Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-67943 |
7.1 (3.1)
|
WordPress My auctions allegro plugin <= 3.6.32 - Cross… |
wphocus |
My auctions allegro |
2026-01-22T16:51:53.901Z | 2026-01-28T16:28:13.771Z |
| CVE-2026-1520 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
rethinkdb Secondary Index cross site scripting |
n/a |
rethinkdb |
2026-01-28T14:32:06.745Z | 2026-01-28T16:27:37.061Z |
| CVE-2025-67944 |
9.1 (3.1)
|
WordPress Nelio AB Testing plugin <= 8.1.8 - Arbitrary… |
Nelio Software |
Nelio AB Testing |
2026-01-22T16:51:54.109Z | 2026-01-28T16:22:15.851Z |
| CVE-2025-67945 |
9.3 (3.1)
|
WordPress MailerLite – WooCommerce integration plugin … |
MailerLite |
MailerLite – WooCommerce integration |
2026-01-22T16:51:54.311Z | 2026-01-28T16:18:50.045Z |
| CVE-2025-67946 |
8.1 (3.1)
|
WordPress AdForest theme <= 6.0.11 - Local File Inclus… |
scriptsbundle |
AdForest |
2026-01-22T16:51:54.507Z | 2026-01-28T16:12:23.731Z |
| CVE-2026-1521 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Open5GS SGWC s5c-handler.c denial of service |
n/a |
Open5GS |
2026-01-28T14:32:10.348Z | 2026-01-28T16:12:00.256Z |
| CVE-2026-0702 |
7.5 (3.1)
|
VidShop – Shoppable Videos for WooCommerce <= 1.1.4 - … |
wpcreatix |
VidShop – Shoppable Videos for WooCommerce |
2026-01-28T08:26:55.318Z | 2026-01-28T16:10:33.513Z |
| CVE-2026-1536 |
5.8 (3.1)
|
Libsoup: libsoup: http header injection or response sp… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-01-28T15:15:46.708Z | 2026-01-28T16:10:16.291Z |
| CVE-2026-1053 |
4.4 (3.1)
|
Ivory Search <= 5.5.13 - Authenticated (Administrator+… |
vinod-dalvi |
Ivory Search – WordPress Search Plugin |
2026-01-28T08:26:55.731Z | 2026-01-28T16:09:19.903Z |
| CVE-2026-1539 |
5.8 (3.1)
|
Libsoup: libsoup: credential leakage via http redirects |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-01-28T15:15:48.725Z | 2026-01-28T16:09:13.485Z |
| CVE-2025-63388 |
9.1 (3.1)
|
A Cross-Origin Resource Sharing (CORS) misconfigu… |
n/a |
n/a |
2025-12-18T00:00:00.000Z | 2026-01-28T16:07:53.494Z |
| CVE-2025-68910 |
9.9 (3.1)
|
WordPress Blogzee theme <= 1.0.5 - Arbitrary File Uplo… |
blazethemes |
Blogzee |
2026-01-22T16:52:14.569Z | 2026-01-28T16:07:28.044Z |
| CVE-2026-1400 |
7.2 (3.1)
|
AI Engine <= 3.3.2 - Authenticated (Editor+) Arbitrary… |
tigroumeow |
AI Engine – The Chatbot and AI Framework for WordPress |
2026-01-28T08:26:56.110Z | 2026-01-28T16:06:59.438Z |
| CVE-2025-12636 |
6.5 (3.1)
7.1 (4.0)
|
Ubia Ubox |
Ubia |
Ubox Android |
2025-11-06T22:15:01.130Z | 2026-01-28T16:06:41.083Z |
| CVE-2026-1381 |
4.4 (3.1)
|
Order Minimum/Maximum Amount Limits for WooCommerce <=… |
wpcodefactory |
Order Minimum/Maximum Amount Limits for WooCommerce |
2026-01-28T08:26:54.692Z | 2026-01-28T15:57:25.795Z |
| CVE-2025-15511 |
5.3 (3.1)
|
Rupantorpay <= 2.0.0 - Missing Authorization to Unauth… |
rupantorpay |
Rupantorpay |
2026-01-28T11:23:38.266Z | 2026-01-28T15:56:42.370Z |
| CVE-2026-1280 |
7.5 (3.1)
|
Frontend File Manager Plugin <= 23.5 - Missing Authori… |
nmedia |
Frontend File Manager Plugin |
2026-01-28T11:23:41.307Z | 2026-01-28T15:56:06.302Z |
| CVE-2025-14616 |
4.3 (3.1)
|
Recooty <= 1.0.6 - Cross-Site Request Forgery to Setti… |
recooty |
Recooty – Job Widget (Old Dashboard) |
2026-01-28T11:23:41.712Z | 2026-01-28T15:55:14.348Z |
| CVE-2026-24883 |
3.7 (3.1)
|
In GnuPG before 2.5.17, a long signature packet l… |
GnuPG |
GnuPG |
2026-01-27T18:43:18.883Z | 2026-01-28T15:52:11.076Z |
| CVE-2026-1399 |
4.4 (3.1)
|
WP Google Ad Manager Plugin <= 1.1.0 - Authenticated (… |
miles99 |
WP Google Ad Manager Plugin |
2026-01-28T11:23:42.082Z | 2026-01-28T15:51:55.729Z |
| CVE-2026-1398 |
4.3 (3.1)
|
Change WP URL <= 1.0 - Cross-Site Request Forgery to S… |
chrisnowak |
Change WP URL |
2026-01-28T11:23:42.461Z | 2026-01-28T15:50:37.635Z |
| CVE-2025-68073 |
6.5 (3.1)
|
WordPress GDPR CCPA Compliance Support plugin <= 2.7.4… |
Ninja Team |
GDPR CCPA Compliance Support |
2026-01-22T16:52:07.197Z | 2026-01-28T15:49:44.753Z |
| CVE-2025-26386 |
7.1 (4.0)
|
Stack-based Buffer Overflow in Johnson Controls iSTAR … |
Johnson Controls |
iSTAR Configuration Utility (ICU) |
2026-01-28T11:24:46.317Z | 2026-01-28T15:49:08.575Z |
| CVE-2026-0483 |
6.9 (4.0)
|
Stored Cross-Site Scripting (XSS) vulnerability in Liv… |
LiveHelperChat |
LiveHelperChat |
2026-01-28T11:43:42.484Z | 2026-01-28T15:47:13.081Z |
| CVE-2025-59891 |
8.5 (4.0)
|
Cross-Site request forgery (CSRF) vulnerability in Syn… |
Flexense |
Sync Breeze Enterprise Server |
2026-01-28T11:52:15.635Z | 2026-01-28T15:46:23.117Z |
| CVE-2026-24882 |
8.4 (3.1)
|
In GnuPG before 2.5.17, a stack-based buffer over… |
GnuPG |
GnuPG |
2026-01-27T18:40:18.166Z | 2026-01-28T15:45:56.231Z |
| CVE-2025-59892 |
8.5 (4.0)
|
Cross-Site request forgery (CSRF) vulnerability in Syn… |
Flexense |
Sync Breeze Enterprise Server |
2026-01-28T11:52:35.782Z | 2026-01-28T15:45:40.967Z |
| CVE-2024-12397 |
7.4 (3.1)
|
Io.quarkus.http/quarkus-http-core: quarkus http cookie… |
|
|
2024-12-12T09:05:28.451Z | 2026-01-28T15:45:38.773Z |
| CVE-2020-36984 |
8.5 (4.0)
7.8 (3.1)
|
EPSON 1.124 - 'seksmdb.exe' Unquoted Service Path |
Epson |
EPSON |
2026-01-28T12:28:58.749Z | 2026-01-28T15:45:05.554Z |
| CVE-2025-59893 |
8.5 (4.0)
|
Cross-Site request forgery (CSRF) vulnerability in Syn… |
Flexense |
Sync Breeze Enterprise Server |
2026-01-28T11:52:51.985Z | 2026-01-28T15:43:40.929Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-41375 |
9.3 (4.0)
|
SQL Injection in Limesurvey |
LimeSurvey |
LimeSurvey |
2025-08-01T12:29:48.916Z | 2025-09-11T08:51:03.073Z |
| CVE-2025-41376 |
5.1 (4.0)
|
CRLF Injection in Limesurvey |
LimeSurvey |
LimeSurvey |
2025-08-01T12:29:59.023Z | 2025-09-11T08:56:57.154Z |
| CVE-2024-6933 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
LimeSurvey Survey General Settings updatesurveylocales… |
n/a |
LimeSurvey |
2024-07-21T00:31:04.336Z | 2025-12-09T14:52:38.866Z |
| CVE-2026-23755 |
8.4 (4.0)
|
D-Link D-View 8 Installer DLL Preloading via Uncontrol… |
D-Link |
D-View 8 |
2026-01-21T18:02:30.160Z | 2026-01-26T17:37:29.534Z |
| CVE-2026-23754 |
8.7 (4.0)
|
D-Link D-View 8 IDOR Allows Credential Disclosure and … |
D-Link |
D-View 8 |
2026-01-21T18:02:45.878Z | 2026-01-26T17:36:57.115Z |
| CVE-2024-55930 |
6.7 (3.1)
|
Weak default folder permissions |
Xerox |
Xerox Workplace Suite |
2025-01-23T17:36:01.763Z | 2025-02-24T17:18:39.252Z |
| CVE-2024-55931 |
6.5 (3.1)
|
Token stored in session storage |
Xerox |
Xerox Workplace Suite |
2025-01-27T11:28:45.510Z | 2025-02-24T17:20:04.431Z |
| CVE-2024-55929 |
5.3 (3.1)
|
Mail spoofing |
Xerox |
Xerox Workplace Suite |
2025-01-23T17:30:34.224Z | 2025-02-24T17:17:09.394Z |
| CVE-2025-70985 |
9.1 (3.1)
|
Incorrect access control in the update function o… |
n/a |
n/a |
2026-01-23T00:00:00.000Z | 2026-01-23T19:39:50.348Z |
| CVE-2025-70986 |
7.5 (3.1)
|
Incorrect access control in the selectDept functi… |
n/a |
n/a |
2026-01-23T00:00:00.000Z | 2026-01-23T19:30:44.227Z |
| CVE-2024-7517 |
8.5 (4.0)
|
Privileged escalation via crafted use of portcfg command |
Brocade |
Fabric OS |
2024-11-21T05:53:34.442Z | 2025-09-09T19:02:20.886Z |
| CVE-2025-48753 |
2.9 (3.1)
|
In the anode crate 0.1.0 for Rust, data races can… |
obsidiandynamics |
anode |
2025-05-24T00:00:00.000Z | 2025-05-24T10:19:20.813Z |
| CVE-2025-48752 |
2.9 (3.1)
|
In the process-sync crate 0.2.2 for Rust, the dro… |
Forestryks |
process-sync-rs |
2025-05-24T00:00:00.000Z | 2025-05-24T10:19:47.303Z |
| CVE-2025-48751 |
2.9 (3.1)
|
The process_lock crate 0.1.0 for Rust allows data… |
tickbh |
ProcessLock |
2025-05-24T00:00:00.000Z | 2025-05-24T10:21:12.718Z |
| CVE-2025-20966 |
4.6 (3.1)
|
Improper access control in Samsung Gallery prior … |
Samsung Mobile |
Samsung Gallery |
2025-05-07T08:24:20.945Z | 2025-05-07T16:16:19.184Z |
| CVE-2025-20967 |
5.1 (3.1)
|
Improper access control in Samsung Gallery prior … |
Samsung Mobile |
Samsung Gallery |
2025-05-07T08:24:22.166Z | 2025-05-07T16:13:00.363Z |
| CVE-2025-20968 |
7.2 (3.1)
|
Improper access control in Samsung Gallery prior … |
Samsung Mobile |
Samsung Gallery |
2025-05-07T08:24:23.488Z | 2025-05-07T16:12:06.660Z |
| CVE-2025-20969 |
5.5 (3.1)
|
Improper input validation in Samsung Gallery prio… |
Samsung Mobile |
Samsung Gallery |
2025-05-07T08:24:24.722Z | 2025-05-07T15:51:19.190Z |
| CVE-2025-47737 |
2.9 (3.1)
|
lib.rs in the trailer crate through 0.1.2 for Rus… |
Geal |
trailer |
2025-05-09T00:00:00.000Z | 2025-05-09T15:54:31.213Z |
| CVE-2025-47735 |
2.9 (3.1)
|
inner::drop in inner.rs in the wgp crate through … |
Nugine |
wgp |
2025-05-09T00:00:00.000Z | 2025-05-09T15:45:02.125Z |
| CVE-2026-22461 |
5.3 (3.1)
|
WordPress CTX Feed plugin <= 6.6.18 - Broken Access Co… |
WebAppick |
CTX Feed |
2026-01-22T16:52:39.747Z | 2026-01-30T20:24:17.214Z |
| CVE-2025-59946 |
7.5 (3.1)
|
NanoMQ has a Use After Free vulnerability via sub info list |
nanomq |
nanomq |
2025-12-27T00:40:51.122Z | 2025-12-29T15:54:27.851Z |
| CVE-2025-59947 |
8.5 (4.0)
|
NanoMQ has Buffer Overflow |
nanomq |
nanomq |
2025-12-15T20:19:17.212Z | 2025-12-15T20:58:37.814Z |
| CVE-2024-3387 |
5.3 (3.1)
|
PAN-OS: Weak Certificate Strength in Panorama Software… |
Palo Alto Networks |
PAN-OS |
2024-04-10T17:06:36.676Z | 2024-08-01T20:12:06.646Z |
| CVE-2024-5911 |
7 (4.0)
|
PAN-OS: File Upload Vulnerability in the Panorama Web … |
Palo Alto Networks |
PAN-OS |
2024-07-10T18:40:02.209Z | 2024-08-01T21:25:03.109Z |
| CVE-2024-37282 |
8.1 (3.1)
|
It was identified that under certain specific pre… |
Elastic |
Elastic Cloud Enterprise |
2024-06-28T04:58:18.200Z | 2024-08-02T03:50:55.693Z |
| CVE-2025-24483 |
6.5 (3.0)
|
NULL pointer dereference vulnerability exists in … |
Humming Heads Inc. |
Defense Platform Home Edition |
2025-02-06T07:05:56.408Z | 2025-02-12T19:51:10.698Z |
| CVE-2025-24845 |
6.3 (3.0)
|
Improper neutralization of argument delimiters in… |
Humming Heads Inc. |
Defense Platform Home Edition |
2025-02-06T07:06:05.293Z | 2025-02-12T19:51:10.579Z |
