Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-11345 |
5.1 (4.0)
5.5 (3.1)
5.5 (3.0)
|
ILIAS Test Import unserialize deserialization |
n/a |
ILIAS |
2025-10-06T19:02:05.514Z | 2026-01-23T18:24:14.342Z |
| CVE-2025-11344 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
ILIAS Certificate Import code injection |
n/a |
ILIAS |
2025-10-06T18:32:05.924Z | 2026-01-23T18:23:44.521Z |
| CVE-2025-14947 |
6.5 (3.1)
|
All-in-One Video Gallery <= 4.6.4 - Missing Authorizat… |
plugins360 |
All-in-One Video Gallery |
2026-01-23T17:26:06.739Z | 2026-01-23T18:20:37.750Z |
| CVE-2026-21867 |
N/A
|
Reason: This candidate was issued in error. | N/A | N/A | 2026-01-23T18:19:39.118Z | |
| CVE-2026-22241 |
7.3 (4.0)
|
Open eClass has Unrestricted File Upload that Leads to… |
gunet |
openeclass |
2026-01-08T15:07:02.350Z | 2026-01-23T18:18:44.253Z |
| CVE-2025-67824 |
6.1 (3.1)
|
The WorklogPRO - Jira Timesheets plugin in the Ji… |
n/a |
n/a |
2026-01-20T00:00:00.000Z | 2026-01-23T18:17:32.362Z |
| CVE-2024-22087 |
9.8 (3.1)
|
route in main.c in Pico HTTP Server in C through … |
n/a |
n/a |
2024-01-05T00:00:00.000Z | 2026-01-23T18:09:08.762Z |
| CVE-2026-0863 |
8.5 (3.1)
|
Sandbox escape in n8n Python task runner allows for ar… |
|
|
2026-01-18T15:37:07.529Z | 2026-01-23T17:58:14.442Z |
| CVE-2025-59952 |
8.7 (4.0)
|
minio-java Client XML Tag is Vulnerable to Value Subst… |
minio |
minio-java |
2025-09-29T23:32:33.994Z | 2026-01-23T17:37:00.458Z |
| CVE-2025-59432 |
6.6 (4.0)
|
Timing Attack Vulnerability in SCRAM Authentication |
ongres |
scram |
2025-09-22T19:22:37.117Z | 2026-01-23T17:27:49.976Z |
| CVE-2025-54876 |
6.9 (4.0)
|
Jans CLI stores plaintext passwords in the local cli_c… |
JanssenProject |
jans |
2025-08-05T23:35:51.900Z | 2026-01-23T17:22:02.177Z |
| CVE-2025-32963 |
6.9 (4.0)
|
Minio Operator uses Kubernetes apiserver audience for … |
minio |
operator |
2025-04-22T17:14:56.958Z | 2026-01-23T17:16:16.416Z |
| CVE-2025-31130 |
6.8 (3.1)
|
gitoxide does not detect SHA-1 collision attacks |
GitoxideLabs |
gitoxide |
2025-04-04T14:41:56.355Z | 2026-01-23T17:08:57.443Z |
| CVE-2025-24976 |
6.6 (4.0)
|
Distribution's token authentication allows attacker to… |
distribution |
distribution |
2025-02-11T15:48:59.700Z | 2026-01-23T17:04:22.154Z |
| CVE-2024-9341 |
5.4 (3.1)
|
Podman: buildah: cri-o: fips crypto-policy directory m… |
|
|
2024-10-01T18:52:00.686Z | 2026-01-23T17:03:58.083Z |
| CVE-2024-8883 |
6.1 (3.1)
|
Keycloak: vulnerable redirect uri validation results i… |
|
|
2024-09-19T15:48:28.468Z | 2026-01-23T17:03:54.986Z |
| CVE-2024-7006 |
7.5 (3.1)
|
Libtiff: null pointer dereference in tif_dirinfo.c |
|
|
2024-08-08T20:49:45.373Z | 2026-01-23T17:00:51.034Z |
| CVE-2024-7260 |
6.1 (3.1)
|
Keycloak-core: open redirect on account page |
|
|
2024-09-09T18:49:59.437Z | 2026-01-23T17:00:35.528Z |
| CVE-2025-31125 |
5.3 (3.1)
|
Vite has a `server.fs.deny` bypassed for `inline` and … |
vitejs |
vite |
2025-03-31T17:06:30.704Z | 2026-01-23T16:58:37.048Z |
| CVE-2026-0798 |
3.5 (3.1)
|
Gitea Release Email Notifications Leak Private Reposit… |
Gitea |
Gitea Open Source Git Server |
2026-01-22T22:01:49.410Z | 2026-01-23T16:49:04.309Z |
| CVE-2025-67230 |
7.1 (3.1)
|
Improper permissions in the handler for the Custo… |
n/a |
n/a |
2026-01-23T00:00:00.000Z | 2026-01-23T16:44:02.831Z |
| CVE-2025-31478 |
8.2 (3.1)
|
Zulip Authentication Backend Configuration Bypass |
zulip |
zulip |
2025-04-16T21:28:23.087Z | 2026-01-23T16:42:16.303Z |
| CVE-2025-70899 |
6.5 (3.1)
|
PHPgurukul Online Course Registration v3.1 lacks … |
n/a |
n/a |
2026-01-22T00:00:00.000Z | 2026-01-23T16:40:22.807Z |
| CVE-2026-0792 |
8.1 (3.0)
|
ALGO 8180 IP Audio Alerter SIP INVITE Alert-Info Stack… |
ALGO |
8180 IP Audio Alerter |
2026-01-23T03:01:28.992Z | 2026-01-23T16:37:17.232Z |
| CVE-2026-0793 |
8.1 (3.0)
|
ALGO 8180 IP Audio Alerter InformaCast Heap-based Buff… |
ALGO |
8180 IP Audio Alerter |
2026-01-23T03:01:32.721Z | 2026-01-23T16:36:50.354Z |
| CVE-2026-0794 |
8.1 (3.0)
|
ALGO 8180 IP Audio Alerter SIP Use-After-Free Remote C… |
ALGO |
8180 IP Audio Alerter |
2026-01-23T03:01:36.462Z | 2026-01-23T16:36:15.928Z |
| CVE-2026-0795 |
7.2 (3.0)
|
ALGO 8180 IP Audio Alerter Web UI Command Injection Re… |
ALGO |
8180 IP Audio Alerter |
2026-01-23T03:01:40.234Z | 2026-01-23T16:35:41.535Z |
| CVE-2025-15062 |
7.8 (3.0)
|
Trimble SketchUp SKP File Parsing Use-After-Free Remot… |
Trimble |
SketchUp |
2026-01-23T03:19:43.703Z | 2026-01-23T16:35:13.716Z |
| CVE-2026-0767 |
5.3 (3.0)
|
Open WebUI Cleartext Transmission of Credentials Infor… |
Open WebUI |
Open WebUI |
2026-01-23T03:28:39.523Z | 2026-01-23T16:33:51.687Z |
| CVE-2025-30167 |
7.3 (3.1)
|
Jupyter Core on Windows Has Uncontrolled Search Path E… |
jupyter |
jupyter_core |
2025-06-03T16:42:16.357Z | 2026-01-23T16:31:03.690Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-22388 |
5.9 (3.1)
|
WordPress Owl Carousel WP plugin <= 2.2.2 - Cross Site… |
Imran Emu |
Owl Carousel WP |
2026-01-22T16:52:35.756Z | 2026-01-27T20:09:28.766Z |
| CVE-2026-22382 |
5.4 (3.1)
|
WordPress PawFriends - Pet Shop and Veterinary WordPre… |
Mikado-Themes |
PawFriends - Pet Shop and Veterinary WordPress Theme |
2026-01-22T16:52:35.559Z | 2026-01-27T20:11:25.772Z |
| CVE-2025-70368 |
5.4 (3.1)
|
Worklenz version 2.1.5 contains a Stored Cross-Si… |
n/a |
n/a |
2026-01-26T00:00:00.000Z | 2026-01-27T19:56:00.363Z |
| CVE-2025-69184 |
7.3 (3.1)
|
WordPress Institutions Directory plugin <= 1.3.4 - Bro… |
e-plugins |
Institutions Directory |
2026-01-22T16:52:29.027Z | 2026-01-27T20:07:24.867Z |
| CVE-2024-50571 |
6.5 (3.1)
|
A heap-based buffer overflow vulnerability in For… |
Fortinet |
FortiManager |
2025-10-14T15:23:00.197Z | 2026-01-27T19:32:15.414Z |
| CVE-2025-47906 |
6.5 (3.1)
|
Unexpected paths returned from LookPath in os/exec |
Go standard library |
os/exec |
2025-09-18T18:41:11.847Z | 2025-11-04T21:10:54.782Z |
| CVE-2025-60116 |
5.4 (3.1)
|
WordPress Grand Conference Theme Custom Post Type Plug… |
ThemeGoods |
Grand Conference Theme Custom Post Type |
2025-09-26T08:31:33.671Z | 2025-09-26T15:13:28.217Z |
| CVE-2025-39939 |
N/A
|
iommu/s390: Fix memory corruption when using identity domain |
Linux |
Linux |
2025-10-04T07:31:02.521Z | 2025-10-04T07:31:02.521Z |
| CVE-2025-39942 |
N/A
|
ksmbd: smbdirect: verify remaining_data_length respect… |
Linux |
Linux |
2025-10-04T07:31:04.810Z | 2025-10-04T07:31:04.810Z |
| CVE-2025-39943 |
N/A
|
ksmbd: smbdirect: validate data_offset and data_length… |
Linux |
Linux |
2025-10-04T07:31:05.581Z | 2025-10-04T07:37:03.203Z |
| CVE-2025-39944 |
N/A
|
octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() |
Linux |
Linux |
2025-10-04T07:31:06.339Z | 2025-10-04T07:31:06.339Z |
| CVE-2025-39946 |
N/A
|
tls: make sure to abort the stream if headers are bogus |
Linux |
Linux |
2025-10-04T07:31:07.871Z | 2025-10-04T07:31:07.871Z |
| CVE-2026-1141 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
PHPGurukul News Portal Add Sub-Admin add-subadmins.php… |
PHPGurukul |
News Portal |
2026-01-19T06:02:07.574Z | 2026-01-20T21:26:51.904Z |
| CVE-2026-1142 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
PHPGurukul News Portal cross-site request forgery |
PHPGurukul |
News Portal |
2026-01-19T06:32:07.733Z | 2026-01-20T21:27:20.874Z |
| CVE-2025-39947 |
N/A
|
net/mlx5e: Harden uplink netdev access against device unbind |
Linux |
Linux |
2025-10-04T07:31:08.636Z | 2025-10-04T07:31:08.636Z |
| CVE-2026-1424 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
PHPGurukul News Portal Profile Pic unrestricted upload |
PHPGurukul |
News Portal |
2026-01-26T07:02:07.123Z | 2026-01-26T14:22:04.792Z |
| CVE-2025-39948 |
N/A
|
ice: fix Rx page leak on multi-buffer frames |
Linux |
Linux |
2025-10-04T07:31:09.403Z | 2025-10-04T07:31:09.403Z |
| CVE-2025-58585 |
5.3 (3.1)
|
Sensitive Information Disclosure Through Missing Authe… |
SICK AG |
Baggage Analytics |
