FluentForm |
2026-01-22T16:52:15.923Z | 2026-01-28T16:38:55.020Z |
| CVE-2025-69002 |
8.8 (3.1)
|
WordPress OneLife theme <= 3.9 - PHP Object Injection … |
designthemes |
OneLife |
2026-01-22T16:52:16.108Z | 2026-01-28T16:38:13.689Z |
| CVE-2025-69003 |
7.1 (3.1)
|
WordPress KenthaRadio theme <= 2.2.0 - Reflected Cross… |
QantumThemes |
KenthaRadio |
2026-01-22T16:52:16.345Z | 2026-01-28T16:37:33.966Z |
| CVE-2025-69004 |
8.1 (3.1)
|
WordPress Bajaar - Highly Customizable WooCommerce Wor… |
XpeedStudio |
Bajaar - Highly Customizable WooCommerce WordPress Theme |
2026-01-22T16:52:16.561Z | 2026-01-28T16:36:51.342Z |
| CVE-2025-69005 |
8.1 (3.1)
|
WordPress Search & Go theme <= 2.8 - Local File Inclus… |
Elated-Themes |
Search & Go |
2026-01-22T16:52:16.776Z | 2026-01-28T16:36:19.613Z |
| CVE-2025-28164 |
5.5 (3.1)
|
Buffer Overflow vulnerability in libpng 1.6.43-1.… |
n/a |
n/a |
2026-01-27T00:00:00.000Z | 2026-01-28T16:35:43.323Z |
| CVE-2025-69035 |
8.8 (3.1)
|
WordPress Dental Care CPT plugin <= 20.2 - PHP Object … |
strongholdthemes |
Dental Care CPT |
2026-01-22T16:52:16.979Z | 2026-01-28T16:34:43.097Z |
| CVE-2025-69036 |
8.8 (3.1)
|
WordPress Tech Life CPT plugin <= 16.4 - PHP Object In… |
strongholdthemes |
Tech Life CPT |
2026-01-22T16:52:17.168Z | 2026-01-28T16:33:50.975Z |
| CVE-2025-41351 |
6 (4.0)
|
Weak encryption on Funambol's cloud server |
Funambol |
Cloud Server |
2026-01-28T10:43:15.171Z | 2026-01-28T16:33:24.426Z |
| CVE-2025-69038 |
8.1 (3.1)
|
WordPress Hyori theme <= 1.3.6 - Local File Inclusion … |
goalthemes |
Hyori |
2026-01-22T16:52:17.563Z | 2026-01-28T16:33:12.228Z |
| CVE-2025-7740 |
8.8 (4.0)
|
Use of default credentials vulnerability in Hitachi En… |
Hitachi Energy |
SuprOS |
2026-01-28T09:02:21.430Z | 2026-01-28T16:32:25.192Z |
| CVE-2025-69044 |
8.1 (3.1)
|
WordPress Vango theme <= 1.3.3 - Local File Inclusion … |
goalthemes |
Vango |
2026-01-22T16:52:18.806Z | 2026-01-28T16:32:23.743Z |
| CVE-2025-67942 |
6.5 (3.1)
|
WordPress Peach Payments Gateway plugin <= 3.3.6 - Bro… |
peachpayments |
Peach Payments Gateway |
2026-01-22T16:51:53.698Z | 2026-01-28T16:31:01.023Z |
| CVE-2020-36980 |
8.5 (4.0)
7.8 (3.1)
|
SAntivirus IC 10.0.21.61 - 'SAntivirusIC' Unquoted Ser… |
Segurazo |
SAntivirus IC |
2026-01-27T18:51:04.921Z | 2026-01-28T16:30:39.579Z |
| CVE-2026-22243 |
8.7 (4.0)
|
EGroupware has SQL Injection in Nextmatch Filter Processing |
EGroupware |
egroupware |
2026-01-28T16:05:35.641Z | 2026-01-28T16:28:24.378Z |
| CVE-2025-67943 |
7.1 (3.1)
|
WordPress My auctions allegro plugin <= 3.6.32 - Cross… |
wphocus |
My auctions allegro |
2026-01-22T16:51:53.901Z | 2026-01-28T16:28:13.771Z |
| CVE-2026-1520 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
rethinkdb Secondary Index cross site scripting |
n/a |
rethinkdb |
2026-01-28T14:32:06.745Z | 2026-01-28T16:27:37.061Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-24127 |
5.4 (3.1)
|
Typemill has Reflected XSS via login error view template |
typemill |
typemill |
2026-01-23T23:01:15.832Z | 2026-01-26T16:18:10.770Z |
| CVE-2026-21520 |
7.5 (3.1)
|
Copilot Studio Information Disclosure Vulnerability |
Microsoft |
Microsoft Copilot Studio |
2026-01-22T22:47:33.536Z | 2026-01-30T03:40:01.713Z |
| CVE-2026-21521 |
7.4 (3.1)
|
Word Copilot Information Disclosure Vulnerability |
Microsoft |
Microsoft 365 Word Copilot |
2026-01-22T22:47:38.118Z | 2026-01-30T03:40:06.091Z |
| CVE-2026-23848 |
6.5 (3.1)
|
MyTube has Rate Limiting Bypass via X-Forwarded-For He… |
franklioxygen |
MyTube |
2026-01-19T20:34:40.060Z | 2026-01-20T20:04:56.547Z |
| CVE-2026-24139 |
8.7 (4.0)
|
MyTube Allows Unauthorized Database Export by Guest Users |
franklioxygen |
MyTube |
2026-01-23T23:55:23.541Z | 2026-01-26T16:18:05.863Z |
| CVE-2026-24140 |
2.7 (3.1)
|
MyTube has Mass Assignment via Settings Management |
franklioxygen |
MyTube |
2026-01-23T23:59:56.045Z | 2026-01-26T16:17:58.728Z |
| CVE-2026-23837 |
9.8 (3.1)
|
MyTube has an Authorization Bypass vulnerability |
franklioxygen |
MyTube |
2026-01-19T20:09:37.223Z | 2026-01-20T17:24:06.897Z |
| CVE-2026-21569 |
7.9 (3.0)
|
This High severity XXE (XML External Entity Injec… |
Atlassian |
Crowd Data Center |
2026-01-28T00:30:00.557Z | 2026-01-28T14:49:56.282Z |
| CVE-2024-2420 |
8.8 (4.0)
|
LenelS2 NetBox Hardcoded Credentials |
LenelS2 |
NetBox |
2024-05-30T17:22:06.344Z | 2024-08-01T19:11:53.496Z |
| CVE-2024-2422 |
9.3 (4.0)
|
LenelS2 NetBox Improper Neutralization of Argumented D… |
LenelS2 |
NetBox |
2024-05-30T17:26:12.543Z | 2024-08-01T19:11:53.469Z |
| CVE-2024-2421 |
9.3 (4.0)
|
LenelS2 NetBox Improper Neutralization of Special Elements |
LenelS2 |
NetBox |
2024-05-30T17:24:33.231Z | 2024-08-01T19:11:53.525Z |
| CVE-2025-64718 |
5.3 (3.1)
|
js-yaml has prototype pollution in merge (<<) |
nodeca |
js-yaml |
2025-11-13T15:32:44.634Z | 2026-01-29T22:08:30.431Z |
| CVE-2024-34764 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. Collision with another CVE ID. | N/A | N/A | 2024-06-03T11:39:15.881Z | 2026-02-02T10:23:41.824Z |
| CVE-2025-4598 |
4.7 (3.1)
|
Systemd-coredump: race condition that allows a local a… |
|
|
2025-05-30T13:13:26.049Z | 2026-02-02T09:32:58.456Z |
| CVE-2024-43275 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. Collision with another CVE. | N/A | N/A | 2024-08-15T08:03:41.495Z | 2026-02-02T08:55:59.171Z |
| CVE-2025-46691 |
7.8 (3.1)
|
Dell PremierColor Panel Driver, versions prior to… |
Dell |
PremierColor |
2026-01-28T19:31:27.145Z | 2026-02-02T07:23:00.945Z |
| CVE-2025-15447 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: The vendor mentioned in the original disclosure filed a report that this issue affects a different vendor. The researcher was not able to provide a proof for his disputed claim which is why the CNA decided to revoke the whole entry. | N/A | N/A | 2026-01-04T23:32:07.098Z | 2026-02-02T06:53:43.582Z |
| CVE-2025-15446 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: The vendor mentioned in the original disclosure filed a report that this issue affects a different vendor. The researcher was not able to provide a proof for his disputed claim which is why the CNA decided to revoke the whole entry. | N/A | N/A | 2026-01-04T23:02:08.276Z | 2026-02-02T06:53:41.477Z |
| CVE-2025-15427 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: The vendor mentioned in the original disclosure filed a report that this issue affects a different vendor. The researcher was not able to provide a proof for his disputed claim which is why the CNA decided to revoke the whole entry. | N/A | N/A | 2026-01-02T04:02:06.172Z | 2026-02-02T06:53:21.085Z |
| CVE-2021-47916 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-02-01T12:15:49.570Z | 2026-02-01T22:37:41.526Z |
| CVE-2026-23490 |
7.5 (3.1)
|
pyasn1 has a DoS vulnerability in decoder |
pyasn1 |
pyasn1 |
2026-01-16T19:03:36.442Z | 2026-02-01T17:06:14.113Z |
| CVE-2021-47853 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-01-21T17:27:37.681Z | 2026-02-01T12:09:57.186Z |
| CVE-2024-42130 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2024-07-30T07:46:26.153Z | 2026-01-31T11:58:31.317Z |
| CVE-2025-15545 |
7.3 (4.0)
|
Insufficient Backup File Upload Input Validation on TP… |
TP-Link Systems Inc. |
Archer RE605X |
2026-01-29T17:31:10.117Z | 2026-01-30T23:15:46.194Z |
| CVE-2026-24770 |
9.8 (3.1)
|
RAGFlow Affected by Zip Slip Remote Code Execution (RC… |
infiniflow |
ragflow |
2026-01-27T21:51:44.874Z | 2026-01-28T21:11:58.921Z |
| CVE-2026-24747 |
8.8 (3.1)
|
PyTorch Vulnerable to Remote Code Execution via Untrus… |
pytorch |
pytorch |
2026-01-27T21:13:46.878Z | 2026-01-30T04:55:40.231Z |
| CVE-2026-1505 |
8.6 (4.0)
7.2 (3.1)
7.2 (3.0)
|
D-Link DIR-615 URL Filter set_temp_nodes.php os comman… |
D-Link |
DIR-615 |
2026-01-28T01:32:08.889Z | 2026-01-28T14:45:20.266Z |
| CVE-2026-1506 |
8.6 (4.0)
7.2 (3.1)
7.2 (3.0)
|
D-Link DIR-615 MAC Filter Configuration adv_mac_filter… |
D-Link |
DIR-615 |
2026-01-28T02:32:09.027Z | 2026-01-28T14:43:26.080Z |
| CVE-2025-41375 |
9.3 (4.0)
|
SQL Injection in Limesurvey |
LimeSurvey |
LimeSurvey |
2025-08-01T12:29:48.916Z | 2025-09-11T08:51:03.073Z |
| CVE-2025-41376 |
5.1 (4.0)
|
CRLF Injection in Limesurvey |
LimeSurvey |
LimeSurvey |
2025-08-01T12:29:59.023Z | 2025-09-11T08:56:57.154Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-21521 | Improper neutralization of escape, meta, or control sequences in Copilot allows an unauthorized att… | 2026-01-22T23:15:57.823 | 2026-02-02T13:30:53.350 |
| fkie_cve-2026-23848 | MyTube is a self-hosted downloader and player for several video websites. Prior to version 1.7.71, … | 2026-01-19T21:15:51.433 | 2026-02-02T13:27:34.320 |
| fkie_cve-2026-24139 | MyTube is a self-hosted downloader and player for several video websites. Versions 1.7.78 and below… | 2026-01-24T00:15:49.313 | 2026-02-02T13:26:40.357 |
| fkie_cve-2026-24140 | MyTube is a self-hosted downloader and player for several video websites. Versions 1.7.78 and below… | 2026-01-24T00:15:49.450 | 2026-02-02T13:26:17.833 |
| fkie_cve-2026-23837 | MyTube is a self-hosted downloader and player for several video websites. A vulnerability present i… | 2026-01-19T21:15:50.903 | 2026-02-02T13:24:34.437 |
| fkie_cve-2026-21569 | This High severity XXE (XML External Entity Injection) vulnerability was introduced in version 7.1.… | 2026-01-28T01:16:14.187 | 2026-02-02T13:22:24.383 |
| fkie_cve-2024-2420 | LenelS2 NetBox access control and event monitoring system was discovered to contain Hardcoded Crede… | 2024-05-30T18:15:09.070 | 2026-02-02T13:14:26.023 |
| fkie_cve-2024-2422 | LenelS2 NetBox access control and event monitoring system was discovered to contain an authenticate… | 2024-05-30T18:15:09.367 | 2026-02-02T13:13:52.333 |