| CVE-2025-27924 |
5.4 (3.1)
|
Nintex Automation 5.6 and 5.7 before 5.8 has a st… |
Nintex |
Automation |
2025-03-10T00:00:00.000Z | 2025-03-11T15:51:51.478Z |
| CVE-2024-24506 |
6.1 (3.1)
|
Cross Site Scripting (XSS) vulnerability in Lime … |
n/a |
n/a |
2024-04-03T00:00:00 | 2024-08-15T20:11:13.215Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-23754 | D-Link D-View 8 versions 2.0.1.107 and below contain an improper access control vulnerability in ba… | 2026-01-21T18:16:25.370 | 2026-01-30T21:30:51.903 |
| fkie_cve-2024-55930 | Xerox Workplace Suite has weak default folder permissions that allow unauthorized users to access, … | 2025-01-23T18:15:32.450 | 2026-01-30T21:30:28.317 |
| fkie_cve-2024-55931 | Xerox Workplace Suite stores tokens in session storage, which may expose them to potential access i… | 2025-01-27T12:15:27.407 | 2026-01-30T21:30:11.770 |
| fkie_cve-2024-55929 | A mail spoofing vulnerability in Xerox Workplace Suite allows attackers to forge email headers, mak… | 2025-01-23T18:15:32.277 | 2026-01-30T21:29:46.733 |
| fkie_cve-2025-70985 | Incorrect access control in the update function of RuoYi v4.8.2 allows unauthorized attackers to ar… | 2026-01-23T19:15:53.907 | 2026-01-30T21:27:40.100 |
| fkie_cve-2025-70986 | Incorrect access control in the selectDept function of RuoYi v4.8.2 allows unauthorized attackers t… | 2026-01-23T19:15:54.017 | 2026-01-30T21:26:10.400 |
| fkie_cve-2024-7517 | A command injection vulnerability in Brocade Fabric OS before 9.2.0c, and 9.2.1 through 9.2.1a on I… | 2024-11-21T11:15:35.990 | 2026-01-30T21:24:46.627 |
| fkie_cve-2025-48753 | In the anode crate 0.1.0 for Rust, data races can occur in unlock in SpinLock. | 2025-05-24T03:15:23.863 | 2026-01-30T21:23:32.170 |
| fkie_cve-2025-48752 | In the process-sync crate 0.2.2 for Rust, the drop function lacks a check for whether the pthread_m… | 2025-05-24T03:15:23.700 | 2026-01-30T21:22:39.770 |
| fkie_cve-2025-48751 | The process_lock crate 0.1.0 for Rust allows data races in unlock. | 2025-05-24T03:15:23.533 | 2026-01-30T21:21:47.597 |
| fkie_cve-2025-20966 | Improper access control in Samsung Gallery prior to version 14.5.10.3 in Global Android 13, 14.5.09… | 2025-05-07T09:15:16.890 | 2026-01-30T21:18:51.750 |
| fkie_cve-2025-20967 | Improper access control in Samsung Gallery prior to version 14.5.10.3 in Global Android 13, 14.5.09… | 2025-05-07T09:15:17.027 | 2026-01-30T21:18:34.967 |
| fkie_cve-2025-20968 | Improper access control in Samsung Gallery prior to version 14.5.10.3 in Global Android 13, 14.5.09… | 2025-05-07T09:15:17.153 | 2026-01-30T21:17:56.700 |
| fkie_cve-2025-20969 | Improper input validation in Samsung Gallery prior to version 14.5.10.3 in Global Android 13, 14.5.… | 2025-05-07T09:15:17.280 | 2026-01-30T21:17:31.707 |
| fkie_cve-2025-47737 | lib.rs in the trailer crate through 0.1.2 for Rust mishandles allocating with a size of zero. | 2025-05-09T05:15:51.877 | 2026-01-30T21:17:11.327 |
| fkie_cve-2025-47735 | inner::drop in inner.rs in the wgp crate through 0.2.0 for Rust lacks drop_slow thread synchronization. | 2025-05-09T05:15:51.420 | 2026-01-30T21:16:07.283 |
| fkie_cve-2026-22461 | Missing Authorization vulnerability in WebAppick CTX Feed webappick-product-feed-for-woocommerce al… | 2026-01-22T17:16:34.910 | 2026-01-30T21:15:58.023 |
| fkie_cve-2025-59946 | NanoMQ MQTT Broker (NanoMQ) is an Edge Messaging Platform. Prior to version 0.24.2, there is a clas… | 2025-12-27T01:15:41.880 | 2026-01-30T21:14:23.593 |
| fkie_cve-2025-59947 | NanoMQ is a messaging broker/bus for IoT Edge & SDV. Versions prior to 0.24.4 have a buffer overflo… | 2025-12-15T21:15:59.157 | 2026-01-30T21:14:03.200 |
| fkie_cve-2024-3387 | A weak (low bit strength) device certificate in Palo Alto Networks Panorama software enables an att… | 2024-04-10T17:15:57.787 | 2026-01-30T21:13:20.710 |
| fkie_cve-2024-5911 | An arbitrary file upload vulnerability in Palo Alto Networks Panorama software enables an authentic… | 2024-07-10T19:15:11.547 | 2026-01-30T21:11:32.447 |
| fkie_cve-2024-37282 | It was identified that under certain specific preconditions, an API key that was originally created… | 2024-06-28T05:15:11.633 | 2026-01-30T21:10:25.350 |
| fkie_cve-2025-24483 | NULL pointer dereference vulnerability exists in Defense Platform Home Edition Ver.3.9.51.x and ear… | 2025-02-06T08:15:30.327 | 2026-01-30T21:07:00.390 |
| fkie_cve-2025-24845 | Improper neutralization of argument delimiters in a command ('Argument Injection') issue exists in … | 2025-02-06T08:15:30.673 | 2026-01-30T21:05:58.620 |
| fkie_cve-2025-27924 | Nintex Automation 5.6 and 5.7 before 5.8 has a stored XSS issue associated with the "Navigate to a … | 2025-03-10T23:15:35.280 | 2026-01-30T21:03:11.060 |
| fkie_cve-2024-24506 | Cross Site Scripting (XSS) vulnerability in Lime Survey Community Edition Version v.5.3.32+220817, … | 2024-04-03T07:15:42.663 | 2026-01-30T21:02:09.183 |
| fkie_cve-2024-27674 | Macro Expert through 4.9.4 allows BUILTIN\Users:(OI)(CI)(M) access to the "%PROGRAMFILES(X86)%\Gras… | 2024-04-03T17:15:55.710 | 2026-01-30T21:01:08.850 |
| fkie_cve-2024-2433 | An improper authorization vulnerability in Palo Alto Networks Panorama software enables an authenti… | 2024-03-13T18:15:08.893 | 2026-01-30T20:58:17.900 |
| fkie_cve-2022-27540 | A potential Time-of-Check to Time-of Use (TOCTOU) vulnerability has been identified in the HP BIOS … | 2024-06-28T19:15:03.407 | 2026-01-30T20:53:03.233 |
| fkie_cve-2024-39063 | Lime Survey <= 6.5.12 is vulnerable to Cross Site Request Forgery (CSRF). The YII_CSRF_TOKEN is onl… | 2024-07-09T20:15:12.080 | 2026-01-30T20:52:36.270 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-pwc8-wvmv-h77r |
4.4 (3.1)
|
The Appointment Hour Booking – Booking Calendar plugin for WordPress is vulnerable to Stored Cross-… | 2026-01-28T06:30:31Z | 2026-01-28T06:30:31Z |
| ghsa-mvhq-2c86-53q7 |
|
Rejected reason: Not used | 2026-01-28T06:30:31Z | 2026-01-28T06:30:31Z |
| ghsa-h48f-f44x-rv65 |
6.4 (3.1)
|
The Target Video Easy Publish plugin for WordPress is vulnerable to Stored Cross-Site Scripting via… | 2026-01-28T06:30:31Z | 2026-01-28T06:30:31Z |
| ghsa-h3f4-cj22-95mv |
|
Rejected reason: Not used | 2026-01-28T06:30:31Z | 2026-01-28T06:30:31Z |
| ghsa-grwv-j84r-6452 |
|
Rejected reason: Not used | 2026-01-28T06:30:30Z | 2026-01-28T06:30:31Z |
| ghsa-8pmp-wv7w-98g4 |
|
Rejected reason: Not used | 2026-01-28T06:30:31Z | 2026-01-28T06:30:31Z |
| ghsa-2qgp-5cvv-jv79 |
|
Rejected reason: Not used | 2026-01-28T06:30:31Z | 2026-01-28T06:30:31Z |
| ghsa-w9r4-r3xg-x656 |
|
Rejected reason: Not used | 2026-01-28T06:30:30Z | 2026-01-28T06:30:30Z |
| ghsa-pjp3-r253-9f95 |
|
Rejected reason: Not used | 2026-01-28T06:30:30Z | 2026-01-28T06:30:30Z |
| ghsa-h3xm-w5hm-v36m |
6.5 (3.1)
7.1 (4.0)
|
Official Document Management System developed by 2100 Technology has a Incorrect Authorization vuln… | 2026-01-28T06:30:30Z | 2026-01-28T06:30:30Z |
| ghsa-f75g-cjch-hhmx |
|
Rejected reason: Not used | 2026-01-28T06:30:30Z | 2026-01-28T06:30:30Z |
| ghsa-6fxf-xg6m-34hj |
7.1 (3.1)
|
In key-based pairing, there is a possible ID due to a logic error in the code. This could lead to r… | 2026-01-15T18:31:33Z | 2026-01-28T06:30:30Z |
| ghsa-wm8h-26fv-mg7g |
6.5 (3.1)
|
phpMyFAQ: /api/setup/backup accessible to any authenticated user (authz missing) | 2026-01-23T20:17:25Z | 2026-01-28T04:43:46Z |
| ghsa-7p9h-m7m8-vhhv |
6.5 (3.1)
|
phpMyFAQ: Attachment download allowed without dlattachment right (broken access control) | 2026-01-23T20:17:16Z | 2026-01-28T04:43:20Z |
| ghsa-wvqx-m5px-6cmp |
6.5 (4.0)
|
XWiki Affected by Reflected Cross-Site Scripting (XSS) in Error Messages | 2026-01-23T16:28:44Z | 2026-01-28T04:42:41Z |
| ghsa-jhqv-457v-r3vc |
7.2 (3.1)
7.3 (4.0)
|
A vulnerability was found in D-Link DIR-615 4.10. This issue affects some unknown processing of the… | 2026-01-28T03:30:30Z | 2026-01-28T03:30:30Z |
| ghsa-f4r3-c8v2-m33c |
7.2 (3.1)
7.3 (4.0)
|
A vulnerability was determined in D-Link DIR-615 4.10. Impacted is an unknown function of the file … | 2026-01-28T03:30:30Z | 2026-01-28T03:30:30Z |
| ghsa-5x73-r429-p343 |
7.9 (3.1)
|
This High severity XXE (XML External Entity Injection) vulnerability was introduced in version 7.1.… | 2026-01-28T03:30:29Z | 2026-01-28T03:30:29Z |
| ghsa-xp39-vp6q-phvj |
5.9 (3.1)
|
In Bun before 1.3.5, the default trusted dependencies list (aka trust allow list) can be spoofed by… | 2026-01-28T00:31:42Z | 2026-01-28T00:31:42Z |
| ghsa-m6qv-96fg-92g8 |
6.5 (3.1)
|
Inappropriate implementation in Background Fetch API in Google Chrome prior to 144.0.7559.110 allow… | 2026-01-27T21:31:49Z | 2026-01-28T00:31:41Z |
| ghsa-2x38-48vp-w23x |
9.8 (3.1)
|
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability i… | 2026-01-27T21:31:49Z | 2026-01-28T00:31:40Z |
| ghsa-j5mh-gg3g-q7rr |
7.3 (3.1)
|
Missing Authorization vulnerability in e-plugins Listihub listihub allows Exploiting Incorrectly Co… | 2026-01-22T18:30:39Z | 2026-01-28T00:31:39Z |
| ghsa-gv86-fjr8-gfwc |
8.8 (3.1)
|
Incorrect Privilege Assignment vulnerability in e-plugins Hospital Doctor Directory hospital-doctor… | 2026-01-22T18:30:38Z | 2026-01-28T00:31:39Z |
| ghsa-c6jq-h3hj-7vwx |
8.8 (3.1)
|
Missing Authorization vulnerability in Rasedul Haque Rumi BD Courier Order Ratio Checker bd-courier… | 2026-01-22T18:30:40Z | 2026-01-28T00:31:39Z |
| ghsa-9m3q-c2qh-cgvf |
8.1 (3.1)
|
Missing Authorization vulnerability in CloudPanel CLP Varnish Cache clp-varnish-cache allows Exploi… | 2026-01-23T15:31:35Z | 2026-01-28T00:31:39Z |
| ghsa-492m-9864-4xjr |
8.8 (3.1)
|
Incorrect Privilege Assignment vulnerability in e-plugins Institutions Directory institutions-direc… | 2026-01-22T18:30:38Z | 2026-01-28T00:31:39Z |
| ghsa-vw4j-gphv-4524 |
7.5 (3.1)
|
Missing Authorization vulnerability in Scalenut Scalenut scalenut allows Exploiting Incorrectly Con… | 2026-01-22T18:30:35Z | 2026-01-28T00:31:38Z |
| ghsa-rmjp-62mc-qxg4 |
7.1 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-01-22T18:30:36Z | 2026-01-28T00:31:38Z |
