Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-67967 |
7.6 (3.1)
|
WordPress Lawyer Directory plugin <= 1.3.3 - Broken Ac… |
e-plugins |
Lawyer Directory |
2026-01-22T16:51:58.716Z | 2026-01-28T23:55:02.454Z |
| CVE-2025-69102 |
7.1 (3.1)
|
WordPress WP Test Email plugin <= 1.1.7 - Reflected Cr… |
Boopathi Rajan |
WP Test Email |
2026-01-22T16:52:27.736Z | 2026-01-28T23:53:20.952Z |
| CVE-2025-68019 |
6.5 (3.1)
|
WordPress SEO Booster plugin <= 6.1.8 - Broken Access … |
cleverplugins |
SEO Booster |
2026-01-22T16:52:04.172Z | 2026-01-28T23:51:35.017Z |
| CVE-2024-52807 |
8.6 (3.1)
|
XXE vulnerability in XSLT parsing in `org.hl7.fhir.pub… |
HL7 |
fhir-ig-publisher |
2025-01-24T18:34:23.255Z | 2026-01-28T23:21:13.318Z |
| CVE-2025-59843 |
6.9 (4.0)
|
FlagForgeCTF Exposes User Emails via Public /api/user/… |
FlagForgeCTF |
flagForge |
2025-09-26T16:03:34.038Z | 2026-01-28T23:11:20.765Z |
| CVE-2025-61777 |
9.4 (3.1)
|
FlagForge Allows Unauthenticated Badge Template API Access |
FlagForgeCTF |
flagForge |
2025-10-06T16:44:27.713Z | 2026-01-28T23:09:53.135Z |
| CVE-2025-14625 |
5.4 (4.0)
6.7 (3.1)
|
Quartus® Prime Standard and Quartus® Prime Lite Securi… |
Altera |
Quartus Prime Standard |
2026-01-06T21:42:28.480Z | 2026-01-28T22:28:10.748Z |
| CVE-2025-31135 |
5.3 (3.1)
|
Go-Guerrilla SMTP Daemon allows the PROXY command to b… |
phires |
go-guerrilla |
2025-04-01T22:03:09.405Z | 2026-01-28T22:27:22.773Z |
| CVE-2026-1532 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
D-Link DCS-700L Music File Upload Service setUploadMus… |
D-Link |
DCS-700L |
2026-01-28T20:32:09.118Z | 2026-01-28T21:44:07.743Z |
| CVE-2025-69056 |
7.1 (3.1)
|
WordPress Hotel Listing plugin <= 1.4.0 - Reflected Cr… |
e-plugins |
Hotel Listing |
2026-01-22T16:52:21.460Z | 2026-01-28T21:43:10.245Z |
| CVE-2026-1533 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
code-projects Online Music Site AdminAddCategory.php s… |
code-projects |
Online Music Site |
2026-01-28T20:32:10.974Z | 2026-01-28T21:38:47.873Z |
| CVE-2026-24856 |
7.8 (3.1)
|
iccDEV has UB runtime error in <icTagTypeSignature> |
InternationalColorConsortium |
iccDEV |
2026-01-28T21:05:12.799Z | 2026-01-28T21:34:21.551Z |
| CVE-2025-68007 |
6.5 (3.1)
|
WordPress Event Espresso 4 Decaf plugin <= 5.0.37.deca… |
Event Espresso |
Event Espresso 4 Decaf |
2026-01-22T16:52:00.859Z | 2026-01-28T21:32:58.253Z |
| CVE-2025-68008 |
7.1 (3.1)
|
WordPress WP Mail plugin <= 1.3 - Reflected Cross Site… |
mndpsingh287 |
WP Mail |
2026-01-22T16:52:01.084Z | 2026-01-28T21:32:22.231Z |
| CVE-2025-68009 |
6.5 (3.1)
|
WordPress Slider Templates plugin <= 1.0.3 - Broken Ac… |
Codeless |
Slider Templates |
2026-01-22T16:52:01.425Z | 2026-01-28T21:31:38.565Z |
| CVE-2025-68010 |
7.1 (3.1)
|
WordPress Netgsm plugin <= 2.9.63 - Cross Site Scripti… |
netgsm |
Netgsm |
2026-01-22T16:52:01.876Z | 2026-01-28T21:29:36.199Z |
| CVE-2020-36970 |
6.9 (4.0)
8.4 (3.1)
|
PMB 5.6 - 'chemin' Local File Disclosure |
PMB Services |
PMB Services |
2026-01-28T17:35:11.195Z | 2026-01-28T21:29:26.284Z |
| CVE-2026-1535 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Online Music Site AdminReply.php sql injection |
code-projects |
Online Music Site |
2026-01-28T21:02:09.430Z | 2026-01-28T21:29:19.423Z |
| CVE-2025-68011 |
7.1 (3.1)
|
WordPress GLS Shipping for WooCommerce plugin <= 1.4.0… |
GLS |
GLS Shipping for WooCommerce |
2026-01-22T16:52:02.251Z | 2026-01-28T21:28:56.393Z |
| CVE-2025-68012 |
7.1 (3.1)
|
WordPress CodeColorer plugin <= 0.10.1 - Stored Cross … |
Dmytro Shteflyuk |
CodeColorer |
2026-01-22T16:52:02.470Z | 2026-01-28T21:27:30.910Z |
| CVE-2026-1534 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Online Music Site AdminEditUser.php sql … |
code-projects |
Online Music Site |
2026-01-28T21:02:07.552Z | 2026-01-28T21:25:58.336Z |
| CVE-2025-68859 |
7.1 (3.1)
|
WordPress Syntax Highlighter Compress plugin <= 3.0.83… |
agmorpheus |
Syntax Highlighter Compress |
2026-01-22T16:52:09.950Z | 2026-01-28T21:22:22.879Z |
| CVE-2025-68849 |
7.1 (3.1)
|
WordPress Quote Master plugin <= 7.1.1 - Reflected Cro… |
Frank Corso |
Quote Master |
2026-01-22T16:52:09.375Z | 2026-01-28T21:21:47.162Z |
| CVE-2026-24835 |
8.8 (4.0)
|
Podman Desktop Extension System Vulnerable to Authenti… |
podman-desktop |
podman-desktop |
2026-01-28T20:42:29.508Z | 2026-01-28T21:21:17.125Z |
| CVE-2025-13471 |
5.3 (3.1)
|
User Activity Log <= 2.2 - Unauthenticated Limited Arb… |
Unknown |
User Activity Log |
2026-01-28T06:00:03.740Z | 2026-01-28T21:20:57.958Z |
| CVE-2020-36971 |
8.4 (4.0)
8.4 (3.1)
|
Nidesoft 3GP Video Converter 2.6.18 - Local Stack Buff… |
Nidesoft |
Nidesoft 3GP Video Converter |
2026-01-28T17:35:11.554Z | 2026-01-28T21:20:44.288Z |
| CVE-2026-24910 |
5.9 (3.1)
|
In Bun before 1.3.5, the default trusted dependen… |
Bun |
Bun |
2026-01-27T22:26:26.801Z | 2026-01-28T21:19:54.515Z |
| CVE-2026-24909 |
5.9 (3.1)
|
vlt before 1.0.0-rc.10 mishandles path sanitizati… |
vlt |
vlt |
2026-01-27T22:14:37.716Z | 2026-01-28T21:18:16.797Z |
| CVE-2026-24740 |
8.7 (4.0)
|
Dozzle Agent Label-Based Access Control Bypass Allows … |
amir20 |
dozzle |
2026-01-27T20:59:05.656Z | 2026-01-28T21:16:44.096Z |
| CVE-2026-24748 |
6.9 (4.0)
|
Kargo's `GetConfig()` and `RefreshResource()` API endp… |
akuity |
kargo |
2026-01-27T21:23:53.890Z | 2026-01-28T21:15:14.453Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2022-47425 |
4.3 (3.1)
|
WordPress ARMember – Membership Plugin, Content Restri… |
Repute Infosystems |
ARMember |
2025-12-09T16:41:37.058Z | 2025-12-09T17:05:20.626Z |
| CVE-2025-13743 |
2.4 (4.0)
|
Expired Personal Access Tokens (PATs) are recorded in … |
Docker |
Docker Desktop |
2025-12-09T20:39:52.071Z | 2025-12-10T15:45:17.295Z |
| CVE-2026-23645 |
5.3 (4.0)
|
SiYuan Vulnerable to Stored Cross-Site Scripting (XSS)… |
siyuan-note |
siyuan |
2026-01-16T19:20:06.744Z | 2026-01-16T21:37:58.336Z |
| CVE-2025-67488 |
7.8 (3.1)
|
SiYuan: ZipSlip -> Arbitrary File Overwrite -> RCE |
siyuan-note |
siyuan |
2025-12-09T20:32:37.274Z | 2025-12-09T21:30:12.799Z |
| CVE-2025-40700 |
5.1 (4.0)
|
Reflected Cross-Site Scripting (XSS) in Governalia by … |
IDI Eikon |
Governalia |
2025-12-02T13:08:55.540Z | 2025-12-02T13:26:32.149Z |
| CVE-2024-50388 |
9.5 (4.0)
|
HBS 3 Hybrid Backup Sync |
QNAP Systems Inc. |
HBS 3 Hybrid Backup Sync |
2024-12-06T16:35:07.434Z | 2024-12-06T19:59:55.053Z |
| CVE-2024-13086 |
5.3 (3.1)
|
QTS, QuTS hero |
QNAP Systems Inc. |
QTS |
2025-03-07T16:12:39.065Z | 2025-03-07T17:55:56.464Z |
| CVE-2025-66476 |
7.8 (3.1)
|
Vim for Windows Uncontrolled Search Path Element Remot… |
vim |
vim |
2025-12-02T21:49:24.672Z | 2025-12-05T04:56:29.527Z |
| CVE-2026-21625 |
4.8 (4.0)
|
Extension - stackideas.com - Lack of mime type validat… |
Stackideas.com |
EasyDiscuss extension for Joomla |
2026-01-16T15:06:15.596Z | 2026-01-16T15:35:53.746Z |
| CVE-2025-13751 |
1.3 (4.0)
|
Interactive service agent in OpenVPN version 2.5.… |
OpenVPN |
OpenVPN |
2025-12-03T16:22:35.771Z | 2025-12-12T13:56:20.684Z |
| CVE-2026-21624 |
9.4 (4.0)
|
Extension - stackideas.com - Persistent XSS in EasyDis… |
Stackideas.com |
EasyDiscuss extension for Joomla |
2026-01-16T15:05:37.172Z | 2026-01-16T15:41:11.155Z |
| CVE-2026-21623 |
9.4 (4.0)
|
Extension - stackideas.com - Persistent XSS in EasyDis… |
Stackideas.com |
EasyDiscuss extension for Joomla |
2026-01-16T15:04:36.308Z | 2026-01-16T15:38:27.743Z |
| CVE-2025-63083 |
5.9 (4.0)
|
Joomla! Core - [20260102] - XSS vector in the pagebrea… |
Joomla! Project |
Joomla! CMS |
2026-01-06T16:01:15.123Z | 2026-01-06T18:56:00.865Z |
| CVE-2025-33208 |
8.8 (3.1)
|
NVIDIA TAO contains a vulnerability where an atta… |
NVIDIA |
TAO |
2025-12-03T18:19:04.324Z | 2025-12-03T18:55:47.516Z |
| CVE-2025-63082 |
5.9 (4.0)
|
Joomla! Core - [20260101] - Inadequate content filteri… |
Joomla! Project |
Joomla! CMS |
2026-01-06T16:01:38.720Z | 2026-01-06T17:45:21.282Z |
| CVE-2025-10865 |
7.8 (3.1)
|
GPU DDK - DevmemIntGetReservationData does not ref the… |
Imagination Technologies |
Graphics DDK |
2026-01-13T17:26:45.523Z | 2026-01-14T14:36:47.473Z |
| CVE-2025-58409 |
3.5 (3.1)
|
GPU DDK - Disguised freelist buffers passed to RGXCrea… |
Imagination Technologies |
Graphics DDK |
2026-01-13T16:37:46.020Z | 2026-01-14T15:04:14.357Z |
| CVE-2025-58411 |
8.8 (3.1)
|
GPU DDK - Reservation::psMappedPMR can change while us… |
Imagination Technologies |
Graphics DDK |
2026-01-13T16:41:51.276Z | 2026-01-14T14:41:14.848Z |
| CVE-2025-13086 |
4.6 (4.0)
|
Improper validation of source IP addresses in Ope… |
OpenVPN |
OpenVPN |
2025-12-03T19:54:10.737Z | 2025-12-12T13:50:46.678Z |
| CVE-2025-25176 |
9.1 (3.1)
|
GPU DDK - GPU Register value contents leaked from secu… |
Imagination Technologies |
Graphics DDK |
2026-01-13T16:27:40.857Z | 2026-01-14T14:38:22.165Z |
| CVE-2025-39205 |
6.5 (3.1)
7.1 (4.0)
|
A vulnerability exists in the IEC 61850 in MicroS… |
Hitachi Energy |
MicroSCADA X SYS600 |
2025-06-24T12:13:20.791Z | 2025-10-01T14:58:20.730Z |
| CVE-2026-1260 |
8.5 (4.0)
|
Invalid Memory Access in Sentencepiece, |
Google |
Sentencepiece |
2026-01-22T17:06:17.340Z | 2026-01-22T18:22:36.273Z |
| CVE-2025-67493 |
7.5 (3.1)
|
Homarr issing input sanitization and possible privileg… |
homarr-labs |
homarr |
2025-12-17T21:09:44.090Z | 2025-12-18T15:09:27.419Z |
| CVE-2026-23731 |
4.3 (3.1)
|
WeGIA Clickjacking Vulnerability |
LabRedesCefetRJ |
WeGIA |
2026-01-16T19:50:16.344Z | 2026-01-16T20:31:29.007Z |
| CVE-2026-23730 |
4.8 (4.0)
|
WeGIA has an Open Redirect Vulnerability in control.ph… |
LabRedesCefetRJ |
WeGIA |
2026-01-16T19:48:23.636Z | 2026-01-16T20:34:21.127Z |
| CVE-2026-23729 |
4.8 (4.0)
|
WeGIA has an Open Redirect Vulnerability in control.ph… |
LabRedesCefetRJ |
WeGIA |
