Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-64096 |
8.8 (3.0)
|
CryptoLib vulnerable to Stack Buffer Overflow in Crypt… |
nasa |
CryptoLib |
2025-10-30T17:09:24.240Z | 2026-01-09T22:54:42.894Z |
| CVE-2025-46299 |
4.3 (3.1)
|
A memory initialization issue was addressed with … |
Apple |
tvOS |
2026-01-09T21:15:50.158Z | 2026-01-09T22:03:08.142Z |
| CVE-2025-15499 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Sangfor Operation and Maintenance Management System Ve… |
Sangfor |
Operation and Maintenance Management System |
2026-01-09T21:32:06.037Z | 2026-01-09T21:54:02.443Z |
| CVE-2025-15500 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
Sangfor Operation and Maintenance Management System HT… |
Sangfor |
Operation and Maintenance Management System |
2026-01-09T21:32:08.161Z | 2026-01-09T21:53:52.018Z |
| CVE-2025-70974 |
10 (3.1)
|
Fastjson before 1.2.48 mishandles autoType becaus… |
Alibaba |
Fastjson |
2026-01-09T06:43:23.584Z | 2026-01-09T21:37:10.756Z |
| CVE-2025-46286 |
4.3 (3.1)
|
A logic issue was addressed with improved validat… |
Apple |
iOS and iPadOS |
2026-01-09T21:14:39.092Z | 2026-01-09T21:34:49.689Z |
| CVE-2024-2470 |
5.4 (3.1)
|
Simple Ajax Chat < 20240412 - Admin+ Stored XSS |
Unknown |
Simple Ajax Chat |
2024-06-04T06:00:02.220Z | 2026-01-09T21:31:21.626Z |
| CVE-2025-67070 |
8.2 (3.1)
|
A vulnerability exists in Intelbras CFTV IP NVD 9… |
n/a |
n/a |
2026-01-09T00:00:00.000Z | 2026-01-09T21:27:17.401Z |
| CVE-2024-10709 |
6.8 (3.1)
|
YaDisk Files <= 1.2.5 - Contributor+ Stored XSS via Sh… |
Unknown |
YaDisk Files |
2024-11-25T06:00:01.883Z | 2026-01-09T21:27:05.999Z |
| CVE-2025-67810 |
6.5 (3.1)
|
In Area9 Rhapsode 1.47.3, an authenticated attack… |
n/a |
n/a |
2026-01-09T00:00:00.000Z | 2026-01-09T21:26:03.111Z |
| CVE-2025-67811 |
6.5 (3.1)
|
Area9 Rhapsode 1.47.3 allows SQL Injection via mu… |
n/a |
n/a |
2026-01-09T00:00:00.000Z | 2026-01-09T21:24:45.228Z |
| CVE-2025-66715 |
6.5 (3.1)
|
A DLL hijacking vulnerability in Axtion ODISSAAS … |
n/a |
n/a |
2026-01-09T00:00:00.000Z | 2026-01-09T21:23:37.893Z |
| CVE-2025-60538 |
6.5 (3.1)
|
A lack of rate limiting in the login page of shio… |
n/a |
n/a |
2026-01-09T00:00:00.000Z | 2026-01-09T21:21:49.698Z |
| CVE-2025-51626 |
6.5 (3.1)
|
SQL injection vulnerability in pss.sale.com 1.0 v… |
n/a |
n/a |
2026-01-09T00:00:00.000Z | 2026-01-09T21:20:33.076Z |
| CVE-2026-0830 |
8.4 (4.0)
7.8 (3.1)
|
Command Injection in Kiro GitLab Merge Request Helper |
AWS |
Kiro IDE |
2026-01-09T21:10:09.310Z | 2026-01-09T21:18:53.768Z |
| CVE-2021-4436 |
9.8 (3.1)
|
3DPrint Lite < 1.9.1.5 - Unauthenticated Arbitrary Fil… |
Unknown |
3DPrint Lite |
2024-02-05T09:02:44.634Z | 2026-01-09T21:05:31.460Z |
| CVE-2023-6503 |
5.4 (3.1)
|
WP Plugin Lister <= 2.1.0 - Settings Update to Stored … |
Unknown |
WP Plugin Lister |
2024-01-29T14:44:26.055Z | 2026-01-09T21:04:55.879Z |
| CVE-2024-0239 |
6.1 (3.1)
|
Contact Form 7 Connector < 1.2.3 - Reflected XSS |
Unknown |
Contact Form 7 Connector |
2024-01-16T15:57:03.662Z | 2026-01-09T21:04:23.881Z |
| CVE-2023-0094 |
5.4 (3.1)
|
UpQode Google Maps <= 1.0.5 - Contributor+ Stored XSS |
Unknown |
UpQode Google Maps |
2024-01-16T15:55:46.407Z | 2026-01-09T21:03:59.086Z |
| CVE-2022-23179 |
4.8 (3.1)
|
Contact Form & Lead Form Elementor Builder < 1.7.0 - M… |
Unknown |
Contact Form & Lead Form Elementor Builder |
2024-01-16T15:52:09.488Z | 2026-01-09T21:03:33.289Z |
| CVE-2021-24870 |
6.1 (3.1)
|
WP Fastest Cache < 0.9.5 - CSRF to Stored Cross-Site S… |
Unknown |
WP Fastest Cache |
2024-01-16T15:49:40.356Z | 2026-01-09T21:03:12.947Z |
| CVE-2023-6066 |
4.3 (3.1)
|
WP Custom Widget Area <= 1.2.5 - Subscriber+ Menus Cre… |
Unknown |
WP Custom Widget area |
2024-01-15T15:10:43.076Z | 2026-01-09T21:02:03.467Z |
| CVE-2023-6845 |
8.8 (3.1)
|
CommentTweets <= 0.6 - Settings Update via CSRF |
Unknown |
CommentTweets |
2024-01-08T19:00:38.284Z | 2026-01-09T21:01:26.903Z |
| CVE-2023-6064 |
7.5 (3.1)
|
PayHere Payment Gateway < 2.2.12 - Unauthenticated Log… |
Unknown |
PayHere Payment Gateway |
2024-01-01T14:18:52.756Z | 2026-01-09T21:01:02.959Z |
| CVE-2024-3643 |
8.8 (3.1)
|
Newsletter Popup <= 1.2 - List Deletion via CSRF |
Unknown |
Newsletter Popup |
2024-05-16T06:00:02.799Z | 2026-01-09T20:44:17.843Z |
| CVE-2024-3406 |
8.8 (3.1)
|
WP Prayer <= 2.0.9 - Email Settings Update via CSRF |
Unknown |
WP Prayer |
2024-05-15T06:00:02.589Z | 2026-01-09T20:43:50.052Z |
| CVE-2023-5971 |
4.8 (3.1)
|
Save as PDF < 3.2.0 - Admin+ Stored XSS |
Unknown |
Save as PDF Plugin by Pdfcrowd |
2024-05-09T06:00:02.319Z | 2026-01-09T20:43:00.817Z |
| CVE-2024-9828 |
4.1 (3.1)
|
Taskbuilder < 3.0.5 - Admin+ SQL Injection |
Unknown |
Taskbuilder |
2024-11-21T06:00:10.648Z | 2026-01-09T20:36:07.066Z |
| CVE-2024-10710 |
3.5 (3.1)
|
YaDisk Files <= 1.2.5 - Admin+ Stored XSS |
Unknown |
YaDisk Files |
2024-11-25T06:00:05.600Z | 2026-01-09T20:35:02.976Z |
| CVE-2024-12774 |
6.5 (3.1)
|
Altra Side Menu <= 2.0 - Abitrary Menu Deletion via CSRF |
Unknown |
Altra Side Menu |
2025-01-27T06:00:09.084Z | 2026-01-09T20:29:14.939Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-14932 |
7.8 (3.0)
|
NSF Unidata NetCDF-C Time Unit Stack-based Buffer Over… |
NSF Unidata |
NetCDF-C |
2025-12-23T21:11:17.340Z | 2025-12-26T19:34:14.913Z |
| CVE-2025-62864 |
9.8 (3.1)
|
Ampere AmpereOne AC03 devices before 3.5.9.3, Amp… |
n/a |
n/a |
2025-12-16T00:00:00.000Z | 2025-12-17T14:31:33.278Z |
| CVE-2025-62863 |
9.8 (3.1)
|
Ampere AmpereOne AC03 devices before 3.5.9.3, Amp… |
n/a |
n/a |
2025-12-16T00:00:00.000Z | 2025-12-17T14:30:24.767Z |
| CVE-2025-64741 |
8.1 (3.1)
|
Zoom Workplace for Android - Improper Authorization Handling |
Zoom Communications Inc. |
Zoom Workplace for Android |
2025-11-13T14:46:59.205Z | 2025-11-14T04:55:32.679Z |
| CVE-2025-64740 |
7.5 (3.1)
|
Zoom Workplace VDI Client for Windows - Improper Verif… |
Zoom Communications Inc. |
Zoom Workplace VDI Client |
2025-11-13T14:35:39.025Z | 2025-11-14T16:51:22.757Z |
| CVE-2025-30669 |
4.8 (3.1)
|
Zoom Workplace Clients - Improper Certificate Validation |
Zoom Communications Inc. |
Zoom Workplace Clients |
2025-11-13T14:49:54.870Z | 2025-11-13T15:17:54.292Z |
| CVE-2025-62482 |
4.3 (3.1)
|
Zoom Workplace for Windows - Cross-site Scripting |
Zoom Communications Inc. |
Zoom Workplace |
2025-11-13T14:56:25.642Z | 2025-11-13T15:38:29.563Z |
| CVE-2025-62483 |
5.3 (3.1)
|
Zoom Clients - Improper Removal of Sensitive Information |
Zoom Communications Inc. |
Zoom Clients |
2025-11-13T15:03:07.612Z | 2025-11-13T15:15:51.024Z |
| CVE-2025-64738 |
5 (3.1)
|
Zoom Workplace for macOS - External Control of File Na… |
Zoom Communications Inc. |
Zoom Workplace for macOS |
2025-11-13T14:23:00.704Z | 2025-11-14T16:52:02.952Z |
| CVE-2025-64739 |
4.3 (3.1)
|
Zoom Clients - External Control of File Name or Path |
Zoom Communications Inc. |
Zoom Clients |
2025-11-13T14:28:58.527Z | 2025-11-14T16:51:41.747Z |
| CVE-2025-15442 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
CRMEB product_list sql injection |
n/a |
CRMEB |
2026-01-04T11:02:06.400Z | 2026-01-06T19:37:32.120Z |
| CVE-2025-15405 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
PHPEMS cross-site request forgery |
n/a |
PHPEMS |
2026-01-01T15:02:06.258Z | 2026-01-05T20:03:20.016Z |
| CVE-2025-15394 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
iCMS POST Parameter ConfigAdmincp.php save code injection |
n/a |
iCMS |
2025-12-31T19:02:14.256Z | 2026-01-02T19:42:59.224Z |
| CVE-2024-28867 |
5.9 (3.1)
|
Swift Prometheus un-sanitized metric name or labels ca… |
swift-server |
swift-prometheus |
2024-03-29T14:26:22.194Z | 2025-03-25T14:39:04.232Z |
| CVE-2025-15452 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
xnx3 wangmarket Backend Variable Search variableList.d… |
xnx3 |
wangmarket |
2026-01-05T02:02:09.544Z | 2026-01-06T19:08:53.030Z |
| CVE-2025-15451 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
xnx3 wangmarket System Variables variableSave.do cross… |
xnx3 |
wangmarket |
2026-01-05T01:32:09.347Z | 2026-01-06T19:16:10.387Z |
| CVE-2021-24977 |
N/A
|
Use Any Font < 6.2.1 - Unauthenticated Arbitrary CSS A… |
Unknown |
Use Any Font | Custom Font Uploader |
2022-02-28T09:06:26 | 2024-08-03T19:49:14.458Z |
| CVE-2025-32457 |
7.7 (3.1)
|
ON Semiconductor Quantenna router_command.sh (in the g… |
ON Semiconductor |
Quantenna Wi-Fi chipset |
2025-06-08T21:03:24.532Z | 2025-06-10T13:23:32.884Z |
| CVE-2025-32456 |
7.7 (3.1)
|
ON Semiconductor Quantenna router_command.sh (in the p… |
ON Semiconductor |
Quantenna Wi-Fi chipset |
2025-06-08T21:03:12.814Z | 2025-06-10T13:24:14.742Z |
| CVE-2026-22799 |
9.3 (4.0)
|
emlog Arbitrary File Upload Vulnerability |
emlog |
emlog |
2026-01-12T22:05:01.012Z | 2026-01-13T19:08:11.094Z |
| CVE-2026-22794 |
9.7 (3.1)
|
Account Takeover Vulnerability in Appsmith |
appsmithorg |
appsmith |
2026-01-12T21:54:52.803Z | 2026-01-13T19:08:29.794Z |
