Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2021-26040 |
N/A
|
[20210801] - Core - Insufficient access control for co… |
Joomla! Project |
Joomla! CMS |
2021-08-24T14:20:13.190Z | 2026-02-25T05:05:38.883Z |
| CVE-2021-26034 |
N/A
|
[20210503] - Core - CSRF in data download endpoints |
Joomla! Project |
Joomla! CMS |
2021-05-26T10:22:34.269Z | 2026-02-25T05:05:32.613Z |
| CVE-2021-26031 |
N/A
|
[20210402] - Core - Inadequate filters on module layou… |
Joomla! Project |
Joomla! CMS |
2021-04-14T17:35:34.974Z | 2026-02-25T05:05:31.709Z |
| CVE-2021-26037 |
N/A
|
[20210703] - Core - Lack of enforced session termination |
Joomla! Project |
Joomla! CMS |
2021-07-07T10:12:47.003Z | 2026-02-25T05:05:25.893Z |
| CVE-2021-23129 |
N/A
|
[20210303] - Core - XSS within alert messages showed t… |
Joomla! Project |
Joomla! CMS |
2021-03-04T17:37:14.594Z | 2026-02-25T05:05:19.501Z |
| CVE-2022-23801 |
N/A
|
[20220309] - Core - XSS attack vector through SVG |
Joomla! Project |
Joomla! CMS |
2022-03-30T15:20:35.023Z | 2026-02-25T05:05:17.234Z |
| CVE-2021-23127 |
N/A
|
[20210301] - Core - Insecure randomness within 2FA sec… |
Joomla! Project |
Joomla! CMS |
2021-03-04T17:37:14.392Z | 2026-02-25T05:05:14.324Z |
| CVE-2021-26029 |
N/A
|
[20210309] - Core - Inadequate filtering of form conte… |
Joomla! Project |
Joomla! CMS |
2021-03-04T17:37:15.215Z | 2026-02-25T05:05:13.379Z |
| CVE-2021-26032 |
N/A
|
[20210501] - Core - Adding HTML to the executable bloc… |
Joomla! Project |
Joomla! CMS |
2021-05-26T10:22:33.982Z | 2026-02-25T05:05:12.486Z |
| CVE-2021-26036 |
N/A
|
[20210702] - Core - DoS through usergroup table manipulation |
Joomla! Project |
Joomla! CMS |
2021-07-07T10:12:46.110Z | 2026-02-25T05:05:08.998Z |
| CVE-2022-23797 |
N/A
|
[20220305] - Core - Inadequate filtering on the selected Ids |
Joomla! Project |
Joomla! CMS |
2022-03-30T15:20:29.271Z | 2026-02-25T05:05:07.303Z |
| CVE-2021-26028 |
N/A
|
[20210308] - Core - Path Traversal within joomla/archi… |
Joomla! Project |
Joomla! CMS |
2021-03-04T17:37:15.113Z | 2026-02-25T05:04:58.355Z |
| CVE-2021-23123 |
N/A
|
[20210101] - Core - com_modules exposes module names |
Joomla! Project |
Joomla! CMS |
2021-01-12T20:19:49.325Z | 2026-02-25T05:04:57.471Z |
| CVE-2021-23130 |
N/A
|
[20210304] - Core - XSS within the feed parser library |
Joomla! Project |
Joomla! CMS |
2021-03-04T17:37:14.702Z | 2026-02-25T05:04:53.949Z |
| CVE-2021-26027 |
N/A
|
[20210307] - Core - ACL violation within com_content f… |
Joomla! Project |
Joomla! CMS |
2021-03-04T17:37:15.005Z | 2026-02-25T05:04:52.222Z |
| CVE-2021-23128 |
N/A
|
[20210302] - Core - Potential Insecure FOFEncryptRandval |
Joomla! Project |
Joomla! CMS |
2021-03-04T17:37:14.499Z | 2026-02-25T05:04:49.992Z |
| CVE-2022-23794 |
N/A
|
[20220302] - Core - Path Disclosure within filesystem … |
Joomla! Project |
Joomla! CMS |
2022-03-30T15:20:24.272Z | 2026-02-25T05:04:45.863Z |
| CVE-2021-26038 |
N/A
|
[20210704] - Core - Privilege escalation through com_i… |
Joomla! Project |
Joomla! CMS |
2021-07-07T10:12:47.940Z | 2026-02-25T05:04:44.258Z |
| CVE-2022-23799 |
N/A
|
[20220307] - Core - Variable Tampering on JInput $_REQ… |
Joomla! Project |
Joomla! CMS |
2022-03-30T15:20:32.231Z | 2026-02-25T05:04:43.297Z |
| CVE-2021-26033 |
N/A
|
[20210502] - Core - CSRF in AJAX reordering endpoint |