2025-10-06T07:01:46.210Z | 2025-10-06T16:36:07.632Z |
| CVE-2025-58586 |
5.3 (3.1)
|
User Enumeration by excessive error output |
SICK AG |
Baggage Analytics |
2025-10-06T07:02:47.270Z | 2025-10-06T18:32:52.715Z |
| CVE-2025-58587 |
6.5 (3.1)
|
Improper Restriction of Excessive Authentication Attempts |
SICK AG |
Baggage Analytics |
2025-10-06T07:03:15.540Z | 2025-10-06T18:21:04.170Z |
| CVE-2025-58589 |
2.7 (3.1)
|
Information Disclosure Through Stacktrace |
SICK AG |
Baggage Analytics |
2025-10-06T07:03:41.488Z | 2025-10-06T18:19:55.909Z |
| CVE-2025-58590 |
6.5 (3.1)
|
Path traversal |
SICK AG |
Baggage Analytics |
2025-10-06T07:06:26.315Z | 2025-10-06T17:42:15.992Z |
| CVE-2025-58591 |
6.5 (3.1)
|
Path Traversal |
SICK AG |
Baggage Analytics |
2025-10-06T07:07:30.103Z | 2025-10-06T17:37:34.792Z |
| CVE-2025-46818 |
6 (3.1)
|
Redis: Authenticated users can execute LUA scripts as … |
redis |
redis |
2025-10-03T18:38:57.170Z | 2025-10-03T19:14:19.668Z |
| CVE-2025-46819 |
6.3 (3.1)
|
Redis is vulnerable to DoS via specially crafted LUA scripts |
redis |
redis |
2025-10-03T19:12:10.999Z | 2025-10-31T14:53:41.010Z |
| CVE-2025-46817 |
7 (3.1)
|
Lua library commands may lead to integer overflow and … |
redis |
redis |
2025-10-03T17:52:48.478Z | 2025-10-03T18:32:16.521Z |
| CVE-2021-47254 |
N/A
|
gfs2: Fix use-after-free in gfs2_glock_shrink_scan |
Linux |
Linux |
2024-05-21T14:19:49.475Z | 2025-05-21T08:31:40.360Z |
| CVE-2025-47321 |
7.8 (3.1)
|
Buffer Copy Without Checking Size of Input in Core Services |
Qualcomm, Inc. |
Snapdragon |
2025-12-18T05:29:01.171Z | 2025-12-18T15:01:09.655Z |
| CVE-2025-8113 |
6.1 (3.1)
|
Ebook Store < 5.8015 - Reflected XSS via $_SERVER['REQ… |
Unknown |
Ebook Store |
2025-08-16T06:00:05.425Z | 2025-08-18T18:59:49.339Z |
| CVE-2025-47356 |
7.8 (3.1)
|
Double Free in Video |
Qualcomm, Inc. |
Snapdragon |
2026-01-06T22:48:42.423Z | 2026-01-07T16:15:43.083Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2023-53525 | In the Linux kernel, the following vulnerability has been resolved: RDMA/cma: Allow UD qp_type to … | 2025-10-01T12:15:57.037 | 2026-01-27T18:57:34.063 |
| fkie_cve-2023-53392 | In the Linux kernel, the following vulnerability has been resolved: HID: intel-ish-hid: Fix kernel… | 2025-09-18T14:15:42.350 | 2026-01-27T18:57:24.037 |
| fkie_cve-2023-53301 | In the Linux kernel, the following vulnerability has been resolved: f2fs: fix kernel crash due to … | 2025-09-16T08:15:39.517 | 2026-01-27T18:56:34.970 |
| fkie_cve-2025-39937 | In the Linux kernel, the following vulnerability has been resolved: net: rfkill: gpio: Fix crash d… | 2025-10-04T08:15:46.593 | 2026-01-27T18:51:33.693 |
| fkie_cve-2025-39936 | In the Linux kernel, the following vulnerability has been resolved: crypto: ccp - Always pass in a… | 2025-10-04T08:15:46.460 | 2026-01-27T18:51:25.680 |
| fkie_cve-2025-39935 | In the Linux kernel, the following vulnerability has been resolved: ASoC: codec: sma1307: Fix memo… | 2025-10-04T08:15:46.333 | 2026-01-27T18:51:04.820 |
| fkie_cve-2025-39933 | In the Linux kernel, the following vulnerability has been resolved: smb: client: let recv_done ver… | 2025-10-04T08:15:46.090 | 2026-01-27T18:50:53.170 |
| fkie_cve-2025-39932 | In the Linux kernel, the following vulnerability has been resolved: smb: client: let smbd_destroy(… | 2025-10-04T08:15:45.953 | 2026-01-27T18:50:34.987 |
| fkie_cve-2025-39931 | In the Linux kernel, the following vulnerability has been resolved: crypto: af_alg - Set merge to … | 2025-10-04T08:15:45.827 | 2026-01-27T18:50:21.797 |
| fkie_cve-2025-39929 | In the Linux kernel, the following vulnerability has been resolved: smb: client: fix smbdirect_rec… | 2025-10-04T08:15:44.620 | 2026-01-27T18:49:21.527 |
| fkie_cve-2025-6685 | ATEN eco DC Missing Authorization Privilege Escalation Vulnerability. This vulnerability allows rem… | 2025-09-02T20:15:37.397 | 2026-01-27T18:42:22.043 |
| fkie_cve-2025-7974 | rocket.chat Incorrect Authorization Information Disclosure Vulnerability. This vulnerability allows… | 2025-09-02T20:15:37.977 | 2026-01-27T18:39:15.560 |
| fkie_cve-2026-24539 | Missing Authorization vulnerability in ABCdatos Protección de datos – RGPD proteccion-datos-r… | 2026-01-23T15:16:10.050 | 2026-01-27T18:15:56.640 |
| fkie_cve-2026-22450 | Missing Authorization vulnerability in Select-Themes Don Peppe donpeppe allows Exploiting Incorrect… | 2026-01-22T17:16:34.663 | 2026-01-27T18:15:56.090 |
| fkie_cve-2026-22404 | Authorization Bypass Through User-Controlled Key vulnerability in Mikado-Themes Innovio innovio all… | 2026-01-22T17:16:33.553 | 2026-01-27T18:15:55.773 |
| fkie_cve-2026-22402 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-01-22T17:16:33.433 | 2026-01-27T18:15:55.610 |
| fkie_cve-2025-69300 | Missing Authorization vulnerability in Leap13 Premium Addons for Elementor premium-addons-for-eleme… | 2026-01-22T17:16:26.597 | 2026-01-27T18:15:54.577 |
| fkie_cve-2025-69188 | Missing Authorization vulnerability in e-plugins fitness-trainer fitness-trainer allows Exploiting … | 2026-01-22T17:16:25.510 | 2026-01-27T18:15:54.427 |
| fkie_cve-2025-69187 | Missing Authorization vulnerability in e-plugins Final User final-user allows Exploiting Incorrectl… | 2026-01-22T17:16:25.370 | 2026-01-27T18:15:54.277 |
| fkie_cve-2025-69186 | Missing Authorization vulnerability in e-plugins Hospital Doctor Directory hospital-doctor-director… | 2026-01-22T17:16:25.250 | 2026-01-27T18:15:54.120 |
| fkie_cve-2025-69185 | Missing Authorization vulnerability in e-plugins Hotel Listing hotel-listing allows Exploiting Inco… | 2026-01-22T17:16:25.120 | 2026-01-27T18:15:53.963 |
| fkie_cve-2025-14430 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-01-08T10:15:46.333 | 2026-01-27T18:13:09.327 |
| fkie_cve-2025-22707 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-01-08T10:15:47.473 | 2026-01-27T18:12:01.477 |
| fkie_cve-2025-56101 | OS Command Injection vulnerability in Ruijie M18 EW_3.0(1)B11P226_M18_10223116 allowing attackers t… | 2025-12-11T19:15:55.977 | 2026-01-27T18:10:39.583 |
| fkie_cve-2025-22708 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-01-08T10:15:47.600 | 2026-01-27T18:09:26.393 |
| fkie_cve-2025-56089 | OS Command Injection vulnerability in Ruijie M18 EW_3.0(1)B11P226_M18_10223116 allowing attackers t… | 2025-12-11T18:16:21.110 | 2026-01-27T18:05:37.210 |
| fkie_cve-2025-67934 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-01-08T10:15:52.533 | 2026-01-27T18:04:58.007 |
| fkie_cve-2025-56098 | OS Command Injection vulnerability in Ruijie X30-PRO X30-PRO-V1_09241521 allowing attackers to exec… | 2025-12-11T19:15:55.743 | 2026-01-27T17:58:03.720 |
| fkie_cve-2025-20946 | Improper handling of exceptional conditions in pairing specific bluetooth devices in Galaxy Watch B… | 2025-04-08T05:15:39.160 | 2026-01-27T17:55:09.103 |
| fkie_cve-2025-20945 | Improper access control in Galaxy Watch prior to SMR Apr-2025 Release 1 allows local attackers to a… | 2025-04-08T05:15:39.037 | 2026-01-27T17:55:02.733 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-72qj-48g4-5xgx |
5.7 (4.0)
|
JRuby-OpenSSL has hostname verification disabled by default | 2025-05-07T17:32:54Z | 2026-01-21T16:54:31Z |
| ghsa-qvr7-7g55-69xj |
8.8 (3.1)
|
Pimcore Has an Incomplete Patch for CVE-2023-30848 | 2026-01-14T21:15:43Z | 2026-01-21T16:52:07Z |
| ghsa-52jx-g6m5-h735 |
9.3 (4.0)
|
Fleet has SAML authentication vulnerability due to improper SAML response validation | 2025-03-06T19:12:27Z | 2026-01-21T16:51:42Z |
| ghsa-w8x4-x68c-m6fc |
8.7 (4.0)
|
html2pdf.js contains a cross-site scripting vulnerability | 2026-01-14T16:53:10Z | 2026-01-21T16:37:34Z |
| ghsa-m449-cwjh-6pw7 |
6.6 (4.0)
|
pypdf's LZWDecode streams be manipulated to exhaust RAM | 2025-11-24T22:42:07Z | 2026-01-21T16:37:13Z |
| ghsa-45p5-v273-3qqr |
4.9 (3.1)
2.3 (4.0)
|
Vert.x-Web vulnerable to Stored Cross-site Scripting in directory listings via file names | 2025-10-22T19:38:11Z | 2026-01-21T16:37:06Z |
