Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-55683 |
5.5 (3.1)
|
Windows Kernel Information Disclosure Vulnerability |
Microsoft |
Windows Server 2019 |
2025-10-14T17:01:07.360Z | 2026-01-02T19:53:23.353Z |
| CVE-2025-60711 |
6.3 (3.1)
|
Microsoft Edge (Chromium-based) Remote Code Execution … |
Microsoft |
Microsoft Edge (Chromium-based) |
2025-10-31T19:29:01.444Z | 2026-01-02T19:53:22.281Z |
| CVE-2025-59184 |
5.5 (3.1)
|
Storage Spaces Direct Information Disclosure Vulnerability |
Microsoft |
Windows Server 2019 |
2025-10-14T17:01:25.711Z | 2026-01-02T19:53:22.849Z |
| CVE-2025-59501 |
4.8 (3.1)
|
Microsoft Configuration Manager Spoofing Vulnerability |
Microsoft |
Microsoft Configuration Manager |
2025-10-31T16:45:40.699Z | 2026-01-02T19:53:21.792Z |
| CVE-2025-59500 |
7.7 (3.1)
|
Azure Notification Service Elevation of Privilege Vuln… |
Microsoft |
Azure Notification Service |
2025-10-23T21:07:30.428Z | 2026-01-02T19:53:21.218Z |
| CVE-2025-59503 |
10 (3.1)
|
Azure Compute Resource Provider Elevation of Privilege… |
Microsoft |
Azure Compute Resource Provider |
2025-10-23T21:18:06.047Z | 2026-01-02T19:53:20.558Z |
| CVE-2025-59286 |
9.3 (3.1)
|
Copilot Information Disclosure Vulnerability |
Microsoft |
Microsoft 365 Copilot's Business Chat |
2025-10-09T21:04:15.392Z | 2026-01-02T19:53:19.234Z |
| CVE-2025-59273 |
7.3 (3.1)
|
Azure Event Grid System Elevation of Privilege Vulnerability |
Microsoft |
Azure Event Grid System |
2025-10-23T21:17:49.064Z | 2026-01-02T19:53:19.881Z |
| CVE-2025-55321 |
9.3 (3.1)
|
Azure Monitor Log Analytics Spoofing Vulnerability |
Microsoft |
Azure Monitor |
2025-10-09T21:04:12.117Z | 2026-01-02T19:53:18.293Z |
| CVE-2025-59272 |
9.3 (3.1)
|
Copilot Information Disclosure Vulnerability |
Microsoft |
Microsoft 365 Copilot's Business Chat |
2025-10-09T21:04:14.254Z | 2026-01-02T19:53:17.590Z |
| CVE-2025-59271 |
8.7 (3.1)
|
Redis Enterprise Elevation of Privilege Vulnerability |
Microsoft |
Azure Cache for Redis Enterprise |
2025-10-09T21:04:13.580Z | 2026-01-02T19:53:16.861Z |
| CVE-2025-59252 |
9.3 (3.1)
|
M365 Copilot Information Disclosure Vulnerability |
Microsoft |
Microsoft 365 Word Copilot |
2025-10-09T21:04:12.988Z | 2026-01-02T19:53:16.208Z |
| CVE-2025-59247 |
8.8 (3.1)
|
Azure PlayFab Elevation of Privilege Vulnerability |
Microsoft |
Azure PlayFab |
2025-10-09T21:04:10.867Z | 2026-01-02T19:53:15.697Z |
| CVE-2025-59246 |
9.8 (3.1)
|
Azure Entra ID Elevation of Privilege Vulnerability |
Microsoft |
Microsoft Entra |
2025-10-09T21:04:09.291Z | 2026-01-02T19:53:15.126Z |
| CVE-2025-59218 |
9.6 (3.1)
|
Azure Entra ID Elevation of Privilege Vulnerability |
Microsoft |
Microsoft Entra |
2025-10-09T21:04:07.739Z | 2026-01-02T19:53:14.522Z |
| CVE-2025-59497 |
7 (3.1)
|
Microsoft Defender for Linux Denial of Service Vulnerability |
Microsoft |
Microsoft Defender for Endpoint for Linux |
2025-10-14T17:01:48.832Z | 2026-01-02T19:53:13.955Z |
| CVE-2025-59289 |
7 (3.1)
|
Windows Bluetooth Service Elevation of Privilege Vulne… |
Microsoft |
Windows Server 2022 |
2025-10-14T17:01:48.272Z | 2026-01-02T19:53:13.397Z |
| CVE-2025-59287 |
9.8 (3.1)
|
Windows Server Update Service (WSUS) Remote Code Execu… |
Microsoft |
Windows Server 2019 |
2025-10-14T17:01:47.629Z | 2026-01-02T19:53:12.813Z |
| CVE-2025-59285 |
7 (3.1)
|
Azure Monitor Agent Elevation of Privilege Vulnerability |
Microsoft |
Azure Monitor |
2025-10-14T17:01:46.994Z | 2026-01-02T19:53:12.244Z |
| CVE-2025-59278 |
7.8 (3.1)
|
Windows Authentication Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2025-10-14T17:01:46.365Z | 2026-01-02T19:53:11.655Z |
| CVE-2025-59275 |
7.8 (3.1)
|
Windows Authentication Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2025-10-14T17:01:45.803Z | 2026-01-02T19:53:11.000Z |
| CVE-2025-59261 |
7 (3.1)
|
Windows Graphics Component Elevation of Privilege Vuln… |
Microsoft |
Windows Server 2022 |
2025-10-14T17:01:45.144Z | 2026-01-02T19:53:10.365Z |
| CVE-2025-59260 |
5.5 (3.1)
|
Microsoft Failover Cluster Virtual Driver Information … |
Microsoft |
Windows Server 2019 |
2025-10-14T17:01:44.497Z | 2026-01-02T19:53:09.695Z |
| CVE-2025-59253 |
5.5 (3.1)
|
Windows Search Service Denial of Service Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2025-10-14T17:01:43.961Z | 2026-01-02T19:53:09.060Z |
| CVE-2025-59230 |
7.8 (3.1)
|
Windows Remote Access Connection Manager Elevation of … |
Microsoft |
Windows 10 Version 1809 |
2025-10-14T17:01:43.397Z | 2026-01-02T19:53:08.496Z |
| CVE-2025-59248 |
7.5 (3.1)
|
Microsoft Exchange Server Spoofing Vulnerability |
Microsoft |
Microsoft Exchange Server Subscription Edition RTM |
2025-10-14T17:01:42.916Z | 2026-01-02T19:53:07.795Z |
| CVE-2025-59244 |
6.5 (3.1)
|
NTLM Hash Disclosure Spoofing Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2025-10-14T17:01:42.361Z | 2026-01-02T19:53:07.077Z |
| CVE-2025-59241 |
7.8 (3.1)
|
Windows Health and Optimized Experiences Elevation of … |
Microsoft |
Windows 11 Version 25H2 |
2025-10-14T17:01:41.802Z | 2026-01-02T19:53:06.332Z |
| CVE-2025-59238 |
7.8 (3.1)
|
Microsoft PowerPoint Remote Code Execution Vulnerability |
Microsoft |
Microsoft Office 2019 |
2025-10-14T17:01:41.228Z | 2026-01-02T19:53:05.742Z |
| CVE-2025-59232 |
7.1 (3.1)
|
Microsoft Excel Information Disclosure Vulnerability |
Microsoft |
Office Online Server |
2025-10-14T17:01:40.739Z | 2026-01-02T19:53:05.116Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-34602 |
N/A
|
This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. | N/A | N/A | 2026-01-02T16:25:53.499Z | |
| CVE-2025-34601 |
N/A
|
This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. | N/A | N/A | 2026-01-02T16:25:52.027Z | |
| CVE-2025-34600 |
N/A
|
This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. | N/A | N/A | 2026-01-02T16:25:50.554Z | |
| CVE-2025-34599 |
N/A
|
This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. | N/A | N/A | 2026-01-02T16:25:49.125Z | |
| CVE-2025-34598 |
N/A
|
This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. | N/A | N/A | 2026-01-02T16:25:47.656Z | |
| CVE-2025-34597 |
N/A
|
This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. | N/A | N/A | 2026-01-02T16:25:46.202Z | |
| CVE-2025-34596 |
N/A
|
This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. | N/A | N/A | 2026-01-02T16:25:44.691Z | |
| CVE-2025-34595 |
N/A
|
This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. | N/A | N/A | 2026-01-02T16:25:43.285Z | |
| CVE-2025-34594 |
N/A
|
This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. | N/A | N/A | 2026-01-02T16:25:41.825Z | |
| CVE-2025-34593 |
N/A
|
This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. | N/A | N/A | 2026-01-02T16:25:40.402Z | |
| CVE-2025-34592 |
N/A
|
This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. | N/A | N/A | 2026-01-02T16:25:38.988Z | |
| CVE-2025-34591 |
N/A
|
This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. | N/A | N/A | 2026-01-02T16:25:37.554Z | |
| CVE-2025-34590 |
N/A
|
This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. | N/A | N/A | 2026-01-02T16:25:36.098Z | |
| CVE-2025-34589 |
N/A
|
This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. | N/A | N/A | 2026-01-02T16:25:34.533Z | |
| CVE-2025-34588 |
N/A
|
This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. | N/A | N/A | 2026-01-02T16:25:33.065Z | |
| CVE-2025-34587 |
N/A
|
This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. | N/A | N/A | 2026-01-02T16:25:31.581Z | |
| CVE-2025-34586 |
N/A
|
This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. | N/A | N/A | 2026-01-02T16:25:30.134Z | |
| CVE-2025-34585 |
N/A
|
This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. | N/A | N/A | 2026-01-02T16:25:28.735Z | |
| CVE-2025-34584 |
N/A
|
This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. | N/A | N/A | 2026-01-02T16:25:27.301Z | |
| CVE-2025-34583 |
N/A
|
This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. | N/A | N/A | 2026-01-02T16:25:25.895Z | |
| CVE-2025-34582 |
N/A
|
This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. | N/A | N/A | 2026-01-02T16:25:24.493Z | |
| CVE-2025-34581 |
N/A
|
This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. | N/A | N/A | 2026-01-02T16:25:23.023Z | |
| CVE-2025-34580 |
N/A
|
This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. | N/A | N/A | 2026-01-02T16:25:21.563Z | |
| CVE-2025-34579 |
N/A
|
This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. | N/A | N/A | 2026-01-02T16:25:20.062Z | |
| CVE-2025-34578 |
N/A
|
This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. | N/A | N/A | 2026-01-02T16:25:18.562Z | |
| CVE-2025-34577 |
N/A
|
This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. | N/A | N/A | 2026-01-02T16:25:17.164Z | |
| CVE-2025-34576 |
N/A
|
This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. | N/A | N/A | 2026-01-02T16:25:15.676Z | |
| CVE-2025-34575 |
N/A
|
This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. | N/A | N/A | 2026-01-02T16:25:14.171Z | |
| CVE-2025-34574 |
N/A
|