2026-01-16T19:47:10.017Z | 2026-01-16T21:02:05.778Z |
| CVE-2026-23728 |
4.8 (4.0)
|
WeGIA has an Open Redirect Vulnerability in control.ph… |
LabRedesCefetRJ |
WeGIA |
2026-01-16T19:46:07.119Z | 2026-01-16T21:04:41.135Z |
| CVE-2026-23727 |
4.8 (4.0)
|
WeGIA has an Open Redirect Vulnerability in control.ph… |
LabRedesCefetRJ |
WeGIA |
2026-01-16T19:41:46.940Z | 2026-01-16T19:49:16.754Z |
| CVE-2026-23724 |
4.3 (3.1)
|
WeGIA Stored Cross-Site Scripting (XSS) – atendido_ida… |
LabRedesCefetRJ |
WeGIA |
2026-01-16T19:37:06.349Z | 2026-01-16T21:33:07.130Z |
| CVE-2026-23725 |
5.3 (4.0)
|
WeGIA Stored Cross-Site Scripting (XSS) – nome Paramet… |
LabRedesCefetRJ |
WeGIA |
2026-01-16T19:38:27.000Z | 2026-01-16T21:13:25.373Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-13751 | Interactive service agent in OpenVPN version 2.5.0 through 2.6.16 and 2.7_alpha1 through 2.7_rc2 on… | 2025-12-03T17:15:49.913 | 2026-01-30T18:43:57.883 |
| fkie_cve-2026-21624 | Lack of input filterung leads to a persistent XSS vulnerability in the user avatar text handling of… | 2026-01-16T15:15:54.873 | 2026-01-30T18:43:24.353 |
| fkie_cve-2026-21623 | Lack of input filterung leads to a persistent XSS vulnerability in the forum post handling of the E… | 2026-01-16T15:15:54.733 | 2026-01-30T18:42:53.640 |
| fkie_cve-2025-63083 | Lack of output escaping leads to a XSS vector in the pagebreak plugin. | 2026-01-06T17:15:44.740 | 2026-01-30T18:41:36.323 |
| fkie_cve-2025-33208 | NVIDIA TAO contains a vulnerability where an attacker may cause a resource to be loaded via an unco… | 2025-12-03T19:15:55.983 | 2026-01-30T18:41:29.603 |
| fkie_cve-2025-63082 | Lack of input filtering leads to an XSS vector in the HTML filter code related to data URLs in img tags. | 2026-01-06T17:15:44.590 | 2026-01-30T18:41:18.417 |
| fkie_cve-2025-10865 | Software installed and run as a non-privileged user may conduct improper GPU system calls to cause … | 2026-01-13T18:16:04.433 | 2026-01-30T18:39:09.417 |
| fkie_cve-2025-58409 | Software installed and run as a non-privileged user may conduct improper GPU system calls to subver… | 2026-01-13T17:15:57.680 | 2026-01-30T18:39:02.007 |
| fkie_cve-2025-58411 | Software installed and run as a non-privileged user may conduct improper GPU system calls to cause … | 2026-01-13T17:15:57.813 | 2026-01-30T18:38:40.350 |
| fkie_cve-2025-13086 | Improper validation of source IP addresses in OpenVPN version 2.6.0 through 2.6.15 and 2.7_alpha1 t… | 2025-12-03T20:16:24.353 | 2026-01-30T18:38:13.833 |
| fkie_cve-2025-25176 | Intermediate register values of secure workloads can be exfiltrated in workloads scheduled from app… | 2026-01-13T17:15:56.753 | 2026-01-30T18:37:54.833 |
| fkie_cve-2025-39205 | A vulnerability exists in the IEC 61850 in MicroSCADA X SYS600 product. The certificate validation … | 2025-06-24T13:15:22.470 | 2026-01-30T18:36:38.200 |
| fkie_cve-2026-1260 | Invalid memory access in Sentencepiece versions less than 0.2.1 when using a vulnerable model file,… | 2026-01-22T17:16:30.643 | 2026-01-30T18:33:45.450 |
| fkie_cve-2025-67493 | Homarr is an open-source dashboard. Prior to version 1.45.3, it was possible to craft an input whic… | 2025-12-17T21:16:15.627 | 2026-01-30T18:32:21.217 |
| fkie_cve-2026-23731 | WeGIA is a web manager for charitable institutions. Prior to 3.6.2, The web application is vulnerab… | 2026-01-16T20:15:51.327 | 2026-01-30T18:30:32.513 |
| fkie_cve-2026-23730 | WeGIA is a web manager for charitable institutions. Prior to 3.6.2, an Open Redirect vulnerability … | 2026-01-16T20:15:51.183 | 2026-01-30T18:30:19.253 |
| fkie_cve-2026-23729 | WeGIA is a web manager for charitable institutions. Prior to 3.6.2, an Open Redirect vulnerability … | 2026-01-16T20:15:51.047 | 2026-01-30T18:30:09.277 |
| fkie_cve-2026-23728 | WeGIA is a web manager for charitable institutions. Prior to 3.6.2, an Open Redirect vulnerability … | 2026-01-16T20:15:50.890 | 2026-01-30T18:29:58.017 |
| fkie_cve-2026-23727 | WeGIA is a web manager for charitable institutions. Prior to 3.6.2, an Open Redirect vulnerability … | 2026-01-16T20:15:50.740 | 2026-01-30T18:29:51.847 |
| fkie_cve-2026-23724 | WeGIA is a web manager for charitable institutions. Prior to 3.6.2, a Stored Cross-Site Scripting (… | 2026-01-16T20:15:50.310 | 2026-01-30T18:29:45.610 |
| fkie_cve-2026-23725 | WeGIA is a web manager for charitable institutions. Prior to 3.6.2, a Stored Cross-Site Scripting (… | 2026-01-16T20:15:50.460 | 2026-01-30T18:29:24.140 |
| fkie_cve-2026-23726 | WeGIA is a web manager for charitable institutions. Prior to 3.6.2, An Open Redirect vulnerability … | 2026-01-16T20:15:50.597 | 2026-01-30T18:29:14.007 |
| fkie_cve-2026-23723 | WeGIA is a web manager for charitable institutions. Prior to 3.6.2, an authenticated SQL Injection … | 2026-01-16T20:15:50.163 | 2026-01-30T18:28:51.853 |
| fkie_cve-2026-23722 | WeGIA is a Web Manager for Charitable Institutions. Prior to 3.6.2, a Reflected Cross-Site Scriptin… | 2026-01-16T20:15:50.017 | 2026-01-30T18:27:52.323 |
| fkie_cve-2026-24412 | iccDEV provides libraries and tools for interacting with, manipulating, and applying ICC color mana… | 2026-01-24T02:15:49.360 | 2026-01-30T18:25:05.917 |
| fkie_cve-2026-24411 | iccDEV provides libraries and tools for interacting with, manipulating, and applying ICC color mana… | 2026-01-24T02:15:49.223 | 2026-01-30T18:25:00.933 |
| fkie_cve-2026-24410 | iccDEV provides libraries and tools for interacting with, manipulating, and applying ICC color mana… | 2026-01-24T02:15:49.080 | 2026-01-30T18:24:57.203 |
| fkie_cve-2026-24409 | iccDEV provides libraries and tools for interacting with, manipulating, and applying ICC color mana… | 2026-01-24T02:15:48.930 | 2026-01-30T18:24:52.510 |
| fkie_cve-2026-24407 | iccDEV provides libraries and tools for interacting with, manipulating, and applying ICC color mana… | 2026-01-24T01:15:51.223 | 2026-01-30T18:24:44.130 |
| fkie_cve-2026-24406 | iccDEV provides libraries and tools for interacting with, manipulating, and applying ICC color mana… | 2026-01-24T01:15:51.073 | 2026-01-30T18:24:36.017 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-2p99-vc9j-4p2g |
8.2 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-01-22T18:30:37Z | 2026-01-27T21:31:42Z |
| ghsa-g7gq-qmh4-jhww |
7.3 (3.1)
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Aiv… | 2026-01-22T18:30:36Z | 2026-01-27T21:31:41Z |
| ghsa-g3rp-cv32-x284 |
7.3 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-01-22T18:30:36Z | 2026-01-27T21:31:41Z |
| ghsa-g2pf-4pxg-m8xx |
7.1 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-01-22T18:30:35Z | 2026-01-27T21:31:41Z |
| ghsa-fv85-v87w-8wjv |
6.5 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-01-22T18:30:36Z | 2026-01-27T21:31:41Z |
| ghsa-62cp-mf64-qf99 |
8.5 (3.1)
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2026-01-22T18:30:35Z | 2026-01-27T21:31:41Z |
| ghsa-3fmc-7wj3-j5v5 |
8.6 (3.1)
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Aiv… | 2026-01-22T18:30:36Z | 2026-01-27T21:31:41Z |
| ghsa-28gq-jr92-xw88 |
8.8 (3.1)
|
Deserialization of Untrusted Data vulnerability in AivahThemes Anona anona allows Object Injection.… | 2026-01-22T18:30:36Z | 2026-01-27T21:31:41Z |
| ghsa-mwg5-cwh8-88m5 |
9.8 (3.1)
9.3 (4.0)
|
A vulnerability has been identified in the ServiceNow AI Platform that could enable an unauthentica… | 2026-01-13T00:30:45Z | 2026-01-27T21:31:40Z |
| ghsa-4hcq-q3qf-q453 |
7.5 (3.1)
8.7 (4.0)
|
Enhancesoft osTicket versions up to and including 1.18.2 contain an arbitrary file read vulnerabili… | 2026-01-12T21:30:34Z | 2026-01-27T21:31:40Z |
| ghsa-xvh8-9h96-57r8 |
8.1 (3.1)
8.6 (4.0)
|
IDOR vulnerability has been found in Viafirma Inbox v4.5.13 that allows any authenticated user with… | 2026-01-12T15:30:42Z | 2026-01-27T21:31:39Z |
| ghsa-r7v3-974m-576m |
8.1 (3.1)
8.7 (4.0)
|
Weaknesses in the authorization mechanisms of Viafirma Documents v3.7.129 allow an authenticated us… | 2026-01-12T15:30:42Z | 2026-01-27T21:31:39Z |
| ghsa-m5q9-73x5-pf78 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ksmbd: smbdirect: verify remai… | 2025-10-04T09:30:21Z | 2026-01-27T21:31:36Z |
| ghsa-9px7-88w4-86hp |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: RDMA/cma: Allow UD qp_type to … | 2025-10-01T12:30:31Z | 2026-01-27T21:31:36Z |
| ghsa-xw7x-gch6-cpx7 |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ksmbd: smbdirect: validate dat… | 2025-10-04T09:30:21Z | 2026-01-27T21:31:35Z |
| ghsa-ww7h-mcjr-5643 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: smb: client: let smbd_destroy(… | 2025-10-04T09:30:20Z | 2026-01-27T21:31:35Z |
| ghsa-r3wm-5qjq-c8qp |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Harden uplink netde… | 2025-10-04T09:30:21Z | 2026-01-27T21:31:35Z |
| ghsa-pm9c-rrjm-4v2f |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: iommu/s390: Fix memory corrupt… | 2025-10-04T09:30:21Z | 2026-01-27T21:31:35Z |
| ghsa-jm8p-ggg3-gfgw |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: crypto: ccp - Always pass in a… | 2025-10-04T09:30:20Z | 2026-01-27T21:31:35Z |
| ghsa-cgf5-f6fj-4v5q |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: tls: make sure to abort the st… | 2025-10-04T09:30:21Z | 2026-01-27T21:31:35Z |
| ghsa-cg67-c42g-wcjm |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net: rfkill: gpio: Fix crash d… | 2025-10-04T09:30:20Z | 2026-01-27T21:31:35Z |
| ghsa-9554-w67x-xjxp |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ASoC: codec: sma1307: Fix memo… | 2025-10-04T09:30:20Z | 2026-01-27T21:31:35Z |
| ghsa-7v58-mp27-j7rx |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ice: fix Rx page leak on multi… | 2025-10-04T09:30:21Z | 2026-01-27T21:31:35Z |