| ghsa-5qw5-wf2q-f538 |
8.8 (4.0)
|
ActiveRecord-JDBC-Adapter (AR-JDBC) lib/arjdbc/jdbc/adapter.rb sql.gsub() Function SQL Injection | 2026-01-16T19:20:40Z | 2026-01-21T16:35:36Z |
| ghsa-gxp5-mv27-vjcj |
7.5 (3.1)
8.7 (4.0)
|
Jervis's AES CBC Mode is Without Authentication | 2026-01-13T14:56:49Z | 2026-01-21T16:23:42Z |
| ghsa-5pq9-5mpr-jj85 |
5.3 (3.1)
6.9 (4.0)
|
Jervis Has a JWT Algorithm Confusion Vulnerability | 2026-01-13T14:56:04Z | 2026-01-21T16:23:33Z |
| ghsa-c9q6-g3hr-8gww |
5.9 (3.1)
8.2 (4.0)
|
Jervis Has Weak Random for Timing Attack Mitigation | 2026-01-13T14:55:35Z | 2026-01-21T16:23:22Z |
| ghsa-36h5-vrq6-pp34 |
7.5 (3.1)
8.7 (4.0)
|
Jervis's Salt for PBKDF2 derived from password | 2026-01-13T14:53:50Z | 2026-01-21T16:23:01Z |
| ghsa-67rj-pjg6-pq59 |
7.5 (3.1)
8.7 (4.0)
|
Jervis Has a SHA-256 Hex String Padding Bug | 2026-01-13T14:52:31Z | 2026-01-21T16:21:29Z |
| ghsa-crxp-chh4-9ghp |
7.5 (3.1)
8.7 (4.0)
|
Jervis has Deterministic AES IV Derivation from Passphrase | 2026-01-13T14:51:58Z | 2026-01-21T16:21:22Z |
| ghsa-mqw7-c5gg-xq97 |
7.5 (3.1)
8.7 (4.0)
|
Jervis Has a RSA PKCS#1 Padding Vulnerability | 2026-01-13T14:28:57Z | 2026-01-21T16:21:14Z |
| ghsa-4f99-4q7p-p3gh |
8.7 (4.0)
|
Logrus is vulnerable to DoS when using Entry.Writer() | 2025-12-04T21:31:04Z | 2026-01-21T16:20:52Z |
| ghsa-53wg-r69p-v3r7 |
8.7 (4.0)
|
GraphQL Modules has a Race Condition issue | 2026-01-16T21:09:08Z | 2026-01-21T16:20:01Z |
| ghsa-mx8m-v8qm-xwr8 |
6.8 (3.1)
|
Mattermost is vulnerable to DoS due to infinite re-renders on API errors | 2026-01-16T12:30:25Z | 2026-01-21T16:19:03Z |
| ghsa-9r42-rhw3-2222 |
3.1 (3.1)
|
Mattermost is vulnerable to CPU exhaustion via crafted HTTP request | 2026-01-16T09:31:21Z | 2026-01-21T16:18:50Z |
| ghsa-3pqc-836w-jgr7 |
3.7 (3.1)
6.3 (4.0)
|
Outray cli is vulnerable to race conditions in tunnels creation | 2026-01-13T21:53:44Z | 2026-01-21T16:17:07Z |
| ghsa-g8mr-fgfg-5qpc |
4.7 (3.1)
|
Koa Vulnerable to Open Redirect via Trailing Double-Slash (//) in back Redirect Logic | 2025-10-21T15:09:06Z | 2026-01-21T16:15:45Z |
| ghsa-pcjq-j3mq-jv5j |
5.3 (4.0)
|
SiYuan Has a Stored Cross-Site Scripting (XSS) Vulnerability via Unrestricted SVG File Upload | 2026-01-16T19:22:08Z | 2026-01-21T16:12:37Z |
| ghsa-rgj2-xq4c-hrvm |
|
In the Linux kernel, the following vulnerability has been resolved: net: sock: fix hardened userco… | 2026-01-21T15:31:16Z | 2026-01-21T15:31:16Z |
| ghsa-j3rr-wp98-2675 |
7.5 (3.1)
|
NULL pointer dereference in the daap_reply_groups function in src/httpd_daap.c in owntone-server th… | 2026-01-20T21:31:35Z | 2026-01-21T15:31:15Z |
| ghsa-g299-249v-2v42 |
7.5 (3.1)
|
An input validation issue in in Pithikos websocket-server v.0.6.4 allows a remote attacker to obtai… | 2026-01-20T21:31:35Z | 2026-01-21T15:31:15Z |
| ghsa-cqjp-pfhx-4jwv |
7.5 (3.1)
|
In tinyMQTT commit 6226ade15bd4f97be2d196352e64dd10937c1962 (2024-02-18), a memory leak occurs due … | 2026-01-20T18:31:57Z | 2026-01-21T15:31:15Z |
| ghsa-947x-m4f9-3h48 |
7.5 (3.1)
|
A NULL pointer dereference in the dacp_reply_playqueueedit_move function (src/httpd_dacp.c) of ownt… | 2026-01-20T21:31:35Z | 2026-01-21T15:31:15Z |
| ghsa-744r-q883-3hq4 |
7.5 (3.1)
|
A NULL pointer dereference in the parse_meta function (src/httpd_daap.c) of owntone-server commit 3… | 2026-01-20T21:31:35Z | 2026-01-21T15:31:15Z |
| ghsa-6j26-jfmq-hf5r |
7.5 (3.1)
|
NULL pointer dereference in the dacp_reply_playqueueedit_clear function in src/httpd_dacp.c in ownt… | 2026-01-20T21:31:35Z | 2026-01-21T15:31:15Z |
| ghsa-495m-v35r-f849 |
9.8 (3.1)
|
ipTIME routers A2003NS-MU 10.00.6 to 12.16.2 , N600 10.00.8 to 12.16.2, A604-V3 10.01.6 to 10.07.2,… | 2026-01-20T18:31:57Z | 2026-01-21T15:31:15Z |
| ghsa-h9pr-pv2g-cx98 |
6.1 (3.1)
|
Cross site scripting (XSS) vulnerability in Omnispace Agora Project before 25.10 allowing attackers… | 2026-01-15T18:31:32Z | 2026-01-21T15:31:14Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-30918 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.084167Z |
| gsd-2024-30917 | An issue was discovered in eProsima FastDDS v.2.14.0 and before, allows a local attacker … | 2024-04-03T05:02:29.310861Z |
| gsd-2024-30916 | An issue was discovered in eProsima FastDDS v.2.14.0 and before, allows a local attacker … | 2024-04-03T05:02:29.201388Z |
| gsd-2024-30915 | An issue was discovered in OpenDDS commit b1c534032bb62ad4ae32609778de6b8d6c823a66, allow… | 2024-04-03T05:02:29.168213Z |
| gsd-2024-30914 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.265058Z |
| gsd-2024-30913 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.113720Z |
| gsd-2024-30912 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.222471Z |
| gsd-2024-30911 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.232843Z |
| gsd-2024-30910 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.340797Z |
| gsd-2024-3091 | A vulnerability was found in PHPGurukul Emergency Ambulance Hiring Portal 1.0. It has bee… | 2024-04-03T05:02:29.879989Z |
| gsd-2024-30909 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.193565Z |
| gsd-2024-30908 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.233839Z |
| gsd-2024-30907 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.258798Z |
| gsd-2024-30906 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.247154Z |
| gsd-2024-30905 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.355287Z |
| gsd-2024-30904 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.186870Z |
| gsd-2024-30903 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.261052Z |
| gsd-2024-30902 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.210025Z |
| gsd-2024-30901 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.079820Z |
| gsd-2024-30900 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.359472Z |
| gsd-2024-3090 | A vulnerability was found in PHPGurukul Emergency Ambulance Hiring Portal 1.0 and classif… | 2024-04-03T05:02:29.908519Z |
| gsd-2024-30899 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.219476Z |
| gsd-2024-30898 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.066115Z |
| gsd-2024-30897 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.089039Z |
| gsd-2024-30896 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.078804Z |
| gsd-2024-30895 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.220660Z |
| gsd-2024-30894 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.055315Z |
| gsd-2024-30893 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.217128Z |
| gsd-2024-30892 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.303827Z |
| gsd-2024-30891 | A command injection vulnerability exists in /goform/exeCommand in Tenda AC18 v15.03.05.05… | 2024-04-03T05:02:29.188777Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-191971 | Malicious code in @testfei/hallo-word (npm) | 2025-12-03T02:55:45Z | 2025-12-16T06:26:40Z |
| MAL-2025-191971 | Malicious code in @testfei/hallo-word (npm) | 2025-12-03T02:55:45Z | 2025-12-16T06:26:40Z |
| mal-2025-191545 | Malicious code in wfui-test-e2e (npm) | 2025-12-02T05:10:24Z | 2025-12-15T08:26:49Z |
| MAL-2025-191545 | Malicious code in wfui-test-e2e (npm) | 2025-12-02T05:10:24Z | 2025-12-15T08:26:49Z |
| mal-2025-192472 | Malicious code in elf-stats-candlelit-nutcracker-184 (npm) | 2025-12-11T19:46:09Z | 2025-12-15T05:25:54Z |
| MAL-2025-192472 | Malicious code in elf-stats-candlelit-nutcracker-184 (npm) | 2025-12-11T19:46:09Z | 2025-12-15T05:25:54Z |
| mal-0000-ossf-package-analysis-10cb4544e5ccc9bc | Malicious code in stitch-ui-toolbox (npm) | 2025-12-15T01:26:07Z | 2025-12-15T01:26:07Z |
| MAL-0000-OSSF-PACKAGE-ANALYSIS-10CB4544E5CCC9BC | Malicious code in stitch-ui-toolbox (npm) | 2025-12-15T01:26:07Z | 2025-12-15T01:26:07Z |
| mal-0000-ossf-package-analysis-f77b546bc36b17b6 | Malicious code in @ikarem/telemetry (npm) | 2025-12-14T05:39:54Z | 2025-12-14T05:39:54Z |