| CVE-2026-22789 |
5.4 (3.1)
|
WebErpMesv2 has a File Upload Validation Bypass Leadin… |
SMEWebify |
WebErpMesv2 |
2026-01-12T21:52:11.880Z | 2026-01-13T19:41:31.721Z |
| CVE-2026-22788 |
8.2 (3.1)
|
WebErpMesv2 allows unauthenticated API Access |
SMEWebify |
WebErpMesv2 |
2026-01-12T21:40:11.913Z | 2026-01-13T19:08:34.529Z |
| CVE-2025-65553 |
6.5 (3.1)
|
D3D Wi-Fi Home Security System ZX-G12 v2.1.17 is … |
n/a |
n/a |
2026-01-12T00:00:00.000Z | 2026-01-13T19:08:39.284Z |
| CVE-2025-65552 |
9.8 (3.1)
|
D3D Wi-Fi Home Security System ZX-G12 v2.1.1 is v… |
n/a |
n/a |
2026-01-12T00:00:00.000Z | 2026-01-13T19:08:45.203Z |
| CVE-2025-32455 |
7.7 (3.1)
|
ON Semiconductor Quantenna router_command.sh (in the r… |
ON Semiconductor |
Quantenna Wi-Fi chipset |
2025-06-08T21:02:58.816Z | 2025-06-09T18:38:09.297Z |
| CVE-2025-49306 |
6.5 (3.1)
|
WordPress WP Social Widget <= 2.3 - Cross Site Scripti… |
catchsquare |
WP Social Widget |
2025-06-06T12:53:48.782Z | 2025-06-06T16:05:12.823Z |
| CVE-2025-43026 |
7.1 (4.0)
|
HP Support Assistant – Potential Escalation of Privilege |
HP, Inc. |
HP Support Assistant |
2025-06-05T19:41:30.538Z | 2025-06-11T04:01:29.354Z |
| CVE-2025-3461 |
9.1 (3.1)
|
ON Semiconductor Quantenna Telnet Missing Authentication |
ON Semiconductor |
Quantenna Wi-Fi chipset |
2025-06-08T21:02:37.521Z | 2025-06-09T18:37:14.718Z |
| CVE-2025-36573 |
7.1 (3.1)
|
Dell Smart Dock Firmware, versions prior to 01.00… |
Dell |
Smart Dock |
2025-06-12T15:18:00.863Z | 2025-06-12T15:35:26.976Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-64741 | Improper authorization handling in Zoom Workplace for Android before version 6.5.10 may allow an un… | 2025-11-13T15:15:54.110 | 2026-01-13T20:52:45.427 |
| fkie_cve-2025-64740 | Improper verification of cryptographic signature in the installer for Zoom Workplace VDI Client for… | 2025-11-13T15:15:53.820 | 2026-01-13T20:51:36.673 |
| fkie_cve-2025-30669 | Improper certificate validation in certain Zoom Clients may allow an unauthenticated user to conduc… | 2025-11-13T15:15:51.240 | 2026-01-13T20:50:57.583 |
| fkie_cve-2025-62482 | Cross-site scripting in Zoom Workplace for Windows before version 6.5.10 may allow an unauthenticat… | 2025-11-13T15:15:51.697 | 2026-01-13T20:50:33.410 |
| fkie_cve-2025-62483 | Improper removal of sensitive information in certain Zoom Clients before version 6.5.10 may allow a… | 2025-11-13T15:15:51.860 | 2026-01-13T20:50:10.990 |
| fkie_cve-2025-64738 | External control of file name or path in Zoom Workplace for macOS before version 6.5.10 may allow a… | 2025-11-13T15:15:53.260 | 2026-01-13T20:49:11.700 |
| fkie_cve-2025-64739 | External control of file name or path in certain Zoom Clients may allow an unauthenticated user to … | 2025-11-13T15:15:53.523 | 2026-01-13T20:46:49.830 |
| fkie_cve-2025-15442 | A vulnerability was determined in CRMEB up to 5.6.1. This vulnerability affects unknown code of the… | 2026-01-04T11:15:53.960 | 2026-01-13T20:46:47.380 |
| fkie_cve-2025-15405 | A vulnerability was detected in PHPEMS up to 11.0. The impacted element is an unknown function. The… | 2026-01-01T15:15:40.777 | 2026-01-13T20:38:31.960 |
| fkie_cve-2025-15394 | A vulnerability was detected in iCMS up to 8.0.0. Affected is the function Save of the file app/con… | 2025-12-31T19:15:43.570 | 2026-01-13T20:38:18.180 |
| fkie_cve-2024-28867 | Swift Prometheus is a Swift client for the Prometheus monitoring system, supporting counters, gauge… | 2024-03-29T15:15:11.180 | 2026-01-13T20:35:52.697 |
| fkie_cve-2025-15452 | A weakness has been identified in xnx3 wangmarket up to 4.9. This affects the function variableList… | 2026-01-05T03:15:50.110 | 2026-01-13T20:35:43.850 |
| fkie_cve-2025-15451 | A security flaw has been discovered in xnx3 wangmarket up to 4.9. Affected by this issue is some un… | 2026-01-05T03:15:49.907 | 2026-01-13T20:35:30.353 |
| fkie_cve-2021-24977 | The Use Any Font | Custom Font Uploader WordPress plugin before 6.2.1 does not have any authorisati… | 2022-02-28T09:15:08.337 | 2026-01-13T20:33:51.607 |
| fkie_cve-2025-32457 | The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the get_file_f… | 2025-06-08T21:15:31.403 | 2026-01-13T20:25:19.797 |
| fkie_cve-2025-32456 | The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the put_file_t… | 2025-06-08T21:15:31.267 | 2026-01-13T20:20:46.173 |
| fkie_cve-2026-22799 | Emlog is an open source website building system. emlog v2.6.1 and earlier exposes a REST API endpoi… | 2026-01-12T22:16:08.930 | 2026-01-13T20:16:11.070 |
| fkie_cve-2026-22794 | Appsmith is a platform to build admin panels, internal tools, and dashboards. Prior to 1.93, the se… | 2026-01-12T22:16:08.633 | 2026-01-13T20:16:10.910 |
| fkie_cve-2026-22789 | WebErpMesv2 is a Resource Management and Manufacturing execution system Web for industry. Prior to … | 2026-01-12T22:16:08.490 | 2026-01-13T20:16:10.743 |
| fkie_cve-2026-22788 | WebErpMesv2 is a Resource Management and Manufacturing execution system Web for industry. Prior to … | 2026-01-12T22:16:08.343 | 2026-01-13T20:16:10.650 |
| fkie_cve-2025-65553 | D3D Wi-Fi Home Security System ZX-G12 v2.1.17 is susceptible to RF jamming on the 433 MHz alarm sen… | 2026-01-12T15:16:03.730 | 2026-01-13T20:16:06.833 |
| fkie_cve-2025-65552 | D3D Wi-Fi Home Security System ZX-G12 v2.1.1 is vulnerable to RF replay attacks on the 433 MHz sens… | 2026-01-12T15:16:03.607 | 2026-01-13T20:16:06.670 |
| fkie_cve-2025-32455 | The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the run_cmd ar… | 2025-06-08T21:15:30.993 | 2026-01-13T20:12:22.423 |
| fkie_cve-2025-49306 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-06-06T13:15:46.303 | 2026-01-13T20:04:21.693 |
| fkie_cve-2025-43026 | A potential security vulnerability has been identified in the HP Support Assistant for versions pri… | 2025-06-05T20:15:26.067 | 2026-01-13T20:02:40.320 |
| fkie_cve-2025-3461 | The Quantenna Wi-Fi chips ship with an unauthenticated telnet interface by default. This is an inst… | 2025-06-08T21:15:33.030 | 2026-01-13T20:01:27.457 |
| fkie_cve-2025-36573 | Dell Smart Dock Firmware, versions prior to 01.00.08.01, contain an Insertion of Sensitive Informat… | 2025-06-12T16:15:23.003 | 2026-01-13T19:43:45.170 |
| fkie_cve-2025-27689 | Dell iDRAC Tools, version(s) prior to 11.3.0.0, contain(s) an Improper Access Control vulnerability… | 2025-06-12T21:15:20.113 | 2026-01-13T19:41:52.837 |
| fkie_cve-2025-52560 | Kanboard is project management software that focuses on the Kanban methodology. Prior to version 1.… | 2025-06-24T03:15:34.653 | 2026-01-13T19:35:51.907 |
| fkie_cve-2023-3852 | A vulnerability was found in OpenRapid RapidCMS up to 1.3.1. It has been declared as critical. This… | 2023-07-23T22:15:09.477 | 2026-01-13T19:17:39.980 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-3f8h-fgg5-j8hm |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: pinctrl: qcom: msm: mark certa… | 2025-08-16T12:30:32Z | 2026-01-07T18:30:19Z |
| ghsa-wm2g-6m3r-4fx9 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: comedi: Fail COMEDI_INSNLIST i… | 2025-07-28T12:30:35Z | 2026-01-07T18:30:18Z |
| ghsa-w37r-fw6v-6v39 |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: comedi: das16m1: Fix bit shift… | 2025-07-28T12:30:35Z | 2026-01-07T18:30:18Z |
| ghsa-g4qg-7mgj-p8v6 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: comedi: Fix use of uninitializ… | 2025-07-28T12:30:35Z | 2026-01-07T18:30:18Z |
| ghsa-fj76-9588-m48w |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: comedi: das6402: Fix bit shift… | 2025-07-28T12:30:35Z | 2026-01-07T18:30:18Z |
| ghsa-f3wq-3888-8q7g |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: mptcp: make fallback action an… | 2025-07-28T12:30:35Z | 2026-01-07T18:30:18Z |
| ghsa-8r68-wg38-9q2x |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: soc: aspeed: lpc-snoop: Don't … | 2025-07-28T12:30:35Z | 2026-01-07T18:30:18Z |
| ghsa-8gh3-6693-hwj4 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix use-after-fre… | 2025-07-28T12:30:35Z | 2026-01-07T18:30:18Z |
| ghsa-433x-cqcq-wqv9 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: iio: accel: fxls8962af: Fix us… | 2025-07-28T12:30:35Z | 2026-01-07T18:30:18Z |
| ghsa-r7vp-7q6j-j6g8 |
4.3 (3.1)
|
Cross-Site Request Forgery (CSRF) vulnerability in Blossom Themes Sarada Lite.This issue affects Sa… | 2024-04-15T12:30:34Z | 2026-01-07T18:30:17Z |
| ghsa-8r9q-7v3j-jr4g |
8.7 (4.0)
|
Anthropic's MCP TypeScript SDK has a ReDoS vulnerability | 2026-01-05T21:30:33Z | 2026-01-07T16:16:27Z |
| ghsa-x9g3-m4cq-98j9 |
6.4 (3.1)
|
Path Traversal: '.../...//' vulnerability in SigmaPlugin Advanced Database Cleaner PRO allows Path … | 2026-01-07T15:30:16Z | 2026-01-07T15:30:16Z |
| ghsa-rw66-g8v8-wcwh |
8.8 (3.1)
|
Insufficient policy enforcement in WebView tag in Google Chrome prior to 143.0.7499.192 allowed an … | 2026-01-07T12:31:24Z | 2026-01-07T15:30:16Z |