Joomla! Project |
Joomla! CMS |
2021-05-26T10:22:34.147Z | 2026-02-25T05:04:37.802Z |
| CVE-2021-23124 |
N/A
|
[20210102] - Core - XSS in mod_breadcrumbs aria-label … |
Joomla! Project |
Joomla! CMS |
2021-01-12T20:19:49.480Z | 2026-02-25T05:04:36.940Z |
| CVE-2022-27911 |
N/A
|
[20220801] - Core - Multiple Full Path Disclosures bec… |
Joomla! Project |
Joomla! CMS |
2022-08-31T10:00:14.200Z | 2026-02-25T05:04:35.332Z |
| CVE-2022-23796 |
N/A
|
[20220304] - Core - Missing input validation within co… |
Joomla! Project |
Joomla! CMS |
2022-03-30T15:20:27.595Z | 2026-02-25T05:04:34.293Z |
| CVE-2021-26039 |
N/A
|
[20210705] - Core - XSS in com_media imagelist |
Joomla! Project |
Joomla! CMS |
2021-07-07T10:12:48.839Z | 2026-02-25T05:04:33.341Z |
| CVE-2022-23793 |
N/A
|
[20220301] - Core - Zip Slip within the Tar extractor |
Joomla! Project |
Joomla! CMS |
2022-03-30T15:20:22.462Z | 2026-02-25T05:04:28.908Z |
| CVE-2021-23126 |
N/A
|
[20210301] - Core - Insecure randomness within 2FA sec… |
Joomla! Project |
Joomla! CMS |
2021-03-04T17:37:14.262Z | 2026-02-25T05:04:24.646Z |
| CVE-2021-23131 |
N/A
|
[20210305] - Core - Input validation within the templa… |
Joomla! Project |
Joomla! CMS |
2021-03-04T17:37:14.799Z | 2026-02-25T05:04:22.379Z |
| CVE-2021-26030 |
N/A
|
[20210401] - Core - Escape xss in logo parameter error pages |
Joomla! Project |
Joomla! CMS |
2021-04-14T17:34:57.954Z | 2026-02-25T05:04:18.089Z |
| CVE-2026-26351 |
4.8 (4.0)
|
GetSimpleCMS-CE < 3.3.22 Stored XSS via components.php |
GetSimpleCMS-CE |
GetSimpleCMS-CE |
2026-02-24T22:05:54.420Z | 2026-02-24T22:05:54.420Z |
| CVE-2025-67970 |
5.3 (3.1)
|
WordPress Schedula plugin <= 1.0 - Broken Access Contr… |
vertim |
Schedula |
2026-02-20T15:46:28.741Z | 2026-02-24T21:57:13.412Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-22276 |
5.5 (3.1)
|
Dell ECS, versions 3.8.1.0 through 3.8.1.7, and D… |
Dell |
ObjectScale |
2026-01-23T09:42:46.521Z | 2026-01-23T15:14:02.380Z |
| CVE-2026-22275 |
4.4 (3.1)
|
Dell ECS, versions 3.8.1.0 through 3.8.1.7, and D… |
Dell |
ObjectScale |
2026-01-23T09:34:34.710Z | 2026-01-23T15:15:44.763Z |
| CVE-2026-22274 |
6.5 (3.1)
|
Dell ECS, versions 3.8.1.0 through 3.8.1.7, and D… |
Dell |
ObjectScale |
2026-01-23T09:25:04.509Z | 2026-01-23T15:16:16.656Z |
| CVE-2026-22273 |
8.8 (3.1)
|
Dell ECS, versions 3.8.1.0 through 3.8.1.7, and D… |
Dell |
ObjectScale |
2026-01-23T09:14:38.455Z | 2026-02-26T14:44:23.966Z |
| CVE-2026-22271 |
7.5 (3.1)
|
Dell ECS, versions 3.8.1.0 through 3.8.1.7, and D… |
Dell |
ObjectScale |
2026-01-23T08:54:16.081Z | 2026-02-26T14:44:24.284Z |
| CVE-2020-7796 |
9.8 (3.1)
|
Zimbra Collaboration Suite (ZCS) before 8.8.15 Pa… |
n/a |
n/a |
2020-02-18T21:14:22.000Z | 2026-02-18T04:56:25.831Z |
| CVE-2024-7694 |
7.2 (3.1)
|
TeamT5 ThreatSonar Anti-Ransomware - Arbitrary File Upload |
TeamT5 |
ThreatSonar Anti-Ransomware |
2024-08-12T03:00:55.680Z | 2026-02-18T04:56:25.049Z |
| CVE-2026-25421 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. Collision with another CVE. | N/A | N/A | 2026-02-18T07:39:45.404Z | 2026-02-18T07:41:24.693Z |
| CVE-2026-1701 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
itsourcecode School Management System index.php sql in… |
itsourcecode |
School Management System |
2026-01-30T17:32:06.994Z | 2026-02-23T09:10:49.982Z |