| fkie_cve-2024-2421 | LenelS2 NetBox access control and event monitoring system was discovered to contain an unauthentica… | 2024-05-30T18:15:09.230 | 2026-02-02T13:11:33.113 |
| fkie_cve-2025-64718 | js-yaml is a JavaScript YAML parser and dumper. In js-yaml before 4.1.1 and 3.14.2, it's possible f… | 2025-11-13T16:15:57.153 | 2026-02-02T12:54:45.340 |
| fkie_cve-2024-34764 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. Collisi… | 2024-06-03T12:15:09.120 | 2026-02-02T11:15:53.723 |
| fkie_cve-2025-4598 | A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process… | 2025-05-30T14:15:23.557 | 2026-02-02T10:16:05.983 |
| fkie_cve-2024-43275 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. Collisi… | 2024-08-15T08:15:05.363 | 2026-02-02T09:15:50.800 |
| fkie_cve-2025-46691 | Dell PremierColor Panel Driver, versions prior to 1.0.0.1 A01, contains an Improper Access Control … | 2026-01-28T20:16:09.077 | 2026-02-02T08:16:05.833 |
| fkie_cve-2025-15447 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This cand… | 2026-01-05T00:15:46.747 | 2026-02-02T07:16:35.470 |
| fkie_cve-2025-15446 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This cand… | 2026-01-04T23:15:50.850 | 2026-02-02T07:16:26.267 |
| fkie_cve-2025-15427 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This cand… | 2026-01-02T04:15:43.980 | 2026-02-02T07:16:05.860 |
| fkie_cve-2021-47916 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2026-02-01T13:15:55.903 | 2026-02-01T23:15:49.110 |
| fkie_cve-2026-23490 | pyasn1 is a generic ASN.1 library for Python. Prior to 0.6.2, a Denial-of-Service issue has been fo… | 2026-01-16T19:16:19.117 | 2026-02-01T17:15:50.820 |
| fkie_cve-2021-47853 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2026-01-21T18:16:14.800 | 2026-02-01T12:15:53.110 |
| fkie_cve-2024-42130 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2024-07-30T08:15:05.053 | 2026-01-31T12:15:49.570 |
| fkie_cve-2025-15545 | The backup restore function does not properly validate unexpected or unrecognized tags within the b… | 2026-01-29T18:16:07.533 | 2026-01-31T00:15:51.647 |
| fkie_cve-2026-24770 | RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In version 0.23.1 and possib… | 2026-01-27T22:15:56.947 | 2026-01-30T21:53:46.573 |
| fkie_cve-2026-24747 | PyTorch is a Python package that provides tensor computation. Prior to version 2.10.0, a vulnerabil… | 2026-01-27T22:15:56.470 | 2026-01-30T21:51:55.367 |
| fkie_cve-2026-1505 | A vulnerability was found in D-Link DIR-615 4.10. This issue affects some unknown processing of the… | 2026-01-28T02:16:00.083 | 2026-01-30T21:47:30.330 |
| fkie_cve-2026-1506 | A vulnerability was determined in D-Link DIR-615 4.10. Impacted is an unknown function of the file … | 2026-01-28T03:15:50.367 | 2026-01-30T21:46:35.937 |
| fkie_cve-2025-41375 | SQL Injection vulnerability in Limesurvey v2.65.1+170522. This vulnerability allows an attacker to … | 2025-08-01T13:15:27.257 | 2026-01-30T21:45:13.263 |
| fkie_cve-2025-41376 | CRLF Injection vulnerability in Limesurvey v2.65.1+170522. This vulnerability could allow a remote… | 2025-08-01T13:15:27.450 | 2026-01-30T21:44:53.750 |
| fkie_cve-2024-6933 | A flaw has been found in LimeSurvey 6.5.14-240624. Affected by this issue is the function actionUpd… | 2024-07-21T01:15:10.040 | 2026-01-30T21:41:54.680 |
| fkie_cve-2026-23755 | D-Link D-View 8 versions 2.0.1.107 and below contain an uncontrolled search path vulnerability in t… | 2026-01-21T18:16:26.117 | 2026-01-30T21:33:18.047 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-cqpf-3v3x-x2f7 |
6.1 (3.1)
|
The SEO Links Interlinking plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via… | 2026-01-28T12:30:28Z | 2026-01-28T12:30:28Z |
| ghsa-chvq-5q36-924f |
7.1 (4.0)
|
Johnson Controls iSTAR Configuration Utility (ICU) has Stack-based Buffer Overflow vulnerability. T… | 2026-01-28T12:30:28Z | 2026-01-28T12:30:28Z |
| ghsa-7c75-f958-6j3m |
4.3 (3.1)
|
The Recooty – Job Widget (Old Dashboard) plugin for WordPress is vulnerable to Cross-Site Request F… | 2026-01-28T12:30:28Z | 2026-01-28T12:30:28Z |
| ghsa-75rp-pqq4-fpv7 |
8.5 (4.0)
|
Cross-Site request forgery (CSRF) vulnerability in Sync Breeze Enterprise Server v10.4.18 and Disk … | 2026-01-28T12:30:28Z | 2026-01-28T12:30:28Z |
| ghsa-33r4-r5rc-phcf |
8.5 (4.0)
|
Cross-Site request forgery (CSRF) vulnerability in Sync Breeze Enterprise Server v10.4.18 and Disk … | 2026-01-28T12:30:28Z | 2026-01-28T12:30:28Z |
| ghsa-3376-jw3x-f6j6 |
8.5 (4.0)
|
Cross-Site request forgery (CSRF) vulnerability in Sync Breeze Enterprise Server v10.4.18 and Disk … | 2026-01-28T12:30:28Z | 2026-01-28T12:30:28Z |
| ghsa-vqj8-m42g-mv79 |
7.5 (3.1)
|
The VidShop – Shoppable Videos for WooCommerce plugin for WordPress is vulnerable to time-based SQL… | 2026-01-28T09:30:31Z | 2026-01-28T09:30:31Z |
| ghsa-r5hj-w659-pg8p |
7.5 (3.1)
|
SolarWinds Web Help Desk was found to be susceptible to a hardcoded credentials vulnerability that,… | 2026-01-28T09:30:30Z | 2026-01-28T09:30:31Z |
| ghsa-jpf4-6gr7-rh8q |
9.8 (3.1)
|
SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that… | 2026-01-28T09:30:31Z | 2026-01-28T09:30:31Z |
| ghsa-jm7r-g967-8pch |
9.8 (3.1)
|
SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that… | 2026-01-28T09:30:31Z | 2026-01-28T09:30:31Z |
| ghsa-h8c7-c2x8-j8gf |
7.2 (3.1)
|
The AI Engine – The Chatbot and AI Framework for WordPress plugin for WordPress is vulnerable to ar… | 2026-01-28T09:30:31Z | 2026-01-28T09:30:31Z |
| ghsa-h376-x6h9-h5f3 |
5.3 (3.1)
|
The Document Embedder – Embed PDFs, Word, Excel, and Other Files plugin for WordPress is vulnerable… | 2026-01-28T09:30:31Z | 2026-01-28T09:30:31Z |
| ghsa-cvjc-vrqh-j59p |
4.4 (3.1)
|
The Order Minimum/Maximum Amount Limits for WooCommerce plugin for WordPress is vulnerable to Store… | 2026-01-28T09:30:31Z | 2026-01-28T09:30:31Z |
| ghsa-cgx8-hg5r-9pwr |
8.8 (4.0)
|
Default credentials vulnerability exists in SuprOS product. If exploited, this could allow an authe… | 2026-01-28T09:30:31Z | 2026-01-28T09:30:31Z |
| ghsa-6x3m-wxmv-rww9 |
6.1 (3.1)
|
Jirafeau normally prevents browser preview for text files due to the possibility that for example S… | 2026-01-28T09:30:30Z | 2026-01-28T09:30:31Z |
| ghsa-5gq3-mh83-6m28 |
9.8 (3.1)
|
SolarWinds Web Help Desk was found to be susceptible to an untrusted data deserialization vulnerabi… | 2026-01-28T09:30:31Z | 2026-01-28T09:30:31Z |
| ghsa-585q-rrjr-7f52 |
4.4 (3.1)
|
The Ivory Search – WordPress Search Plugin plugin for WordPress is vulnerable to Stored Cross-Site … | 2026-01-28T09:30:31Z | 2026-01-28T09:30:31Z |
| ghsa-2wcq-5jhh-r94q |
5.3 (3.1)
|
The RegistrationMagic plugin for WordPress is vulnerable to Missing Authorization in versions up to… | 2026-01-28T09:30:31Z | 2026-01-28T09:30:31Z |
| ghsa-w43j-jwpr-7gj3 |
6.4 (3.1)
|
The WPBITS Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting v… | 2026-01-28T09:30:30Z | 2026-01-28T09:30:30Z |
| ghsa-p522-hm8w-vfrr |
6.4 (3.1)
|
The Forms Bridge – Infinite integrations plugin for WordPress is vulnerable to Stored Cross-Site Sc… | 2026-01-28T09:30:30Z | 2026-01-28T09:30:30Z |
| ghsa-m83h-48rr-jcrh |
8.1 (3.1)
|
SolarWinds Web Help Desk was found to be susceptible to a security control bypass vulnerability tha… | 2026-01-28T09:30:30Z | 2026-01-28T09:30:30Z |
| ghsa-m59v-w24h-f8g6 |
7.3 (3.1)
|
The New User Approve plugin for WordPress is vulnerable to unauthorized access of data and modifica… | 2026-01-28T09:30:30Z | 2026-01-28T09:30:30Z |
| ghsa-gvwp-rvc7-xjm8 |
5.3 (3.1)
|
The Simple calendar for Elementor plugin for WordPress is vulnerable to Missing Authorization in al… | 2026-01-28T09:30:30Z | 2026-01-28T09:30:30Z |
| ghsa-gmv6-9vw4-mjrf |
5.3 (3.1)
|
The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to aut… | 2026-01-28T09:30:30Z | 2026-01-28T09:30:30Z |
| ghsa-g4qc-jf93-q4fc |
6.4 (3.1)
|
The Interactions – Create Interactive Experiences in the Block Editor plugin for WordPress is vulne… | 2026-01-28T09:30:30Z | 2026-01-28T09:30:30Z |
| ghsa-9h39-qgm4-fgr8 |
6.4 (3.1)
|
The Simple Folio plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the '_simple… | 2026-01-28T09:30:30Z | 2026-01-28T09:30:30Z |
| ghsa-87j3-3j5h-4g3m |
6.4 (3.1)
|
The Buy Now Plus – Buy Now buttons for Stripe plugin for WordPress is vulnerable to Stored Cross-Si… | 2026-01-28T09:30:30Z | 2026-01-28T09:30:30Z |
| ghsa-xw9f-44rx-4f36 |
5.3 (3.1)
|
The Easy Replace Image plugin for WordPress is vulnerable to Missing Authorization in all versions … | 2026-01-28T06:30:31Z | 2026-01-28T06:30:31Z |
| ghsa-xw9c-4vrc-64gr |
|
Rejected reason: Not used | 2026-01-28T06:30:31Z | 2026-01-28T06:30:31Z |
| ghsa-vpjf-q5q9-w837 |
7.2 (3.1)
|
The TableMaster for Elementor plugin for WordPress is vulnerable to Server-Side Request Forgery in … | 2026-01-28T06:30:31Z | 2026-01-28T06:30:31Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-149 |
|
TensorFlow is an end-to-end open source platform for machine learning. If the `splits` ar… | tensorflow | 2021-05-14T19:15:00Z | 2021-08-27T03:22:23.518786Z |
| pysec-2020-258 |
|
In TensorFlow before 1.15.2 and 2.0.1, converting a string (from Python) to a tf.float16 … | tensorflow | 2020-01-28T22:15:00Z | 2021-08-27T03:22:23.423115Z |
| pysec-2020-257 |
|
In affected versions of TensorFlow under certain cases, loading a saved model can result … | tensorflow | 2020-12-10T22:15:00Z | 2021-08-27T03:22:23.329750Z |
| pysec-2020-256 |
|
In affected versions of TensorFlow running an LSTM/GRU model where the LSTM/GRU layer rec… | tensorflow | 2020-12-10T23:15:00Z | 2021-08-27T03:22:23.120464Z |
| pysec-2020-269 |
|
TensorFlow before 1.7.0 has an integer overflow that causes an out-of-bounds read, possib… | tensorflow-cpu | 2020-05-04T15:15:00Z | 2021-08-27T03:22:22.195752Z |
| pysec-2020-255 |