| ghsa-q22q-86rc-668c |
9.2 (4.0)
|
The massive sending of ARP requests causes a denial of service on one board of the charger that all… | 2026-01-07T15:30:16Z | 2026-01-07T15:30:16Z |
| ghsa-mfq4-p36v-pf6f |
7.1 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-01-07T15:30:16Z | 2026-01-07T15:30:16Z |
| ghsa-mc5w-4wgh-3vm5 |
9.8 (3.1)
|
Deserialization of Untrusted Data vulnerability in Digital zoom studio DZS Video Gallery allows Obj… | 2026-01-07T15:30:16Z | 2026-01-07T15:30:16Z |
| ghsa-cgqh-2w33-h8jq |
4.9 (3.1)
|
Server-Side Request Forgery (SSRF) vulnerability in minnur External Media allows Server Side Reques… | 2026-01-07T15:30:16Z | 2026-01-07T15:30:16Z |
| ghsa-cc7j-j6fh-4xhc |
5.1 (4.0)
|
Stored cross-site scripting (XSS, CWE-79) in the survey content and administration functionality in… | 2026-01-07T15:30:16Z | 2026-01-07T15:30:16Z |
| ghsa-73r3-cr9q-p5gh |
6.5 (3.1)
|
Missing Authorization vulnerability in POSIMYTH Innovation The Plus Addons for Elementor Pro allows… | 2026-01-07T15:30:16Z | 2026-01-07T15:30:16Z |
| ghsa-3qwf-r3rp-vfpr |
9.3 (3.1)
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2026-01-07T15:30:16Z | 2026-01-07T15:30:16Z |
| ghsa-3pxg-h8p3-7jfh |
6.9 (4.0)
|
Kieback&Peter Neutrino-GLT product is used for building management. It's web component "SM70 PHWEB"… | 2026-01-07T15:30:16Z | 2026-01-07T15:30:16Z |
| ghsa-36gx-mxh9-mx5r |
9.1 (3.1)
|
The Uniffle HTTP client is configured to trust all SSL certificates and disables hostname verifica… | 2026-01-07T12:31:24Z | 2026-01-07T15:30:16Z |
| ghsa-gw75-x5g3-fh33 |
7.7 (3.1)
|
The Frontend File Manager Plugin WordPress plugin before 23.5 did not validate a path parameter and… | 2026-01-07T12:31:22Z | 2026-01-07T15:30:15Z |
| ghsa-fr77-fc49-x5mj |
6.7 (3.1)
|
In geniezone, there is a possible memory corruption due to use after free. This could lead to local… | 2026-01-06T03:31:34Z | 2026-01-07T15:30:15Z |
| ghsa-9hp7-prp8-2mg8 |
6.4 (3.1)
|
Nokia SR Linux is vulnerable to an authentication vulnerability allowing unauthorized access to the… | 2026-01-07T12:31:19Z | 2026-01-07T15:30:15Z |
| ghsa-jxhp-qvjm-mxcj |
8.8 (3.1)
7.4 (4.0)
|
A vulnerability was detected in TRENDnet TEW-800MB 1.0.1.0. Affected by this vulnerability is the f… | 2025-12-28T15:30:26Z | 2026-01-07T15:30:14Z |
| ghsa-j5pv-22p5-jmgv |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability has been found in TRENDnet TEW-822DRE 1.00B21/1.01B06. This affects the function su… | 2025-12-28T15:30:26Z | 2026-01-07T15:30:14Z |
| ghsa-mr4j-mh66-4679 |
7.4 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race bet… | 2025-07-22T09:30:30Z | 2026-01-07T15:30:13Z |
| ghsa-h956-rh7x-ppgj |
9.8 (3.1)
|
RustFS has a gRPC Hardcoded Token Authentication Bypass | 2025-12-30T23:06:15Z | 2026-01-07T15:22:21Z |
| ghsa-f83h-ghpp-7wcc |
7.8 (3.1)
|
Insecure Deserialization (pickle) in pdfminer.six CMap Loader — Local Privesc | 2025-11-07T23:17:05Z | 2026-01-07T15:21:45Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-268 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:43.623027Z |
| pysec-2021-267 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:43.539250Z |
| pysec-2021-266 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:43.455188Z |
| pysec-2021-265 |
|
TensorFlow is an end-to-end open source platform for machine learning. If a user does not… | tensorflow | 2021-08-12T19:15:00Z | 2021-08-27T03:22:43.365129Z |
| pysec-2021-264 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T18:15:00Z | 2021-08-27T03:22:43.277267Z |
| pysec-2021-263 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:43.190554Z |
| pysec-2021-262 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T18:15:00Z | 2021-08-27T03:22:43.107664Z |
| pysec-2021-261 |
|
TensorFlow is an end-to-end open source platform for machine learning. When restoring ten… | tensorflow | 2021-08-12T19:15:00Z | 2021-08-27T03:22:43.020795Z |
| pysec-2021-260 |
|
TensorFlow is an end-to-end open source platform for machine learning. Sending invalid ar… | tensorflow | 2021-08-12T19:15:00Z | 2021-08-27T03:22:42.935785Z |
| pysec-2021-259 |
|
TensorFlow is an end-to-end open source platform for machine learning. It is possible to … | tensorflow | 2021-08-12T19:15:00Z | 2021-08-27T03:22:42.844418Z |
| pysec-2021-258 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T18:15:00Z | 2021-08-27T03:22:42.737707Z |
| pysec-2021-257 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:42.637508Z |
| pysec-2021-256 |
|
TensorFlow is an end-to-end open source platform for machine learning. Passing invalid ar… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:42.523296Z |
| pysec-2021-255 |
|
TensorFlow is an end-to-end open source platform for machine learning. Passing a complex … | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:42.358462Z |
| pysec-2021-254 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:42.200654Z |
| pysec-2021-253 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:42.041590Z |
| pysec-2021-252 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:41.882183Z |
| pysec-2021-251 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:41.712204Z |
| pysec-2021-250 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:41.522961Z |
| pysec-2021-249 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:41.356902Z |
| pysec-2021-248 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:41.176381Z |
| pysec-2021-247 |
|
TensorFlow is an end-to-end open source platform for machine learning. The validation in … | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:41.001819Z |
| pysec-2021-246 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:40.807777Z |
| pysec-2021-245 |
|
TensorFlow is an end-to-end open source platform for machine learning. Due to lack of val… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:40.610515Z |
| pysec-2021-244 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:40.417025Z |
| pysec-2021-243 |
|
TensorFlow is an end-to-end open source platform for machine learning. A specially crafte… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:40.241160Z |
| pysec-2021-242 |
|
TensorFlow is an end-to-end open source platform for machine learning. The TFLite code fo… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:40.058012Z |
| pysec-2021-241 |
|
TensorFlow is an end-to-end open source platform for machine learning. The TFLite impleme… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:39.893665Z |
| pysec-2021-240 |
|
TensorFlow is an end-to-end open source platform for machine learning. A specially crafte… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:39.733041Z |
| pysec-2021-239 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:39.570829Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-32374 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.139424Z |
| gsd-2024-32373 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.102384Z |
| gsd-2024-32372 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.069479Z |
| gsd-2024-32371 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.027298Z |
| gsd-2024-32370 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.045045Z |
| gsd-2024-32369 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.066742Z |
| gsd-2024-32368 | Insecure Permission vulnerability in Agasta Sanketlife 2.0 Pocket 12-Lead ECG Monitor FW … | 2024-04-13T05:02:29.061959Z |
| gsd-2024-32367 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.115401Z |
| gsd-2024-32366 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.128650Z |
| gsd-2024-32365 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.143271Z |
| gsd-2024-32364 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.140058Z |
| gsd-2024-32363 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.088723Z |
| gsd-2024-32362 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.048089Z |
| gsd-2024-32361 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.064540Z |
| gsd-2024-32360 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.086426Z |
| gsd-2024-32359 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.122289Z |
| gsd-2024-32358 | An issue in Jpress v.5.1.0 allows a remote attacker to execute arbitrary code via a craft… | 2024-04-13T05:02:29.105495Z |
| gsd-2024-32357 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.054637Z |
| gsd-2024-32356 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.096697Z |
| gsd-2024-32355 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.127151Z |
| gsd-2024-32354 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.106475Z |
| gsd-2024-32353 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.074221Z |
| gsd-2024-32352 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.052856Z |
| gsd-2024-32351 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.060329Z |
| gsd-2024-32350 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.105105Z |