This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. | N/A | N/A | 2026-01-02T16:25:12.671Z | |
| CVE-2025-34573 |
N/A
|
This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. | N/A | N/A | 2026-01-02T16:25:11.168Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-34602 | Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T17:15:58.027 | 2026-01-02T17:15:58.027 |
| fkie_cve-2025-34601 | Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T17:15:57.963 | 2026-01-02T17:15:57.963 |
| fkie_cve-2025-34600 | Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T17:15:57.903 | 2026-01-02T17:15:57.903 |
| fkie_cve-2025-34599 | Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T17:15:57.840 | 2026-01-02T17:15:57.840 |
| fkie_cve-2025-34598 | Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T17:15:57.783 | 2026-01-02T17:15:57.783 |
| fkie_cve-2025-34597 | Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T17:15:57.730 | 2026-01-02T17:15:57.730 |
| fkie_cve-2025-34596 | Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T17:15:57.667 | 2026-01-02T17:15:57.667 |
| fkie_cve-2025-34595 | Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T17:15:57.603 | 2026-01-02T17:15:57.603 |
| fkie_cve-2025-34594 | Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T17:15:57.530 | 2026-01-02T17:15:57.530 |
| fkie_cve-2025-34593 | Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T17:15:57.470 | 2026-01-02T17:15:57.470 |
| fkie_cve-2025-34592 | Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T17:15:57.413 | 2026-01-02T17:15:57.413 |
| fkie_cve-2025-34591 | Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T17:15:57.357 | 2026-01-02T17:15:57.357 |
| fkie_cve-2025-34590 | Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T17:15:57.300 | 2026-01-02T17:15:57.300 |
| fkie_cve-2025-34589 | Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T17:15:57.237 | 2026-01-02T17:15:57.237 |
| fkie_cve-2025-34588 | Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T17:15:57.180 | 2026-01-02T17:15:57.180 |
| fkie_cve-2025-34587 | Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T17:15:57.123 | 2026-01-02T17:15:57.123 |
| fkie_cve-2025-34586 | Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T17:15:57.063 | 2026-01-02T17:15:57.063 |
| fkie_cve-2025-34585 | Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T17:15:57.010 | 2026-01-02T17:15:57.010 |
| fkie_cve-2025-34584 | Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T17:15:56.943 | 2026-01-02T17:15:56.943 |
| fkie_cve-2025-34583 | Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T17:15:56.877 | 2026-01-02T17:15:56.877 |
| fkie_cve-2025-34582 | Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T17:15:56.817 | 2026-01-02T17:15:56.817 |
| fkie_cve-2025-34581 | Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T17:15:56.760 | 2026-01-02T17:15:56.760 |
| fkie_cve-2025-34580 | Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T17:15:56.700 | 2026-01-02T17:15:56.700 |
| fkie_cve-2025-34579 | Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T17:15:56.643 | 2026-01-02T17:15:56.643 |
| fkie_cve-2025-34578 | Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T17:15:56.580 | 2026-01-02T17:15:56.580 |
| fkie_cve-2025-34577 | Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T17:15:56.527 | 2026-01-02T17:15:56.527 |
| fkie_cve-2025-34576 | Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T17:15:56.470 | 2026-01-02T17:15:56.470 |
| fkie_cve-2025-34575 | Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T17:15:56.407 | 2026-01-02T17:15:56.407 |
| fkie_cve-2025-34574 | Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T17:15:56.350 | 2026-01-02T17:15:56.350 |
| fkie_cve-2025-34573 | Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T17:15:56.287 | 2026-01-02T17:15:56.287 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-x357-46c7-h4hf |
6.1 (3.1)
5.1 (4.0)
|
COMMAX Biometric Access Control System 1.0.0 contains an unauthenticated reflected cross-site scrip… | 2025-12-31T21:30:57Z | 2025-12-31T21:30:57Z |
| ghsa-v245-m4vw-4545 |
7.5 (3.1)
9.3 (4.0)
|
Cypress Solutions CTM-200/CTM-ONE 1.3.6 contains hard-coded credentials vulnerability in Linux dist… | 2025-12-31T21:30:57Z | 2025-12-31T21:30:57Z |
| ghsa-p2w9-gvcm-4px8 |
5.3 (4.0)
|
ZwiiCMS versions prior to 13.7.00 contain a denial-of-service vulnerability in multiple administrat… | 2025-12-31T21:30:57Z | 2025-12-31T21:30:57Z |
| ghsa-mmm6-w9m9-679x |
8.8 (3.1)
8.5 (4.0)
|
Epic Games Psyonix Rocket League <=1.95 contains an insecure permissions vulnerability that allows … | 2025-12-31T21:30:57Z | 2025-12-31T21:30:57Z |
| ghsa-h2cc-vm9p-m74c |
7.5 (3.1)
9.3 (4.0)
|
Selea CarPlateServer 4.0.1.6 contains a remote program execution vulnerability that allows attacker… | 2025-12-31T21:30:57Z | 2025-12-31T21:30:57Z |
| ghsa-f57r-vv46-fp7w |
7.5 (3.1)
8.7 (4.0)
|
NuCom 11N Wireless Router 5.07.90 contains a privilege escalation vulnerability that allows non-pri… | 2025-12-31T21:30:57Z | 2025-12-31T21:30:57Z |
| ghsa-chph-r4jm-2932 |
7.5 (3.1)
8.7 (4.0)
|
ZBL EPON ONU Broadband Router V100R001 contains a privilege escalation vulnerability that allows li… | 2025-12-31T21:30:57Z | 2025-12-31T21:30:57Z |
| ghsa-9vxp-vq3x-qvgh |
4.7 (3.1)
2.0 (4.0)
|
A vulnerability was detected in iCMS up to 8.0.0. Affected is the function Save of the file app/con… | 2025-12-31T21:30:57Z | 2025-12-31T21:30:57Z |
| ghsa-6596-h2j7-v8m3 |
8.8 (3.1)
8.6 (4.0)
|
meterN 1.2.3 contains an authenticated remote code execution vulnerability in admin_meter2.php and … | 2025-12-31T21:30:57Z | 2025-12-31T21:30:57Z |
| ghsa-5gjv-h9vc-2w8g |
6.3 (3.1)
2.1 (4.0)
|
A security vulnerability has been detected in Kohana KodiCMS up to 13.82.135. This impacts the func… | 2025-12-31T21:30:57Z | 2025-12-31T21:30:57Z |
| ghsa-2m8q-jcjp-298w |
8.8 (3.1)
8.6 (4.0)
|
Cypress Solutions CTM-200 2.7.1 contains an authenticated command injection vulnerability in the fi… | 2025-12-31T21:30:57Z | 2025-12-31T21:30:57Z |
| ghsa-229c-7j29-hv97 |
8.4 (3.1)
8.5 (4.0)
|
Selea CarPlateServer 4.0.1.6 contains an unquoted service path vulnerability in the Windows service… | 2025-12-31T21:30:57Z | 2025-12-31T21:30:57Z |
| ghsa-q45h-4pv4-p744 |
8.8 (3.1)
7.4 (4.0)
|
A vulnerability was identified in UTT 进取 512W up to 1.7.7-171114. Impacted is the function strcpy o… | 2025-12-26T03:30:14Z | 2025-12-31T21:30:29Z |
| ghsa-ff49-f5c2-ggcq |
8.8 (3.1)
7.4 (4.0)
|
A vulnerability was determined in UTT 进取 512W up to 1.7.7-171114. This issue affects the function s… | 2025-12-26T00:30:12Z | 2025-12-31T21:30:29Z |
| ghsa-4v76-jcg6-9p6m |
8.8 (3.1)
7.4 (4.0)
|
A vulnerability was found in UTT 进取 512W up to 1.7.7-171114. This vulnerability affects the functio… | 2025-12-26T00:30:12Z | 2025-12-31T21:30:29Z |
| ghsa-29wh-g4c8-c35q |
8.8 (3.1)
7.4 (4.0)
|
A vulnerability has been found in UTT 进取 512W up to 1.7.7-171114. This affects the function strcpy … | 2025-12-26T00:30:12Z | 2025-12-31T21:30:29Z |
| ghsa-pfgh-3rp7-865r |
6.3 (3.1)
5.3 (4.0)
|
Advantech WebAccess/SCADA is vulnerable to SQL injection, which may allow an attacker to execute a… | 2025-12-18T21:31:44Z | 2025-12-31T21:30:24Z |
| ghsa-4gh3-mcch-g7mg |
4.3 (3.1)
5.3 (4.0)
|
Advantech WebAccess/SCADA is vulnerable to directory traversal, which may allow an attacker to dete… | 2025-12-18T21:31:44Z | 2025-12-31T21:30:24Z |
| ghsa-26jc-h8ww-vpqm |
8.1 (3.1)
7.2 (4.0)
|
Advantech WebAccess/SCADA is vulnerable to directory traversal, which may allow an attacker to dele… | 2025-12-18T21:31:44Z | 2025-12-31T21:30:24Z |
| ghsa-53rj-48p2-7m5j |
9.4 (4.0)
|
An OS command injection vulnerability exists in the OptiLink ONT1GEW GPON router firmware version V… | 2025-06-26T18:31:28Z | 2025-12-31T21:30:23Z |
| ghsa-52hq-8xj9-8pmr |
8.8 (3.1)
8.7 (4.0)
|
Advantech WebAccess/SCADA is vulnerable to unrestricted file upload, which may allow an attacker t… | 2025-12-18T21:31:44Z | 2025-12-31T21:30:23Z |
| ghsa-xq9w-j69v-6chc |
8.8 (3.1)
|
Path traversal vulnerability in the file upload functionality in tinyfilemanager.php in Tiny File M… | 2022-03-16T00:00:47Z | 2025-12-31T21:30:22Z |
| ghsa-vmj3-x582-v9f4 |
5.4 (3.1)
|
A Stored XSS exists in TinyFileManager All version up to and including 2.4.6 in /tinyfilemanager.ph… | 2022-05-24T19:14:36Z | 2025-12-31T21:30:22Z |
| ghsa-2p5c-r4xc-mhvw |
8.8 (3.1)
|
A Cross-Site Request Forgery (CSRF) vulnerability exists in TinyFileManager all version up to and i… | 2022-05-24T19:14:36Z | 2025-12-31T21:30:22Z |
| ghsa-vjhr-4rwp-pw28 |
4.3 (3.1)
|
Missing Authorization vulnerability in Northern Beaches Websites WP Custom Admin Interface allows E… | 2025-12-31T18:30:25Z | 2025-12-31T18:30:25Z |
| ghsa-q6fx-287q-g86w |
5.9 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-12-31T18:30:25Z | 2025-12-31T18:30:25Z |
| ghsa-q5xx-qfp5-vp5c |
5.4 (3.1)
|
Missing Authorization vulnerability in merkulove Select Graphist for Elementor Graphist for Element… | 2025-12-31T18:30:25Z | 2025-12-31T18:30:25Z |
| ghsa-mrvp-jf7m-h2rh |
4.3 (3.1)
|
