Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-15236 |
5.3 (4.0)
4.3 (3.1)
|
Quanta Computer|QOCA aim AI Medical Cloud Platform - P… |
Quanta Computer |
QOCA aim AI Medical Cloud Platform |
2026-01-05T07:38:01.733Z | 2026-01-05T21:10:06.305Z |
| CVE-2025-67316 |
5.4 (3.1)
|
An issue in realme Internet browser v.45.13.4.1 a… |
n/a |
n/a |
2026-01-05T00:00:00.000Z | 2026-01-05T21:09:23.605Z |
| CVE-2026-0580 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
SourceCodester API Key Manager App Import Key cross si… |
SourceCodester |
API Key Manager App |
2026-01-05T07:32:06.021Z | 2026-01-05T21:09:22.283Z |
| CVE-2025-15235 |
7.1 (4.0)
6.5 (3.1)
|
Quanta Computer|QOCA aim AI Medical Cloud Platform - M… |
Quanta Computer |
QOCA aim AI Medical Cloud Platform |
2026-01-05T07:25:33.577Z | 2026-01-05T21:08:27.800Z |
| CVE-2025-65328 |
6.5 (3.1)
|
Mega-Fence (webgate-lib.*) 25.1.914 and prior tru… |
n/a |
n/a |
2026-01-05T00:00:00.000Z | 2026-01-05T21:08:06.488Z |
| CVE-2025-15456 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
bg5sbk MiniCMS Publish page-edit.php improper authentication |
bg5sbk |
MiniCMS |
2026-01-05T04:02:06.770Z | 2026-01-05T21:07:35.228Z |
| CVE-2025-15415 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
xnx3 wangmarket XML File uploadImage.do uploadImage un… |
xnx3 |
wangmarket |
2026-01-01T22:02:06.925Z | 2026-01-05T21:06:57.108Z |
| CVE-2025-15414 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
go-sonic Theme Fetching API git_fetcher.go FetchTheme … |
go-sonic |
sonic |
2026-01-01T21:32:08.255Z | 2026-01-05T21:06:22.726Z |
| CVE-2025-15413 |
4.8 (4.0)
5.3 (3.1)
5.3 (3.0)
|
wasm3 m3_exec.h op_CallIndirect memory corruption |
n/a |
wasm3 |
2026-01-01T21:02:06.923Z | 2026-01-05T21:05:41.110Z |
| CVE-2025-15412 |
4.8 (4.0)
5.3 (3.1)
5.3 (3.0)
|
WebAssembly wabt wasm-decompile VarName out-of-bounds |
WebAssembly |
wabt |
2026-01-01T20:32:06.684Z | 2026-01-05T21:05:04.866Z |
| CVE-2025-15411 |
4.8 (4.0)
5.3 (3.1)
5.3 (3.0)
|
WebAssembly wabt wasm-decompile InsertNode memory corruption |
WebAssembly |
wabt |
2026-01-01T19:32:07.421Z | 2026-01-05T21:04:04.609Z |
| CVE-2026-21633 |
8.8 (3.1)
|
A malicious actor with access to the adjacent net… |
Ubiquiti Inc |
UniFi Protect Application |
2026-01-05T16:47:38.510Z | 2026-01-05T21:03:40.183Z |
| CVE-2025-15410 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Online Guitar Store login.php sql injection |
code-projects |
Online Guitar Store |
2026-01-01T19:02:05.780Z | 2026-01-05T21:02:46.781Z |
| CVE-2025-36932 |
7.8 (3.1)
|
In tracepoint_msg_handler of cpm/google/lib/trace… |
Google |
Android |
2025-12-11T19:35:46.587Z | 2026-01-05T21:02:08.295Z |
| CVE-2025-55065 |
7.5 (3.1)
|
CWE-89 Improper Neutralization of Special Element… |
Kopek Reem |
ReKord client |
2026-01-01T18:30:45.844Z | 2026-01-05T21:02:02.100Z |
| CVE-2025-15408 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Online Guitar Store Create_product.php s… |
code-projects |
Online Guitar Store |
2026-01-01T18:02:06.173Z | 2026-01-05T21:01:24.844Z |
| CVE-2025-36935 |
7.8 (3.1)
|
In trusty_ffa_mem_reclaim of shared-mem-smcall.c,… |
Google |
Android |
2025-12-11T19:35:48.525Z | 2026-01-05T21:01:03.480Z |
| CVE-2025-66398 |
9.7 (3.1)
|
Signal K Server has Unauthenticated State Pollution le… |
SignalK |
signalk-server |
2026-01-01T18:00:38.575Z | 2026-01-05T21:00:41.972Z |
| CVE-2025-15407 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Online Guitar Store Create_category.php … |
code-projects |
Online Guitar Store |
2026-01-01T17:32:05.867Z | 2026-01-05T20:59:54.759Z |
| CVE-2025-36936 |
7.8 (3.1)
|
In GetTachyonCommand of tachyon_server_common.h, … |
Google |
Android |
2025-12-11T19:35:49.478Z | 2026-01-05T20:59:46.807Z |
| CVE-2025-36937 |
9.8 (3.1)
|
In AudioDecoder::HandleProduceRequest of audio_de… |
Google |
Android |
2025-12-11T19:35:50.458Z | 2026-01-05T20:59:02.653Z |
| CVE-2025-15406 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
PHPGurukul Online Course Registration authorization |
PHPGurukul |
Online Course Registration |
2026-01-01T17:02:07.067Z | 2026-01-05T20:58:41.667Z |
| CVE-2025-59467 |
7.5 (3.1)
|
A Cross-Site Scripting (XSS) vulnerability in the… |
Ubiquiti Inc |
UCRM Argentina AFIP invoices Plugin |
2026-01-05T16:47:38.557Z | 2026-01-05T20:58:05.416Z |
| CVE-2025-67315 |
5.4 (3.1)
|
Cross Site Request Forgery vulnerability in Emplo… |
n/a |
n/a |
2026-01-05T00:00:00.000Z | 2026-01-05T20:56:49.989Z |
| CVE-2025-67158 |
7.5 (3.1)
|
An authentication bypass in the /cgi-bin/jvsweb.c… |
n/a |
n/a |
2026-01-02T00:00:00.000Z | 2026-01-05T20:49:25.386Z |
| CVE-2025-15450 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
sfturing hosp_order orderHos findOrderHosNum sql injection |
sfturing |
hosp_order |
2026-01-05T01:02:07.586Z | 2026-01-05T20:44:41.350Z |
| CVE-2025-15462 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
UTT 进取 520W ConfigAdvideo strcpy buffer overflow |
UTT |
进取 520W |
2026-01-05T07:02:06.023Z | 2026-01-05T20:43:27.301Z |
| CVE-2025-66376 |
7.2 (3.1)
|
Zimbra Collaboration (ZCS) 10 before 10.0.18 and … |
Zimbra |
Collaboration |
2026-01-05T00:00:00.000Z | 2026-01-05T20:42:49.837Z |
| CVE-2026-21634 |
6.5 (3.1)
|
A malicious actor with access to the adjacent net… |
Ubiquiti Inc |
UniFi Protect Application |
2026-01-05T16:47:38.917Z | 2026-01-05T20:42:08.706Z |
| CVE-2026-0583 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Online Product Reservation System User L… |
code-projects |
Online Product Reservation System |
2026-01-05T09:02:06.140Z | 2026-01-05T20:41:05.526Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2019-25296 |
9.8 (3.1)
|
WP Cost Estimation <= 9.642 - Missing Authorization to… |
loopus |
WP Cost Estimation & Payment Forms Builder |
2026-01-08T02:21:17.399Z | 2026-01-08T16:45:20.953Z |
| CVE-2019-25295 |
6.5 (3.1)
|
WP Cost Estimation < 9.660 - Upload Directory Traversal |
loopus |
WP Cost Estimation & Payment Forms Builder |
2026-01-08T01:50:10.508Z | 2026-01-08T16:25:07.777Z |
| CVE-2019-25291 |
9.3 (4.0)
7.5 (3.1)
|
INIM Electronics Smartliving SmartLAN/G/SI <=6.x Hard-… |
INIM Electronics s.r.l. |
Smartliving SmartLAN/G/SI |
2026-01-07T23:10:05.042Z | 2026-01-08T19:24:13.174Z |
| CVE-2019-25290 |
6.9 (4.0)
5.3 (3.1)
|
INIM Electronics Smartliving SmartLAN/G/SI <=6.x Unaut… |
INIM Electronics s.r.l. |
Smartliving SmartLAN/G/SI |
2026-01-07T23:10:04.541Z | 2026-01-08T19:24:33.517Z |
| CVE-2019-25289 |
8.7 (4.0)
8.8 (3.1)
|
INIM Electronics SmartLiving SmartLAN/G/SI <=6.x Remot… |
INIM Electronics s.r.l. |
SmartLiving SmartLAN/G/SI |
2026-01-07T23:10:04.081Z | 2026-01-08T19:24:50.385Z |
| CVE-2019-25282 |
5.1 (4.0)
9.8 (3.1)
|
V-SOL GPON/EPON OLT Platform V2.03.62R_IPv6 v2.03 Open… |
Guangzhou V |
V-SOL GPON/EPON OLT Platform |
2026-01-07T23:10:02.783Z | 2026-01-08T19:25:13.144Z |
| CVE-2019-25279 |
6.8 (4.0)
8.2 (3.1)
|
FaceSentry Access Control System 6.4.8 Cleartext Passw… |
iWT Ltd. |
FaceSentry Access Control System |
2026-01-07T23:10:00.907Z | 2026-01-08T19:25:30.795Z |
| CVE-2019-25278 |
9.1 (4.0)
7.5 (3.1)
|
FaceSentry Access Control System 6.4.8 Authentication … |
iWT Ltd. |
FaceSentry Access Control System |
2026-01-07T23:09:59.751Z | 2026-01-08T19:25:51.049Z |
| CVE-2019-25268 |
8.6 (4.0)
9.8 (3.1)
|
NREL BEopt 2.8.0 Insecure Library Loading Arbitrary Co… |
NREL |
BEopt |
2026-01-07T23:09:58.121Z | 2026-01-08T19:26:09.416Z |
| CVE-2019-25259 |
5.1 (4.0)
5.3 (3.1)
|
Leica Geosystems GR10/GR25/GR30/GR50 GNSS 4.30.063 Cro… |
Leica Geosystems AG |
Leica Geosystems GR10/GR25/GR30/GR50 GNSS |
2026-01-07T23:09:57.621Z | 2026-01-08T19:26:27.630Z |
| CVE-2019-25231 |
8.5 (4.0)
8.4 (3.1)
|
devolo dLAN Cockpit 4.3.1 Unquoted Service Path Privil… |
devolo AG |
devolo dLAN Cockpit |
2026-01-07T23:09:57.200Z | 2026-01-08T19:26:44.290Z |
| CVE-2025-21063 |
4.6 (3.1)
|
Improper access control in Samsung Voice Recorder… |
Samsung Mobile |
Samsung Voice Recorder |
2025-10-10T06:33:21.908Z | 2025-10-10T10:24:41.556Z |
| CVE-2025-11651 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
UTT 进取 518G formRemoteControl sub_4247AC buffer overflow |
UTT |
进取 518G |
2025-10-12T23:32:06.071Z | 2025-10-14T20:08:25.323Z |
| CVE-2025-11652 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
UTT 进取 518G formTaskEdit_ap buffer overflow |
UTT |
进取 518G |
2025-10-13T00:02:05.104Z | 2025-10-14T13:42:48.256Z |
| CVE-2025-60226 |
9.8 (3.1)
|
WordPress White Rabbit theme <= 1.5.2 - PHP Object Inj… |
axiomthemes |
White Rabbit |
2025-10-22T14:32:46.090Z | 2025-11-13T10:33:44.875Z |
| CVE-2025-62902 |
7.5 (3.1)
|
WordPress WP Popup Builder plugin <= 1.3.6 - Sensitive… |
ThemeHunk |
WP Popup Builder |
2025-10-27T01:33:50.531Z | 2025-11-13T10:33:47.599Z |
| CVE-2025-60355 |
9.8 (3.1)
|
zhangyd-c OneBlog before 2.3.9 was vulnerable to … |
n/a |
n/a |
2025-10-28T00:00:00.000Z | 2025-10-29T13:59:43.618Z |
| CVE-2025-61304 |
9.8 (3.1)
|
OS command injection vulnerability in Dynatrace A… |
n/a |
n/a |
2025-11-05T00:00:00.000Z | 2025-11-05T19:26:14.228Z |
| CVE-2025-63248 |
7.5 (3.1)
|
DWSurvey 6.14.0 is vulnerable to Incorrect Access… |
n/a |
n/a |