| ghsa-63mr-vmpc-c5r9 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: Fix use-after-fr… | 2025-10-04T09:30:21Z | 2026-01-27T21:31:35Z |
| ghsa-2vj6-wmm6-q722 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: smb: client: let recv_done ver… | 2025-10-04T09:30:20Z | 2026-01-27T21:31:35Z |
| ghsa-xq93-xr8g-2h7w |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix smbdirect_rec… | 2025-10-04T09:30:20Z | 2026-01-27T21:31:34Z |
| ghsa-rhfj-r57g-8474 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: jbd2: check 'jh->b_transaction… | 2025-10-01T12:30:31Z | 2026-01-27T21:31:34Z |
| ghsa-rfcq-q5wv-mpcg |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: crypto: af_alg - Set merge to … | 2025-10-04T09:30:20Z | 2026-01-27T21:31:34Z |
| ghsa-mcg3-6968-rr84 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix unsafe drain wor… | 2025-10-01T12:30:31Z | 2026-01-27T21:31:34Z |
| ghsa-5q6f-w2r4-gxrq |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Use raw_smp_pro… | 2025-10-01T12:30:31Z | 2026-01-27T21:31:34Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2014-74 |
|
The App.Undo.UndoSupport.get_request_var_or_attr function in Zope before 2.12.21 and 2.13… | zope2 | 2014-09-30T14:55:00Z | 2021-07-25T23:34:58.895470Z |
| pysec-2014-73 |
|
ZPublisher.HTTPRequest._scrubHeader in Zope 2 before 2.13.19, as used in Plone before 4.3… | zope2 | 2014-09-30T14:55:00Z | 2021-07-25T23:34:58.778006Z |
| pysec-2017-74 |
|
The tqdm._version module in tqdm versions 4.4.1 and 4.10 allows local users to execute ar… | tqdm | 2017-01-19T20:59:00Z | 2021-07-25T23:34:56.013301Z |
| pysec-2014-72 |
|
Transifex command-line client before 0.10 does not validate X.509 certificates for data t… | transifex-client | 2014-05-02T01:59:00Z | 2021-07-25T23:34:56.578427Z |
| pysec-2013-28 |
|
Directory traversal vulnerability in the client in Tryton 3.0.0, as distributed before 20… | tryton | 2013-11-18T02:55:00Z | 2021-07-25T23:34:56.639990Z |
| pysec-2017-73 |
|
sosreport in SoS 3.x allows local users to obtain sensitive information from sosreport fi… | sosreport | 2017-11-06T17:29:00Z | 2021-07-25T23:34:55.577295Z |
| pysec-2017-72 |
|
sosreport 3.2 uses weak permissions for generated sosreport archives, which allows local … | sosreport | 2017-07-25T18:29:00Z | 2021-07-25T23:34:55.539428Z |
| pysec-2017-71 |
|
win_useradd, salt-cloud and the Linode driver in salt 2015.5.x before 2015.5.6, and 2015.… | salt | 2017-08-09T16:29:00Z | 2021-07-25T23:34:53.862989Z |
| pysec-2017-70 |
|
salt before 2015.5.5 leaks git usernames and passwords to the log. | salt | 2017-10-10T16:29:00Z | 2021-07-25T23:34:53.773176Z |
| pysec-2017-69 |
|
Restkit allows man-in-the-middle attackers to spoof TLS servers by leveraging use of the … | restkit | 2017-08-09T18:29:00Z | 2021-07-25T23:34:53.240479Z |
| pysec-2016-23 |
|
Salt 2015.8.x before 2015.8.4 does not properly handle clear messages on the minion, whic… | salt | 2016-04-12T14:59:00Z | 2021-07-25T23:34:53.906248Z |
| pysec-2015-33 |
|
RhodeCode before 2.2.7 allows remote authenticated users to obtain API keys and other sen… | rhodecode | 2015-02-16T15:59:00Z | 2021-07-25T23:34:53.466212Z |
| pysec-2015-32 |
|
RhodeCode before 2.2.7 and Kallithea 0.1 allows remote authenticated users to obtain API … | rhodecode | 2015-02-16T15:59:00Z | 2021-07-25T23:34:53.419876Z |
| pysec-2013-27 |
|
Unspecified vulnerability in salt-ssh in Salt (aka SaltStack) 0.17.0 has unspecified impa… | salt | 2013-11-05T18:55:00Z | 2021-07-25T23:34:53.727680Z |
| pysec-2013-26 |
|
The default configuration for salt-ssh in Salt (aka SaltStack) 0.17.0 does not validate t… | salt | 2013-11-05T18:55:00Z | 2021-07-25T23:34:53.687508Z |
| pysec-2019-161 |
|
python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache signing bypass | python-keystoneclient | 2019-12-10T15:15:00Z | 2021-07-25T23:34:52.007420Z |
| pysec-2017-68 |
|
The Recurly Client Python Library before 2.0.5, 2.1.16, 2.2.22, 2.3.1, 2.4.5, 2.5.1, 2.6.… | recurly | 2017-11-13T17:29:00Z | 2021-07-25T23:34:52.943535Z |
| pysec-2016-22 |
|
OpenStack Murano before 1.0.3 (liberty) and 2.x before 2.0.1 (mitaka), Murano-dashboard b… | python-muranoclient | 2016-09-26T16:59:00Z | 2021-07-25T23:34:52.302342Z |
| pysec-2015-31 |
|
The s3_token middleware in OpenStack keystonemiddleware before 1.6.0 and python-keystonec… | python-keystoneclient | 2015-04-17T17:59:00Z | 2021-07-25T23:34:52.173858Z |
| pysec-2014-71 |
|
OpenStack keystonemiddleware (formerly python-keystoneclient) 0.x before 0.11.0 and 1.x b… | python-keystoneclient | 2014-10-02T14:55:00Z | 2021-07-25T23:34:52.128374Z |
| pysec-2014-70 |
|
The auth_token middleware in the OpenStack Python client library for Keystone (aka python… | python-keystoneclient | 2014-04-15T14:55:00Z | 2021-07-25T23:34:52.050807Z |
| pysec-2013-25 |
|
The Python client in Apache Qpid before 2.2 does not verify that the server hostname matc… | qpid-python | 2013-08-23T16:55:00Z | 2021-07-25T23:34:52.564224Z |
| pysec-2017-67 |
|
PySAML2 allows remote attackers to conduct XML external entity (XXE) attacks via a crafte… | pysaml2 | 2017-03-03T15:59:00Z | 2021-07-25T23:34:51.281897Z |
| pysec-2017-66 |
|
The checkPassword function in python-kerberos does not authenticate the KDC it attempts t… | pykerberos | 2017-08-25T18:29:00Z | 2021-07-25T23:34:51.016854Z |
| pysec-2016-21 |
|
python-docx before 0.8.6 allows context-dependent attackers to conduct XML External Entit… | python-docx | 2016-12-21T22:59:00Z | 2021-07-25T23:34:51.683518Z |
| pysec-2014-69 |
|
python-keystoneclient before 0.2.4, as used in OpenStack Keystone (Folsom), does not prop… | python-keystoneclient | 2014-01-21T18:55:00Z | 2021-07-25T23:34:51.958825Z |
| pysec-2013-24 |
|
The user-password-update command in python-keystoneclient before 0.2.4 accepts the new pa… | python-keystoneclient | 2013-10-01T20:55:00Z | 2021-07-25T23:34:51.897352Z |
| pysec-2017-65 |
|
protobuf allows remote authenticated attackers to cause a heap-based buffer overflow. | protobuf | 2017-09-25T17:29:00Z | 2021-07-25T23:34:50.202612Z |
| pysec-2014-68 |
|
Products/CMFPlone/CatalogTool.py in Plone 3.3 through 4.3.2 allows remote administrators … | products-cmfplone | 2014-05-02T14:55:00Z | 2021-07-25T23:34:50.085881Z |
| pysec-2014-67 |
|
Products/CMFPlone/FactoryTool.py in Plone 3.3 through 4.3.2 allows remote attackers to ob… | products-cmfplone | 2014-05-02T14:55:00Z | 2021-07-25T23:34:50.035277Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-3648 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.398059Z |
| gsd-2024-3647 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.376177Z |
| gsd-2024-3646 | A command injection vulnerability was identified in GitHub Enterprise Server that allowed… | 2024-04-11T05:03:27.301713Z |
| gsd-2024-3645 | The Essential Addons for Elementor Pro plugin for WordPress is vulnerable to Stored Cross… | 2024-04-11T05:03:27.374892Z |
| gsd-2024-3644 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.048188Z |
| gsd-2024-3643 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.151136Z |
| gsd-2024-3642 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.371593Z |
| gsd-2024-3641 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.162401Z |
| gsd-2024-3640 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.310516Z |
| gsd-2024-3639 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.275654Z |
| gsd-2024-3638 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.283226Z |
| gsd-2024-3637 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.344825Z |
| gsd-2024-3636 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.051750Z |
| gsd-2024-3635 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.408596Z |
| gsd-2024-3634 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.301511Z |
| gsd-2024-3633 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.368857Z |
| gsd-2024-3632 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.077625Z |
| gsd-2024-3631 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.340973Z |
| gsd-2024-3630 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.303493Z |
| gsd-2024-3629 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.211590Z |
| gsd-2024-3628 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.073941Z |
| gsd-2024-3627 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.271015Z |
| gsd-2024-3626 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:27.171817Z |
| gsd-2024-3625 | A flaw was found in Quay, where Quay's database is stored in plain text in mirror-registr… | 2024-04-11T05:03:27.366319Z |
| gsd-2024-3624 | A flaw was found in how Quay's database is stored in plain-text in mirror-registry on the… | 2024-04-11T05:03:27.127424Z |
| gsd-2024-3623 | A flaw was found when using mirror-registry to install Quay. It uses a default database s… | 2024-04-11T05:03:27.130640Z |
| gsd-2024-3622 | A flaw was found when using mirror-registry to install Quay. It uses a default secret, wh… | 2024-04-11T05:03:27.178220Z |
| gsd-2024-3621 | A vulnerability was found in SourceCodester Kortex Lite Advocate Office Management System… | 2024-04-11T05:03:27.113679Z |
| gsd-2024-3620 | A vulnerability was found in SourceCodester Kortex Lite Advocate Office Management System… | 2024-04-11T05:03:27.375448Z |
| gsd-2024-3619 | A vulnerability has been found in SourceCodester Kortex Lite Advocate Office Management S… | 2024-04-11T05:03:27.394674Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2025-192787 | Malicious code in elf-stats-sparkly-toolkit-703 (npm) | 2025-12-23T08:10:46Z | 2025-12-24T00:53:16Z |
| MAL-2025-192786 | Malicious code in elf-stats-sparkly-sled-484 (npm) | 2025-12-23T08:10:45Z | 2025-12-24T00:53:16Z |