Missing Authorization vulnerability in Alexander AnyComment allows Exploiting Incorrectly Configure… | 2025-12-31T18:30:25Z | 2025-12-31T18:30:25Z |
| ghsa-j84q-2ghq-42m2 |
5.9 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-12-31T18:30:25Z | 2025-12-31T18:30:25Z |
| ghsa-gm6f-w7px-9f8g |
5.9 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-12-31T18:30:25Z | 2025-12-31T18:30:25Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2022-118 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `Quantized… | tensorflow-gpu | 2022-02-03T14:15:00Z | 2022-03-09T00:18:24.872174Z |
| pysec-2022-117 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseCou… | tensorflow-gpu | 2022-02-03T14:15:00Z | 2022-03-09T00:18:24.751245Z |
| pysec-2022-116 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `*Bincount… | tensorflow-gpu | 2022-02-03T14:15:00Z | 2022-03-09T00:18:24.620644Z |
| pysec-2022-115 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseTen… | tensorflow-gpu | 2022-02-03T12:15:00Z | 2022-03-09T00:18:24.478314Z |
| pysec-2022-114 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `Fractiona… | tensorflow-gpu | 2022-02-03T13:15:00Z | 2022-03-09T00:18:24.359111Z |
| pysec-2022-113 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `MapStage`… | tensorflow-gpu | 2022-02-03T13:15:00Z | 2022-03-09T00:18:24.222206Z |
| pysec-2022-112 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `StringNGr… | tensorflow-gpu | 2022-02-03T12:15:00Z | 2022-03-09T00:18:24.082433Z |
| pysec-2022-111 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `ThreadPoo… | tensorflow-gpu | 2022-02-03T12:15:00Z | 2022-03-09T00:18:23.954976Z |
| pysec-2022-110 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of shape infe… | tensorflow-gpu | 2022-02-03T12:15:00Z | 2022-03-09T00:18:23.826464Z |
| pysec-2022-109 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `Fractiona… | tensorflow-gpu | 2022-02-03T11:15:00Z | 2022-03-09T00:18:23.671699Z |
| pysec-2022-108 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `UnravelIn… | tensorflow-gpu | 2022-02-03T13:15:00Z | 2022-03-09T00:18:23.531782Z |
| pysec-2022-107 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of shape infe… | tensorflow-gpu | 2022-02-03T11:15:00Z | 2022-03-09T00:18:23.406972Z |
| pysec-2022-106 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of shape infe… | tensorflow-gpu | 2022-02-03T11:15:00Z | 2022-03-09T00:18:23.259781Z |
| pysec-2022-105 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `Dequantiz… | tensorflow-gpu | 2022-02-03T11:15:00Z | 2022-03-09T00:18:23.133344Z |
| pysec-2022-104 |
|
Tensorflow is an Open Source Machine Learning Framework. The estimator for the cost of so… | tensorflow-gpu | 2022-02-03T13:15:00Z | 2022-03-09T00:18:22.994300Z |
| pysec-2022-98 |
|
Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, Grapple… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:36.051133Z |
| pysec-2022-103 |
|
Tensorflow is an Open Source Machine Learning Framework. When building an XLA compilation… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:36.537526Z |
| pysec-2022-100 |
|
Tensorflow is an Open Source Machine Learning Framework. The `GraphDef` format in TensorF… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:36.268189Z |
| pysec-2022-97 |
|
Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a den… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:35.928489Z |
| pysec-2022-96 |
|
Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, Grapple… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:35.797116Z |
| pysec-2022-95 |
|
Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a den… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:35.674710Z |
| pysec-2022-94 |
|
Tensorflow is an Open Source Machine Learning Framework. When decoding PNG images TensorF… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:35.562344Z |
| pysec-2022-93 |
|
Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a use… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:35.438139Z |
| pysec-2022-92 |
|
Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a den… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:35.311751Z |
| pysec-2022-91 |
|
Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a den… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:35.169396Z |
| pysec-2022-90 |
|
Tensorflow is an Open Source Machine Learning Framework. The Grappler optimizer in Tensor… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:35.012769Z |
| pysec-2022-89 |
|
Tensorflow is an Open Source Machine Learning Framework. During shape inference, TensorFl… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:34.891439Z |
| pysec-2022-88 |
|
Tensorflow is an Open Source Machine Learning Framework. The Grappler optimizer in Tensor… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:34.776924Z |
| pysec-2022-87 |
|
Tensorflow is an Open Source Machine Learning Framework. If a graph node is invalid, Tens… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:34.646320Z |
| pysec-2022-86 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `GetInitOp… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:34.536542Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-3988 | The Sina Extension for Elementor (Slider, Gallery, Form, Modal, Data Table, Tab, Particle… | 2024-04-20T05:02:05.777416Z |
| gsd-2024-3987 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:05.774030Z |
| gsd-2024-3986 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:05.841356Z |
| gsd-2024-3984 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:05.824330Z |
| gsd-2024-3983 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:05.840192Z |
| gsd-2024-3982 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:05.904972Z |
| gsd-2024-3980 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:05.874576Z |
| gsd-2024-3979 | A vulnerability, which was classified as problematic, has been found in COVESA vsomeip up… | 2024-04-20T05:02:05.972665Z |
| gsd-2024-3978 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:05.797907Z |
| gsd-2024-3977 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:05.999112Z |
| gsd-2024-3976 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:05.954049Z |
| gsd-2024-28950 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:04.131368Z |
| gsd-2024-31153 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:02.024306Z |
| gsd-2024-4019 | A vulnerability classified as critical has been found in Byzoro Smart S80 Management Plat… | 2024-04-20T05:02:01.109437Z |
| gsd-2024-4018 | Improper Privilege Management vulnerability in BeyondTrust U-Series Appliance on Windows,… | 2024-04-20T05:02:01.110951Z |
| gsd-2024-4017 | Improper Privilege Management vulnerability in BeyondTrust U-Series Appliance on Windows,… | 2024-04-20T05:02:01.109929Z |
| gsd-2024-4016 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:01.111469Z |
| gsd-2024-4015 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:01.109189Z |
| gsd-2024-4014 | The hCaptcha for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Script… | 2024-04-20T05:02:01.108987Z |
| gsd-2024-4013 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:01.108244Z |
| gsd-2024-4012 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:01.109628Z |
| gsd-2024-4011 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:01.111847Z |
| gsd-2024-4010 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:01.112041Z |
| gsd-2024-4009 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:01.107679Z |
| gsd-2024-4008 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:01.110486Z |
| gsd-2024-4007 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:01.111660Z |
| gsd-2024-4006 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.7 be… | 2024-04-20T05:02:01.108806Z |
| gsd-2024-4005 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:01.108059Z |
| gsd-2024-4004 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:01.108622Z |
| gsd-2024-4003 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:01.107869Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-0000-reversing-labs-7b71d75bd869e031 | 2025-12-23T08:35:02Z | 2025-12-23T08:35:02Z | |
| mal-0000-reversing-labs-2741df1328664730 | 2025-12-23T08:35:02Z | 2025-12-23T08:35:02Z | |
| mal-0000-reversing-labs-3e750fa2c56f959c | 2025-12-23T08:35:00Z | 2025-12-23T08:35:00Z | |
| mal-0000-reversing-labs-624be185a3652f29 | 2025-12-23T08:34:59Z | 2025-12-23T08:34:59Z | |
| mal-0000-reversing-labs-048dd8a21e015013 | 2025-12-23T08:34:50Z | 2025-12-23T08:34:50Z | |
| mal-0000-reversing-labs-328bccbf5505ca7b | 2025-12-23T08:34:49Z | 2025-12-23T08:34:49Z | |
| mal-0000-reversing-labs-6a145d3477b2468b | 2025-12-23T08:34:47Z | 2025-12-23T08:34:47Z | |
| mal-0000-reversing-labs-2a4f4cee5c4937a3 | 2025-12-23T08:34:00Z | 2025-12-23T08:34:00Z | |
| mal-0000-reversing-labs-9ec60cbc97b2d578 | 2025-12-23T08:33:32Z | 2025-12-23T08:33:32Z | |
| mal-0000-reversing-labs-b1dcc09c4d9b29cf | 2025-12-23T08:33:15Z | 2025-12-23T08:33:15Z | |