| CVE-2026-27038 |
N/A
|
Not used | N/A | N/A | 2026-02-18T03:55:05.932Z | |
| CVE-2026-27037 |
N/A
|
Not used | N/A | N/A | 2026-02-18T03:55:06.437Z | |
| CVE-2026-27036 |
N/A
|
Not used | N/A | N/A | 2026-02-18T03:55:06.898Z | |
| CVE-2026-27035 |
N/A
|
Not used | N/A | N/A | 2026-02-18T03:55:07.402Z | |
| CVE-2026-27034 |
N/A
|
Not used | N/A | N/A | 2026-02-18T03:55:07.915Z | |
| CVE-2026-27033 |
N/A
|
Not used | N/A | N/A | 2026-02-18T03:55:08.383Z | |
| CVE-2026-27032 |
N/A
|
Not used | N/A | N/A | 2026-02-18T03:55:08.860Z | |
| CVE-2026-27031 |
N/A
|
Not used | N/A | N/A | 2026-02-18T03:55:09.350Z | |
| CVE-2026-2570 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage. | N/A | N/A | 2026-02-17T22:54:07.878Z | |
| CVE-2025-65128 |
8.1 (3.1)
|
A missing authentication mechanism in the web man… |
n/a |
n/a |
2026-02-11T00:00:00.000Z | 2026-02-17T21:46:22.939Z |
| CVE-2025-65127 |
6.5 (3.1)
|
A lack of session validation in the web API compo… |
n/a |
n/a |
2026-02-11T00:00:00.000Z | 2026-02-17T21:46:35.476Z |
| CVE-2026-24135 |
7.2 (4.0)
|
Gogs vulnerable to arbitrary file deletion via path tr… |
gogs |
gogs |
2026-02-06T17:47:49.935Z | 2026-02-06T18:08:28.398Z |
| CVE-2026-23633 |
6.5 (3.1)
|
Gogs has arbitrary file read/write via path traversal … |
gogs |
gogs |
2026-02-06T17:46:59.683Z | 2026-02-06T18:53:26.328Z |
| CVE-2026-23632 |
6.5 (3.1)
|
Gogs user can update repository content with read-only… |
gogs |
gogs |
2026-02-06T17:43:45.757Z | 2026-02-06T18:54:15.180Z |
| CVE-2022-4759 |
6.8 (3.1)
|
GigPress < 2.3.28 - Contributor+ Stored XSS via Shortcode |
Unknown |
GigPress |
2023-02-13T14:32:34.943Z | 2025-03-20T20:41:24.834Z |
| CVE-2026-22592 |
6.5 (3.1)
|
Gogs is Vulnerable to Denial of Service |
gogs |
gogs |
2026-02-06T17:42:26.326Z | 2026-02-06T18:55:18.874Z |
| CVE-2025-64175 |
7.7 (4.0)
|
Gogs Vulnerable to 2FA Bypass via Recovery Code |
gogs |
gogs |
2026-02-06T17:41:07.321Z | 2026-02-26T15:04:15.736Z |
| CVE-2026-21643 |
9.1 (3.1)
|
An improper neutralization of special elements us… |
Fortinet |
FortiClientEMS |
2026-02-06T08:24:43.877Z | 2026-02-26T15:04:16.332Z |
| CVE-2026-25635 |
8.6 (3.1)
|
calibre has a Path Traversal Leading to Arbitrary File… |
kovidgoyal |
calibre |
2026-02-06T20:10:29.839Z | 2026-02-11T14:54:23.143Z |
| CVE-2026-25636 |
8.2 (3.1)
|
calibre has a Path Traversal Leading to Arbitrary File… |
kovidgoyal |
calibre |
2026-02-06T20:07:40.529Z | 2026-02-11T14:51:19.827Z |
| CVE-2026-25731 |
7.8 (3.1)
|
Calibre Affected by Arbitrary Code Execution via Serve… |
kovidgoyal |
calibre |
2026-02-06T20:14:35.822Z | 2026-02-06T21:02:01.147Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-24135 | Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, a path traversal vulne… | 2026-02-06T18:15:57.483 | 2026-02-17T21:55:35.007 |
| fkie_cve-2026-23633 | Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, there is an arbitrary … | 2026-02-06T18:15:56.727 | 2026-02-17T21:54:40.833 |
| fkie_cve-2026-23632 | Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, the endpoint "PUT /rep… | 2026-02-06T18:15:56.553 | 2026-02-17T21:53:45.123 |
| fkie_cve-2022-4759 | The GigPress WordPress plugin before 2.3.28 does not validate and escape some of its shortcode attr… | 2023-02-13T15:15:19.880 | 2026-02-17T21:51:16.210 |