| MAL-0000-OSSF-PACKAGE-ANALYSIS-F77B546BC36B17B6 | Malicious code in @ikarem/telemetry (npm) | 2025-12-14T05:39:54Z | 2025-12-14T05:39:54Z |
| mal-0000-ossf-package-analysis-0bdd063a8851ad4a | Malicious code in @ikarem/telemetry (npm) | 2025-12-14T05:20:40Z | 2025-12-14T05:20:40Z |
| MAL-0000-OSSF-PACKAGE-ANALYSIS-0BDD063A8851AD4A | Malicious code in @ikarem/telemetry (npm) | 2025-12-14T05:20:40Z | 2025-12-14T05:20:40Z |
| mal-0000-ossf-package-analysis-c075254afb72ad18 | Malicious code in @ikarem/telemetry (npm) | 2025-12-14T05:15:54Z | 2025-12-14T05:15:54Z |
| MAL-0000-OSSF-PACKAGE-ANALYSIS-C075254AFB72AD18 | Malicious code in @ikarem/telemetry (npm) | 2025-12-14T05:15:54Z | 2025-12-14T05:15:54Z |
| mal-0000-ossf-package-analysis-74f76e276cfff1c1 | Malicious code in @ikarem/telemetry (npm) | 2025-12-14T05:08:54Z | 2025-12-14T05:08:54Z |
| MAL-0000-OSSF-PACKAGE-ANALYSIS-74F76E276CFFF1C1 | Malicious code in @ikarem/telemetry (npm) | 2025-12-14T05:08:54Z | 2025-12-14T05:08:54Z |
| mal-0000-ossf-package-analysis-43ab3fc889bb1c1c | Malicious code in @ikarem/telemetry (npm) | 2025-12-14T05:03:06Z | 2025-12-14T05:03:06Z |
| MAL-0000-OSSF-PACKAGE-ANALYSIS-43AB3FC889BB1C1C | Malicious code in @ikarem/telemetry (npm) | 2025-12-14T05:03:06Z | 2025-12-14T05:03:06Z |
| mal-0000-kam193-c9f06b3dac61d0ba | Pentesting or research code in ajenti-plugin-testing-pyld (PyPI) | 2025-12-09T18:32:50Z | 2025-12-12T22:42:32Z |
| mal-0000-kam193-4c039df8ba9e4f40 | Pentesting or research code in ajenti-plugin-testing-pyld (PyPI) | 2025-12-09T18:32:50Z | 2025-12-12T22:42:32Z |
| MAL-0000-KAM193-C9F06B3DAC61D0BA | Pentesting or research code in ajenti-plugin-testing-pyld (PyPI) | 2025-12-09T18:32:50Z | 2025-12-12T22:42:32Z |
| MAL-0000-KAM193-4C039DF8BA9E4F40 | Pentesting or research code in ajenti-plugin-testing-pyld (PyPI) | 2025-12-09T18:32:50Z | 2025-12-12T22:42:32Z |
| mal-0000-kam193-d21d0d38383da324 | Pentesting or research code in ajenti-plugin-testing-pyld (PyPI) | 2025-12-09T18:32:50Z | 2025-12-12T20:28:04Z |
| MAL-0000-KAM193-D21D0D38383DA324 | Pentesting or research code in ajenti-plugin-testing-pyld (PyPI) | 2025-12-09T18:32:50Z | 2025-12-12T20:28:04Z |
| mal-0000-ghsa-malware-a4cb0b7561fc88b1 | Malware in @8x8/fetlife-assets | 2022-06-20T18:19:57Z | 2025-12-12T19:25:28Z |
| MAL-0000-GHSA-MALWARE-A4CB0B7561FC88B1 | Malware in @8x8/fetlife-assets | 2022-06-20T18:19:57Z | 2025-12-12T19:25:28Z |
| mal-2024-12363 | Malicious code in threading-assistant (PyPI) | 2024-08-19T09:59:22Z | 2025-12-12T12:13:06Z |
| mal-2024-12362 | Malicious code in thethreadingassistant (PyPI) | 2024-08-19T09:59:22Z | 2025-12-12T12:13:06Z |
| MAL-2024-12363 | Malicious code in threading-assistant (PyPI) | 2024-08-19T09:59:22Z | 2025-12-12T12:13:06Z |
| MAL-2024-12362 | Malicious code in thethreadingassistant (PyPI) | 2024-08-19T09:59:22Z | 2025-12-12T12:13:06Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-3114 | Zoom Video Communications Workplace und Rooms: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2024-10-08T22:00:00.000+00:00 | 2024-10-08T22:00:00.000+00:00 |
| wid-sec-w-2024-3113 | Ivanti Avalanche: Mehrere Schwachstellen | 2024-10-08T22:00:00.000+00:00 | 2024-10-08T22:00:00.000+00:00 |
| wid-sec-w-2024-3110 | Fortinet FortiManager: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-10-08T22:00:00.000+00:00 | 2024-10-08T22:00:00.000+00:00 |
| wid-sec-w-2024-3109 | Fortinet FortiAnalyzer: Schwachstelle ermöglicht Codeausführung | 2024-10-08T22:00:00.000+00:00 | 2024-10-08T22:00:00.000+00:00 |
| wid-sec-w-2024-3108 | Adobe Creative Cloud Applikationen: Mehrere Schwachstellen | 2024-10-08T22:00:00.000+00:00 | 2024-10-08T22:00:00.000+00:00 |
| wid-sec-w-2024-3105 | Microsoft Outlook: Schwachstelle ermöglicht Privilegieneskalation | 2024-10-08T22:00:00.000+00:00 | 2024-10-08T22:00:00.000+00:00 |
| wid-sec-w-2024-3104 | Microsoft Power BI: Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2024-10-08T22:00:00.000+00:00 | 2024-10-08T22:00:00.000+00:00 |
| wid-sec-w-2024-3103 | Ivanti Connect Secure und Policy Secure: Schwachstelle ermöglicht Codeausführung | 2024-10-08T22:00:00.000+00:00 | 2024-10-08T22:00:00.000+00:00 |
| wid-sec-w-2024-2162 | GitLab: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-09-17T22:00:00.000+00:00 | 2024-10-08T22:00:00.000+00:00 |
| wid-sec-w-2024-0829 | AMD Radeon: Mehrere Schwachstellen ermöglichen Codeausführung | 2024-04-09T22:00:00.000+00:00 | 2024-10-08T22:00:00.000+00:00 |
| wid-sec-w-2024-3102 | JetBrains TeamCity: Mehrere Schwachstellen | 2024-10-07T22:00:00.000+00:00 | 2024-10-07T22:00:00.000+00:00 |
| wid-sec-w-2024-3101 | TYPO3 Core: Mehrere Schwachstellen | 2024-10-07T22:00:00.000+00:00 | 2024-10-07T22:00:00.000+00:00 |
| wid-sec-w-2024-3100 | Siemens SIMATIC S7: Mehrere Schwachstellen | 2024-10-07T22:00:00.000+00:00 | 2024-10-07T22:00:00.000+00:00 |
| wid-sec-w-2024-3099 | Siemens Sentron PAC: Schwachstelle ermöglicht Erlangen von Administratorrechten | 2024-10-07T22:00:00.000+00:00 | 2024-10-07T22:00:00.000+00:00 |
| wid-sec-w-2024-3098 | Siemens JT2Go: Mehrere Schwachstellen | 2024-10-07T22:00:00.000+00:00 | 2024-10-07T22:00:00.000+00:00 |
| wid-sec-w-2024-3096 | Android Patchday Oktober 2024: Mehrere Schwachstellen | 2024-10-07T22:00:00.000+00:00 | 2024-10-07T22:00:00.000+00:00 |
| wid-sec-w-2024-3093 | SAP Software: Mehrere Schwachstellen | 2024-10-07T22:00:00.000+00:00 | 2024-10-07T22:00:00.000+00:00 |
| wid-sec-w-2024-2232 | Apple iTunes für Windows: Schwachstelle ermöglicht Privilegieneskalation | 2024-09-26T22:00:00.000+00:00 | 2024-10-07T22:00:00.000+00:00 |
| wid-sec-w-2024-2222 | TeamViewer: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2024-09-25T22:00:00.000+00:00 | 2024-10-07T22:00:00.000+00:00 |
| wid-sec-w-2024-1351 | Adobe Experience Manager: Mehrere Schwachstellen | 2024-06-11T22:00:00.000+00:00 | 2024-10-07T22:00:00.000+00:00 |
| wid-sec-w-2024-1094 | PowerDNS: Schwachstelle ermöglicht Denial of Service | 2024-05-12T22:00:00.000+00:00 | 2024-10-07T22:00:00.000+00:00 |
| wid-sec-w-2023-0362 | Intel Ethernet Controller: Mehrere Schwachstellen | 2023-02-14T23:00:00.000+00:00 | 2024-10-07T22:00:00.000+00:00 |
| wid-sec-w-2024-3092 | HP Computer: Schwachstelle ermöglicht Privilegieneskalation | 2024-10-06T22:00:00.000+00:00 | 2024-10-06T22:00:00.000+00:00 |
| wid-sec-w-2024-3090 | IBM App Connect Enterprise: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-10-06T22:00:00.000+00:00 | 2024-10-06T22:00:00.000+00:00 |
| wid-sec-w-2024-3086 | DrayTek Vigor Router: Mehrere Schwachstellen | 2024-10-06T22:00:00.000+00:00 | 2024-10-06T22:00:00.000+00:00 |
| wid-sec-w-2024-3085 | vim: Schwachstelle ermöglicht Denial of Service | 2024-10-06T22:00:00.000+00:00 | 2024-10-06T22:00:00.000+00:00 |
| wid-sec-w-2024-3084 | AVG Anti-Virus: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-10-06T22:00:00.000+00:00 | 2024-10-06T22:00:00.000+00:00 |
| wid-sec-w-2024-3083 | SonarSource SonarQube: Schwachstellen ermöglichen Manipulation von Dateien und Offenlegung von Informationen | 2024-10-06T22:00:00.000+00:00 | 2024-10-06T22:00:00.000+00:00 |
| wid-sec-w-2024-3081 | WithSecure Endpoint Protection "Atlant": Schwachstelle ermöglicht Denial of Service | 2024-10-03T22:00:00.000+00:00 | 2024-10-03T22:00:00.000+00:00 |
| wid-sec-w-2024-3080 | IBM TXSeries for Multiplatforms: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-10-03T22:00:00.000+00:00 | 2024-10-03T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2013:0154 | Red Hat Security Advisory: Ruby on Rails security update | 2013-01-10T20:39:00+00:00 | 2026-01-28T22:54:09+00:00 |
| rhsa-2013:0153 | Red Hat Security Advisory: Ruby on Rails security update | 2013-01-10T20:36:00+00:00 | 2026-01-28T22:54:09+00:00 |
| rhsa-2013:0151 | Red Hat Security Advisory: JBoss Enterprise Portal Platform 4.3 CP07 security update | 2013-01-10T05:36:00+00:00 | 2026-01-28T22:54:08+00:00 |