2025-11-05T00:00:00.000Z | 2025-11-05T20:03:23.117Z |
| CVE-2025-38723 |
N/A
|
LoongArch: BPF: Fix jump offset calculation in tailcall |
Linux |
Linux |
2025-09-04T15:33:16.547Z | 2025-11-03T17:41:51.527Z |
| CVE-2025-38724 |
N/A
|
nfsd: handle get_client_locked() failure in nfsd4_setc… |
Linux |
Linux |
2025-09-04T15:33:22.370Z | 2025-11-03T17:41:53.468Z |
| CVE-2025-38725 |
N/A
|
net: usb: asix_devices: add phy_mask for ax88772 mdio bus |
Linux |
Linux |
2025-09-04T15:33:23.468Z | 2025-11-03T17:41:54.427Z |
| CVE-2025-38727 |
N/A
|
netlink: avoid infinite retry looping in netlink_unicast() |
Linux |
Linux |
2025-09-04T15:33:25.286Z | 2025-11-03T17:41:56.297Z |
| CVE-2025-38728 |
N/A
|
smb3: fix for slab out of bounds on mount to ksmbd |
Linux |
Linux |
2025-09-04T15:33:26.039Z | 2025-11-03T17:41:57.246Z |
| CVE-2025-38729 |
N/A
|
ALSA: usb-audio: Validate UAC3 power domain descriptors, too |
Linux |
Linux |
2025-09-04T15:33:26.896Z | 2025-11-03T17:41:59.112Z |
| CVE-2025-63917 |
7.1 (3.1)
|
PDFPatcher thru 1.1.3.4663 executable's XML bookm… |
n/a |
n/a |
2025-11-17T00:00:00.000Z | 2025-11-17T19:48:24.068Z |
| CVE-2024-30149 |
4.8 (3.1)
|
HCL AppScan Source is affected by an expired TLS/SSL c… |
HCL Software |
AppScan Source |
2024-10-31T08:25:14.693Z | 2024-10-31T13:53:58.166Z |
| CVE-2025-63918 |
6.2 (3.1)
|
PDFPatcher executable does not validate user-supp… |
n/a |
n/a |
2025-11-17T00:00:00.000Z | 2025-11-18T16:25:47.113Z |
| CVE-2025-67712 |
4.7 (3.1)
|
HTML injection issue in ArcGIS Web App Builder |
Esri |
ArcGIS Web AppBuilder {Developer Edition) |
2025-12-19T20:05:42.172Z | 2026-01-08T16:47:34.111Z |
| CVE-2025-58407 |
7.4 (3.1)
|
GPU DDK - TOCTOU bug affecting psFWMemContext->uiPageC… |
Imagination Technologies |
Graphics DDK |
2025-11-17T17:18:18.831Z | 2025-11-17T17:35:06.099Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2019-25296 | The WP Cost Estimation plugin for WordPress is vulnerable to arbitrary file uploads and deletion du… | 2026-01-08T03:15:41.970 | 2026-01-08T18:08:18.457 |
| fkie_cve-2019-25295 | The WP Cost Estimation plugin for WordPress is vulnerable to Upload Directory Traversal in versions… | 2026-01-08T02:15:52.447 | 2026-01-08T18:08:18.457 |
| fkie_cve-2019-25291 | INIM Electronics Smartliving SmartLAN/G/SI <=6.x contains hard-coded credentials in its Linux distr… | 2026-01-08T00:15:59.143 | 2026-01-08T18:08:18.457 |
| fkie_cve-2019-25290 | Smartliving SmartLAN/G/SI <=6.x contains an unauthenticated server-side request forgery vulnerabili… | 2026-01-08T00:15:58.973 | 2026-01-08T18:08:18.457 |
| fkie_cve-2019-25289 | SmartLiving SmartLAN <=6.x contains an authenticated remote command injection vulnerability in the … | 2026-01-08T00:15:58.797 | 2026-01-08T18:08:18.457 |
| fkie_cve-2019-25282 | V-SOL GPON/EPON OLT Platform v2.03 contains an open redirect vulnerability in the script that allow… | 2026-01-08T00:15:58.450 | 2026-01-08T18:08:18.457 |
| fkie_cve-2019-25279 | FaceSentry Access Control System 6.4.8 contains a cleartext password storage vulnerability that all… | 2026-01-08T00:15:58.107 | 2026-01-08T18:08:18.457 |
| fkie_cve-2019-25278 | FaceSentry Access Control System 6.4.8 contains a cleartext transmission vulnerability that allows … | 2026-01-08T00:15:57.937 | 2026-01-08T18:08:18.457 |
| fkie_cve-2019-25268 | NREL BEopt 2.8.0.0 contains a DLL hijacking vulnerability that allows attackers to load arbitrary l… | 2026-01-08T00:15:57.417 | 2026-01-08T18:08:18.457 |
| fkie_cve-2019-25259 | Leica Geosystems GR10/GR25/GR30/GR50 GNSS 4.30.063 contains a cross-site request forgery vulnerabil… | 2026-01-08T00:15:57.247 | 2026-01-08T18:08:18.457 |
| fkie_cve-2019-25231 | devolo dLAN Cockpit 4.3.1 contains an unquoted service path vulnerability in the 'DevoloNetworkServ… | 2026-01-08T00:15:57.063 | 2026-01-08T18:08:18.457 |
| fkie_cve-2025-21063 | Improper access control in Samsung Voice Recorder prior to version 21.5.73.12 in Android 15 and 21.… | 2025-10-10T07:15:42.493 | 2026-01-08T18:01:26.477 |
| fkie_cve-2025-11651 | A vulnerability has been found in UTT 进取 518G up to V3v3.2.7-210919-161313. This vulnerability affe… | 2025-10-13T00:15:33.753 | 2026-01-08T18:00:50.647 |
| fkie_cve-2025-11652 | A vulnerability was found in UTT 进取 518G up to V3v3.2.7-210919-161313. This issue affects some unkn… | 2025-10-13T01:15:47.957 | 2026-01-08T17:59:14.613 |
| fkie_cve-2025-60226 | Deserialization of Untrusted Data vulnerability in axiomthemes White Rabbit whiterabbit allows Obje… | 2025-10-22T15:15:59.757 | 2026-01-08T17:57:59.187 |
| fkie_cve-2025-62902 | Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in ThemeHu… | 2025-10-27T02:15:49.320 | 2026-01-08T17:55:27.030 |
| fkie_cve-2025-60355 | zhangyd-c OneBlog before 2.3.9 was vulnerable to SSTI (Server-Side Template Injection) via FreeMark… | 2025-10-28T18:15:38.983 | 2026-01-08T17:54:55.737 |
| fkie_cve-2025-61304 | OS command injection vulnerability in Dynatrace ActiveGate ping extension up to 1.016 via crafted i… | 2025-11-05T16:15:40.770 | 2026-01-08T17:50:05.627 |
| fkie_cve-2025-63248 | DWSurvey 6.14.0 is vulnerable to Incorrect Access Control. When deleting a questionnaire, replacing… | 2025-11-05T17:15:45.663 | 2026-01-08T17:47:08.723 |
| fkie_cve-2025-38723 | In the Linux kernel, the following vulnerability has been resolved: LoongArch: BPF: Fix jump offse… | 2025-09-04T16:15:42.130 | 2026-01-08T17:42:36.560 |
| fkie_cve-2025-38724 | In the Linux kernel, the following vulnerability has been resolved: nfsd: handle get_client_locked… | 2025-09-04T16:15:42.273 | 2026-01-08T17:39:18.610 |
| fkie_cve-2025-38725 | In the Linux kernel, the following vulnerability has been resolved: net: usb: asix_devices: add ph… | 2025-09-04T16:15:42.420 | 2026-01-08T17:38:10.343 |
| fkie_cve-2025-38727 | In the Linux kernel, the following vulnerability has been resolved: netlink: avoid infinite retry … | 2025-09-04T16:15:42.713 | 2026-01-08T17:34:29.383 |
| fkie_cve-2025-38728 | In the Linux kernel, the following vulnerability has been resolved: smb3: fix for slab out of boun… | 2025-09-04T16:15:42.867 | 2026-01-08T17:31:44.547 |
| fkie_cve-2025-38729 | In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Validate UAC3… | 2025-09-04T16:15:43.013 | 2026-01-08T17:31:17.310 |
| fkie_cve-2025-63917 | PDFPatcher thru 1.1.3.4663 executable's XML bookmark import functionality does not restrict XML ext… | 2025-11-17T17:15:51.207 | 2026-01-08T17:27:25.843 |
| fkie_cve-2024-30149 | HCL AppScan Source <= 10.6.0 does not properly validate a TLS/SSL certificate for an executable. | 2024-10-31T09:15:02.993 | 2026-01-08T17:24:04.957 |
| fkie_cve-2025-63918 | PDFPatcher executable does not validate user-supplied file paths, allowing directory traversal atta… | 2025-11-17T17:15:51.333 | 2026-01-08T17:18:51.550 |
| fkie_cve-2025-67712 | There is an HTML injection issue in Esri ArcGIS Web AppBuilder developer edition versions prior to … | 2025-12-19T20:15:55.450 | 2026-01-08T17:15:49.637 |
| fkie_cve-2025-58407 | Kernel or driver software installed on a Guest VM may post improper commands to the GPU Firmware to… | 2025-11-17T18:15:57.880 | 2026-01-08T17:13:38.533 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-r6cx-vw2q-5gqg |
7.1 (3.1)
|
In Plex Media Server (PMS) through 1.42.2.10156, ability to access /myplex/account with a device to… | 2026-01-02T18:30:55Z | 2026-01-02T18:30:55Z |
| ghsa-ph9c-hmx7-whr8 |
5.0 (3.1)
|
In the plex.tv backend for Plex Media Server (PMS) through 2025-12-31, a non-server device token ca… | 2026-01-02T18:30:55Z | 2026-01-02T18:30:55Z |
| ghsa-pcv5-57xj-mpf8 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:55Z | 2026-01-02T18:30:55Z |
| ghsa-jvhv-3qjg-v5q6 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:55Z | 2026-01-02T18:30:55Z |
| ghsa-hw59-9cp8-jmr3 |
7.3 (3.1)
5.5 (4.0)
|
A flaw has been found in code-projects Online Music Site 1.0. The impacted element is an unknown fu… | 2026-01-02T18:30:55Z | 2026-01-02T18:30:55Z |
| ghsa-9w2g-h336-pq2c |
5.0 (3.1)
|
In the plex.tv backend for Plex Media Server (PMS) through 2025-12-31, a non-server device token ca… | 2026-01-02T18:30:55Z | 2026-01-02T18:30:55Z |
| ghsa-7wq8-6p4v-xx2g |
8.5 (3.1)
|
Plex Media Server (PMS) through 1.42.2.10156 allows retrieval of a permanent access token via a /my… | 2026-01-02T18:30:55Z | 2026-01-02T18:30:55Z |
| ghsa-583q-4hr8-hgjg |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:55Z | 2026-01-02T18:30:55Z |
| ghsa-223f-f395-r8rw |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was detected in code-projects Content Management System 1.0. The affected element i… | 2026-01-02T18:30:55Z | 2026-01-02T18:30:55Z |
| ghsa-xfmp-w27p-9rgj |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:54Z | 2026-01-02T18:30:54Z |
| ghsa-wxqv-rjv9-6f8q |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:54Z | 2026-01-02T18:30:54Z |
| ghsa-wjp3-438r-xm2m |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:54Z | 2026-01-02T18:30:54Z |
| ghsa-w7pr-3qg3-m6gm |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:54Z | 2026-01-02T18:30:54Z |
| ghsa-vch9-5xvj-4959 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:54Z | 2026-01-02T18:30:54Z |