|
In affected versions of TensorFlow the tf.raw_ops.ImmutableConst operation returns a cons… | tensorflow | 2020-12-10T23:15:00Z | 2021-08-27T03:22:22.907995Z |
| pysec-2020-254 |
|
In affected versions of TensorFlow under certain cases a saved model can trigger use of u… | tensorflow | 2020-12-10T23:15:00Z | 2021-08-27T03:22:22.698179Z |
| pysec-2020-253 |
|
TensorFlow before 1.7.0 has an integer overflow that causes an out-of-bounds read, possib… | tensorflow | 2020-05-04T15:15:00Z | 2021-08-27T03:22:22.195752Z |
| pysec-2019-228 |
|
NULL pointer dereference in Google TensorFlow before 1.12.2 could cause a denial of servi… | tensorflow-cpu | 2019-04-24T17:29:00Z | 2021-08-27T03:22:22.500832Z |
| pysec-2019-227 |
|
In TensorFlow before 1.15, a heap buffer overflow in UnsortedSegmentSum can be produced w… | tensorflow-cpu | 2019-12-16T21:15:00Z | 2021-08-27T03:22:22.453759Z |
| pysec-2019-226 |
|
Google TensorFlow 1.7 and below is affected by: Buffer Overflow. The impact is: execute a… | tensorflow-cpu | 2019-04-23T21:29:00Z | 2021-08-27T03:22:22.407658Z |
| pysec-2019-225 |
|
Memcpy parameter overlap in Google Snappy library 1.1.4, as used in Google TensorFlow bef… | tensorflow-cpu | 2019-04-24T17:29:00Z | 2021-08-27T03:22:22.362937Z |
| pysec-2019-224 |
|
Google TensorFlow 1.6.x and earlier is affected by: Null Pointer Dereference. The type of… | tensorflow-cpu | 2019-04-23T21:29:00Z | 2021-08-27T03:22:22.321158Z |
| pysec-2019-223 |
|
Google TensorFlow 1.7.x and earlier is affected by a Buffer Overflow vulnerability. The t… | tensorflow-cpu | 2019-04-24T21:29:00Z | 2021-08-27T03:22:22.242054Z |
| pysec-2019-222 |
|
Invalid memory access and/or a heap buffer overflow in the TensorFlow XLA compiler in Goo… | tensorflow-cpu | 2019-04-24T17:29:00Z | 2021-08-27T03:22:22.150023Z |
| pysec-2019-210 |
|
NULL pointer dereference in Google TensorFlow before 1.12.2 could cause a denial of servi… | tensorflow | 2019-04-24T17:29:00Z | 2021-08-27T03:22:22.500832Z |
| pysec-2019-209 |
|
In TensorFlow before 1.15, a heap buffer overflow in UnsortedSegmentSum can be produced w… | tensorflow | 2019-12-16T21:15:00Z | 2021-08-27T03:22:22.453759Z |
| pysec-2019-208 |
|
Google TensorFlow 1.7 and below is affected by: Buffer Overflow. The impact is: execute a… | tensorflow | 2019-04-23T21:29:00Z | 2021-08-27T03:22:22.407658Z |
| pysec-2019-207 |
|
Memcpy parameter overlap in Google Snappy library 1.1.4, as used in Google TensorFlow bef… | tensorflow | 2019-04-24T17:29:00Z | 2021-08-27T03:22:22.362937Z |
| pysec-2019-206 |
|
Google TensorFlow 1.6.x and earlier is affected by: Null Pointer Dereference. The type of… | tensorflow | 2019-04-23T21:29:00Z | 2021-08-27T03:22:22.321158Z |
| pysec-2019-205 |
|
Google TensorFlow 1.7.x and earlier is affected by a Buffer Overflow vulnerability. The t… | tensorflow | 2019-04-24T21:29:00Z | 2021-08-27T03:22:22.242054Z |
| pysec-2019-204 |
|
Invalid memory access and/or a heap buffer overflow in the TensorFlow XLA compiler in Goo… | tensorflow | 2019-04-24T17:29:00Z | 2021-08-27T03:22:22.150023Z |
| pysec-2017-95 |
|
An exploitable vulnerability exists in the Databook loading functionality of Tablib 0.11.… | tablib | 2017-06-14T13:29:00Z | 2021-08-27T03:22:22.103496Z |
| pysec-2021-148 |
|
In SiCKRAGE, versions 9.3.54.dev1 to 10.0.11.dev1 are vulnerable to Reflected Cross-Site-… | sickrage | 2021-04-12T14:15:00Z | 2021-08-27T03:22:21.656706Z |
| pysec-2021-147 |
|
in SiCKRAGE, versions 4.2.0 to 10.0.11.dev1 are vulnerable to Stored Cross-Site-Scripting… | sickrage | 2021-04-12T14:15:00Z | 2021-08-27T03:22:21.507681Z |
| pysec-2020-252 |
|
The Scalyr Agent before 2.1.10 has Missing SSL Certificate Validation because, in some ci… | scalyr-agent-2 | 2020-08-27T22:15:00Z | 2021-08-27T03:22:21.152325Z |
| pysec-2020-251 |
|
The Scalyr Agent before 2.1.10 has Missing SSL Certificate Validation because, in some ci… | scalyr-agent-2 | 2020-08-27T22:15:00Z | 2021-08-27T03:22:21.123825Z |
| pysec-2019-203 |
|
Splunk-SDK-Python before 1.6.6 does not properly verify untrusted TLS server certificates… | splunk-sdk | 2019-03-21T16:01:00Z | 2021-08-27T03:22:21.751156Z |
| pysec-2018-101 |
|
SickRage before v2018.03.09-1 includes cleartext credentials in HTTP responses. | sickrage | 2018-03-31T21:29:00Z | 2021-08-27T03:22:21.352713Z |
| pysec-2013-33 |
|
cache.py in Suds 0.4, when tempdir is set to None, allows local users to redirect SOAP qu… | suds-py3 | 2013-09-23T20:55:00Z | 2021-08-27T03:22:21.834987Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-32254 | Phpgurukul Tourism Management System v2.0 is vulnerable to Unrestricted Upload of File wi… | 2024-04-13T05:02:29.149562Z |
| gsd-2024-32253 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.141839Z |
| gsd-2024-32252 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.107646Z |
| gsd-2024-32251 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.068175Z |
| gsd-2024-32250 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.038560Z |
| gsd-2024-32249 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.053304Z |
| gsd-2024-32248 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.084848Z |
| gsd-2024-32247 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.104463Z |
| gsd-2024-32246 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.102598Z |
| gsd-2024-32245 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.136065Z |
| gsd-2024-32244 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.121517Z |
| gsd-2024-32243 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.057360Z |
| gsd-2024-32242 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.108227Z |
| gsd-2024-32241 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.133047Z |
| gsd-2024-32240 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.123157Z |
| gsd-2024-32239 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.048956Z |
| gsd-2024-32238 | H3C ER8300G2-X is vulnerable to Incorrect Access Control. The password for the router's m… | 2024-04-13T05:02:29.100846Z |
| gsd-2024-32237 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.061758Z |
| gsd-2024-32236 | An issue in CmsEasy v.7.7 and before allows a remote attacker to obtain sensitive informa… | 2024-04-13T05:02:29.060529Z |
| gsd-2024-32235 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.030972Z |
| gsd-2024-32234 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.133642Z |
| gsd-2024-32233 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.026512Z |
| gsd-2024-32232 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.138573Z |
| gsd-2024-32231 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.047128Z |
| gsd-2024-32230 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.128447Z |
| gsd-2024-32229 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.098086Z |
| gsd-2024-32228 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.056141Z |
| gsd-2024-32227 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.075707Z |
| gsd-2024-32226 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.082322Z |
| gsd-2024-32225 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.098284Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-191580 | Malicious code in pixel-bloom (npm) | 2025-12-01T13:20:52Z | 2025-12-24T10:09:29Z |
| mal-2025-191542 | Malicious code in nodenetbanxsdk (npm) | 2025-12-02T04:30:47Z | 2025-12-24T10:09:29Z |
| mal-2025-191135 | Malicious code in normal-store (npm) | 2025-11-24T22:24:53Z | 2025-12-24T10:09:29Z |
| mal-2025-190630 | Malicious code in parse-session (npm) | 2025-11-24T05:16:12Z | 2025-12-24T10:09:29Z |
| mal-2025-190548 | Malicious code in node-calculator-yktt (npm) | 2025-11-17T17:14:41Z | 2025-12-24T10:09:29Z |
| mal-2025-190539 | Malicious code in node-calculator-b57e (npm) | 2025-11-17T17:14:41Z | 2025-12-24T10:09:29Z |
| mal-2025-190538 | Malicious code in node-calculator-b549 (npm) | 2025-11-17T17:14:41Z | 2025-12-24T10:09:29Z |
| mal-2025-190537 | Malicious code in node-calculator-9c62 (npm) | 2025-11-17T17:14:41Z | 2025-12-24T10:09:29Z |
| mal-2025-190536 | Malicious code in node-calculator-9b93 (npm) | 2025-11-17T17:14:41Z | 2025-12-24T10:09:29Z |
| mal-2025-190532 | Malicious code in node-calculator-68f8 (npm) | 2025-11-17T17:14:41Z | 2025-12-24T10:09:29Z |
| mal-2025-190531 | Malicious code in node-calculator-522f (npm) | 2025-11-17T17:14:41Z | 2025-12-24T10:09:29Z |
| MAL-2025-855 | Malicious code in mongodb-chatbot-verified-answers (npm) | 2025-02-03T16:56:51Z | 2025-12-24T10:09:29Z |
| MAL-2025-49428 | Malicious code in otetotvot (npm) | 2025-11-09T00:17:09Z | 2025-12-24T10:09:29Z |
| MAL-2025-49427 | Malicious code in otetoparserlparser (npm) | 2025-11-09T00:17:09Z | 2025-12-24T10:09:29Z |
| MAL-2025-49263 | Malicious code in pixelblm (npm) | 2025-10-30T23:58:26Z | 2025-12-24T10:09:29Z |
| MAL-2025-47947 | Malicious code in orvlla (npm) | 2025-10-07T02:39:41Z | 2025-12-24T10:09:29Z |
| MAL-2025-47929 | Malicious code in mcp-server-fixthis (npm) | 2025-10-07T00:24:42Z | 2025-12-24T10:09:29Z |
| MAL-2025-47857 | Malicious code in pc-analytics-promotion-creation-core (npm) | 2025-09-26T04:46:33Z | 2025-12-24T10:09:29Z |
| MAL-2025-47593 | Malicious code in package-x (npm) | 2025-09-23T18:30:20Z | 2025-12-24T10:09:29Z |
| MAL-2025-3412 | Malicious code in pdf-to-office (npm) | 2025-04-23T15:57:31Z | 2025-12-24T10:09:29Z |
| MAL-2025-192400 | Malicious code in node-calculator-0d96 (npm) | 2025-12-10T01:43:14Z | 2025-12-24T10:09:29Z |
| MAL-2025-191580 | Malicious code in pixel-bloom (npm) | 2025-12-01T13:20:52Z | 2025-12-24T10:09:29Z |
| MAL-2025-191542 | Malicious code in nodenetbanxsdk (npm) | 2025-12-02T04:30:47Z | 2025-12-24T10:09:29Z |
| MAL-2025-191135 | Malicious code in normal-store (npm) | 2025-11-24T22:24:53Z | 2025-12-24T10:09:29Z |