| gsd-2024-32349 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.073511Z |
| gsd-2024-32348 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.040749Z |
| gsd-2024-32347 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.082741Z |
| gsd-2024-32346 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-13T05:02:29.041404Z |
| gsd-2024-32345 | A cross-site scripting (XSS) vulnerability in the Settings menu of CMSimple v5.15 allows … | 2024-04-13T05:02:29.104221Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2025-192243 | Malicious code in elf-stats-wintry-cocoa-831 (npm) | 2025-12-03T17:22:10Z | 2025-12-23T22:09:11Z |
| MAL-2025-192241 | Malicious code in elf-stats-velvet-snowman-470 (npm) | 2025-12-03T17:22:10Z | 2025-12-23T22:09:11Z |
| MAL-2025-192240 | Malicious code in elf-stats-velvet-ornament-148 (npm) | 2025-12-03T17:22:10Z | 2025-12-23T22:09:11Z |
| MAL-2025-192238 | Malicious code in elf-stats-sugarplum-muffin-944 (npm) | 2025-12-03T17:22:10Z | 2025-12-23T22:09:11Z |
| MAL-2025-192237 | Malicious code in elf-stats-storybook-snowglobe-157 (npm) | 2025-12-03T17:22:10Z | 2025-12-23T22:09:11Z |
| MAL-2025-192198 | Malicious code in elf-stats-wintry-ornament-960 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| MAL-2025-192196 | Malicious code in elf-stats-wintry-hollyberry-832 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| MAL-2025-192194 | Malicious code in elf-stats-wintry-fir-892 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| MAL-2025-192192 | Malicious code in elf-stats-whimsical-rocket-922 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| MAL-2025-192191 | Malicious code in elf-stats-whimsical-muffin-613 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| MAL-2025-192190 | Malicious code in elf-stats-whimsical-marshmallow-258 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| MAL-2025-192189 | Malicious code in elf-stats-whimsical-marshmallow-212 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| MAL-2025-192188 | Malicious code in elf-stats-whimsical-ledger-767 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| MAL-2025-192187 | Malicious code in elf-stats-whimsical-lantern-823 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| MAL-2025-192181 | Malicious code in elf-stats-twinkling-marshmallow-913 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| MAL-2025-192178 | Malicious code in elf-stats-tinsel-pantry-856 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| MAL-2025-192173 | Malicious code in elf-stats-sugarplum-star-404 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| MAL-2025-192171 | Malicious code in elf-stats-sugarplum-fireplace-278 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| MAL-2025-192169 | Malicious code in elf-stats-storybook-reindeer-552 (npm) | 2025-12-03T15:59:29Z | 2025-12-23T22:09:11Z |
| MAL-2025-191974 | Malicious code in elf-stats-wintry-northstar-674 (npm) | 2025-12-03T12:25:23Z | 2025-12-23T22:09:11Z |
| mal-2025-192533 | Malicious code in elf-stats-sprucey-train-710 (npm) | 2025-12-11T19:46:09Z | 2025-12-23T21:38:09Z |
| mal-2025-192532 | Malicious code in elf-stats-sparkly-toolkit-821 (npm) | 2025-12-11T19:46:09Z | 2025-12-23T21:38:09Z |
| mal-2025-192531 | Malicious code in elf-stats-sparkly-fir-398 (npm) | 2025-12-11T19:46:09Z | 2025-12-23T21:38:09Z |
| mal-2025-192528 | Malicious code in elf-stats-snowdusted-marshmallow-228 (npm) | 2025-12-11T19:46:09Z | 2025-12-23T21:38:09Z |
| mal-2025-192340 | Malicious code in elf-stats-sparkly-icicle-845 (npm) | 2025-12-05T21:10:10Z | 2025-12-23T21:38:09Z |
| mal-2025-192283 | Malicious code in elf-stats-sparkly-candy-805 (npm) | 2025-12-03T19:42:46Z | 2025-12-23T21:38:09Z |
| mal-2025-192276 | Malicious code in elf-stats-snowy-northstar-860 (npm) | 2025-12-03T19:25:36Z | 2025-12-23T21:38:09Z |
| mal-2025-192267 | Malicious code in elf-stats-snowdusted-lantern-234 (npm) | 2025-12-03T18:57:54Z | 2025-12-23T21:38:09Z |
| mal-2025-192235 | Malicious code in elf-stats-sprucey-stockpile-628 (npm) | 2025-12-03T17:22:10Z | 2025-12-23T21:38:09Z |
| mal-2025-192233 | Malicious code in elf-stats-snowy-candy-518 (npm) | 2025-12-03T17:22:10Z | 2025-12-23T21:38:09Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-0291 | vim: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2024-02-04T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2023-3227 | Ansible: Schwachstelle ermöglicht Offenlegung von Informationen | 2019-07-24T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2023-2542 | vim: Schwachstelle ermöglicht Denial of Service | 2023-10-03T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2023-2482 | Ansible: Mehrere Schwachstellen ermöglichen Ausführen von beliebigem Programmcode | 2019-12-08T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2023-2359 | Eclipse Jetty: Mehrere Schwachstellen | 2023-09-14T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2023-2269 | vim: Schwachstelle ermöglicht Codeausführung, Dos oder Speicheränderung | 2023-09-05T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2023-2249 | vim: Mehrere Schwachstellen | 2023-09-03T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2023-1170 | vim: Mehrere Schwachstellen ermöglichen Denial of Service und Codeausführung | 2023-05-09T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2023-0566 | vim: Mehrere Schwachstellen | 2023-03-05T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2023-0025 | vim: Mehrere Schwachstellen | 2023-01-04T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-2177 | vim: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2022-11-27T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-1584 | vim: Mehrere Schwachstellen ermöglichen Codeausführung | 2022-09-29T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-1324 | vim: Schwachstelle ermöglicht Codeausführung | 2022-09-06T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-1284 | vim: Schwachstelle ermöglicht Codeausführung | 2022-09-04T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-1127 | vim: Schwachstelle ermöglicht Codeausführung | 2021-12-29T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-1126 | vim: Schwachstelle ermöglicht Codeausführung | 2021-12-28T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0909 | IBM DB2: Mehrere Schwachstellen ermöglichen Codeausführung | 2022-08-03T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0790 | Linux Kernel: Mehrere Schwachstellen ermöglichen Codeausführung | 2022-01-10T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0583 | vim: Schwachstelle ermöglicht Manipulation von Speicher | 2022-07-05T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0397 | vim: Mehrere Schwachstellen | 2022-06-19T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0369 | vim: Schwachstelle ermöglicht Codeausführung | 2022-06-16T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0364 | vim: Mehrere Schwachstellen | 2022-05-19T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0349 | vim: Mehrere Schwachstellen | 2021-12-01T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0345 | vim: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2021-10-19T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0248 | vim: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2022-01-24T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0132 | vim: Schwachstelle ermöglicht Codeausführung | 2022-05-31T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0130 | vim: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-05-29T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0124 | vim: Mehrere Schwachstellen | 2022-05-08T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0107 | vim: Schwachstelle ermöglicht Codeausführung | 2022-02-14T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0059 | vim: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Benutzerrechten | 2022-02-02T23:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2024:0756 | Red Hat Security Advisory: runc security update | 2024-02-08T18:29:50+00:00 | 2026-01-13T23:03:53+00:00 |
| rhsa-2024:0755 | Red Hat Security Advisory: runc security update | 2024-02-08T18:37:24+00:00 | 2026-01-13T23:03:53+00:00 |
| rhsa-2024:0752 | Red Hat Security Advisory: container-tools:rhel8 security update | 2024-02-08T18:39:00+00:00 | 2026-01-13T23:03:53+00:00 |
| rhsa-2024:0717 | Red Hat Security Advisory: runc security update | 2024-02-07T13:32:26+00:00 | 2026-01-13T23:03:52+00:00 |
| rhsa-2024:0684 | Red Hat Security Advisory: OpenShift Container Platform 4.11.58 packages and security update | 2024-02-08T19:25:10+00:00 | 2026-01-13T23:03:51+00:00 |
| rhsa-2024:0670 | Red Hat Security Advisory: runc security update | 2024-02-02T21:05:26+00:00 | 2026-01-13T23:03:51+00:00 |
| rhsa-2024:0666 | Red Hat Security Advisory: OpenShift Container Platform 4.12.49 packages and security update | 2024-02-08T19:51:58+00:00 | 2026-01-13T23:03:51+00:00 |