| mal-0000-reversing-labs-0dc8434c3f69a274 | 2025-12-23T08:33:02Z | 2025-12-23T08:33:02Z | |
| mal-0000-reversing-labs-b1a6faed44bed989 | 2025-12-23T08:33:01Z | 2025-12-23T08:33:01Z | |
| mal-0000-reversing-labs-a8bbb4b2174573f7 | 2025-12-23T08:33:00Z | 2025-12-23T08:33:00Z | |
| mal-0000-reversing-labs-1b362dfc0cf88b48 | 2025-12-23T08:32:50Z | 2025-12-23T08:32:50Z | |
| mal-0000-reversing-labs-38b134e4dac82a83 | 2025-12-23T08:32:44Z | 2025-12-23T08:32:44Z | |
| mal-0000-reversing-labs-84175205fdc8baab | 2025-12-23T08:32:21Z | 2025-12-23T08:32:21Z | |
| mal-0000-reversing-labs-47f4c533222abd8a | 2025-12-23T08:32:20Z | 2025-12-23T08:32:20Z | |
| mal-0000-reversing-labs-299ea83f5e351b1e | 2025-12-23T08:32:19Z | 2025-12-23T08:32:19Z | |
| mal-0000-reversing-labs-d8a51627426b3b77 | 2025-12-23T08:32:18Z | 2025-12-23T08:32:18Z | |
| mal-0000-reversing-labs-724e43dfb6de3b2d | 2025-12-23T08:32:17Z | 2025-12-23T08:32:17Z | |
| mal-0000-reversing-labs-a41bb309f7d0668e | 2025-12-23T08:32:14Z | 2025-12-23T08:32:14Z | |
| mal-0000-reversing-labs-228272c20978b84c | 2025-12-23T08:32:06Z | 2025-12-23T08:32:06Z | |
| mal-0000-reversing-labs-b86ac651db913647 | 2025-12-23T08:32:05Z | 2025-12-23T08:32:05Z | |
| mal-0000-reversing-labs-be820b2548829337 | 2025-12-23T08:31:59Z | 2025-12-23T08:31:59Z | |
| mal-0000-reversing-labs-297f36efbf99593f | 2025-12-23T08:31:52Z | 2025-12-23T08:31:52Z | |
| mal-0000-reversing-labs-079f37214390f088 | 2025-12-23T08:31:51Z | 2025-12-23T08:31:51Z | |
| mal-0000-reversing-labs-9567c5e3e88e6d4d | 2025-12-23T08:31:50Z | 2025-12-23T08:31:50Z | |
| mal-0000-reversing-labs-ae7341999303a63a | 2025-12-23T08:31:49Z | 2025-12-23T08:31:49Z | |
| mal-0000-reversing-labs-6def62a1c73266bb | 2025-12-23T08:31:48Z | 2025-12-23T08:31:48Z | |
| mal-0000-reversing-labs-791a9dc5a23e15d3 | 2025-12-23T08:31:47Z | 2025-12-23T08:31:47Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-0297 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-02-09T23:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2025-0265 | Linux Kernel: Mehrere Schwachstellen | 2025-02-04T23:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2025-0253 | Red Hat Enterprise Linux (Podman und Buildah): Schwachstelle ermöglicht Manipulation von Dateien | 2025-02-03T23:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2025-0130 | vim: Schwachstelle ermöglicht Denial of Service | 2025-01-20T23:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2025-0097 | git: Mehrere Schwachstellen ermöglichen Manipulation | 2025-01-14T23:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2025-0054 | Red Hat Enterprise Linux (Jinja): Mehrere Schwachstellen ermöglichen Codeausführung | 2025-01-13T23:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2025-0049 | vim: Schwachstelle ermöglicht Codeausführung | 2025-01-12T23:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2025-0038 | Red Hat Enterprise Linux (iperf): Schwachstelle ermöglicht Denial of Service | 2025-01-08T23:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-3715 | Linux Kernel: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-12-17T23:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-3569 | Red Hat Enterprise Linux (python-tornado): Schwachstelle ermöglicht Denial of Service | 2024-12-01T23:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-3565 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2024-11-28T23:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-3560 | HAProxy: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-11-27T23:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-3547 | Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-11-25T23:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-3543 | Red Hat Enterprise Linux (PAM): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-11-25T23:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-3426 | Intel Prozessor (Xeon): Mehrere Schwachstellen | 2024-11-12T23:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-3337 | Linux Kernel: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-11-04T23:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-3142 | libarchive: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2024-10-09T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-3097 | vim: Schwachstelle ermöglicht Denial of Service | 2024-10-07T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-2114 | cURL: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-09-10T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-1968 | vim: Schwachstelle ermöglicht Denial of Service | 2024-09-01T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-1920 | vim: Schwachstelle ermöglicht Denial of Service | 2024-08-25T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-1907 | vim: Schwachstelle ermöglicht Denial of Service | 2024-08-22T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-1905 | IBM QRadar SIEM: Mehrere Schwachstellen | 2024-08-21T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-1870 | vim: Schwachstelle ermöglicht Denial of Service | 2024-08-15T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-1807 | AMD Prozessor: Schwachstelle ermöglicht Codeausführung im System Management Mode (SMM) | 2024-08-11T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-1734 | libexpat: Schwachstelle ermöglicht Denial of Service | 2019-09-08T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-1635 | libndp: Schwachstelle ermöglicht Codeausführung | 2024-07-16T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-1510 | Red Hat Enterprise Linux (iperf3): Mehrere Schwachstellen | 2024-07-02T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-1369 | CUPS: Schwachstelle ermöglicht Manipulation von Dateien | 2024-06-12T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-1309 | Nvidia Treiber: Mehrere Schwachstellen | 2024-06-06T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:1120 | Red Hat Security Advisory: OpenShift Container Platform 4.17.16 bug fix and security update | 2025-02-11T11:31:16+00:00 | 2026-01-06T02:25:02+00:00 |
| rhsa-2025:0837 | Red Hat Security Advisory: unbound security update | 2025-01-30T13:00:00+00:00 | 2026-01-06T02:25:02+00:00 |
| rhsa-2025:0140 | Red Hat Security Advisory: OpenShift Container Platform 4.16.30 bug fix and security update | 2025-01-15T00:51:07+00:00 | 2026-01-06T02:25:02+00:00 |
| rhsa-2024:11232 | Red Hat Security Advisory: unbound:1.16.2 security update | 2024-12-17T20:00:23+00:00 | 2026-01-06T02:25:02+00:00 |
| rhsa-2024:11170 | Red Hat Security Advisory: unbound security update | 2024-12-17T18:55:23+00:00 | 2026-01-06T02:25:02+00:00 |
| rhsa-2023:3161 | Red Hat Security Advisory: Red Hat OpenStack Platform 13.0 security update | 2023-05-17T01:57:13+00:00 | 2026-01-06T00:54:25+00:00 |
| rhsa-2023:3158 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 security update | 2023-05-17T01:04:39+00:00 | 2026-01-06T00:54:24+00:00 |
| rhsa-2023:3157 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.0 security update | 2023-05-17T01:02:40+00:00 | 2026-01-06T00:54:24+00:00 |
| rhsa-2023:3156 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 security update | 2023-05-17T01:02:32+00:00 | 2026-01-06T00:54:24+00:00 |
| rhsa-2021:0548 | Red Hat Security Advisory: nodejs:10 security update | 2021-02-16T14:25:46+00:00 | 2026-01-06T00:54:19+00:00 |
| rhsa-2021:0521 | Red Hat Security Advisory: rh-nodejs10-nodejs security update | 2021-02-15T18:28:29+00:00 | 2026-01-06T00:54:19+00:00 |
| rhsa-2020:5086 | Red Hat Security Advisory: rh-nodejs12-nodejs security update | 2020-11-12T09:44:59+00:00 | 2026-01-06T00:54:17+00:00 |
| rhsa-2020:4903 | Red Hat Security Advisory: nodejs:12 security and bug fix update | 2020-11-04T12:35:47+00:00 | 2026-01-06T00:54:17+00:00 |
| rhsa-2020:4272 | Red Hat Security Advisory: nodejs:12 security and bug fix update | 2020-10-19T14:37:38+00:00 | 2026-01-06T00:54:14+00:00 |
| rhsa-2025:22861 | Red Hat Security Advisory: Red Hat Developer Hub 1.8.1 release. | 2025-12-08T15:17:40+00:00 | 2026-01-05T23:44:24+00:00 |
| rhsa-2023:6539 | Red Hat Security Advisory: perl-CPAN security update | 2023-11-07T08:32:11+00:00 | 2026-01-05T21:25:53+00:00 |
| rhsa-2025:23487 | Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.12 security update. | 2025-12-17T13:41:30+00:00 | 2026-01-05T18:27:48+00:00 |
| rhsa-2025:23492 | Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.18 security update. | 2025-12-17T13:43:48+00:00 | 2026-01-05T18:27:46+00:00 |
| rhsa-2025:22775 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.11 security update | 2025-12-04T18:03:52+00:00 | 2026-01-05T18:27:46+00:00 |
| rhsa-2025:23491 | Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.20 security update. | 2025-12-17T13:43:49+00:00 | 2026-01-05T18:27:44+00:00 |
| rhsa-2025:23490 | Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.16 security update. | 2025-12-17T13:43:38+00:00 | 2026-01-05T18:27:44+00:00 |
| rhsa-2025:23489 | Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.17 security update. | 2025-12-17T13:43:36+00:00 | 2026-01-05T18:27:44+00:00 |