| MAL-2025-190630 | Malicious code in parse-session (npm) | 2025-11-24T05:16:12Z | 2025-12-24T10:09:29Z |
| MAL-2025-190548 | Malicious code in node-calculator-yktt (npm) | 2025-11-17T17:14:41Z | 2025-12-24T10:09:29Z |
| MAL-2025-190539 | Malicious code in node-calculator-b57e (npm) | 2025-11-17T17:14:41Z | 2025-12-24T10:09:29Z |
| MAL-2025-190538 | Malicious code in node-calculator-b549 (npm) | 2025-11-17T17:14:41Z | 2025-12-24T10:09:29Z |
| MAL-2025-190537 | Malicious code in node-calculator-9c62 (npm) | 2025-11-17T17:14:41Z | 2025-12-24T10:09:29Z |
| MAL-2025-190536 | Malicious code in node-calculator-9b93 (npm) | 2025-11-17T17:14:41Z | 2025-12-24T10:09:29Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2023-2249 | vim: Mehrere Schwachstellen | 2023-09-03T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2023-1170 | vim: Mehrere Schwachstellen ermöglichen Denial of Service und Codeausführung | 2023-05-09T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2023-0566 | vim: Mehrere Schwachstellen | 2023-03-05T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2023-0025 | vim: Mehrere Schwachstellen | 2023-01-04T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-2177 | vim: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2022-11-27T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-1584 | vim: Mehrere Schwachstellen ermöglichen Codeausführung | 2022-09-29T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-1324 | vim: Schwachstelle ermöglicht Codeausführung | 2022-09-06T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-1284 | vim: Schwachstelle ermöglicht Codeausführung | 2022-09-04T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-1127 | vim: Schwachstelle ermöglicht Codeausführung | 2021-12-29T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-1126 | vim: Schwachstelle ermöglicht Codeausführung | 2021-12-28T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0909 | IBM DB2: Mehrere Schwachstellen ermöglichen Codeausführung | 2022-08-03T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0790 | Linux Kernel: Mehrere Schwachstellen ermöglichen Codeausführung | 2022-01-10T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0583 | vim: Schwachstelle ermöglicht Manipulation von Speicher | 2022-07-05T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0397 | vim: Mehrere Schwachstellen | 2022-06-19T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0369 | vim: Schwachstelle ermöglicht Codeausführung | 2022-06-16T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0364 | vim: Mehrere Schwachstellen | 2022-05-19T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0349 | vim: Mehrere Schwachstellen | 2021-12-01T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0345 | vim: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2021-10-19T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0248 | vim: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2022-01-24T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0132 | vim: Schwachstelle ermöglicht Codeausführung | 2022-05-31T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0130 | vim: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-05-29T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0124 | vim: Mehrere Schwachstellen | 2022-05-08T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0107 | vim: Schwachstelle ermöglicht Codeausführung | 2022-02-14T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0059 | vim: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Benutzerrechten | 2022-02-02T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0056 | vim: Mehrere Schwachstellen | 2022-01-30T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0054 | vim: Mehrere Schwachstellen | 2022-01-26T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2025-0652 | Shibboleth Identity Provider: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-03-27T23:00:00.000+00:00 | 2025-03-27T23:00:00.000+00:00 |
| wid-sec-w-2025-0650 | Red Hat JBoss Enterprise Application Platform: Schwachstelle ermöglicht Cross-Site Scripting | 2025-03-27T23:00:00.000+00:00 | 2025-03-27T23:00:00.000+00:00 |
| wid-sec-w-2025-0648 | JetBrains TeamCity: Mehrere Schwachstellen | 2025-03-27T23:00:00.000+00:00 | 2025-03-27T23:00:00.000+00:00 |
| wid-sec-w-2024-1725 | Apple macOS: Mehrere Schwachstellen | 2024-07-29T22:00:00.000+00:00 | 2025-03-27T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2023:1372 | Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 8.0.0 [security update] | 2023-05-10T00:28:34+00:00 | 2026-02-03T21:14:38+00:00 |
| rhsa-2023:1329 | Red Hat Security Advisory: OpenShift Container Platform 4.13.0 bug fix and security update | 2023-05-18T00:39:29+00:00 | 2026-02-03T21:14:36+00:00 |
| rhsa-2023:1327 | Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update | 2023-05-17T01:38:56+00:00 | 2026-02-03T21:14:33+00:00 |
| rhsa-2023:1297 | Red Hat Security Advisory: OpenShift Container Platform 4.11.32 security and extras update | 2023-03-22T03:13:41+00:00 | 2026-02-03T21:14:32+00:00 |
| rhsa-2023:1325 | Red Hat Security Advisory: OpenShift Container Platform 4.13.0 security update | 2023-05-18T00:14:06+00:00 | 2026-02-03T21:14:30+00:00 |
| rhsa-2023:1310 | Red Hat Security Advisory: Logging Subsystem for Red Hat OpenShift - 5.5.9 security update | 2023-03-29T10:29:10+00:00 | 2026-02-03T21:14:30+00:00 |
| rhsa-2023:1268 | Red Hat Security Advisory: OpenShift Container Platform 4.12.8 security update | 2023-03-21T14:50:04+00:00 | 2026-02-03T21:14:30+00:00 |
| rhsa-2023:1276 | Red Hat Security Advisory: Red Hat OpenStack Platform (collectd-libpod-stats) security update | 2023-03-15T19:58:16+00:00 | 2026-02-03T21:14:28+00:00 |
| rhsa-2023:1270 | Red Hat Security Advisory: OpenShift Container Platform 4.12.8 security update | 2023-03-21T04:14:05+00:00 | 2026-02-03T21:14:26+00:00 |
| rhsa-2023:1181 | Red Hat Security Advisory: Release of OpenShift Serverless 1.27.1 | 2023-03-09T16:23:44+00:00 | 2026-02-03T21:14:26+00:00 |
| rhsa-2023:1159 | Red Hat Security Advisory: OpenShift Container Platform 4.11.31 security and extras update | 2023-03-14T02:49:51+00:00 | 2026-02-03T21:14:26+00:00 |
| rhsa-2023:1179 | Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.27.1 | 2023-03-09T13:46:17+00:00 | 2026-02-03T21:14:24+00:00 |
| rhsa-2023:1174 | Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.1.2 security and bug fix update | 2023-03-09T01:24:50+00:00 | 2026-02-03T21:14:24+00:00 |
| rhsa-2023:1170 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.12.1 security bug fix update | 2023-03-08T15:31:11+00:00 | 2026-02-03T21:14:22+00:00 |
| rhsa-2023:1158 | Red Hat Security Advisory: OpenShift Container Platform 4.11.31 bug fix and security update | 2023-03-14T11:25:55+00:00 | 2026-02-03T21:14:21+00:00 |
| rhsa-2023:1154 | Red Hat Security Advisory: OpenShift Container Platform 4.10.54 security update | 2023-03-16T03:52:08+00:00 | 2026-02-03T21:14:20+00:00 |
| rhsa-2023:1079 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (osp-director-downloader-container, osp-director-agent-container and osp-director-operator-container) security update | 2023-03-06T16:23:58+00:00 | 2026-02-03T21:14:20+00:00 |
| rhsa-2023:1042 | Red Hat Security Advisory: Custom Metrics Autoscaler Operator for Red Hat OpenShift (with security updates) | 2023-03-06T18:38:53+00:00 | 2026-02-03T21:14:20+00:00 |
| rhsa-2023:1030 | Red Hat Security Advisory: OpenShift Container Platform 4.11.30 security update | 2023-03-07T09:43:19+00:00 | 2026-02-03T21:14:18+00:00 |
| rhsa-2023:0934 | Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update | 2023-02-28T00:50:28+00:00 | 2026-02-03T21:14:18+00:00 |
| rhsa-2023:0932 | Red Hat Security Advisory: Logging Subsystem 5.6.3 - Red Hat OpenShift | 2023-03-08T14:06:03+00:00 | 2026-02-03T21:14:18+00:00 |
| rhsa-2023:0931 | Red Hat Security Advisory: Logging Subsystem 5.4.12 - Red Hat OpenShift | 2023-03-08T17:10:49+00:00 | 2026-02-03T21:14:16+00:00 |
| rhsa-2023:0930 | Red Hat Security Advisory: Logging Subsystem 5.5.8 - Red Hat OpenShift | 2023-03-08T15:35:11+00:00 | 2026-02-03T21:14:16+00:00 |
| rhsa-2023:0918 | Red Hat Security Advisory: Service Binding Operator security update | 2023-02-27T00:55:36+00:00 | 2026-02-03T21:14:16+00:00 |
| rhsa-2023:0895 | Red Hat Security Advisory: OpenShift Container Platform 4.11.29 security update | 2023-02-28T07:39:08+00:00 | 2026-02-03T21:14:14+00:00 |
| rhsa-2023:0890 | Red Hat Security Advisory: OpenShift Container Platform 4.12.5 security update | 2023-02-28T11:59:36+00:00 | 2026-02-03T21:14:14+00:00 |
| rhsa-2023:0795 | Red Hat Security Advisory: RHSA: Submariner 0.13.3 - security updates and bug fixes | 2023-02-15T21:46:51+00:00 | 2026-02-03T21:14:11+00:00 |
| rhsa-2023:0774 | Red Hat Security Advisory: OpenShift Container Platform 4.11.28 security update | 2023-02-21T18:11:28+00:00 | 2026-02-03T21:14:11+00:00 |
| rhsa-2023:0770 | Red Hat Security Advisory: OpenShift Container Platform 4.12.4 security update | 2023-02-20T18:30:48+00:00 | 2026-02-03T21:14:09+00:00 |
| rhsa-2023:0769 | Red Hat Security Advisory: OpenShift Container Platform 4.12.4 security update | 2023-02-20T18:30:20+00:00 | 2026-02-03T21:14:08+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-22-286-03 | Siemens Solid Edge | 2022-10-11T00:00:00.000000Z | 2022-10-11T00:00:00.000000Z |
| icsa-22-286-01 | Siemens LOGO! | 2022-10-11T00:00:00.000000Z | 2022-10-11T00:00:00.000000Z |
| icsa-22-284-03 | Sensormatic Electronics C-CURE 9000 | 2022-10-11T00:00:00.000000Z | 2022-10-11T00:00:00.000000Z |
| icsa-22-284-02 | Daikin Holdings Singapore | 2022-10-11T00:00:00.000000Z | 2022-10-11T00:00:00.000000Z |
| icsa-22-284-01 | Altair HyperView Player | 2022-10-11T00:00:00.000000Z | 2022-10-11T00:00:00.000000Z |