| rhsa-2024:0662 | Red Hat Security Advisory: OpenShift Container Platform 4.13.32 packages and security update | 2024-02-07T18:02:27+00:00 | 2026-01-13T23:03:51+00:00 |
| rhsa-2024:0645 | Red Hat Security Advisory: OpenShift Container Platform 4.14.11 packages and security update | 2024-02-07T18:23:30+00:00 | 2026-01-13T23:03:51+00:00 |
| rhea-2025:0507 | Red Hat Enhancement Advisory: Advisory for publishing Helm 3.15.4 GA release | 2025-01-21T12:46:18+00:00 | 2026-01-13T23:03:51+00:00 |
| rhea-2024:7866 | Red Hat Enhancement Advisory: Red Hat OpenShift Pipelines Client tkn for 1.16.0 release | 2024-10-09T13:43:14+00:00 | 2026-01-13T23:03:50+00:00 |
| rhba-2025:0304 | Red Hat Bug Fix Advisory: .NET 8.0 bug fix and enhancement update | 2025-01-14T01:20:49+00:00 | 2026-01-13T23:03:49+00:00 |
| rhba-2024:9054 | Red Hat Bug Fix Advisory: Red Hat Developer Hub 1.3.1 bugfix release | 2024-11-11T01:39:34+00:00 | 2026-01-13T23:03:48+00:00 |
| rhba-2024:6429 | Red Hat Bug Fix Advisory: Red Hat Ansible Automation Platform 2.4 Container Release Update | 2024-09-05T15:38:39+00:00 | 2026-01-13T23:03:48+00:00 |
| rhba-2024:11265 | Red Hat Bug Fix Advisory: Red Hat Developer Hub 1.4.0 release. | 2024-12-17T15:12:17+00:00 | 2026-01-13T23:03:45+00:00 |
| rhba-2024:10760 | Red Hat Bug Fix Advisory: Red Hat Developer Hub 1.3.3 bugfix release | 2024-12-17T13:34:55+00:00 | 2026-01-13T23:03:44+00:00 |
| rhba-2024:10184 | Red Hat Bug Fix Advisory: Red Hat Developer Hub 1.2.5 bugfix release | 2024-11-21T22:06:56+00:00 | 2026-01-13T23:03:44+00:00 |
| rhsa-2025:0323 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.14.13 Bug Fix Update | 2025-01-15T01:19:29+00:00 | 2026-01-13T22:57:18+00:00 |
| rhsa-2024:8113 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.16.3 security and bug fix update | 2024-10-15T08:52:38+00:00 | 2026-01-13T22:57:17+00:00 |
| rhsa-2024:8023 | Red Hat Security Advisory: Release of OpenShift Serverless Logic 1.34.0 security update & enhancements | 2024-10-14T00:59:58+00:00 | 2026-01-13T22:57:17+00:00 |
| rhsa-2024:7726 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.6.2 | 2024-10-07T09:24:48+00:00 | 2026-01-13T22:57:17+00:00 |
| rhsa-2024:7725 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.5.5 | 2024-10-07T09:24:53+00:00 | 2026-01-13T22:57:16+00:00 |
| rhsa-2024:7724 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.11 | 2024-10-07T09:22:37+00:00 | 2026-01-13T22:57:16+00:00 |
| rhsa-2024:10214 | Red Hat Security Advisory: Red Hat Data Grid 8.5.2 security update | 2024-11-25T16:56:04+00:00 | 2026-01-13T22:57:15+00:00 |
| rhsa-2025:7118 | Red Hat Security Advisory: osbuild and osbuild-composer security update | 2025-05-13T08:41:23+00:00 | 2026-01-13T22:56:57+00:00 |
| rhsa-2025:3992 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.7 security update | 2025-04-17T14:38:04+00:00 | 2026-01-13T22:56:57+00:00 |
| rhsa-2025:3990 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.7 security update | 2025-04-17T14:33:34+00:00 | 2026-01-13T22:56:57+00:00 |
| rhsa-2025:14991 | Red Hat Security Advisory: glib2 security update | 2025-09-02T02:10:04+00:00 | 2026-01-13T22:56:56+00:00 |
| rhsa-2025:14990 | Red Hat Security Advisory: glib2 security update | 2025-09-02T01:42:29+00:00 | 2026-01-13T22:56:55+00:00 |
| rhsa-2025:14989 | Red Hat Security Advisory: glib2 security update | 2025-09-02T02:11:24+00:00 | 2026-01-13T22:56:55+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-23-012-05 | SAUTER Controls Nova 200 - 220 Series (PLC 6) | 2023-01-12T00:00:00.000000Z | 2023-01-12T00:00:00.000000Z |
| icsa-23-012-04 | Panasonic Sanyo CCTV Network Camera | 2023-01-12T00:00:00.000000Z | 2023-01-12T00:00:00.000000Z |
| icsa-23-012-03 | InHand Networks InRouter | 2023-01-12T00:00:00.000000Z | 2023-01-12T00:00:00.000000Z |
| icsa-23-012-02 | RONDS Equipment Predictive Maintenance Solution | 2023-01-12T00:00:00.000000Z | 2023-01-12T00:00:00.000000Z |
| icsa-23-012-01 | Sewio RTLS Studio | 2023-01-12T00:00:00.000000Z | 2023-01-12T00:00:00.000000Z |
| icsa-23-017-03 | Siemens SINEC INS | 2023-01-10T00:00:00.000000Z | 2023-01-10T00:00:00.000000Z |
| icsa-23-012-11 | Siemens Solid Edge before V2023 MP1 | 2023-01-10T00:00:00.000000Z | 2023-01-10T00:00:00.000000Z |
| icsa-23-012-09 | Siemens Mendix SAML Module | 2023-01-10T00:00:00.000000Z | 2023-01-10T00:00:00.000000Z |
| icsa-23-010-01 | Black Box KVM | 2023-01-10T00:00:00.000000Z | 2023-01-10T00:00:00.000000Z |
| icsa-22-349-13 | Siemens Mendix Workflow Commons | 2022-12-13T00:00:00.000000Z | 2023-01-10T00:00:00.000000Z |
| icsa-22-349-06 | Siemens SIMATIC WinCC OA Ultralight Client | 2022-12-13T00:00:00.000000Z | 2023-01-10T00:00:00.000000Z |
| icsa-20-042-05 | Siemens SIMATIC S7 (Update B) | 2020-02-11T00:00:00.000000Z | 2023-01-10T00:00:00.000000Z |
| icsa-23-005-03 | Hitachi Energy Lumada Asset Performance Management | 2023-01-05T00:00:00.000000Z | 2023-01-05T00:00:00.000000Z |
| icsa-23-005-02 | Hitachi Energy FOXMAN-UN | 2023-01-05T00:00:00.000000Z | 2023-01-05T00:00:00.000000Z |
| icsa-23-005-01 | Hitachi Energy UNEM | 2023-01-05T00:00:00.000000Z | 2023-01-05T00:00:00.000000Z |
| icsa-22-349-01 | Prosys OPC UA Simulation Server (Update A) | 2022-12-15T00:00:00.000000Z | 2023-01-03T00:00:00.000000Z |
| icsa-22-356-04 | Omron CX-Programmer | 2022-12-22T00:00:00.000000Z | 2022-12-22T00:00:00.000000Z |
| icsa-22-356-02 | Rockwell Automation Studio 5000 Logix Emulate | 2022-12-22T00:00:00.000000Z | 2022-12-22T00:00:00.000000Z |
| icsa-22-356-01 | Priva TopControl Suite | 2022-12-22T00:00:00.000000Z | 2022-12-22T00:00:00.000000Z |
| icsa-22-354-05 | Delta 4G Router DX-3021 | 2022-12-20T00:00:00.000000Z | 2022-12-20T00:00:00.000000Z |
| icsa-22-354-04 | Rockwell Automation MicroLogix 1100 and 1400 | 2022-12-20T00:00:00.000000Z | 2022-12-20T00:00:00.000000Z |
| icsa-22-354-02 | Rockwell Automation GuardLogix and ControlLogix controllers | 2022-12-20T00:00:00.000000Z | 2022-12-20T00:00:00.000000Z |
| icsa-22-354-01 | Fuji Electric Tellus Lite V-Simulator | 2022-12-20T00:00:00.000000Z | 2022-12-20T00:00:00.000000Z |
| icsa-22-349-21 | Siemens SCALANCE X-200RNA Switch Devices | 2022-12-13T00:00:00.000000Z | 2022-12-13T00:00:00.000000Z |
| icsa-22-349-19 | Siemens SICAM PAS | 2022-12-13T00:00:00.000000Z | 2022-12-13T00:00:00.000000Z |
| icsa-22-349-18 | Siemens SCALANCE SC-600 Family | 2022-12-13T00:00:00.000000Z | 2022-12-13T00:00:00.000000Z |
| icsa-22-349-17 | Siemens Mendix Email Connector | 2022-12-13T00:00:00.000000Z | 2022-12-13T00:00:00.000000Z |
| icsa-22-349-15 | Siemens Teamcenter Visualization and JT2Go | 2022-12-13T00:00:00.000000Z | 2022-12-13T00:00:00.000000Z |
| icsa-22-349-02 | Siemens SCALANCE X-200RNA Switch Devices | 2022-12-13T00:00:00.000000Z | 2022-12-13T00:00:00.000000Z |
| icsa-22-347-02 | Schneider Electric APC Easy UPS Online | 2022-12-13T00:00:00.000000Z | 2022-12-13T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-dnac-csrf-dC83cMcV | Cisco DNA Center Cross-Site Request Forgery Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-25T14:01:28+00:00 |
| cisco-sa-wsa-prv-esc-npzwzrqj | Cisco Secure Web Appliance Privilege Escalation Vulnerability | 2020-11-18T16:00:00+00:00 | 2021-01-21T14:53:26+00:00 |
| cisco-sa-wsa-prv-esc-nPzWZrQj | Cisco Secure Web Appliance Privilege Escalation Vulnerability | 2020-11-18T16:00:00+00:00 | 2021-01-21T14:53:26+00:00 |
| cisco-sa-expressway-8j3yz7hv | Cisco Expressway Software TURN Server Configuration Issue | 2020-11-18T16:00:00+00:00 | 2021-01-20T20:41:10+00:00 |
| cisco-sa-Expressway-8J3yZ7hV | Cisco Expressway Software TURN Server Configuration Issue | 2020-11-18T16:00:00+00:00 | 2021-01-20T20:41:10+00:00 |