| fkie_cve-2026-22592 | Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, an authenticated user … | 2026-02-06T18:15:56.357 | 2026-02-17T21:40:59.010 |
| fkie_cve-2025-64175 | Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, Gogs’ 2FA recovery cod… | 2026-02-06T18:15:55.357 | 2026-02-17T21:38:20.497 |
| fkie_cve-2026-21643 | An improper neutralization of special elements used in an sql command ('sql injection') vulnerabili… | 2026-02-06T09:15:49.330 | 2026-02-17T21:34:17.517 |
| fkie_cve-2026-25635 | calibre is an e-book manager. Prior to 9.2.0, Calibre's CHM reader contains a path traversal vulner… | 2026-02-06T21:16:18.690 | 2026-02-17T21:27:17.940 |
| fkie_cve-2026-25636 | calibre is an e-book manager. In 9.1.0 and earlier, a path traversal vulnerability in Calibre's EPU… | 2026-02-06T21:16:18.833 | 2026-02-17T21:23:11.340 |
| fkie_cve-2026-25731 | calibre is an e-book manager. Prior to 9.2.0, a Server-Side Template Injection (SSTI) vulnerability… | 2026-02-06T21:16:19.457 | 2026-02-17T21:18:56.893 |
| fkie_cve-2026-22709 | vm2 is an open source vm/sandbox for Node.js. In vm2 prior to version 3.10.2, `Promise.prototype.th… | 2026-01-26T22:15:55.890 | 2026-02-17T20:59:29.590 |
| fkie_cve-2026-24003 | EVerest is an EV charging software stack. In versions up to and including 2025.12.1, it is possible… | 2026-01-26T22:15:56.513 | 2026-02-17T20:48:01.273 |
| fkie_cve-2026-24476 | Shaarli is a personal bookmarking service. Prior to version 0.16.0, crafting a malicious tag which … | 2026-01-26T23:16:09.283 | 2026-02-17T20:45:33.310 |
| fkie_cve-2026-24486 | Python-Multipart is a streaming multipart parser for Python. Prior to version 0.0.22, a Path Traver… | 2026-01-27T01:16:02.303 | 2026-02-17T20:44:50.210 |
| fkie_cve-2026-20628 | A permissions issue was addressed with additional restrictions. This issue is fixed in watchOS 26.3… | 2026-02-11T23:16:06.287 | 2026-02-17T20:43:41.627 |
| fkie_cve-2026-20671 | A logic issue was addressed with improved checks. This issue is fixed in watchOS 26.3, tvOS 26.3, m… | 2026-02-11T23:16:09.317 | 2026-02-17T20:43:35.363 |
| fkie_cve-2020-37200 | NetShareWatcher 1.5.8.0 contains a buffer overflow vulnerability in the registration key input that… | 2026-02-11T21:16:14.790 | 2026-02-17T20:37:26.590 |
| fkie_cve-2021-47723 | STVS ProVision 5.9.10 contains a cross-site request forgery vulnerability that allows attackers to … | 2025-12-09T21:15:50.770 | 2026-02-17T20:36:44.613 |
| fkie_cve-2026-24490 | MobSF is a mobile application security testing tool used. Prior to version 4.4.5, a Stored Cross-si… | 2026-01-27T01:16:02.610 | 2026-02-17T20:36:16.200 |
| fkie_cve-2020-37201 | NetShareWatcher 1.5.8.0 contains a buffer overflow vulnerability in the registration name input tha… | 2026-02-11T21:16:14.963 | 2026-02-17T20:29:06.277 |
| fkie_cve-2026-1361 | ASDA-Soft Stack-based Buffer Overflow Vulnerability | 2026-01-27T04:16:03.580 | 2026-02-17T20:12:13.893 |
| fkie_cve-2026-26020 | AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelli… | 2026-02-12T21:16:03.500 | 2026-02-17T20:10:42.077 |
| fkie_cve-2026-20675 | The issue was addressed with improved bounds checks. This issue is fixed in watchOS 26.3, tvOS 26.3… | 2026-02-11T23:16:09.870 | 2026-02-17T20:07:37.660 |
| fkie_cve-2026-21720 | Every uncached /avatar/:hash request spawns a goroutine that refreshes the Gravatar image. If the r… | 2026-01-27T09:15:48.490 | 2026-02-17T20:06:27.733 |