| ghsa-v7cm-rp2r-qph6 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:54Z | 2026-01-02T18:30:54Z |
| ghsa-rvvv-4hg8-6wjm |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:54Z | 2026-01-02T18:30:54Z |
| ghsa-rrqp-p2v5-665g |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:54Z | 2026-01-02T18:30:54Z |
| ghsa-rg98-xfpm-qc7q |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:54Z | 2026-01-02T18:30:54Z |
| ghsa-r42c-v85q-hg7m |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:54Z | 2026-01-02T18:30:54Z |
| ghsa-r25f-pqfj-pxpq |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:54Z | 2026-01-02T18:30:54Z |
| ghsa-qrq7-gxq4-hhr2 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:54Z | 2026-01-02T18:30:54Z |
| ghsa-px74-4j9x-vmf3 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:54Z | 2026-01-02T18:30:54Z |
| ghsa-p3c5-29q8-2494 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:54Z | 2026-01-02T18:30:54Z |
| ghsa-p233-rfmp-43wh |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:54Z | 2026-01-02T18:30:54Z |
| ghsa-jcjg-g5hf-8wq8 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:54Z | 2026-01-02T18:30:54Z |
| ghsa-hxmm-47vw-42cx |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:54Z | 2026-01-02T18:30:54Z |
| ghsa-hw28-vwhq-qx8j |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:54Z | 2026-01-02T18:30:54Z |
| ghsa-fm93-65j5-5ff8 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:54Z | 2026-01-02T18:30:54Z |
| ghsa-fjrw-fgch-w7c5 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:54Z | 2026-01-02T18:30:54Z |
| ghsa-f648-7x3m-rxhj |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:54Z | 2026-01-02T18:30:54Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2022-85 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `OpLevelCo… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:34.416658Z |
| pysec-2022-84 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `OpLevelCo… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:34.290009Z |
| pysec-2022-83 |
|
Tensorflow is an Open Source Machine Learning Framework. There is a typo in TensorFlow's … | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:34.161202Z |
| pysec-2022-82 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `AssignOp`… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:34.035553Z |
| pysec-2022-81 |
|
Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, TensorF… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:33.923211Z |
| pysec-2022-80 |
|
Tensorflow is an Open Source Machine Learning Framework. When decoding a tensor from prot… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:33.801262Z |
| pysec-2022-79 |
|
Tensorflow is an Open Source Machine Learning Framework. When decoding a tensor from prot… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:33.672987Z |
| pysec-2022-78 |
|
Tensorflow is an Open Source Machine Learning Framework. Multiple operations in TensorFlo… | tensorflow-cpu | 2022-02-03T13:15:00Z | 2022-03-09T00:17:33.554776Z |
| pysec-2022-77 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `AddManySp… | tensorflow-cpu | 2022-02-03T12:15:00Z | 2022-03-09T00:17:33.439630Z |
| pysec-2022-76 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementations of `Sparse*C… | tensorflow-cpu | 2022-02-03T12:15:00Z | 2022-03-09T00:17:33.310692Z |
| pysec-2022-75 |
|
Tensorflow is an Open Source Machine Learning Framework. TensorFlow is vulnerable to a he… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:33.179728Z |
| pysec-2022-74 |
|
Tensorflow is an Open Source Machine Learning Framework. An attacker can trigger denial o… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:33.047887Z |
| pysec-2022-73 |
|
Tensorflow is an Open Source Machine Learning Framework. When decoding a resource handle … | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:32.923545Z |
| pysec-2022-72 |
|
Tensorflow is an Open Source Machine Learning Framework. In multiple places, TensorFlow u… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:32.797622Z |
| pysec-2022-71 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `Range` su… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:32.679005Z |
| pysec-2022-70 |
|
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite m… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:32.561735Z |
| pysec-2022-69 |
|
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite m… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:32.438434Z |
| pysec-2022-68 |
|
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite m… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:32.298949Z |
| pysec-2022-67 |
|
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite m… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:32.167293Z |
| pysec-2022-66 |
|
Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite m… | tensorflow-cpu | 2022-02-04T23:15:00Z | 2022-03-09T00:17:32.048410Z |
| pysec-2022-65 |
|
Tensorflow is an Open Source Machine Learning Framework. ### Impact An attacker can craft… | tensorflow-cpu | 2022-02-03T15:15:00Z | 2022-03-09T00:17:31.924375Z |
| pysec-2022-64 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseCou… | tensorflow-cpu | 2022-02-03T15:15:00Z | 2022-03-09T00:17:31.800762Z |
| pysec-2022-63 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `Quantized… | tensorflow-cpu | 2022-02-03T14:15:00Z | 2022-03-09T00:17:31.682282Z |
| pysec-2022-62 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseCou… | tensorflow-cpu | 2022-02-03T14:15:00Z | 2022-03-09T00:17:31.553710Z |
| pysec-2022-61 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `*Bincount… | tensorflow-cpu | 2022-02-03T14:15:00Z | 2022-03-09T00:17:31.433747Z |
| pysec-2022-60 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseTen… | tensorflow-cpu | 2022-02-03T12:15:00Z | 2022-03-09T00:17:31.305252Z |
| pysec-2022-59 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `Fractiona… | tensorflow-cpu | 2022-02-03T13:15:00Z | 2022-03-09T00:17:31.174803Z |
| pysec-2022-58 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `MapStage`… | tensorflow-cpu | 2022-02-03T13:15:00Z | 2022-03-09T00:17:31.053811Z |
| pysec-2022-57 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `StringNGr… | tensorflow-cpu | 2022-02-03T12:15:00Z | 2022-03-09T00:17:30.939427Z |
| pysec-2022-56 |
|
Tensorflow is an Open Source Machine Learning Framework. The implementation of `ThreadPoo… | tensorflow-cpu | 2022-02-03T12:15:00Z | 2022-03-09T00:17:30.817713Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-4002 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:01.107469Z |
| gsd-2024-4001 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:01.110677Z |
| gsd-2024-4000 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:01.108433Z |
| gsd-2024-31858 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:01.878898Z |
| gsd-2024-31407 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:01.828498Z |
| gsd-2024-32942 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.398724Z |
| gsd-2024-32937 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.480785Z |
| gsd-2024-32935 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.375699Z |
| gsd-2024-32934 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.288016Z |
| gsd-2024-32933 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.482670Z |
| gsd-2024-32932 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.318667Z |
| gsd-2024-32931 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.319159Z |
| gsd-2024-32930 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.498740Z |
| gsd-2024-32929 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.226119Z |
| gsd-2024-32928 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.430140Z |
| gsd-2024-32927 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.229438Z |
| gsd-2024-32926 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.298996Z |
| gsd-2024-32925 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.270804Z |
| gsd-2024-32924 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.490789Z |
| gsd-2024-32923 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.483420Z |
| gsd-2024-32922 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.228664Z |
| gsd-2024-32921 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.358991Z |
| gsd-2024-32920 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.450518Z |
| gsd-2024-32919 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.445455Z |
| gsd-2024-32918 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.335515Z |
| gsd-2024-32917 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.364253Z |
| gsd-2024-32916 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.255400Z |
| gsd-2024-32915 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.431999Z |
| gsd-2024-32914 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.390240Z |
| gsd-2024-32913 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:00.240681Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-0000-reversing-labs-fe83bd74c533c8dd | 2025-12-23T08:39:31Z | 2025-12-23T08:39:31Z | |
