Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-61546 |
9.1 (3.1)
|
There is an issue on the /PSP/appNET/Store/CartV1… |
n/a |
n/a |
2026-01-08T00:00:00.000Z | 2026-01-13T14:28:36.491Z |
| CVE-2025-41717 |
8.8 (3.1)
|
Config-Upload Code Injection |
Phoenix Contact |
TC ROUTER 3002T-3G |
2026-01-13T07:48:19.811Z | 2026-01-13T14:22:59.709Z |
| CVE-2025-59022 |
7.1 (4.0)
|
TYPO3 CMS Allows Broken Access Control in Recycler Module |
TYPO3 |
TYPO3 CMS |
2026-01-13T11:53:45.184Z | 2026-01-13T14:21:59.794Z |
| CVE-2025-11250 |
9.1 (3.1)
|
Authentication Bypass |
Zohocorp |
ManageEngine ADSelfService Plus |
2026-01-13T13:35:18.509Z | 2026-01-13T14:19:27.437Z |
| CVE-2025-69355 |
4.3 (3.1)
|
WordPress Tickera plugin <= 3.5.6.4 - Broken Access Co… |
Tickera |
Tickera |
2026-01-06T16:36:41.230Z | 2026-01-13T14:19:14.699Z |
| CVE-2025-69356 |
7.5 (3.1)
|
WordPress TheGem Theme Elements (for Elementor) plugin… |
CodexThemes |
TheGem Theme Elements (for Elementor) |
2026-01-06T16:36:41.397Z | 2026-01-13T14:18:21.529Z |
| CVE-2025-9427 |
8.4 (4.0)
|
Admin reflected XSS |
Lemonsoft |
WordPress add-on |
2026-01-13T13:39:02.370Z | 2026-01-13T14:16:45.654Z |
| CVE-2025-69359 |
5.3 (3.1)
|
WordPress Creator LMS plugin <= 1.1.12 - Broken Access… |
WPFunnels |
Creator LMS |
2026-01-06T16:36:41.733Z | 2026-01-13T14:16:11.977Z |
| CVE-2025-69361 |
4.3 (3.1)
|
WordPress Post Expirator plugin <= 4.9.3 - Broken Acce… |
PublishPress |
Post Expirator |
2026-01-06T16:36:42.054Z | 2026-01-13T14:15:24.212Z |
| CVE-2026-0684 |
4.3 (3.1)
|
CP Image Store with Slideshow <= 1.1.9 - Missing Autho… |
codepeople |
CP Image Store with Slideshow |
2026-01-13T13:49:12.628Z | 2026-01-13T14:13:53.871Z |
| CVE-2026-0859 |
5.2 (4.0)
|
TYPO3 CMS Allows Insecure Deserialization via Mailer F… |
TYPO3 |
TYPO3 CMS |
2026-01-13T11:54:11.494Z | 2026-01-13T14:12:12.132Z |
| CVE-2025-14507 |
5.3 (3.1)
|
EventPrime - Events Calendar, Bookings and Tickets <= … |
metagauss |
EventPrime – Events Calendar, Bookings and Tickets |
2026-01-13T13:49:13.254Z | 2026-01-13T14:11:27.075Z |
| CVE-2025-9435 |
5.5 (3.1)
|
Path Traversal |
Zohocorp |
ManageEngine ADManager Plus |
2026-01-13T13:14:03.879Z | 2026-01-13T14:01:24.898Z |
| CVE-2025-40569 |
4.8 (3.1)
5.9 (4.0)
|
A vulnerability has been identified in RUGGEDCOM … |
Siemens |
RUGGEDCOM RST2428P |
2025-06-10T15:17:33.607Z | 2026-01-13T09:44:00.704Z |
| CVE-2025-40568 |
4.3 (3.1)
5.3 (4.0)
|
A vulnerability has been identified in RUGGEDCOM … |
Siemens |
RUGGEDCOM RST2428P |
2025-06-10T15:17:31.304Z | 2026-01-13T09:43:59.458Z |
| CVE-2025-40567 |
6.5 (3.1)
7.1 (4.0)
|
A vulnerability has been identified in RUGGEDCOM … |
Siemens |
RUGGEDCOM RST2428P |
2025-06-10T15:17:28.878Z | 2026-01-13T09:43:58.289Z |
| CVE-2025-30033 |
7.8 (3.1)
8.5 (4.0)
|
The affected setup component is vulnerable to DLL… |
Siemens |
Automation License Manager V6.0 |
2025-08-12T11:16:56.565Z | 2026-01-13T09:43:57.018Z |
| CVE-2024-56840 |
7.2 (3.1)
7.5 (4.0)
|
A vulnerability has been identified in RUGGEDCOM … |
Siemens |
RUGGEDCOM ROX MX5000 |
2025-12-09T10:44:19.188Z | 2026-01-13T09:43:55.345Z |
| CVE-2024-56839 |
7.2 (3.1)
8.6 (4.0)
|
A vulnerability has been identified in RUGGEDCOM … |
Siemens |
RUGGEDCOM ROX MX5000 |
2025-12-09T10:44:18.103Z | 2026-01-13T09:43:54.268Z |
| CVE-2024-56838 |
7.2 (3.1)
8.6 (4.0)
|
A vulnerability has been identified in RUGGEDCOM … |
Siemens |
RUGGEDCOM ROX MX5000 |
2025-12-09T10:44:17.019Z | 2026-01-13T09:43:53.194Z |
| CVE-2024-56837 |
7.2 (3.1)
8.6 (4.0)
|
A vulnerability has been identified in RUGGEDCOM … |
Siemens |
RUGGEDCOM ROX MX5000 |
2025-12-09T10:44:15.934Z | 2026-01-13T09:43:52.096Z |
| CVE-2024-56836 |
7.5 (3.1)
7.7 (4.0)
|
A vulnerability has been identified in RUGGEDCOM … |
Siemens |
RUGGEDCOM ROX MX5000 |
2025-12-09T10:44:14.820Z | 2026-01-13T09:43:50.967Z |
| CVE-2024-56835 |
8.8 (3.1)
8.7 (4.0)
|
A vulnerability has been identified in RUGGEDCOM … |
Siemens |
RUGGEDCOM ROX MX5000 |
2025-12-09T10:44:13.701Z | 2026-01-13T09:43:49.860Z |
| CVE-2024-49775 |
9.8 (3.1)
9.3 (4.0)
|
A vulnerability has been identified in Opcenter E… |
Siemens |
Opcenter Execution Foundation |
2024-12-16T15:06:04.714Z | 2026-01-13T09:43:48.714Z |
| CVE-2026-0719 |
8.6 (3.1)
|
Libsoup: signed to unsigned conversion error leading t… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-01-08T12:38:30.740Z | 2026-01-13T05:46:07.913Z |
| CVE-2025-20711 |
8.8 (3.1)
|
In wlan AP driver, there is a possible out of bou… |
MediaTek, Inc. |
MT6890, MT7916, MT7981, MT7986 |
2025-10-14T09:11:32.571Z | 2026-01-13T05:35:17.914Z |
| CVE-2025-20748 |
6.7 (3.1)
|
In wlan AP driver, there is a possible out of bou… |
MediaTek, Inc. |
MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986 |
2025-11-04T06:20:23.128Z | 2026-01-13T05:32:32.208Z |
| CVE-2026-22029 |
8 (3.1)
|
React Router vulnerable to XSS via Open Redirects |
remix-run |
react-router |
2026-01-10T02:42:32.736Z | 2026-01-13T04:55:52.374Z |
| CVE-2026-21884 |
8.2 (3.1)
|
React Router SSR XSS in ScrollRestoration |
remix-run |
react-router |
2026-01-10T02:41:44.944Z | 2026-01-13T04:55:51.268Z |
| CVE-2006-3730 |
N/A
|
Integer overflow in Microsoft Internet Explorer 6… |
n/a |
n/a |
2006-07-19T23:00:00.000Z | 2026-01-13T04:55:50.098Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-71023 |
7.5 (3.1)
|
Tenda AX-3 v16.03.12.10_CN was discovered to cont… |
n/a |
n/a |
2026-01-13T00:00:00.000Z | 2026-01-13T18:17:44.971Z |
| CVE-2025-68823 |
N/A
|
ublk: fix deadlock when reading partition table |
Linux |
Linux |
2026-01-13T15:29:25.392Z | 2026-01-13T15:29:25.392Z |
| CVE-2025-68822 |
N/A
|
Input: alps - fix use-after-free bugs caused by dev3_r… |
Linux |
Linux |
2026-01-13T15:29:24.703Z | 2026-01-13T15:29:24.703Z |
| CVE-2025-68821 |
N/A
|
fuse: fix readahead reclaim deadlock |
Linux |
Linux |
2026-01-13T15:29:24.014Z | 2026-01-13T15:29:24.014Z |
| CVE-2025-68820 |
N/A
|
ext4: xattr: fix null pointer deref in ext4_raw_inode() |
Linux |
Linux |
2026-01-13T15:29:23.351Z | 2026-01-13T15:29:23.351Z |
| CVE-2025-68819 |
N/A
|
media: dvb-usb: dtv5100: fix out-of-bounds in dtv5100_… |
Linux |
Linux |
2026-01-13T15:29:22.695Z | 2026-01-13T15:29:22.695Z |
| CVE-2025-68818 |
N/A
|
scsi: Revert "scsi: qla2xxx: Perform lockless command … |
Linux |
Linux |
2026-01-13T15:29:22.018Z | 2026-01-13T15:29:22.018Z |
| CVE-2025-68817 |
N/A
|
ksmbd: fix use-after-free in ksmbd_tree_connect_put un… |
Linux |
Linux |
2026-01-13T15:29:21.210Z | 2026-01-14T08:51:40.603Z |
| CVE-2025-68816 |
N/A
|
net/mlx5: fw_tracer, Validate format string parameters |
Linux |
Linux |
2026-01-13T15:29:20.464Z | 2026-01-13T15:29:20.464Z |
| CVE-2025-68815 |
N/A
|
net/sched: ets: Remove drr class from the active list … |
Linux |
Linux |
2026-01-13T15:29:19.789Z | 2026-01-13T15:29:19.789Z |
| CVE-2025-68814 |
N/A
|
io_uring: fix filename leak in __io_openat_prep() |
Linux |
Linux |
2026-01-13T15:29:19.129Z | 2026-01-13T15:29:19.129Z |
| CVE-2025-68813 |
N/A
|
ipvs: fix ipv4 null-ptr-deref in route error path |
Linux |
Linux |
2026-01-13T15:29:18.483Z | 2026-01-13T15:29:18.483Z |
| CVE-2025-68812 |
N/A
|
media: iris: Add sanity check for stop streaming |
Linux |
Linux |
2026-01-13T15:29:17.811Z | 2026-01-13T15:29:17.811Z |
| CVE-2025-68811 |
N/A
|
svcrdma: use rc_pageoff for memcpy byte offset |
Linux |
Linux |
2026-01-13T15:29:17.128Z | 2026-01-13T15:29:17.128Z |
| CVE-2025-68810 |
N/A
|
KVM: Disallow toggling KVM_MEM_GUEST_MEMFD on an exist… |
Linux |
Linux |
2026-01-13T15:29:16.475Z | 2026-01-13T15:29:16.475Z |
| CVE-2025-68809 |
N/A
|
ksmbd: vfs: fix race on m_flags in vfs_cache |
Linux |
Linux |
2026-01-13T15:29:15.817Z | 2026-01-14T08:51:39.332Z |
| CVE-2025-68808 |
N/A
|
media: vidtv: initialize local pointers upon transfer … |
Linux |
Linux |
2026-01-13T15:29:15.164Z | 2026-01-13T15:29:15.164Z |
| CVE-2025-68807 |
N/A
|
block: fix race between wbt_enable_default and IO submission |
Linux |
Linux |
2026-01-13T15:29:14.483Z | 2026-01-13T15:29:14.483Z |
| CVE-2025-68806 |
N/A
|
ksmbd: fix buffer validation by including null termina… |
Linux |
Linux |
2026-01-13T15:29:13.797Z | 2026-01-14T08:51:38.039Z |
| CVE-2025-68805 |
N/A
|
fuse: fix io-uring list corruption for terminated non-… |
Linux |
Linux |
2026-01-13T15:29:13.119Z | 2026-01-13T15:29:13.119Z |
| CVE-2025-68804 |
N/A
|
platform/chrome: cros_ec_ishtp: Fix UAF after unbindin… |
Linux |
Linux |
2026-01-13T15:29:12.418Z | 2026-01-13T15:29:12.418Z |
| CVE-2025-68802 |
N/A
|
drm/xe: Limit num_syncs to prevent oversized allocations |
Linux |
Linux |
2026-01-13T15:29:11.079Z | 2026-01-13T15:29:11.079Z |
| CVE-2025-68801 |
N/A
|
mlxsw: spectrum_router: Fix neighbour use-after-free |
Linux |
Linux |
2026-01-13T15:29:10.349Z | 2026-01-13T15:29:10.349Z |
| CVE-2025-68800 |
N/A
|
mlxsw: spectrum_mr: Fix use-after-free when updating m… |
Linux |
Linux |
2026-01-13T15:29:09.688Z | 2026-01-13T15:29:09.688Z |
| CVE-2025-68799 |
N/A
|
caif: fix integer underflow in cffrml_receive() |
Linux |
Linux |
2026-01-13T15:29:09.012Z | 2026-01-13T15:29:09.012Z |
| CVE-2025-68798 |
N/A
|