| fkie_cve-2025-62616 | AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelli… | 2026-02-04T23:15:55.500 | 2026-02-17T20:05:19.853 |
| fkie_cve-2026-24793 | Out-of-bounds Write, Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnera… | 2026-01-27T09:15:48.940 | 2026-02-17T20:01:06.373 |
| fkie_cve-2024-8499 | The Checkout Field Editor (Checkout Manager) for WooCommerce plugin for WordPress is vulnerable to … | 2024-10-04T13:15:12.380 | 2026-02-17T19:59:20.527 |
| fkie_cve-2025-62615 | AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelli… | 2026-02-04T23:15:55.347 | 2026-02-17T19:57:15.010 |
| fkie_cve-2021-41773 | A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker c… | 2021-10-05T09:15:07.593 | 2026-02-17T19:49:26.367 |
| fkie_cve-2025-64097 | NervesHub is a web service that allows users to manage over-the-air (OTA) firmware updates of devic… | 2026-01-22T15:16:48.223 | 2026-02-17T19:37:14.133 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-g274-9873-jcxx |
8.7 (3.1)
|
A SQL injection vulnerability in ArcGIS Server allows an EDIT operation to modify Column properties… | 2025-03-03T21:31:00Z | 2026-02-06T09:30:28Z |
| ghsa-cxm9-pc6x-88r5 |
8.5 (3.1)
|
There is an improper access control issue in ArcGIS Server versions 10.9.1 through 11.3 on Windows … | 2025-03-03T21:31:00Z | 2026-02-06T09:30:28Z |
| ghsa-cjx7-q2fj-7wmv |
6.4 (3.1)
|
The WaveSurfer-WP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin'… | 2026-02-06T09:30:28Z | 2026-02-06T09:30:28Z |
| ghsa-8fvm-73q4-3j6f |
6.1 (3.1)
|
There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS versions 10.8.1 – 11… | 2024-04-04T18:30:33Z | 2026-02-06T09:30:28Z |
| ghsa-6xm9-322m-9c67 |
4.7 (3.1)
2.0 (4.0)
|
A vulnerability was found in DCN DCME-320 up to 20260121. Impacted is the function apply_config of … | 2026-02-06T09:30:28Z | 2026-02-06T09:30:28Z |
| ghsa-6cm9-fxg7-j8m3 |
6.4 (3.1)
|
The Orange Confort+ accessibility toolbar for WordPress plugin for WordPress is vulnerable to Store… | 2026-02-06T09:30:28Z | 2026-02-06T09:30:28Z |
| ghsa-3xr5-7rvh-x3v2 |
5.4 (3.1)
|
There is a cross site scripting vulnerability in the Esri Portal for ArcGIS Experience Builder 11.1… | 2024-04-04T18:30:33Z | 2026-02-06T09:30:28Z |
| ghsa-3pq4-wgqv-gq3h |
8.8 (4.0)
|
Improper Validation of Specified Quantity in Input vulnerability in Mitsubishi Electric MELSEC iQ-R… | 2026-02-05T06:31:23Z | 2026-02-06T09:30:28Z |
| ghsa-2hm9-gmg4-99ff |
6.4 (3.1)
|
The Tune Library plugin for WordPress is vulnerable to Stored Cross-Site Scripting via CSV import i… | 2026-02-06T09:30:28Z | 2026-02-06T09:30:28Z |
| ghsa-xm5c-f9c6-j794 |
|
Rejected reason: Not used | 2026-02-06T06:30:27Z | 2026-02-06T06:30:27Z |
| ghsa-whpv-427c-7hc3 |
8.8 (3.1)
|
A security issue was discovered in ingress-nginx where the `nginx.ingress.kubernetes.io/auth-proxy-… | 2026-02-06T06:30:27Z | 2026-02-06T06:30:27Z |
| ghsa-wc5c-v4xj-2863 |
|
Rejected reason: Not used | 2026-02-06T06:30:27Z | 2026-02-06T06:30:27Z |
| ghsa-w9cm-pp72-6f77 |
|
Rejected reason: Not used | 2026-02-06T06:30:27Z | 2026-02-06T06:30:27Z |
| ghsa-v6mc-qhp8-9w23 |
3.3 (3.1)
1.9 (4.0)
|
A security vulnerability has been detected in oatpp up to 1.3.1. This impacts the function oatpp::d… | 2026-02-06T06:30:27Z | 2026-02-06T06:30:27Z |