| mal-0000-reversing-labs-63d4c44546eaa9b3 | 2025-12-23T08:39:31Z | 2025-12-23T08:39:31Z | |
| mal-0000-reversing-labs-2132074866be3b0e | 2025-12-23T08:39:27Z | 2025-12-23T08:39:27Z | |
| mal-0000-reversing-labs-0c444844511c3332 | 2025-12-23T08:39:26Z | 2025-12-23T08:39:26Z | |
| mal-0000-reversing-labs-f23958ec66020bb0 | 2025-12-23T08:39:17Z | 2025-12-23T08:39:17Z | |
| mal-0000-reversing-labs-e6a6a5147a29c398 | 2025-12-23T08:39:15Z | 2025-12-23T08:39:15Z | |
| mal-0000-reversing-labs-06f37f4da9e84ef3 | 2025-12-23T08:39:15Z | 2025-12-23T08:39:15Z | |
| mal-0000-reversing-labs-568acdec5229df37 | 2025-12-23T08:39:04Z | 2025-12-23T08:39:04Z | |
| mal-0000-reversing-labs-2aff53a785798381 | 2025-12-23T08:39:03Z | 2025-12-23T08:39:03Z | |
| mal-0000-reversing-labs-252e425e15e2b598 | 2025-12-23T08:39:02Z | 2025-12-23T08:39:02Z | |
| mal-0000-reversing-labs-2e053e7e073ce3e8 | 2025-12-23T08:39:01Z | 2025-12-23T08:39:01Z | |
| mal-0000-reversing-labs-4b82d3906b35e14e | 2025-12-23T08:38:58Z | 2025-12-23T08:38:58Z | |
| mal-0000-reversing-labs-cfa1c23a3a97268a | 2025-12-23T08:38:57Z | 2025-12-23T08:38:57Z | |
| mal-0000-reversing-labs-d06059887d6f955e | 2025-12-23T08:38:56Z | 2025-12-23T08:38:56Z | |
| mal-0000-reversing-labs-13a37dc9fbda2498 | 2025-12-23T08:38:43Z | 2025-12-23T08:38:43Z | |
| mal-0000-reversing-labs-b74fc5669380714b | 2025-12-23T08:38:42Z | 2025-12-23T08:38:42Z | |
| mal-0000-reversing-labs-1d238807f0d58db3 | 2025-12-23T08:38:41Z | 2025-12-23T08:38:41Z | |
| mal-0000-reversing-labs-cfebc5d414f6860c | 2025-12-23T08:38:40Z | 2025-12-23T08:38:40Z | |
| mal-0000-reversing-labs-ca866d4245ec47c1 | 2025-12-23T08:38:39Z | 2025-12-23T08:38:39Z | |
| mal-0000-reversing-labs-fdaa8857b20d9ea1 | 2025-12-23T08:38:36Z | 2025-12-23T08:38:36Z | |
| mal-2025-192893 | Malicious code in fireeye-main (PyPI) | 2025-12-23T08:38:27Z | 2025-12-23T08:38:27Z |
| mal-2025-192892 | Malicious code in fire-eye-bcs (PyPI) | 2025-12-23T08:38:27Z | 2025-12-23T08:38:27Z |
| mal-0000-reversing-labs-3e7b8324c03867d3 | 2025-12-23T08:38:27Z | 2025-12-23T08:38:27Z | |
| mal-0000-reversing-labs-305cde09419a7457 | 2025-12-23T08:38:27Z | 2025-12-23T08:38:27Z | |
| mal-0000-reversing-labs-6ac2b994befd596d | 2025-12-23T08:38:23Z | 2025-12-23T08:38:23Z | |
| mal-0000-reversing-labs-d762b62bc1e32d89 | 2025-12-23T08:38:22Z | 2025-12-23T08:38:22Z | |
| mal-0000-reversing-labs-512844bc74823a85 | 2025-12-23T08:38:21Z | 2025-12-23T08:38:21Z | |
| mal-0000-reversing-labs-6f67ae6d5301f779 | 2025-12-23T08:38:20Z | 2025-12-23T08:38:20Z | |
| mal-0000-reversing-labs-000fc121aa008334 | 2025-12-23T08:38:08Z | 2025-12-23T08:38:08Z | |
| mal-0000-reversing-labs-32fa17102f7d5fee | 2025-12-23T08:38:07Z | 2025-12-23T08:38:07Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-3426 | Intel Prozessor (Xeon): Mehrere Schwachstellen | 2024-11-12T23:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-3337 | Linux Kernel: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-11-04T23:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-3142 | libarchive: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2024-10-09T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-3097 | vim: Schwachstelle ermöglicht Denial of Service | 2024-10-07T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-2114 | cURL: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-09-10T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-1968 | vim: Schwachstelle ermöglicht Denial of Service | 2024-09-01T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-1920 | vim: Schwachstelle ermöglicht Denial of Service | 2024-08-25T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-1907 | vim: Schwachstelle ermöglicht Denial of Service | 2024-08-22T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-1905 | IBM QRadar SIEM: Mehrere Schwachstellen | 2024-08-21T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-1870 | vim: Schwachstelle ermöglicht Denial of Service | 2024-08-15T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-1807 | AMD Prozessor: Schwachstelle ermöglicht Codeausführung im System Management Mode (SMM) | 2024-08-11T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-1734 | libexpat: Schwachstelle ermöglicht Denial of Service | 2019-09-08T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-1635 | libndp: Schwachstelle ermöglicht Codeausführung | 2024-07-16T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-1510 | Red Hat Enterprise Linux (iperf3): Mehrere Schwachstellen | 2024-07-02T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-1369 | CUPS: Schwachstelle ermöglicht Manipulation von Dateien | 2024-06-12T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-1309 | Nvidia Treiber: Mehrere Schwachstellen | 2024-06-06T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-1269 | Red Hat Enterprise Linux (python-idna): Schwachstelle ermöglicht Denial of Service | 2024-06-02T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-0930 | Red Hat Enterprise Linux (sssd): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-04-18T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-0903 | Red Hat Enterprise Linux (shim): Mehrere Schwachstellen | 2024-04-16T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-0684 | docker: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-03-20T23:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-0641 | Red Hat Enterprise Linux (Advanced Cluster Management): Mehrere Schwachstellen | 2024-03-14T23:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-0326 | Linux "Shim": Schwachstelle ermöglicht Übernahme der Kontrolle | 2024-02-08T23:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-0278 | expat: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-02-04T23:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-0233 | GNOME: Schwachstelle ermöglicht Denial of Service und Code-Ausführung | 2024-01-28T23:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2023-2402 | CUPS: Schwachstelle ermöglicht Codeausführung | 2023-09-20T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2023-1540 | CUPS: Schwachstelle ermöglicht Denial of Service | 2023-06-21T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2023-1349 | CUPS: Schwachstelle ermöglicht Denial of Service | 2023-06-01T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2023-0668 | dnsmasq: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2023-03-15T23:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2023-0138 | Oracle Communications Applications: Mehrere Schwachstellen | 2023-01-17T23:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2023-0024 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2023-01-04T23:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2004:106 | Red Hat Security Advisory: kernel security update | 2004-04-22T01:12:00+00:00 | 2026-01-08T09:18:07+00:00 |
| rhsa-2004:069 | Red Hat Security Advisory: kernel security update | 2004-02-18T18:14:00+00:00 | 2026-01-08T09:18:06+00:00 |
| rhsa-2004:065 | Red Hat Security Advisory: : : : Updated kernel packages resolve security vulnerabilities | 2004-02-18T12:03:00+00:00 | 2026-01-08T09:18:04+00:00 |
| rhsa-2004:002 | Red Hat Security Advisory: ethereal security update | 2004-01-20T16:45:00+00:00 | 2026-01-08T09:18:03+00:00 |
| rhsa-2004:001 | Red Hat Security Advisory: : Updated Ethereal packages fix security issues | 2004-01-07T18:12:00+00:00 | 2026-01-08T09:18:02+00:00 |
| rhsa-2003:218 | Red Hat Security Advisory: : : : Updated unzip and tar packages that fix vulnerabilities are now available | 2003-07-01T20:10:00+00:00 | 2026-01-08T09:18:02+00:00 |
| rhsa-2003:195 | Red Hat Security Advisory: kernel security update | 2003-06-19T13:55:00+00:00 | 2026-01-08T09:17:59+00:00 |
| rhsa-2003:096 | Red Hat Security Advisory: samba security update | 2003-03-20T21:19:00+00:00 | 2026-01-08T09:17:52+00:00 |
| rhsa-2003:067 | Red Hat Security Advisory: : Updated XFree86 packages provide security and bug fixes | 2003-06-25T12:49:00+00:00 | 2026-01-08T09:17:50+00:00 |
| rhsa-2003:066 | Red Hat Security Advisory: : Updated XFree86 packages provide security and bug fixes | 2003-06-25T15:52:00+00:00 | 2026-01-08T09:17:49+00:00 |
| rhsa-2003:065 | Red Hat Security Advisory: XFree86 security update | 2003-06-25T12:23:00+00:00 | 2026-01-08T09:17:46+00:00 |
| rhsa-2003:064 | Red Hat Security Advisory: : Updated XFree86 4.1.0 packages are available | 2003-06-25T15:51:00+00:00 | 2026-01-08T09:17:45+00:00 |
| rhsa-2002:138 | Red Hat Security Advisory: unzip security update | 2002-10-02T18:44:00+00:00 | 2026-01-08T09:17:43+00:00 |
| rhsa-2002:096 | Red Hat Security Advisory: : : : Updated unzip and tar packages fix vulnerabilities | 2002-09-29T08:40:00+00:00 | 2026-01-08T09:17:42+00:00 |
| rhsa-2002:035 | Red Hat Security Advisory: : Updated PHP packages are available [updated 2002-Mar-11] | 2002-02-28T17:54:00+00:00 | 2026-01-08T09:17:40+00:00 |
| rhsa-2001:132 | Red Hat Security Advisory: : New util-linux packages available to fix /bin/login pam problem | 2001-10-16T19:15:00+00:00 | 2026-01-08T09:17:38+00:00 |