perf/x86/amd: Check event before enable to avoid GPF |
Linux |
Linux |
2026-01-13T15:29:08.329Z | 2026-01-14T08:51:36.755Z |
| CVE-2025-68797 |
N/A
|
char: applicom: fix NULL pointer dereference in ac_ioctl |
Linux |
Linux |
2026-01-13T15:29:07.575Z | 2026-01-14T08:51:35.316Z |
| CVE-2025-68796 |
N/A
|
f2fs: fix to avoid updating zero-sized extent in exten… |
Linux |
Linux |
2026-01-13T15:29:06.892Z | 2026-01-13T15:29:06.892Z |
| CVE-2025-68795 |
N/A
|
ethtool: Avoid overflowing userspace buffer on stats query |
Linux |
Linux |
2026-01-13T15:29:06.217Z | 2026-01-13T15:29:06.217Z |
| CVE-2025-68794 |
N/A
|
iomap: adjust read range correctly for non-block-align… |
Linux |
Linux |
2026-01-13T15:29:05.553Z | 2026-01-14T08:51:34.049Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-68822 | In the Linux kernel, the following vulnerability has been resolved: Input: alps - fix use-after-fr… | 2026-01-13T16:16:04.550 | 2026-01-14T16:26:00.933 |
| fkie_cve-2025-68821 | In the Linux kernel, the following vulnerability has been resolved: fuse: fix readahead reclaim de… | 2026-01-13T16:16:04.440 | 2026-01-14T16:26:00.933 |
| fkie_cve-2025-68820 | In the Linux kernel, the following vulnerability has been resolved: ext4: xattr: fix null pointer … | 2026-01-13T16:16:04.327 | 2026-01-14T16:26:00.933 |
| fkie_cve-2025-68819 | In the Linux kernel, the following vulnerability has been resolved: media: dvb-usb: dtv5100: fix o… | 2026-01-13T16:16:04.210 | 2026-01-14T16:26:00.933 |
| fkie_cve-2025-68818 | In the Linux kernel, the following vulnerability has been resolved: scsi: Revert "scsi: qla2xxx: P… | 2026-01-13T16:16:04.097 | 2026-01-14T16:26:00.933 |
| fkie_cve-2025-68817 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix use-after-free in k… | 2026-01-13T16:16:03.983 | 2026-01-14T16:26:00.933 |
| fkie_cve-2025-68816 | In the Linux kernel, the following vulnerability has been resolved: net/mlx5: fw_tracer, Validate … | 2026-01-13T16:16:03.870 | 2026-01-14T16:26:00.933 |
| fkie_cve-2025-68815 | In the Linux kernel, the following vulnerability has been resolved: net/sched: ets: Remove drr cla… | 2026-01-13T16:16:03.757 | 2026-01-14T16:26:00.933 |
| fkie_cve-2025-68814 | In the Linux kernel, the following vulnerability has been resolved: io_uring: fix filename leak in… | 2026-01-13T16:16:03.643 | 2026-01-14T16:26:00.933 |
| fkie_cve-2025-68813 | In the Linux kernel, the following vulnerability has been resolved: ipvs: fix ipv4 null-ptr-deref … | 2026-01-13T16:16:03.523 | 2026-01-14T16:26:00.933 |
| fkie_cve-2025-68812 | In the Linux kernel, the following vulnerability has been resolved: media: iris: Add sanity check … | 2026-01-13T16:16:03.410 | 2026-01-14T16:26:00.933 |
| fkie_cve-2025-68811 | In the Linux kernel, the following vulnerability has been resolved: svcrdma: use rc_pageoff for me… | 2026-01-13T16:16:03.300 | 2026-01-14T16:26:00.933 |
| fkie_cve-2025-68810 | In the Linux kernel, the following vulnerability has been resolved: KVM: Disallow toggling KVM_MEM… | 2026-01-13T16:16:03.190 | 2026-01-14T16:26:00.933 |
| fkie_cve-2025-68809 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: vfs: fix race on m_flag… | 2026-01-13T16:16:03.080 | 2026-01-14T16:26:00.933 |
| fkie_cve-2025-68808 | In the Linux kernel, the following vulnerability has been resolved: media: vidtv: initialize local… | 2026-01-13T16:16:02.967 | 2026-01-14T16:26:00.933 |
| fkie_cve-2025-68807 | In the Linux kernel, the following vulnerability has been resolved: block: fix race between wbt_en… | 2026-01-13T16:16:02.857 | 2026-01-14T16:26:00.933 |
| fkie_cve-2025-68806 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix buffer validation b… | 2026-01-13T16:16:02.747 | 2026-01-14T16:26:00.933 |
| fkie_cve-2025-68805 | In the Linux kernel, the following vulnerability has been resolved: fuse: fix io-uring list corrup… | 2026-01-13T16:16:02.637 | 2026-01-14T16:26:00.933 |
| fkie_cve-2025-68804 | In the Linux kernel, the following vulnerability has been resolved: platform/chrome: cros_ec_ishtp… | 2026-01-13T16:16:02.507 | 2026-01-14T16:26:00.933 |
| fkie_cve-2025-68802 | In the Linux kernel, the following vulnerability has been resolved: drm/xe: Limit num_syncs to pre… | 2026-01-13T16:16:02.260 | 2026-01-14T16:26:00.933 |
| fkie_cve-2025-68801 | In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_router: Fix ne… | 2026-01-13T16:16:02.137 | 2026-01-14T16:26:00.933 |
| fkie_cve-2025-68800 | In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_mr: Fix use-af… | 2026-01-13T16:16:02.023 | 2026-01-14T16:26:00.933 |
| fkie_cve-2025-68799 | In the Linux kernel, the following vulnerability has been resolved: caif: fix integer underflow in… | 2026-01-13T16:16:01.907 | 2026-01-14T16:26:00.933 |
| fkie_cve-2025-68798 | In the Linux kernel, the following vulnerability has been resolved: perf/x86/amd: Check event befo… | 2026-01-13T16:16:01.770 | 2026-01-14T16:26:00.933 |
| fkie_cve-2025-68797 | In the Linux kernel, the following vulnerability has been resolved: char: applicom: fix NULL point… | 2026-01-13T16:16:01.660 | 2026-01-14T16:26:00.933 |
| fkie_cve-2025-68796 | In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid updating ze… | 2026-01-13T16:16:01.540 | 2026-01-14T16:26:00.933 |
| fkie_cve-2025-68795 | In the Linux kernel, the following vulnerability has been resolved: ethtool: Avoid overflowing use… | 2026-01-13T16:16:01.420 | 2026-01-14T16:26:00.933 |
| fkie_cve-2025-68794 | In the Linux kernel, the following vulnerability has been resolved: iomap: adjust read range corre… | 2026-01-13T16:16:01.310 | 2026-01-14T16:26:00.933 |
| fkie_cve-2025-68793 | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix a job->pasid a… | 2026-01-13T16:16:01.197 | 2026-01-14T16:26:00.933 |
| fkie_cve-2025-68791 | In the Linux kernel, the following vulnerability has been resolved: fuse: missing copy_finish in f… | 2026-01-13T16:16:00.987 | 2026-01-14T16:26:00.933 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-3wcf-2vw2-33qp |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: hv_netvsc: Fix panic during na… | 2025-09-05T18:31:15Z | 2026-01-09T00:30:27Z |
| ghsa-pc9j-5v36-2mww |
3.7 (3.1)
|
AWS SDK for Swift adopted defense in depth enhancement for region parameter value | 2026-01-08T22:12:15Z | 2026-01-08T22:12:15Z |
| ghsa-j965-2qgj-vjmq |
3.7 (3.1)
|
JavaScript SDK v2 users should add validation to the region parameter value in or migrate to v3 | 2026-01-08T22:04:26Z | 2026-01-08T22:04:26Z |
| ghsa-6475-r3vj-m8vf |
3.7 (3.1)
|
AWS SDK for JavaScript v3 adopted defense in depth enhancement for region parameter value | 2026-01-08T21:52:45Z | 2026-01-08T21:52:45Z |
| ghsa-mcmc-2m55-j8jj |
8.8 (3.1)
|
vLLM introduced enhanced protection for CVE-2025-62164 | 2026-01-08T21:47:43Z | 2026-01-08T21:47:43Z |
| ghsa-g59m-gf8j-gjf5 |
3.7 (3.1)
|
AWS SDK for Rust v1 adopted defense in depth enhancement for region parameter value | 2026-01-08T21:46:19Z | 2026-01-08T21:46:23Z |
| ghsa-rjf8-2wcw-f6mp |
8.8 (3.1)
|
Salvo is vulnerable to reflected XSS in the list_html function | 2026-01-08T21:22:18Z | 2026-01-08T21:37:17Z |
| ghsa-54m3-5fxr-2f3j |
8.8 (3.1)
|
Salvo is vulnerable to stored XSS in the list_html function by uploading files with malicious names | 2026-01-08T21:16:41Z | 2026-01-08T21:37:13Z |
| ghsa-6jm8-x3g6-r33j |
5.4 (3.1)
|
Soft Serve is missing an authorization check in LFS lock deletion | 2026-01-08T21:01:54Z | 2026-01-08T21:37:08Z |
| ghsa-87hc-h4r5-73f7 |
6.3 (4.0)
|
Werkzeug safe_join() allows Windows special device names with compound extensions | 2026-01-08T19:51:21Z | 2026-01-08T21:36:59Z |
| ghsa-mqhg-v22x-pqj8 |
8.8 (3.1)
7.4 (4.0)
|
Bagisto is vulnerable to SSTI via name parameters provided by non-admin low-privilege users | 2026-01-02T22:51:40Z | 2026-01-08T21:36:05Z |
| ghsa-5j4h-4f72-qpm6 |
9.8 (3.1)
8.9 (4.0)
|
Bagisto has Normal & Blind SSTI from low-privilege user when ordering product | 2026-01-02T22:13:40Z | 2026-01-08T21:35:56Z |
| ghsa-mrj3-f2h4-7w45 |
4.2 (3.1)
|
Saleor: Customers' addresses leak when using Warehouse as a `Pickup: Local stock only` delivery method | 2024-03-28T17:52:17Z | 2026-01-08T21:35:17Z |
| ghsa-6h7w-v2xr-mqvw |
9.8 (3.1)
8.8 (4.0)
|
Bagisto Missing Authentication on Installer API Endpoints | 2026-01-02T21:14:06Z | 2026-01-08T21:35:01Z |
| ghsa-g9jg-w8vm-g96v |
4.6 (3.1)
|
Trix has a stored XSS vulnerability through its attachment attribute | 2025-12-31T22:07:25Z | 2026-01-08T21:34:41Z |
| ghsa-xp5p-5cr9-v76h |
6.1 (3.1)
|
Cross-Site Scripting (XSS) is present on the LoginID parameter on the /PSP/app/web/reg/reg_display.… | 2026-01-08T18:30:50Z | 2026-01-08T21:30:34Z |
| ghsa-wgp2-94gx-4mrv |
8.1 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-01-08T12:30:30Z | 2026-01-08T21:30:34Z |
| ghsa-vj27-g5qj-m2px |
9.8 (3.1)
|
indieka900 online-shopping-system-php 1.0 is vulnerable to SQL Injection in master/review_action.ph… | 2026-01-08T18:30:49Z | 2026-01-08T21:30:34Z |
| ghsa-vcqr-rc2q-63p5 |
9.4 (3.1)
|
The snailjob component in RuoYi-Vue-Plus versions 5.5.1 and earlier, interface /snail-job/workflow/… | 2026-01-08T21:30:34Z | 2026-01-08T21:30:34Z |