| rhsa-2025:23488 | Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.19 security update. | 2025-12-17T13:43:38+00:00 | 2026-01-05T18:27:44+00:00 |
| rhsa-2025:23485 | Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.14 security update. | 2025-12-17T13:41:11+00:00 | 2026-01-05T18:27:43+00:00 |
| rhsa-2025:23486 | Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.15 security update. | 2025-12-17T13:41:25+00:00 | 2026-01-05T18:27:42+00:00 |
| rhsa-2025:23482 | Red Hat Security Advisory: Release of Red Hat OpenShift Developer Tools - Openshift Jenkins 4.13 security update. | 2025-12-17T13:07:54+00:00 | 2026-01-05T18:27:42+00:00 |
| rhsa-2025:22777 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.11 security update | 2025-12-04T15:56:54+00:00 | 2026-01-05T18:27:41+00:00 |
| rhsa-2025:22773 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.11 security update | 2025-12-04T18:04:02+00:00 | 2026-01-05T18:27:41+00:00 |
| rhsa-2025:22187 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.1.2 security update | 2025-11-26T16:59:20+00:00 | 2026-01-05T18:27:37+00:00 |
| rhsa-2025:22190 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.1.2 security update | 2025-11-26T17:02:38+00:00 | 2026-01-05T18:27:35+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-21-103-15 | Siemens and Milestone Siveillance Video Open Network Bridge | 2021-04-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-103-14 | Siemens Nucleus DNS (Update A) | 2021-04-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-103-13 | Siemens SIMOTICS CONNECT 400 (Update A) | 2021-04-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-103-12 | Siemens Tecnomatix RobotExpert | 2021-04-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-103-08 | Siemens SINEMA Remote Connect Server | 2021-04-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-103-07 | Siemens Web Server of SCALANCE X200 (Update A) | 2021-04-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-103-06 | Siemens Solid Edge File Parsing (Update A) | 2021-04-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-103-04 | Siemens Nucleus Products DNS Module (Update A) | 2021-04-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-068-09 | Siemens Solid Edge File Parsing | 2021-03-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-068-06 | Siemens TCP/IP Stack Vulnerabilities-AMNESIA:33 in SENTRON PAC / 3VA Devices (Update C) | 2021-03-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-068-03 | Siemens SCALANCE and RUGGEDCOM Devices (Update A) | 2021-03-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-068-02 | Siemens SCALANCE and RUGGEDCOM Devices SSH (Update A) | 2021-03-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-047-01 | Open Design Alliance Drawings SDK (Update A) | 2021-02-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-040-06 | ICSA-21-040-06_Siemens JT2Go and Teamcenter Visualization (Update A) | 2021-05-17T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-040-05 | Siemens TIA Administrator (Update A) | 2021-02-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-019-01 | dnsmasq by Simon Kelley (Update A) | 2021-01-19T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-012-05 | Siemens SCALANCE X Products (Update B) | 2021-01-12T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-20-343-08 | Siemens Products using TightVNC (Update A) | 2020-12-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-20-343-05 | Siemens Embedded TCP/IP Stack Vulnerabilities-AMNESIA:33 (Update C) | 2020-12-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-20-252-07 | Siemens Industrial Products (Update F) | 2020-09-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-20-252-06 | Siemens SIMATIC HMI Products (Update A) | 2020-09-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-20-161-05 | Siemens SIMATIC, SINAMICS (Update C) | 2020-06-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-20-105-07 | Siemens SCALANCE and SIMATIC (Update H) | 2020-04-14T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-20-042-10 | Siemens SCALANCE S-600 (Update B) | 2020-02-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-20-042-02 | Siemens Industrial Products SNMP (Update F) | 2020-02-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-19-351-02 | Siemens SPPA-T3000 (Update A) | 2019-12-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-19-344-04 | Siemens SIMATIC Products (Update C) | 2019-12-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-19-283-01 | Siemens Industrial Real-Time (IRT) Devices | 2019-10-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-19-099-06 | Siemens SIMATIC, SIMOCODE, SINAMICS, SITOP, and TIM (Update I) | 2019-04-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-18-088-03 | Siemens SIMATIC PCS 7, SIMATIC WinCC, SIMATIC WinCC Runtime Professional, and SIMATIC NET PC Software (Update G) | 2018-03-27T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-cspc-multi-xss-tyDFjhwb | Cisco Common Services Platform Collector Cross-Site Scripting Vulnerabilities | 2022-05-18T16:00:00+00:00 | 2022-06-28T14:43:56+00:00 |
| cisco-sa-asasfr-cmd-inject-pe4gfdg | Cisco FirePOWER Software for ASA FirePOWER Module Command Injection Vulnerability | 2022-06-22T16:00:00+00:00 | 2022-06-22T16:00:00+00:00 |
| cisco-sa-asasfr-cmd-inject-PE4GfdG | Cisco FirePOWER Software for ASA FirePOWER Module Command Injection Vulnerability | 2022-06-22T16:00:00+00:00 | 2022-06-22T16:00:00+00:00 |
| cisco-sa-esasma-info-dsc-q9tluovm | Cisco Email Security Appliance and Cisco Secure Email and Web Manager Information Disclosure Vulnerability | 2022-06-15T16:00:00+00:00 | 2022-06-21T20:29:34+00:00 |
| cisco-sa-esasma-info-dsc-Q9tLuOvM | Cisco Email Security Appliance and Cisco Secure Email and Web Manager Information Disclosure Vulnerability | 2022-06-15T16:00:00+00:00 | 2022-06-21T20:29:34+00:00 |
| cisco-sa-ece-strd-xss-bqfxo9d2 | Cisco Enterprise Chat and Email Stored Cross-Site Scripting Vulnerability | 2022-05-18T16:00:00+00:00 | 2022-06-21T16:11:25+00:00 |
| cisco-sa-ece-strd-xss-BqFXO9D2 | Cisco Enterprise Chat and Email Stored Cross-Site Scripting Vulnerability | 2022-05-18T16:00:00+00:00 | 2022-06-21T16:11:25+00:00 |
| cisco-sa-sb-rv-overflow-s2r82p9v | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Remote Command Execution and Denial of Service Vulnerability | 2022-06-15T16:00:00+00:00 | 2022-06-15T16:00:00+00:00 |
| cisco-sa-sb-rv-overflow-s2r82P9v | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Remote Command Execution and Denial of Service Vulnerability | 2022-06-15T16:00:00+00:00 | 2022-06-15T16:00:00+00:00 |
| cisco-sa-ise-info-disclosure-os6fsd6n | Cisco Identity Services Engine Sensitive Information Disclosure Vulnerability | 2022-06-15T16:00:00+00:00 | 2022-06-15T16:00:00+00:00 |
| cisco-sa-ise-info-disclosure-Os6fSd6N | Cisco Identity Services Engine Sensitive Information Disclosure Vulnerability | 2022-06-15T16:00:00+00:00 | 2022-06-15T16:00:00+00:00 |
| cisco-sa-cp6901-dup-cert-82jdjge4 | Cisco IP Phone Duplicate Key Vulnerability | 2022-06-15T16:00:00+00:00 | 2022-06-15T16:00:00+00:00 |
| cisco-sa-cp6901-dup-cert-82jdJGe4 | Cisco IP Phone Duplicate Key Vulnerability | 2022-06-15T16:00:00+00:00 | 2022-06-15T16:00:00+00:00 |
| cisco-sa-appd-contrl-athzn-bp-blypgsbu | Cisco AppDynamics Controller Authorization Bypass Vulnerability | 2022-06-15T16:00:00+00:00 | 2022-06-15T16:00:00+00:00 |
| cisco-sa-appd-contrl-athzn-bp-BLypgsbu | Cisco AppDynamics Controller Authorization Bypass Vulnerability | 2022-06-15T16:00:00+00:00 | 2022-06-15T16:00:00+00:00 |
| cisco-sa-capic-chvul-ckfgybh8 | Cisco Application Policy Infrastructure Controller App Privilege Escalation Vulnerability | 2021-08-25T16:00:00+00:00 | 2022-06-07T17:29:33+00:00 |
| cisco-sa-capic-chvul-CKfGYBh8 | Cisco Application Policy Infrastructure Controller App Privilege Escalation Vulnerability | 2021-08-25T16:00:00+00:00 | 2022-06-07T17:29:33+00:00 |
| cisco-sa-asaftd-ipsec-mitm-cknlr4 | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software IPsec IKEv2 VPN Information Disclosure Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-06-01T17:03:06+00:00 |
| cisco-sa-asaftd-ipsec-mitm-CKnLr4 | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software IPsec IKEv2 VPN Information Disclosure Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-06-01T17:03:06+00:00 |
| cisco-sa-asaftd-mgmt-privesc-bmfmuvye | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Interface Privilege Escalation Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-06-01T16:39:47+00:00 |
| cisco-sa-asaftd-mgmt-privesc-BMFMUvye | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Interface Privilege Escalation Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-06-01T16:39:47+00:00 |
| cisco-sa-asa-ssl-vpn-heap-zlx3fdx | Cisco Adaptive Security Appliance Software Clientless SSL VPN Heap Overflow Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-06-01T16:25:45+00:00 |