| ghsa-rcq9-4v75-4fh5 |
6.3 (3.1)
2.1 (4.0)
|
A security vulnerability has been detected in isaacwasserman mcp-vegalite-server up to 16aefed598b8… | 2026-02-06T06:30:27Z | 2026-02-06T06:30:27Z |
| ghsa-q6pc-8w63-684m |
|
Rejected reason: Not used | 2026-02-06T06:30:27Z | 2026-02-06T06:30:27Z |
| ghsa-p288-22vx-pc36 |
|
Rejected reason: Not used | 2026-02-06T06:30:27Z | 2026-02-06T06:30:27Z |
| ghsa-gxgq-rpmr-r8xr |
5.3 (3.1)
1.9 (4.0)
|
A flaw has been found in mruby up to 3.4.0. This affects the function mrb_vm_exec of the file src/v… | 2026-02-06T06:30:27Z | 2026-02-06T06:30:27Z |
| ghsa-cfcw-xxj2-5vrw |
5.3 (3.1)
5.5 (4.0)
|
A vulnerability was detected in kalyan02 NanoCMS up to 0.4. Affected by this issue is some unknown … | 2026-02-06T06:30:27Z | 2026-02-06T06:30:27Z |
| ghsa-6rqp-5xh4-j422 |
3.3 (3.1)
1.9 (4.0)
|
A vulnerability was detected in libuvc up to 0.0.7. Affected is the function uvc_scan_streaming of … | 2026-02-06T06:30:27Z | 2026-02-06T06:30:27Z |
| ghsa-5f4w-gxg9-4p64 |
4.2 (3.1)
|
A security flaw was identified in the Ansible Lightspeed API conversation endpoints that handle AI … | 2026-02-06T06:30:27Z | 2026-02-06T06:30:27Z |
| ghsa-4rr6-xjjm-27jm |
|
Rejected reason: Not used | 2026-02-06T06:30:27Z | 2026-02-06T06:30:27Z |
| ghsa-3cw3-cmx9-v84h |
|
Rejected reason: Not used | 2026-02-06T06:30:27Z | 2026-02-06T06:30:27Z |
| ghsa-jr33-9q9c-ppp3 |
5.3 (3.1)
5.5 (4.0)
|
A vulnerability was identified in Free5GC up to 4.1.0. This affects the function ResolveNodeIdToIp … | 2026-02-06T03:30:19Z | 2026-02-06T03:30:19Z |
| ghsa-jfhf-hgcv-5v98 |
5.3 (3.1)
5.5 (4.0)
|
A security flaw has been discovered in Free5GC up to 4.1.0. This impacts the function identityTrigg… | 2026-02-06T03:30:19Z | 2026-02-06T03:30:19Z |
| ghsa-cj3g-43ph-gvg8 |
5.3 (3.1)
5.5 (4.0)
|
A vulnerability was found in Edimax BR-6208AC 2_1.02. The affected element is the function auth_che… | 2026-02-06T03:30:19Z | 2026-02-06T03:30:19Z |
| ghsa-cc7g-vfw3-m4mr |
4.3 (3.1)
|
The Timeline Block – Beautiful Timeline Builder for WordPress (Vertical & Horizontal Timelines) plu… | 2026-02-06T03:30:19Z | 2026-02-06T03:30:19Z |
| ghsa-5h25-r5h3-xwpw |
5.3 (3.1)
5.5 (4.0)
|
A weakness has been identified in Free5GC up to 4.1.0. Affected is the function SessionDeletionResp… | 2026-02-06T03:30:19Z | 2026-02-06T03:30:19Z |
| ghsa-3vf6-mf65-w8r8 |
2.4 (3.1)
1.9 (4.0)
|
A vulnerability has been found in Edimax BR-6288ACL up to 1.12. Impacted is the function wiz_WISP24… | 2026-02-06T03:30:18Z | 2026-02-06T03:30:19Z |
| ghsa-3gmf-2m92-wrxq |
5.3 (3.1)
5.5 (4.0)
|
A vulnerability was determined in Free5GC up to 4.1.0. The impacted element is the function establi… | 2026-02-06T03:30:19Z | 2026-02-06T03:30:19Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-30075 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.280962Z |
| gsd-2024-30977 | An issue in Secnet Security Network Intelligent AC Management System v.1.02.040 allows a … | 2024-04-03T05:02:29.280774Z |
| gsd-2024-30572 | Netgear R6850 1.1.0.88 was discovered to contain a command injection vulnerability via th… | 2024-04-03T05:02:29.280582Z |
| gsd-2024-30412 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.280393Z |
| gsd-2024-30828 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.280204Z |