| ghsa-v3c6-jjjc-q3q2 |
8.1 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-01-08T12:30:30Z | 2026-01-08T21:30:34Z |
| ghsa-pm7p-9hjx-x5hq |
3.3 (3.1)
|
Exposure of sensitive information in the TeamViewer entry dashboard component in Devolutions Remote… | 2026-01-08T21:30:34Z | 2026-01-08T21:30:34Z |
| ghsa-pgxq-gj96-mq7g |
7.5 (3.1)
|
Plesk Obsidian versions 8.0.1 through 18.0.73 are vulnerable to a Denial of Service (DoS) condition… | 2026-01-08T21:30:34Z | 2026-01-08T21:30:34Z |
| ghsa-p898-wg6q-9r89 |
5.4 (3.1)
|
Cross-Site Scripting (XSS) is present on the ctl00_Content01_fieldValue parameters on the /psp/appN… | 2026-01-08T18:30:50Z | 2026-01-08T21:30:34Z |
| ghsa-jvq3-99wq-j8xq |
9.8 (3.1)
|
Unrestricted file upload in the hotel review feature in QloApps versions 1.7.0 and earlier allows r… | 2026-01-08T21:30:34Z | 2026-01-08T21:30:34Z |
| ghsa-hmrc-7mh9-vqh3 |
8.4 (3.1)
|
KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 enable the SSH service enabled by default on the L… | 2026-01-08T21:30:34Z | 2026-01-08T21:30:34Z |
| ghsa-f67m-8h88-qhqh |
7.5 (3.1)
|
An issue in Technitium DNS Server v.13.5 allows a remote attacker to cause a denial of service via … | 2026-01-08T18:30:49Z | 2026-01-08T21:30:34Z |
| ghsa-cxh9-hv5q-j837 |
6.8 (3.1)
|
Cross-Site Request Forgery (CSRF) is present on all functions in edu Business Solutions Print Shop … | 2026-01-08T18:30:49Z | 2026-01-08T21:30:34Z |
| ghsa-cmg3-gm9c-7wj9 |
8.1 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-01-08T12:30:30Z | 2026-01-08T21:30:34Z |
| ghsa-cm78-g9rj-2vvv |
8.1 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-01-08T12:30:30Z | 2026-01-08T21:30:34Z |
| ghsa-82hr-pf96-mj72 |
9.8 (3.1)
|
SQL Injection is present on the hfInventoryDistFormID parameter in the /PSP/appNET/Store/CartV12.as… | 2026-01-08T18:30:49Z | 2026-01-08T21:30:34Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-603 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-13T00:15:00Z | 2021-12-09T06:35:06.680335Z |
| pysec-2021-602 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:06.599796Z |
| pysec-2021-601 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:06.517637Z |
| pysec-2021-600 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:06.437026Z |
| pysec-2021-599 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:06.351462Z |
| pysec-2021-598 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:06.268797Z |
| pysec-2021-597 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:06.188810Z |
| pysec-2021-596 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:06.073182Z |
| pysec-2021-595 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:05.976648Z |
| pysec-2021-594 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:05.896757Z |
| pysec-2021-593 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:05.816233Z |
| pysec-2021-592 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:05.737030Z |
| pysec-2021-591 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:05.654112Z |
| pysec-2021-590 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:05.572307Z |
| pysec-2021-589 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:05.480275Z |
| pysec-2021-588 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:05.402350Z |
| pysec-2021-587 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:05.322708Z |
| pysec-2021-586 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:05.237190Z |
| pysec-2021-585 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:05.144273Z |
| pysec-2021-584 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:05.048687Z |
| pysec-2021-583 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:04.970183Z |
| pysec-2021-582 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:04.885089Z |
| pysec-2021-581 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:04.799643Z |
| pysec-2021-580 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:04.699565Z |
| pysec-2021-579 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:04.618744Z |
| pysec-2021-578 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:04.523711Z |
| pysec-2021-577 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:04.439609Z |
| pysec-2021-576 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T23:15:00Z | 2021-12-09T06:35:04.358938Z |
| pysec-2021-575 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:04.272005Z |
| pysec-2021-574 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T21:15:00Z | 2021-12-09T06:35:04.173783Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-32637 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.746922Z |
| gsd-2024-32636 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.734385Z |
| gsd-2024-32635 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.875136Z |
| gsd-2024-32634 | In huge memory get unmapped area check, code can never be reached because of a logical co… | 2024-04-17T05:01:56.786326Z |
| gsd-2024-32633 | An unsigned value can never be negative, so eMMC full disk test will always evaluate the … | 2024-04-17T05:01:56.911843Z |
| gsd-2024-32632 | A value in ATCMD will be misinterpreted by printf, causing incorrect output and possibly … | 2024-04-17T05:01:56.874071Z |
| gsd-2024-32631 | Out-of-Bounds read in ciCCIOTOPT in ASR180X will cause incorrect computations. | 2024-04-17T05:01:56.850009Z |
| gsd-2024-32630 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.788485Z |
| gsd-2024-32629 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.745948Z |
| gsd-2024-32628 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.921845Z |
| gsd-2024-32627 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.790643Z |
| gsd-2024-32626 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.745742Z |
| gsd-2024-32625 | In OffloadAMRWriter, a scalar field is not initialized so will contain an arbitrary value… | 2024-04-17T05:01:56.808008Z |
| gsd-2024-32624 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.752708Z |
| gsd-2024-32623 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.735689Z |
| gsd-2024-32622 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.759963Z |
| gsd-2024-32621 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.806292Z |
| gsd-2024-32620 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.763957Z |
| gsd-2024-32619 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.826672Z |
| gsd-2024-32618 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.814307Z |
| gsd-2024-32617 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.777069Z |
| gsd-2024-32616 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.883715Z |
| gsd-2024-32615 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.879864Z |
| gsd-2024-32614 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.882434Z |
| gsd-2024-32613 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.903371Z |
| gsd-2024-32612 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.740949Z |
| gsd-2024-32611 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.751442Z |
| gsd-2024-32610 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.870487Z |
| gsd-2024-32609 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.830655Z |
| gsd-2024-32608 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-17T05:01:56.871839Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2025-49441 | Malicious code in superbankxmlparser (npm) | 2025-11-09T00:17:09Z | 2025-12-24T10:09:30Z |
| MAL-2025-49439 | Malicious code in study-lab-npm-test (npm) | 2025-11-09T00:17:09Z | 2025-12-24T10:09:30Z |
| MAL-2025-49435 | Malicious code in something-not-in-cache (npm) | 2025-11-09T00:17:09Z | 2025-12-24T10:09:30Z |
| MAL-2025-49383 | Malicious code in rce-poc-test-honor-mcp (npm) | 2025-11-07T04:05:52Z | 2025-12-24T10:09:30Z |
| MAL-2025-49382 | Malicious code in rce-poc-test-honor-dev (npm) | 2025-11-07T04:05:52Z | 2025-12-24T10:09:30Z |
| MAL-2025-49376 | Malicious code in solara-websocket-dll (npm) | 2025-11-05T23:23:27Z | 2025-12-24T10:09:30Z |
| MAL-2025-49368 | Malicious code in react-tmedia (npm) | 2025-11-05T23:18:22Z | 2025-12-24T10:09:30Z |
| MAL-2025-48551 | Malicious code in react-medias (npm) | 2025-10-22T02:05:10Z | 2025-12-24T10:09:30Z |
| MAL-2025-48536 | Malicious code in reactify-utils (npm) | 2025-10-21T06:21:28Z | 2025-12-24T10:09:30Z |
| MAL-2025-192639 | Malicious code in smm-youtube (npm) | 2025-12-19T08:41:06Z | 2025-12-24T10:09:30Z |
| MAL-2025-192595 | Malicious code in smart-utils-alice (npm) | 2025-12-16T07:05:11Z | 2025-12-24T10:09:30Z |
| MAL-2025-192583 | Malicious code in swissid-common (npm) | 2025-12-16T06:23:05Z | 2025-12-24T10:09:30Z |
| MAL-2025-192577 | Malicious code in sd-skbms (npm) | 2025-12-15T07:33:11Z | 2025-12-24T10:09:30Z |
| MAL-2025-192576 | Malicious code in sd-security (npm) | 2025-12-15T07:33:11Z | 2025-12-24T10:09:30Z |
| MAL-2025-192566 | Malicious code in shopify-monorail (npm) | 2025-12-12T06:31:00Z | 2025-12-24T10:09:30Z |
| MAL-2025-192565 | Malicious code in sdbao-content-sems (npm) | 2025-12-12T06:34:05Z | 2025-12-24T10:09:30Z |