| ghsa-mh85-rfqv-qpgw |
9.3 (3.1)
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2026-01-22T18:30:35Z | 2026-01-28T00:31:38Z |
| ghsa-jjf6-qp7m-45xc |
7.1 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-01-22T18:30:36Z | 2026-01-28T00:31:38Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-146 |
|
All versions of package reportlab are vulnerable to Server-side Request Forgery (SSRF) vi… | reportlab | 2021-02-18T16:15:00Z | 2021-08-27T03:22:19.297131Z |
| pysec-2021-145 |
|
XML External Entities (XXE) in Quokka v0.4.0 allows remote attackers to execute arbitrary… | quokka | 2021-08-16T18:15:00Z | 2021-08-27T03:22:19.070898Z |
| pysec-2021-144 |
|
XML External Entities (XXE) in Quokka v0.4.0 allows remote attackers to execute arbitrary… | quokka | 2021-08-16T18:15:00Z | 2021-08-27T03:22:19.043898Z |
| pysec-2021-143 |
|
Cross Site Scripting (XSS) in Quokka v0.4.0 allows remote attackers to execute arbitrary … | quokka | 2021-08-16T18:15:00Z | 2021-08-27T03:22:19.002010Z |
| pysec-2020-250 |
|
Open-iSCSI rtslib-fb through 2.1.72 has weak permissions for /etc/target/saveconfig.json … | rtslib-fb | 2020-06-19T11:15:00Z | 2021-08-27T03:22:19.931800Z |
| pysec-2019-202 |
|
python-rply before 0.7.4 insecurely creates temporary files. | rply | 2019-11-21T15:15:00Z | 2021-08-27T03:22:19.853413Z |
| pysec-2019-200 |
|
python-requests-Kerberos through 0.5 does not handle mutual authentication | requests-kerberos | 2019-12-15T22:15:00Z | 2021-08-27T03:22:19.338890Z |
| pysec-2018-100 |
|
base/oi/doa.py in the Rope library in CPython (aka Python) allows remote attackers to exe… | rope | 2018-04-06T16:29:00Z | 2021-08-27T03:22:19.565672Z |
| pysec-2016-33 |
|
schema.py in Roundup before 1.5.1 does not properly limit attributes included in default … | roundup | 2016-04-13T14:59:00Z | 2021-08-27T03:22:19.738380Z |
| pysec-2014-96 |
|
Cross-site scripting (XSS) vulnerability in Roundup before 1.4.20 allows remote attackers… | roundup | 2014-04-10T20:29:00Z | 2021-08-27T03:22:19.707650Z |
| pysec-2010-31 |
|
Cross-site scripting (XSS) vulnerability in cgi/client.py in Roundup before 1.4.14 allows… | roundup | 2010-09-24T19:00:00Z | 2021-08-27T03:22:19.672970Z |
| pysec-2008-9 |
|
Multiple unspecified vulnerabilities in Roundup before 1.4.4 have unknown impact and atta… | roundup | 2008-03-24T22:44:00Z | 2021-08-27T03:22:19.598501Z |
| pysec-2008-10 |
|
The xml-rpc server in Roundup 1.4.4 does not check property permissions, which allows att… | roundup | 2008-03-24T22:44:00Z | 2021-08-27T03:22:19.634629Z |
| pysec-2021-142 |
|
A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is … | pyyaml | 2021-02-09T21:15:00Z | 2021-08-27T03:22:18.913334Z |
| pysec-2019-199 |
|
A code injection issue was discovered in PyXDG before 0.26 via crafted Python code in a C… | pyxdg | 2019-06-06T19:29:00Z | 2021-08-27T03:22:18.878765Z |
| pysec-2019-198 |
|
OneLogin PythonSAML 2.3.0 and earlier may incorrectly utilize the results of XML DOM trav… | python-saml | 2019-04-17T14:29:00Z | 2021-08-27T03:22:18.581552Z |
| pysec-2019-197 |
|
python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache encryption bypass | python-keystoneclient | 2019-12-10T15:15:00Z | 2021-08-27T03:22:18.277308Z |
| pysec-2014-95 |
|
Race condition in the xdg.BaseDirectory.get_runtime_dir function in python-xdg 0.25 allow… | pyxdg | 2014-01-28T00:55:00Z | 2021-08-27T03:22:18.849828Z |
| pysec-2014-94 |
|
PyWBEM 0.7 and earlier does not verify that the server hostname matches a domain name in … | pywbem | 2014-05-05T17:06:00Z | 2021-08-27T03:22:18.708966Z |
| pysec-2014-93 |
|
PyWBEM 0.7 and earlier uses a separate connection to validate X.509 certificates, which a… | pywbem | 2014-05-05T17:06:00Z | 2021-08-27T03:22:18.674694Z |
| pysec-2014-92 |
|
python-gnupg 0.3.5 and 0.3.6 allows context-dependent attackers to have an unspecified im… | python-gnupg | 2014-10-25T21:55:00Z | 2021-08-27T03:22:18.219373Z |
| pysec-2014-91 |
|
The shell_quote function in python-gnupg 0.3.5 does not properly escape characters, which… | python-gnupg | 2014-10-25T21:55:00Z | 2021-08-27T03:22:18.180710Z |
| pysec-2014-90 |
|
The shell_quote function in python-gnupg 0.3.5 does not properly quote strings, which all… | python-gnupg | 2014-10-25T21:55:00Z | 2021-08-27T03:22:18.134121Z |
| pysec-2014-89 |
|
python-gnupg before 0.3.5 allows context-dependent attackers to execute arbitrary command… | python-gnupg | 2014-06-09T19:55:00Z | 2021-08-27T03:22:18.100904Z |
| pysec-2021-141 |
|
In pygments 1.1+, fixed in 2.7.4, the lexers used to parse programming languages rely hea… | pygments | 2021-03-17T13:15:00Z | 2021-08-27T03:22:17.331175Z |
| pysec-2021-140 |
|
An infinite loop in SMLLexer in Pygments versions 1.5 to 2.7.3 may lead to denial of serv… | pygments | 2021-03-23T17:15:00Z | 2021-08-27T03:22:17.263376Z |
| pysec-2018-99 |
|
pyro before 3.15 unsafely handles pid files in temporary directory locations and opening … | pyro | 2018-08-20T13:29:00Z | 2021-08-27T03:22:17.581707Z |
| pysec-2016-32 |
|
The FontManager._get_nix_font_path function in formatters/img.py in Pygments 1.2.2 throug… | pygments | 2016-01-08T20:59:00Z | 2021-08-27T03:22:17.226462Z |
| pysec-2014-88 |
|
python-bugzilla before 0.9.0 does not validate X.509 certificates, which allows man-in-th… | python-bugzilla | 2014-02-08T00:55:00Z | 2021-08-27T03:22:17.861270Z |
| pysec-2013-31 |
|
The X509Extension in pyOpenSSL before 0.13.1 does not properly handle a '\0' character in… | pyopenssl | 2013-09-30T21:55:00Z | 2021-08-27T03:22:17.495539Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-32224 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.042975Z |
| gsd-2024-32223 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.129506Z |
| gsd-2024-32222 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.039618Z |
| gsd-2024-32221 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.044459Z |
| gsd-2024-32220 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.038163Z |
| gsd-2024-32219 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.140644Z |
| gsd-2024-32218 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.084258Z |
| gsd-2024-32217 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.043167Z |
| gsd-2024-32216 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.045614Z |
| gsd-2024-32215 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.029666Z |
| gsd-2024-32214 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.072881Z |
| gsd-2024-32213 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.126953Z |
| gsd-2024-32212 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.034596Z |
| gsd-2024-32211 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.131479Z |
| gsd-2024-32210 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.100410Z |
| gsd-2024-32209 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.045237Z |
| gsd-2024-32208 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.115784Z |
| gsd-2024-32207 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.094612Z |
| gsd-2024-32206 | A stored cross-site scripting (XSS) vulnerability in the component \affiche\admin\index.p… | 2024-04-13T05:02:29.087037Z |
| gsd-2024-32205 | ** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: none. Reason: This record was withdr… | 2024-04-13T05:02:29.090869Z |
| gsd-2024-32204 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.133835Z |
| gsd-2024-32203 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.072677Z |
| gsd-2024-32202 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.136264Z |
| gsd-2024-32201 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.112312Z |
| gsd-2024-32200 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.049775Z |
| gsd-2024-32199 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.099722Z |
| gsd-2024-32198 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.076836Z |
| gsd-2024-32197 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.071914Z |
| gsd-2024-32196 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.039810Z |
| gsd-2024-32195 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.077242Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2025-190532 | Malicious code in node-calculator-68f8 (npm) | 2025-11-17T17:14:41Z | 2025-12-24T10:09:29Z |
| MAL-2025-190531 | Malicious code in node-calculator-522f (npm) | 2025-11-17T17:14:41Z | 2025-12-24T10:09:29Z |
| mal-2025-5504 | Malicious code in keythereum-utils (npm) | 2025-07-01T06:27:23Z | 2025-12-24T10:09:28Z |
| mal-2025-55018 | Malicious code in graphhub (npm) | 2025-11-10T05:49:05Z | 2025-12-24T10:09:28Z |
| mal-2025-49419 | Malicious code in libxmljs2superbank (npm) | 2025-11-09T00:17:09Z | 2025-12-24T10:09:28Z |
| mal-2025-49340 | Malicious code in loaders-fbo.gov (npm) | 2025-11-03T18:59:00Z | 2025-12-24T10:09:28Z |
| mal-2025-48554 | Malicious code in js-repack (npm) | 2025-10-22T06:53:48Z | 2025-12-24T10:09:28Z |
| mal-2025-47927 | Malicious code in graphflux (npm) | 2025-10-07T00:28:13Z | 2025-12-24T10:09:28Z |
| mal-2025-191969 | Malicious code in kkkaremn (npm) | 2025-12-03T00:55:45Z | 2025-12-24T10:09:28Z |
| mal-2025-191961 | Malicious code in karem5 (npm) | 2025-12-03T01:23:28Z | 2025-12-24T10:09:28Z |
| mal-2025-191948 | Malicious code in kkkarem (npm) | 2025-12-03T00:35:42Z | 2025-12-24T10:09:28Z |
| mal-2025-191579 | Malicious code in lbank-connector-nodejs (npm) | 2025-12-01T13:15:08Z | 2025-12-24T10:09:28Z |
| mal-2025-191577 | Malicious code in kyjnzu (npm) | 2025-12-01T13:15:02Z | 2025-12-24T10:09:28Z |
| mal-2025-191498 | Malicious code in kmf-cookieservice (npm) | 2025-12-01T16:00:47Z | 2025-12-24T10:09:28Z |
| mal-2025-190496 | Malicious code in loger-parser (npm) | 2025-11-14T03:48:20Z | 2025-12-24T10:09:28Z |
| mal-2024-2595 | Malicious code in launchdarkly-cpp-internal (npm) | 2024-06-25T12:48:48Z | 2025-12-24T10:09:28Z |
| MAL-2025-5504 | Malicious code in keythereum-utils (npm) | 2025-07-01T06:27:23Z | 2025-12-24T10:09:28Z |