| MAL-2025-192785 | Malicious code in elf-stats-sleighing-hammer-902 (npm) | 2025-12-23T08:10:05Z | 2025-12-24T00:53:16Z |
| MAL-2025-192784 | Malicious code in elf-stats-silvered-toolkit-914 (npm) | 2025-12-23T08:10:02Z | 2025-12-24T00:53:16Z |
| MAL-2025-192783 | Malicious code in elf-stats-silvered-bow-679 (npm) | 2025-12-23T08:09:51Z | 2025-12-24T00:53:16Z |
| MAL-2025-192782 | Malicious code in elf-stats-shimmering-fir-491 (npm) | 2025-12-23T08:09:49Z | 2025-12-24T00:53:16Z |
| MAL-2025-192781 | Malicious code in elf-stats-rooftop-pinecone-887 (npm) | 2025-12-23T08:09:47Z | 2025-12-24T00:53:16Z |
| MAL-2025-192780 | Malicious code in elf-stats-rooftop-mitten-324 (npm) | 2025-12-23T08:09:46Z | 2025-12-24T00:53:16Z |
| MAL-2025-192779 | Malicious code in elf-stats-piney-train-884 (npm) | 2025-12-23T08:09:34Z | 2025-12-24T00:53:16Z |
| MAL-2025-192778 | Malicious code in elf-stats-nutmeg-fir-716 (npm) | 2025-12-23T08:09:29Z | 2025-12-24T00:53:16Z |
| MAL-2025-192777 | Malicious code in elf-stats-mistletoe-muffin-976 (npm) | 2025-12-23T08:09:15Z | 2025-12-24T00:53:16Z |
| MAL-2025-192776 | Malicious code in elf-stats-mistletoe-cookie-256 (npm) | 2025-12-23T08:09:14Z | 2025-12-24T00:53:16Z |
| MAL-2025-192775 | Malicious code in elf-stats-merry-sparkler-797 (npm) | 2025-12-23T08:09:02Z | 2025-12-24T00:53:16Z |
| MAL-2025-192774 | Malicious code in elf-stats-joyous-saddlebag-967 (npm) | 2025-12-23T08:08:33Z | 2025-12-24T00:53:16Z |
| MAL-2025-192773 | Malicious code in elf-stats-jolly-snowglobe-266 (npm) | 2025-12-23T08:08:32Z | 2025-12-24T00:53:16Z |
| MAL-2025-192772 | Malicious code in elf-stats-holly-fir-593 (npm) | 2025-12-23T08:08:29Z | 2025-12-24T00:53:16Z |
| MAL-2025-192771 | Malicious code in elf-stats-glittering-cookie-844 (npm) | 2025-12-23T08:08:17Z | 2025-12-24T00:53:16Z |
| MAL-2025-192770 | Malicious code in elf-stats-ginger-bow-370 (npm) | 2025-12-23T08:08:02Z | 2025-12-24T00:53:16Z |
| MAL-2025-192769 | Malicious code in elf-stats-fuzzy-ribbon-205 (npm) | 2025-12-23T08:08:00Z | 2025-12-24T00:53:16Z |
| MAL-2025-192768 | Malicious code in elf-stats-flickering-satchel-815 (npm) | 2025-12-23T08:07:45Z | 2025-12-24T00:53:16Z |
| MAL-2025-192767 | Malicious code in elf-stats-festive-marshmallow-962 (npm) | 2025-12-23T08:07:35Z | 2025-12-24T00:53:16Z |
| MAL-2025-192766 | Malicious code in elf-stats-evergreen-lantern-387 (npm) | 2025-12-23T08:07:18Z | 2025-12-24T00:53:16Z |
| MAL-2025-192765 | Malicious code in elf-stats-ember-workbench-742 (npm) | 2025-12-23T08:07:16Z | 2025-12-24T00:53:16Z |
| MAL-2025-192755 | Malicious code in dotjsenv (npm) | 2025-12-23T18:37:29Z | 2025-12-24T00:53:16Z |
| MAL-2025-192754 | Malicious code in chai-max (npm) | 2025-12-23T18:30:01Z | 2025-12-24T00:53:16Z |
| MAL-2025-192753 | Malicious code in chai-async-chains (npm) | 2025-12-23T18:26:52Z | 2025-12-24T00:53:16Z |
| MAL-2025-192751 | Malicious code in elf-stats-cosy-sled-455 (npm) | 2025-12-23T08:07:03Z | 2025-12-24T00:53:16Z |
| MAL-2025-192750 | Malicious code in elf-stats-cosy-cocoa-331 (npm) | 2025-12-23T08:07:02Z | 2025-12-24T00:53:16Z |
| MAL-2025-192743 | Malicious code in dotenv-extend (npm) | 2025-12-23T16:58:53Z | 2025-12-24T00:53:16Z |
| MAL-2025-192742 | Malicious code in chai-tests-await (npm) | 2025-12-23T16:58:53Z | 2025-12-24T00:53:16Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-0475 | Samsung Android: Mehrere Schwachstellen | 2025-03-03T23:00:00.000+00:00 | 2025-03-03T23:00:00.000+00:00 |
| wid-sec-w-2025-0474 | IBM Business Automation Workflow: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-03-03T23:00:00.000+00:00 | 2025-03-03T23:00:00.000+00:00 |
| wid-sec-w-2025-0473 | MinIO: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-03-03T23:00:00.000+00:00 | 2025-03-03T23:00:00.000+00:00 |
| wid-sec-w-2025-0090 | Red Hat Enterprise Linux (librdf): Schwachstelle ermöglicht Denial of Service | 2025-01-14T23:00:00.000+00:00 | 2025-03-03T23:00:00.000+00:00 |
| wid-sec-w-2024-3403 | IBM WebSphere Application Server: Schwachstelle ermöglicht Cross-Site Scripting | 2024-11-11T23:00:00.000+00:00 | 2025-03-03T23:00:00.000+00:00 |
| wid-sec-w-2024-3334 | IBM WebSphere Anwendungsserver: Schwachstelle ermöglicht Denial of Service und Informationsoffenlegung | 2024-11-04T23:00:00.000+00:00 | 2025-03-03T23:00:00.000+00:00 |
| wid-sec-w-2024-3052 | IBM WebSphere Application Server: Schwachstelle ermöglicht Cross-Site Scripting | 2024-09-30T22:00:00.000+00:00 | 2025-03-03T23:00:00.000+00:00 |
| wid-sec-w-2025-0472 | IBM Business Automation Workflow: Schwachstelle ermöglicht Cross-Site Scripting | 2025-03-02T23:00:00.000+00:00 | 2025-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-0467 | IBM MQ: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-03-02T23:00:00.000+00:00 | 2025-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-0466 | IBM Storage Virtualize Produkte: Mehrere Schwachstellen | 2025-03-02T23:00:00.000+00:00 | 2025-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-0465 | Red Hat Ansible Automation Platform: Schwachstelle ermöglicht Privilegieneskalation | 2025-03-02T23:00:00.000+00:00 | 2025-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-0464 | Samsung Exynos: Mehrere Schwachstellen | 2025-03-02T23:00:00.000+00:00 | 2025-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-0457 | Rancher: Mehrere Schwachstellen | 2025-02-27T23:00:00.000+00:00 | 2025-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-0281 | Red Hat Enterprise Linux (Fast Datapath): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-02-05T23:00:00.000+00:00 | 2025-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-0178 | Google Chrome/Microsoft Edge: Mehrere Schwachstellen | 2025-01-22T23:00:00.000+00:00 | 2025-03-02T23:00:00.000+00:00 |
| wid-sec-w-2024-3285 | IBM App Connect Enterprise: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2024-10-27T23:00:00.000+00:00 | 2025-03-02T23:00:00.000+00:00 |
| wid-sec-w-2024-3191 | Oracle Fusion Middleware: Mehrere Schwachstellen | 2024-10-15T22:00:00.000+00:00 | 2025-03-02T23:00:00.000+00:00 |
| wid-sec-w-2024-3125 | Microsoft Azure CLI: Mehrere Schwachstellen ermöglichen Privilegieneskalation und Codeausführung | 2024-10-08T22:00:00.000+00:00 | 2025-03-02T23:00:00.000+00:00 |
| wid-sec-w-2024-2197 | IBM App Connect Enterprise: Mehrere Schwachstellen ermöglichen Cross-Site Scripting und Server-Side Request Forgery | 2024-09-22T22:00:00.000+00:00 | 2025-03-02T23:00:00.000+00:00 |
| wid-sec-w-2024-1799 | IBM App Connect Enterprise: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2024-08-07T22:00:00.000+00:00 | 2025-03-02T23:00:00.000+00:00 |
| wid-sec-w-2024-1339 | Microsoft Azure: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2024-06-11T22:00:00.000+00:00 | 2025-03-02T23:00:00.000+00:00 |
| wid-sec-w-2024-0219 | libTIFF: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-01-25T23:00:00.000+00:00 | 2025-03-02T23:00:00.000+00:00 |
| wid-sec-w-2023-1538 | libTIFF: Schwachstelle ermöglicht Denial of Service | 2023-06-21T22:00:00.000+00:00 | 2025-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-0462 | Infoblox NIOS: Mehrere Schwachstellen | 2025-02-27T23:00:00.000+00:00 | 2025-02-27T23:00:00.000+00:00 |
| wid-sec-w-2025-0459 | IBM MQ: Mehrere Schwachstellen | 2025-02-27T23:00:00.000+00:00 | 2025-02-27T23:00:00.000+00:00 |
| wid-sec-w-2025-0458 | DrayTek Vigor: Mehrere Schwachstellen | 2025-02-27T23:00:00.000+00:00 | 2025-02-27T23:00:00.000+00:00 |
| wid-sec-w-2025-0455 | Linux Kernel: Schwachstelle ermöglicht Codeausführung | 2025-02-27T23:00:00.000+00:00 | 2025-02-27T23:00:00.000+00:00 |
| wid-sec-w-2025-0454 | MongoDB und MongoDB Compass: Mehrere Schwachstellen | 2025-02-27T23:00:00.000+00:00 | 2025-02-27T23:00:00.000+00:00 |
| wid-sec-w-2024-3635 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2024-12-08T23:00:00.000+00:00 | 2025-02-27T23:00:00.000+00:00 |
| wid-sec-w-2024-3210 | IBM WebSphere Application Server: Schwachstelle ermöglicht Denial of Service | 2024-10-15T22:00:00.000+00:00 | 2025-02-27T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:0135 | Red Hat Security Advisory: tar security update | 2026-01-06T13:36:23+00:00 | 2026-02-03T20:56:53+00:00 |
| rhsa-2026:0067 | Red Hat Security Advisory: tar security update | 2026-01-05T19:01:10+00:00 | 2026-02-03T20:56:52+00:00 |
| rhsa-2026:0002 | Red Hat Security Advisory: tar security update | 2026-01-05T00:51:42+00:00 | 2026-02-03T20:56:50+00:00 |
| rhsa-2025:23940 | Red Hat Security Advisory: python3.12 security update | 2025-12-22T16:40:10+00:00 | 2026-02-03T20:56:50+00:00 |
| rhsa-2025:23481 | Red Hat Security Advisory: openssh security update | 2025-12-17T17:42:18+00:00 | 2026-02-03T20:56:49+00:00 |
| rhsa-2025:23480 | Red Hat Security Advisory: openssh security update | 2025-12-17T16:48:13+00:00 | 2026-02-03T20:56:48+00:00 |
| rhsa-2025:23479 | Red Hat Security Advisory: openssh security update | 2025-12-17T14:16:13+00:00 | 2026-02-03T20:56:48+00:00 |
| rhsa-2025:23323 | Red Hat Security Advisory: python3.12 security update | 2025-12-18T13:19:52+00:00 | 2026-02-03T20:56:45+00:00 |
| rhsa-2026:1719 | Red Hat Security Advisory: gnupg2 security update | 2026-02-02T14:09:38+00:00 | 2026-02-03T20:56:26+00:00 |
| rhsa-2026:1705 | Red Hat Security Advisory: gnupg2 security update | 2026-02-02T11:41:03+00:00 | 2026-02-03T20:56:25+00:00 |
| rhsa-2026:1677 | Red Hat Security Advisory: gnupg2 security update | 2026-02-02T07:37:37+00:00 | 2026-02-03T20:56:24+00:00 |
| rhsa-2026:1629 | Red Hat Security Advisory: gnupg2 security update | 2026-02-02T01:57:21+00:00 | 2026-02-03T20:56:23+00:00 |
| rhsa-2026:1229 | Red Hat Security Advisory: gnupg2 security update | 2026-01-26T16:26:39+00:00 | 2026-02-03T20:56:23+00:00 |
| rhsa-2026:1468 | Red Hat Security Advisory: gnupg2 security update | 2026-01-28T07:58:16+00:00 | 2026-02-03T20:56:21+00:00 |