| MAL-2025-192564 | Malicious code in sdbao-content-report (npm) | 2025-12-12T06:34:05Z | 2025-12-24T10:09:30Z |
| MAL-2025-192563 | Malicious code in sd-pay-ts (npm) | 2025-12-12T06:34:06Z | 2025-12-24T10:09:30Z |
| MAL-2025-192562 | Malicious code in sd-pay (npm) | 2025-12-12T06:34:06Z | 2025-12-24T10:09:30Z |
| MAL-2025-192417 | Malicious code in rum-events-format (npm) | 2025-12-10T01:57:45Z | 2025-12-24T10:09:30Z |
| MAL-2025-192401 | Malicious code in serval-integrations-common-frontend (npm) | 2025-12-10T01:43:51Z | 2025-12-24T10:09:30Z |
| MAL-2025-192315 | Malicious code in seeds-random (npm) | 2025-12-05T03:03:24Z | 2025-12-24T10:09:30Z |
| MAL-2025-191595 | Malicious code in tailwindcss-forms (npm) | 2025-12-01T13:26:48Z | 2025-12-24T10:09:30Z |
| MAL-2025-191594 | Malicious code in tailwind-style-override (npm) | 2025-12-01T13:26:47Z | 2025-12-24T10:09:30Z |
| MAL-2025-191593 | Malicious code in tailwind-state (npm) | 2025-12-01T13:26:43Z | 2025-12-24T10:09:30Z |
| MAL-2025-191588 | Malicious code in stringify-coder (npm) | 2025-12-01T13:26:20Z | 2025-12-24T10:09:30Z |
| MAL-2025-191586 | Malicious code in session-validate (npm) | 2025-12-01T13:25:08Z | 2025-12-24T10:09:30Z |
| MAL-2025-191582 | Malicious code in react-mandes (npm) | 2025-12-01T13:22:29Z | 2025-12-24T10:09:30Z |
| MAL-2025-191581 | Malicious code in react-adparser (npm) | 2025-12-01T13:22:08Z | 2025-12-24T10:09:30Z |
| MAL-2025-191503 | Malicious code in start-internal (npm) | 2025-12-01T16:00:47Z | 2025-12-24T10:09:30Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-3627 | IBM App Connect Enterprise: Schwachstelle ermöglicht Codeausführung | 2024-12-05T23:00:00.000+00:00 | 2025-05-08T22:00:00.000+00:00 |
| wid-sec-w-2025-0984 | SonicWall SMA: Mehrere Schwachstellen | 2025-05-07T22:00:00.000+00:00 | 2025-05-07T22:00:00.000+00:00 |
| wid-sec-w-2025-0983 | Cisco IOS XE SD-WAN Software: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-05-07T22:00:00.000+00:00 | 2025-05-07T22:00:00.000+00:00 |
| wid-sec-w-2025-0982 | GitLab: Mehrere Schwachstellen | 2025-05-07T22:00:00.000+00:00 | 2025-05-07T22:00:00.000+00:00 |
| wid-sec-w-2025-0980 | Cisco IOS, IOS XE und IOS XR (TWAMP): Schwachstelle ermöglicht Denial of Service | 2025-05-07T22:00:00.000+00:00 | 2025-05-07T22:00:00.000+00:00 |
| wid-sec-w-2025-0979 | Cisco IOS XE Software: Mehrere Schwachstellen | 2025-05-07T22:00:00.000+00:00 | 2025-05-07T22:00:00.000+00:00 |
| wid-sec-w-2025-0977 | Cisco IOS XE Software Web-Based Management Interface: Mehrere Schwachstellen | 2025-05-07T22:00:00.000+00:00 | 2025-05-07T22:00:00.000+00:00 |
| wid-sec-w-2025-0976 | Cisco IOS und Cisco IOS XE: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-05-07T22:00:00.000+00:00 | 2025-05-07T22:00:00.000+00:00 |
| wid-sec-w-2025-0974 | Cisco Industrial Ethernet Switches IOS/IOx Management Software: Mehrere Schwachstellen | 2025-05-07T22:00:00.000+00:00 | 2025-05-07T22:00:00.000+00:00 |
| wid-sec-w-2025-0973 | Cisco IOS XE Software for Cisco ASR 903 Aggregation Services Routers: Schwachstelle ermöglicht Denial of Service | 2025-05-07T22:00:00.000+00:00 | 2025-05-07T22:00:00.000+00:00 |
| wid-sec-w-2025-0972 | Cisco IOS-Software für Cisco Catalyst Switches: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2025-05-07T22:00:00.000+00:00 | 2025-05-07T22:00:00.000+00:00 |
| wid-sec-w-2025-0970 | Cisco IOS XE Software for WLC Wireless IPv6 Clients: Schwachstelle ermöglicht Denial of Service | 2025-05-07T22:00:00.000+00:00 | 2025-05-07T22:00:00.000+00:00 |
| wid-sec-w-2025-0969 | Cisco IOS, IOS XE, NX-OS and WLC AireOS Software (SISF): Schwachstelle ermöglicht Denial of Service | 2025-05-07T22:00:00.000+00:00 | 2025-05-07T22:00:00.000+00:00 |
| wid-sec-w-2025-0968 | Cisco ASA, FTD, IOS und IOS XE Software (IKEv2): Schwachstelle ermöglicht Denial of Service | 2025-05-07T22:00:00.000+00:00 | 2025-05-07T22:00:00.000+00:00 |
| wid-sec-w-2025-0965 | Cisco Catalyst Center: Mehrere Schwachstellen ermöglichen Manipulation von Dateien | 2025-05-07T22:00:00.000+00:00 | 2025-05-07T22:00:00.000+00:00 |
| wid-sec-w-2025-0961 | libTIFF: Schwachstelle ermöglicht Codeausführung | 2017-12-03T23:00:00.000+00:00 | 2025-05-07T22:00:00.000+00:00 |
| wid-sec-w-2024-3688 | Red Hat Enterprise Linux (Ceph Storage): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-12-11T23:00:00.000+00:00 | 2025-05-07T22:00:00.000+00:00 |
| wid-sec-w-2024-2183 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Darstellen falscher Informationen | 2024-09-18T22:00:00.000+00:00 | 2025-05-07T22:00:00.000+00:00 |
| wid-sec-w-2023-2544 | X.Org X11: Mehrere Schwachstellen | 2023-10-03T22:00:00.000+00:00 | 2025-05-07T22:00:00.000+00:00 |
| wid-sec-w-2023-0402 | xpdf: Mehrere Schwachstellen ermöglichen Denial of Service | 2023-02-15T23:00:00.000+00:00 | 2025-05-07T22:00:00.000+00:00 |
| wid-sec-w-2025-0960 | Samsung Android: Mehrere Schwachstellen | 2025-05-06T22:00:00.000+00:00 | 2025-05-06T22:00:00.000+00:00 |
| wid-sec-w-2025-0957 | Dell PowerScale: Mehrere Schwachstellen | 2025-05-06T22:00:00.000+00:00 | 2025-05-06T22:00:00.000+00:00 |
| wid-sec-w-2025-0955 | OpenCTI: Schwachstelle ermöglicht Codeausführung | 2025-05-06T22:00:00.000+00:00 | 2025-05-06T22:00:00.000+00:00 |
| wid-sec-w-2025-0952 | LogStash: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-05-06T22:00:00.000+00:00 | 2025-05-06T22:00:00.000+00:00 |
| wid-sec-w-2025-0951 | Red Hat Enterprise Linux AI (HDF5): Mehrere Schwachstellen | 2025-05-06T22:00:00.000+00:00 | 2025-05-06T22:00:00.000+00:00 |
| wid-sec-w-2025-0950 | Liferay Liferay DXP: Schwachstelle ermöglicht Cross-Site Scripting | 2025-05-06T22:00:00.000+00:00 | 2025-05-06T22:00:00.000+00:00 |
| wid-sec-w-2025-0949 | Pixel Patchday Mai 2025: Mehrere Schwachstellen | 2025-05-06T22:00:00.000+00:00 | 2025-05-06T22:00:00.000+00:00 |
| wid-sec-w-2025-0948 | Kibana: Schwachstelle ermöglicht Codeausführung | 2025-05-06T22:00:00.000+00:00 | 2025-05-06T22:00:00.000+00:00 |
| wid-sec-w-2025-0947 | Ubiquiti UniFi (Protect Cameras und Application): Mehrere Schwachstellen | 2025-05-06T22:00:00.000+00:00 | 2025-05-06T22:00:00.000+00:00 |
| wid-sec-w-2025-0946 | Arista EOS: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-05-06T22:00:00.000+00:00 | 2025-05-06T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2024:1676 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.16 Security update | 2024-04-04T15:23:45+00:00 | 2026-01-15T10:13:58+00:00 |
| rhsa-2024:1675 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.16 Security update | 2024-04-04T15:23:50+00:00 | 2026-01-15T10:13:57+00:00 |
| rhsa-2024:1674 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.16 Security update | 2024-04-04T15:23:51+00:00 | 2026-01-15T10:13:56+00:00 |
| rhsa-2024:1557 | Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift Builds 1.0.1 | 2024-03-28T05:31:12+00:00 | 2026-01-15T10:13:55+00:00 |
| rhsa-2024:1197 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 security update | 2024-03-06T17:52:22+00:00 | 2026-01-15T10:13:52+00:00 |
| rhsa-2024:1383 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.15.0 security, enhancement, & bug fix update | 2024-03-19T15:19:34+00:00 | 2026-01-15T10:13:50+00:00 |
| rhsa-2024:1210 | Red Hat Security Advisory: OpenShift Container Platform 4.15.2 bug fix and security update | 2024-03-13T15:31:52+00:00 | 2026-01-15T10:13:50+00:00 |
| rhsa-2024:1196 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 security update | 2024-03-06T17:58:21+00:00 | 2026-01-15T10:13:48+00:00 |
| rhsa-2024:1194 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.1 security update | 2024-03-06T15:38:13+00:00 | 2026-01-15T10:13:48+00:00 |
| rhsa-2024:1193 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.1 security update | 2024-03-06T15:32:21+00:00 | 2026-01-15T10:13:47+00:00 |
| rhsa-2024:1192 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.1 security update | 2024-03-06T15:32:30+00:00 | 2026-01-15T10:13:47+00:00 |
| rhsa-2024:1150 | Red Hat Security Advisory: buildah security update | 2024-03-05T18:16:47+00:00 | 2026-01-15T10:13:46+00:00 |
| rhsa-2024:1130 | Red Hat Security Advisory: openssh security update | 2024-03-05T18:18:29+00:00 | 2026-01-15T10:13:45+00:00 |
| rhsa-2024:0880 | Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.31.1 security update | 2024-02-20T11:06:07+00:00 | 2026-01-15T10:13:37+00:00 |
| rhsa-2024:0843 | Red Hat Security Advisory: Release of OpenShift Serverless 1.31.1 | 2024-02-15T12:55:28+00:00 | 2026-01-15T10:13:34+00:00 |
| rhsa-2024:0789 | Red Hat Security Advisory: Red Hat Build of Apache Camel 4.0 for Quarkus 3.2 release (RHBQ 3.2.10.Final) | 2024-02-12T16:02:02+00:00 | 2026-01-15T10:13:33+00:00 |
| rhsa-2024:0628 | Red Hat Security Advisory: libssh security update | 2024-01-31T08:48:54+00:00 | 2026-01-15T10:13:26+00:00 |
| rhsa-2024:0625 | Red Hat Security Advisory: libssh security update | 2024-01-31T08:36:02+00:00 | 2026-01-15T10:13:25+00:00 |
| rhsa-2024:0606 | Red Hat Security Advisory: openssh security update | 2024-01-30T14:59:23+00:00 | 2026-01-15T10:13:24+00:00 |