| MAL-2025-55018 | Malicious code in graphhub (npm) | 2025-11-10T05:49:05Z | 2025-12-24T10:09:28Z |
| MAL-2025-49419 | Malicious code in libxmljs2superbank (npm) | 2025-11-09T00:17:09Z | 2025-12-24T10:09:28Z |
| MAL-2025-49340 | Malicious code in loaders-fbo.gov (npm) | 2025-11-03T18:59:00Z | 2025-12-24T10:09:28Z |
| MAL-2025-48554 | Malicious code in js-repack (npm) | 2025-10-22T06:53:48Z | 2025-12-24T10:09:28Z |
| MAL-2025-47927 | Malicious code in graphflux (npm) | 2025-10-07T00:28:13Z | 2025-12-24T10:09:28Z |
| MAL-2025-191969 | Malicious code in kkkaremn (npm) | 2025-12-03T00:55:45Z | 2025-12-24T10:09:28Z |
| MAL-2025-191961 | Malicious code in karem5 (npm) | 2025-12-03T01:23:28Z | 2025-12-24T10:09:28Z |
| MAL-2025-191948 | Malicious code in kkkarem (npm) | 2025-12-03T00:35:42Z | 2025-12-24T10:09:28Z |
| MAL-2025-191579 | Malicious code in lbank-connector-nodejs (npm) | 2025-12-01T13:15:08Z | 2025-12-24T10:09:28Z |
| MAL-2025-191577 | Malicious code in kyjnzu (npm) | 2025-12-01T13:15:02Z | 2025-12-24T10:09:28Z |
| MAL-2025-191498 | Malicious code in kmf-cookieservice (npm) | 2025-12-01T16:00:47Z | 2025-12-24T10:09:28Z |
| MAL-2025-190496 | Malicious code in loger-parser (npm) | 2025-11-14T03:48:20Z | 2025-12-24T10:09:28Z |
| MAL-2024-2595 | Malicious code in launchdarkly-cpp-internal (npm) | 2024-06-25T12:48:48Z | 2025-12-24T10:09:28Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2023-0782 | OpenSSL: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2023-03-28T22:00:00.000+00:00 | 2025-03-27T23:00:00.000+00:00 |
| wid-sec-w-2025-0646 | Devolutions Remote Desktop Manager: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2025-03-26T23:00:00.000+00:00 | 2025-03-26T23:00:00.000+00:00 |
| wid-sec-w-2025-0644 | IBM App Connect Enterprise: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-03-26T23:00:00.000+00:00 | 2025-03-26T23:00:00.000+00:00 |
| wid-sec-w-2025-0643 | GitLab: Mehrere Schwachstellen | 2025-03-26T23:00:00.000+00:00 | 2025-03-26T23:00:00.000+00:00 |
| wid-sec-w-2025-0642 | Acronis Cyber Protect: Schwachstelle ermöglicht Privilegieneskalation | 2025-03-26T23:00:00.000+00:00 | 2025-03-26T23:00:00.000+00:00 |
| wid-sec-w-2025-0593 | Google Chrome/Microsoft Edge: Schwachstelle ermöglicht Codeausführung | 2025-03-19T23:00:00.000+00:00 | 2025-03-26T23:00:00.000+00:00 |
| wid-sec-w-2025-0563 | Kubernetes: Schwachstelle ermöglicht Umgehung von Sicherheitsmechanismen | 2025-03-13T23:00:00.000+00:00 | 2025-03-26T23:00:00.000+00:00 |
| wid-sec-w-2024-1845 | Intel Prozessor: Mehrere Schwachstellen | 2024-08-13T22:00:00.000+00:00 | 2025-03-26T23:00:00.000+00:00 |
| wid-sec-w-2024-1828 | Intel Prozessor: Mehrere Schwachstellen | 2024-08-13T22:00:00.000+00:00 | 2025-03-26T23:00:00.000+00:00 |
| wid-sec-w-2023-2906 | Intel Prozessoren: Mehrere Schwachstellen | 2023-11-14T23:00:00.000+00:00 | 2025-03-26T23:00:00.000+00:00 |
| wid-sec-w-2023-2017 | Red Hat Enterprise Linux (libcap): Mehrere Schwachstellen | 2023-08-08T22:00:00.000+00:00 | 2025-03-26T23:00:00.000+00:00 |
| wid-sec-w-2023-2007 | Intel Prozessoren: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-08-08T22:00:00.000+00:00 | 2025-03-26T23:00:00.000+00:00 |
| wid-sec-w-2023-2005 | Intel Xeon Prozessoren: Mehrere Schwachstellen | 2023-08-08T22:00:00.000+00:00 | 2025-03-26T23:00:00.000+00:00 |
| wid-sec-w-2025-0639 | Icinga: Mehrere Schwachstellen | 2025-03-25T23:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| wid-sec-w-2025-0637 | Hitachi Energy RTU500: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-03-25T23:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| wid-sec-w-2025-0636 | IBM SPSS Statistics: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-03-25T23:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| wid-sec-w-2025-0634 | VMware Tools: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-03-25T23:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| wid-sec-w-2025-0450 | Red Hat OpenShift Service Mesh Containers: Schwachstelle ermöglicht Cross-Site Scripting | 2025-02-26T23:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| wid-sec-w-2025-0231 | MELDUNG ZURÜCKGEZOGEN | 2025-01-30T23:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| wid-sec-w-2025-0091 | Microsoft Windows: Mehrere Schwachstellen | 2025-01-14T23:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| wid-sec-w-2024-3712 | Trend Micro Apex One: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2024-12-16T23:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| wid-sec-w-2024-1812 | Red Hat Enterprise Linux (389-ds-base ldap server): Schwachstelle ermöglicht Denial of Service | 2024-08-11T22:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| wid-sec-w-2024-1290 | Red Hat Enterprise Linux: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-06-04T22:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| wid-sec-w-2024-0954 | FreeRDP: Mehrere Schwachstellen | 2024-04-23T22:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| wid-sec-w-2024-0905 | FreeRDP: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-04-16T22:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| wid-sec-w-2024-0426 | Python: Mehrere Schwachstellen ermöglichen Denial of Service | 2016-09-15T22:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| wid-sec-w-2022-2036 | Varnish HTTP Cache: Mehrere Schwachstellen ermöglichen Manipulation von Dateien | 2022-11-08T23:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| wid-sec-w-2022-0865 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2022-07-31T22:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| wid-sec-w-2022-0841 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2022-07-26T22:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| wid-sec-w-2022-0734 | Linux Kernel: Mehrere Schwachstellen ermöglichen Codeausführung | 2022-07-19T22:00:00.000+00:00 | 2025-03-25T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2023:0728 | Red Hat Security Advisory: OpenShift Container Platform 4.12.3 security update | 2023-02-16T18:18:25+00:00 | 2026-02-03T21:14:08+00:00 |
| rhsa-2023:0693 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.7 security and bug fix update | 2023-02-09T02:17:22+00:00 | 2026-02-03T21:14:07+00:00 |
| rhsa-2023:0692 | Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.0.7 security and bug fix update | 2023-02-09T01:07:26+00:00 | 2026-02-03T21:14:05+00:00 |
| rhsa-2023:0652 | Red Hat Security Advisory: OpenShift Container Platform 4.11.27 security update | 2023-02-15T05:11:15+00:00 | 2026-02-03T21:14:05+00:00 |
| rhsa-2023:0651 | Red Hat Security Advisory: OpenShift Container Platform 4.11.27 security update | 2023-02-15T07:42:48+00:00 | 2026-02-03T21:14:05+00:00 |
| rhsa-2023:0632 | Red Hat Security Advisory: Red Hat OpenShift (Logging Subsystem) security update | 2023-02-15T11:08:43+00:00 | 2026-02-03T21:14:04+00:00 |
| rhsa-2023:0631 | Red Hat Security Advisory: RHSA: Submariner 0.14 - bug fix and security updates | 2023-02-07T17:23:40+00:00 | 2026-02-03T21:14:03+00:00 |
| rhsa-2023:0630 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.7.0 security and bug fix updates | 2023-02-07T18:36:08+00:00 | 2026-02-03T21:14:02+00:00 |
| rhsa-2023:0584 | Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.1.1 security update | 2023-05-18T14:27:34+00:00 | 2026-02-03T21:14:02+00:00 |
| rhsa-2023:0574 | Red Hat Security Advisory: OpenShift Container Platform 4.9.55 security update | 2023-02-13T04:31:46+00:00 | 2026-02-03T21:14:02+00:00 |
| rhsa-2023:0570 | Red Hat Security Advisory: OpenShift Container Platform 4.12.2 security update | 2023-02-07T21:22:35+00:00 | 2026-02-03T21:14:01+00:00 |
| rhsa-2023:0566 | Red Hat Security Advisory: OpenShift Container Platform 4.11.26 security update | 2023-02-07T06:18:30+00:00 | 2026-02-03T21:14:00+00:00 |
| rhsa-2023:0569 | Red Hat Security Advisory: OpenShift Container Platform 4.12.2 security update | 2023-02-07T21:23:44+00:00 | 2026-02-03T21:13:59+00:00 |
| rhsa-2023:0565 | Red Hat Security Advisory: OpenShift Container Platform 4.11.26 security update | 2023-02-07T13:22:19+00:00 | 2026-02-03T21:13:59+00:00 |
| rhsa-2023:0561 | Red Hat Security Advisory: OpenShift Container Platform 4.10.51 security update | 2023-02-08T18:49:28+00:00 | 2026-02-03T21:13:58+00:00 |
| rhsa-2023:0542 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.3.1 Containers security update | 2023-01-30T17:18:54+00:00 | 2026-02-03T21:13:57+00:00 |
| rhsa-2023:0540 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.1.6 security update | 2023-01-30T16:25:41+00:00 | 2026-02-03T21:13:56+00:00 |
| rhsa-2023:0481 | Red Hat Security Advisory: Submariner 0.12.3 - security update and bug fix | 2023-01-26T21:22:22+00:00 | 2026-02-03T21:13:56+00:00 |
| rhsa-2023:0408 | Red Hat Security Advisory: OpenShift Virtualization 4.12.0 Images security update | 2023-01-25T11:11:29+00:00 | 2026-02-03T21:13:56+00:00 |
| rhsa-2023:0328 | Red Hat Security Advisory: go-toolset and golang security and bug fix update | 2023-01-23T15:26:30+00:00 | 2026-02-03T21:13:56+00:00 |
| rhsa-2023:0449 | Red Hat Security Advisory: OpenShift Container Platform 4.12.1 security update | 2023-01-30T17:31:00+00:00 | 2026-02-03T21:13:55+00:00 |
| rhsa-2023:0446 | Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update | 2023-01-25T09:20:12+00:00 | 2026-02-03T21:13:54+00:00 |
| rhsa-2023:0407 | Red Hat Security Advisory: OpenShift Virtualization 4.12.0 RPMs security update | 2023-01-24T12:51:07+00:00 | 2026-02-03T21:13:54+00:00 |
| rhsa-2023:0264 | Red Hat Security Advisory: Red Hat OpenShift (Logging Subsystem) security update | 2023-01-19T11:03:41+00:00 | 2026-02-03T21:13:52+00:00 |
| rhsa-2023:0245 | Red Hat Security Advisory: OpenShift Container Platform 4.11.25 security update | 2023-01-23T15:53:20+00:00 | 2026-02-03T21:13:52+00:00 |
| rhsa-2022:9047 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.6 security and bug fix update | 2022-12-15T01:57:35+00:00 | 2026-02-03T21:13:52+00:00 |