| gsd-2024-30706 | An issue was discovered in ROS2 Dashing Diademata versions ROS_VERSION is 2 and ROS_PYTHO… | 2024-04-03T05:02:29.280005Z |
| gsd-2024-30031 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.279804Z |
| gsd-2024-30029 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.279599Z |
| gsd-2024-30640 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.279392Z |
| gsd-2024-30232 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:29.278690Z |
| gsd-2024-30471 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.278176Z |
| gsd-2024-30401 | An Out-of-bounds Read vulnerability in the advanced forwarding management process aftman … | 2024-04-03T05:02:29.277978Z |
| gsd-2024-30377 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.277755Z |
| gsd-2024-30645 | Tenda AC15V1.0 V15.03.20_multi has a command injection vulnerability via the deviceName p… | 2024-04-03T05:02:29.277372Z |
| gsd-2024-30829 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.277102Z |
| gsd-2024-30204 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.276785Z |
| gsd-2024-30778 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.276446Z |
| gsd-2024-30656 | An issue in Fireboltt Dream Wristphone BSW202_FB_AAC_v2.0_20240110-20240110-1956 allows a… | 2024-04-03T05:02:29.276239Z |
| gsd-2024-30394 | A Stack-based Buffer Overflow vulnerability in the Routing Protocol Daemon (RPD) componen… | 2024-04-03T05:02:29.276031Z |
| gsd-2024-30649 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.275785Z |
| gsd-2024-30059 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.275589Z |
| gsd-2024-30744 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.275391Z |
| gsd-2024-30941 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.275185Z |
| gsd-2024-30713 | An OS command injection vulnerability has been discovered in ROS2 Dashing Diademata in RO… | 2024-04-03T05:02:29.274979Z |
| gsd-2024-30694 | A shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Galacti… | 2024-04-03T05:02:29.274769Z |
| gsd-2024-30376 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.274504Z |
| gsd-2024-30668 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.274248Z |
| gsd-2024-30002 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.274020Z |
| gsd-2024-30834 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.273827Z |
| gsd-2024-30711 | An issue was discovered in the default configurations of ROS2 Dashing Diademata in ROS_VE… | 2024-04-03T05:02:29.273625Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-191517 | Malicious code in mongodb-atlas-cli-toc-generator (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191516 | Malicious code in markdownlint-cli2-action (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191515 | Malicious code in leafygreen-docs (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191514 | Malicious code in kubernetes-helm (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191513 | Malicious code in kubernetes-controller-tools (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191512 | Malicious code in kubebuilder (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191511 | Malicious code in iife-sample (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191510 | Malicious code in hpi-porsche-app (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191509 | Malicious code in debug-common (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191508 | Malicious code in dataset-view (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191507 | Malicious code in b3dtiles-sample (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191506 | Malicious code in animation-debug-app (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191505 | Malicious code in angular-promql (npm) | 2025-12-01T16:16:28Z | 2025-12-01T16:16:28Z |