| rhsa-2024:0594 | Red Hat Security Advisory: openssh security update | 2024-01-30T14:13:55+00:00 | 2026-01-15T10:13:23+00:00 |
| rhsa-2024:0538 | Red Hat Security Advisory: libssh security update | 2024-01-29T11:50:44+00:00 | 2026-01-15T10:13:22+00:00 |
| rhsa-2024:0499 | Red Hat Security Advisory: libssh security update | 2024-01-25T15:36:48+00:00 | 2026-01-15T10:13:20+00:00 |
| rhsa-2024:0455 | Red Hat Security Advisory: openssh security update | 2024-01-25T09:21:45+00:00 | 2026-01-15T10:13:18+00:00 |
| rhsa-2024:0429 | Red Hat Security Advisory: openssh security update | 2024-01-25T08:14:09+00:00 | 2026-01-15T10:13:17+00:00 |
| rhsa-2023:2161 | Red Hat Security Advisory: fence-agents security and bug fix update | 2023-05-09T09:50:25+00:00 | 2026-01-15T10:11:17+00:00 |
| rhba-2024:1136 | Red Hat Bug Fix Advisory: podman bug fix update | 2024-03-05T20:05:51+00:00 | 2026-01-15T10:11:00+00:00 |
| rhba-2024:1127 | Red Hat Bug Fix Advisory: libssh bug fix update | 2024-03-05T18:22:05+00:00 | 2026-01-15T10:10:59+00:00 |
| rhsa-2026:0482 | Red Hat Security Advisory: binutils security update | 2026-01-12T21:33:28+00:00 | 2026-01-15T10:05:25+00:00 |
| rhsa-2026:0481 | Red Hat Security Advisory: binutils security update | 2026-01-12T21:33:43+00:00 | 2026-01-15T10:05:24+00:00 |
| rhsa-2026:0480 | Red Hat Security Advisory: binutils security update | 2026-01-12T21:21:24+00:00 | 2026-01-15T10:05:23+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-24-135-01 | Rockwell Automation FactoryTalk Remote Access | 2024-05-14T06:00:00.000000Z | 2024-05-14T06:00:00.000000Z |
| icsa-24-137-12 | Siemens Desigo Fire Safety UL and Cerberus PRO UL Fire Protection Systems | 2024-05-14T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-24-137-11 | Siemens RUGGEDCOM APE1808 | 2024-05-14T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-24-137-10 | Siemens RUGGEDCOM CROSSBOW | 2024-05-14T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-24-137-09 | Siemens Solid Edge | 2024-05-14T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-24-137-08 | Siemens PS/IGES Parasolid Translator Component | 2024-05-14T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-24-137-06 | Siemens SIMATIC CN 4100 | 2024-05-14T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-24-137-05 | Siemens Simcenter Nastran | 2024-05-14T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-24-137-04 | Siemens Polarion ALM | 2024-05-14T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-24-137-03 | Siemens Teamcenter Visualization and JT2Go | 2024-05-14T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-24-137-01 | Siemens Parasolid | 2024-05-14T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-24-074-09 | Siemens Sinteso EN Cerberus PRO EN Fire Protection Systems | 2024-03-12T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-24-074-02 | Siemens Solid Edge | 2024-03-12T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-24-046-14 | Siemens Polarion ALM | 2024-02-13T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-24-046-08 | Siemens RUGGEDCOM APE1808 | 2024-02-13T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-23-348-09 | Siemens Simantic S7-1500 CPU family | 2023-12-12T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-23-320-14 | Siemens RUGGEDCOM APE1808 Devices | 2023-11-14T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-23-285-07 | Siemens RUGGEDCOM APE180 | 2023-10-10T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-23-257-06 | Siemans WIBU Systems CodeMeter | 2023-09-12T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-23-166-08 | Siemens SIMATIC STEP 7 and Derived Products | 2023-06-13T00:00:00.000000Z | 2024-05-14T00:00:00.000000Z |
| icsa-24-130-03 | Delta Electronics InfraSuite Device Master | 2024-05-09T06:00:00.000000Z | 2024-05-09T06:00:00.000000Z |
| icsa-24-130-02 | alpitronic Hypercharger EV charger | 2024-05-09T06:00:00.000000Z | 2024-05-09T06:00:00.000000Z |
| icsa-24-130-01 | Rockwell Automation FactoryTalk Historian SE | 2024-05-09T06:00:00.000000Z | 2024-05-09T06:00:00.000000Z |
| icsa-24-107-03 | Rockwell Automation ControlLogix and GuardLogix (Update A) | 2024-04-16T06:00:00.000000Z | 2024-05-09T06:00:00.000000Z |
| icsa-24-128-02 | SUBNET Substation Server | 2024-05-07T06:00:00.000000Z | 2024-05-07T06:00:00.000000Z |
| icsa-24-128-01 | PTC Codebeamer | 2024-05-07T06:00:00.000000Z | 2024-05-07T06:00:00.000000Z |
| icsa-24-123-02 | Delta Electronics DIAEnergie | 2024-05-02T06:00:00.000000Z | 2024-05-02T06:00:00.000000Z |
| icsa-24-067-01 | Chirp Systems Chirp Access (Update C) | 2024-03-07T07:00:00.000000Z | 2024-05-02T06:00:00.000000Z |
| icsa-24-354-02 | Hitachi Energy SDM600 | 2024-04-30T12:30:00.000000Z | 2024-04-30T12:30:00.000000Z |
| icsa-24-109-01 | Unitronics Vision Legacy series (Update A) | 2024-04-18T06:00:00.000000Z | 2024-04-30T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-capic-scss-bft75yrm | Cisco Application Policy Infrastructure Controller Stored Cross-Site Scripting Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-capic-scss-bFT75YrM | Cisco Application Policy Infrastructure Controller Stored Cross-Site Scripting Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-capic-pesc-pkmgk4j | Cisco Application Policy Infrastructure Controller Privilege Escalation Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-capic-pesc-pkmGK4J | Cisco Application Policy Infrastructure Controller Privilege Escalation Vulnerability | 2021-08-25T16:00:00+00:00 | 2021-08-25T16:00:00+00:00 |
| cisco-sa-20190515-nxos-pyth-escal | Cisco NX-OS Software Python Parser Privilege Escalation Vulnerability | 2019-05-15T16:00:00+00:00 | 2021-08-25T15:49:16+00:00 |
| cisco-sa-qnx-toxjvpdl | BlackBerry QNX-2021-001 Vulnerability Affecting Cisco Products: August 2021 | 2021-08-18T16:00:00+00:00 | 2021-08-25T14:44:04+00:00 |
| cisco-sa-qnx-TOxjVPdL | BlackBerry QNX-2021-001 Vulnerability Affecting Cisco Products: August 2021 | 2021-08-18T16:00:00+00:00 | 2021-08-25T14:44:04+00:00 |
| cisco-sa-sma-spam-jpxuxmk | Cisco Secure Email and Web Manager Spam Quarantine Unauthorized Access Vulnerability | 2021-08-18T16:00:00+00:00 | 2021-08-18T16:00:00+00:00 |
| cisco-sa-sma-spam-jPxUXMk | Cisco Secure Email and Web Manager Spam Quarantine Unauthorized Access Vulnerability | 2021-08-18T16:00:00+00:00 | 2021-08-18T16:00:00+00:00 |
| cisco-sa-ipcamera-lldp-dos-ofp7j9j | Cisco Video Surveillance 7000 Series IP Cameras Link Layer Discovery Protocol Double-Free Denial of Service Vulnerability | 2021-08-18T16:00:00+00:00 | 2021-08-18T16:00:00+00:00 |
| cisco-sa-ipcamera-lldp-dos-OFP7j9j | Cisco Video Surveillance 7000 Series IP Cameras Link Layer Discovery Protocol Double-Free Denial of Service Vulnerability | 2021-08-18T16:00:00+00:00 | 2021-08-18T16:00:00+00:00 |
| cisco-sa-ewver-c6wzpxrx | Cisco Expressway Series and TelePresence Video Communication Server Image Verification Vulnerability | 2021-08-18T16:00:00+00:00 | 2021-08-18T16:00:00+00:00 |
| cisco-sa-ewver-c6WZPXRx | Cisco Expressway Series and TelePresence Video Communication Server Image Verification Vulnerability | 2021-08-18T16:00:00+00:00 | 2021-08-18T16:00:00+00:00 |
| cisco-sa-ewrce-qpynncjh | Cisco Expressway Series and TelePresence Video Communication Server Remote Code Execution Vulnerability | 2021-08-18T16:00:00+00:00 | 2021-08-18T16:00:00+00:00 |
| cisco-sa-ewrce-QPynNCjh | Cisco Expressway Series and TelePresence Video Communication Server Remote Code Execution Vulnerability | 2021-08-18T16:00:00+00:00 | 2021-08-18T16:00:00+00:00 |
| cisco-sa-cisco-sb-rv-overflow-htpymmb5 | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Remote Command Execution and Denial of Service Vulnerability | 2021-08-18T16:00:00+00:00 | 2021-08-18T16:00:00+00:00 |
| cisco-sa-cisco-sb-rv-overflow-htpymMB5 | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Remote Command Execution and Denial of Service Vulnerability | 2021-08-18T16:00:00+00:00 | 2021-08-18T16:00:00+00:00 |
| cisco-sa-ise-stored-xss-twwjvpdl | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities | 2021-07-07T16:00:00+00:00 | 2021-08-11T18:15:55+00:00 |
| cisco-sa-ise-stored-xss-TWwjVPdL | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerabilities | 2021-07-07T16:00:00+00:00 | 2021-08-11T18:15:55+00:00 |
| cisco-sa-rv340-cmdinj-rcedos-py8j3qfy | Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers Web Management Vulnerabilities | 2021-08-04T16:00:00+00:00 | 2021-08-04T16:00:00+00:00 |
| cisco-sa-rv340-cmdinj-rcedos-pY8J3qfy | Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers Web Management Vulnerabilities | 2021-08-04T16:00:00+00:00 | 2021-08-04T16:00:00+00:00 |
| cisco-sa-rv-code-execution-9uvjr7k4 | Cisco Small Business RV160 and RV260 Series VPN Routers Remote Command Execution Vulnerability | 2021-08-04T16:00:00+00:00 | 2021-08-04T16:00:00+00:00 |
| cisco-sa-rv-code-execution-9UVJr7k4 | Cisco Small Business RV160 and RV260 Series VPN Routers Remote Command Execution Vulnerability | 2021-08-04T16:00:00+00:00 | 2021-08-04T16:00:00+00:00 |
| cisco-sa-packettracer-dll-inj-qv8mk5jx | Cisco Packet Tracer for Windows DLL Injection Vulnerability | 2021-08-04T16:00:00+00:00 | 2021-08-04T16:00:00+00:00 |