| icsa-22-167-06 | Siemens Apache HTTP Server | 2022-06-14T00:00:00.000000Z | 2022-10-11T00:00:00.000000Z |
| icsa-21-315-06 | Siemens SCALANCE W1750D | 2021-11-09T00:00:00.000000Z | 2022-10-11T00:00:00.000000Z |
| icsa-21-287-07 | Siemens SCALANCE | 2021-10-12T00:00:00.000000Z | 2022-10-11T00:00:00.000000Z |
| icsa-22-279-02 | HIWIN Robot System Software (HRSS) | 2022-10-06T00:00:00.000000Z | 2022-10-06T00:00:00.000000Z |
| icsa-22-279-01 | Rockwell Automation FactoryTalk VantagePoint | 2022-10-06T00:00:00.000000Z | 2022-10-06T00:00:00.000000Z |
| icsa-22-277-03 | Horner Automation Cscape | 2022-10-04T06:00:00.000000Z | 2022-10-04T06:00:00.000000Z |
| icsma-22-277-01 | BD Totalys MultiProcessor | 2022-10-04T00:00:00.000000Z | 2022-10-04T00:00:00.000000Z |
| icsa-22-277-04 | OMRON CX-Programmer | 2022-10-04T00:00:00.000000Z | 2022-10-04T00:00:00.000000Z |
| icsa-22-277-02 | Hitachi Energy Modular Switchgear Monitoring (MSM) | 2022-10-04T00:00:00.000000Z | 2022-10-04T00:00:00.000000Z |
| icsa-22-277-01 | Johnson Controls Metasys ADX Server | 2022-10-04T00:00:00.000000Z | 2022-10-04T00:00:00.000000Z |
| icsa-20-212-02 | ICSA-20-212-02_Mitsubishi Electric Multiple Factory Automation Engineering Software Products (Update A) | 2020-07-30T00:00:00.000000Z | 2022-09-30T00:00:00.000000Z |
| icsma-22-251-01 | Baxter Sigma Spectrum Infusion Pump (Update A) | 2022-09-08T00:00:00.000000Z | 2022-09-29T00:00:00.000000Z |
| icsa-22-272-02 | Hitachi Energy MicroSCADA Pro X SYS600 | 2022-09-29T00:00:00.000000Z | 2022-09-29T00:00:00.000000Z |
| icsa-22-272-01 | Hitachi Energy MicroSCADA Pro X SYS600 | 2022-09-29T00:00:00.000000Z | 2022-09-29T00:00:00.000000Z |
| icsa-22-244-01 | Delta Electronics DOPSoft (Update A) | 2022-09-01T00:00:00.000000Z | 2022-09-29T00:00:00.000000Z |
| icsa-22-235-01 | ARC Informatique PcVue (Update A) | 2022-08-23T00:00:00.000000Z | 2022-09-29T00:00:00.000000Z |
| icsa-21-182-03 | Delta Electronics DOPSoft (Update A) | 2021-07-01T00:00:00.000000Z | 2022-09-29T00:00:00.000000Z |
| icsa-22-270-03 | Rockwell Automation ThinManager ThinServer | 2022-09-27T00:00:00.000000Z | 2022-09-27T00:00:00.000000Z |
| icsa-22-270-02 | Hitachi Energy APM Edge | 2022-09-27T00:00:00.000000Z | 2022-09-27T00:00:00.000000Z |
| icsa-22-270-01 | Hitachi Energy AFS660/AFS665 | 2022-09-27T00:00:00.000000Z | 2022-09-27T00:00:00.000000Z |
| icsa-22-265-01 | Measuresoft ScadaPro Server | 2022-09-22T00:00:00.000000Z | 2022-09-22T00:00:00.000000Z |
| icsma-22-263-01 | Medtronic NGP 600 Series Insulin Pumps | 2022-09-20T00:00:00.000000Z | 2022-09-20T00:00:00.000000Z |
| icsa-22-263-04 | Host Engineering Communications Module | 2022-09-20T00:00:00.000000Z | 2022-09-20T00:00:00.000000Z |
| icsa-22-263-02 | Hitachi Energy AFF660/665 Series | 2022-09-20T00:00:00.000000Z | 2022-09-20T00:00:00.000000Z |
| icsa-22-263-01 | Hitachi Energy PROMOD IV | 2022-09-20T00:00:00.000000Z | 2022-09-20T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-webex-meetings-xss-MX56prER | Cisco Webex Meetings API Cross-Site Scripting Vulnerability | 2020-11-18T16:00:00+00:00 | 2020-11-18T16:00:00+00:00 |
| cisco-sa-ucs-api-rce-uxwpedhd | Cisco Integrated Management Controller Multiple Remote Code Execution Vulnerabilities | 2020-11-18T16:00:00+00:00 | 2020-11-18T16:00:00+00:00 |
| cisco-sa-ucs-api-rce-UXwpeDHd | Cisco Integrated Management Controller Multiple Remote Code Execution Vulnerabilities | 2020-11-18T16:00:00+00:00 | 2020-11-18T16:00:00+00:00 |
| cisco-sa-tp-uathracc-jwnesufm | Cisco Telepresence CE Software and RoomOS Software Unauthorized Token Generation Vulnerability | 2020-11-18T16:00:00+00:00 | 2020-11-18T16:00:00+00:00 |
| cisco-sa-tp-uathracc-jWNESUfM | Cisco Telepresence CE Software and RoomOS Software Unauthorized Token Generation Vulnerability | 2020-11-18T16:00:00+00:00 | 2020-11-18T16:00:00+00:00 |
| cisco-sa-fnd-xss-nzopcgec | Cisco IoT Field Network Director Cross-Site Scripting Vulnerabilities | 2020-11-18T16:00:00+00:00 | 2020-11-18T16:00:00+00:00 |
| cisco-sa-fnd-upwd-dcrpuq78 | Cisco IoT Field Network Director Improper Domain Access Control Vulnerability | 2020-11-18T16:00:00+00:00 | 2020-11-18T16:00:00+00:00 |
| cisco-sa-fnd-ssi-v2mywx9y | Cisco IoT Field Network Director Information Disclosure Vulnerability | 2020-11-18T16:00:00+00:00 | 2020-11-18T16:00:00+00:00 |
| cisco-sa-fnd-sql-zekbnl2h | Cisco IoT Field Network REST API Insufficient Input Validation Vulnerability | 2020-11-18T16:00:00+00:00 | 2020-11-18T16:00:00+00:00 |
| cisco-sa-fnd-pwh-yca6m7p | Cisco IoT Field Network Director Unprotected Storage of Credentials Vulnerability | 2020-11-18T16:00:00+00:00 | 2020-11-18T16:00:00+00:00 |
| cisco-sa-fnd-ovw-shzoe3pd | Cisco IoT Field Network Director File Overwrite Vulnerability | 2020-11-18T16:00:00+00:00 | 2020-11-18T16:00:00+00:00 |
| cisco-sa-fnd-lv-he4rntet | Cisco IoT Field Network Director Improper Access Control Vulnerability | 2020-11-18T16:00:00+00:00 | 2020-11-18T16:00:00+00:00 |
| cisco-sa-fnd-bck-ghkpnz5f | Cisco IoT Field Network Director Unauthenticated REST API Vulnerability | 2020-11-18T16:00:00+00:00 | 2020-11-18T16:00:00+00:00 |
| cisco-sa-fnd-auth-veypbmmr | Cisco IoT Field Network Director SOAP API Authorization Bypass Vulnerability | 2020-11-18T16:00:00+00:00 | 2020-11-18T16:00:00+00:00 |
| cisco-sa-fnd-apia-xzntfs2v | Cisco IoT Field Network Director Missing API Authentication Vulnerability | 2020-11-18T16:00:00+00:00 | 2020-11-18T16:00:00+00:00 |
| cisco-sa-dna-cmd-injection-rrayzowc | Cisco DNA Spaces Connector Command Injection Vulnerability | 2020-11-18T16:00:00+00:00 | 2020-11-18T16:00:00+00:00 |
| cisco-sa-dna-cmd-injection-rrAYzOwc | Cisco DNA Spaces Connector Command Injection Vulnerability | 2020-11-18T16:00:00+00:00 | 2020-11-18T16:00:00+00:00 |
| cisco-sa-FND-XSS-NzOPCGEc | Cisco IoT Field Network Director Cross-Site Scripting Vulnerabilities | 2020-11-18T16:00:00+00:00 | 2020-11-18T16:00:00+00:00 |
| cisco-sa-FND-UPWD-dCRPuQ78 | Cisco IoT Field Network Director Improper Domain Access Control Vulnerability | 2020-11-18T16:00:00+00:00 | 2020-11-18T16:00:00+00:00 |
| cisco-sa-FND-SSI-V2myWX9y | Cisco IoT Field Network Director Information Disclosure Vulnerability | 2020-11-18T16:00:00+00:00 | 2020-11-18T16:00:00+00:00 |
| cisco-sa-FND-SQL-zEkBnL2h | Cisco IoT Field Network REST API Insufficient Input Validation Vulnerability | 2020-11-18T16:00:00+00:00 | 2020-11-18T16:00:00+00:00 |
| cisco-sa-FND-PWH-yCA6M7p | Cisco IoT Field Network Director Unprotected Storage of Credentials Vulnerability | 2020-11-18T16:00:00+00:00 | 2020-11-18T16:00:00+00:00 |
| cisco-sa-FND-OVW-SHzOE3Pd | Cisco IoT Field Network Director File Overwrite Vulnerability | 2020-11-18T16:00:00+00:00 | 2020-11-18T16:00:00+00:00 |
| cisco-sa-FND-LV-hE4Rntet | Cisco IoT Field Network Director Improper Access Control Vulnerability | 2020-11-18T16:00:00+00:00 | 2020-11-18T16:00:00+00:00 |
| cisco-sa-FND-BCK-GHkPNZ5F | Cisco IoT Field Network Director Unauthenticated REST API Vulnerability | 2020-11-18T16:00:00+00:00 | 2020-11-18T16:00:00+00:00 |
| cisco-sa-FND-AUTH-vEypBmmR | Cisco IoT Field Network Director SOAP API Authorization Bypass Vulnerability | 2020-11-18T16:00:00+00:00 | 2020-11-18T16:00:00+00:00 |
| cisco-sa-FND-APIA-xZntFS2V | Cisco IoT Field Network Director Missing API Authentication Vulnerability | 2020-11-18T16:00:00+00:00 | 2020-11-18T16:00:00+00:00 |
| cisco-sa-csm-rce-8gjuz9fw | Cisco Security Manager Static Credential Vulnerability | 2020-11-16T23:00:00+00:00 | 2020-11-16T23:00:00+00:00 |
| cisco-sa-csm-rce-8gjUz9fW | Cisco Security Manager Static Credential Vulnerability | 2020-11-16T23:00:00+00:00 | 2020-11-16T23:00:00+00:00 |
| cisco-sa-vmanx3-vrzboqqd | Cisco SD-WAN vManage Software XML External Entity Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-09T21:12:21+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2020-21528 | A Segmentation Fault issue discovered in in ieee_segment function in outieee.c in nasm 2.14.03 and 2.15 allows remote attackers to cause a denial of service via crafted assembly file. | 2023-08-01T00:00:00.000Z | 2025-09-04T05:21:51.000Z |
| msrc_cve-2022-36113 | Extracting malicious crates can corrupt arbitrary files | 2022-09-02T00:00:00.000Z | 2025-09-04T05:16:16.000Z |
| msrc_cve-2019-14192 | An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy when parsing a UDP packet due to a net_process_received_packet integer underflow during an nc_input_packet call. | 2019-07-02T00:00:00.000Z | 2025-09-04T05:15:40.000Z |
| msrc_cve-2025-38376 | usb: chipidea: udc: disconnect/reconnect from host when do suspend/resume | 2025-07-02T00:00:00.000Z | 2025-09-04T05:14:38.000Z |
| msrc_cve-2021-38191 | An issue was discovered in the tokio crate before 1.8.1 for Rust. Upon a JoinHandle::abort, a Task may be dropped in the wrong thread. | 2021-08-02T00:00:00.000Z | 2025-09-04T05:12:49.000Z |
| msrc_cve-2025-30360 | webpack-dev-server users' source code may be stolen when they access a malicious web site with non-Chromium based browser | 2025-06-02T00:00:00.000Z | 2025-09-04T05:10:20.000Z |
| msrc_cve-2023-3600 | During the worker lifecycle, a use-after-free condition could have occured, which could have led to a potentially exploitable crash. This vulnerability affects Firefox < 115.0.2, Firefox ESR < 115.0.2, and Thunderbird < 115.0.1. | 2023-07-01T07:00:00.000Z | 2025-09-04T05:09:41.000Z |
| msrc_cve-2021-38578 | Existing CommBuffer checks in SmmEntryPoint will not catch underflow when computing BufferSize. | 2022-03-02T00:00:00.000Z | 2025-09-04T05:09:29.000Z |
| msrc_cve-2023-29405 | Improper sanitization of LDFLAGS with embedded spaces in go command with cgo in cmd/go | 2023-06-01T07:00:00.000Z | 2025-09-04T05:08:03.000Z |