| rhsa-2026:1230 | Red Hat Security Advisory: gnupg2 security update | 2026-01-26T16:16:34+00:00 | 2026-02-03T20:56:20+00:00 |
| rhsa-2026:1014 | Red Hat Security Advisory: gnupg2 security update | 2026-01-22T15:48:38+00:00 | 2026-02-03T20:56:20+00:00 |
| rhsa-2026:0974 | Red Hat Security Advisory: gnupg2 security update | 2026-01-22T06:57:36+00:00 | 2026-02-03T20:56:19+00:00 |
| rhsa-2026:0935 | Red Hat Security Advisory: gnupg2 security update | 2026-01-21T19:09:27+00:00 | 2026-02-03T20:56:18+00:00 |
| rhsa-2026:0728 | Red Hat Security Advisory: gnupg2 security update | 2026-01-15T21:34:05+00:00 | 2026-02-03T20:56:18+00:00 |
| rhsa-2026:0719 | Red Hat Security Advisory: gnupg2 security update | 2026-01-15T17:17:05+00:00 | 2026-02-03T20:56:17+00:00 |
| rhsa-2026:1859 | Red Hat Security Advisory: OpenShift Compliance Operator bug fix and enhancement update | 2026-02-03T17:24:45+00:00 | 2026-02-03T20:56:16+00:00 |
| rhsa-2026:1858 | Red Hat Security Advisory: Red Hat Ceph Storage | 2026-02-03T17:17:26+00:00 | 2026-02-03T20:56:16+00:00 |
| rhsa-2026:0697 | Red Hat Security Advisory: gnupg2 security update | 2026-01-15T11:30:44+00:00 | 2026-02-03T20:56:16+00:00 |
| rhsa-2023:1428 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.8 security and bug fix update | 2023-03-23T02:16:09+00:00 | 2026-02-03T20:55:16+00:00 |
| rhsa-2022:1660 | Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 2.0.5 [security update] | 2022-05-02T05:51:54+00:00 | 2026-02-03T20:55:11+00:00 |
| rhsa-2022:0492 | Red Hat Security Advisory: OpenShift Container Platform 4.7.43 security update | 2022-02-16T11:18:29+00:00 | 2026-02-03T20:55:09+00:00 |
| rhsa-2021:5110 | Red Hat Security Advisory: Cryostat security update | 2021-12-14T13:41:25+00:00 | 2026-02-03T20:55:09+00:00 |
| rhsa-2021:3140 | Red Hat Security Advisory: Red Hat Fuse 7.9.0 release and security update | 2021-08-11T18:21:58+00:00 | 2026-02-03T20:55:09+00:00 |
| rhsa-2021:3001 | Red Hat Security Advisory: Red Hat OpenShift Container Platform for Windows Containers 3.0.0 security and bug fix update | 2021-08-03T20:28:58+00:00 | 2026-02-03T20:55:09+00:00 |
| rhsa-2021:2042 | Red Hat Security Advisory: Red Hat OpenShift Container Storage 4.7 RPM security, bug fix, and enhancement update | 2021-05-19T10:26:16+00:00 | 2026-02-03T20:55:08+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-22-055-01 | FATEK Automation FvDesigner | 2022-02-24T00:00:00.000000Z | 2022-02-24T00:00:00.000000Z |
| icsa-21-231-02 | Baker Hughes Bently Nevada 3500 | 2021-08-19T00:00:00.000000Z | 2022-02-24T00:00:00.000000Z |
| icsa-22-053-03 | WIN-911 2021 | 2022-02-22T00:00:00.000000Z | 2022-02-22T00:00:00.000000Z |
| icsa-22-053-02 | GE Proficy CIMPLICITY-Cleartext | 2022-02-22T00:00:00.000000Z | 2022-02-22T00:00:00.000000Z |
| icsa-22-053-01 | GE Proficy CIMPLICITY-IPM | 2022-02-22T00:00:00.000000Z | 2022-02-22T00:00:00.000000Z |
| icsa-22-046-01 | Schneider Electric IGSS | 2022-02-15T00:00:00.000000Z | 2022-02-15T00:00:00.000000Z |
| icsa-21-350-16 | Siemens Healthineers syngo fastView (Update A) | 2021-12-16T00:00:00.000000Z | 2022-02-10T00:00:00.000000Z |
| icsa-19-225-03 | ICSA-19-225-03_Siemens SCALANCE X Switches (Update D) | 2019-08-13T00:00:00.000000Z | 2022-02-10T00:00:00.000000Z |
| icsa-22-034-02 | Airspan Networks Mimosa | 2022-02-03T00:00:00.000000Z | 2022-02-03T00:00:00.000000Z |
| icsa-21-243-02 | FANUC Robot Controllers (Update A) | 2021-08-31T00:00:00.000000Z | 2022-02-03T00:00:00.000000Z |
| icsa-22-032-02 | Advantech ADAM-3600 | 2022-02-01T00:00:00.000000Z | 2022-02-01T00:00:00.000000Z |
| icsa-22-032-01 | Ricon Mobile Industrial Cellular Router | 2022-02-01T00:00:00.000000Z | 2022-02-01T00:00:00.000000Z |
| icsa-21-315-02 | Multiple Data Distribution Service (DDS) Implementations (Update A) | 2021-11-11T00:00:00.000000Z | 2022-02-01T00:00:00.000000Z |
| icsma-21-355-01 | Fresenius Kabi Agilia Connect Infusion System (Update A) | 2021-12-21T00:00:00.000000Z | 2022-01-27T00:00:00.000000Z |
| icsa-22-025-01 | GE Gas Power ToolBoxST | 2022-01-25T00:00:00.000000Z | 2022-01-25T00:00:00.000000Z |
| icsa-21-131-02 | Mitsubishi Electric GOT and Tension Controller (Update A) | 2021-05-11T00:00:00.000000Z | 2022-01-20T00:00:00.000000Z |
| icsa-20-343-02 | Mitsubishi Electric GOT and Tension Controller (Update B) | 2020-12-08T00:00:00.000000Z | 2022-01-20T00:00:00.000000Z |
| icsa-22-013-07 | Mitsubishi Electric MELSEC-F Series | 2022-01-13T00:00:00.000000Z | 2022-01-13T00:00:00.000000Z |
| icsa-22-013-01 | Mitsubishi Electric MELSEC-F Series | 2022-01-13T00:00:00.000000Z | 2022-01-13T00:00:00.000000Z |
| icsa-21-266-01 | Trane Symbio (Update B) | 2021-09-23T00:00:00.000000Z | 2022-01-13T00:00:00.000000Z |
| icsa-22-011-01 | Johnson Controls VideoEdge | 2022-01-11T00:00:00.000000Z | 2022-01-11T00:00:00.000000Z |
| icsma-22-006-01 | Philips Engage Software | 2022-01-06T00:00:00.000000Z | 2022-01-06T00:00:00.000000Z |
| icsa-22-006-03 | IDEC PLCs | 2022-01-06T00:00:00.000000Z | 2022-01-06T00:00:00.000000Z |
| icsa-22-006-02 | Fernhill SCADA | 2022-01-06T00:00:00.000000Z | 2022-01-06T00:00:00.000000Z |
| icsa-22-006-01 | Omron CX-One | 2022-01-06T00:00:00.000000Z | 2022-01-06T00:00:00.000000Z |
| icsa-21-357-02 | Johnson Controls exacq Enterprise Manager | 2021-12-23T00:00:00.000000Z | 2021-12-23T00:00:00.000000Z |
| icsa-21-357-01 | Moxa MGate Protocol Gateways | 2021-12-23T00:00:00.000000Z | 2021-12-23T00:00:00.000000Z |
| icsa-21-355-04 | Emerson DeltaV | 2021-12-21T00:00:00.000000Z | 2021-12-21T00:00:00.000000Z |
| icsa-21-355-03 | WECON LeviStudioU | 2021-12-21T00:00:00.000000Z | 2021-12-21T00:00:00.000000Z |
| icsa-21-355-02 | Horner Automation Cscape EnvisionRV | 2021-12-21T00:00:00.000000Z | 2021-12-21T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-ios-bgp-evpn-dos-lnfyjxff | Cisco IOS and IOS XE Software MP-BGP EVPN Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-ios-bgp-evpn-dos-LNfYJxfF | Cisco IOS and IOS XE Software MP-BGP EVPN Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-info-disclosure-v4bmjbnf | Cisco IOS and IOS XE Software Information Disclosure Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-info-disclosure-V4BmJBNF | Cisco IOS and IOS XE Software Information Disclosure Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-file-overwrite-ynu5prjd | Cisco IOS XE Software Arbitrary File Overwrite Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-file-overwrite-Ynu5PrJD | Cisco IOS XE Software Arbitrary File Overwrite Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-ewlc-icmpv6-qb9eyycr | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family Improper Access Control Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-ewlc-icmpv6-qb9eYyCR | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family Improper Access Control Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-esp20-arp-dos-gvhvggqj | Cisco IOS XE Software for Cisco ASR 1000 Series 20-Gbps Embedded Services Processor IP ARP Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-esp20-arp-dos-GvHVggqJ | Cisco IOS XE Software for Cisco ASR 1000 Series 20-Gbps Embedded Services Processor IP ARP Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-dclass-dos-vkh9d8k3 | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family WLAN Local Profiling Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-dclass-dos-VKh9D8k3 | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family WLAN Local Profiling Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-cops-vld-mpbtvgew | Cisco IOS XE Software Common Open Policy Service Engine Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-confacl-hbptfsuo | Cisco IOS XE Software RESTCONF and NETCONF-YANG Access Control List Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-confacl-HbPtfSuO | Cisco IOS XE Software RESTCONF and NETCONF-YANG Access Control List Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-capwap-dos-tpdntdyq | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Denial of Service Vulnerabilities | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-capwap-dos-shfzxf | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-capwap-dos-TPdNTdyq | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Denial of Service Vulnerabilities | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-capwap-dos-ShFzXf | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-aironet-dos-vhr2zg9y | Cisco Aironet Access Points UDP Flooding Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-aironet-dos-h3dculxw | Cisco Aironet Access Point Authentication Flood Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-aironet-dos-h3DCuLXw | Cisco Aironet Access Point Authentication Flood Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-aironet-dos-VHr2zG9y | Cisco Aironet Access Points UDP Flooding Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-WEB-UI-exNFmcPO | Cisco IOS XE Software Web UI Improper Input Validation Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-JP-DOS-g5FfGm8y | Cisco Catalyst 9200 Series Switches Jumbo Frame Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-ISR4461-gKKUROhx | Cisco IOS XE Software for Cisco 4461 Integrated Services Routers Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-COPS-VLD-MpbTvGEW | Cisco IOS XE Software Common Open Policy Service Engine Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-20190904-sma-info-dis | Cisco Content Security Management Appliance and Cisco Email Security Appliance Information Disclosure Vulnerability | 2019-09-04T16:00:00+00:00 | 2020-09-21T18:29:00+00:00 |
| cisco-sa-sbss-ipv6-dos-3blk6va | Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability | 2020-08-05T16:00:00+00:00 | 2020-09-04T14:34:39+00:00 |