| cisco-sa-packettracer-dll-inj-Qv8Mk5Jx | Cisco Packet Tracer for Windows DLL Injection Vulnerability | 2021-08-04T16:00:00+00:00 | 2021-08-04T16:00:00+00:00 |
| cisco-sa-epnm-info-disc-pjtz5r6c | Cisco Evolved Programmable Network Manager Sensitive Information Disclosure Vulnerability | 2021-08-04T16:00:00+00:00 | 2021-08-04T16:00:00+00:00 |
| cisco-sa-epnm-info-disc-PjTZ5r6C | Cisco Evolved Programmable Network Manager Sensitive Information Disclosure Vulnerability | 2021-08-04T16:00:00+00:00 | 2021-08-04T16:00:00+00:00 |
| cisco-sa-cmx-gkcvfd4 | Cisco Connected Mobile Experiences Strong Authentication Requirements Enforcement Bypass | 2021-08-04T16:00:00+00:00 | 2021-08-04T16:00:00+00:00 |
| cisco-sa-cmx-GkCvfd4 | Cisco Connected Mobile Experiences Strong Authentication Requirements Enforcement Bypass | 2021-08-04T16:00:00+00:00 | 2021-08-04T16:00:00+00:00 |
| cisco-sa-rv-multi-lldp-u7e4chce | Cisco Small Business RV Series Routers Link Layer Discovery Protocol Vulnerabilities | 2021-04-07T16:00:00+00:00 | 2021-08-04T15:58:36+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2024-36920 | scsi: mpi3mr: Avoid memcpy field-spanning write WARNING | 2024-05-02T07:00:00.000Z | 2025-10-03T01:01:23.000Z |
| msrc_cve-2024-36244 | net/sched: taprio: extend minimum interval restriction to entire cycle too | 2024-06-02T07:00:00.000Z | 2025-10-03T01:01:17.000Z |
| msrc_cve-2025-39907 | mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer | 2025-10-02T00:00:00.000Z | 2025-10-02T01:08:00.000Z |
| msrc_cve-2025-39913 | tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork. | 2025-10-02T00:00:00.000Z | 2025-10-02T01:07:55.000Z |
| msrc_cve-2025-39920 | pcmcia: Add error handling for add_interval() in do_validate_mem() | 2025-10-02T00:00:00.000Z | 2025-10-02T01:07:50.000Z |
| msrc_cve-2025-39911 | i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path | 2025-10-02T00:00:00.000Z | 2025-10-02T01:07:45.000Z |
| msrc_cve-2023-53469 | af_unix: Fix null-ptr-deref in unix_stream_sendpage(). | 2025-10-02T00:00:00.000Z | 2025-10-02T01:07:32.000Z |
| msrc_cve-2025-39914 | tracing: Silence warning when chunk allocation fails in trace_pid_write | 2025-10-02T00:00:00.000Z | 2025-10-02T01:07:27.000Z |
| msrc_cve-2025-39898 | e1000e: fix heap overflow in e1000_set_eeprom | 2025-10-02T00:00:00.000Z | 2025-10-02T01:07:22.000Z |
| msrc_cve-2025-39923 | dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees | 2025-10-02T00:00:00.000Z | 2025-10-02T01:07:11.000Z |
| msrc_cve-2025-39916 | mm/damon/reclaim: avoid divide-by-zero in damon_reclaim_apply_parameters() | 2025-10-02T00:00:00.000Z | 2025-10-02T01:07:03.000Z |
| msrc_cve-2025-39902 | mm/slub: avoid accessing metadata when pointer is invalid in object_err() | 2025-10-02T00:00:00.000Z | 2025-10-02T01:06:58.000Z |
| msrc_cve-2025-39910 | mm/vmalloc, mm/kasan: respect gfp mask in kasan_populate_vmalloc() | 2025-10-02T00:00:00.000Z | 2025-10-02T01:06:52.000Z |
| msrc_cve-2025-39909 | mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters() | 2025-10-02T00:00:00.000Z | 2025-10-02T01:06:47.000Z |
| msrc_cve-2025-39891 | wifi: mwifiex: Initialize the chan_stats array to zero | 2025-10-02T00:00:00.000Z | 2025-10-02T01:06:37.000Z |
| msrc_cve-2025-39895 | sched: Fix sched_numa_find_nth_cpu() if mask offline | 2025-10-02T00:00:00.000Z | 2025-10-02T01:06:30.000Z |
| msrc_cve-2024-36911 | hv_netvsc: Don't free decrypted memory | 2024-05-02T07:00:00.000Z | 2025-10-02T01:06:20.000Z |
| msrc_cve-2024-36909 | Drivers: hv: vmbus: Don't free ring buffers that couldn't be re-encrypted | 2024-05-02T07:00:00.000Z | 2025-10-02T01:06:15.000Z |
| msrc_cve-2024-36900 | net: hns3: fix kernel crash when devlink reload during initialization | 2024-05-02T07:00:00.000Z | 2025-10-02T01:06:10.000Z |
| msrc_cve-2024-36021 | net: hns3: fix kernel crash when devlink reload during pf initialization | 2024-05-02T07:00:00.000Z | 2025-10-02T01:06:04.000Z |
| msrc_cve-2025-9232 | Out-of-bounds read in HTTP client no_proxy handling | 2025-09-02T00:00:00.000Z | 2025-10-02T01:05:50.000Z |
| msrc_cve-2025-9231 | Timing side-channel in SM2 algorithm on 64 bit ARM | 2025-09-02T00:00:00.000Z | 2025-10-02T01:05:45.000Z |
| msrc_cve-2025-46150 | In PyTorch before 2.7.0, when torch.compile is used, FractionalMaxPool2d has inconsistent results. | 2025-09-02T00:00:00.000Z | 2025-10-02T01:05:21.000Z |
| msrc_cve-2025-55557 | A Name Error occurs in pytorch v2.7.0 when a PyTorch model consists of torch.cummin and is compiled by Inductor, leading to a Denial of Service (DoS). | 2025-09-02T00:00:00.000Z | 2025-10-02T01:05:13.000Z |
| msrc_cve-2025-46149 | In PyTorch before 2.7.0, when inductor is used, nn.Fold has an assertion error. | 2025-09-02T00:00:00.000Z | 2025-10-02T01:05:06.000Z |
| msrc_cve-2025-46153 | PyTorch before 3.7.0 has a bernoulli_p decompose function in decompositions.py even though it lacks full consistency with the eager CPU implementation, negatively affecting nn.Dropout1d, nn.Dropout2d, and nn.Dropout3d for fallback_random=True. | 2025-09-02T00:00:00.000Z | 2025-10-02T01:04:57.000Z |
| msrc_cve-2025-11083 | GNU Binutils Linker elfcode.h elf_swap_shdr heap-based overflow | 2025-09-02T00:00:00.000Z | 2025-10-02T01:04:49.000Z |
| msrc_cve-2025-11082 | GNU Binutils Linker elf-eh-frame.c _bfd_elf_parse_eh_frame heap-based overflow | 2025-09-02T00:00:00.000Z | 2025-10-02T01:04:39.000Z |
| msrc_cve-2025-11081 | GNU Binutils objdump.c dump_dwarf_section out-of-bounds | 2025-09-02T00:00:00.000Z | 2025-10-02T01:04:20.000Z |
| msrc_cve-2024-42129 | leds: mlxreg: Use devm_mutex_init() for mutex initialization | 2024-07-01T07:00:00.000Z | 2025-10-02T01:04:12.000Z |
| ID | Description | Updated |
|---|---|---|
| var-200609-1335 | OpenSSL 0.9.7 before 0.9.7l and 0.9.8 before 0.9.8d allows remote attackers to cause a de… | 2024-06-11T21:44:28.628000Z |
| var-202308-0239 | A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Paraso… | 2024-06-11T21:37:33.070000Z |
| var-202107-1608 | Affected devices contain a vulnerability that allows an unauthenticated attacker to trigg… | 2024-06-11T21:23:54.270000Z |
| var-200609-1025 | The Security Framework in Apple Mac OS X 10.3.9, and 10.4.x before 10.4.7, does not prope… | 2024-06-11T21:00:15.795000Z |
| var-202311-0434 | Affected devices do not properly validate the length of inputs when performing certain co… | 2024-06-11T20:49:25.151000Z |
| var-202308-0235 | A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Paraso… | 2024-06-11T20:44:06.833000Z |
| var-202308-0236 | A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Paraso… | 2024-06-11T20:39:39.547000Z |
| var-202308-0242 | A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Paraso… | 2024-06-11T20:29:19.020000Z |
| var-202301-0605 | Affected devices do not contain an Immutable Root of Trust in Hardware. With this the int… | 2024-06-11T20:07:07.374000Z |
| var-202308-0237 | A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Paraso… | 2024-06-11T20:04:39.157000Z |
| var-202308-0234 | A vulnerability has been identified in Parasolid V34.1 (All versions < V34.1.258), Paraso… | 2024-06-11T19:29:50.522000Z |
| var-202101-0146 | A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) al… | 2024-06-10T23:02:24.713000Z |
| var-202401-1629 | Improper Restriction of Operations within the Bounds of a Memory Buffer in NetScaler ADC … | 2024-06-10T23:02:20.710000Z |
| var-202103-1564 | Netty is an open-source, asynchronous event-driven network application framework for rapi… | 2024-06-10T21:06:19.954000Z |
| var-200110-0175 | The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.… | 2024-06-10T20:51:29.701000Z |
| var-200609-0685 | The VPN service in Apple Mac OS X 10.3.x through 10.3.9 and 10.4.x through 10.4.8 does no… | 2024-06-10T20:21:01.994000Z |
| var-200405-0014 | Unknown vulnerability in the CUPS printing system in Mac OS X 10.3.3 and Mac OS X 10.2.8 … | 2024-06-09T23:16:08.911000Z |
| var-200407-0077 | Integer overflow in Apple QuickTime (QuickTime.qts) before 6.5.1 allows attackers to exec… | 2024-06-09T23:13:11.097000Z |
| var-200405-0015 | Unknown vulnerability in Mail for Mac OS X 10.3.3 and 10.2.8, with unknown impact, relate… | 2024-06-09T23:11:31.075000Z |
| var-200407-0052 | Argument injection vulnerability in the SSH URI handler for Safari on Mac OS 10.3.3 and e… | 2024-06-09T23:09:18.606000Z |
| var-200411-0076 | Unknown vulnerability in Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), ONS 1545… | 2024-06-09T23:07:21.196000Z |
| var-200411-0075 | Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), and ONS 15454 SD before 4.1(3) al… | 2024-06-09T23:07:21.165000Z |
| var-200411-0074 | Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), ONS 15454 SD before 4.1(3), and C… | 2024-06-09T23:07:21.232000Z |
| var-200408-0124 | HP Integrated Lights-Out (iLO) 1.10 and other versions before 1.55 allows remote attacker… | 2024-06-09T23:05:35.469000Z |
| var-200408-0090 | The "Show in Finder" button in the Safari web browser in Mac OS X 10.3.4 and 10.2.8 may e… | 2024-06-09T23:04:44.017000Z |