| msrc_cve-2020-36478 | An issue was discovered in Mbed TLS before 2.25.0 (and before 2.16.9 LTS and before 2.7.18 LTS). A NULL algorithm parameters entry looks identical to an array of REAL (size zero) and thus the certificate is considered valid. However, if the parameters do not match in any way, then the certificate should be considered invalid. | 2021-08-02T00:00:00.000Z | 2025-09-04T05:05:02.000Z |
| msrc_cve-2024-57257 | A stack consumption issue in sqfs_size in Das U-Boot before 2025.01-rc1 occurs via a crafted squashfs filesystem with deep symlink nesting. | 2025-02-02T00:00:00.000Z | 2025-09-04T04:59:51.000Z |
| msrc_cve-2024-25260 | elfutils v0.189 was discovered to contain a NULL pointer dereference via the handle_verdef() function at readelf.c. | 2024-02-02T08:00:00.000Z | 2025-09-04T04:57:15.000Z |
| msrc_cve-2023-49292 | Possible private key restoration in go package github.com/ecies/go | 2023-12-01T08:00:00.000Z | 2025-09-04T04:54:22.000Z |
| msrc_cve-2025-38404 | usb: typec: displayport: Fix potential deadlock | 2025-07-02T00:00:00.000Z | 2025-09-04T04:49:40.000Z |
| msrc_cve-2025-27809 | Mbed TLS before 2.28.10 and 3.x before 3.6.3, on the client side, accepts servers that have trusted certificates for arbitrary hostnames unless the TLS client application calls mbedtls_ssl_set_hostname. | 2025-03-02T00:00:00.000Z | 2025-09-04T04:49:10.000Z |
| msrc_cve-2025-38565 | perf/core: Exit early on perf_mmap() fail | 2025-08-02T00:00:00.000Z | 2025-09-04T04:47:59.000Z |
| msrc_cve-2025-30359 | webpack-dev-server users' source code may be stolen when they access a malicious web site | 2025-06-02T00:00:00.000Z | 2025-09-04T04:45:07.000Z |
| msrc_cve-2025-38560 | x86/sev: Evict cache lines during SNP memory validation | 2025-08-02T00:00:00.000Z | 2025-09-04T04:44:06.000Z |
| msrc_cve-2019-14194 | An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with a failed length check at nfs_read_reply when calling store_block in the NFSv2 case. | 2019-07-02T00:00:00.000Z | 2025-09-04T04:41:53.000Z |
| msrc_cve-2025-38614 | eventpoll: Fix semi-unbounded recursion | 2025-08-02T00:00:00.000Z | 2025-09-04T04:39:23.000Z |
| msrc_cve-2025-38583 | clk: xilinx: vcu: unregister pll_post only if registered correctly | 2025-08-02T00:00:00.000Z | 2025-09-04T04:35:56.000Z |
| msrc_cve-2023-37203 | Insufficient validation in the Drag and Drop API in conjunction with social engineering, may have allowed an attacker to trick end-users into creating a shortcut to local system files. This could have been leveraged to execute arbitrary code. This vulnerability affects Firefox < 115. | 2023-07-01T07:00:00.000Z | 2025-09-04T04:35:56.000Z |
| msrc_cve-2019-14201 | An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_lookup_reply. | 2019-07-02T00:00:00.000Z | 2025-09-04T04:35:28.000Z |
| msrc_cve-2022-36114 | Extracting malicious crates can fill the file system | 2022-09-02T00:00:00.000Z | 2025-09-04T04:34:20.000Z |
| msrc_cve-2025-38572 | ipv6: reject malicious packets in ipv6_gso_segment() | 2025-08-02T00:00:00.000Z | 2025-09-04T04:31:59.000Z |
| msrc_cve-2019-14199 | An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy when parsing a UDP packet due to a net_process_received_packet integer underflow during an *udp_packet_handler call. | 2019-07-02T00:00:00.000Z | 2025-09-04T04:30:22.000Z |
| msrc_cve-2010-4756 | The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632. | 2011-03-02T00:00:00.000Z | 2025-09-04T04:29:41.000Z |
| msrc_cve-2024-57258 | Integer overflows in memory allocation in Das U-Boot before 2025.01-rc1 occur for a crafted squashfs filesystem via sbrk, via request2size, or because ptrdiff_t is mishandled on x86_64. | 2025-02-02T00:00:00.000Z | 2025-09-04T04:25:09.000Z |
| msrc_cve-2025-38578 | f2fs: fix to avoid UAF in f2fs_sync_inode_meta() | 2025-08-02T00:00:00.000Z | 2025-09-04T04:25:05.000Z |
| msrc_cve-2024-50280 | dm cache: fix flushing uninitialized delayed_work on cache_ctr error | 2024-11-02T00:00:00.000Z | 2025-09-04T04:24:51.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:14054-1 | oqs-provider-0.6.1-1.1 on GA media | 2024-06-18T00:00:00Z | 2024-06-18T00:00:00Z |
| opensuse-su-2024:14053-1 | rclone-1.67.0-1.1 on GA media | 2024-06-17T00:00:00Z | 2024-06-17T00:00:00Z |
| opensuse-su-2024:14052-1 | pgadmin4-8.8-1.1 on GA media | 2024-06-17T00:00:00Z | 2024-06-17T00:00:00Z |
| opensuse-su-2024:14051-1 | keylime-config-7.11.0-1.1 on GA media | 2024-06-17T00:00:00Z | 2024-06-17T00:00:00Z |
| opensuse-su-2024:14050-1 | forgejo-7.0.4-1.1 on GA media | 2024-06-17T00:00:00Z | 2024-06-17T00:00:00Z |
| opensuse-su-2024:14049-1 | MozillaThunderbird-115.12.0-1.1 on GA media | 2024-06-17T00:00:00Z | 2024-06-17T00:00:00Z |
| opensuse-su-2024:14048-1 | teleport-15.4.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14047-1 | python310-eventlet-0.36.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14046-1 | libntfs-3g-devel-2022.10.3-4.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14045-1 | booth-1.2+git0.322fea0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14044-1 | MozillaFirefox-127.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14043-1 | python310-scikit-learn-1.5.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14042-1 | python310-Werkzeug-3.0.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14041-1 | cups-2.4.8-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14040-1 | php-composer2-2.7.7-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14039-1 | liboqs-devel-0.10.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14038-1 | frr-8.4-12.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14037-1 | python310-w3lib-2.2.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14036-1 | python310-social-auth-app-django-5.4.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14035-1 | python310-Authlib-1.3.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14034-1 | nano-8.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14033-1 | php8-8.3.8-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14032-1 | okteto-2.28.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14031-1 | dnsmasq-2.90-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14030-1 | trivy-0.52.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14029-1 | python310-setuptools-70.0.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14028-1 | python310-openpyxl-3.1.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14027-1 | WPEWebDriver-2.44.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14026-1 | nvidia-open-driver-G06-signed-default-devel-550.90.07-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14025-1 | corepack21-21.7.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-grafana-2023-22462 | Stored XSS in Grafana Text plugin | 2024-03-06T10:53:25.170Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2023-1410 | Stored XSS in Graphite FunctionDescription tooltip | 2024-03-06T10:53:49.160Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-39328 | Grafana vulnerable to race condition allowing privilege escalation | 2024-03-06T10:54:29.505Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-39324 | Grafana vulnerable to spoofing originalUrl of snapshots | 2024-03-06T10:54:38.067Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-39307 | Grafana subject to Exposure of Sensitive Information resulting in User enumeration via forget password | 2024-03-06T10:54:48.105Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-39306 | Grafana contains Improper Input Validation | 2024-03-06T10:54:59.981Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-39229 | Grafana users with email as a username can block other users from signing in | 2024-03-06T10:55:10.706Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-36062 | Grafana folders admin only permission privilege escalation | 2024-03-06T10:55:30.771Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-35957 | Authentication Bypass in Grafana via auth proxy allowing escalation from admin to server admin | 2024-03-06T10:55:38.882Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-31130 | Grafana data source and plugin proxy endpoints leaking authentication tokens to some destination plugins | 2024-03-06T10:56:13.486Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-31123 | Grafana plugin signature bypass vulnerability | 2024-03-06T10:56:23.793Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-31107 | Grafana account takeover via OAuth vulnerability | 2024-03-06T10:56:35.472Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-31097 | Stored XSS in Grafana's Unified Alerting | 2024-03-06T10:56:47.100Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-29170 | Grafana Enterprise datasource network restrictions bypass via HTTP redirects | 2024-03-06T10:56:56.871Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-24812 | FGAC API Key privilege escalation in Grafana | 2024-03-06T10:57:31.076Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-23552 | Grafana stored XSS in FileUploader component | 2024-03-06T10:57:42.704Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-23498 | When query caching is enabled in Grafana users can query another users session | 2024-03-06T10:57:55.176Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-21713 | Exposure of Sensitive Information in Grafana | 2024-03-06T10:58:05.785Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-21703 | Cross Site Request Forgery in Grafana | 2024-03-06T10:58:16.171Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-21702 | Cross site scripting in Grafana proxy | 2024-03-06T10:58:26.283Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-21673 | OAuth Identity Token exposure in Grafana | 2024-03-06T10:58:36.383Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2021-43815 | Grafana directory traversal for `.cvs` files | 2024-03-06T10:58:46.373Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2021-43813 | Directory Traversal in Grafana | 2024-03-06T10:58:57.080Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2021-41244 | Cross organization admin control in Grafana | 2024-03-06T10:59:15.365Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2021-41174 | XSS vulnerability allowing arbitrary JavaScript execution | 2024-03-06T10:59:24.698Z | 2025-05-20T10:02:07.006Z |