| cisco-sa-asa-ssl-vpn-heap-zLX3FdX | Cisco Adaptive Security Appliance Software Clientless SSL VPN Heap Overflow Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-06-01T16:25:45+00:00 |
| cisco-sa-ucs-xss-uqsme3l7 | Cisco UCS Director JavaScript Cross-Site Scripting Vulnerability | 2022-05-18T16:00:00+00:00 | 2022-05-18T16:00:00+00:00 |
| cisco-sa-UCS-XSS-uQSME3L7 | Cisco UCS Director JavaScript Cross-Site Scripting Vulnerability | 2022-05-18T16:00:00+00:00 | 2022-05-18T16:00:00+00:00 |
| cisco-sa-snort-app-bypass-csbycatq | Multiple Cisco Products Snort Application Detection Engine Policy Bypass Vulnerability | 2021-01-13T16:00:00+00:00 | 2022-05-16T18:45:16+00:00 |
| cisco-sa-snort-app-bypass-cSBYCATq | Multiple Cisco Products Snort Application Detection Engine Policy Bypass Vulnerability | 2021-01-13T16:00:00+00:00 | 2022-05-16T18:45:16+00:00 |
| cisco-sa-ewlc-priv-esc-ybvhko5 | Cisco IOS XE Software for Cisco Catalyst 9000 Family Switches and Catalyst 9000 Family Wireless Controllers Privilege Escalation Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-05-12T19:35:11+00:00 |
| cisco-sa-ewlc-priv-esc-ybvHKO5 | Cisco IOS XE Software for Cisco Catalyst 9000 Family Switches and Catalyst 9000 Family Wireless Controllers Privilege Escalation Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-05-12T19:35:11+00:00 |
| cisco-sa-iox-yuxq6hfj | Cisco IOx Application Hosting Environment Vulnerabilities | 2022-04-13T16:00:00+00:00 | 2022-05-12T15:50:29+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-53040 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:06:07.000Z |
| msrc_cve-2025-53044 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:06:00.000Z |
| msrc_cve-2025-53042 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:05:53.000Z |
| msrc_cve-2025-55315 | ASP.NET Security Feature Bypass Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-22T07:00:00.000Z |
| msrc_cve-2024-57888 | workqueue: Do not warn when cancelling WQ_MEM_RECLAIM work from !WQ_MEM_RECLAIM worker | 2025-01-02T00:00:00.000Z | 2025-10-22T01:02:36.000Z |
| msrc_cve-2022-49533 | ath11k: Change max no of active probe SSID and BSSID to fw capability | 2025-02-02T00:00:00.000Z | 2025-10-22T01:02:31.000Z |
| msrc_cve-2022-49528 | media: i2c: dw9714: Disable the regulator when the driver fails to probe | 2025-02-02T00:00:00.000Z | 2025-10-22T01:02:25.000Z |
| msrc_cve-2022-49504 | scsi: lpfc: Inhibit aborts if external loopback plug is inserted | 2025-02-02T00:00:00.000Z | 2025-10-22T01:02:20.000Z |
| msrc_cve-2022-49420 | net: annotate races around sk->sk_bound_dev_if | 2025-02-02T00:00:00.000Z | 2025-10-22T01:02:14.000Z |
| msrc_cve-2022-49333 | net/mlx5: E-Switch, pair only capable devices | 2025-02-02T00:00:00.000Z | 2025-10-22T01:02:09.000Z |
| msrc_cve-2022-49306 | usb: dwc3: host: Stop setting the ACPI companion | 2025-02-02T00:00:00.000Z | 2025-10-22T01:02:03.000Z |
| msrc_cve-2022-49267 | mmc: core: use sysfs_emit() instead of sprintf() | 2025-02-02T00:00:00.000Z | 2025-10-22T01:01:58.000Z |
| msrc_cve-2024-38564 | bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE | 2024-06-02T07:00:00.000Z | 2025-10-22T01:01:47.000Z |
| msrc_cve-2025-40010 | afs: Fix potential null pointer dereference in afs_put_server | 2025-10-02T00:00:00.000Z | 2025-10-22T01:01:41.000Z |
| msrc_cve-2025-40011 | drm/gma500: Fix null dereference in hdmi teardown | 2025-10-02T00:00:00.000Z | 2025-10-22T01:01:36.000Z |
| msrc_cve-2025-40016 | media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID | 2025-10-02T00:00:00.000Z | 2025-10-22T01:01:25.000Z |
| msrc_cve-2025-40013 | ASoC: qcom: audioreach: fix potential null pointer dereference | 2025-10-02T00:00:00.000Z | 2025-10-22T01:01:20.000Z |
| msrc_cve-2025-25004 | PowerShell Elevation of Privilege Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-21T07:00:00.000Z |
| msrc_cve-2024-57899 | wifi: mac80211: fix mbss changed flags corruption on 32 bit systems | 2025-01-02T00:00:00.000Z | 2025-10-19T01:01:38.000Z |
| msrc_cve-2024-31573 | XMLUnit for Java before 2.10.0, in the default configuration, might allow code execution via an untrusted stylesheet (used for an XSLT transformation), because XSLT extension functions are enabled. | 2025-10-02T00:00:00.000Z | 2025-10-19T01:01:21.000Z |
| msrc_cve-2025-62168 | Squid vulnerable to information disclosure via authentication credential leakage in error handling | 2025-10-02T00:00:00.000Z | 2025-10-19T01:01:13.000Z |
| msrc_cve-2025-21645 | platform/x86/amd/pmc: Only disable IRQ1 wakeup where i8042 actually enabled it | 2025-01-02T00:00:00.000Z | 2025-10-18T01:01:18.000Z |
| msrc_cve-2025-21629 | net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP packets | 2025-01-02T00:00:00.000Z | 2025-10-18T01:01:13.000Z |
| msrc_cve-2025-55320 | Configuration Manager Elevation of Privilege Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-17T07:00:00.000Z |
| msrc_cve-2024-56709 | io_uring: check if iowq is killed before queuing | 2024-12-02T00:00:00.000Z | 2025-10-17T01:01:42.000Z |
| msrc_cve-2024-53687 | riscv: Fix IPIs usage in kfence_protect_page() | 2025-01-02T00:00:00.000Z | 2025-10-17T01:01:36.000Z |
| msrc_cve-2024-49568 | net/smc: check v2_ext_offset/eid_cnt/ism_gid_cnt when receiving proposal msg | 2025-01-02T00:00:00.000Z | 2025-10-17T01:01:27.000Z |
| msrc_cve-2022-49133 | drm/amdkfd: svm range restore work deadlock when process exit | 2025-02-02T00:00:00.000Z | 2025-10-17T01:01:22.000Z |
| msrc_cve-2022-49124 | x86/mce: Work around an erratum on fast string copy instructions | 2025-02-02T00:00:00.000Z | 2025-10-17T01:01:16.000Z |
| msrc_cve-2025-53784 | Microsoft Word Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-10-16T07:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-201012-0193 | OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_… | 2024-07-23T19:37:04.941000Z |
| var-201202-0067 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T19:37:03.202000Z |
| var-201501-0737 | Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and o… | 2024-07-23T19:37:02.120000Z |
| var-201304-0303 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T19:37:02.192000Z |
| var-202105-1475 | An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implement… | 2024-07-23T19:36:31.857000Z |
| var-201912-0544 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T19:36:30.310000Z |
| var-201110-0394 | Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK… | 2024-07-23T19:36:30.407000Z |
| var-201302-0407 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T19:36:29.323000Z |
| var-201108-0148 | Integer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and… | 2024-07-23T19:36:29.417000Z |
| var-201409-0340 | Mozilla Network Security Services (NSS) before 3.16.2.1, 3.16.x before 3.16.5, and 3.17.x… | 2024-07-23T19:35:54.719000Z |
| var-201203-0197 | Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers … | 2024-07-23T19:35:54.356000Z |
| var-201203-0177 | Google Chrome before 17.0.963.83 allows remote attackers to bypass the Same Origin Policy… | 2024-07-23T19:35:51.042000Z |
| var-201912-0817 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T19:35:49.914000Z |
| var-202202-0906 | valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes. -----BE… | 2024-07-23T19:35:48.751000Z |
| var-200910-0505 | Use-after-free vulnerability in the abstract file-descriptor handling interface in the cu… | 2024-07-23T19:35:48.498000Z |
| var-200703-0022 | Unspecified vulnerability in diskimages-helper in Apple Mac OS X 10.3.9 and 10.4 through … | 2024-07-23T19:35:18.285000Z |
| var-201806-1481 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T19:35:17.800000Z |
| var-201702-0198 | An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari be… | 2024-07-23T19:35:17.871000Z |
| var-201006-1232 | Multiple integer overflows in the Fax3SetupState function in tif_fax3.c in the FAX3 decod… | 2024-07-23T19:34:47.203000Z |
| var-202004-1975 | An input validation issue was addressed with improved input validation. This issue is fix… | 2024-07-23T19:34:36.390000Z |
| var-201504-0477 | SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names… | 2024-07-23T19:34:35.661000Z |
| var-201108-0132 | The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x thr… | 2024-07-23T19:34:35.377000Z |
| var-200807-0283 | Integer signedness error in Safari on Apple iPhone before 2.0 and iPod touch before 2.0 a… | 2024-07-23T19:34:35.217000Z |
| var-201008-0241 | Untrusted search path vulnerability in the Microsoft Foundation Class (MFC) Library in Mi… | 2024-07-23T19:34:29.934000Z |
| var-201006-1161 | Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 throug… | 2024-07-23T19:33:59.738000Z |
| var-202004-1994 | A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.4 a… | 2024-07-23T19:33:28.926000Z |
| var-201302-0131 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T19:33:28.531000Z |
| var-201201-0314 | The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x befor… | 2024-07-23T19:33:28.448000Z |