| cisco-sa-sbss-ipv6-dos-3bLk6vA | Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability | 2020-08-05T16:00:00+00:00 | 2020-09-04T14:34:39+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2024-26656 | drm/amdgpu: fix use-after-free bug | 2024-04-02T07:00:00.000Z | 2025-09-04T00:25:04.000Z |
| msrc_cve-2023-53001 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2025-03-02T00:00:00.000Z | 2025-09-04T00:24:12.000Z |
| msrc_cve-2025-55199 | Helm Charts with Specific JSON Schema Values Can Cause Memory Exhaustion | 2025-08-02T00:00:00.000Z | 2025-09-04T00:23:40.000Z |
| msrc_cve-2025-1150 | GNU Binutils ld libbfd.c bfd_malloc memory leak | 2025-02-02T00:00:00.000Z | 2025-09-04T00:22:55.000Z |
| msrc_cve-2021-43666 | A Denial of Service vulnerability exists in mbed TLS 3.0.0 and earlier in the mbedtls_pkcs12_derivation function when an input password's length is 0. | 2022-03-02T00:00:00.000Z | 2025-09-04T00:22:28.000Z |
| msrc_cve-2019-20352 | In Netwide Assembler (NASM) 2.15rc0, a heap-based buffer over-read occurs (via a crafted .asm file) in set_text_free when called from expand_one_smacro in asm/preproc.c. | 2020-01-02T00:00:00.000Z | 2025-09-04T00:19:41.000Z |
| msrc_cve-2024-53221 | f2fs: fix null-ptr-deref in f2fs_submit_page_bio() | 2024-12-02T00:00:00.000Z | 2025-09-04T00:18:53.000Z |
| msrc_cve-2025-55198 | Helm May Panic Due To Incorrect YAML Content | 2025-08-02T00:00:00.000Z | 2025-09-04T00:18:06.000Z |
| msrc_cve-2024-57950 | drm/amd/display: Initialize denominator defaults to 1 | 2025-02-02T00:00:00.000Z | 2025-09-04T00:17:33.000Z |
| msrc_cve-2025-58058 | github.com/ulikunitz/xz leaks memory when decoding a corrupted multiple LZMA archives | 2025-08-02T00:00:00.000Z | 2025-09-04T00:16:28.000Z |
| msrc_cve-2022-48434 | libavcodec/pthread_frame.c in FFmpeg before 5.1.2, as used in VLC and other products, leaves stale hwaccel state in worker threads, which allows attackers to trigger a use-after-free and execute arbitrary code in some circumstances (e.g., hardware re-initialization upon a mid-video SPS change when Direct3D11 is used). | 2023-03-10T00:00:00.000Z | 2025-09-04T00:15:51.000Z |
| msrc_cve-2025-53859 | NGINX ngx_mail_smtp_module vulnerability | 2025-08-02T00:00:00.000Z | 2025-09-04T00:15:43.000Z |
| msrc_cve-2025-38098 | drm/amd/display: Don't treat wb connector as physical in create_validate_stream_for_sink | 2025-07-02T00:00:00.000Z | 2025-09-04T00:15:29.000Z |
| msrc_cve-2022-3637 | Linux Kernel BlueZ jlink.c jlink_init denial of service | 2022-10-02T00:00:00.000Z | 2025-09-04T00:15:11.000Z |
| msrc_cve-2023-52749 | spi: Fix null dereference on suspend | 2024-05-02T07:00:00.000Z | 2025-09-04T00:14:51.000Z |
| msrc_cve-2025-3277 | An integer overflow can be triggered in SQLite’s `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution. | 2025-04-02T00:00:00.000Z | 2025-09-04T00:14:10.000Z |
| msrc_cve-2024-26308 | Apache Commons Compress: OutOfMemoryError unpacking broken Pack200 file | 2024-02-02T08:00:00.000Z | 2025-09-04T00:13:43.000Z |
| msrc_cve-2025-6052 | Glib: integer overflow in g_string_maybe_expand() leading to potential buffer overflow in glib gstring | 2025-06-02T00:00:00.000Z | 2025-09-04T00:13:38.000Z |
| msrc_cve-2023-29406 | Insufficient sanitization of Host header in net/http | 2023-07-01T07:00:00.000Z | 2025-09-04T00:12:26.000Z |
| msrc_cve-2023-5176 | Memory safety bugs present in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and Thunderbird < 115.3. | 2023-09-01T00:00:00.000Z | 2025-09-04T00:11:43.000Z |
| msrc_cve-2023-27119 | WebAssembly v1.0.29 was discovered to contain a segmentation fault via the component wabt::Decompiler::WrapChild. | 2023-03-10T00:00:00.000Z | 2025-09-04T00:10:52.000Z |
| msrc_cve-2025-5889 | juliangruber brace-expansion index.js expand redos | 2025-06-02T00:00:00.000Z | 2025-09-04T00:10:37.000Z |
| msrc_cve-2019-1547 | ECDSA remote timing attack | 2019-09-02T00:00:00.000Z | 2025-09-04T00:10:29.000Z |
| msrc_cve-2024-26718 | dm-crypt, dm-verity: disable tasklets | 2024-04-02T07:00:00.000Z | 2025-09-04T00:09:48.000Z |
| msrc_cve-2025-8715 | PostgreSQL pg_dump newline in object name executes arbitrary code in psql client and in restore target server | 2025-08-02T00:00:00.000Z | 2025-09-04T00:09:05.000Z |
| msrc_cve-2023-45290 | Memory exhaustion in multipart form parsing in net/textproto and net/http | 2024-03-02T08:00:00.000Z | 2025-09-04T00:08:16.000Z |
| msrc_cve-2021-32256 | An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.36. It is a stack-overflow issue in demangle_type in rust-demangle.c. | 2023-07-01T07:00:00.000Z | 2025-09-04T00:08:01.000Z |
| msrc_cve-2025-23132 | f2fs: quota: fix to avoid warning in dquot_writeback_dquots() | 2025-04-02T00:00:00.000Z | 2025-09-04T00:07:59.000Z |
| msrc_cve-2022-49496 | media: mediatek: vcodec: prevent kernel crash when rmmod mtk-vcodec-dec.ko | 2025-02-02T00:00:00.000Z | 2025-09-04T00:07:01.000Z |
| msrc_cve-2025-29087 | In SQLite 3.44.0 through 3.49.0 before 3.49.1, the concat_ws() SQL function can cause memory to be written beyond the end of a malloc-allocated buffer. If the separator argument is attacker-controlled and has a large string (e.g., 2MB or more), an integer overflow occurs in calculating the size of the result buffer, and thus malloc may not allocate enough memory. | 2025-04-02T00:00:00.000Z | 2025-09-04T00:06:55.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:13814-1 | buildah-1.35.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13813-1 | libmbedcrypto7-2.28.8-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13812-1 | etcd-3.5.12-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13811-1 | python310-validators-0.24.0-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13810-1 | nodejs-electron-28.2.9-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13809-1 | libwireshark17-4.2.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13808-1 | libqpid-proton-core10-0.38.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13807-1 | ovmf-202308-7.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13806-1 | gnutls-3.8.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13805-1 | curl-8.7.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13804-1 | avahi-0.8-33.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13803-1 | libonnx-1.16.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13802-1 | python-Scrapy-doc-2.11.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13801-1 | xen-4.18.1_02-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13800-1 | python39-3.9.19-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13799-1 | python310-3.10.14-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13798-1 | python310-jwcrypto-1.5.6-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13797-1 | python310-astropy-6.0.0-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13796-1 | libvirt-10.1.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13795-1 | MozillaFirefox-124.0.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13794-1 | python311-3.11.8-5.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13793-1 | libfreebl3-3.98-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13792-1 | diffoscope-261-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13791-1 | apache-commons-configuration2-2.10.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13790-1 | python38-3.8.19-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13789-1 | MozillaThunderbird-115.9.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13788-1 | ini4j-0.5.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13787-1 | eclipse-emf-core-2.22.0-5.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13786-1 | eclipse-contributor-tools-4.15-13.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13785-1 | kernel-devel-6.8.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2024-11274 | URL Redirection to Untrusted Site ('Open Redirect') in GitLab | 2024-12-16T07:24:08.091Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-1066 | Allocation of Resources Without Limits or Throttling in GitLab | 2024-03-06T10:52:51.603Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-10240 | Exposure of Sensitive System Information to an Unauthorized Control Sphere in GitLab | 2024-11-28T19:22:10.536Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-10043 | Incorrect Authorization in GitLab | 2024-12-16T07:24:22.581Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-0861 | Direct Request ('Forced Browsing') in GitLab | 2024-03-06T10:53:03.603Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-0456 | Direct Request ('Forced Browsing') in GitLab | 2024-03-06T10:53:14.072Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-0410 | Improper Enforcement of Behavioral Workflow in GitLab | 2024-03-06T10:53:23.990Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-0402 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in GitLab | 2024-03-06T10:53:34.701Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-0231 | Improper Control of Resource Identifiers ('Resource Injection') in GitLab | 2024-07-26T07:32:53.059Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-0199 | Incorrect Authorization in GitLab | 2024-03-12T08:25:54.981Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-7045 | Cross-Site Request Forgery (CSRF) in GitLab | 2024-05-29T07:29:24.176Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-6955 | Missing Authorization in GitLab | 2024-03-06T10:53:55.060Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-6840 | Missing Authorization in GitLab | 2024-03-06T10:54:04.182Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-6736 | Inefficient Regular Expression Complexity