| bit-gradle-2025-27148 | Gradle vulnerable to local privilege escalation through system temporary directory | 2025-02-27T07:08:45.147Z | 2025-05-20T10:02:07.006Z |
| bit-gradle-2023-44387 | Gradle has incorrect permission assignment for symlinked files used in copy or archiving operations | 2024-03-06T10:52:33.070Z | 2025-05-20T10:02:07.006Z |
| bit-gradle-2023-42445 | Possible local file exfiltration by XML External entity injection | 2024-03-06T10:52:45.671Z | 2025-05-20T10:02:07.006Z |
| bit-gradle-2023-35947 | Path traversal vulnerabilities in handling of Tar archives in Gradle | 2024-03-06T10:52:56.608Z | 2025-05-20T10:02:07.006Z |
| bit-gradle-2023-35946 | Dependency cache path traversal in Gradle | 2024-03-06T10:53:05.804Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|---|---|
| var-199710-0008 | Some classic Cisco IOS devices have a vulnerability in the PPP CHAP authentication to est… | 2024-05-12T03:47:51.020000Z |
| var-202312-2147 | TOTOlink EX1800T V9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command … | 2024-05-12T03:46:41.327000Z |
| var-199801-0019 | AAA authentication on Cisco systems allows attackers to execute commands without authoriz… | 2024-05-12T03:46:40.565000Z |
| var-202312-1108 | TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command … | 2024-05-12T03:45:39.619000Z |
| var-202312-0941 | TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command … | 2024-05-12T03:43:42.576000Z |
| var-202312-1976 | TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command … | 2024-05-12T03:42:05.752000Z |
| var-202001-1829 | In Das U-Boot through 2020.01, a double free has been found in the cmd/gpt.c do_rename_gp… | 2024-05-12T03:34:57.889000Z |
| var-202207-0587 | The llhttp parser <v14.20.1, <v16.17.1 and <v18.9.1 in the http module in Node.js does no… | 2024-05-12T03:18:55.457000Z |
| var-202210-0037 | A weak randomness in WebCrypto keygen vulnerability exists in Node.js 18 due to a change … | 2024-05-12T03:18:39.471000Z |
| var-201702-0880 | An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari … | 2024-05-12T03:12:47.114000Z |
| var-200110-0206 | The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.… | 2024-05-12T02:40:25.656000Z |
| var-202110-1429 | This issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.0… | 2024-05-12T02:08:40.085000Z |
| var-202110-1670 | The in-memory certificate cache in strongSwan before 5.9.4 has a remote integer overflow … | 2024-05-12T01:52:15.827000Z |
| var-202207-0378 | A cryptographic vulnerability exists on Node.js on linux in versions of 18.x prior to 18.… | 2024-05-12T00:07:29.801000Z |
| var-202308-3576 | An issue in TPLink Smart Bulb Tapo series L530 before 1.2.4, L510E before 1.1.0, L630 bef… | 2024-05-11T11:37:06.668000Z |
| var-202309-1900 | An issue in TPLink Smart Bulb Tapo series L530 before 1.2.4, L510E before 1.1.0, L630 bef… | 2024-05-11T11:32:15.250000Z |
| var-202109-1948 | NETGEAR R7800 net-cgi Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulne… | 2024-05-11T11:31:57.002000Z |
| var-202308-3910 | An issue in TPLink Smart Bulb Tapo series L530 1.1.9, L510E 1.0.8, L630 1.0.3, P100 1.4.9… | 2024-05-11T11:24:35.322000Z |
| var-202305-0219 | D-Link DAP-1360 webproc WEB_DisplayPage Directory Traversal Information Disclosure Vulner… | 2024-05-11T11:22:28.071000Z |
| var-202308-4279 | An issue in TPLink Smart Bulb Tapo series L530 before 1.2.4, L510E before 1.1.0, L630 bef… | 2024-05-11T11:18:26.496000Z |
| var-199712-0012 | Buffer overflow in Cisco 7xx routers through the telnet service. Cisco Systems Cisco IOS … | 2024-05-04T23:03:04.194000Z |
| var-202101-0228 | SKYWORTH GN542VF Hardware Version 2.0 and Software Version 2.0.0.16 does not set the Secu… | 2024-05-04T23:00:41.949000Z |
| var-199808-0008 | Attackers can crash a Cisco IOS router or device, provided they can get to an interactive… | 2024-05-04T22:57:04.588000Z |
| var-199212-0004 | Cisco IOS 9.1 and earlier does not properly handle extended IP access lists when the IP r… | 2024-05-04T22:54:20.278000Z |
| var-199212-0003 | Vulnerability in Cisco routers versions 8.2 through 9.1 allows remote attackers to bypass… | 2024-05-04T22:54:20.249000Z |
| var-202305-2804 | Fatek Automation FvDesigner FPJ File Parsing Uninitialized Pointer Remote Code Execution … | 2024-05-04T22:48:00.732000Z |
| var-199808-0006 | Cisco PIX firewall and CBAC IP fragmentation attack results in a denial of service. Cisco… | 2024-05-04T22:47:51.445000Z |
| var-202309-0359 | D-Link DIR-3040 prog.cgi SetWanSettings Stack-Based Buffer Overflow Remote Code Execution… | 2024-05-04T22:41:53.127000Z |
| var-202309-0344 | D-Link DIR-3040 prog.cgi SetUsersSettings Stack-Based Buffer Overflow Remote Code Executi… | 2024-05-04T22:41:53.182000Z |
| var-202309-0335 | D-Link DIR-3040 prog.cgi SetWLanRadioSecurity Stack-Based Buffer Overflow Remote Code Exe… | 2024-05-04T22:41:53.252000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2013-000043 | EC-CUBE fails to restrict access permissions | 2013-05-23T15:42+09:00 | 2013-06-03T16:13+09:00 |
| jvndb-2013-000052 | HP ProCurve 1700 series switches vulnerable to cross-site request forgery | 2013-06-03T14:28+09:00 | 2013-06-03T14:28+09:00 |
| jvndb-2013-000051 | Adobe Reader X vulnerable to sandbox bypass | 2013-05-31T15:44+09:00 | 2013-05-31T15:44+09:00 |
| jvndb-2013-000050 | Safari information disclosure vulnerability | 2013-05-31T15:44+09:00 | 2013-05-31T15:44+09:00 |
| jvndb-2013-000047 | Content Provider in MovatwiTouch fails to restrict access permissions | 2013-05-29T15:32+09:00 | 2013-05-29T15:32+09:00 |
| jvndb-2013-000046 | Sleipnir Mobile for Android vulnerable to address bar spoofing | 2013-05-29T15:19+09:00 | 2013-05-29T15:19+09:00 |
| jvndb-2013-000045 | Yahoo! Browser vulnerable to address bar spoofing | 2013-05-27T15:04+09:00 | 2013-05-27T15:04+09:00 |
| jvndb-2013-002796 | Arbitrary Commands Execution Vulnerability in JP1/Integrated Management - TELstaff Alarm View | 2013-05-24T14:37+09:00 | 2013-05-24T14:37+09:00 |
| jvndb-2013-000044 | EC-CUBE vulnerable to information disclosure as a result of improper input checking | 2013-05-23T15:46+09:00 | 2013-05-23T15:46+09:00 |
| jvndb-2013-000042 | EC-CUBE vulnerable to session fixation | 2013-05-23T14:15+09:00 | 2013-05-23T14:15+09:00 |
| jvndb-2013-000041 | EC-CUBE vulnerable to cross-site scripting | 2013-05-23T14:11+09:00 | 2013-05-23T14:11+09:00 |
| jvndb-2013-002770 | Cross-site Scripting Vulnerability in JP1/Automatic Operation | 2013-05-21T15:45+09:00 | 2013-05-21T15:45+09:00 |
| jvndb-2013-000040 | Cross-site scripting vulnerability in the web2py social bookmarking widget | 2013-05-20T15:16+09:00 | 2013-05-20T15:16+09:00 |
| jvndb-2013-000035 | Online Service Gate vulnerable in Office 365 password management | 2013-05-08T15:08+09:00 | 2013-05-08T15:08+09:00 |
| jvndb-2013-000037 | Yahoo! Browser vulnerable to address bar spoofing | 2013-04-26T15:50+09:00 | 2013-04-26T15:50+09:00 |
| jvndb-2013-000036 | jigbrowser+ for Android vulnerable to address bar spoofing | 2013-04-26T15:05+09:00 | 2013-04-26T15:05+09:00 |
| jvndb-2013-002427 | Buffer Overflow Vulnerability in Hitachi IT Operations Director | 2013-04-24T09:55+09:00 | 2013-04-24T09:55+09:00 |
| jvndb-2013-000033 | Sleipnir Mobile for Android loads arbitrary Extension API | 2013-04-12T12:41+09:00 | 2013-04-12T12:41+09:00 |
| jvndb-2013-000032 | Sleipnir for Windows vulnerable to address bar spoofing | 2013-04-11T14:14+09:00 | 2013-04-11T14:14+09:00 |
| jvndb-2011-000033 | Java Web Start may insecurely load policy files | 2011-06-10T16:22+09:00 | 2013-03-29T14:50+09:00 |
| jvndb-2013-000025 | OpenWnn for Android vulnerable to information disclosure | 2013-03-29T13:58+09:00 | 2013-03-29T13:58+09:00 |
| jvndb-2013-000030 | Lotus Domino vulnerable to denial-of-service (DoS) | 2013-03-28T12:32+09:00 | 2013-03-28T12:32+09:00 |
| jvndb-2011-000035 | Java Web Start may insecurely load dynamic libraries | 2011-06-10T16:23+09:00 | 2013-03-26T15:14+09:00 |
| jvndb-2013-000028 | OpenWnn/Flick support vulnerable to information disclosure | 2013-03-26T14:55+09:00 | 2013-03-26T14:55+09:00 |
| jvndb-2013-000027 | COBIME vulnerable to information disclosure | 2013-03-26T14:55+09:00 | 2013-03-26T14:55+09:00 |
| jvndb-2013-000029 | Simeji vulnerable to information disclosure | 2013-03-26T14:51+09:00 | 2013-03-26T14:51+09:00 |
| jvndb-2011-000034 | Java Web Start may insecurely load settings files | 2011-06-10T16:23+09:00 | 2013-03-26T14:46+09:00 |
| jvndb-2013-000026 | ArtIME Japanese Input vulnerable to information disclosure | 2013-03-26T13:36+09:00 | 2013-03-26T13:36+09:00 |
| jvndb-2013-000017 | Multiple Cisco products vulnerable to denial-of-service (DoS) | 2013-03-07T14:13+09:00 | 2013-03-11T16:22+09:00 |
| jvndb-2013-000016 | Kingsoft Writer vulnerable to buffer overflow | 2013-03-01T14:47+09:00 | 2013-03-01T14:47+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:02125-1 | Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4) | 2025-06-26T09:03:57Z | 2025-06-26T09:03:57Z |
| suse-su-2025:02124-1 | Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP3) | 2025-06-26T09:03:48Z | 2025-06-26T09:03:48Z |
| suse-su-2025:02123-1 | Security update for MozillaFirefox | 2025-06-26T08:51:11Z | 2025-06-26T08:51:11Z |