| rhsa-2013:0147 | Red Hat Security Advisory: jbossas security update | 2013-01-08T20:30:00+00:00 | 2026-01-28T22:54:08+00:00 |
| rhsa-2013:0146 | Red Hat Security Advisory: jbossweb security update | 2013-01-08T20:25:00+00:00 | 2026-01-28T22:54:08+00:00 |
| rhsa-2013:0128 | Red Hat Security Advisory: conga security, bug fix, and enhancement update | 2013-01-08T04:31:00+00:00 | 2026-01-28T22:54:08+00:00 |
| rhsa-2013:0005 | Red Hat Security Advisory: tomcat6 security update | 2013-01-03T22:49:00+00:00 | 2026-01-28T22:54:07+00:00 |
| rhsa-2013:0004 | Red Hat Security Advisory: tomcat6 security update | 2013-01-03T22:47:00+00:00 | 2026-01-28T22:54:07+00:00 |
| rhsa-2012:1592 | Red Hat Security Advisory: JBoss Enterprise Application Platform 6.0.1 update | 2012-12-18T22:23:00+00:00 | 2026-01-28T22:54:07+00:00 |
| rhsa-2012:1591 | Red Hat Security Advisory: JBoss Enterprise Application Platform 6.0.1 update | 2012-12-18T22:17:00+00:00 | 2026-01-28T22:54:07+00:00 |
| rhsa-2012:1542 | Red Hat Security Advisory: CloudForms Commons 1.1 security update | 2012-12-04T19:24:00+00:00 | 2026-01-28T22:54:07+00:00 |
| rhsa-2012:1365 | Red Hat Security Advisory: bind security update | 2012-10-12T19:39:00+00:00 | 2026-01-28T22:54:06+00:00 |
| rhsa-2012:1268 | Red Hat Security Advisory: bind security update | 2012-09-14T09:27:00+00:00 | 2026-01-28T22:54:06+00:00 |
| rhsa-2012:1267 | Red Hat Security Advisory: bind security and bug fix update | 2012-09-14T09:26:00+00:00 | 2026-01-28T22:54:06+00:00 |
| rhsa-2012:1266 | Red Hat Security Advisory: bind97 security update | 2012-09-14T09:24:00+00:00 | 2026-01-28T22:54:05+00:00 |
| rhsa-2012:1149 | Red Hat Security Advisory: sudo security and bug fix update | 2012-08-07T16:49:00+00:00 | 2026-01-28T22:54:05+00:00 |
| rhsa-2012:1125 | Red Hat Security Advisory: JBoss Enterprise SOA Platform 5.3.0 update | 2012-07-31T14:24:00+00:00 | 2026-01-28T22:54:05+00:00 |
| rhsa-2012:1123 | Red Hat Security Advisory: bind security update | 2012-07-31T03:50:00+00:00 | 2026-01-28T22:54:04+00:00 |
| rhsa-2012:1122 | Red Hat Security Advisory: bind97 security update | 2012-07-31T03:44:00+00:00 | 2026-01-28T22:54:04+00:00 |
| rhsa-2012:1116 | Red Hat Security Advisory: perl-DBD-Pg security update | 2012-07-25T16:55:00+00:00 | 2026-01-28T22:54:04+00:00 |
| rhsa-2012:1110 | Red Hat Security Advisory: bind security update | 2012-07-23T17:51:00+00:00 | 2026-01-28T22:54:04+00:00 |
| rhsa-2012:1047 | Red Hat Security Advisory: php53 security update | 2012-06-27T15:44:00+00:00 | 2026-01-28T22:54:03+00:00 |
| rhsa-2012:1046 | Red Hat Security Advisory: php security update | 2012-06-27T15:44:00+00:00 | 2026-01-28T22:54:03+00:00 |
| rhsa-2012:1045 | Red Hat Security Advisory: php security update | 2012-06-27T15:43:00+00:00 | 2026-01-28T22:54:02+00:00 |
| rhsa-2012:1028 | Red Hat Security Advisory: JBoss Enterprise BRMS Platform 5.3.0 update | 2012-06-22T01:12:00+00:00 | 2026-01-28T22:54:02+00:00 |
| rhsa-2012:0717 | Red Hat Security Advisory: bind97 security update | 2012-06-07T16:38:00+00:00 | 2026-01-28T22:54:02+00:00 |
| rhsa-2012:0716 | Red Hat Security Advisory: bind security update | 2012-06-07T16:42:00+00:00 | 2026-01-28T22:54:01+00:00 |
| rhsa-2012:0699 | Red Hat Security Advisory: openssl security and bug fix update | 2012-05-29T16:55:00+00:00 | 2026-01-28T22:54:00+00:00 |
| rhsa-2012:0426 | Red Hat Security Advisory: openssl security and bug fix update | 2012-03-27T22:52:00+00:00 | 2026-01-28T22:54:00+00:00 |
| rhsa-2011:1423 | Red Hat Security Advisory: php53 and php security update | 2011-11-02T22:15:00+00:00 | 2026-01-28T22:54:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2023-33461 | iniparser v4.1 is vulnerable to NULL Pointer Dereference in function iniparser_getlongint which misses check NULL for function iniparser_getstring's return. | 2023-06-01T07:00:00.000Z | 2025-05-27T00:00:00.000Z |
| msrc_cve-2022-40898 | An issue discovered in Python Packaging Authority (PyPA) Wheel 0.37.1 and earlier allows remote attackers to cause a denial of service via attacker controlled input to wheel cli. | 2022-12-02T00:00:00.000Z | 2025-05-27T00:00:00.000Z |
| msrc_cve-2022-32746 | A flaw was found in the Samba AD LDAP server. The AD DC database audit logging module can access LDAP message values freed by a preceding database module resulting in a use-after-free issue. This issue is only possible when modifying certain privileged attributes such as userAccountControl. | 2022-08-02T00:00:00.000Z | 2025-05-27T00:00:00.000Z |
| msrc_cve-2022-32149 | Denial of service via crafted Accept-Language header in golang.org/x/text/language | 2022-10-02T00:00:00.000Z | 2025-05-27T00:00:00.000Z |
| msrc_cve-2022-29526 | Go before 1.17.10 and 1.18.x before 1.18.2 has Incorrect Privilege Assignment. When called with a non-zero flags parameter the Faccessat function could incorrectly report that a file is accessible. | 2022-06-02T00:00:00.000Z | 2025-05-27T00:00:00.000Z |
| msrc_cve-2021-3672 | A flaw was found in c-ares library where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability. | 2021-11-02T00:00:00.000Z | 2025-05-27T00:00:00.000Z |
| msrc_cve-2021-28361 | An issue was discovered in Storage Performance Development Kit (SPDK) before 20.01.01. If a PDU is sent to the iSCSI target with a zero length (but data is expected) the iSCSI target can crash with a NULL pointer dereference. | 2021-03-02T00:00:00.000Z | 2025-05-27T00:00:00.000Z |
| msrc_cve-2021-24032 | Beginning in v1.4.1 and prior to v1.4.9 due to an incomplete fix for CVE-2021-24031 the Zstandard command-line utility created output files with default permissions and restricted those permissions immediately afterwards. Output files could therefore momentarily be readable or writable to unintended parties. | 2021-03-02T00:00:00.000Z | 2025-05-27T00:00:00.000Z |
| msrc_cve-2021-23336 | Web Cache Poisoning | 2021-02-02T00:00:00.000Z | 2025-05-27T00:00:00.000Z |
| msrc_cve-2021-20286 | A flaw was found in libnbd 1.7.3. An assertion failure in nbd_unlocked_opt_go in ilb/opt.c may lead to denial of service. | 2021-03-02T00:00:00.000Z | 2025-05-27T00:00:00.000Z |
| msrc_cve-2021-20277 | A flaw was found in Samba's libldb. Multiple consecutive leading spaces in an LDAP attribute can lead to an out-of-bounds memory write leading to a crash of the LDAP server process handling the request. The highest threat from this vulnerability is to system availability. | 2021-05-02T00:00:00.000Z | 2025-05-27T00:00:00.000Z |
| msrc_cve-2020-27840 | A flaw was found in samba. Spaces used in a string around a domain name (DN) while supposed to be ignored can cause invalid DN strings with spaces to instead write a zero-byte into out-of-bounds memory resulting in a crash. The highest threat from this vulnerability is to system availability. | 2021-05-02T00:00:00.000Z | 2025-05-27T00:00:00.000Z |
| msrc_cve-2020-22217 | Buffer overflow vulnerability in c-ares before 1_16_1 thru 1_17_0 via function ares_parse_soa_reply in ares_parse_soa_reply.c. | 2023-08-01T00:00:00.000Z | 2025-05-27T00:00:00.000Z |
| msrc_cve-2019-9674 | Lib/zipfile.py in Python through 3.7.2 allows remote attackers to cause a denial of service (resource consumption) via a ZIP bomb. | 2020-02-02T00:00:00.000Z | 2025-05-27T00:00:00.000Z |
| msrc_cve-2019-3833 | Openwsman versions up to and including 2.6.9 are vulnerable to infinite loop in process_connection() when parsing specially crafted HTTP requests. A remote unauthenticated attacker can exploit this vulnerability by sending malicious HTTP request to cause denial of service to openwsman server. | 2019-03-02T00:00:00.000Z | 2025-05-27T00:00:00.000Z |
| msrc_cve-2019-3816 | Openwsman versions up to and including 2.6.9 are vulnerable to arbitrary file disclosure because the working directory of openwsmand daemon was set to root directory. A remote unauthenticated attacker can exploit this vulnerability by sending a specially crafted HTTP request to openwsman server. | 2019-03-02T00:00:00.000Z | 2025-05-27T00:00:00.000Z |