| rhsa-2022:9111 | Red Hat Security Advisory: OpenShift Container Platform 4.9.54 bug fix and security update | 2023-01-06T10:37:49+00:00 | 2026-02-03T21:13:51+00:00 |
| rhsa-2022:9107 | Red Hat Security Advisory: OpenShift Container Platform 4.11.21 bug fix and security update | 2023-01-04T06:46:11+00:00 | 2026-02-03T21:13:50+00:00 |
| rhsa-2022:9096 | Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 7.0.0 [security update] | 2023-01-30T05:48:14+00:00 | 2026-02-03T21:13:50+00:00 |
| rhsa-2022:8938 | Red Hat Security Advisory: Release of OpenShift Serverless 1.26.0 | 2022-12-13T02:11:29+00:00 | 2026-02-03T21:13:49+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-22-200-01 | MiCODUS MV720 GPS tracker | 2022-07-19T00:00:00.000000Z | 2022-09-20T00:00:00.000000Z |
| icsa-20-324-02 | Paradox IP150 (Update A) | 2020-11-17T00:00:00.000000Z | 2022-09-19T00:00:00.000000Z |
| icsa-22-258-05 | Siemens SINEC INS | 2022-09-13T00:00:00.000000Z | 2022-09-13T00:00:00.000000Z |
| icsa-22-258-02 | Siemens Simcenter Femap and Parasolid | 2022-09-13T00:00:00.000000Z | 2022-09-13T00:00:00.000000Z |
| icsa-22-258-01 | Siemens Mobility CoreShield OWG Software | 2022-09-13T00:00:00.000000Z | 2022-09-13T00:00:00.000000Z |
| icsa-22-256-04 | Kingspan TMS300 CS | 2022-09-13T00:00:00.000000Z | 2022-09-13T00:00:00.000000Z |
| icsa-22-256-02 | Honeywell SoftMaster | 2022-09-13T00:00:00.000000Z | 2022-09-13T00:00:00.000000Z |
| icsa-22-256-01 | Hitachi Energy TXpert Hub CoreTec 4 Sudo Vulnerability | 2022-09-13T00:00:00.000000Z | 2022-09-13T00:00:00.000000Z |
| icsa-22-195-11 | Open Design Alliance Drawings SDK | 2022-07-12T00:00:00.000000Z | 2022-09-13T00:00:00.000000Z |
| icsa-22-195-09 | Simcenter Femap and Parasolid | 2022-07-12T00:00:00.000000Z | 2022-09-13T00:00:00.000000Z |
| icsa-18-226-02 | Siemens OpenSSL Vulnerability in Industrial Products (Update E) | 2018-08-07T00:00:00.000000Z | 2022-09-13T00:00:00.000000Z |
| icsa-22-251-01 | MZ Automation libIEC61850 | 2022-09-08T00:00:00.000000Z | 2022-09-08T00:00:00.000000Z |
| icsa-22-242-10 | PTC Kepware KEPServerEX (Update A) | 2022-08-30T00:00:00.000000Z | 2022-09-08T00:00:00.000000Z |
| icsa-22-249-04 | Hitachi Energy TXpert Hub CoreTec 4 | 2022-09-06T00:00:00.000000Z | 2022-09-06T00:00:00.000000Z |
| icsa-22-249-03 | Cognex 3D-A1000 Dimensioning System | 2022-09-06T00:00:00.000000Z | 2022-09-06T00:00:00.000000Z |
| icsa-22-249-02 | AVEVA Edge 2020 R2 SP1 and all prior versions | 2022-09-06T00:00:00.000000Z | 2022-09-06T00:00:00.000000Z |
| icsa-22-249-01 | Triangle Microworks Libraries | 2022-09-06T00:00:00.000000Z | 2022-09-06T00:00:00.000000Z |
| icsa-22-242-11 | Sensormatic Electronics iSTAR | 2022-08-30T00:00:00.000000Z | 2022-08-30T00:00:00.000000Z |
| icsa-22-242-09 | Omron CX-Programmer | 2022-08-30T00:00:00.000000Z | 2022-08-30T00:00:00.000000Z |
| icsa-22-242-08 | Honeywell Trend Controls Inter-Controller Protocol | 2022-08-30T00:00:00.000000Z | 2022-08-30T00:00:00.000000Z |
| icsa-22-242-07 | Honeywell Experion LX | 2022-08-30T00:00:00.000000Z | 2022-08-30T00:00:00.000000Z |
| icsa-22-242-06 | Honeywell ControlEdge | 2022-08-30T00:00:00.000000Z | 2022-08-30T00:00:00.000000Z |
| icsa-22-242-05 | Fuji Electric D300win | 2022-08-30T00:00:00.000000Z | 2022-08-30T00:00:00.000000Z |
| icsa-22-242-04 | Hitachi Energy RTU500 series | 2022-08-30T00:00:00.000000Z | 2022-08-30T00:00:00.000000Z |
| icsa-22-242-03 | Hitachi Energy MSM Product | 2022-08-30T00:00:00.000000Z | 2022-08-30T00:00:00.000000Z |
| icsa-22-242-02 | Hitachi Energy Gateway Station (GWS) Product | 2022-08-30T00:00:00.000000Z | 2022-08-30T00:00:00.000000Z |
| icsa-22-242-01 | Hitachi Energy FACTS Control Platform (FCP) Product | 2022-08-30T00:00:00.000000Z | 2022-08-30T00:00:00.000000Z |
| icsa-22-237-01 | FATEK Automation FvDesigner | 2022-08-25T00:00:00.000000Z | 2022-08-25T00:00:00.000000Z |
| icsa-22-235-07 | Hitachi Energy RTU500 | 2022-08-23T00:00:00.000000Z | 2022-08-23T00:00:00.000000Z |
| icsa-22-235-06 | Measuresoft ScadaPro Server and Client | 2022-08-23T00:00:00.000000Z | 2022-08-23T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-vmanx3-vrZbOqqD | Cisco SD-WAN vManage Software XML External Entity Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-09T21:12:21+00:00 |
| cisco-sa-webex-vdi-qqrpbwuj | Cisco Webex Meetings Desktop App Arbitrary Code Execution Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-webex-vdi-qQrpBwuJ | Cisco Webex Meetings Desktop App Arbitrary Code Execution Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-webex-teams-xss-zlw9td3 | Cisco Webex Teams Web Interface Cross-Site Scripting Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-webex-teams-xss-zLW9tD3 | Cisco Webex Teams Web Interface Cross-Site Scripting Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-webex-nbr-nos6fq24 | Cisco Webex Network Recording Player and Cisco Webex Player Arbitrary Code Execution Vulnerabilities | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-webex-nbr-NOS6FQ24 | Cisco Webex Network Recording Player and Cisco Webex Player Arbitrary Code Execution Vulnerabilities | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vsoln-arbfile-gtseyxns | Cisco SD-WAN Software Arbitrary File Creation Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vsoln-arbfile-gtsEYxns | Cisco SD-WAN Software Arbitrary File Creation Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vmxss2-nl4kssvr | Cisco SD-WAN vManage Software Cross-Site Scripting Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vmxss2-NL4KSSVR | Cisco SD-WAN vManage Software Cross-Site Scripting Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vmanxsshi-9kheqrpm | Cisco SD-WAN vManage Cross-Site Scripting Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vmanxsshi-9KHEqRpM | Cisco SD-WAN vManage Cross-Site Scripting Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vmanxss2-ugjyqxwf | Cisco SD-WAN vManage Software Cross-Site Scripting Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vmanxss2-ugJyqxWF | Cisco SD-WAN vManage Software Cross-Site Scripting Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vmanxss1-xhjcymbt | Cisco SD-WAN vManage Software Cross-Site Scripting Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vmanxss1-XhJCymBt | Cisco SD-WAN vManage Software Cross-Site Scripting Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vmanx2-kpfvsuc | Cisco SD-WAN vManage Software XML External Entity Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vmanx2-KpFVSUc | Cisco SD-WAN vManage Software XML External Entity Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vmanuafw-zhkdggey | Cisco SD-WAN vManage Software Authorization Bypass Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vmanuafw-ZHkdGGEy | Cisco SD-WAN vManage Software Authorization Bypass Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vmanpt2-fqluefss | Cisco SD-WAN vManage Software Path Traversal Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vmanpt2-FqLuefsS | Cisco SD-WAN vManage Software Path Traversal Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vmanage-privilege-zpmmf73k | Cisco SD-WAN vManage Software Command Injection Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vmanage-privilege-zPmMf73k | Cisco SD-WAN vManage Software Command Injection Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vmanage-file-y2jsrnrb | Cisco SD-WAN vManage Software Arbitrary File Creation Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vmanage-file-Y2JSRNRb | Cisco SD-WAN vManage Software Arbitrary File Creation Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vmanage-escalation-jhqs5skf | Cisco SD-WAN vManage Software Privilege Escalation Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vmanage-escalation-Jhqs5Skf | Cisco SD-WAN vManage Software Privilege Escalation Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vman-traversal-hqh24tmk | Cisco SD-WAN vManage Software Directory Traversal Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-23266 | NVIDIA Container Toolkit for all platforms contains a vulnerability in some hooks used to initialize the container, where an attacker could execute arbitrary code with elevated permissions. A successful exploit of this vulnerability might lead to escalation of privileges, data tampering, information disclosure, and denial of service. | 2025-07-02T00:00:00.000Z | 2025-09-04T04:21:49.000Z |
| msrc_cve-2022-49063 | ice: arfs: fix use-after-free when freeing @rx_cpu_rmap | 2025-02-02T00:00:00.000Z | 2025-09-04T04:20:29.000Z |
| msrc_cve-2018-19416 | An issue was discovered in sysstat 12.1.1. The remap_struct function in sa_common.c has an out-of-bounds read during a memmove call, as demonstrated by sadf. | 2018-11-02T00:00:00.000Z | 2025-09-04T04:18:37.000Z |
| msrc_cve-2025-38576 | powerpc/eeh: Make EEH driver device hotplug safe | 2025-08-02T00:00:00.000Z | 2025-09-04T04:15:21.000Z |
| msrc_cve-2022-49465 | blk-throttle: Set BIO_THROTTLED when bio has been throttled | 2025-02-02T00:00:00.000Z | 2025-09-04T04:15:17.000Z |
| msrc_cve-2024-57259 | sqfs_search_dir in Das U-Boot before 2025.01-rc1 exhibits an off-by-one error and resultant heap memory corruption for squashfs directory listing because the path separator is not considered in a size calculation. | 2025-02-02T00:00:00.000Z | 2025-09-04T04:14:59.000Z |
| msrc_cve-2025-4878 | Libssh: use of uninitialized variable in privatekey_from_file() | 2025-07-02T00:00:00.000Z | 2025-09-04T04:13:58.000Z |
| msrc_cve-2023-24539 | Improper sanitization of CSS values in html/template | 2023-05-01T00:00:00.000Z | 2025-09-04T04:09:59.000Z |
| msrc_cve-2025-50200 | RabbitMQ Node can log Basic Auth header from an HTTP request | 2025-06-02T00:00:00.000Z | 2025-09-04T04:09:13.000Z |
| msrc_cve-2025-54314 | Thor before 1.4.0 can construct an unsafe shell command from library input. NOTE: this is disputed by the Supplier because "the method that was fixed can only be used with arguments that are controlled by Thor, and there is no way an attacker can take control of those arguments." | 2025-07-02T00:00:00.000Z | 2025-09-04T04:06:48.000Z |