| suse-su-2025:02122-1 | Security update for MozillaFirefox | 2025-06-26T08:45:47Z | 2025-06-26T08:45:47Z |
| suse-su-2025:02121-1 | Security update for helm | 2025-06-26T08:34:10Z | 2025-06-26T08:34:10Z |
| suse-su-2025:02120-1 | Security update for go1.24-openssl | 2025-06-26T08:22:45Z | 2025-06-26T08:22:45Z |
| suse-su-2025:02119-1 | Security update for clamav | 2025-06-26T08:21:39Z | 2025-06-26T08:21:39Z |
| suse-su-2025:02117-1 | Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6) | 2025-06-25T19:03:57Z | 2025-06-25T19:03:57Z |
| suse-su-2025:02116-1 | Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6) | 2025-06-25T18:03:43Z | 2025-06-25T18:03:43Z |
| suse-su-2025:02113-1 | Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP5) | 2025-06-25T16:33:31Z | 2025-06-25T16:33:31Z |
| suse-su-2025:02112-1 | Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP4) | 2025-06-25T16:03:54Z | 2025-06-25T16:03:54Z |
| suse-su-2025:02111-1 | Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP4) | 2025-06-25T16:03:46Z | 2025-06-25T16:03:46Z |
| suse-su-2025:02110-1 | Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4) | 2025-06-25T15:33:42Z | 2025-06-25T15:33:42Z |
| suse-su-2025:02108-1 | Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP5) | 2025-06-25T14:33:39Z | 2025-06-25T14:33:39Z |
| suse-su-2025:02107-1 | Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5) | 2025-06-25T14:03:50Z | 2025-06-25T14:03:50Z |
| suse-su-2025:02106-1 | Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5) | 2025-06-25T13:03:52Z | 2025-06-25T13:03:52Z |
| suse-su-2025:02105-1 | Security update for perl-File-Find-Rule | 2025-06-25T11:43:55Z | 2025-06-25T11:43:55Z |
| suse-su-2025:20452-1 | Security update for open-vm-tools | 2025-06-25T08:23:04Z | 2025-06-25T08:23:04Z |
| suse-su-2025:20446-1 | Security update for libsoup | 2025-06-25T08:16:32Z | 2025-06-25T08:16:32Z |
| suse-su-2025:02101-1 | Security update for the Linux Kernel (Live Patch 61 for SLE 12 SP5) | 2025-06-25T08:03:48Z | 2025-06-25T08:03:48Z |
| suse-su-2025:02100-1 | Security update for gimp | 2025-06-25T06:03:04Z | 2025-06-25T06:03:04Z |
| suse-su-2025:02099-1 | Security update for the Linux Kernel | 2025-06-25T06:02:39Z | 2025-06-25T06:02:39Z |
| suse-su-2025:02098-1 | Security update for the Linux Kernel (Live Patch 55 for SLE 15 SP3) | 2025-06-25T05:33:37Z | 2025-06-25T05:33:37Z |
| suse-su-2025:02097-1 | Security update for ignition | 2025-06-25T04:34:40Z | 2025-06-25T04:34:40Z |
| suse-su-2025:20449-1 | Security update for kernel-livepatch-MICRO-6-0_Update_4 | 2025-06-24T14:52:46Z | 2025-06-24T14:52:46Z |
| suse-su-2025:20438-1 | Security update for kernel-livepatch-MICRO-6-0_Update_4 | 2025-06-24T14:52:46Z | 2025-06-24T14:52:46Z |
| suse-su-2025:20437-1 | Security update for kernel-livepatch-MICRO-6-0_Update_3 | 2025-06-24T14:52:32Z | 2025-06-24T14:52:32Z |
| suse-su-2025:20448-1 | Security update for kernel-livepatch-MICRO-6-0_Update_2 | 2025-06-24T14:52:22Z | 2025-06-24T14:52:22Z |
| suse-su-2025:20436-1 | Security update for kernel-livepatch-MICRO-6-0_Update_2 | 2025-06-24T14:52:22Z | 2025-06-24T14:52:22Z |
| suse-su-2025:20435-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_3 | 2025-06-24T14:48:52Z | 2025-06-24T14:48:52Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-27574 | TOTOLINK A3300R setOpModeCfg函数栈缓冲区溢出漏洞 | 2025-10-31 | 2025-11-10 |
| cnvd-2025-27573 | TOTOLINK A3300R cstecgi.cgi文件缓冲区溢出漏洞 | 2025-10-31 | 2025-11-10 |
| cnvd-2025-27572 | TOTOLINK LR350 http_host参数堆栈缓冲区溢出漏洞 | 2025-11-05 | 2025-11-10 |
| cnvd-2025-27571 | TOTOLINK LR350 sub_426EF8函数堆栈缓冲区溢出漏洞 | 2025-11-05 | 2025-11-10 |
| cnvd-2025-27570 | TOTOLINK LR350 sub_425400函数堆栈缓冲区溢出漏洞 | 2025-11-05 | 2025-11-10 |
| cnvd-2025-27569 | TOTOLINK LR350 sub_42396C函数堆栈缓冲区溢出漏洞 | 2025-11-05 | 2025-11-10 |
| cnvd-2025-27568 | TOTOLINK LR350 sub_4232EC函数堆栈缓冲区溢出漏洞 | 2025-11-05 | 2025-11-10 |
| cnvd-2025-27567 | TOTOLINK LR350 sub_422880函数栈缓冲区溢出漏洞 | 2025-11-05 | 2025-11-10 |
| cnvd-2025-27566 | QNAP QTS和QuTS hero空指针取消引用漏洞(CNVD-2025-27566) | 2025-10-15 | 2025-11-10 |
| cnvd-2025-27565 | QNAP QTS和QuTS hero空指针取消引用漏洞(CNVD-2025-27565) | 2025-10-15 | 2025-11-10 |
| cnvd-2025-27564 | QNAP QTS和QuTS hero空指针取消引用漏洞(CNVD-2025-27564) | 2025-10-15 | 2025-11-10 |
| cnvd-2025-27563 | QNAP QTS和QuTS hero空指针取消引用漏洞(CNVD-2025-27563) | 2025-10-15 | 2025-11-10 |
| cnvd-2025-27562 | QNAP QTS和QuTS hero空指针取消引用漏洞(CNVD-2025-27562) | 2025-10-15 | 2025-11-10 |
| cnvd-2025-27561 | QNAP QTS和QuTS hero空指针取消引用漏洞(CNVD-2025-27561) | 2025-10-15 | 2025-11-10 |
| cnvd-2025-27560 | QNAP QTS和QuTS hero空指针取消引用漏洞(CNVD-2025-27560) | 2025-10-15 | 2025-11-10 |
| cnvd-2025-27559 | QNAP QTS和QuTS hero空指针取消引用漏洞(CNVD-2025-27559) | 2025-10-15 | 2025-11-10 |
| cnvd-2025-27558 | QNAP QTS和QuTS hero空指针取消引用漏洞(CNVD-2025-27558) | 2025-10-15 | 2025-11-10 |
| cnvd-2025-27557 | QNAP QTS和QuTS hero空指针取消引用漏洞 | 2025-10-15 | 2025-11-10 |
| cnvd-2025-27556 | Huawei HarmonyOS和EMUI包名验证绕过漏洞 | 2024-04-11 | 2025-11-10 |
| cnvd-2025-27555 | Huawei HarmonyOS和EMUI游离权限漏洞 | 2024-04-11 | 2025-11-10 |
| cnvd-2025-27554 | Huawei HarmonyOS权限控制漏洞 | 2024-05-22 | 2025-11-10 |
| cnvd-2025-27553 | Huawei HarmonyOS和EMUI破解漏洞 | 2024-05-22 | 2025-11-10 |
| cnvd-2025-27552 | Huawei HarmonyOS和EMUI boottime模块内存管理漏洞 | 2024-06-21 | 2025-11-10 |
| cnvd-2025-27551 | Huawei HarmonyOS和EMUI越界读取漏洞 | 2024-06-21 | 2025-11-10 |
| cnvd-2025-27550 | Huawei HarmonyOS和EMUI功能漏洞 | 2024-06-21 | 2025-11-10 |
| cnvd-2025-27549 | Huawei HarmonyOS和EMUI内存管理漏洞 | 2024-06-21 | 2025-11-10 |
| cnvd-2025-27548 | Huawei HarmonyOS和EMUI特权升级漏洞 | 2024-06-21 | 2025-11-10 |
| cnvd-2025-27547 | Huawei HarmonyOS和EMUI资源未关闭或释放漏洞 | 2024-09-10 | 2025-11-10 |
| cnvd-2025-27470 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4越界写入漏洞(CNVD-2025-27470) | 2025-11-05 | 2025-11-10 |
| cnvd-2025-27469 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4存在未明漏洞(CNVD-2025-27469) | 2025-11-05 | 2025-11-10 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2025-AVI-0088 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-01-31T00:00:00.000000 | 2025-01-31T00:00:00.000000 |
| CERTFR-2025-AVI-0087 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-01-31T00:00:00.000000 | 2025-01-31T00:00:00.000000 |
| CERTFR-2025-AVI-0086 | Multiples vulnérabilités dans les produits IBM | 2025-01-31T00:00:00.000000 | 2025-01-31T00:00:00.000000 |
| CERTFR-2025-AVI-0085 | Multiples vulnérabilités dans les produits VMware | 2025-01-31T00:00:00.000000 | 2025-01-31T00:00:00.000000 |
| CERTFR-2025-AVI-0084 | Vulnérabilité dans Microsoft Edge | 2025-01-31T00:00:00.000000 | 2025-01-31T00:00:00.000000 |
| CERTFR-2025-AVI-0083 | Vulnérabilité dans Apple GarageBand | 2025-01-31T00:00:00.000000 | 2025-01-31T00:00:00.000000 |
| CERTFR-2024-AVI-0601 | Multiples vulnérabilités dans les produits Mitel | 2024-07-18T00:00:00.000000 | 2025-01-31T00:00:00.000000 |
| certfr-2025-avi-0082 | Vulnérabilité dans Sonicwall NetExtender | 2025-01-30T00:00:00.000000 | 2025-01-30T00:00:00.000000 |
| certfr-2025-avi-0081 | Multiples vulnérabilités dans ISC BIND | 2025-01-30T00:00:00.000000 | 2025-01-30T00:00:00.000000 |
| CERTFR-2025-AVI-0082 | Vulnérabilité dans Sonicwall NetExtender | 2025-01-30T00:00:00.000000 | 2025-01-30T00:00:00.000000 |
| CERTFR-2025-AVI-0081 | Multiples vulnérabilités dans ISC BIND | 2025-01-30T00:00:00.000000 | 2025-01-30T00:00:00.000000 |
| certfr-2025-avi-0080 | Vulnérabilité dans les produits Moxa | 2025-01-29T00:00:00.000000 | 2025-01-29T00:00:00.000000 |
| certfr-2025-avi-0079 | Multiples vulnérabilités dans Google Chrome | 2025-01-29T00:00:00.000000 | 2025-01-29T00:00:00.000000 |
| certfr-2025-avi-0078 | Vulnérabilité dans VMware Avi Load Balancer | 2025-01-29T00:00:00.000000 | 2025-01-29T00:00:00.000000 |
| certfr-2025-avi-0077 | Multiples vulnérabilités dans HPE Aruba Networking Fabric Composer | 2025-01-29T00:00:00.000000 | 2025-01-29T00:00:00.000000 |
| CERTFR-2025-AVI-0080 | Vulnérabilité dans les produits Moxa | 2025-01-29T00:00:00.000000 | 2025-01-29T00:00:00.000000 |
| CERTFR-2025-AVI-0079 | Multiples vulnérabilités dans Google Chrome | 2025-01-29T00:00:00.000000 | 2025-01-29T00:00:00.000000 |
| CERTFR-2025-AVI-0078 | Vulnérabilité dans VMware Avi Load Balancer | 2025-01-29T00:00:00.000000 | 2025-01-29T00:00:00.000000 |
| CERTFR-2025-AVI-0077 | Multiples vulnérabilités dans HPE Aruba Networking Fabric Composer | 2025-01-29T00:00:00.000000 | 2025-01-29T00:00:00.000000 |
| certfr-2025-avi-0076 | Vulnérabilité dans NetApp ONTAP | 2025-01-28T00:00:00.000000 | 2025-01-28T00:00:00.000000 |
| certfr-2025-avi-0075 | Multiples vulnérabilités dans les produits Apple | 2025-01-28T00:00:00.000000 | 2025-01-28T00:00:00.000000 |
| certfr-2025-avi-0073 | Multiples vulnérabilités dans Microsoft Edge | 2025-01-27T00:00:00.000000 | 2025-01-28T00:00:00.000000 |
| certfr-2024-avi-0151 | Multiples vulnérabilités dans Joomla! | 2024-02-21T00:00:00.000000 | 2025-01-28T00:00:00.000000 |
| CERTFR-2025-AVI-0076 | Vulnérabilité dans NetApp ONTAP | 2025-01-28T00:00:00.000000 | 2025-01-28T00:00:00.000000 |
| CERTFR-2025-AVI-0075 | Multiples vulnérabilités dans les produits Apple | 2025-01-28T00:00:00.000000 | 2025-01-28T00:00:00.000000 |
| CERTFR-2025-AVI-0073 | Multiples vulnérabilités dans Microsoft Edge | 2025-01-27T00:00:00.000000 | 2025-01-28T00:00:00.000000 |
| CERTFR-2024-AVI-0151 | Multiples vulnérabilités dans Joomla! | 2024-02-21T00:00:00.000000 | 2025-01-28T00:00:00.000000 |
| certfr-2025-avi-0072 | Multiples vulnérabilités dans Juniper Secure Analytics | 2025-01-27T00:00:00.000000 | 2025-01-27T00:00:00.000000 |
| CERTFR-2025-AVI-0072 | Multiples vulnérabilités dans Juniper Secure Analytics | 2025-01-27T00:00:00.000000 | 2025-01-27T00:00:00.000000 |
| certfr-2025-avi-0071 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-01-24T00:00:00.000000 | 2025-01-24T00:00:00.000000 |