| var-200406-0041 | Cisco Wireless LAN Solution Engine (WLSE) 2.0 through 2.5 and Hosting Solution Engine (HS… | 2024-06-09T23:04:44.092000Z |
| var-200408-0089 | LaunchServices in Mac OS X 10.3.4 and 10.2.8 automatically registers and executes new app… | 2024-06-09T23:04:43.969000Z |
| var-200411-0149 | Cisco 11000 Series Content Services Switches (CSS) running WebNS 5.0(x) before 05.0(04.07… | 2024-06-09T23:01:32.729000Z |
| var-200408-0113 | Unknown vulnerability in AppleFileServer for Mac OS X 10.3.4, related to "the use of SSH … | 2024-06-09T22:57:27.818000Z |
| var-200408-0112 | Unknown vulnerability in Mac OS X 10.3.4, related to "handling of process IDs during pack… | 2024-06-09T22:57:27.883000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2016-000154 | Multiple AKABEi SOFT2 LTD. games vulnerable to OS command injection | 2016-08-31T15:33+09:00 | 2016-09-05T17:56+09:00 |
| jvndb-2016-000152 | simple chat vulnerable to cross-site scripting | 2016-08-23T13:37+09:00 | 2016-09-05T17:45+09:00 |
| jvndb-2016-000140 | ClipBucket vulnerable to cross-site scripting | 2016-08-18T14:09+09:00 | 2016-09-05T17:41+09:00 |
| jvndb-2015-000052 | Seasar S2Struts vulnerable to input validation bypass | 2015-04-10T14:38+09:00 | 2016-08-26T16:39+09:00 |
| jvndb-2015-000042 | The Validator in TERASOLUNA Server Framework for Java(WEB) vulnerable to input validation bypass | 2015-03-24T14:10+09:00 | 2016-08-26T16:37+09:00 |
| jvndb-2016-000123 | LINE for Windows may insecurely load Dynamic Link Libraries | 2016-07-08T14:29+09:00 | 2016-08-19T17:44+09:00 |
| jvndb-2016-000125 | WordPress plugin "Nofollow Links" vulnerable to cross-site scripting | 2016-07-20T14:56+09:00 | 2016-08-05T17:40+09:00 |
| jvndb-2016-000127 | Android stock browser vulnerable to denial-of-service (DoS) | 2016-08-05T13:41+09:00 | 2016-08-05T13:41+09:00 |
| jvndb-2016-000126 | Vtiger CRM does not properly restrict access to application data | 2016-07-20T14:56+09:00 | 2016-08-04T18:02+09:00 |
| jvndb-2016-000130 | EC-CUBE plugin "Coupon Plugin" vulnerable to SQL injection | 2016-07-25T11:15+09:00 | 2016-08-04T17:55+09:00 |
| jvndb-2016-000114 | Apache Struts vulnerable to denial-of-service (DoS) | 2016-06-20T16:36+09:00 | 2016-08-03T16:20+09:00 |
| jvndb-2016-000110 | Apache Struts vulnerable to remote code execution | 2016-06-20T16:36+09:00 | 2016-08-03T16:19+09:00 |
| jvndb-2016-002716 | Cross-site Scripting Vulnerability in Hitachi Tuning Manager | 2016-05-24T16:43+09:00 | 2016-08-03T16:09+09:00 |
| jvndb-2016-002715 | Information Disclosure Vulnerability in Hitachi Command Suite | 2016-05-24T16:43+09:00 | 2016-08-03T16:09+09:00 |
| jvndb-2016-000106 | Multiple Hikari Denwa routers vulnerable to cross-site request forgery | 2016-06-27T14:19+09:00 | 2016-08-03T16:07+09:00 |
| jvndb-2016-000105 | Multiple Hikari Denwa routers vulnerable to OS command injection | 2016-06-27T14:10+09:00 | 2016-08-03T16:07+09:00 |
| jvndb-2016-000119 | QNAP QTS vulnerable to cross-site scripting | 2016-06-27T13:48+09:00 | 2016-08-03T14:55+09:00 |
| jvndb-2016-000128 | Android OS Contacts app fails to restrict access permissions | 2016-07-25T11:14+09:00 | 2016-07-25T11:14+09:00 |
| jvndb-2016-000103 | Deep Discovery Inspector vulnerable to remote code execution | 2016-06-16T14:03+09:00 | 2016-07-12T15:03+09:00 |
| jvndb-2015-000190 | EC-CUBE plugin BbAdminViewsControl vulnerable to SQL injection | 2015-12-03T14:26+09:00 | 2016-07-07T14:53+09:00 |
| jvndb-2016-000116 | WordPress plugin "Welcart e-Commerce" vulnerable to cross-site scripting | 2016-06-24T13:43+09:00 | 2016-06-29T16:05+09:00 |
| jvndb-2016-000115 | WordPress plugin "Welcart e-Commerce" vulnerable to PHP object injection | 2016-06-24T13:43+09:00 | 2016-06-29T16:04+09:00 |
| jvndb-2016-000109 | CG-WLR300GNV Series does not limit authentication attempts | 2016-06-22T14:57+09:00 | 2016-06-29T16:04+09:00 |
| jvndb-2016-000108 | CG-WLBARAGM vulnerable to denial-of-service (DoS) | 2016-06-22T14:57+09:00 | 2016-06-29T16:04+09:00 |
| jvndb-2016-000107 | CG-WLBARGL vulnerable to command injection | 2016-06-22T14:56+09:00 | 2016-06-29T16:03+09:00 |
| jvndb-2016-000118 | WordPress plugin "Welcart e-Commerce" vulnerable to session management | 2016-06-24T14:12+09:00 | 2016-06-28T17:01+09:00 |
| jvndb-2016-000117 | WordPress plugin "Welcart e-Commerce" vulnerable to cross-site scripting | 2016-06-24T14:12+09:00 | 2016-06-28T17:01+09:00 |
| jvndb-2016-000094 | Cybozu Garoon function "MultiReport" vulnerable to access restriction bypass | 2016-05-30T16:18+09:00 | 2016-06-28T17:01+09:00 |
| jvndb-2016-000093 | Cybozu Garoon function "Portlets" vulnerable to access restriction bypass | 2016-05-30T16:18+09:00 | 2016-06-28T17:01+09:00 |
| jvndb-2016-000079 | Cybozu Garoon vulnerable to information disclosure | 2016-05-30T16:18+09:00 | 2016-06-28T17:01+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:02383-1 | Security update for kubernetes1.26 | 2025-07-18T16:44:46Z | 2025-07-18T16:44:46Z |
| suse-su-2025:02381-1 | Security update for ffmpeg-4 | 2025-07-18T14:58:40Z | 2025-07-18T14:58:40Z |
| suse-su-2025:02375-1 | Security update for glib2 | 2025-07-18T13:16:27Z | 2025-07-18T13:16:27Z |
| suse-su-2025:02372-1 | Security update for FastCGI | 2025-07-18T12:47:08Z | 2025-07-18T12:47:08Z |
| suse-su-2025:02371-1 | Security update for python-requests | 2025-07-18T12:42:43Z | 2025-07-18T12:42:43Z |
| suse-su-2025:02369-1 | Security update for FastCGI | 2025-07-18T12:41:09Z | 2025-07-18T12:41:09Z |
| suse-su-2025:02368-1 | Security update for MozillaThunderbird | 2025-07-18T12:37:54Z | 2025-07-18T12:37:54Z |
| suse-su-2025:02367-1 | Security update for gimp | 2025-07-18T12:37:01Z | 2025-07-18T12:37:01Z |
| suse-su-2025:20498-1 | Security update for the Linux Kernel | 2025-07-18T12:21:16Z | 2025-07-18T12:21:16Z |
| suse-su-2025:02366-1 | Security update for docker | 2025-07-18T12:08:51Z | 2025-07-18T12:08:51Z |
| suse-su-2025:20499-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_10 | 2025-07-18T10:58:20Z | 2025-07-18T10:58:20Z |
| suse-su-2025:20486-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_10 | 2025-07-18T10:58:20Z | 2025-07-18T10:58:20Z |
| suse-su-2025:20483-1 | Security update for the Linux Kernel | 2025-07-18T09:48:24Z | 2025-07-18T09:48:24Z |
| suse-su-2025:02362-1 | Security update for coreutils | 2025-07-18T09:07:36Z | 2025-07-18T09:07:36Z |
| suse-su-2025:02358-1 | Security update for python311 | 2025-07-17T14:16:03Z | 2025-07-17T14:16:03Z |
| suse-su-2025:02357-1 | Security update for poppler | 2025-07-17T14:15:52Z | 2025-07-17T14:15:52Z |
| suse-su-2025:02356-1 | Security update for poppler | 2025-07-17T14:14:36Z | 2025-07-17T14:14:36Z |
| suse-su-2025:02355-1 | Security update for libxml2 | 2025-07-17T13:02:49Z | 2025-07-17T13:02:49Z |
| suse-su-2025:02354-1 | Security update for coreutils | 2025-07-17T12:36:15Z | 2025-07-17T12:36:15Z |
| suse-su-2025:02353-1 | Security update for coreutils | 2025-07-17T12:35:46Z | 2025-07-17T12:35:46Z |
| suse-su-2025:02352-1 | Security update for ffmpeg | 2025-07-17T12:33:21Z | 2025-07-17T12:33:21Z |
| suse-su-2025:02351-1 | Security update for kubernetes1.25 | 2025-07-17T12:32:49Z | 2025-07-17T12:32:49Z |
| suse-su-2025:02349-1 | Security update for bind | 2025-07-17T11:47:22Z | 2025-07-17T11:47:22Z |
| suse-su-2025:02340-1 | Security update for gnutls | 2025-07-17T09:04:04Z | 2025-07-17T09:04:04Z |
| suse-su-2025:02339-1 | Security update for MozillaFirefox, MozillaFirefox-branding-SLE | 2025-07-17T08:52:26Z | 2025-07-17T08:52:26Z |
| suse-su-2025:02289-2 | Security update for docker | 2025-07-16T15:47:57Z | 2025-07-16T15:47:57Z |
| suse-su-2025:01835-2 | Security update for transfig | 2025-07-16T14:52:18Z | 2025-07-16T14:52:18Z |
| suse-su-2025:02336-1 | Security update for kubernetes1.27 | 2025-07-16T14:50:25Z | 2025-07-16T14:50:25Z |
| suse-su-2025:01811-2 | Security update for gnuplot | 2025-07-16T14:49:36Z | 2025-07-16T14:49:36Z |
| suse-su-2025:02335-1 | Security update for the Linux Kernel | 2025-07-16T14:44:37Z | 2025-07-16T14:44:37Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:14307-1 | haproxy-3.0.4+git0.7a59afa93-1.1 on GA media | 2024-09-04T00:00:00Z | 2024-09-04T00:00:00Z |
| opensuse-su-2024:14306-1 | 389-ds-3.1.1~git13.a9c7ff9-1.1 on GA media | 2024-09-04T00:00:00Z | 2024-09-04T00:00:00Z |
| opensuse-su-2024:14305-1 | tcpdump-4.99.5-1.1 on GA media | 2024-09-03T00:00:00Z | 2024-09-03T00:00:00Z |
| opensuse-su-2024:14304-1 | libmbedcrypto7-2.28.9-1.1 on GA media | 2024-09-03T00:00:00Z | 2024-09-03T00:00:00Z |
| opensuse-su-2024:0276-1 | Security update for cacti, cacti-spine | 2024-09-02T16:41:32Z | 2024-09-02T16:41:32Z |
| opensuse-su-2024:0275-1 | Security update for opera | 2024-09-02T16:36:37Z | 2024-09-02T16:36:37Z |
| opensuse-su-2024:0274-1 | Security update for cacti, cacti-spine | 2024-09-02T08:09:11Z | 2024-09-02T08:09:11Z |
| opensuse-su-2024:14303-1 | chromedriver-128.0.6613.113-1.1 on GA media | 2024-08-31T00:00:00Z | 2024-08-31T00:00:00Z |