| rhsa-2001:095 | Red Hat Security Advisory: : New util-linux packages available to fix vipw permissions problems | 2001-07-16T16:51:00+00:00 | 2026-01-08T09:17:31+00:00 |
| rhsa-2001:072 | Red Hat Security Advisory: : Updated man package fixing GID security problems. | 2001-09-18T08:22:00+00:00 | 2026-01-08T09:17:30+00:00 |
| rhba-2007:0304 | Red Hat Bug Fix Advisory: Updated kernel packages available for Red Hat Enterprise Linux 4 Update 5 | 2007-04-28T00:00:00+00:00 | 2026-01-08T09:17:28+00:00 |
| rhba-2005:675 | Red Hat Bug Fix Advisory: gdb bug fix update | 2005-09-28T00:00:00+00:00 | 2026-01-08T09:17:27+00:00 |
| rhsa-2025:23449 | Red Hat Security Advisory: Red Hat AI Inference Server 3.2.5 (ROCm) | 2025-12-17T08:22:31+00:00 | 2026-01-08T03:48:18+00:00 |
| rhsa-2025:23209 | Red Hat Security Advisory: Red Hat AI Inference Server 3.2.5 (TPU) | 2025-12-15T15:50:15+00:00 | 2026-01-08T03:48:17+00:00 |
| rhsa-2025:23205 | Red Hat Security Advisory: Red Hat AI Inference Server 3.2.5 (ROCm) | 2025-12-15T15:38:07+00:00 | 2026-01-08T03:48:16+00:00 |
| rhsa-2025:23204 | Red Hat Security Advisory: Red Hat AI Inference Server 3.2.5 (CUDA) | 2025-12-15T15:38:04+00:00 | 2026-01-08T03:48:16+00:00 |
| rhsa-2025:23202 | Red Hat Security Advisory: Red Hat AI Inference Server Model Optimization Tools 3.2.5 (CUDA) | 2025-12-15T15:29:01+00:00 | 2026-01-08T03:48:15+00:00 |
| rhsa-2026:0271 | Red Hat Security Advisory: kernel security update | 2026-01-08T00:47:42+00:00 | 2026-01-08T03:41:46+00:00 |
| rhsa-2025:23158 | Red Hat Security Advisory: libpq security update | 2025-12-15T01:49:35+00:00 | 2026-01-08T03:41:21+00:00 |
| rhsa-2025:23157 | Red Hat Security Advisory: libpq security update | 2025-12-15T01:53:05+00:00 | 2026-01-08T03:41:21+00:00 |
| rhsa-2026:0270 | Red Hat Security Advisory: postgresql:13 security update | 2026-01-08T01:03:12+00:00 | 2026-01-08T03:41:20+00:00 |
| rhsa-2026:0268 | Red Hat Security Advisory: postgresql security update | 2026-01-08T02:42:08+00:00 | 2026-01-08T03:41:20+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-20-042-10 | Siemens SCALANCE S-600 (Update B) | 2020-02-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-20-042-02 | Siemens Industrial Products SNMP (Update F) | 2020-02-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-19-351-02 | Siemens SPPA-T3000 (Update A) | 2019-12-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-19-344-04 | Siemens SIMATIC Products (Update C) | 2019-12-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-19-283-01 | Siemens Industrial Real-Time (IRT) Devices | 2019-10-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-19-099-06 | Siemens SIMATIC, SIMOCODE, SINAMICS, SITOP, and TIM (Update I) | 2019-04-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-18-088-03 | Siemens SIMATIC PCS 7, SIMATIC WinCC, SIMATIC WinCC Runtime Professional, and SIMATIC NET PC Software (Update G) | 2018-03-27T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-18-067-01 | Siemens SIPROTEC 4, SIPROTEC Compact, DIGSI 4, and EN100 Ethernet Module (Update D) | 2018-03-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-18-025-02b | Siemens Desigo PXC (Update C) | 2018-01-24T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-17-243-01 | Siemens OPC UA Protocol Stack Discovery Service (Update E) | 2017-08-30T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| va-25-079-01 | CentralSquare eTRAKiT.Net SQL injection vulnerability | 2025-03-20T00:00:00Z | 2025-05-02T01:11:43Z |
| va-25-120-01 | Commvault Web Server unspecified vulnerability | 2025-04-30T00:00:00Z | 2025-04-30T00:00:00Z |
| icsa-25-196-01 | Hitachi Energy Asset Suite | 2025-04-29T12:30:00.000000Z | 2025-04-29T12:30:00.000000Z |
| icsa-25-105-05 | Lantronix XPort (Update A) | 2025-04-15T06:00:00.000000Z | 2025-04-29T06:00:00.000000Z |
| icsa-25-114-03 | Vestel AC Charger | 2025-04-24T06:00:00.000000Z | 2025-04-24T06:00:00.000000Z |
| icsa-25-114-02 | ALBEDO Telecom Net.Time - PTP/NTP clock | 2025-04-24T06:00:00.000000Z | 2025-04-24T06:00:00.000000Z |
| va-25-104-01 | SicommNet multiple vulnerabilities | 2025-04-15T13:49:55Z | 2025-04-23T00:00:00Z |
| icsa-25-107-04 | Yokogawa Recorder Products | 2025-04-17T06:00:00.000000Z | 2025-04-17T06:00:00.000000Z |
| icsa-25-112-04 | ABB MV Drives | 2025-04-10T08:30:00.000000Z | 2025-04-10T08:30:00.000000Z |
| icsa-25-107-03 | Schneider Electric ConneXium Network Manager Software | 2025-04-08T04:00:00.000000Z | 2025-04-08T04:00:00.000000Z |
| icsa-25-107-01 | Schneider Electric Trio Q Licensed Data Radio | 2025-04-08T04:00:00.000000Z | 2025-04-08T04:00:00.000000Z |
| icsa-25-035-04 | Schneider Electric EcoStruxure Power Monitoring Expert (PME) (Update A) | 2025-01-14T05:00:00.000000Z | 2025-04-08T04:00:00.000000Z |
| icsa-24-326-04 | Schneider Electric Modicon M340 MC80 and Momentum Unity M1E (Update A) | 2024-11-12T05:00:00.000000Z | 2025-04-08T04:00:00.000000Z |
| icsa-25-100-06 | Siemens SENTRON 7KT PAC1260 Data Manager | 2025-04-08T00:00:00.000000Z | 2025-04-08T00:00:00.000000Z |
| icsa-25-100-05 | Siemens Insights Hub Private Cloud | 2025-04-08T00:00:00.000000Z | 2025-04-08T00:00:00.000000Z |
| icsa-25-044-12 | Siemens SIMATIC IPC DiagBase and SIMATIC IPC DiagMonitor | 2025-02-11T00:00:00.000000Z | 2025-04-08T00:00:00.000000Z |
| icsa-25-105-08 | ABB M2M Gateway | 2025-04-07T10:30:00.000000Z | 2025-04-07T10:30:00.000000Z |
| icsa-25-100-09 | ABB Arctic Wireless Gateways | 2025-04-07T10:30:00.000000Z | 2025-04-07T10:30:00.000000Z |
| icsa-25-091-01 | Rockwell Automation Lifecycle Services with Veeam Backup and Replication | 2025-04-01T06:00:00.000000Z | 2025-04-01T06:00:00.000000Z |
| icsa-25-093-04 | ABB Low Voltage DC Drives and Power Controllers CODESYS RTS | 2025-03-26T00:30:00.000000Z | 2025-03-26T00:30:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-iox-yuxq6hfj | Cisco IOx Application Hosting Environment Vulnerabilities | 2022-04-13T16:00:00+00:00 | 2022-05-12T15:50:29+00:00 |
| cisco-sa-iox-yuXQ6hFj | Cisco IOx Application Hosting Environment Vulnerabilities | 2022-04-13T16:00:00+00:00 | 2022-05-12T15:50:29+00:00 |
| cisco-sa-ros-dos-x7h7xhkk | Cisco TelePresence Collaboration Endpoint and RoomOS Software Vulnerabilities | 2022-05-04T16:00:00+00:00 | 2022-05-06T20:13:28+00:00 |
| cisco-sa-ROS-DOS-X7H7XhkK | Cisco TelePresence Collaboration Endpoint and RoomOS Software Vulnerabilities | 2022-05-04T16:00:00+00:00 | 2022-05-06T20:13:28+00:00 |
| cisco-sa-clamav-dos-vl9x58p4 | ClamAV Truncated File Denial of Service Vulnerability Affecting Cisco Products: May 2022 | 2022-05-04T16:00:00+00:00 | 2022-05-04T20:36:47+00:00 |
| cisco-sa-clamav-dos-vL9x58p4 | ClamAV Truncated File Denial of Service Vulnerability Affecting Cisco Products: May 2022 | 2022-05-04T16:00:00+00:00 | 2022-05-04T20:36:47+00:00 |
| cisco-sa-vmge-infodc-wpskamhp | Cisco SD-WAN vManage Software Information Disclosure Vulnerability | 2022-05-04T16:00:00+00:00 | 2022-05-04T16:00:00+00:00 |
| cisco-sa-vmge-infodc-WPSkAMhp | Cisco SD-WAN vManage Software Information Disclosure Vulnerability | 2022-05-04T16:00:00+00:00 | 2022-05-04T16:00:00+00:00 |
| cisco-sa-smb-rv-cmd-inj-8pv9jmjd | Cisco Small Business RV Series Routers Command Injection Vulnerabilities | 2022-05-04T16:00:00+00:00 | 2022-05-04T16:00:00+00:00 |
| cisco-sa-smb-rv-cmd-inj-8Pv9JMJD | Cisco Small Business RV Series Routers Command Injection Vulnerabilities | 2022-05-04T16:00:00+00:00 | 2022-05-04T16:00:00+00:00 |
| cisco-sa-sbrv-rce-oylqbl9u | Cisco Small Business RV Series Routers Remote Code Execution Vulnerability | 2022-05-04T16:00:00+00:00 | 2022-05-04T16:00:00+00:00 |
| cisco-sa-sbrv-rce-OYLQbL9u | Cisco Small Business RV Series Routers Remote Code Execution Vulnerability | 2022-05-04T16:00:00+00:00 | 2022-05-04T16:00:00+00:00 |
| cisco-sa-nfvis-mul-7dysrx9 | Cisco Enterprise NFV Infrastructure Software Vulnerabilities | 2022-05-04T16:00:00+00:00 | 2022-05-04T16:00:00+00:00 |
| cisco-sa-NFVIS-MUL-7DySRX9 | Cisco Enterprise NFV Infrastructure Software Vulnerabilities | 2022-05-04T16:00:00+00:00 | 2022-05-04T16:00:00+00:00 |
| cisco-sa-vpndtls-dos-tunzlev | Cisco Adaptive Security Appliance and Cisco Firepower Threat Defense Software AnyConnect SSL VPN Denial of Service Vulnerability | 2022-04-20T16:00:00+00:00 | 2022-05-02T17:17:11+00:00 |
| cisco-sa-vpndtls-dos-TunzLEV | Cisco Adaptive Security Appliance and Cisco Firepower Threat Defense Software AnyConnect SSL VPN Denial of Service Vulnerability | 2022-04-20T16:00:00+00:00 | 2022-05-02T17:17:11+00:00 |
| cisco-sa-uswg-fdbps-xttrkpp6 | Cisco Umbrella Secure Web Gateway File Decryption Bypass Vulnerability | 2022-04-20T16:00:00+00:00 | 2022-04-29T19:14:17+00:00 |
| cisco-sa-uswg-fdbps-xtTRKpp6 | Cisco Umbrella Secure Web Gateway File Decryption Bypass Vulnerability | 2022-04-20T16:00:00+00:00 | 2022-04-29T19:14:17+00:00 |
| cisco-sa-lsplus-z6aqeojk | Cisco IOS XR Software for ASR 9000 Series Routers Lightspeed-Plus Line Cards Denial of Service Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-04-28T21:28:53+00:00 |
| cisco-sa-lsplus-Z6AQEOjk | Cisco IOS XR Software for ASR 9000 Series Routers Lightspeed-Plus Line Cards Denial of Service Vulnerability | 2022-04-13T16:00:00+00:00 | 2022-04-28T21:28:53+00:00 |