| msrc_cve-2019-20907 | In Lib/tarfile.py in Python through 3.8.3 an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open because _proc_pax lacks header validation. | 2020-07-02T00:00:00.000Z | 2025-05-27T00:00:00.000Z |
| msrc_cve-2017-18207 | The Wave_read._read_fmt_chunk function in Lib/wave.py in Python through 3.6.4 does not ensure a nonzero channel value which allows attackers to cause a denial of service (divide-by-zero and exception) via a crafted wav format audio file. NOTE: the vendor disputes this issue because Python applications "need to be prepared to handle a wide variety of exceptions. | 2018-03-02T00:00:00.000Z | 2025-05-27T00:00:00.000Z |
| msrc_cve-2017-17522 | Lib/webbrowser.py in Python through 3.6.3 does not validate strings before launching the program specified by the BROWSER environment variable which might allow remote attackers to conduct argument-injection attacks via a crafted URL. NOTE: a software maintainer indicates that exploitation is impossible because the code relies on subprocess.Popen and the default shell=False setting | 2017-12-02T00:00:00.000Z | 2025-05-27T00:00:00.000Z |
| msrc_cve-2015-9251 | jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option causing text/javascript responses to be executed. | 2018-01-02T00:00:00.000Z | 2025-05-27T00:00:00.000Z |
| msrc_cve-2012-6708 | jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQuery(strInput) function does not differentiate selectors from HTML in a reliable fashion. In vulnerable versions jQuery determined whether the input was HTML by looking for the '<' character anywhere in the string giving attackers more flexibility when attempting to construct a malicious payload. In fixed versions jQuery only deems the input to be HTML if it explicitly starts with the '<' character limiting exploitability only to attackers who can control the beginning of a string which is far less common. | 2018-01-02T00:00:00.000Z | 2025-05-27T00:00:00.000Z |
| msrc_cve-2012-2677 | Integer overflow in the ordered_malloc function in boost/pool/pool.hpp in Boost Pool | 2012-07-02T00:00:00.000Z | 2025-05-27T00:00:00.000Z |
| msrc_cve-2007-4559 | Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive a related issue to CVE-2001-1267. | 2007-08-02T00:00:00.000Z | 2025-05-27T00:00:00.000Z |
| msrc_cve-2025-32728 | In sshd in OpenSSH before 10.0, the DisableForwarding directive does not adhere to the documentation stating that it disables X11 and agent forwarding. | 2025-04-02T00:00:00.000Z | 2025-05-23T00:00:00.000Z |
| msrc_cve-2025-47181 | Microsoft Edge (Chromium-based) Update Elevation of Privilege Vulnerability | 2025-05-13T07:00:00.000Z | 2025-05-22T07:00:00.000Z |
| msrc_cve-2025-26646 | .NET, Visual Studio, and Build Tools for Visual Studio Spoofing Vulnerability | 2025-05-13T07:00:00.000Z | 2025-05-22T07:00:00.000Z |
| msrc_cve-2024-56662 | acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl | 2024-12-02T00:00:00.000Z | 2025-05-21T00:00:00.000Z |
| msrc_cve-2024-42093 | net/dpaa2: Avoid explicit cpumask var allocation on stack | 2024-07-01T07:00:00.000Z | 2025-05-21T00:00:00.000Z |
| msrc_cve-2024-41057 | cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie() | 2024-07-01T07:00:00.000Z | 2025-05-21T00:00:00.000Z |
| msrc_cve-2025-29975 | Microsoft PC Manager Elevation of Privilege Vulnerability | 2025-05-13T07:00:00.000Z | 2025-05-20T07:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:12226-1 | libtiff-devel-32bit-4.4.0-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12225-1 | libnss_slurm2-22.05.2-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12224-1 | maven-3.8.6-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12223-1 | git-annex-10.20220624-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12222-1 | gdk-pixbuf-devel-2.42.8-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12221-1 | connman-1.41-4.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12220-1 | caddy-2.5.2-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12219-1 | xen-4.16.1_02-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12218-1 | php8-8.1.8-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12217-1 | redis-7.0.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12216-1 | perl-HTTP-Daemon-6.14-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12215-1 | dirmngr-2.3.7-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12214-1 | curl-7.84.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12213-1 | gvim-9.0.0032-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12212-1 | zabbix-agent-4.0.42-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12211-1 | python3-virtualbox-6.1.36-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12210-1 | libsqlite3-0-3.39.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12209-1 | qemu-7.0.0-53.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12208-1 | java-17-openjdk-17.0.4.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12207-1 | java-11-openjdk-11.0.16.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12206-1 | cri-o-1.24.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12205-1 | trivy-0.30.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12204-1 | libopenssl-3-devel-3.0.5-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12203-1 | java-18-openjdk-18.0.2.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12202-1 | java-15-openjdk-15.0.8.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12201-1 | java-13-openjdk-13.0.12.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12200-1 | pyenv-2.3.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12199-1 | corepack16-16.16.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12198-1 | chromedriver-103.0.5060.134-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12197-1 | cereal-devel-1.3.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2022-0136 | 2024-03-06T11:17:05.190Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2022-0125 | 2024-03-06T11:17:06.586Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2022-0124 | 2024-03-06T11:17:07.880Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2022-0123 | 2024-03-06T11:17:09.178Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2022-0093 | 2024-03-06T11:17:10.552Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2022-0090 | 2024-03-06T11:17:11.858Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-4191 | 2024-03-06T11:17:13.138Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-39946 | 2024-03-06T11:17:14.405Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-39945 | 2024-03-06T11:17:15.714Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-39944 | 2024-03-06T11:17:16.993Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-39943 | 2024-03-06T11:17:18.304Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-39942 | 2024-03-06T11:17:19.565Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-39941 | 2024-03-06T11:17:20.813Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-39940 | 2024-03-06T11:17:22.067Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-39939 | 2024-03-06T11:17:23.349Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-39938 | 2024-03-06T11:17:24.627Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-39937 | 2024-03-06T11:17:25.967Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-39936 | 2024-03-06T11:17:27.236Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-39934 | 2024-03-06T11:17:29.777Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-39933 | 2024-03-06T11:17:31.028Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-39932 | 2024-03-06T11:17:32.283Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-39931 | 2024-03-06T11:17:33.532Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-39930 | 2024-03-06T11:17:34.808Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-39927 | 2024-03-06T11:17:36.076Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-39919 | 2024-03-06T11:17:37.368Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-39918 | 2024-03-06T11:17:38.610Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-39917 | 2024-03-06T11:17:39.916Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-39916 | 2024-03-06T11:17:41.199Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-39915 | 2024-03-06T11:17:42.416Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-39914 | 2024-03-06T11:17:43.661Z | 2025-04-03T14:40:37.652Z |