| cisco-sa-wsa-xss-rub5wgql | Cisco Web Security Appliance Stored Cross-Site Scripting Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-wsa-xss-RuB5WGqL | Cisco Web Security Appliance Stored Cross-Site Scripting Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-vmanage-cql-inject-72ehnuc | Cisco SD-WAN vManage Cypher Query Language Injection Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-vmanage-cql-inject-72EhnUc | Cisco SD-WAN vManage Cypher Query Language Injection Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-vman-sqlinjm-xv8dsjq5 | Cisco SD-WAN vManage SQL Injection Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-vman-sqlinjm-xV8dsjq5 | Cisco SD-WAN vManage SQL Injection Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-vman-pathtrav-z5mcvsjf | Cisco SD-WAN vManage Software Path Traversal Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-vman-pathtrav-Z5mCVsjf | Cisco SD-WAN vManage Software Path Traversal Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-umb-dos-dgkzdebp | Cisco Umbrella Dashboard Packet Flood Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-umb-dos-dgKzDEBP | Cisco Umbrella Dashboard Packet Flood Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-sdwan-vinfdis-mc8l58dj | Cisco SD-WAN vManage Information Disclosure Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-sdwan-vinfdis-MC8L58dj | Cisco SD-WAN vManage Information Disclosure Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-sdwan-infodis-2-upo232dg | Cisco SD-WAN Information Disclosure Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-sdwan-infodis-2-UPO232DG | Cisco SD-WAN Information Disclosure Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-sdwan-bufovulns-b5nrshbj | Cisco SD-WAN Buffer Overflow Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-sdwan-bufovulns-B5NrSHbj | Cisco SD-WAN Buffer Overflow Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-imp-trav-inj-dm687zd6 | Cisco Unified Communications Products Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-imp-trav-inj-dM687ZD6 | Cisco Unified Communications Products Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-esc-dos-4gw6d527 | Cisco Elastic Services Controller Denial of Service Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-esc-dos-4Gw6D527 | Cisco Elastic Services Controller Denial of Service Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-esa-wsa-sma-info-rhp44vac | Cisco Email Security Appliance, Cisco Content Security Management Appliance, and Cisco Web Security Appliance Information Disclosure Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-esa-wsa-sma-info-RHp44vAC | Cisco Email Security Appliance, Cisco Content Security Management Appliance, and Cisco Web Security Appliance Information Disclosure Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-dnac-cmdinj-erumswh9 | Cisco DNA Center Command Runner Command Injection Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-dnac-cmdinj-erumsWh9 | Cisco DNA Center Command Runner Command Injection Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-dcnm-xss-vulns-guuj39gh | Cisco Data Center Network Manager Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-39681 | x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper | 2025-09-02T00:00:00.000Z | 2025-09-07T01:15:12.000Z |
| msrc_cve-2025-38736 | net: usb: asix_devices: Fix PHY address mask in MDIO bus initialization | 2025-09-02T00:00:00.000Z | 2025-09-07T01:14:50.000Z |
| msrc_cve-2025-39683 | tracing: Limit access to parser->buffer when trace_get_user failed | 2025-09-02T00:00:00.000Z | 2025-09-07T01:14:30.000Z |
| msrc_cve-2025-39676 | scsi: qla4xxx: Prevent a potential error pointer dereference | 2025-09-02T00:00:00.000Z | 2025-09-07T01:14:07.000Z |
| msrc_cve-2025-39679 | drm/nouveau/nvif: Fix potential memory leak in nvif_vmm_ctor(). | 2025-09-02T00:00:00.000Z | 2025-09-07T01:13:53.000Z |
| msrc_cve-2025-39713 | media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt() | 2025-09-02T00:00:00.000Z | 2025-09-07T01:13:46.000Z |
| msrc_cve-2025-39714 | media: usbtv: Lock resolution while streaming | 2025-09-02T00:00:00.000Z | 2025-09-07T01:13:39.000Z |
| msrc_cve-2025-39719 | iio: imu: bno055: fix OOB access of hw_xlate array | 2025-09-02T00:00:00.000Z | 2025-09-07T01:13:30.000Z |
| msrc_cve-2025-39691 | fs/buffer: fix use-after-free when call bh_read() helper | 2025-09-02T00:00:00.000Z | 2025-09-07T01:13:19.000Z |
| msrc_cve-2025-38732 | netfilter: nf_reject: don't leak dst refcount for loopback packets | 2025-09-02T00:00:00.000Z | 2025-09-07T01:13:06.000Z |
| msrc_cve-2025-39716 | parisc: Revise __get_user() to probe user read access | 2025-09-02T00:00:00.000Z | 2025-09-07T01:12:43.000Z |
| msrc_cve-2025-39675 | drm/amd/display: Add null pointer check in mod_hdcp_hdcp1_create_session() | 2025-09-02T00:00:00.000Z | 2025-09-07T01:12:13.000Z |
| msrc_cve-2025-39673 | ppp: fix race conditions in ppp_fill_forward_path | 2025-09-02T00:00:00.000Z | 2025-09-07T01:11:43.000Z |
| msrc_cve-2025-39715 | parisc: Revise gateway LWS calls to probe user read access | 2025-09-02T00:00:00.000Z | 2025-09-07T01:11:11.000Z |
| msrc_cve-2025-39682 | tls: fix handling of zero-length records on the rx_list | 2025-09-02T00:00:00.000Z | 2025-09-07T01:10:35.000Z |
| msrc_cve-2025-39701 | ACPI: pfr_update: Fix the driver update version check | 2025-09-02T00:00:00.000Z | 2025-09-07T01:10:14.000Z |
| msrc_cve-2025-39706 | drm/amdkfd: Destroy KFD debugfs after destroy KFD wq | 2025-09-02T00:00:00.000Z | 2025-09-07T01:09:21.000Z |
| msrc_cve-2025-39693 | drm/amd/display: Avoid a NULL pointer dereference | 2025-09-02T00:00:00.000Z | 2025-09-07T01:08:47.000Z |
| msrc_cve-2025-39694 | s390/sclp: Fix SCCB present check | 2025-09-02T00:00:00.000Z | 2025-09-07T01:08:31.000Z |
| msrc_cve-2025-39687 | iio: light: as73211: Ensure buffer holes are zeroed | 2025-09-02T00:00:00.000Z | 2025-09-07T01:08:07.000Z |
| msrc_cve-2025-39721 | crypto: qat - flush misc workqueue during device shutdown | 2025-09-02T00:00:00.000Z | 2025-09-07T01:07:41.000Z |
| msrc_cve-2025-39711 | media: ivsc: Fix crash at shutdown due to missing mei_cldev_disable() calls | 2025-09-02T00:00:00.000Z | 2025-09-07T01:07:03.000Z |
| msrc_cve-2025-39689 | ftrace: Also allocate and copy hash for reading of filter files | 2025-09-02T00:00:00.000Z | 2025-09-07T01:05:43.000Z |
| msrc_cve-2025-39724 | serial: 8250: fix panic due to PSLVERR | 2025-09-02T00:00:00.000Z | 2025-09-07T01:05:12.000Z |
| msrc_cve-2025-39692 | smb: server: split ksmbd_rdma_stop_listening() out of ksmbd_rdma_destroy() | 2025-09-02T00:00:00.000Z | 2025-09-07T01:04:48.000Z |
| msrc_cve-2025-39684 | comedi: Fix use of uninitialized memory in do_insn_ioctl() and do_insnlist_ioctl() | 2025-09-02T00:00:00.000Z | 2025-09-07T01:04:24.000Z |
| msrc_cve-2025-38735 | gve: prevent ethtool ops after shutdown | 2025-09-02T00:00:00.000Z | 2025-09-07T01:04:11.000Z |
| msrc_cve-2025-39718 | vsock/virtio: Validate length in packet header before skb_put() | 2025-09-02T00:00:00.000Z | 2025-09-07T01:03:56.000Z |
| msrc_cve-2025-39710 | media: venus: Add a check for packet size after reading from shared memory | 2025-09-02T00:00:00.000Z | 2025-09-07T01:03:46.000Z |
| msrc_cve-2025-39702 | ipv6: sr: Fix MAC comparison to be constant-time | 2025-09-02T00:00:00.000Z | 2025-09-07T01:03:29.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202401-0919 | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DIR-859 1.06B01. It h… | 2024-05-17T22:55:38.483000Z |
| var-202403-0889 | A vulnerability classified as critical has been found in Tenda AC18 15.03.05.05. Affected… | 2024-05-17T22:55:37.933000Z |
| var-200608-0067 | Unspecified vulnerability in Cisco PIX 500 Series Security Appliances allows remote attac… | 2024-05-17T22:55:28.617000Z |
| var-201810-0743 | An issue was discovered in the Merlin.PHP component 0.6.6 for Asuswrt-Merlin devices. An … | 2024-05-17T22:54:06.349000Z |
| var-201908-0924 | On BC Vault devices, a side channel for the row-based SSD1309 OLED display was found. The… | 2024-05-17T22:53:34.855000Z |
| var-202007-1256 | D-Link DIR-610 devices allow Remote Command Execution via the cmd parameter to command.ph… | 2024-05-17T22:53:33.183000Z |
| var-202007-1255 | D-Link DIR-610 devices allow Information Disclosure via SERVICES=DEVICE.ACCOUNT%0AAUTHORI… | 2024-05-17T22:53:33.155000Z |
| var-202004-0541 | In the web-panel in IQrouter through 3.3.1, remote attackers can read system logs because… | 2024-05-17T22:53:33.622000Z |
| var-202004-0539 | In IQrouter through 3.3.1, the Lua function reset_password in the web-panel allows remote… | 2024-05-17T22:53:33.596000Z |
| var-202303-1193 | DrayTek Vigor2960 v1.5.1.4 allows an authenticated attacker with network access to the we… | 2024-05-17T22:53:23.590000Z |
| var-202312-0247 | A vulnerability has been found in D-Link DAR-7000 up to 20231126 and classified as critic… | 2024-05-17T22:53:21.037000Z |
| var-202402-0012 | Heap-based buffer overflow vulnerability exists in HOME SPOT CUBE2 V102 and earlier. By p… | 2024-05-17T22:53:20.357000Z |
| var-202402-0011 | Stack-based buffer overflow vulnerability exists in HOME SPOT CUBE2 V102 and earlier. Pro… | 2024-05-17T22:53:20.336000Z |
| var-202401-0630 | A vulnerability classified as problematic has been found in Totolink T6 4.1.9cu.5241_B202… | 2024-05-17T22:53:20.685000Z |
| var-202401-0462 | A vulnerability classified as critical was found in Totolink X2000R 1.0.0-B20221212.1452.… | 2024-05-17T22:53:20.724000Z |
| var-202405-0440 | Quantum 140CPU65150PL is a Unity processor in the Schneider Electric series. It combines … | 2024-05-17T22:53:18.549000Z |
| var-200212-0448 | NOTE: this issue has been disputed by the vendor. Symantec Norton AntiVirus (NAV) 2002 al… | 2024-05-17T22:53:16.670000Z |
| var-200904-0305 | NOTE: this issue has been disputed by the vendor. Buffer overflow in the PKI Web Service… | 2024-05-17T22:51:29.014000Z |
| var-201312-0320 | The TFTP service in Cisco Unified Communications Manager (aka CUCM or Unified CM) allows … | 2024-05-17T22:51:19.658000Z |