| msrc_cve-2025-38561 | ksmbd: fix Preauh_HashValue race condition | 2025-08-02T00:00:00.000Z | 2025-09-04T04:06:25.000Z |
| msrc_cve-2025-40914 | Perl CryptX before version 0.087 contains a dependency that may be susceptible to an integer overflow | 2025-06-02T00:00:00.000Z | 2025-09-04T04:05:27.000Z |
| msrc_cve-2025-38601 | wifi: ath11k: clear initialized flag for deinit-ed srng lists | 2025-08-02T00:00:00.000Z | 2025-09-04T04:02:55.000Z |
| msrc_cve-2025-7783 | Usage of unsafe random function in form-data for choosing boundary | 2025-07-02T00:00:00.000Z | 2025-09-04T04:02:28.000Z |
| msrc_cve-2021-28216 | BootPerformanceTable pointer is read from an NVRAM variable in PEI. Recommend setting PcdFirmwarePerformanceDataTableS3Support to FALSE. | 2021-08-02T00:00:00.000Z | 2025-09-04T04:00:29.000Z |
| msrc_cve-2022-49535 | scsi: lpfc: Fix null pointer dereference after failing to issue FLOGI and PLOGI | 2025-02-02T00:00:00.000Z | 2025-09-04T03:58:29.000Z |
| msrc_cve-2025-6141 | GNU ncurses parse_entry.c postprocess_termcap stack-based overflow | 2025-06-02T00:00:00.000Z | 2025-09-04T03:58:14.000Z |
| msrc_cve-2025-38568 | net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing | 2025-08-02T00:00:00.000Z | 2025-09-04T03:57:06.000Z |
| msrc_cve-2024-1552 | Incorrect code generation could have led to unexpected numeric conversions and potential undefined behavior.*Note:* This issue only affects 32-bit ARM devices. This vulnerability affects Firefox < 123, Firefox ESR < 115.8, and Thunderbird < 115.8. | 2024-02-02T08:00:00.000Z | 2025-09-04T03:56:01.000Z |
| msrc_cve-2019-16707 | Hunspell 1.7.0 has an invalid read operation in SuggestMgr::leftcommonsubstring in suggestmgr.cxx. | 2019-09-02T00:00:00.000Z | 2025-09-04T03:53:50.000Z |
| msrc_cve-2025-38581 | crypto: ccp - Fix crash when rebind ccp device for ccp.ko | 2025-08-02T00:00:00.000Z | 2025-09-04T03:53:45.000Z |
| msrc_cve-2024-38628 | usb: gadget: u_audio: Fix race condition use of controls after free during gadget unbind. | 2024-06-02T07:00:00.000Z | 2025-09-04T03:53:18.000Z |
| msrc_cve-2025-7395 | Domain Name Validation Bypass with Apple Native Certificate Validation | 2025-07-02T00:00:00.000Z | 2025-09-04T03:52:58.000Z |
| msrc_cve-2024-57255 | An integer overflow in sqfs_resolve_symlink in Das U-Boot before 2025.01-rc1 occurs via a crafted squashfs filesystem with an inode size of 0xffffffff, resulting in a malloc of zero and resultant memory overwrite. | 2025-02-02T00:00:00.000Z | 2025-09-04T03:52:20.000Z |
| msrc_cve-2025-38612 | staging: fbtft: fix potential memory leak in fbtft_framebuffer_alloc() | 2025-08-02T00:00:00.000Z | 2025-09-04T03:51:07.000Z |
| msrc_cve-2024-53177 | smb: prevent use-after-free due to open_cached_dir error paths | 2024-12-02T00:00:00.000Z | 2025-09-04T03:50:05.000Z |
| msrc_cve-2021-28210 | An unlimited recursion in DxeCore in EDK II. | 2021-06-02T00:00:00.000Z | 2025-09-04T03:47:50.000Z |
| msrc_cve-2025-38563 | perf/core: Prevent VMA split of buffer mappings | 2025-08-02T00:00:00.000Z | 2025-09-04T03:47:38.000Z |
| msrc_cve-2025-7394 | In the OpenSSL compatibility layer implementation, the function RAND_poll() was not behaving as expected and leading to the potential for predictable values returned from RAND_bytes() after fork() is called. This can lead to weak or predictable random numbers generated in applications that are both using RAND_bytes() and doing fork() operations. This only affects applications explicitly calling RAND_bytes() after fork() and does not affect any internal TLS operations. Although RAND_bytes() documentation in OpenSSL calls out not being safe for use with fork() without first calling RAND_poll(), an additional code change was also made in wolfSSL to make RAND_bytes() behave similar to OpenSSL after a fork() call without calling RAND_poll(). Now the Hash-DRBG used gets reseeded after detecting running in a new process. If making use of RAND_bytes() and calling fork() we recommend updating to the latest version of wolfSSL. Thanks to Per Allansson from Appgate for the report. | 2025-07-02T00:00:00.000Z | 2025-09-04T03:46:05.000Z |
| msrc_cve-2024-57984 | i3c: dw: Fix use-after-free in dw_i3c_master driver due to race condition | 2025-02-02T00:00:00.000Z | 2025-09-04T03:45:33.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:14024-1 | kernel-firmware-nvidia-gspx-G06-550.90.07-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14023-1 | go1.21-1.21.11-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14022-1 | freerdp2-2.11.7-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14021-1 | cJSON-devel-1.7.18-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14020-1 | go1.22-1.22.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14019-1 | skopeo-1.15.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14018-1 | plasma6-session-6.0.5-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14017-1 | liblzma5-32bit-5.6.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14016-1 | libhtp-devel-0.5.48-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14015-1 | gitleaks-8.18.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14014-1 | caddy-2.8.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14013-1 | chromedriver-125.0.6422.141-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14012-1 | system-user-velociraptor-1.0.0-9.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14011-1 | minidlna-1.3.3-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14010-1 | ffmpeg-5-5.1.4-8.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14009-1 | cargo-audit-advisory-db-20240528-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14008-1 | squid-6.9-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14007-1 | jupyter-plotly-5.22.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14006-1 | libQt5NetworkAuth5-5.15.13+kde1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14005-1 | gstreamer-plugins-base-1.24.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14004-1 | chromedriver-125.0.6422.112-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14003-1 | libQt6NetworkAuth6-6.7.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14002-1 | gnome-remote-desktop-46.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14001-1 | libQt5Pdf5-5.15.17-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:14000-1 | traefik-3.0.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13999-1 | python310-requests-2.32.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13998-1 | java-21-openj9-21.0.3.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13997-1 | java-1_8_0-openj9-1.8.0.412-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13996-1 | java-17-openj9-17.0.11.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13995-1 | java-11-openj9-11.0.23.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gradle-2023-26053 | Gradle usage of long IDs for PGP keys opens potential for collision attacks | 2024-03-06T10:53:14.075Z | 2025-05-20T10:02:07.006Z |
| bit-gradle-2022-31156 | Gradle's dependency verification can ignore checksum verification when signature verification cannot be performed | 2024-03-06T10:53:24.270Z | 2025-05-20T10:02:07.006Z |
| bit-gradle-2022-23630 | Dependency verification bypass in Gradle | 2024-03-06T10:53:42.475Z | 2025-05-20T10:02:07.006Z |
| bit-gradle-2021-32751 | Arbitrary code execution via specially crafted environment variables | 2024-03-06T10:54:32.701Z | 2025-05-20T10:02:07.006Z |
| bit-gradle-2021-29429 | Information disclosure through temporary directory permissions | 2024-03-06T10:54:42.788Z | 2025-05-20T10:02:07.006Z |
| bit-gradle-2021-29428 | Local privilege escalation through system temporary directory | 2024-03-06T10:54:54.311Z | 2025-05-20T10:02:07.006Z |
| bit-gradle-2021-29427 | Repository content filters do not work in Settings pluginManagement | 2024-03-06T10:55:05.977Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2025-22871 | Request smuggling due to acceptance of invalid chunked data in net/http | 2025-04-10T07:19:26.353Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2025-22866 | Timing sidechannel for P-256 on ppc64le in crypto/internal/nistec | 2025-02-08T07:13:28.235Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2024-45341 | Usage of IPv6 zone IDs can bypass URI name constraints in crypto/x509 | 2025-01-30T19:13:14.453Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2024-45336 | Sensitive headers incorrectly sent after cross-domain redirect in net/http | 2025-01-30T19:13:32.933Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2024-34158 | Stack exhaustion in Parse in go/build/constraint | 2024-09-10T07:06:15.527Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2024-34156 | Stack exhaustion in Decoder.Decode in encoding/gob | 2024-09-10T07:06:29.133Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2024-34155 | Stack exhaustion in all Parse functions in go/parser | 2024-09-10T07:06:41.834Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2024-24791 | Denial of service due to improper 100-continue handling in net/http | 2024-07-04T07:19:32.455Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2024-24790 | Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses in net/netip | 2024-06-07T07:18:59.012Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2024-24789 | Mishandling of corrupt central directory record in archive/zip | 2024-06-07T07:19:15.112Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2024-24788 | Malformed DNS message can cause infinite loop in net | 2024-05-14T07:18:19.682Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2024-24787 | Arbitrary code execution during build on Darwin in cmd/go | 2024-05-14T07:18:33.392Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2024-24785 | Errors returned from JSON marshaling may break template escaping in html/template | 2024-03-12T08:24:09.179Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2024-24784 | Comments in display names are incorrectly handled in net/mail | 2024-03-12T08:24:22.172Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2024-24783 | Verify panics on certificates with an unknown public key algorithm in crypto/x509 | 2024-03-12T08:24:32.786Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2023-45290 | Memory exhaustion in multipart form parsing in net/textproto and net/http | 2024-03-12T08:24:42.484Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2023-45289 | Incorrect forwarding of sensitive headers and cookies on HTTP redirect in net/http | 2024-03-12T08:24:51.862Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2023-45287 | Before Go 1.20, the RSA based key exchange methods in crypto/tls may exhibit a timing side channel | 2024-03-06T10:52:27.963Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2023-45285 | Command 'go get' may unexpectedly fallback to insecure git in cmd/go | 2024-03-06T10:52:37.296Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2023-45284 | Incorrect detection of reserved device names on Windows in path/filepath | 2024-03-06T10:52:50.966Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2023-45283 | Insecure parsing of Windows paths with a \??