| ID | Description | Updated |
|---|---|---|
| var-201810-0569 | A vulnerability in the Cisco Network Plug and Play agent, also referred to as the Cisco O… | 2024-01-18T22:29:56.586000Z |
| var-201810-0566 | A vulnerability in the Image Verification feature of Cisco IOS XE Software could allow an… | 2024-01-18T22:29:56.299000Z |
| var-201810-0350 | A vulnerability in the CLI parser of Cisco IOS XE Software could allow an authenticated, … | 2024-01-18T22:29:56.534000Z |
| var-201810-0348 | A vulnerability in the CLI parser of Cisco IOS XE Software could allow an authenticated, … | 2024-01-18T22:29:56.463000Z |
| var-201904-0123 | The Boa server configuration on DASAN H660RM devices with firmware 1.03-0022 logs POST da… | 2024-01-18T22:29:54.047000Z |
| var-202202-0323 | Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Ro… | 2024-01-18T22:29:34.474000Z |
| var-202202-0320 | Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Ro… | 2024-01-18T22:29:34.434000Z |
| var-202312-1059 | Asterisk is an open source private branch exchange and telephony toolkit. In Asterisk ver… | 2024-01-18T22:29:19.418000Z |
| var-202312-0897 | Memory corruption in UTILS when modem processes memory specific Diag commands having arbi… | 2024-01-18T22:29:17.061000Z |
| var-202312-0855 | The Remote Application Server in Parallels RAS before 19.2.23975 does not segment virtual… | 2024-01-18T22:29:17.110000Z |
| var-202312-0391 | Tenda W30E V16.01.0.12(4843) was discovered to contain a stack overflow via the function … | 2024-01-18T22:29:17.338000Z |
| var-202311-0458 | A vulnerability has been identified in SIMATIC PCS neo (All versions < V4.1). The PUD Man… | 2024-01-18T22:27:51.535000Z |
| var-202311-1268 | Improper Initialization in firmware for some Intel(R) Optane(TM) SSD products may allow a… | 2024-01-18T22:25:38.344000Z |
| var-200911-0272 | Multiple buffer overflows in Apple Type Services (ATS) in Apple Mac OS X 10.5.8 allow rem… | 2024-01-18T22:06:13.172000Z |
| var-202002-1163 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2024-01-18T22:03:50.850000Z |
| var-202312-0206 | A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 2). The … | 2024-01-18T21:45:48.042000Z |
| var-200806-0321 | Open Scripting Architecture in Apple Mac OS X 10.4.11 and 10.5.4, and some other 10.4 and… | 2024-01-18T21:30:14.294000Z |
| var-201208-0432 | Adobe Reader and Acrobat 9.x before 9.5.2 and 10.x before 10.1.4 on Windows and Mac OS X … | 2024-01-18T21:28:45.782000Z |
| var-202211-1443 | An issue was discovered in AVEVA Edge (formerly InduSoft Web Studio) versions R2020 and p… | 2024-01-18T21:16:13.250000Z |
| var-202311-0459 | A vulnerability has been identified in SIMATIC PCS neo (All versions < V4.1). The PUD Man… | 2024-01-18T21:12:12.730000Z |
| var-202311-0460 | A vulnerability has been identified in SIMATIC PCS neo (All versions < V4.1). When access… | 2024-01-18T21:06:24.971000Z |
| var-202312-0207 | A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 2). Affe… | 2024-01-18T20:58:59.232000Z |
| var-202311-0457 | A vulnerability has been identified in SIMATIC PCS neo (All versions < V4.1). There is a … | 2024-01-18T20:58:14.160000Z |
| var-202211-1442 | Path traversal vulnerability in AVEVA Edge (formerly InduSoft Web Studio) versions R2020 … | 2024-01-18T20:54:07.418000Z |
| var-202312-0239 | A vulnerability has been identified in SIMATIC STEP 7 (TIA Portal) (All versions < V19). … | 2024-01-18T20:39:25.934000Z |
| var-202312-0261 | A vulnerability has been identified in SIMATIC PC-Station Plus (All versions), SIMATIC S7… | 2024-01-18T20:36:28.710000Z |
| var-202312-0270 | A vulnerability has been identified in LOGO! 12/24RCE (All versions >= V8.3), LOGO! 12/24… | 2024-01-18T20:23:48.124000Z |
| var-201011-0211 | CFNetwork in Apple Mac OS X 10.6.x before 10.6.5 does not properly validate the domains o… | 2024-01-18T20:08:40.468000Z |
| var-201409-0487 | Heap-based buffer overflow in IOHIDFamily in Apple iOS before 8 and Apple TV before 7 all… | 2024-01-18T20:06:53.988000Z |
| var-202006-1614 | An out-of-bounds write issue was addressed with improved bounds checking. This issue is f… | 2024-01-18T20:05:54.396000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2024:3710-1 | Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP5) | 2024-10-16T21:44:01Z | 2024-10-16T21:44:01Z |
| suse-su-2024:3706-1 | Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP5) | 2024-10-16T21:17:22Z | 2024-10-16T21:17:22Z |
| suse-su-2024:3708-1 | Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6) | 2024-10-16T20:52:45Z | 2024-10-16T20:52:45Z |
| suse-su-2024:3707-1 | Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4) | 2024-10-16T20:52:36Z | 2024-10-16T20:52:36Z |
| suse-su-2024:3704-1 | Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP3) | 2024-10-16T20:52:18Z | 2024-10-16T20:52:18Z |
| suse-su-2024:3702-1 | Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5) | 2024-10-16T19:34:09Z | 2024-10-16T19:34:09Z |
| suse-su-2024:3701-1 | Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5) | 2024-10-16T19:33:58Z | 2024-10-16T19:33:58Z |
| suse-su-2024:3700-1 | Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP4) | 2024-10-16T19:33:48Z | 2024-10-16T19:33:48Z |
| suse-su-2024:3698-1 | Security update for the Linux Kernel (Live Patch 58 for SLE 12 SP5) | 2024-10-16T19:33:30Z | 2024-10-16T19:33:30Z |
| suse-su-2024:3697-1 | Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP5) | 2024-10-16T19:04:39Z | 2024-10-16T19:04:39Z |
| suse-su-2024:3696-1 | Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4) | 2024-10-16T19:04:28Z | 2024-10-16T19:04:28Z |
| suse-su-2024:3695-1 | Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP4) | 2024-10-16T19:04:18Z | 2024-10-16T19:04:18Z |
| suse-su-2024:3690-1 | Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP3) | 2024-10-16T19:03:54Z | 2024-10-16T19:03:54Z |
| suse-su-2024:3670-1 | Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5) | 2024-10-16T18:33:45Z | 2024-10-16T18:33:45Z |
| suse-su-2024:3687-1 | Security update for the Linux Kernel (Live Patch 48 for SLE 12 SP5) | 2024-10-16T18:33:31Z | 2024-10-16T18:33:31Z |
| suse-su-2024:3680-1 | Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6) | 2024-10-16T17:34:22Z | 2024-10-16T17:34:22Z |
| suse-su-2024:3679-1 | Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5) | 2024-10-16T17:34:14Z | 2024-10-16T17:34:14Z |
| suse-su-2024:3694-1 | Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP5) | 2024-10-16T17:34:04Z | 2024-10-16T17:34:04Z |
| suse-su-2024:3676-1 | Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP2) | 2024-10-16T17:33:48Z | 2024-10-16T17:33:48Z |
| suse-su-2024:3675-1 | Security update for libarchive | 2024-10-16T17:33:32Z | 2024-10-16T17:33:32Z |
| suse-su-2024:3674-1 | Security update for the Linux Kernel (Live Patch 57 for SLE 12 SP5) | 2024-10-16T17:03:35Z | 2024-10-16T17:03:35Z |
| suse-su-2024:3672-1 | Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP4) | 2024-10-16T16:34:14Z | 2024-10-16T16:34:14Z |
| suse-su-2024:3685-1 | Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3) | 2024-10-16T16:33:50Z | 2024-10-16T16:33:50Z |
| suse-su-2024:3666-1 | Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6) | 2024-10-16T16:03:38Z | 2024-10-16T16:03:38Z |