| var-201708-1530 | An issue was discovered in SMA Solar Technology products. By sending crafted packets to a… | 2024-05-17T22:51:11.192000Z |
| var-201806-0922 | An issue was discovered on Canon LBP6650, LBP3370, LBP3460, and LBP7750C devices. It is p… | 2024-05-17T22:51:09.788000Z |
| var-201907-1179 | D-Link DSL-2750U 1.11 is affected by: Authentication Bypass. The impact is: denial of ser… | 2024-05-17T22:51:07.117000Z |
| var-201907-1137 | Vivotek FD8136 devices allow Remote Command Injection, aka "another command injection vul… | 2024-05-17T22:51:07.153000Z |
| var-202108-1371 | D-Link DSR-500N version 1.02 contains hard-coded credentials for undocumented user accoun… | 2024-05-17T22:51:03.527000Z |
| var-202106-0546 | A CWE-20: Improper Input Validation vulnerability exists in PowerLogic EGX100 (Versions 3… | 2024-05-17T22:51:03.800000Z |
| var-202106-0545 | A CWE-20: Improper Input Validation vulnerability exists in PowerLogic EGX100 (Versions 3… | 2024-05-17T22:51:03.773000Z |
| var-202106-0544 | A CWE-20: Improper Input Validation vulnerability exists in PowerLogic EGX100 (Versions 3… | 2024-05-17T22:51:03.745000Z |
| var-202104-1463 | An issue was discovered on D-Link DIR-802 A1 devices through 1.00b05. Universal Plug and … | 2024-05-17T22:51:03.971000Z |
| var-202302-0098 | A vulnerability was found in TRENDnet TEW-652BRP 3.04b01. It has been classified as criti… | 2024-05-17T22:51:00.331000Z |
| var-202304-2229 | A vulnerability has been found in Netgear SRX5308 up to 4.3.5-3 and classified as problem… | 2024-05-17T22:50:55.936000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2014-000010 | Multiple SQL injection vulnerabilities in Cybozu Garoon | 2014-01-28T14:40+09:00 | 2014-01-30T14:22+09:00 |
| jvndb-2014-000008 | SimZip (Simple Zip Viewer) vulnerable to directory traversal | 2014-01-24T12:34+09:00 | 2014-01-28T18:03+09:00 |
| jvndb-2014-000009 | OpenPNE vulnerable to PHP Object Injection | 2014-01-24T12:36+09:00 | 2014-01-28T18:02+09:00 |
| jvndb-2014-000005 | EC-CUBE vulnerable to information alteration | 2014-01-22T15:27+09:00 | 2014-01-27T09:51+09:00 |
| jvndb-2014-000007 | Information disclosure vulnerability in Sleipnir Mobile for Android | 2014-01-22T15:29+09:00 | 2014-01-27T09:47+09:00 |
| jvndb-2014-000004 | NeoFiler vulnerable to directory traversal | 2014-01-10T14:44+09:00 | 2014-01-15T12:32+09:00 |
| jvndb-2014-000003 | Security File Manager vulnerable to directory traversal | 2014-01-10T14:42+09:00 | 2014-01-10T14:42+09:00 |
| jvndb-2014-000002 | tetra filer vulnerable to directory traversal | 2014-01-10T14:41+09:00 | 2014-01-10T14:41+09:00 |
| jvndb-2014-000001 | ZIP with Pass vulnerable to directory traversal | 2014-01-10T14:34+09:00 | 2014-01-10T14:34+09:00 |
| jvndb-2013-000120 | IrfanView vulnerable to buffer overflow | 2013-12-24T15:02+09:00 | 2014-01-07T19:25+09:00 |
| jvndb-2013-000124 | Cybozu Garoon vulnerable to SQL injection | 2013-12-25T12:21+09:00 | 2014-01-07T19:22+09:00 |
| jvndb-2013-000125 | Cybozu Garoon Keitai vulnerable to authentication bypass | 2013-12-25T12:22+09:00 | 2014-01-07T16:12+09:00 |
| jvndb-2013-000126 | HP Autonomy Ultraseek vulnerable to cross-site scripting | 2013-12-26T12:32+09:00 | 2013-12-26T12:32+09:00 |
| jvndb-2013-005669 | Xml eXternal Entity Vulnerability in Hitachi Cosminexus | 2013-12-25T19:13+09:00 | 2013-12-25T19:13+09:00 |
| jvndb-2013-000123 | VMware ESX and ESXi may allow access to arbitrary files | 2013-12-24T15:02+09:00 | 2013-12-25T14:01+09:00 |
| jvndb-2013-005262 | Buffer Overflow Vulnerability in the log function of Interstage HTTP Server | 2013-11-28T16:38+09:00 | 2013-12-18T16:16+09:00 |
| jvndb-2013-000119 | Juniper ScreenOS vulnerable to denial-of-service (DoS) | 2013-12-13T12:23+09:00 | 2013-12-18T15:23+09:00 |
| jvndb-2013-000118 | Cybozu Dezie vulnerable to cross-site scripting | 2013-12-10T14:13+09:00 | 2013-12-18T14:51+09:00 |
| jvndb-2013-000117 | Cybozu Garoon vulnerable to session fixation | 2013-12-03T13:51+09:00 | 2013-12-06T10:52+09:00 |
| jvndb-2013-000116 | Cybozu Garoon vulnerable to mail header injection | 2013-12-03T13:49+09:00 | 2013-12-06T10:50+09:00 |
| jvndb-2013-000115 | Cybozu Garoon vulnerable to denial-of-service (DoS) | 2013-12-03T13:46+09:00 | 2013-12-06T10:48+09:00 |
| jvndb-2013-000114 | Cybozu Garoon vulnerable to SQL injection | 2013-12-03T13:45+09:00 | 2013-12-06T10:47+09:00 |
| jvndb-2013-000113 | Multiple cross-site scripting vulnerabilities in Cybozu Garoon | 2013-12-03T13:37+09:00 | 2013-12-06T10:42+09:00 |
| jvndb-2013-000112 | TOWN (modified version) vulnerable to directory traversal | 2013-11-29T14:23+09:00 | 2013-12-06T10:38+09:00 |
| jvndb-2013-000110 | D-Link DES-3800 Series vulnerable to denial-of-service (DoS) | 2013-11-22T14:51+09:00 | 2013-11-26T16:15+09:00 |
| jvndb-2013-000109 | D-Link DES-3800 Series vulnerable to denial-of-service (DoS) | 2013-11-22T14:50+09:00 | 2013-11-26T16:09+09:00 |
| jvndb-2013-000108 | KDrive Personal for Windows contains an issue where it fails to verify SSL server certificates | 2013-11-22T17:39+09:00 | 2013-11-26T16:02+09:00 |
| jvndb-2013-000104 | EC-CUBE vulnerable to information disclosure | 2013-11-20T15:19+09:00 | 2013-11-22T14:42+09:00 |
| jvndb-2013-000105 | EC-CUBE vulnerable to cross-site scripting | 2013-11-20T15:34+09:00 | 2013-11-22T14:40+09:00 |
| jvndb-2013-000097 | EC-CUBE vulnerable to cross-site request forgery | 2013-11-20T15:40+09:00 | 2013-11-22T14:37+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:01818-1 | Security update for python-cryptography | 2025-06-05T13:53:11Z | 2025-06-05T13:53:11Z |
| suse-su-2025:01500-1 | Security update for opensaml | 2025-06-05T13:19:08Z | 2025-06-05T13:19:08Z |
| suse-su-2025:20393-1 | Security update for docker | 2025-06-05T08:36:35Z | 2025-06-05T08:36:35Z |
| suse-su-2025:20377-1 | Security update for docker | 2025-06-05T08:25:35Z | 2025-06-05T08:25:35Z |
| suse-su-2025:01525-1 | Security update for java-1_8_0-openjdk | 2025-06-05T07:48:32Z | 2025-06-05T07:48:32Z |
| suse-su-2025:01704-2 | Security update for python-setuptools | 2025-06-05T07:48:13Z | 2025-06-05T07:48:13Z |
| suse-su-2025:01817-1 | Security update for libsoup | 2025-06-05T06:52:42Z | 2025-06-05T06:52:42Z |
| suse-su-2025:01816-1 | Security update for libcryptopp | 2025-06-04T17:03:40Z | 2025-06-04T17:03:40Z |
| suse-su-2025:01815-1 | Security update for apache-commons-beanutils | 2025-06-04T17:01:27Z | 2025-06-04T17:01:27Z |
| suse-su-2025:01814-1 | Security update for MozillaFirefox | 2025-06-04T14:10:21Z | 2025-06-04T14:10:21Z |
| suse-su-2025:01813-1 | Security update for MozillaThunderbird | 2025-06-04T14:09:10Z | 2025-06-04T14:09:10Z |
| suse-su-2025:01766-2 | Security update for postgresql16 | 2025-06-04T13:37:40Z | 2025-06-04T13:37:40Z |
| suse-su-2025:01490-1 | Security update for java-17-openjdk | 2025-06-04T10:12:31Z | 2025-06-04T10:12:31Z |
| suse-su-2025:01812-1 | Security update for libsoup | 2025-06-04T10:12:11Z | 2025-06-04T10:12:11Z |
| suse-su-2025:01811-1 | Security update for gnuplot | 2025-06-04T09:29:55Z | 2025-06-04T09:29:55Z |
| suse-su-2025:01810-1 | Security update for python3-setuptools | 2025-06-04T09:29:13Z | 2025-06-04T09:29:13Z |
| suse-su-2025:01809-1 | Security update for govulncheck-vulndb | 2025-06-04T09:28:01Z | 2025-06-04T09:28:01Z |
| suse-su-2025:01702-2 | Security update for glibc | 2025-06-04T07:33:09Z | 2025-06-04T07:33:09Z |
| suse-su-2025:01807-1 | Security update for 389-ds | 2025-06-03T13:15:20Z | 2025-06-03T13:15:20Z |
| suse-su-2025:01806-1 | Security update for 389-ds | 2025-06-03T13:13:56Z | 2025-06-03T13:13:56Z |
| suse-su-2025:01805-1 | Security update for gnuplot | 2025-06-03T11:57:53Z | 2025-06-03T11:57:53Z |
| suse-su-2025:01586-2 | Security update for rubygem-rack | 2025-06-03T09:17:02Z | 2025-06-03T09:17:02Z |
| suse-su-2025:20374-1 | Security update for python311 | 2025-06-03T09:04:41Z | 2025-06-03T09:04:41Z |
| suse-su-2025:20373-1 | Security update for elemental-toolkit | 2025-06-03T09:03:45Z | 2025-06-03T09:03:45Z |
| suse-su-2025:01802-1 | Security update for libsoup2 | 2025-06-03T01:15:16Z | 2025-06-03T01:15:16Z |
| suse-su-2025:01801-1 | Security update for libsoup | 2025-06-02T23:45:00Z | 2025-06-02T23:45:00Z |
| suse-su-2025:01799-1 | Security update for postgresql, postgresql16, postgresql17 | 2025-06-02T13:28:47Z | 2025-06-02T13:28:47Z |
| suse-su-2025:01794-1 | Security update for libsoup | 2025-06-02T09:04:15Z | 2025-06-02T09:04:15Z |
| suse-su-2025:01792-1 | Security update for dnsdist | 2025-06-02T07:38:53Z | 2025-06-02T07:38:53Z |