\ prefix in path/filepath | 2024-03-06T10:53:03.789Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2023-39326 | Denial of service via chunk extensions in net/http | 2024-03-06T10:53:23.071Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2023-39325 | HTTP/2 rapid reset can cause excessive work in net/http | 2024-03-06T10:53:35.567Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|---|---|
| var-202309-0334 | D-Link DIR-3040 HTTP Request Processing Referer Stack-Based Buffer Overflow Remote Code E… | 2024-05-04T22:41:53.147000Z |
| var-202309-0327 | D-Link DIR-3040 prog.cgi SetSysEmailSettings Stack-Based Buffer Overflow Remote Code Exec… | 2024-05-04T22:41:53.235000Z |
| var-202309-0326 | D-Link DIR-3040 HTTP Request Processing Referer Heap-Based Buffer Overflow Remote Code Ex… | 2024-05-04T22:41:53.304000Z |
| var-202309-0320 | D-Link DIR-3040 prog.cgi SetDynamicDNSSettings Stack-Based Buffer Overflow Remote Code Ex… | 2024-05-04T22:41:53.200000Z |
| var-202309-0319 | D-Link DIR-3040 prog.cgi SetIPv6PppoeSettings Stack-Based Buffer Overflow Remote Code Exe… | 2024-05-04T22:41:53.166000Z |
| var-202309-0313 | D-Link DIR-3040 prog.cgi SetWan3Settings Stack-Based Buffer Overflow Remote Code Executio… | 2024-05-04T22:41:53.091000Z |
| var-202309-0312 | D-Link DIR-3040 prog.cgi SetTriggerPPPoEValidate Stack-Based Buffer Overflow Remote Code … | 2024-05-04T22:41:53.218000Z |
| var-202309-0299 | D-Link DIR-3040 prog.cgi SetDeviceSettings Stack-Based Buffer Overflow Remote Code Execut… | 2024-05-04T22:41:53.287000Z |
| var-202309-0293 | D-Link DIR-3040 prog.cgi SetQuickVPNSettings PSK Stack-Based Buffer Overflow Remote Code … | 2024-05-04T22:41:53.269000Z |
| var-202309-0284 | D-Link DIR-3040 prog.cgi SetWan2Settings Stack-Based Buffer Overflow Remote Code Executio… | 2024-05-04T22:41:53.110000Z |
| var-202309-0280 | D-Link DIR-3040 prog.cgi SetQuickVPNSettings Password Stack-Based Buffer Overflow Remote … | 2024-05-04T22:41:53.074000Z |
| var-202309-0279 | D-Link DIR-3040 prog.cgi SetMyDLinkRegistration Stack-Based Buffer Overflow Remote Code E… | 2024-05-04T22:41:53.323000Z |
| var-202305-2757 | Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Remote Code Execution Vu… | 2024-05-03T23:05:37.830000Z |
| var-202305-2736 | Fatek Automation FvDesigner FPJ File Parsing Uninitialized Pointer Remote Code Execution … | 2024-05-03T23:05:37.845000Z |
| var-202305-2835 | Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Remote Code Execution Vu… | 2024-05-03T23:04:09.140000Z |
| var-202305-2813 | Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Remote Code Execution Vu… | 2024-05-03T23:04:09.155000Z |
| var-202305-2771 | Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Remote Code Execution Vu… | 2024-05-03T23:04:09.173000Z |
| var-202305-2834 | Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Remote Code Execution Vu… | 2024-05-03T23:01:36.962000Z |
| var-202305-2800 | Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Remote Code Execution Vu… | 2024-05-03T22:58:30.649000Z |
| var-202305-2758 | Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Remote Code Execution Vu… | 2024-05-03T22:58:30.665000Z |
| var-202311-0659 | TP-Link TL-WR841N ated_tp Command Injection Remote Code Execution Vulnerability. This vul… | 2024-05-03T22:58:29.667000Z |
| var-202305-2747 | Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Remote Code Execution Vu… | 2024-05-03T22:54:18.175000Z |
| var-202312-0648 | TP-Link TL-WR841N dropbearpwd Improper Authentication Information Disclosure Vulnerabilit… | 2024-05-03T22:54:16.948000Z |
| var-202305-2782 | Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Remote Code Execution Vu… | 2024-05-03T22:53:50.051000Z |
| var-202308-3086 | ASUS RT-AX92U lighttpd mod_webdav.so SQL Injection Information Disclosure Vulnerability. … | 2024-05-03T22:53:49.264000Z |
| var-202305-2820 | Fatek Automation FvDesigner FPJ File Parsing Out-Of-Bounds Write Remote Code Execution Vu… | 2024-05-03T22:46:14.697000Z |
| var-202404-2098 | Fortinet FortiSandbox is an APT (Advanced Persistent Threat) protection device from Forti… | 2024-05-01T22:53:25.906000Z |
| var-202404-1866 | A vulnerability in the web-based management interface of Cisco Small Business RV016, RV04… | 2024-04-30T22:36:12.980000Z |
| var-200110-0211 | OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a de… | 2024-04-30T19:15:10.457000Z |
| var-202404-0331 | TP-LINK AC1350 is a router from China's TP-LINK company. TP-LINK AC1350 has a security v… | 2024-04-29T23:10:40.448000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2013-000012 | NEC Universal RAID Utility fails to restrict access permissions | 2013-02-21T13:54+09:00 | 2013-03-01T11:34+09:00 |
| jvndb-2013-000014 | dopvSTAR* vulnerable to cross-site scripting | 2013-02-28T13:46+09:00 | 2013-02-28T13:46+09:00 |
| jvndb-2013-000013 | dopvCOMET* vulnerable to cross-site scripting | 2013-02-28T13:37+09:00 | 2013-02-28T13:37+09:00 |
| jvndb-2013-000015 | Multiple JustSystems products vulnerable to arbitrary code execution | 2013-02-26T14:45+09:00 | 2013-02-26T14:45+09:00 |
| jvndb-2013-001605 | Multiple vulnerabilities in Hitachi Tuning Manager and JP1/Performance Management | 2013-02-22T20:09+09:00 | 2013-02-22T20:09+09:00 |
| jvndb-2012-000113 | concrete5 vulnerable to cross-site scripting | 2012-12-21T12:41+09:00 | 2013-02-20T16:10+09:00 |
| jvndb-2013-000011 | 3DM (3ware Disk Manager) vulnerable to directory traversal | 2013-02-15T14:29+09:00 | 2013-02-15T14:29+09:00 |
| jvndb-2013-000010 | GREE for Android vulnerable to directory traversal | 2013-02-14T14:15+09:00 | 2013-02-14T14:15+09:00 |
| jvndb-2013-000009 | imgboard vulnerable to cross-site scripting | 2013-02-14T14:10+09:00 | 2013-02-14T14:10+09:00 |
| jvndb-2013-001470 | Accela BizSearch Gateway Option for TeamWARE Spoofing Vulnerability | 2013-02-13T16:47+09:00 | 2013-02-13T16:47+09:00 |
| jvndb-2013-001321 | User Authentication Vulnerability in Operational Management Function of Cosminexus | 2013-02-12T14:24+09:00 | 2013-02-12T14:24+09:00 |
| jvndb-2013-000007 | Cybozu Garoon vulnerable to SQL injection | 2013-02-08T13:58+09:00 | 2013-02-08T13:58+09:00 |
| jvndb-2013-000008 | Cybozu Garoon vulnerable to cross-site scripting | 2013-02-08T13:53+09:00 | 2013-02-08T13:53+09:00 |
| jvndb-2013-000006 | mora Downloader may insecurely load executable files | 2013-02-07T14:00+09:00 | 2013-02-07T14:00+09:00 |
| jvndb-2013-000005 | Weathernews Touch for Android stores location information in the system log file | 2013-01-31T13:38+09:00 | 2013-01-31T13:38+09:00 |
| jvndb-2013-000004 | WebSphere Application Server (WAS) vulnerable to cross-site scripting | 2013-01-25T12:32+09:00 | 2013-01-25T12:32+09:00 |
| jvndb-2013-000003 | myu-s / PHP WeblogSystem by netmania vulnerable to cross-site scripting | 2013-01-22T15:22+09:00 | 2013-01-22T15:22+09:00 |
| jvndb-2013-000002 | Documents Pro (formerly Files HD) vulnerable to directory traversal | 2013-01-18T13:39+09:00 | 2013-01-18T13:39+09:00 |
| jvndb-2013-000001 | Documents Pro (formerly Files HD) vulnerable to cross-site scripting | 2013-01-18T13:36+09:00 | 2013-01-18T13:36+09:00 |
| jvndb-2012-005827 | Cross-site Scripting Vulnerability in Collaboration - Bulletin board in Multiple Hitachi Products | 2012-12-28T16:43+09:00 | 2012-12-28T16:43+09:00 |
| jvndb-2012-000112 | Opera Mini / Opera Mobile for Android vulnerable in the WebView class | 2012-12-20T15:04+09:00 | 2012-12-28T16:13+09:00 |
| jvndb-2012-000063 | Python SimpleHTTPServer vulnerable to cross-site scripting | 2012-06-19T14:38+09:00 | 2012-12-26T18:01+09:00 |
| jvndb-2011-002111 | Samba Web Administration Tool vulnerable to cross-site scripting | 2011-08-26T17:14+09:00 | 2012-12-26T11:42+09:00 |
| jvndb-2011-002110 | Samba Web Administration Tool vulnerable to cross-site request forgery | 2011-08-26T17:12+09:00 | 2012-12-26T11:37+09:00 |
| jvndb-2012-000115 | Loctouch for Android information management vulnerability | 2012-12-21T12:37+09:00 | 2012-12-21T12:37+09:00 |
| jvndb-2012-000114 | Loctouch for Android vulnerable in handling of implicit intents | 2012-12-21T12:29+09:00 | 2012-12-21T12:29+09:00 |
| jvndb-2012-000111 | Boat Browser / Boat Browser Mini vulnerable in the WebView class | 2012-12-20T15:00+09:00 | 2012-12-20T15:00+09:00 |
| jvndb-2012-000110 | WikkaWiki vulnerable to cross-site scripting | 2012-12-17T12:23+09:00 | 2012-12-17T12:23+09:00 |
| jvndb-2012-000109 | Welcart vulnerable to cross-site request forgery | 2012-12-14T12:52+09:00 | 2012-12-14T12:52+09:00 |
| jvndb-2012-000108 | Welcart vulnerable to cross-site scripting | 2012-12-14T12:50+09:00 | 2012-12-14T12:50+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:20451-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 | 2025-06-24T14:48:35Z | 2025-06-24T14:48:35Z |