| cisco-sa-fmc-security-bypass-jhod29gg | Cisco Firepower Management Center File Upload Security Bypass Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-04-28T16:29:27+00:00 |
| cisco-sa-fmc-security-bypass-JhOd29Gg | Cisco Firepower Management Center File Upload Security Bypass Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-04-28T16:29:27+00:00 |
| cisco-sa-fmc-xss-sfpecvgt | Cisco Firepower Management Center Software Cross-Site Scripting Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-04-28T16:24:30+00:00 |
| cisco-sa-fmc-xss-SfpEcvGT | Cisco Firepower Management Center Software Cross-Site Scripting Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-04-28T16:24:30+00:00 |
| cisco-sa-ftd-xmlinj-8gwjgzke | Cisco Firepower Threat Defense Software XML Injection Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-04-27T16:00:00+00:00 |
| cisco-sa-ftd-xmlinj-8GWjGzKe | Cisco Firepower Threat Defense Software XML Injection Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-04-27T16:00:00+00:00 |
| cisco-sa-ftd-tcp-dos-km9shhou | Cisco Firepower Threat Defense Software TCP Proxy Denial of Service Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-04-27T16:00:00+00:00 |
| cisco-sa-ftd-tcp-dos-kM9SHhOu | Cisco Firepower Threat Defense Software TCP Proxy Denial of Service Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-04-27T16:00:00+00:00 |
| cisco-sa-ftd-snort3-dos-aq38lvdm | Cisco Firepower Threat Defense Software DNS Enforcement Denial of Service Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-04-27T16:00:00+00:00 |
| cisco-sa-ftd-snort-dos-hd2hfgm | Cisco Firepower Threat Defense Software Snort Out of Memory Denial of Service Vulnerability | 2022-04-27T16:00:00+00:00 | 2022-04-27T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-59273 | Azure Event Grid System Elevation of Privilege Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-23T07:00:00.000Z |
| msrc_cve-2025-55676 | Windows USB Video Class System Driver Information Disclosure Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-23T07:00:00.000Z |
| msrc_cve-2025-53054 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:06:45.000Z |
| msrc_cve-2025-53045 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:06:38.000Z |
| msrc_cve-2025-53069 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:06:30.000Z |
| msrc_cve-2025-53053 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:06:22.000Z |
| msrc_cve-2025-53062 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:06:15.000Z |
| msrc_cve-2025-53040 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:06:07.000Z |
| msrc_cve-2025-53044 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:06:00.000Z |
| msrc_cve-2025-53042 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:05:53.000Z |
| msrc_cve-2025-55315 | ASP.NET Security Feature Bypass Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-22T07:00:00.000Z |
| msrc_cve-2024-57888 | workqueue: Do not warn when cancelling WQ_MEM_RECLAIM work from !WQ_MEM_RECLAIM worker | 2025-01-02T00:00:00.000Z | 2025-10-22T01:02:36.000Z |
| msrc_cve-2022-49533 | ath11k: Change max no of active probe SSID and BSSID to fw capability | 2025-02-02T00:00:00.000Z | 2025-10-22T01:02:31.000Z |
| msrc_cve-2022-49528 | media: i2c: dw9714: Disable the regulator when the driver fails to probe | 2025-02-02T00:00:00.000Z | 2025-10-22T01:02:25.000Z |
| msrc_cve-2022-49504 | scsi: lpfc: Inhibit aborts if external loopback plug is inserted | 2025-02-02T00:00:00.000Z | 2025-10-22T01:02:20.000Z |
| msrc_cve-2022-49420 | net: annotate races around sk->sk_bound_dev_if | 2025-02-02T00:00:00.000Z | 2025-10-22T01:02:14.000Z |
| msrc_cve-2022-49333 | net/mlx5: E-Switch, pair only capable devices | 2025-02-02T00:00:00.000Z | 2025-10-22T01:02:09.000Z |
| msrc_cve-2022-49306 | usb: dwc3: host: Stop setting the ACPI companion | 2025-02-02T00:00:00.000Z | 2025-10-22T01:02:03.000Z |
| msrc_cve-2022-49267 | mmc: core: use sysfs_emit() instead of sprintf() | 2025-02-02T00:00:00.000Z | 2025-10-22T01:01:58.000Z |
| msrc_cve-2024-38564 | bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE | 2024-06-02T07:00:00.000Z | 2025-10-22T01:01:47.000Z |
| msrc_cve-2025-40010 | afs: Fix potential null pointer dereference in afs_put_server | 2025-10-02T00:00:00.000Z | 2025-10-22T01:01:41.000Z |
| msrc_cve-2025-40011 | drm/gma500: Fix null dereference in hdmi teardown | 2025-10-02T00:00:00.000Z | 2025-10-22T01:01:36.000Z |
| msrc_cve-2025-40016 | media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID | 2025-10-02T00:00:00.000Z | 2025-10-22T01:01:25.000Z |
| msrc_cve-2025-40013 | ASoC: qcom: audioreach: fix potential null pointer dereference | 2025-10-02T00:00:00.000Z | 2025-10-22T01:01:20.000Z |
| msrc_cve-2025-25004 | PowerShell Elevation of Privilege Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-21T07:00:00.000Z |
| msrc_cve-2024-57899 | wifi: mac80211: fix mbss changed flags corruption on 32 bit systems | 2025-01-02T00:00:00.000Z | 2025-10-19T01:01:38.000Z |
| msrc_cve-2024-31573 | XMLUnit for Java before 2.10.0, in the default configuration, might allow code execution via an untrusted stylesheet (used for an XSLT transformation), because XSLT extension functions are enabled. | 2025-10-02T00:00:00.000Z | 2025-10-19T01:01:21.000Z |
| msrc_cve-2025-62168 | Squid vulnerable to information disclosure via authentication credential leakage in error handling | 2025-10-02T00:00:00.000Z | 2025-10-19T01:01:13.000Z |
| msrc_cve-2025-21645 | platform/x86/amd/pmc: Only disable IRQ1 wakeup where i8042 actually enabled it | 2025-01-02T00:00:00.000Z | 2025-10-18T01:01:18.000Z |
| msrc_cve-2025-21629 | net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP packets | 2025-01-02T00:00:00.000Z | 2025-10-18T01:01:13.000Z |
| ID | Description | Updated |
|---|---|---|
| var-201706-0361 | The error page mechanism of the Java Servlet Specification requires that, when an error o… | 2024-07-23T19:33:25.866000Z |
| var-201203-0193 | Google Chrome before 17.0.963.65 does not properly perform casts of unspecified variables… | 2024-07-23T19:33:19.436000Z |
| var-200901-0742 | WebKit in Apple Safari before 4.0 does not properly initialize memory for Attr DOM object… | 2024-07-23T19:33:19.956000Z |
| var-202206-1961 | When curl < 7.84.0 does FTP transfers secured by krb5, it handles message verification fa… | 2024-07-23T19:33:18.254000Z |
| var-202010-1295 | An out-of-bounds read was addressed with improved input validation. This issue is fixed i… | 2024-07-23T19:33:18.082000Z |
| var-201110-0476 | Use-after-free vulnerability in Google Chrome before 15.0.874.102 allows remote attackers… | 2024-07-23T19:33:14.074000Z |
| var-201911-1410 | Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/mar… | 2024-07-23T19:33:13.621000Z |
| var-202301-0598 | Unproper laxist permissions on the temporary files used by MIME4J TempFileStorageProvider… | 2024-07-23T19:32:41.408000Z |
| var-202301-1527 | A carefully crafted If: request header can cause a memory read, or write of a single zero… | 2024-07-23T19:32:40.354000Z |
| var-202108-1268 | An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in… | 2024-07-23T19:32:39.770000Z |
| var-201908-0260 | Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, poten… | 2024-07-23T19:32:07.732000Z |
| var-201203-0188 | Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers … | 2024-07-23T19:32:07.187000Z |
| var-201106-0131 | The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion be… | 2024-07-23T19:32:07.409000Z |
| var-201912-0594 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T19:32:03.577000Z |
| var-200107-0160 | Cisco VPN 3000 series concentrators before 2.5.2(F) allow remote attackers to cause a den… | 2024-07-23T19:32:03.511000Z |
| var-200608-0039 | Integer overflow in AFP Server for Apple Mac OS X 10.3.9 and 10.4.7 allows remote attacke… | 2024-07-23T19:32:02.215000Z |
| var-202205-1953 | A logic issue was addressed with improved state management. This issue is fixed in Securi… | 2024-07-23T19:32:01.924000Z |
| var-201904-1409 | A use after free issue was addressed with improved memory management. This issue affected… | 2024-07-23T19:31:57.625000Z |
| var-201503-0206 | Use-after-free vulnerability in the phar_rename_archive function in phar_object.c in PHP … | 2024-07-23T19:31:57.226000Z |
| var-201007-0943 | WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before… | 2024-07-23T19:31:56.966000Z |
| var-202109-0277 | A logic issue was addressed with improved state management. This issue is fixed in iTunes… | 2024-07-23T19:31:55.560000Z |
| var-201506-0464 | Multiple stack-based buffer overflows in the phar_set_inode function in phar_internal.h i… | 2024-07-23T19:31:55.698000Z |
| var-201911-1627 | Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, … | 2024-07-23T19:31:48.093000Z |
| var-201503-0055 | The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 befor… | 2024-07-23T19:31:48.325000Z |
| var-200310-0072 | The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code… | 2024-07-23T19:31:47.530000Z |