| suse-su-2025:01788-1 | Security update for java-1_8_0-ibm | 2025-05-31T10:34:31Z | 2025-05-31T10:34:31Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:13900-1 | freerdp-3.5.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13899-1 | flatpak-1.15.8-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13898-1 | dcmtk-3.6.8-4.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13897-1 | matrix-synapse-1.105.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13896-1 | gstreamer-plugins-bad-1.24.0-4.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13895-1 | ffmpeg-6-6.1.1-4.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13894-1 | ffmpeg-4-4.4.4-7.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13893-1 | shadowsocks-rust-1.18.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13892-1 | python312-3.12.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13891-1 | python-gunicorn-doc-22.0.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13890-1 | python-gevent-doc-24.2.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13889-1 | ffmpeg-7-7.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13888-1 | ffmpeg-5-5.1.4-5.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13887-1 | python310-Django-4.2.11-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13886-1 | python310-Beaker-1.13.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13885-1 | nodejs-electron-29.3.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13884-1 | MozillaThunderbird-115.10.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13883-1 | python311-3.11.9-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13882-1 | kubernetes1.29-apiserver-1.29.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13881-1 | kubernetes1.28-apiserver-1.28.9-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13880-1 | kubernetes1.27-apiserver-1.27.13-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13879-1 | java-1_8_0-openjdk-1.8.0.412-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13878-1 | jasper-4.2.3-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13877-1 | glibc-2.39-5.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13876-1 | qemu-8.2.2-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13875-1 | java-22-openjdk-22.0.1.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13874-1 | python310-idna-3.7-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13873-1 | java-21-openjdk-21.0.3.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13872-1 | java-17-openjdk-17.0.11.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13871-1 | java-11-openjdk-11.0.23.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-24608 | WordPress Lisfinity Core plugin权限提升漏洞 | 2025-10-21 | 2025-10-22 |
| cnvd-2025-24607 | WordPress Library Management System plugin未经授权修改数据漏洞 | 2025-10-21 | 2025-10-22 |
| cnvd-2025-24606 | WordPress Keyy Two Factor Authentication plugin权限升级漏洞 | 2025-10-21 | 2025-10-22 |
| cnvd-2025-24605 | WordPress FunKItools plugin跨站请求伪造漏洞 | 2025-10-21 | 2025-10-22 |
| cnvd-2025-24604 | WordPress Find And Replace content plugin跨站脚本漏洞 | 2025-10-21 | 2025-10-22 |
| cnvd-2025-24603 | WordPress Felan Framework plugin未授权的数据修改漏洞 | 2025-10-21 | 2025-10-22 |
| cnvd-2025-24602 | WordPress External Login plugin信息泄露漏洞 | 2025-10-21 | 2025-10-22 |
| cnvd-2025-24601 | WordPress External Login plugin SQL注入漏洞 | 2025-10-21 | 2025-10-22 |
| cnvd-2025-24600 | WordPress Dynamically Display Posts plugin SQL注入漏洞 | 2025-10-21 | 2025-10-22 |
| cnvd-2025-24599 | WordPress DocoDoco Store Locator plugin任意文件上传漏洞 | 2025-10-21 | 2025-10-22 |
| cnvd-2025-24598 | WordPress Digiseller plugin跨站脚本漏洞 | 2025-10-21 | 2025-10-22 |
| cnvd-2025-24597 | WordPress Dhivehi Text plugin跨站脚本漏洞 | 2025-10-21 | 2025-10-22 |
| cnvd-2025-24596 | WordPress Demo Import Kit plugin任意文件上传漏洞 | 2025-10-21 | 2025-10-22 |
| cnvd-2025-24595 | WordPress Content Writer plugin信息泄露漏洞 | 2025-10-21 | 2025-10-22 |
| cnvd-2025-24594 | WordPress Classified Pro plugin未经授权安装插件漏洞 | 2025-10-21 | 2025-10-22 |
| cnvd-2025-24593 | WordPress BlindMatrix e-Commerce plugin文件包含漏洞 | 2025-10-21 | 2025-10-22 |
| cnvd-2025-24592 | WordPress Binary MLM Plan plugin权限提升漏洞 | 2025-10-21 | 2025-10-22 |
| cnvd-2025-24591 | WordPress Ally plugin堆栈缓冲区溢出漏洞 | 2025-10-21 | 2025-10-22 |
| cnvd-2025-24579 | Fuji Electric Tellus Lite V-Simulator堆栈缓冲区溢出漏洞 | 2022-12-23 | 2025-10-22 |
| cnvd-2025-24578 | Fuji Electric Tellus Lite V-Simulator访问控制不当漏洞 | 2023-11-27 | 2025-10-22 |
| cnvd-2025-24577 | WordPress Ova Advent plugin跨站脚本漏洞 | 2025-10-21 | 2025-10-22 |
| cnvd-2025-24576 | WordPress Outdoor plugin SQL注入漏洞 | 2025-10-21 | 2025-10-22 |
| cnvd-2025-24575 | WordPress Orion SMS OTP Verification plugin权限提升漏洞 | 2025-10-21 | 2025-10-22 |
| cnvd-2025-24505 | Google Chrome安全绕过漏洞(CNVD-2025-24505) | 2025-08-15 | 2025-10-22 |
| cnvd-2025-24504 | Google Chrome竞争条件问题漏洞(CNVD-2025-24504) | 2025-08-15 | 2025-10-22 |
| cnvd-2025-24503 | Google Android权限提升漏洞(CNVD-2025-24503) | 2025-09-08 | 2025-10-22 |
| cnvd-2025-24502 | Google Android拒绝服务漏洞(CNVD-2025-24502) | 2025-09-08 | 2025-10-22 |
| cnvd-2025-24501 | Google Android权限提升漏洞(CNVD-2025-24501) | 2025-09-08 | 2025-10-22 |
| cnvd-2025-24500 | Google Android信息泄露漏洞(CNVD-2025-24500) | 2025-09-08 | 2025-10-22 |
| cnvd-2025-24499 | Google Android信息泄露漏洞(CNVD-2025-24499) | 2025-09-08 | 2025-10-22 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2025-AVI-0111 | Multiples vulnérabilités dans les produits SolarWinds | 2025-02-11T00:00:00.000000 | 2025-02-11T00:00:00.000000 |
| CERTFR-2025-AVI-0110 | Vulnérabilité dans les produits Apple | 2025-02-11T00:00:00.000000 | 2025-02-11T00:00:00.000000 |
| CERTFR-2025-AVI-0109 | Vulnérabilité dans Nginx | 2025-02-11T00:00:00.000000 | 2025-02-11T00:00:00.000000 |
| certfr-2025-avi-0102 | Multiples vulnérabilités dans les produits Tenable | 2025-02-07T00:00:00.000000 | 2025-02-10T00:00:00.000000 |
| CERTFR-2025-AVI-0102 | Multiples vulnérabilités dans les produits Tenable | 2025-02-07T00:00:00.000000 | 2025-02-10T00:00:00.000000 |
| certfr-2025-avi-0108 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-02-07T00:00:00.000000 | 2025-02-07T00:00:00.000000 |
| certfr-2025-avi-0107 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-02-07T00:00:00.000000 | 2025-02-07T00:00:00.000000 |
| certfr-2025-avi-0106 | Multiples vulnérabilités dans les produits IBM | 2025-02-07T00:00:00.000000 | 2025-02-07T00:00:00.000000 |
| certfr-2025-avi-0105 | Multiples vulnérabilités dans Microsoft Edge | 2025-02-07T00:00:00.000000 | 2025-02-07T00:00:00.000000 |
| certfr-2025-avi-0104 | Multiples vulnérabilités dans les produits Moxa | 2025-02-07T00:00:00.000000 | 2025-02-07T00:00:00.000000 |
| certfr-2025-avi-0103 | Vulnérabilité dans les produits Synology | 2025-02-07T00:00:00.000000 | 2025-02-07T00:00:00.000000 |
| certfr-2025-avi-0101 | Vulnérabilité dans les produits Kaspersky | 2025-02-07T00:00:00.000000 | 2025-02-07T00:00:00.000000 |
| CERTFR-2025-AVI-0108 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-02-07T00:00:00.000000 | 2025-02-07T00:00:00.000000 |
| CERTFR-2025-AVI-0107 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-02-07T00:00:00.000000 | 2025-02-07T00:00:00.000000 |
| CERTFR-2025-AVI-0106 | Multiples vulnérabilités dans les produits IBM | 2025-02-07T00:00:00.000000 | 2025-02-07T00:00:00.000000 |
| CERTFR-2025-AVI-0105 | Multiples vulnérabilités dans Microsoft Edge | 2025-02-07T00:00:00.000000 | 2025-02-07T00:00:00.000000 |
| CERTFR-2025-AVI-0104 | Multiples vulnérabilités dans les produits Moxa | 2025-02-07T00:00:00.000000 | 2025-02-07T00:00:00.000000 |
| CERTFR-2025-AVI-0103 | Vulnérabilité dans les produits Synology | 2025-02-07T00:00:00.000000 | 2025-02-07T00:00:00.000000 |
| CERTFR-2025-AVI-0101 | Vulnérabilité dans les produits Kaspersky | 2025-02-07T00:00:00.000000 | 2025-02-07T00:00:00.000000 |
| certfr-2025-avi-0100 | Multiples vulnérabilités dans les produits Cisco | 2025-02-06T00:00:00.000000 | 2025-02-06T00:00:00.000000 |
| certfr-2025-avi-0099 | Multiples vulnérabilités dans les produits F5 | 2025-02-06T00:00:00.000000 | 2025-02-06T00:00:00.000000 |
| CERTFR-2025-AVI-0100 | Multiples vulnérabilités dans les produits Cisco | 2025-02-06T00:00:00.000000 | 2025-02-06T00:00:00.000000 |
| CERTFR-2025-AVI-0099 | Multiples vulnérabilités dans les produits F5 | 2025-02-06T00:00:00.000000 | 2025-02-06T00:00:00.000000 |
| certfr-2025-avi-0098 | Multiples vulnérabilités dans les produits Curl | 2025-02-05T00:00:00.000000 | 2025-02-05T00:00:00.000000 |
| certfr-2025-avi-0097 | Multiples vulnérabilités dans les produits Mozilla | 2025-02-05T00:00:00.000000 | 2025-02-05T00:00:00.000000 |
| certfr-2025-avi-0096 | Multiples vulnérabilités dans les produits HPE Aruba Networking | 2025-02-05T00:00:00.000000 | 2025-02-05T00:00:00.000000 |
| certfr-2025-avi-0095 | Multiples vulnérabilités dans Google Chrome | 2025-02-05T00:00:00.000000 | 2025-02-05T00:00:00.000000 |
| certfr-2025-avi-0094 | Vulnérabilité dans les produits Veeam | 2025-02-05T00:00:00.000000 | 2025-02-05T00:00:00.000000 |
| certfr-2025-avi-0093 | Vulnérabilité dans Google Pixel | 2025-02-05T00:00:00.000000 | 2025-02-05T00:00:00.000000 |
| CERTFR-2025-AVI-0098 | Multiples vulnérabilités dans les produits Curl | 2025-02-05T00:00:00.000000 | 2025-02-05T00:00:00.000000 |