in GitLab | 2024-03-06T10:54:14.703Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-6688 | Inefficient Regular Expression Complexity in GitLab | 2024-05-24T07:28:37.252Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-6682 | Inefficient Regular Expression Complexity in GitLab | 2024-05-24T07:29:06.845Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-6680 | Improper Certificate Validation in GitLab | 2024-03-06T10:54:27.113Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-6678 | Inefficient Regular Expression Complexity in GitLab | 2024-04-16T07:22:40.787Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-6564 | Incorrect Authorization in GitLab | 2024-03-06T10:54:37.083Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-6502 | Inefficient Regular Expression Complexity in GitLab | 2024-05-29T07:32:46.972Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-6489 | Inefficient Regular Expression Complexity in GitLab | 2024-04-16T07:23:13.267Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-6477 | Incorrect Privilege Assignment in GitLab | 2024-03-06T10:54:47.087Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-6371 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2024-04-03T10:54:37.708Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-6159 | Inefficient Regular Expression Complexity in GitLab | 2024-03-06T10:54:58.964Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-6051 | Improper Control of Generation of Code ('Code Injection') in GitLab | 2024-03-06T10:55:11.174Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-6033 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2024-03-06T10:55:22.109Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-5995 | Incorrect Authorization in GitLab | 2024-03-06T10:55:33.280Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-5963 | Allocation of Resources Without Limits or Throttling in GitLab | 2024-03-06T10:55:44.971Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-5933 | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in GitLab | 2024-03-06T10:55:55.788Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-5831 | Insertion of Sensitive Information Into Sent Data in GitLab | 2024-03-06T10:56:04.198Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|---|---|
| var-202309-2249 | Memory corruption in Graphics while processing user packets for command submission. APQ80… | 2024-04-18T13:16:22.104000Z |
| var-202202-1170 | A CWE-787: Out-of-bounds Write vulnerability exists that could cause denial of service wh… | 2024-04-18T13:14:42.520000Z |
| var-202202-1169 | A CWE-20: Improper Input Validation vulnerability exists that could cause denial of servi… | 2024-04-18T13:14:42.579000Z |
| var-202202-1168 | A CWE-200: Information Exposure vulnerability exists that could cause sensitive informati… | 2024-04-18T13:14:42.548000Z |
| var-202309-2076 | Transient DOS in WLAN Host while doing channel switch announcement (CSA), when a mobile s… | 2024-04-18T13:14:33.200000Z |
| var-202311-1173 | Memory corruption in Audio while processing the VOC packet data from ADSP. 315 5g iot mod… | 2024-04-18T13:14:32.911000Z |
| var-202112-0168 | Buffer overflow vulnerability in ELECOM LAN routers (WRH-733GBK firmware v1.02.9 and prio… | 2024-04-18T13:10:59.648000Z |
| var-202112-0167 | ELECOM LAN routers (WRH-733GBK firmware v1.02.9 and prior and WRH-733GWH firmware v1.02.9… | 2024-04-18T13:10:59.853000Z |
| var-202205-1608 | Improper access control vulnerability in Rakuten Casa version AP_F_V1_4_1 or AP_F_V2_0_0 … | 2024-04-18T13:10:56.026000Z |
| var-202205-1607 | Improper access control vulnerability in Rakuten Casa version AP_F_V1_4_1 or AP_F_V2_0_0 … | 2024-04-18T13:10:56Z |
| var-202205-1606 | Rakuten Casa version AP_F_V1_4_1 or AP_F_V2_0_0 uses a hard-coded credential which may al… | 2024-04-18T13:10:56.052000Z |
| var-202303-0155 | Memory corruption in modem due to buffer overflow while processing a PPP packet. APQ8009 … | 2024-04-18T11:51:41.022000Z |
| var-202307-0110 | Memory Corruption in WLAN HOST while fetching TX status information. 315 5g iot firmware,… | 2024-04-18T11:25:45.574000Z |
| var-202303-0126 | Memory corruption in Bluetooth HOST while processing the AVRC_PDU_GET_PLAYER_APP_VALUE_TE… | 2024-04-18T11:17:44.504000Z |
| var-202303-0162 | Information Disclosure in Graphics during GPU context switch. APQ8009 firmware, APQ8009W … | 2024-04-18T11:10:55.651000Z |
| var-202303-0143 | Memory corruption in WLAN HAL while arbitrary value is passed in WMI UTF command payload.… | 2024-04-18T11:09:36.601000Z |
| var-202301-0630 | A vulnerability has been identified in Automation License Manager V5 (All versions), Auto… | 2024-04-18T10:39:52.317000Z |
| var-202303-0140 | Memory corruption in Video due to double free while playing 3gp clip with invalid metadat… | 2024-04-18T10:05:37.297000Z |
| var-202404-0059 | None | 2024-04-18T05:34:30.626000Z |
| var-202404-0058 | None | 2024-04-18T05:34:30.548000Z |
| var-202404-0057 | None | 2024-04-18T05:34:30.505000Z |
| var-202404-0056 | None | 2024-04-18T05:34:30.562000Z |
| var-202404-0055 | None | 2024-04-18T05:34:30.658000Z |
| var-202403-2496 | Improper authentication vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG19… | 2024-04-18T05:34:30.688000Z |
| var-202403-2300 | Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200H… | 2024-04-18T05:34:30.594000Z |
| var-202403-2122 | Improper authentication vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG19… | 2024-04-18T05:34:30.672000Z |
| var-202403-1925 | Active Debug Code in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG… | 2024-04-18T05:34:30.641000Z |
| var-202403-1757 | Improper authentication vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG19… | 2024-04-18T05:34:30.610000Z |
| var-202403-1555 | Stack-based Buffer Overflow vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, … | 2024-04-18T05:34:30.530000Z |
| var-202403-1178 | Improper authentication vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG19… | 2024-04-18T05:34:30.577000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2011-000049 | Opera vulnerable to denial-of-service (DoS) | 2011-07-05T16:54+09:00 | 2011-07-05T16:54+09:00 |
| jvndb-2011-000048 | ALZip vulnerable to buffer overflow | 2011-06-29T18:20+09:00 | 2011-06-29T18:20+09:00 |
| jvndb-2010-002807 | Accela BizSearch Standard Search Page Cross-Site Scripting Vulnerability | 2011-06-29T17:57+09:00 | 2011-06-29T17:57+09:00 |
| jvndb-2010-002809 | Accela BizSearch Standard Search Page Cross-Site Scripting Vulnerability | 2011-06-29T17:55+09:00 | 2011-06-29T17:55+09:00 |
| jvndb-2010-002808 | Accela BizSearch Standard Search Page Cross-Site Scripting Vulnerability | 2011-06-29T17:55+09:00 | 2011-06-29T17:55+09:00 |
| jvndb-2011-000047 | Cybozu Office vulnerable to cross-site scripting | 2011-06-24T19:23+09:00 | 2011-06-24T19:23+09:00 |
| jvndb-2011-000046 | Multiple Cybozu products vulnerable to cross-site scripting | 2011-06-24T19:21+09:00 | 2011-06-24T19:21+09:00 |
| jvndb-2011-000045 | Multiple Cybozu products vulnerable to cross-site scripting | 2011-06-24T19:18+09:00 | 2011-06-24T19:18+09:00 |
| jvndb-2011-000044 | Cybozu Garoon vulnerable to cross-site scripting | 2011-06-24T19:15+09:00 | 2011-06-24T19:15+09:00 |
| jvndb-2011-000042 | WeblyGo vulnerable to cross-site scripting | 2011-06-20T15:37+09:00 | 2011-06-20T15:37+09:00 |
| jvndb-2011-000043 | Ichitaro series vulnerable to arbitrary code execution | 2011-06-16T19:04+09:00 | 2011-06-16T19:04+09:00 |
| jvndb-2011-000041 | Microsoft MSXML vulnerability in HTTP request processing | 2011-06-16T12:28+09:00 | 2011-06-16T12:28+09:00 |
| jvndb-2011-000040 | Microsoft Outlook read receipt function vulnerability | 2011-06-16T12:25+09:00 | 2011-06-16T12:25+09:00 |
| jvndb-2011-000039 | ASP.NET vulnerable to cross-site scripting | 2011-06-16T12:23+09:00 | 2011-06-16T12:23+09:00 |
| jvndb-2011-000038 | Internet Explorer vulnerable to cross-site scripting | 2011-06-16T12:21+09:00 | 2011-06-16T12:21+09:00 |
| jvndb-2011-000037 | Clipboard contents alteration vulnerability in Internet Explorer | 2011-06-16T12:18+09:00 | 2011-06-16T12:18+09:00 |
| jvndb-2011-000036 | Microsoft Windows VBScript implementation file name disclosure vulnerability | 2011-06-16T12:11+09:00 | 2011-06-16T12:11+09:00 |
| jvndb-2008-000072 | Movable Type cross-site scripting vulnerability | 2008-10-21T19:25+09:00 | 2011-05-31T10:57+09:00 |
| jvndb-2011-000024 | Multiple Yamaha routers vulnerable to denial-of-service (DoS) | 2011-05-11T08:32+09:00 | 2011-05-31T10:39+09:00 |
| jvndb-2011-000032 | WalRack upload file handilng vulnerability | 2011-05-26T13:37+09:00 | 2011-05-26T13:37+09:00 |
| jvndb-2011-000031 | Movable Type vulnerable to cross-site scripting | 2011-05-25T17:37+09:00 | 2011-05-25T17:37+09:00 |
| jvndb-2011-000030 | iVIEW Suite vulnerable to SQL injection | 2011-05-19T16:49+09:00 | 2011-05-19T16:49+09:00 |
| jvndb-2011-000028 | Virus Buster 2009 key input encryption function vulnerability | 2011-05-17T17:17+09:00 | 2011-05-17T17:17+09:00 |
| jvndb-2011-000026 | Applications that use the Windows Help function may be vulnerable to privilege escalation | 2011-05-13T19:36+09:00 | 2011-05-13T19:36+09:00 |
| jvndb-2011-000027 | La Fonera+ vulnerable to denial-of-service (DoS) | 2011-05-13T19:17+09:00 | 2011-05-13T19:17+09:00 |
| jvndb-2011-000029 | EC-CUBE vulnerable to cross-site request forgery | 2011-05-11T08:44+09:00 | 2011-05-11T08:44+09:00 |
| jvndb-2011-000025 | Multiple Buffalo routers vulnerable to cross-site request forgery | 2011-05-11T08:37+09:00 | 2011-05-11T08:37+09:00 |
| jvndb-2011-000023 | Password Vault Web Access vulnerable to cross-site scripting | 2011-04-08T14:09+09:00 | 2011-04-08T14:09+09:00 |