| opensuse-su-2024:0269-1 | Security update for trivy | 2024-08-30T08:00:45Z | 2024-08-30T08:00:45Z |
| opensuse-su-2024:0268-1 | Security update for trivy | 2024-08-30T08:00:39Z | 2024-08-30T08:00:39Z |
| opensuse-su-2024:0267-1 | Security update for chromium | 2024-08-30T06:36:55Z | 2024-08-30T06:36:55Z |
| opensuse-su-2024:14302-1 | libwireshark17-4.2.7-1.1 on GA media | 2024-08-30T00:00:00Z | 2024-08-30T00:00:00Z |
| opensuse-su-2024:14301-1 | python313-3.13.0~rc1-3.1 on GA media | 2024-08-30T00:00:00Z | 2024-08-30T00:00:00Z |
| opensuse-su-2024:14300-1 | python312-3.12.5-2.1 on GA media | 2024-08-30T00:00:00Z | 2024-08-30T00:00:00Z |
| opensuse-su-2024:14299-1 | python311-3.11.9-7.1 on GA media | 2024-08-30T00:00:00Z | 2024-08-30T00:00:00Z |
| opensuse-su-2024:14298-1 | python310-3.10.14-7.1 on GA media | 2024-08-30T00:00:00Z | 2024-08-30T00:00:00Z |
| opensuse-su-2024:14297-1 | python39-3.9.19-7.1 on GA media | 2024-08-29T00:00:00Z | 2024-08-29T00:00:00Z |
| opensuse-su-2024:14296-1 | python38-3.8.19-8.1 on GA media | 2024-08-29T00:00:00Z | 2024-08-29T00:00:00Z |
| opensuse-su-2024:14295-1 | python312-3.12.5-1.1 on GA media | 2024-08-29T00:00:00Z | 2024-08-29T00:00:00Z |
| opensuse-su-2024:14294-1 | python310-setuptools-72.1.0-1.1 on GA media | 2024-08-29T00:00:00Z | 2024-08-29T00:00:00Z |
| opensuse-su-2024:14293-1 | python310-Flask-Cors-4.0.1-1.1 on GA media | 2024-08-29T00:00:00Z | 2024-08-29T00:00:00Z |
| opensuse-su-2024:14292-1 | kubernetes1.28-apiserver-1.28.13-2.1 on GA media | 2024-08-29T00:00:00Z | 2024-08-29T00:00:00Z |
| opensuse-su-2024:14291-1 | perl-App-cpanminus-1.7047-2.1 on GA media | 2024-08-27T00:00:00Z | 2024-08-27T00:00:00Z |
| opensuse-su-2024:14290-1 | ffmpeg-5-5.1.4-11.1 on GA media | 2024-08-27T00:00:00Z | 2024-08-27T00:00:00Z |
| opensuse-su-2024:14289-1 | element-web-1.11.75-1.1 on GA media | 2024-08-27T00:00:00Z | 2024-08-27T00:00:00Z |
| opensuse-su-2024:14288-1 | element-desktop-1.11.75-1.1 on GA media | 2024-08-27T00:00:00Z | 2024-08-27T00:00:00Z |
| opensuse-su-2024:14287-1 | forgejo-runner-3.5.1-1.1 on GA media | 2024-08-25T00:00:00Z | 2024-08-25T00:00:00Z |
| opensuse-su-2024:0258-2 | Security update for chromium | 2024-08-23T09:15:52Z | 2024-08-23T09:15:52Z |
| opensuse-su-2024:0258-1 | Security update for chromium | 2024-08-23T09:15:52Z | 2024-08-23T09:15:52Z |
| opensuse-su-2024:14286-1 | frr-10.0.1-2.1 on GA media | 2024-08-23T00:00:00Z | 2024-08-23T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-26957 | Tenda O3 formsetDmzInfo函数缓冲区溢出漏洞 | 2025-10-31 | 2025-11-05 |
| cnvd-2025-26956 | Online Appointment Booking System adddoctor.php文件SQL注入漏洞 | 2025-07-23 | 2025-11-05 |
| cnvd-2025-26955 | Online Appointment Booking System addclinic.php文件SQL注入漏洞 | 2025-07-23 | 2025-11-05 |
| cnvd-2025-26954 | Online Appointment Booking System deletedoctorclinic.php文件SQL注入漏洞 | 2025-07-25 | 2025-11-05 |
| cnvd-2025-26953 | Online Appointment Booking System addmanagerclinic.php文件SQL注入漏洞 | 2025-07-25 | 2025-11-05 |
| cnvd-2025-26899 | Delta Electronics DIAScreen越界写入漏洞(CNVD-2025-26899) | 2025-10-21 | 2025-11-05 |
| cnvd-2025-26898 | Delta Electronics DIAScreen越界写入漏洞(CNVD-2025-26898) | 2025-10-21 | 2025-11-05 |
| cnvd-2025-26897 | Delta Electronics DIAScreen越界写入漏洞(CNVD-2025-26897) | 2025-10-21 | 2025-11-05 |
| cnvd-2025-26896 | Delta Electronics DIAScreen越界写入漏洞 | 2025-10-21 | 2025-11-05 |
| cnvd-2025-26889 | Mozilla Firefox代码执行漏洞(CNVD-2025-26889) | 2025-10-30 | 2025-11-05 |
| cnvd-2025-26888 | Mozilla Firefox安全绕过漏洞(CNVD-2025-26888) | 2025-10-30 | 2025-11-05 |
| cnvd-2025-26887 | Mozilla Firefox for iOS信息泄露漏洞 | 2025-10-30 | 2025-11-05 |
| cnvd-2025-26886 | Mozilla Firefox代码执行漏洞(CNVD-2025-26886) | 2025-10-31 | 2025-11-05 |
| cnvd-2025-26877 | Tenda O3缓冲区溢出漏洞(CNVD-2025-26877) | 2025-10-31 | 2025-11-05 |
| cnvd-2025-26876 | Tenda O3缓冲区溢出漏洞(CNVD-2025-26876) | 2025-10-31 | 2025-11-05 |
| cnvd-2025-26952 | Church Donation System update_password_admin.php文件SQL注入漏洞 | 2025-07-25 | 2025-11-04 |
| cnvd-2025-26951 | Church Donation System Tithes.php文件SQL注入漏洞 | 2025-07-25 | 2025-11-04 |
| cnvd-2025-26950 | Church Donation System search.php文件SQL注入漏洞 | 2025-07-25 | 2025-11-04 |
| cnvd-2025-26949 | Church Donation System reg.php文件SQL注入漏洞 | 2025-07-25 | 2025-11-04 |
| cnvd-2025-26948 | Church Donation System offering.php文件SQL注入漏洞 | 2025-07-25 | 2025-11-04 |
| cnvd-2025-26947 | Church Donation System /login_admin.php文件SQL注入漏洞 | 2025-07-25 | 2025-11-04 |
| cnvd-2025-26946 | Church Donation System login.php文件SQL注入漏洞 | 2025-07-25 | 2025-11-04 |
| cnvd-2025-26945 | Church Donation System giving.php文件SQL注入漏洞 | 2025-07-25 | 2025-11-04 |
| cnvd-2025-26944 | Student Crud Operation delete.ph文件SQL注入漏洞 | 2025-10-13 | 2025-11-04 |
| cnvd-2025-26943 | D-Link DIR600L formWlSiteSurvey函数缓冲区溢出漏洞 | 2025-10-30 | 2025-11-04 |
| cnvd-2025-26942 | D-Link DIR600L formVirtualServ函数缓冲区溢出漏洞 | 2025-10-30 | 2025-11-04 |
| cnvd-2025-26941 | D-Link DIR600L formTcpipSetup函数缓冲区溢出漏洞 | 2025-10-30 | 2025-11-04 |
| cnvd-2025-26940 | D-Link DIR600L formSetWizardSelectMode函数缓冲区溢出漏洞 | 2025-10-30 | 2025-11-04 |
| cnvd-2025-26939 | D-Link DIR600L formSetWizard1函数缓冲区溢出漏洞 | 2025-10-30 | 2025-11-04 |
| cnvd-2025-26938 | D-Link DIR600L formSetWAN_Wizard7函数缓冲区溢出漏洞 | 2025-10-30 | 2025-11-04 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0332 | Vulnérabilité dans Liferay | 2025-04-18T00:00:00.000000 | 2025-04-18T00:00:00.000000 |
| certfr-2025-avi-0331 | Multiples vulnérabilités dans Microsoft Edge | 2025-04-18T00:00:00.000000 | 2025-04-18T00:00:00.000000 |
| certfr-2025-avi-0330 | Vulnérabilité dans les produits Moxa | 2025-04-18T00:00:00.000000 | 2025-04-18T00:00:00.000000 |
| certfr-2025-avi-0329 | Multiples vulnérabilités dans Tenable Nessus | 2025-04-18T00:00:00.000000 | 2025-04-18T00:00:00.000000 |
| CERTFR-2025-AVI-0337 | Multiples vulnérabilités dans les produits IBM | 2025-04-18T00:00:00.000000 | 2025-04-18T00:00:00.000000 |
| CERTFR-2025-AVI-0336 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-04-18T00:00:00.000000 | 2025-04-18T00:00:00.000000 |
| CERTFR-2025-AVI-0335 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-04-18T00:00:00.000000 | 2025-04-18T00:00:00.000000 |
| CERTFR-2025-AVI-0334 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-04-18T00:00:00.000000 | 2025-04-18T00:00:00.000000 |
| CERTFR-2025-AVI-0333 | Multiples vulnérabilités dans le noyau Linux de Debian | 2025-04-18T00:00:00.000000 | 2025-04-18T00:00:00.000000 |
| CERTFR-2025-AVI-0332 | Vulnérabilité dans Liferay | 2025-04-18T00:00:00.000000 | 2025-04-18T00:00:00.000000 |
| CERTFR-2025-AVI-0331 | Multiples vulnérabilités dans Microsoft Edge | 2025-04-18T00:00:00.000000 | 2025-04-18T00:00:00.000000 |
| CERTFR-2025-AVI-0330 | Vulnérabilité dans les produits Moxa | 2025-04-18T00:00:00.000000 | 2025-04-18T00:00:00.000000 |
| CERTFR-2025-AVI-0329 | Multiples vulnérabilités dans Tenable Nessus | 2025-04-18T00:00:00.000000 | 2025-04-18T00:00:00.000000 |
| certfr-2025-avi-0328 | Multiples vulnérabilités dans Tenable Security Center | 2025-04-17T00:00:00.000000 | 2025-04-17T00:00:00.000000 |
| certfr-2025-avi-0327 | Vulnérabilité dans SonicWall Connect Tunnel | 2025-04-17T00:00:00.000000 | 2025-04-17T00:00:00.000000 |
| certfr-2025-avi-0326 | Vulnérabilité dans Cisco Webex App | 2025-04-17T00:00:00.000000 | 2025-04-17T00:00:00.000000 |
| certfr-2025-avi-0325 | Multiples vulnérabilités dans les produits Apple | 2025-04-17T00:00:00.000000 | 2025-04-17T00:00:00.000000 |
| certfr-2025-avi-0220 | Vulnérabilité dans Mattermost Server | 2025-03-19T00:00:00.000000 | 2025-04-17T00:00:00.000000 |
| certfr-2025-avi-0217 | Multiples vulnérabilités dans Mattermost Server | 2025-03-18T00:00:00.000000 | 2025-04-17T00:00:00.000000 |
| CERTFR-2025-AVI-0328 | Multiples vulnérabilités dans Tenable Security Center | 2025-04-17T00:00:00.000000 | 2025-04-17T00:00:00.000000 |
| CERTFR-2025-AVI-0327 | Vulnérabilité dans SonicWall Connect Tunnel | 2025-04-17T00:00:00.000000 | 2025-04-17T00:00:00.000000 |
| CERTFR-2025-AVI-0326 | Vulnérabilité dans Cisco Webex App | 2025-04-17T00:00:00.000000 | 2025-04-17T00:00:00.000000 |
| CERTFR-2025-AVI-0325 | Multiples vulnérabilités dans les produits Apple | 2025-04-17T00:00:00.000000 | 2025-04-17T00:00:00.000000 |
| CERTFR-2025-AVI-0220 | Vulnérabilité dans Mattermost Server | 2025-03-19T00:00:00.000000 | 2025-04-17T00:00:00.000000 |
| CERTFR-2025-AVI-0217 | Multiples vulnérabilités dans Mattermost Server | 2025-03-18T00:00:00.000000 | 2025-04-17T00:00:00.000000 |
| certfr-2025-avi-0324 | Vulnérabilité dans Oracle Weblogic | 2025-04-16T00:00:00.000000 | 2025-04-16T00:00:00.000000 |
| certfr-2025-avi-0323 | Multiples vulnérabilités dans Oracle Virtualization | 2025-04-16T00:00:00.000000 | 2025-04-16T00:00:00.000000 |
| certfr-2025-avi-0322 | Multiples vulnérabilités dans Oracle Systems | 2025-04-16T00:00:00.000000 | 2025-04-16T00:00:00.000000 |
| certfr-2025-avi-0321 | Multiples vulnérabilités dans Oracle PeopleSoft | 2025-04-16T00:00:00.000000 | 2025-04-16T00:00:00.000000 |
| certfr-2025-avi-0320 | Multiples vulnérabilités dans Oracle MySQL | 2025-04-16T00:00:00.000000 | 2025-04-16T00:00:00.000000 |