| suse-su-2025:20434-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 | 2025-06-24T14:48:35Z | 2025-06-24T14:48:35Z |
| suse-su-2025:02096-1 | Security update for the Linux Kernel (Live Patch 60 for SLE 12 SP5) | 2025-06-24T14:33:45Z | 2025-06-24T14:33:45Z |
| suse-su-2025:02095-1 | Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5) | 2025-06-24T14:33:39Z | 2025-06-24T14:33:39Z |
| suse-ru-2025:02093-1 | Recommended update for podman | 2025-06-24T13:45:28Z | 2025-06-24T13:45:28Z |
| suse-ru-2025:02092-1 | Recommended update for podman | 2025-06-24T13:44:40Z | 2025-06-24T13:44:40Z |
| suse-ru-2025:02091-1 | Recommended update for podman | 2025-06-24T13:44:12Z | 2025-06-24T13:44:12Z |
| suse-su-2025:02090-1 | Security update for the Linux Kernel (Live Patch 65 for SLE 12 SP5) | 2025-06-24T12:34:03Z | 2025-06-24T12:34:03Z |
| suse-su-2025:02089-1 | Security update for python311 | 2025-06-24T12:08:17Z | 2025-06-24T12:08:17Z |
| suse-su-2025:02088-1 | Security update for webkit2gtk3 | 2025-06-24T12:06:18Z | 2025-06-24T12:06:18Z |
| suse-su-2025:0063-1 | Security update for gstreamer-plugins-good | 2025-06-24T12:03:30Z | 2025-06-24T12:03:30Z |
| suse-su-2025:00063-1 | Security update for gstreamer-plugins-good | 2025-06-24T12:03:30Z | 2025-06-24T12:03:30Z |
| suse-su-2025:02087-1 | Security update for the Linux Kernel (Live Patch 64 for SLE 12 SP5) | 2025-06-24T11:33:56Z | 2025-06-24T11:33:56Z |
| suse-su-2025:02082-1 | Security update for pam-config | 2025-06-24T10:28:56Z | 2025-06-24T10:28:56Z |
| suse-su-2025:02081-1 | Security update for pam-config | 2025-06-24T10:26:44Z | 2025-06-24T10:26:44Z |
| suse-su-2025:02080-1 | Security update for pam-config | 2025-06-24T10:26:24Z | 2025-06-24T10:26:24Z |
| suse-su-2025:02079-1 | Security update for icu | 2025-06-24T10:24:22Z | 2025-06-24T10:24:22Z |
| suse-su-2025:02077-1 | Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP6) | 2025-06-24T09:33:58Z | 2025-06-24T09:33:58Z |
| suse-su-2025:02076-1 | Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6) | 2025-06-24T09:33:54Z | 2025-06-24T09:33:54Z |
| suse-su-2025:02075-1 | Security update for the Linux Kernel (Live Patch 59 for SLE 12 SP5) | 2025-06-24T09:03:59Z | 2025-06-24T09:03:59Z |
| suse-su-2025:20445-1 | Security update for python-tornado6 | 2025-06-24T08:53:22Z | 2025-06-24T08:53:22Z |
| suse-su-2025:02074-1 | Security update for python313 | 2025-06-24T07:26:36Z | 2025-06-24T07:26:36Z |
| suse-su-2025:02073-1 | Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP6) | 2025-06-23T21:20:29Z | 2025-06-23T21:20:29Z |
| suse-su-2025:02072-1 | Security update for the Linux Kernel RT (Live Patch 6 for SLE 15 SP6) | 2025-06-23T20:03:58Z | 2025-06-23T20:03:58Z |
| suse-su-2025:02071-1 | Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP6) | 2025-06-23T20:03:55Z | 2025-06-23T20:03:55Z |
| suse-su-2025:02070-1 | Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP6) | 2025-06-23T20:03:51Z | 2025-06-23T20:03:51Z |
| suse-su-2025:02069-1 | Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6) | 2025-06-23T16:04:03Z | 2025-06-23T16:04:03Z |
| suse-su-2025:20450-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 | 2025-06-23T15:27:40Z | 2025-06-23T15:27:40Z |
| suse-su-2025:20431-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 | 2025-06-23T15:27:40Z | 2025-06-23T15:27:40Z |
| suse-su-2025:20430-1 | Security update for python-tornado6 | 2025-06-23T13:44:42Z | 2025-06-23T13:44:42Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-27468 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4拒绝服务漏洞 | 2025-11-05 | 2025-11-10 |
| cnvd-2025-27467 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4存在未明漏洞 | 2025-11-05 | 2025-11-10 |
| cnvd-2025-27466 | Azure Access Technology BLU-IC2和Azure Access Technology BLU-IC4越界写入漏洞 | 2025-11-05 | 2025-11-10 |
| cnvd-2025-27465 | Fortinet FortiSIEM跨站脚本漏洞(CNVD-2025-27465) | 2025-02-17 | 2025-11-10 |
| cnvd-2025-27464 | Fortinet FortiSandbox操作系统命令注入漏洞 | 2025-03-14 | 2025-11-10 |
| cnvd-2025-27463 | Fortinet FortiADC跨站脚本漏洞(CNVD-2025-27463) | 2025-03-14 | 2025-11-10 |
| cnvd-2025-27462 | Fortinet FortiManager和Fortinet FortiManager Cloud命令注入漏洞 | 2025-03-21 | 2025-11-10 |
| cnvd-2025-27461 | Fortinet FortiWeb路径遍历漏洞 | 2025-04-18 | 2025-11-10 |
| cnvd-2025-27460 | Fortinet FortiOS缓冲区溢出漏洞 | 2025-07-16 | 2025-11-10 |
| cnvd-2025-27459 | Foxit PDF Reader缓冲区溢出漏洞(CNVD-2025-27459) | 2025-08-20 | 2025-11-10 |
| cnvd-2025-27458 | IBM Watson Studio on Cloud Pak for Data跨站脚本漏洞 | 2025-08-31 | 2025-11-10 |
| cnvd-2025-27457 | IBM App Connect Enterprise Certified Container日志信息泄露漏洞 | 2025-09-02 | 2025-11-10 |
| cnvd-2025-27456 | Foxit PDF Reader缓冲区溢出漏洞(CNVD-2025-27456) | 2025-09-04 | 2025-11-10 |
| cnvd-2025-27455 | Foxit PDF Reader代码问题漏洞(CNVD-2025-27455) | 2025-09-04 | 2025-11-10 |
| cnvd-2025-27452 | Fortinet FortiClientMAC资源管理错误漏洞 | 2025-10-17 | 2025-11-10 |
| cnvd-2025-27451 | Fortinet FortiClientMac代码注入漏洞 | 2025-10-17 | 2025-11-10 |
| cnvd-2025-27450 | IBM Standards Processing Engine反序列化漏洞 | 2025-10-21 | 2025-11-10 |
| cnvd-2025-27449 | IBM Planning Analytics Local跨站脚本漏洞 | 2025-10-21 | 2025-11-10 |
| cnvd-2025-27448 | NVIDIA Display Driver代码问题漏洞 | 2025-10-21 | 2025-11-10 |
| cnvd-2025-27447 | IBM QRadar SIEM权限提升漏洞 | 2025-10-31 | 2025-11-10 |
| cnvd-2025-27446 | IBM QRadar SIEM跨站脚本漏洞(CNVD-2025-27446) | 2025-10-31 | 2025-11-10 |
| cnvd-2025-27445 | IBM OpenPages跨站脚本漏洞 | 2025-10-31 | 2025-11-10 |
| cnvd-2025-27444 | TOTOLINK A3300R lang参数缓冲区溢出漏洞 | 2025-10-31 | 2025-11-10 |
| cnvd-2025-27443 | TOTOLINK A3300R enable参数缓冲区溢出漏洞 | 2025-10-31 | 2025-11-10 |
| cnvd-2025-27442 | Tenda CH22 fromSafeMacFilter函数缓冲区溢出漏洞 | 2025-10-31 | 2025-11-10 |
| cnvd-2025-27441 | Tenda CH22 fromSafeClientFilter函数缓冲区溢出漏洞 | 2025-10-31 | 2025-11-10 |
| cnvd-2025-27440 | Tenda CH22 fromP2pListFilter函数缓冲区溢出漏洞 | 2025-10-31 | 2025-11-10 |
| cnvd-2025-27454 | fortinet FortiVoice操作系统命令注入漏洞 | 2025-10-16 | 2025-11-07 |
| cnvd-2025-27453 | fortinet FortiAnalyzer授权问题漏洞 | 2025-10-16 | 2025-11-07 |
| cnvd-2025-27339 | WordPress Qi Blocks plugin缺失授权漏洞 | 2025-11-05 | 2025-11-07 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0070 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-01-24T00:00:00.000000 | 2025-01-24T00:00:00.000000 |
| certfr-2025-avi-0069 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-01-24T00:00:00.000000 | 2025-01-24T00:00:00.000000 |
| certfr-2025-avi-0068 | Vulnérabilité dans ClamAV | 2025-01-24T00:00:00.000000 | 2025-01-24T00:00:00.000000 |
| certfr-2025-avi-0067 | Multiples vulnérabilités dans Qnap HBS 3 Hybrid Backup Sync | 2025-01-24T00:00:00.000000 | 2025-01-24T00:00:00.000000 |
| CERTFR-2025-AVI-0071 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-01-24T00:00:00.000000 | 2025-01-24T00:00:00.000000 |
| CERTFR-2025-AVI-0070 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-01-24T00:00:00.000000 | 2025-01-24T00:00:00.000000 |
| CERTFR-2025-AVI-0069 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-01-24T00:00:00.000000 | 2025-01-24T00:00:00.000000 |
| CERTFR-2025-AVI-0068 | Vulnérabilité dans ClamAV | 2025-01-24T00:00:00.000000 | 2025-01-24T00:00:00.000000 |
| CERTFR-2025-AVI-0067 | Multiples vulnérabilités dans Qnap HBS 3 Hybrid Backup Sync | 2025-01-24T00:00:00.000000 | 2025-01-24T00:00:00.000000 |
| certfr-2025-avi-0066 | Vulnérabilité dans Sonicwall Secure Mobile Access | 2025-01-23T00:00:00.000000 | 2025-01-23T00:00:00.000000 |
| certfr-2025-avi-0065 | Multiples vulnérabilités dans les produits Mitel | 2025-01-23T00:00:00.000000 | 2025-01-23T00:00:00.000000 |
| certfr-2025-avi-0064 | Multiples vulnérabilités dans les produits Cisco | 2025-01-23T00:00:00.000000 | 2025-01-23T00:00:00.000000 |
| certfr-2025-avi-0062 | Multiples vulnérabilités dans les produits Elastic | 2025-01-23T00:00:00.000000 | 2025-01-23T00:00:00.000000 |
| certfr-2025-avi-0061 | Multiples vulnérabilités dans Google Chrome | 2025-01-23T00:00:00.000000 | 2025-01-23T00:00:00.000000 |
| CERTFR-2025-AVI-0066 | Vulnérabilité dans Sonicwall Secure Mobile Access | 2025-01-23T00:00:00.000000 | 2025-01-23T00:00:00.000000 |
| CERTFR-2025-AVI-0065 | Multiples vulnérabilités dans les produits Mitel | 2025-01-23T00:00:00.000000 | 2025-01-23T00:00:00.000000 |
| CERTFR-2025-AVI-0064 | Multiples vulnérabilités dans les produits Cisco | 2025-01-23T00:00:00.000000 | 2025-01-23T00:00:00.000000 |
| CERTFR-2025-AVI-0062 | Multiples vulnérabilités dans les produits Elastic | 2025-01-23T00:00:00.000000 | 2025-01-23T00:00:00.000000 |
| CERTFR-2025-AVI-0061 | Multiples vulnérabilités dans Google Chrome | 2025-01-23T00:00:00.000000 | 2025-01-23T00:00:00.000000 |
| certfr-2025-avi-0060 | Multiples vulnérabilités dans Node.js | 2025-01-22T00:00:00.000000 | 2025-01-22T00:00:00.000000 |
| certfr-2025-avi-0059 | Multiples vulnérabilités dans les produits Atlassian | 2025-01-22T00:00:00.000000 | 2025-01-22T00:00:00.000000 |
| certfr-2025-avi-0058 | Multiples vulnérabilités dans Oracle Weblogic | 2025-01-22T00:00:00.000000 | 2025-01-22T00:00:00.000000 |
| certfr-2025-avi-0057 | Multiples vulnérabilités dans Oracle Virtualization | 2025-01-22T00:00:00.000000 | 2025-01-22T00:00:00.000000 |
| certfr-2025-avi-0056 | Vulnérabilité dans Oracle Systems | 2025-01-22T00:00:00.000000 | 2025-01-22T00:00:00.000000 |
| certfr-2025-avi-0055 | Multiples vulnérabilités dans Oracle PeopleSoft | 2025-01-22T00:00:00.000000 | 2025-01-22T00:00:00.000000 |
| certfr-2025-avi-0054 | Multiples vulnérabilités dans Oracle MySQL | 2025-01-22T00:00:00.000000 | 2025-01-22T00:00:00.000000 |
| certfr-2025-avi-0053 | Multiples vulnérabilités dans Oracle Java SE | 2025-01-22T00:00:00.000000 | 2025-01-22T00:00:00.000000 |
| certfr-2025-avi-0052 | Multiples vulnérabilités dans Oracle Database Server | 2025-01-22T00:00:00.000000 | 2025-01-22T00:00:00.000000 |
| certfr-2025-avi-0051 | Multiples vulnérabilités dans phpMyAdmin | 2025-01-22T00:00:00.000000 | 2025-01-22T00:00:00.000000 |
| CERTFR-2025-AVI-0060 | Multiples vulnérabilités dans Node.js | 2025-01-22T00:00:00.000000 | 2025-01-22T00:00:00.000000 |