| jvndb-2011-001156 | Hitachi Tuning Manager Software Cross-Site Scripting Vulnerability | 2011-04-01T15:52+09:00 | 2011-04-01T15:52+09:00 |
| jvndb-2011-000022 | Picasa may insecurely load executable files | 2011-03-28T08:11+09:00 | 2011-03-28T08:11+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:01849-1 | Security update for the Linux Kernel (Live Patch 60 for SLE 12 SP5) | 2025-06-09T22:33:38Z | 2025-06-09T22:33:38Z |
| suse-su-2025:01848-1 | Security update for go1.23 | 2025-06-09T18:35:17Z | 2025-06-09T18:35:17Z |
| suse-su-2025:01846-1 | Security update for go1.24 | 2025-06-09T18:34:01Z | 2025-06-09T18:34:01Z |
| suse-su-2025:01844-1 | Security update for the Linux Kernel (Live Patch 57 for SLE 12 SP5) | 2025-06-09T16:33:36Z | 2025-06-09T16:33:36Z |
| suse-su-2025:01843-1 | Security update for the Linux Kernel RT (Live Patch 9 for SLE 15 SP6) | 2025-06-09T15:33:48Z | 2025-06-09T15:33:48Z |
| suse-su-2025:01840-1 | Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6) | 2025-06-09T15:33:37Z | 2025-06-09T15:33:37Z |
| suse-su-2025:01839-1 | Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP6) | 2025-06-09T15:04:00Z | 2025-06-09T15:04:00Z |
| suse-su-2025:01534-1 | Security update for augeas | 2025-06-09T13:28:22Z | 2025-06-09T13:28:22Z |
| suse-su-2025:01776-2 | Security update for iputils | 2025-06-09T13:27:23Z | 2025-06-09T13:27:23Z |
| suse-su-2025:01835-1 | Security update for transfig | 2025-06-09T13:24:44Z | 2025-06-09T13:24:44Z |
| suse-su-2025:20394-1 | Security update for less | 2025-06-08T13:39:10Z | 2025-06-08T13:39:10Z |
| suse-su-2025:20380-1 | Security update for iputils | 2025-06-08T13:25:40Z | 2025-06-08T13:25:40Z |
| suse-su-2025:20379-1 | Security update for open-vm-tools | 2025-06-08T13:23:03Z | 2025-06-08T13:23:03Z |
| suse-su-2025:01830-1 | Security update for helm-mirror | 2025-06-06T15:17:40Z | 2025-06-06T15:17:40Z |
| suse-su-2025:01569-1 | Security update for libraw | 2025-06-06T13:12:49Z | 2025-06-06T13:12:49Z |
| suse-su-2025:01572-1 | Security update for libraw | 2025-06-06T13:12:42Z | 2025-06-06T13:12:42Z |
| suse-su-2025:01779-2 | Security update for iputils | 2025-06-06T12:20:50Z | 2025-06-06T12:20:50Z |
| suse-su-2025:00764-1 | Security update for gnutls | 2025-06-06T10:05:59Z | 2025-06-06T10:05:59Z |
| suse-su-2025:01508-1 | Security update for openvpn | 2025-06-06T10:05:10Z | 2025-06-06T10:05:10Z |
| suse-su-2025:01638-2 | Security update for openssh | 2025-06-06T10:04:40Z | 2025-06-06T10:04:40Z |
| suse-su-2025:01726-2 | Security update for python-tornado | 2025-06-06T09:51:13Z | 2025-06-06T09:51:13Z |
| suse-su-2025:01571-1 | Security update for gimp | 2025-06-05T14:08:08Z | 2025-06-05T14:08:08Z |
| suse-su-2025:01818-1 | Security update for python-cryptography | 2025-06-05T13:53:11Z | 2025-06-05T13:53:11Z |
| suse-su-2025:01500-1 | Security update for opensaml | 2025-06-05T13:19:08Z | 2025-06-05T13:19:08Z |
| suse-su-2025:20393-1 | Security update for docker | 2025-06-05T08:36:35Z | 2025-06-05T08:36:35Z |
| suse-su-2025:20377-1 | Security update for docker | 2025-06-05T08:25:35Z | 2025-06-05T08:25:35Z |
| suse-su-2025:01525-1 | Security update for java-1_8_0-openjdk | 2025-06-05T07:48:32Z | 2025-06-05T07:48:32Z |
| suse-su-2025:01704-2 | Security update for python-setuptools | 2025-06-05T07:48:13Z | 2025-06-05T07:48:13Z |
| suse-su-2025:01817-1 | Security update for libsoup | 2025-06-05T06:52:42Z | 2025-06-05T06:52:42Z |
| suse-su-2025:01816-1 | Security update for libcryptopp | 2025-06-04T17:03:40Z | 2025-06-04T17:03:40Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-26937 | D-Link DIR600L formSetWAN_Wizard52函数缓冲区溢出漏洞 | 2025-10-30 | 2025-11-04 |
| cnvd-2025-26936 | D-Link DIR600L formSetRoute函数缓冲区溢出漏洞 | 2025-10-30 | 2025-11-04 |
| cnvd-2025-26935 | D-Link DIR600L formSetQoS函数缓冲区溢出漏洞 | 2025-10-30 | 2025-11-04 |
| cnvd-2025-26934 | D-Link DIR600L formSetPortTr函数缓冲区溢出漏洞 | 2025-10-30 | 2025-11-04 |
| cnvd-2025-26933 | D-Link DIR600L formSetMACFilter函数缓冲区溢出漏洞 | 2025-10-30 | 2025-11-04 |
| cnvd-2025-26932 | D-Link DIR600L formSetLog函数缓冲区溢出漏洞 | 2025-10-30 | 2025-11-04 |
| cnvd-2025-26931 | D-Link DIR600L formSetEnableWizard函数缓冲区溢出漏洞 | 2025-10-30 | 2025-11-04 |
| cnvd-2025-26930 | D-Link DIR600L formSetEmail函数缓冲区溢出漏洞 | 2025-10-30 | 2025-11-04 |
| cnvd-2025-26929 | D-Link DIR600L formLanSetupRouterSettings函数缓冲区溢出漏洞 | 2025-10-30 | 2025-11-04 |
| cnvd-2025-26928 | D-Link DIR600L formSetEasy_Wizard函数缓冲区溢出漏洞 | 2025-10-30 | 2025-11-04 |
| cnvd-2025-26927 | D-Link DIR600L formSetDomainFilter函数缓冲区溢出漏洞 | 2025-10-30 | 2025-11-04 |
| cnvd-2025-26926 | D-Link DIR600L formSchedule函数缓冲区溢出漏洞 | 2025-10-30 | 2025-11-04 |
| cnvd-2025-26925 | D-Link DIR600L formLogDnsquery函数缓冲区溢出漏洞 | 2025-10-30 | 2025-11-04 |
| cnvd-2025-26924 | D-Link DIR600L formEasySetTimezone函数缓冲区溢出漏洞 | 2025-10-30 | 2025-11-04 |
| cnvd-2025-26923 | D-Link DIR600L formDeviceReboot函数缓冲区溢出漏洞 | 2025-10-30 | 2025-11-04 |
| cnvd-2025-26922 | D-Link DIR600L formAutoDetecWAN_wizard4函数缓冲区溢出漏洞 | 2025-10-30 | 2025-11-04 |
| cnvd-2025-26921 | D-Link DIR600L formAdvNetwork函数缓冲区溢出漏洞 | 2025-10-30 | 2025-11-04 |
| cnvd-2025-26920 | D-Link DIR600L formAdvFirewall函数缓冲区溢出漏洞 | 2025-10-30 | 2025-11-04 |
| cnvd-2025-26919 | E-Commerce Website supplier_add.php文件跨站脚本漏洞 | 2025-10-31 | 2025-11-04 |
| cnvd-2025-26918 | E-Commerce Website product_add.php文件跨站脚本漏洞 | 2025-10-31 | 2025-11-04 |
| cnvd-2025-26917 | E-Commerce Website supplier_update.php文件跨站脚本漏洞 | 2025-10-31 | 2025-11-04 |
| cnvd-2025-26818 | D-Link DIR-X3260缓冲区溢出漏洞 | 2023-10-07 | 2025-11-04 |
| cnvd-2025-26792 | Google Android混淆代理漏洞(CNVD-2025-26792) | 2025-09-08 | 2025-11-04 |
| cnvd-2025-26791 | Google Android混淆代理漏洞 | 2025-09-08 | 2025-11-04 |
| cnvd-2025-26790 | Google Android释放后重用漏洞 | 2025-09-08 | 2025-11-04 |
| cnvd-2025-26787 | Dell Storage Manager关键功能缺失身份验证漏洞 | 2025-10-31 | 2025-11-04 |
| cnvd-2025-26733 | Google Android存在未明漏洞(CNVD-2025-26733) | 2025-09-08 | 2025-11-04 |
| cnvd-2025-26732 | Google Android权限提升漏洞(CNVD-2025-26732) | 2025-09-08 | 2025-11-04 |
| cnvd-2025-26731 | Google Android权限提升漏洞(CNVD-2025-26731) | 2025-09-08 | 2025-11-04 |
| cnvd-2025-26730 | Google Android权限提升漏洞(CNVD-2025-26730) | 2025-09-08 | 2025-11-04 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2024-avi-1071 | Multiples vulnérabilités dans les produits Tenable | 2024-12-12T00:00:00.000000 | 2024-12-12T00:00:00.000000 |
| CERTFR-2024-AVI-1074 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2024-12-12T00:00:00.000000 | 2024-12-12T00:00:00.000000 |
| CERTFR-2024-AVI-1073 | Vulnérabilité dans les produits Mozilla | 2024-12-12T00:00:00.000000 | 2024-12-12T00:00:00.000000 |
| CERTFR-2024-AVI-1072 | Multiples vulnérabilités dans les produits Apple | 2024-12-12T00:00:00.000000 | 2024-12-12T00:00:00.000000 |
| CERTFR-2024-AVI-1071 | Multiples vulnérabilités dans les produits Tenable | 2024-12-12T00:00:00.000000 | 2024-12-12T00:00:00.000000 |
| certfr-2024-avi-1070 | Multiples vulnérabilités dans les produits Microsoft | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1069 | Multiples vulnérabilités dans Microsoft Windows | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1068 | Multiples vulnérabilités dans Microsoft Office | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1067 | Multiples vulnérabilités dans les produits Atlassian | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1066 | Vulnérabilité dans Apache Struts | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1065 | Multiples vulnérabilités dans GitLab | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1064 | Multiples vulnérabilités dans GLPI | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1063 | Vulnérabilité dans cURL et libcurl | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1062 | Multiples vulnérabilités dans les produits Siemens | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1061 | Multiples vulnérabilités dans les produits Splunk | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1060 | Multiples vulnérabilités dans Ruby on Rails | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1059 | Multiples vulnérabilités dans les produits Intel | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1058 | Multiples vulnérabilités dans les produits Ivanti | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1057 | Multiples vulnérabilités dans les produits HPE Aruba Networking | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1056 | Multiples vulnérabilités dans les produits Adobe | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| certfr-2024-avi-1055 | Multiples vulnérabilités dans Google Chrome | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| CERTFR-2024-AVI-1070 | Multiples vulnérabilités dans les produits Microsoft | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| CERTFR-2024-AVI-1069 | Multiples vulnérabilités dans Microsoft Windows | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| CERTFR-2024-AVI-1068 | Multiples vulnérabilités dans Microsoft Office | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| CERTFR-2024-AVI-1067 | Multiples vulnérabilités dans les produits Atlassian | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| CERTFR-2024-AVI-1066 | Vulnérabilité dans Apache Struts | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| CERTFR-2024-AVI-1065 | Multiples vulnérabilités dans GitLab | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| CERTFR-2024-AVI-1064 | Multiples vulnérabilités dans GLPI | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| CERTFR-2024-AVI-1063 | Vulnérabilité dans cURL et libcurl | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |
| CERTFR-2024-AVI-1062 | Multiples vulnérabilités dans les produits Siemens | 2024-12-11T00:00:00.000000 | 2024-12-11T00:00:00.000000 |