| var-201901-1006 | In Safari before 11.1.2, iTunes before 12.8 for Windows, iOS before 11.4.1, tvOS before 1… | 2024-07-23T19:31:09.960000Z |
| var-201707-1195 | An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. Safari … | 2024-07-23T19:31:09.882000Z |
| var-202010-1236 | An access issue existed in Content Security Policy. This issue was addressed with improve… | 2024-07-23T19:31:07.854000Z |
| var-201108-0130 | The gif_read_lzw function in filter/image-gif.c in CUPS 1.4.8 and earlier does not proper… | 2024-07-23T19:31:05.644000Z |
| var-202112-2539 | vim is vulnerable to Out-of-bounds Read. SourceCoster Online Covid Vaccination Scheduler … | 2024-07-23T19:31:04.059000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2018-000002 | Nootka App for Android vulnerable to OS command injection | 2018-01-19T14:19+09:00 | 2018-04-11T11:46+09:00 |
| jvndb-2018-000004 | The installer of "FLET'S VIRUS CLEAR Easy Setup & Application Tool" and "FLET'S VIRUS CLEAR v6 Easy Setup & Application Tool" may insecurely load Dynamic Link Libraries | 2018-01-22T14:17+09:00 | 2018-04-11T11:44+09:00 |
| jvndb-2018-000003 | GroupSession vulnerable to open redirect | 2018-01-19T14:19+09:00 | 2018-04-11T11:37+09:00 |
| jvndb-2015-000197 | Zend Framework vulnerable to SQL injection | 2015-12-11T13:46+09:00 | 2018-04-11T11:32+09:00 |
| jvndb-2018-000032 | Hatena Bookmark App for iOS contains an address bar spoofing vulnerability | 2018-04-10T13:39+09:00 | 2018-04-10T13:39+09:00 |
| jvndb-2018-002257 | DoS Vulnerability in JP1/ServerConductor/Deployment Manager and Hitachi Compute Systems Manager | 2018-04-05T10:22+09:00 | 2018-04-10T10:55+09:00 |
| jvndb-2017-000251 | The installer of Content Manager Assistant for PlayStation may insecurely load Dynamic Link Libraries | 2017-12-22T15:50+09:00 | 2018-04-04T14:04+09:00 |
| jvndb-2017-000252 | MQTT.js issue in handling PUBLISH packets | 2017-12-25T14:00+09:00 | 2018-04-04T14:02+09:00 |
| jvndb-2017-000248 | OneThird CMS vulnerable to directory traversal | 2017-12-19T13:48+09:00 | 2018-04-04T13:58+09:00 |
| jvndb-2017-000250 | The installer of Music Center for PC may insecurely load Dynamic Link Libraries | 2017-12-22T15:50+09:00 | 2018-04-04T13:53+09:00 |
| jvndb-2017-000249 | Multiple vulnerabilities in H2O | 2017-12-18T15:17+09:00 | 2018-04-04T13:49+09:00 |
| jvndb-2018-000001 | Lhaplus vulnerable to improper verification when expanding ZIP64 archives | 2018-01-11T14:18+09:00 | 2018-04-04T12:33+09:00 |
| jvndb-2015-000111 | Yodobashi App for Android fails to verify SSL server certificates | 2015-08-07T13:50+09:00 | 2018-04-04T12:28+09:00 |
| jvndb-2016-000245 | Apache ActiveMQ vulnerable to cross-site scripting | 2016-12-13T14:00+09:00 | 2018-04-04T12:25+09:00 |
| jvndb-2017-000242 | StreamRelay.net.exe and sDNSProxy.exe vulnerable to denial-of-service (DoS) | 2017-11-29T14:54+09:00 | 2018-03-14T14:26+09:00 |
| jvndb-2017-000239 | The installer of Media Go and Music Center for PC may insecurely load Dynamic Link Libraries | 2017-11-21T15:40+09:00 | 2018-03-14T14:25+09:00 |
| jvndb-2017-000243 | Movable Type plugin A-Member and A-Reserve vulnerable to SQL injection | 2017-11-30T15:50+09:00 | 2018-03-14T14:20+09:00 |
| jvndb-2017-000240 | PWR-Q200 vulnerable to DNS cache poisoning attacks | 2017-11-22T13:51+09:00 | 2018-03-14T14:19+09:00 |
| jvndb-2017-009884 | QND Advance/Standard vulnerable to directory traversal | 2017-11-28T11:26+09:00 | 2018-03-14T14:17+09:00 |
| jvndb-2017-000244 | Multiple vulnerabilities in multiple Buffalo broadband routers | 2017-12-01T16:17+09:00 | 2018-03-14T14:15+09:00 |
| jvndb-2017-000241 | Multiple vulnerabilities in Wireless mobile storage "Digizo ShAirDisk" PTW-WMS1 | 2017-11-30T15:45+09:00 | 2018-03-14T14:13+09:00 |
| jvndb-2017-000238 | Robotic appliance COCOROBO vulnerable to session management | 2017-11-16T14:03+09:00 | 2018-03-14T14:09+09:00 |
| jvndb-2017-000245 | The installer of The Public Certification Service for Individuals "The JPKI user's software" may insecurely load Dynamic Link Libraries | 2017-12-06T14:42+09:00 | 2018-03-14T14:07+09:00 |
| jvndb-2017-000231 | OpenAM (Open Source Edition) vulnerable to authentication bypass | 2017-11-01T15:36+09:00 | 2018-03-14T14:03+09:00 |
| jvndb-2017-008629 | Memory corruption vulnerability in Rakuraku Hagaki and Rakuraku Hagaki Select for Ichitaro | 2017-10-25T12:17+09:00 | 2018-03-14T14:01+09:00 |
| jvndb-2017-000246 | Qt for Android vulnerable to OS command injection | 2017-12-11T13:40+09:00 | 2018-03-14T13:48+09:00 |
| jvndb-2017-000213 | Installer of "Flets Easy Setup Tool" may insecurely load Dynamic Link Libraries | 2017-11-02T13:57+09:00 | 2018-03-14T13:48+09:00 |
| jvndb-2017-000247 | Qt for Android environment variables alteration | 2017-12-11T13:40+09:00 | 2018-03-14T13:44+09:00 |
| jvndb-2015-000120 | Rakuten card App for iOS fails to verify SSL server certificates | 2015-09-01T14:18+09:00 | 2018-03-14T12:30+09:00 |
| jvndb-2017-000026 | Apache Brooklyn vulnerable to cross-site request forgery | 2017-02-15T16:20+09:00 | 2018-03-07T14:35+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:20582-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_7 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:20581-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_6 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:20580-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:20579-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:20578-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_3 | 2025-08-25T12:45:12Z | 2025-08-25T12:45:12Z |
| suse-su-2025:02977-1 | Security update for kubernetes1.18 | 2025-08-25T12:18:12Z | 2025-08-25T12:18:12Z |
| suse-su-2025:20617-1 | Security update for kernel-livepatch-MICRO-6-0_Update_10 | 2025-08-25T12:16:44Z | 2025-08-25T12:16:44Z |
| suse-su-2025:20616-1 | Security update for kernel-livepatch-MICRO-6-0_Update_9 | 2025-08-25T12:16:44Z | 2025-08-25T12:16:44Z |
| suse-su-2025:20615-1 | Security update for kernel-livepatch-MICRO-6-0_Update_8 | 2025-08-25T12:16:44Z | 2025-08-25T12:16:44Z |
| suse-su-2025:20614-1 | Security update for kernel-livepatch-MICRO-6-0_Update_7 | 2025-08-25T12:16:44Z | 2025-08-25T12:16:44Z |
| suse-su-2025:20613-1 | Security update for kernel-livepatch-MICRO-6-0_Update_6 | 2025-08-25T12:16:44Z | 2025-08-25T12:16:44Z |
| suse-su-2025:20612-1 | Security update for kernel-livepatch-MICRO-6-0_Update_5 | 2025-08-25T12:16:44Z | 2025-08-25T12:16:44Z |
| suse-su-2025:20574-1 | Security update for kernel-livepatch-MICRO-6-0_Update_9 | 2025-08-25T12:16:44Z | 2025-08-25T12:16:44Z |
| suse-su-2025:20573-1 | Security update for kernel-livepatch-MICRO-6-0_Update_7 | 2025-08-25T12:16:44Z | 2025-08-25T12:16:44Z |
| suse-su-2025:20572-1 | Security update for kernel-livepatch-MICRO-6-0_Update_5 | 2025-08-25T12:16:44Z | 2025-08-25T12:16:44Z |
| suse-su-2025:20571-1 | Security update for kernel-livepatch-MICRO-6-0_Update_10 | 2025-08-25T12:16:44Z | 2025-08-25T12:16:44Z |
| suse-su-2025:20570-1 | Security update for kernel-livepatch-MICRO-6-0_Update_8 | 2025-08-25T12:16:44Z | 2025-08-25T12:16:44Z |
| suse-su-2025:20569-1 | Security update for kernel-livepatch-MICRO-6-0_Update_6 | 2025-08-25T12:16:44Z | 2025-08-25T12:16:44Z |
| suse-su-2025:20611-1 | Security update for kernel-livepatch-MICRO-6-0_Update_4 | 2025-08-25T12:16:43Z | 2025-08-25T12:16:43Z |
| suse-su-2025:20610-1 | Security update for kernel-livepatch-MICRO-6-0_Update_2 | 2025-08-25T12:16:43Z | 2025-08-25T12:16:43Z |
| suse-su-2025:20576-1 | Security update for kernel-livepatch-MICRO-6-0_Update_3 | 2025-08-25T12:16:43Z | 2025-08-25T12:16:43Z |
| suse-su-2025:20575-1 | Security update for kernel-livepatch-MICRO-6-0_Update_2 | 2025-08-25T12:16:43Z | 2025-08-25T12:16:43Z |
| suse-su-2025:20568-1 | Security update for kernel-livepatch-MICRO-6-0_Update_4 | 2025-08-25T12:16:43Z | 2025-08-25T12:16:43Z |
| suse-su-2025:20601-1 | Security update for the Linux Kernel | 2025-08-25T11:19:19Z | 2025-08-25T11:19:19Z |
| suse-su-2025:02975-1 | Security update for cmake3 | 2025-08-25T10:42:11Z | 2025-08-25T10:42:11Z |
| suse-su-2025:02974-1 | Security update for net-tools | 2025-08-25T09:23:53Z | 2025-08-25T09:23:53Z |
| suse-su-2025:02973-1 | Security update for webkit2gtk3 | 2025-08-25T08:49:16Z | 2025-08-25T08:49:16Z |
| suse-su-2025:02972-1 | Security update for ffmpeg-4 | 2025-08-25T08:46:43Z | 2025-08-25T08:46:43Z |
| suse-su-2025:02971-1 | Security update for pam | 2025-08-25T08:28:35Z | 2025-08-25T08:28:35Z |
| suse-su-2025:02970-1 | Security update for pam | 2025-08-25T08:28:14Z | 2025-08-25T08:28:14Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:14657-1 | perl-IO-Compress-2.213.0-1.1 on GA media | 2025-01-16T00:00:00Z | 2025-01-16T00:00:00Z |
| opensuse-su-2025:14656-1 | perl-Compress-Raw-Zlib-2.213-1.1 on GA media | 2025-01-16T00:00:00Z | 2025-01-16T00:00:00Z |
| opensuse-su-2025:14655-1 | hplip-3.24.4-4.1 on GA media | 2025-01-16T00:00:00Z | 2025-01-16T00:00:00Z |
| opensuse-su-2025:14654-1 | grafana-11.3.0-5.1 on GA media | 2025-01-16T00:00:00Z | 2025-01-16T00:00:00Z |