| suse-su-2024:3660-1 | Security update for the Linux Kernel (Live Patch 52 for SLE 12 SP5) | 2024-10-16T14:33:27Z | 2024-10-16T14:33:27Z |
| suse-su-2024:3664-1 | Security update for php8 | 2024-10-16T14:28:50Z | 2024-10-16T14:28:50Z |
| suse-su-2024:3663-1 | Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5) | 2024-10-16T14:03:57Z | 2024-10-16T14:03:57Z |
| suse-su-2024:3662-1 | Security update for the Linux Kernel (Live Patch 54 for SLE 12 SP5) | 2024-10-16T14:03:45Z | 2024-10-16T14:03:45Z |
| suse-su-2024:3661-1 | Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP3) | 2024-10-16T13:33:40Z | 2024-10-16T13:33:40Z |
| suse-su-2024:3658-1 | Security update for keepalived | 2024-10-16T13:03:39Z | 2024-10-16T13:03:39Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-21703 | Online Fire Reporting System /details.php文件SQL注入漏洞 | 2025-06-11 | 2025-09-18 |
| cnvd-2025-21702 | Online Fire Reporting System /admin/profile.php文件SQL注入漏洞 | 2025-06-11 | 2025-09-18 |
| cnvd-2025-21701 | Online Fire Reporting System /admin/edit-team.php文件SQL注入漏洞 | 2025-06-11 | 2025-09-18 |
| cnvd-2025-21700 | Online Fire Reporting System workin-progress-requests.php文件SQL注入漏洞 | 2025-07-21 | 2025-09-18 |
| cnvd-2025-21699 | Online Fire Reporting System team-ontheway-requests.php文件SQL注入漏洞 | 2025-07-21 | 2025-09-18 |
| cnvd-2025-21698 | Online Fire Reporting System new-requests.php文件SQL注入漏洞 | 2025-07-21 | 2025-09-18 |
| cnvd-2025-21697 | Online Fire Reporting System completed-requests.php文件SQL注入漏洞 | 2025-07-21 | 2025-09-18 |
| cnvd-2025-21696 | Online Fire Reporting System bwdates-report-result.php文件SQL注入漏洞 | 2025-07-21 | 2025-09-18 |
| cnvd-2025-21695 | Online Fire Reporting System assigned-requests.php文件SQL注入漏洞 | 2025-07-21 | 2025-09-18 |
| cnvd-2025-21694 | Online Fire Reporting System all-requests.php文件SQL注入漏洞 | 2025-07-21 | 2025-09-18 |
| cnvd-2025-21693 | Online Fire Reporting System add-team.php文件SQL注入漏洞 | 2025-07-21 | 2025-09-18 |
| cnvd-2025-21657 | Zoo Management System /admin/profile.php文件SQL注入漏洞 | 2025-05-22 | 2025-09-18 |
| cnvd-2025-21656 | Zoo Management System /admin/edit-animal-details.php文件SQL注入漏洞 | 2025-05-22 | 2025-09-18 |
| cnvd-2025-21655 | Zoo Management System /admin/contactus.php文件SQL注入漏洞 | 2025-05-22 | 2025-09-18 |
| cnvd-2025-21654 | Zoo Management System view-normal-ticket.php文件SQL注入漏洞 | 2025-07-04 | 2025-09-18 |
| cnvd-2025-21653 | Dairy Farm Shop Management System硬编码漏洞 | 2022-04-20 | 2025-09-18 |
| cnvd-2025-21652 | Dairy Farm Shop Management System /profile.php文件SQL注入漏洞 | 2025-06-11 | 2025-09-18 |
| cnvd-2025-21651 | Dairy Farm Shop Management System /bwdate-report-details.php文件SQL注入漏洞 | 2025-06-11 | 2025-09-18 |
| cnvd-2025-21650 | Dairy Farm Shop Management System /add-product.php文件SQL注入漏洞 | 2025-06-11 | 2025-09-18 |
| cnvd-2025-21649 | Dairy Farm Shop Management System /add-company.php文件SQL注入漏洞 | 2025-06-11 | 2025-09-18 |
| cnvd-2025-21648 | Dairy Farm Shop Management System manage-companies.php文件SQL注入漏洞 | 2025-07-04 | 2025-09-18 |
| cnvd-2025-21647 | Dairy Farm Shop Management System manage-categories.php文件SQL注入漏洞 | 2025-07-04 | 2025-09-18 |
| cnvd-2025-21646 | Dairy Farm Shop Management System invoices.php文件SQL注入漏洞 | 2025-07-21 | 2025-09-18 |
| cnvd-2025-21645 | Dairy Farm Shop Management System invoice.php文件SQL注入漏洞 | 2025-07-21 | 2025-09-18 |
| cnvd-2025-21644 | Dairy Farm Shop Management System edit-product.php文件SQL注入漏洞 | 2025-07-21 | 2025-09-18 |
| cnvd-2025-21643 | Dairy Farm Shop Management System edit-company.php文件SQL注入漏洞 | 2025-07-21 | 2025-09-18 |
| cnvd-2025-21642 | Dairy Farm Shop Management System edit-category.php文件SQL注入漏洞 | 2025-07-21 | 2025-09-18 |
| cnvd-2025-21610 | Zoo Management System manage-foreigners-ticket.php文件SQL注入漏洞 | 2025-07-04 | 2025-09-18 |
| cnvd-2025-21609 | Zoo Management System /admin/manage-normal-ticket.php文件SQL注入漏洞 | 2025-07-21 | 2025-09-18 |
| cnvd-2025-21608 | Zoo Management System /admin/manage-animals.php文件SQL注入漏洞 | 2025-07-21 | 2025-09-18 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2024-AVI-0108 | Multiples vulnérabilités dans les produits Fortinet | 2024-02-09T00:00:00.000000 | 2024-04-10T00:00:00.000000 |
| certfr-2024-avi-0282 | Vulnérabilité dans les produits Schneider | 2024-04-09T00:00:00.000000 | 2024-04-09T00:00:00.000000 |
| certfr-2024-avi-0281 | Multiples vulnérabilités dans les produits Siemens | 2024-04-09T00:00:00.000000 | 2024-04-09T00:00:00.000000 |
| certfr-2024-avi-0280 | Vulnérabilité dans OpenSSL | 2024-04-09T00:00:00.000000 | 2024-04-09T00:00:00.000000 |
| CERTFR-2024-AVI-0282 | Vulnérabilité dans les produits Schneider | 2024-04-09T00:00:00.000000 | 2024-04-09T00:00:00.000000 |
| CERTFR-2024-AVI-0281 | Multiples vulnérabilités dans les produits Siemens | 2024-04-09T00:00:00.000000 | 2024-04-09T00:00:00.000000 |
| CERTFR-2024-AVI-0280 | Vulnérabilité dans OpenSSL | 2024-04-09T00:00:00.000000 | 2024-04-09T00:00:00.000000 |
| certfr-2024-avi-0279 | Multiples vulnérabilités dans les produits IBM | 2024-04-05T00:00:00.000000 | 2024-04-05T00:00:00.000000 |
| certfr-2024-avi-0278 | Vulnérabilité dans le noyau Linux de Debian | 2024-04-05T00:00:00.000000 | 2024-04-05T00:00:00.000000 |
| certfr-2024-avi-0277 | Multiples vulnérabilités dans le noyau Linux de RedHat | 2024-04-05T00:00:00.000000 | 2024-04-05T00:00:00.000000 |
| certfr-2024-avi-0276 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2024-04-05T00:00:00.000000 | 2024-04-05T00:00:00.000000 |
| certfr-2024-avi-0275 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2024-04-05T00:00:00.000000 | 2024-04-05T00:00:00.000000 |
| certfr-2024-avi-0274 | Multiples vulnérabilités dans Apache HTTP Server | 2024-04-05T00:00:00.000000 | 2024-04-05T00:00:00.000000 |
| certfr-2024-avi-0273 | Multiples vulnérabilités dans Microsoft Edge | 2024-04-05T00:00:00.000000 | 2024-04-05T00:00:00.000000 |
| CERTFR-2024-AVI-0279 | Multiples vulnérabilités dans les produits IBM | 2024-04-05T00:00:00.000000 | 2024-04-05T00:00:00.000000 |
| CERTFR-2024-AVI-0278 | Vulnérabilité dans le noyau Linux de Debian | 2024-04-05T00:00:00.000000 | 2024-04-05T00:00:00.000000 |
| CERTFR-2024-AVI-0277 | Multiples vulnérabilités dans le noyau Linux de RedHat | 2024-04-05T00:00:00.000000 | 2024-04-05T00:00:00.000000 |
| CERTFR-2024-AVI-0276 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2024-04-05T00:00:00.000000 | 2024-04-05T00:00:00.000000 |
| CERTFR-2024-AVI-0275 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2024-04-05T00:00:00.000000 | 2024-04-05T00:00:00.000000 |
| CERTFR-2024-AVI-0274 | Multiples vulnérabilités dans Apache HTTP Server | 2024-04-05T00:00:00.000000 | 2024-04-05T00:00:00.000000 |
| CERTFR-2024-AVI-0273 | Multiples vulnérabilités dans Microsoft Edge | 2024-04-05T00:00:00.000000 | 2024-04-05T00:00:00.000000 |
| certfr-2024-avi-0272 | Multiples vulnérabilités dans Google Android et Pixel | 2024-04-04T00:00:00.000000 | 2024-04-04T00:00:00.000000 |
| certfr-2024-avi-0271 | Multiples vulnérabilités dans les produits Ivanti | 2024-04-04T00:00:00.000000 | 2024-04-04T00:00:00.000000 |
| certfr-2024-avi-0270 | Vulnérabilité dans Cisco Nexus Dashboard Fabric Controller | 2024-04-04T00:00:00.000000 | 2024-04-04T00:00:00.000000 |
| certfr-2024-avi-0269 | Multiples vulnérabilités dans Mozilla Firefox | 2024-04-04T00:00:00.000000 | 2024-04-04T00:00:00.000000 |
| CERTFR-2024-AVI-0272 | Multiples vulnérabilités dans Google Android et Pixel | 2024-04-04T00:00:00.000000 | 2024-04-04T00:00:00.000000 |
| CERTFR-2024-AVI-0271 | Multiples vulnérabilités dans les produits Ivanti | 2024-04-04T00:00:00.000000 | 2024-04-04T00:00:00.000000 |
| CERTFR-2024-AVI-0270 | Vulnérabilité dans Cisco Nexus Dashboard Fabric Controller | 2024-04-04T00:00:00.000000 | 2024-04-04T00:00:00.000000 |
| CERTFR-2024-AVI-0269 | Multiples vulnérabilités dans Mozilla Firefox | 2024-04-04T00:00:00.000000 | 2024-04-04T00:00:00.000000 |
| certfr-2024-avi-0268 | Multiples vulnérabilités dans VMware SD-WAN | 2024-04-03T00:00:00.000000 | 2024-04-03T00:00:00.000000 |