| var-201804-1177 | An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari be… | 2024-07-23T19:33:26.582000Z |
| var-200901-0700 | WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod to… | 2024-07-23T19:33:26.066000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2018-000908 | WebProxy vulnerable to directory traversal | 2018-03-13T16:48+09:00 | 2018-06-14T13:51+09:00 |
| jvndb-2018-000017 | Multiple vulnerabilities in WXR-1900DHP2 | 2018-02-26T14:10+09:00 | 2018-06-14T13:49+09:00 |
| jvndb-2018-000008 | Spring Security and Spring Framework vulnerable to authentication bypass | 2018-02-02T12:28+09:00 | 2018-06-14T13:48+09:00 |
| jvndb-2018-000020 | Installer of JTrim may insecurely load Dynamic Link Libraries | 2018-03-05T14:07+09:00 | 2018-06-14T13:46+09:00 |
| jvndb-2018-000025 | The installer of PhishWall Client Firefox and Chrome edition for Windows may insecurely load Dynamic Link Libraries | 2018-03-15T13:38+09:00 | 2018-06-14T13:43+09:00 |
| jvndb-2018-000021 | Installer of WinShot may insecurely load Dynamic Link Libraries | 2018-03-05T15:10+09:00 | 2018-06-14T13:43+09:00 |
| jvndb-2018-000902 | QQQ SYSTEMS vulnerable to cross-site scripting | 2018-03-13T16:43+09:00 | 2018-06-14T13:39+09:00 |
| jvndb-2018-000901 | QQQ SYSTEMS vulnerable to cross-site scripting | 2018-03-13T16:43+09:00 | 2018-06-14T12:31+09:00 |
| jvndb-2018-000023 | WordPress plugin "WP All Import" vulnerable to cross-site scripting | 2018-03-08T14:10+09:00 | 2018-06-14T12:27+09:00 |
| jvndb-2018-000022 | WordPress plugin "WP All Import" vulnerable to cross-site scripting | 2018-03-08T14:10+09:00 | 2018-06-14T12:26+09:00 |
| jvndb-2018-000016 | LINE for iOS fails to verify SSL server certificates | 2018-02-22T15:29+09:00 | 2018-06-14T12:23+09:00 |
| jvndb-2018-000062 | Local File Inclusion vulnerability in Zenphoto | 2018-06-13T15:11+09:00 | 2018-06-13T15:11+09:00 |
| jvndb-2018-000063 | LINE for Windows may insecurely load Dynamic Link Libraries | 2018-06-12T14:44+09:00 | 2018-06-12T14:44+09:00 |
| jvndb-2018-000061 | H2O vulnerable to buffer overflow | 2018-06-04T14:10+09:00 | 2018-06-04T14:10+09:00 |
| jvndb-2018-000060 | Multiple vulnerabilities in Pixelpost | 2018-05-31T14:07+09:00 | 2018-05-31T14:07+09:00 |
| jvndb-2018-000033 | The installer of PhishWall Client Internet Explorer edition may insecurely load Dynamic Link Libraries | 2018-04-12T14:27+09:00 | 2018-04-12T14:27+09:00 |
| jvndb-2018-000015 | Multiple vulnerabilities in FS010W | 2018-02-22T15:29+09:00 | 2018-04-11T12:31+09:00 |
| jvndb-2018-000014 | Application and self-extracting archive containing the application of "FLET'S v4 / v6 address selection tool" may insecurely load Dynamic Link Libraries | 2018-02-13T15:43+09:00 | 2018-04-11T12:28+09:00 |
| jvndb-2018-000012 | Installer of "FLET'S Azukeru Backup Tool" may insecurely load Dynamic Link Libraries | 2018-02-13T15:37+09:00 | 2018-04-11T12:25+09:00 |
| jvndb-2018-000013 | Insecure DLL Loading issue in multiple Trend Micro products | 2018-02-15T16:39+09:00 | 2018-04-11T12:23+09:00 |
| jvndb-2018-000009 | The installer of Anshin net security for Windows may insecurely load Dynamic Link Libraries | 2018-02-06T15:05+09:00 | 2018-04-11T12:13+09:00 |
| jvndb-2018-000011 | MP Form Mail CGI eCommerce Edition vulnerable to OS command injection | 2018-02-08T12:21+09:00 | 2018-04-11T11:57+09:00 |
| jvndb-2018-000010 | WordPress plugin "MTS Simple Booking C" vulnerable to cross-site scripting | 2018-02-02T13:39+09:00 | 2018-04-11T11:53+09:00 |
| jvndb-2018-000005 | WordPress plugin "WP Retina 2x" vulnerable to cross-site scripting | 2018-01-30T12:30+09:00 | 2018-04-11T11:53+09:00 |
| jvndb-2018-000007 | Multiple I-O DATA network devices incorporating "MagicalFinder" vulnerable to OS command injection | 2018-02-06T14:22+09:00 | 2018-04-11T11:51+09:00 |
| jvndb-2018-000006 | Multiple vulnerabilities in epg search result viewer(kkcald) | 2018-02-01T13:58+09:00 | 2018-04-11T11:49+09:00 |
| jvndb-2018-000002 | Nootka App for Android vulnerable to OS command injection | 2018-01-19T14:19+09:00 | 2018-04-11T11:46+09:00 |
| jvndb-2018-000004 | The installer of "FLET'S VIRUS CLEAR Easy Setup & Application Tool" and "FLET'S VIRUS CLEAR v6 Easy Setup & Application Tool" may insecurely load Dynamic Link Libraries | 2018-01-22T14:17+09:00 | 2018-04-11T11:44+09:00 |
| jvndb-2018-000003 | GroupSession vulnerable to open redirect | 2018-01-19T14:19+09:00 | 2018-04-11T11:37+09:00 |
| jvndb-2015-000197 | Zend Framework vulnerable to SQL injection | 2015-12-11T13:46+09:00 | 2018-04-11T11:32+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:20586-1 | Security update for the Linux Kernel | 2025-08-25T13:33:57Z | 2025-08-25T13:33:57Z |
| suse-su-2025:20602-1 | Security update for the Linux Kernel | 2025-08-25T13:32:36Z | 2025-08-25T13:32:36Z |
| suse-su-2025:20577-1 | Security update for the Linux Kernel | 2025-08-25T13:29:45Z | 2025-08-25T13:29:45Z |
| suse-su-2025:20626-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_11 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:20625-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:20624-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_8 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:20623-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_7 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:20622-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_6 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:20621-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:20620-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:20585-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_11 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:20584-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:20583-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_8 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:20582-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_7 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:20581-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_6 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:20580-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:20579-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:20578-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_3 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:02977-1 | Security update for kubernetes1.18 | 2025-08-25T12:18:12Z | 2025-08-25T12:18:12Z |
| suse-su-2025:20617-1 | Security update for kernel-livepatch-MICRO-6-0_Update_10 | 2025-08-25T12:16:44Z | 2025-08-25T12:16:44Z |
| suse-su-2025:20616-1 | Security update for kernel-livepatch-MICRO-6-0_Update_9 | 2025-08-25T12:16:44Z | 2025-08-25T12:16:44Z |
| suse-su-2025:20615-1 | Security update for kernel-livepatch-MICRO-6-0_Update_8 | 2025-08-25T12:16:44Z | 2025-08-25T12:16:44Z |
| suse-su-2025:20614-1 | Security update for kernel-livepatch-MICRO-6-0_Update_7 | 2025-08-25T12:16:44Z | 2025-08-25T12:16:44Z |
| suse-su-2025:20613-1 | Security update for kernel-livepatch-MICRO-6-0_Update_6 | 2025-08-25T12:16:44Z | 2025-08-25T12:16:44Z |
| suse-su-2025:20612-1 | Security update for kernel-livepatch-MICRO-6-0_Update_5 | 2025-08-25T12:16:44Z | 2025-08-25T12:16:44Z |
| suse-su-2025:20574-1 | Security update for kernel-livepatch-MICRO-6-0_Update_9 | 2025-08-25T12:16:44Z | 2025-08-25T12:16:44Z |
| suse-su-2025:20573-1 | Security update for kernel-livepatch-MICRO-6-0_Update_7 | 2025-08-25T12:16:44Z | 2025-08-25T12:16:44Z |
| suse-su-2025:20572-1 | Security update for kernel-livepatch-MICRO-6-0_Update_5 | 2025-08-25T12:16:44Z | 2025-08-25T12:16:44Z |
| suse-su-2025:20571-1 | Security update for kernel-livepatch-MICRO-6-0_Update_10 | 2025-08-25T12:16:44Z | 2025-08-25T12:16:44Z |
| suse-su-2025:20570-1 | Security update for kernel-livepatch-MICRO-6-0_Update_8 | 2025-08-25T12:16:44Z | 2025-08-25T12:16:44Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:14676-1 | ruby3.4-rubygem-activerecord-8.0-8.0.1-1.1 on GA media | 2025-01-21T00:00:00Z | 2025-01-21T00:00:00Z |
| opensuse-su-2025:14675-1 | ruby3.4-rubygem-activemodel-8.0-8.0.1-1.1 on GA media | 2025-01-21T00:00:00Z | 2025-01-21T00:00:00Z |
| opensuse-su-2025:14674-1 | ruby3.4-rubygem-activejob-8.0-8.0.1-1.1 on GA media | 2025-01-21T00:00:00Z | 2025-01-21T00:00:00Z |
| opensuse-su-2025:14673-1 | ruby3.4-rubygem-actionview-8.0-8.0.1-1.1 on GA media | 2025-01-21T00:00:00Z | 2025-01-21T00:00:00Z |
| opensuse-su-2025:14672-1 | ruby3.4-rubygem-actiontext-8.0-8.0.1-1.1 on GA media | 2025-01-21T00:00:00Z | 2025-01-21T00:00:00Z |
| opensuse-su-2025:14671-1 | ruby3.4-rubygem-actionpack-8.0-8.0.1-1.1 on GA media | 2025-01-21T00:00:00Z | 2025-01-21T00:00:00Z |
| opensuse-su-2025:14670-1 | ruby3.4-rubygem-actionmailer-8.0-8.0.1-1.1 on GA media | 2025-01-21T00:00:00Z | 2025-01-21T00:00:00Z |
| opensuse-su-2025:14669-1 | ruby3.4-rubygem-actionmailbox-8.0-8.0.1-1.1 on GA media | 2025-01-21T00:00:00Z | 2025-01-21T00:00:00Z |
| opensuse-su-2025:14668-1 | ruby3.4-rubygem-actioncable-8.0-8.0.1-1.1 on GA media | 2025-01-21T00:00:00Z | 2025-01-21T00:00:00Z |