| opensuse-su-2025:14653-1 | govulncheck-vulndb-0.0.20250115T172141-1.1 on GA media | 2025-01-16T00:00:00Z | 2025-01-16T00:00:00Z |
| opensuse-su-2025:14652-1 | git-2.48.1-1.1 on GA media | 2025-01-16T00:00:00Z | 2025-01-16T00:00:00Z |
| opensuse-su-2025:0012-1 | Security update for opera | 2025-01-15T12:36:20Z | 2025-01-15T12:36:20Z |
| opensuse-su-2025:14651-1 | python311-Django4-4.2.18-1.1 on GA media | 2025-01-15T00:00:00Z | 2025-01-15T00:00:00Z |
| opensuse-su-2025:14650-1 | pam_u2f-1.3.1-1.1 on GA media | 2025-01-15T00:00:00Z | 2025-01-15T00:00:00Z |
| opensuse-su-2025:14649-1 | git-lfs-3.6.1-1.1 on GA media | 2025-01-15T00:00:00Z | 2025-01-15T00:00:00Z |
| opensuse-su-2025:14648-1 | MozillaThunderbird-128.6.0-1.1 on GA media | 2025-01-15T00:00:00Z | 2025-01-15T00:00:00Z |
| opensuse-su-2025:14647-1 | python311-translate-toolkit-3.14.5-1.1 on GA media | 2025-01-14T00:00:00Z | 2025-01-14T00:00:00Z |
| opensuse-su-2025:14646-1 | libraptor-devel-2.0.16-4.1 on GA media | 2025-01-14T00:00:00Z | 2025-01-14T00:00:00Z |
| opensuse-su-2025:14645-1 | python311-Pillow-11.1.0-1.1 on GA media | 2025-01-14T00:00:00Z | 2025-01-14T00:00:00Z |
| opensuse-su-2025:14644-1 | govulncheck-vulndb-0.0.20250109T194159-1.1 on GA media | 2025-01-14T00:00:00Z | 2025-01-14T00:00:00Z |
| opensuse-su-2025:14643-1 | dcmtk-3.6.9-1.1 on GA media | 2025-01-14T00:00:00Z | 2025-01-14T00:00:00Z |
| opensuse-su-2025:14642-1 | SDL2_sound-devel-2.0.4-1.1 on GA media | 2025-01-14T00:00:00Z | 2025-01-14T00:00:00Z |
| opensuse-su-2025:14641-1 | rclone-1.69.0-1.1 on GA media | 2025-01-13T00:00:00Z | 2025-01-13T00:00:00Z |
| opensuse-su-2025:14640-1 | kepler-0.7.11-2.1 on GA media | 2025-01-13T00:00:00Z | 2025-01-13T00:00:00Z |
| opensuse-su-2025:14639-1 | yq-4.44.6-1.1 on GA media | 2025-01-12T00:00:00Z | 2025-01-12T00:00:00Z |
| opensuse-su-2025:14638-1 | valkey-8.0.2-1.1 on GA media | 2025-01-12T00:00:00Z | 2025-01-12T00:00:00Z |
| opensuse-su-2025:14637-1 | python311-mistune-3.1.0-1.1 on GA media | 2025-01-12T00:00:00Z | 2025-01-12T00:00:00Z |
| opensuse-su-2025:14636-1 | proftpd-1.3.8c-1.1 on GA media | 2025-01-12T00:00:00Z | 2025-01-12T00:00:00Z |
| opensuse-su-2025:14635-1 | perl-Module-ScanDeps-1.370.0-1.1 on GA media | 2025-01-12T00:00:00Z | 2025-01-12T00:00:00Z |
| opensuse-su-2025:14634-1 | operator-sdk-1.39.0-1.1 on GA media | 2025-01-12T00:00:00Z | 2025-01-12T00:00:00Z |
| opensuse-su-2025:14633-1 | grafana-11.3.0-4.1 on GA media | 2025-01-12T00:00:00Z | 2025-01-12T00:00:00Z |
| opensuse-su-2025:14632-1 | frr-10.2.1-1.1 on GA media | 2025-01-12T00:00:00Z | 2025-01-12T00:00:00Z |
| opensuse-su-2025:14631-1 | dpdk-23.11.1-4.1 on GA media | 2025-01-12T00:00:00Z | 2025-01-12T00:00:00Z |
| opensuse-su-2025:14630-1 | MozillaFirefox-134.0-1.1 on GA media | 2025-01-12T00:00:00Z | 2025-01-12T00:00:00Z |
| opensuse-su-2025:14629-1 | chromedriver-131.0.6778.264-1.1 on GA media | 2025-01-10T00:00:00Z | 2025-01-10T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-28679 | Intel Gaudi资源管理错误漏洞 | 2025-11-14 | 2025-11-17 |
| cnvd-2025-28678 | Intel CIP输入验证错误漏洞(CNVD-2025-28678) | 2025-11-14 | 2025-11-17 |
| cnvd-2025-28677 | Intel CIP输入验证错误漏洞 | 2025-11-14 | 2025-11-17 |
| cnvd-2025-28676 | Intel CIP访问控制不当漏洞 | 2025-11-14 | 2025-11-17 |
| cnvd-2025-28675 | Intel CIP权限提升漏洞(CNVD-2025-28675) | 2025-11-14 | 2025-11-17 |
| cnvd-2025-28674 | Intel CIP权限提升漏洞(CNVD-2025-28674) | 2025-11-14 | 2025-11-17 |
| cnvd-2025-28673 | Intel CIP信息泄露漏洞(CNVD-2025-28673) | 2025-11-14 | 2025-11-17 |
| cnvd-2025-28672 | Intel CIP权限提升漏洞(CNVD-2025-28672) | 2025-11-14 | 2025-11-17 |
| cnvd-2025-28671 | Intel CIP权限提升漏洞 | 2025-11-14 | 2025-11-17 |
| cnvd-2025-28670 | Intel CIP信息泄露漏洞 | 2025-11-14 | 2025-11-17 |
| cnvd-2025-28526 | Dell Command Monitor权限提升漏洞 | 2025-11-10 | 2025-11-17 |
| cnvd-2025-28525 | Dell CloudLink命令注入漏洞 | 2025-11-10 | 2025-11-17 |
| cnvd-2025-28524 | Dell CloudLink操作系统命令注入漏洞 | 2025-11-10 | 2025-11-17 |
| cnvd-2025-28523 | Dell CloudLink命令执行漏洞(CNVD-2025-28523) | 2025-11-10 | 2025-11-17 |
| cnvd-2025-28522 | Dell CloudLink命令执行漏洞(CNVD-2025-28522) | 2025-11-10 | 2025-11-17 |
| cnvd-2025-28521 | Dell CloudLink拒绝服务漏洞 | 2025-11-10 | 2025-11-17 |
| cnvd-2025-28520 | Dell CloudLink命令执行漏洞 | 2025-11-10 | 2025-11-17 |
| cnvd-2025-28519 | Dell CloudLink权限提升漏洞 | 2025-11-10 | 2025-11-17 |
| cnvd-2025-28483 | Intel CIP代码问题漏洞 | 2025-11-14 | 2025-11-17 |
| cnvd-2025-28482 | Intel CIP访问控制不当漏洞 | 2025-11-14 | 2025-11-17 |
| cnvd-2025-28465 | Intel CIP权限提升漏洞 | 2025-11-14 | 2025-11-17 |
| cnvd-2025-28527 | MantisBT授权问题漏洞(CNVD-2025-28527) | 2025-11-10 | 2025-11-14 |
| cnvd-2025-28011 | Simple Online Hotel Reservation System delete_room.php文件SQL注入漏洞 | 2025-06-27 | 2025-11-14 |
| cnvd-2025-28010 | Simple Online Hotel Reservation System delete_pending.php文件SQL注入漏洞 | 2025-06-27 | 2025-11-14 |
| cnvd-2025-28009 | Simple Online Hotel Reservation System confirm_reserve.php文件SQL注入漏洞 | 2025-06-27 | 2025-11-14 |
| cnvd-2025-27985 | Samba操作系统命令注入漏洞 | 2025-10-20 | 2025-11-14 |
| cnvd-2025-27925 | ThinkDashboard跨站脚本漏洞 | 2025-11-11 | 2025-11-14 |
| cnvd-2025-27924 | FoxCMS跨站脚本漏洞 | 2025-11-12 | 2025-11-14 |
| cnvd-2025-27923 | Calibre输入验证错误漏洞(CNVD-2025-27923) | 2025-11-12 | 2025-11-14 |
| cnvd-2025-27911 | Simple Online Hotel Reservation System checkout_query.php文件SQL注入漏洞 | 2025-06-27 | 2025-11-14 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2025-AVI-0487 | Multiples vulnérabilités dans les produits SAP | 2025-06-11T00:00:00.000000 | 2025-06-11T00:00:00.000000 |
| certfr-2025-avi-0486 | Multiples vulnérabilités dans les produits Qnap | 2025-06-10T00:00:00.000000 | 2025-06-10T00:00:00.000000 |
| certfr-2025-avi-0485 | Multiples vulnérabilités dans les produits Schneider Electric | 2025-06-10T00:00:00.000000 | 2025-06-10T00:00:00.000000 |
| certfr-2025-avi-0484 | Vulnérabilité dans les produits HPE Aruba Networking | 2025-06-10T00:00:00.000000 | 2025-06-10T00:00:00.000000 |
| certfr-2025-avi-0483 | Vulnérabilité dans Mozilla VPN | 2025-06-10T00:00:00.000000 | 2025-06-10T00:00:00.000000 |
| CERTFR-2025-AVI-0486 | Multiples vulnérabilités dans les produits Qnap | 2025-06-10T00:00:00.000000 | 2025-06-10T00:00:00.000000 |
| CERTFR-2025-AVI-0485 | Multiples vulnérabilités dans les produits Schneider Electric | 2025-06-10T00:00:00.000000 | 2025-06-10T00:00:00.000000 |
| CERTFR-2025-AVI-0484 | Vulnérabilité dans les produits HPE Aruba Networking | 2025-06-10T00:00:00.000000 | 2025-06-10T00:00:00.000000 |
| CERTFR-2025-AVI-0483 | Vulnérabilité dans Mozilla VPN | 2025-06-10T00:00:00.000000 | 2025-06-10T00:00:00.000000 |
| certfr-2025-avi-0482 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-06-06T00:00:00.000000 | 2025-06-06T00:00:00.000000 |
| certfr-2025-avi-0481 | Multiples vulnérabilités dans les produits IBM | 2025-06-06T00:00:00.000000 | 2025-06-06T00:00:00.000000 |
| certfr-2025-avi-0480 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-06-06T00:00:00.000000 | 2025-06-06T00:00:00.000000 |
| CERTFR-2025-AVI-0482 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-06-06T00:00:00.000000 | 2025-06-06T00:00:00.000000 |
| CERTFR-2025-AVI-0481 | Multiples vulnérabilités dans les produits IBM | 2025-06-06T00:00:00.000000 | 2025-06-06T00:00:00.000000 |
| CERTFR-2025-AVI-0480 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-06-06T00:00:00.000000 | 2025-06-06T00:00:00.000000 |
| certfr-2025-avi-0479 | Multiples vulnérabilités dans les produits Cisco | 2025-06-05T00:00:00.000000 | 2025-06-05T00:00:00.000000 |
| certfr-2025-avi-0478 | Vulnérabilité dans Wireshark | 2025-06-05T00:00:00.000000 | 2025-06-05T00:00:00.000000 |
| certfr-2025-avi-0477 | Multiples vulnérabilités dans les produits VMware | 2025-06-05T00:00:00.000000 | 2025-06-05T00:00:00.000000 |
| certfr-2025-avi-0468 | Vulnérabilité dans Roundcube | 2025-06-02T00:00:00.000000 | 2025-06-05T00:00:00.000000 |
| CERTFR-2025-AVI-0479 | Multiples vulnérabilités dans les produits Cisco | 2025-06-05T00:00:00.000000 | 2025-06-05T00:00:00.000000 |
| CERTFR-2025-AVI-0478 | Vulnérabilité dans Wireshark | 2025-06-05T00:00:00.000000 | 2025-06-05T00:00:00.000000 |
| CERTFR-2025-AVI-0477 | Multiples vulnérabilités dans les produits VMware | 2025-06-05T00:00:00.000000 | 2025-06-05T00:00:00.000000 |
| CERTFR-2025-AVI-0468 | Vulnérabilité dans Roundcube | 2025-06-02T00:00:00.000000 | 2025-06-05T00:00:00.000000 |
| certfr-2025-avi-0476 | Vulnérabilité dans cURL | 2025-06-04T00:00:00.000000 | 2025-06-04T00:00:00.000000 |
| certfr-2025-avi-0475 | Multiples vulnérabilités dans Python | 2025-06-04T00:00:00.000000 | 2025-06-04T00:00:00.000000 |
| certfr-2025-avi-0474 | Multiples vulnérabilités dans Microsoft Edge | 2025-06-04T00:00:00.000000 | 2025-06-04T00:00:00.000000 |
| CERTFR-2025-AVI-0476 | Vulnérabilité dans cURL | 2025-06-04T00:00:00.000000 | 2025-06-04T00:00:00.000000 |
| CERTFR-2025-AVI-0475 | Multiples vulnérabilités dans Python | 2025-06-04T00:00:00.000000 | 2025-06-04T00:00:00.000000 |
| CERTFR-2025-AVI-0474 | Multiples vulnérabilités dans Microsoft Edge | 2025-06-04T00:00:00.000000 | 2025-06-04T00:00:00.000000 |
| certfr-2025-avi-0473 | Multiples vulnérabilités dans les produits Splunk | 2025-06-03T00:00:00.000000 | 2025-06-03T00:00:00.000000 |