| opensuse-su-2025:14667-1 | nvidia-modprobe-565.77-1.1 on GA media | 2025-01-21T00:00:00Z | 2025-01-21T00:00:00Z |
| opensuse-su-2025:14666-1 | helmfile-0.170.0-1.1 on GA media | 2025-01-21T00:00:00Z | 2025-01-21T00:00:00Z |
| opensuse-su-2025:0018-1 | Security update for chromium | 2025-01-20T09:59:01Z | 2025-01-20T09:59:01Z |
| opensuse-su-2025:14665-1 | rsync-3.4.1-1.1 on GA media | 2025-01-18T00:00:00Z | 2025-01-18T00:00:00Z |
| opensuse-su-2025:14664-1 | python311-httpx-0.28.1-2.1 on GA media | 2025-01-18T00:00:00Z | 2025-01-18T00:00:00Z |
| opensuse-su-2025:14663-1 | velociraptor-0.7.0.4.git142.862ef23-1.1 on GA media | 2025-01-17T00:00:00Z | 2025-01-17T00:00:00Z |
| opensuse-su-2025:14662-1 | python311-Django-5.1.5-1.1 on GA media | 2025-01-17T00:00:00Z | 2025-01-17T00:00:00Z |
| opensuse-su-2025:14661-1 | nvidia-open-driver-G06-signed-default-devel-550.144.03-1.1 on GA media | 2025-01-17T00:00:00Z | 2025-01-17T00:00:00Z |
| opensuse-su-2025:14660-1 | golang-github-prometheus-prometheus-3.1.0-1.1 on GA media | 2025-01-17T00:00:00Z | 2025-01-17T00:00:00Z |
| opensuse-su-2025:14659-1 | chromedriver-132.0.6834.83-1.1 on GA media | 2025-01-17T00:00:00Z | 2025-01-17T00:00:00Z |
| opensuse-su-2025:14658-1 | amazon-ssm-agent-3.3.1611.0-1.1 on GA media | 2025-01-17T00:00:00Z | 2025-01-17T00:00:00Z |
| opensuse-su-2025:14657-1 | perl-IO-Compress-2.213.0-1.1 on GA media | 2025-01-16T00:00:00Z | 2025-01-16T00:00:00Z |
| opensuse-su-2025:14656-1 | perl-Compress-Raw-Zlib-2.213-1.1 on GA media | 2025-01-16T00:00:00Z | 2025-01-16T00:00:00Z |
| opensuse-su-2025:14655-1 | hplip-3.24.4-4.1 on GA media | 2025-01-16T00:00:00Z | 2025-01-16T00:00:00Z |
| opensuse-su-2025:14654-1 | grafana-11.3.0-5.1 on GA media | 2025-01-16T00:00:00Z | 2025-01-16T00:00:00Z |
| opensuse-su-2025:14653-1 | govulncheck-vulndb-0.0.20250115T172141-1.1 on GA media | 2025-01-16T00:00:00Z | 2025-01-16T00:00:00Z |
| opensuse-su-2025:14652-1 | git-2.48.1-1.1 on GA media | 2025-01-16T00:00:00Z | 2025-01-16T00:00:00Z |
| opensuse-su-2025:0012-1 | Security update for opera | 2025-01-15T12:36:20Z | 2025-01-15T12:36:20Z |
| opensuse-su-2025:14651-1 | python311-Django4-4.2.18-1.1 on GA media | 2025-01-15T00:00:00Z | 2025-01-15T00:00:00Z |
| opensuse-su-2025:14650-1 | pam_u2f-1.3.1-1.1 on GA media | 2025-01-15T00:00:00Z | 2025-01-15T00:00:00Z |
| opensuse-su-2025:14649-1 | git-lfs-3.6.1-1.1 on GA media | 2025-01-15T00:00:00Z | 2025-01-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-28711 | WordPress Easy Email Subscription plugin跨站请求伪造漏洞 | 2025-11-11 | 2025-11-17 |
| cnvd-2025-28710 | WordPress Easy Email Subscription plugin SQL注入漏洞 | 2025-11-11 | 2025-11-17 |
| cnvd-2025-28709 | WordPress Easy Digital Downloads plugin订单操作漏洞 | 2025-11-11 | 2025-11-17 |
| cnvd-2025-28708 | WordPress Easy Appointments plugin跨站脚本漏洞 | 2025-11-11 | 2025-11-17 |
| cnvd-2025-28707 | WordPress Doliconnect plugin跨站脚本漏洞 | 2025-11-11 | 2025-11-17 |
| cnvd-2025-28706 | WordPress Dessau plugin文件包含漏洞 | 2025-11-11 | 2025-11-17 |
| cnvd-2025-28705 | WordPress Cost Calculator Builder plugin缺少授权漏洞 | 2025-11-11 | 2025-11-17 |
| cnvd-2025-28704 | WordPress Contest Gallery plugin跨站请求伪造漏洞 | 2025-11-11 | 2025-11-17 |
| cnvd-2025-28703 | WordPress Case Addons plugin文件上传漏洞 | 2025-11-11 | 2025-11-17 |
| cnvd-2025-28702 | WordPress age-restriction plugin缺少授权漏洞 | 2025-11-14 | 2025-11-17 |
| cnvd-2025-28701 | Tenda AC10U form_fast_setting_wifi_set函数栈缓冲区溢出漏洞 | 2023-09-28 | 2025-11-17 |
| cnvd-2025-28700 | Tenda AC10U formSetClientState函数栈缓冲区溢出漏洞 | 2023-09-28 | 2025-11-17 |
| cnvd-2025-28699 | Tenda AC10U formWifiBasicSet函数堆栈缓冲区溢出漏洞 | 2023-09-28 | 2025-11-17 |
| cnvd-2025-28698 | Tenda AC10U add_white_node函数堆栈缓冲区溢出漏洞 | 2023-09-28 | 2025-11-17 |
| cnvd-2025-28697 | Tenda AC10U GetParentControlInfo函数栈缓冲区溢出漏洞 | 2023-09-28 | 2025-11-17 |
| cnvd-2025-28696 | Tenda AC10U addWifiMacFilter函数堆栈缓冲区溢出漏洞 | 2023-09-28 | 2025-11-17 |
| cnvd-2025-28695 | Tenda AC10U setSchedWifi函数堆栈缓冲区溢出漏洞 | 2023-09-28 | 2025-11-17 |
| cnvd-2025-28694 | Tenda AC10U fromSetIpMacBind函数堆栈缓冲区溢出漏洞 | 2023-09-28 | 2025-11-17 |
| cnvd-2025-28693 | Tenda AC10U formSetMacFilterCfg函数堆栈缓冲区溢出漏洞 | 2023-09-28 | 2025-11-17 |
| cnvd-2025-28691 | Tenda AC10U fromWizardHandle方法堆栈缓冲区溢出漏洞 | 2024-04-22 | 2025-11-17 |
| cnvd-2025-28690 | Ivanti Endpoint Manager SQL注入漏洞(CNVD-2025-28690) | 2024-11-15 | 2025-11-17 |
| cnvd-2025-28689 | Ivanti Endpoint Manager SQL注入漏洞(CNVD-2025-28689) | 2024-11-15 | 2025-11-17 |
| cnvd-2025-28688 | Ivanti Endpoint Manager SQL注入漏洞(CNVD-2025-28688) | 2024-11-15 | 2025-11-17 |
| cnvd-2025-28687 | Ivanti Endpoint Manager路径遍历漏洞(CNVD-2025-28687) | 2024-11-15 | 2025-11-17 |
| cnvd-2025-28686 | Ivanti Endpoint Manager路径遍历漏洞(CNVD-2025-28686) | 2024-11-15 | 2025-11-17 |
| cnvd-2025-28685 | Ivanti Endpoint Manager SQL注入漏洞(CNVD-2025-28685) | 2024-11-15 | 2025-11-17 |
| cnvd-2025-28684 | Ivanti Endpoint Manager路径遍历漏洞 | 2025-10-17 | 2025-11-17 |
| cnvd-2025-28683 | Ivanti Endpoint Manager反序列化漏洞 | 2025-10-17 | 2025-11-17 |
| cnvd-2025-28682 | Ivanti Endpoint Manager SQL注入漏洞 | 2025-10-17 | 2025-11-17 |
| cnvd-2025-28680 | Ivanti Endpoint Manager权限问题漏洞 | 2025-11-14 | 2025-11-17 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0487 | Multiples vulnérabilités dans les produits SAP | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| CERTFR-2025-AVI-0501 | Multiples vulnérabilités dans les produits Microsoft | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| CERTFR-2025-AVI-0500 | Vulnérabilité dans Microsoft .Net | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| CERTFR-2025-AVI-0499 | Multiples vulnérabilités dans Microsoft Windows | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| CERTFR-2025-AVI-0498 | Multiples vulnérabilités dans Microsoft Office | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| CERTFR-2025-AVI-0497 | Vulnérabilité dans les processeurs Intel | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| CERTFR-2025-AVI-0496 | Multiples vulnérabilités dans les produits Fortinet | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| CERTFR-2025-AVI-0495 | Multiples vulnérabilités dans les produits Adobe | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| CERTFR-2025-AVI-0494 | Vulnérabilité dans Elastic Kibana | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| CERTFR-2025-AVI-0493 | Multiples vulnérabilités dans les produits Centreon | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| CERTFR-2025-AVI-0492 | Multiples vulnérabilités dans les produits Siemens | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| CERTFR-2025-AVI-0491 | Multiples vulnérabilités dans les produits Mozilla | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| CERTFR-2025-AVI-0490 | Multiples vulnérabilités dans Ivanti Workspace Control (IWC) | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| CERTFR-2025-AVI-0489 | Multiples vulnérabilités dans Google Chrome | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| CERTFR-2025-AVI-0488 | Vulnérabilité dans Stormshield Network Security | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| CERTFR-2025-AVI-0487 | Multiples vulnérabilités dans les produits SAP | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| certfr-2025-avi-0486 | Multiples vulnérabilités dans les produits Qnap | 2025-06-10T00:00:00.000000 | 2025-06-10T00:00:00.000000 |
| certfr-2025-avi-0485 | Multiples vulnérabilités dans les produits Schneider Electric | 2025-06-10T00:00:00.000000 | 2025-06-10T00:00:00.000000 |
| certfr-2025-avi-0484 | Vulnérabilité dans les produits HPE Aruba Networking | 2025-06-10T00:00:00.000000 | 2025-06-10T00:00:00.000000 |
| certfr-2025-avi-0483 | Vulnérabilité dans Mozilla VPN | 2025-06-10T00:00:00.000000 | 2025-06-10T00:00:00.000000 |
| CERTFR-2025-AVI-0486 | Multiples vulnérabilités dans les produits Qnap | 2025-06-10T00:00:00.000000 | 2025-06-10T00:00:00.000000 |
| CERTFR-2025-AVI-0485 | Multiples vulnérabilités dans les produits Schneider Electric | 2025-06-10T00:00:00.000000 | 2025-06-10T00:00:00.000000 |
| CERTFR-2025-AVI-0484 | Vulnérabilité dans les produits HPE Aruba Networking | 2025-06-10T00:00:00.000000 | 2025-06-10T00:00:00.000000 |
| CERTFR-2025-AVI-0483 | Vulnérabilité dans Mozilla VPN | 2025-06-10T00:00:00.000000 | 2025-06-10T00:00:00.000000 |
| certfr-2025-avi-0482 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-06-06T00:00:00.000000 | 2025-06-06T00:00:00.000000 |
| certfr-2025-avi-0481 | Multiples vulnérabilités dans les produits IBM | 2025-06-06T00:00:00.000000 | 2025-06-06T00:00:00.000000 |
| certfr-2025-avi-0480 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-06-06T00:00:00.000000 | 2025-06-06T00:00:00.000000 |
| CERTFR-2025-AVI-0482 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-06-06T00:00:00.000000 | 2025-06-06T00:00:00.000000 |
| CERTFR-2025-AVI-0481 | Multiples vulnérabilités dans les produits IBM | 2025-06-06T00:00:00.000000 | 2025-06-06T00:00:00.000000 |
| CERTFR-2025-AVI-0480 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-06-06T00:00:00.000000 | 2025-06-06T00:00:00.000000 |