| mal-2025-191603 | Malicious code in xmenddddl (npm) | 2025-12-01T13:30:42Z | 2025-12-01T13:30:42Z |
| mal-2025-191433 | Malicious code in tcsp (npm) | 2025-11-25T00:16:49Z | 2025-12-01T13:29:22Z |
| mal-2025-191404 | Malicious code in quickswap-ads-list (npm) | 2025-11-25T00:16:49Z | 2025-12-01T13:29:22Z |
| mal-2025-191397 | Malicious code in hyper-fullfacing (npm) | 2025-11-25T00:16:49Z | 2025-12-01T13:29:20Z |
| mal-2025-191345 | Malicious code in @voiceflow/eslint-config (npm) | 2025-11-25T00:16:49Z | 2025-12-01T13:29:18Z |
| mal-2025-191331 | Malicious code in @voiceflow/alexa-types (npm) | 2025-11-25T00:16:49Z | 2025-12-01T13:29:18Z |
| mal-2025-191235 | Malicious code in @ifelsedeveloper/protocol-contracts-svm-idl (npm) | 2025-11-24T23:47:09Z | 2025-12-01T13:29:18Z |
| mal-2025-190915 | Malicious code in @seung-ju/react-native-action-sheet (npm) | 2025-11-24T16:31:47Z | 2025-12-01T13:29:18Z |
| mal-2025-191662 | Malicious code in starexx (PyPI) | 2025-12-01T12:55:04Z | 2025-12-01T12:55:04Z |
| mal-2025-191660 | Malicious code in rsa2026 (PyPI) | 2025-12-01T12:55:00Z | 2025-12-01T12:55:00Z |
| mal-2025-191656 | Malicious code in realstarexx (PyPI) | 2025-12-01T12:54:55Z | 2025-12-01T12:54:55Z |
| mal-2025-191639 | Malicious code in imad213insta (PyPI) | 2025-12-01T12:54:29Z | 2025-12-01T12:54:29Z |
| mal-2025-191615 | Malicious code in solnetunified (NuGet) | 2025-12-01T12:54:00Z | 2025-12-01T12:54:00Z |
| mal-2025-191614 | Malicious code in solnetplus (NuGet) | 2025-12-01T12:53:59Z | 2025-12-01T12:53:59Z |
| mal-2025-191613 | Malicious code in solnetall (NuGet) | 2025-12-01T12:53:59Z | 2025-12-01T12:53:59Z |
| mal-2025-191612 | Malicious code in solananet (NuGet) | 2025-12-01T12:53:58Z | 2025-12-01T12:53:58Z |
| mal-2025-191610 | Malicious code in nethereumunified (NuGet) | 2025-12-01T12:53:58Z | 2025-12-01T12:53:58Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-0204 | Red Hat Trusted Profile Analyzer: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-01-27T23:00:00.000+00:00 | 2025-01-27T23:00:00.000+00:00 |
| wid-sec-w-2025-0203 | TeamViewer: Schwachstelle ermöglicht Privilegieneskalation | 2025-01-27T23:00:00.000+00:00 | 2025-01-27T23:00:00.000+00:00 |
| wid-sec-w-2025-0199 | Apple Safari: Mehrere Schwachstellen | 2025-01-27T23:00:00.000+00:00 | 2025-01-27T23:00:00.000+00:00 |
| wid-sec-w-2025-0198 | IBM MQ: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-01-27T23:00:00.000+00:00 | 2025-01-27T23:00:00.000+00:00 |
| wid-sec-w-2025-0033 | GitLab: Mehrere Schwachstellen | 2025-01-08T23:00:00.000+00:00 | 2025-01-27T23:00:00.000+00:00 |
| wid-sec-w-2024-3745 | Linux Kernel - BlueZ: Mehrere Schwachstellen | 2020-10-14T22:00:00.000+00:00 | 2025-01-27T23:00:00.000+00:00 |
| wid-sec-w-2024-1894 | FRRouting Project FRRouting: Schwachstelle ermöglicht Denial of Service | 2024-08-21T22:00:00.000+00:00 | 2025-01-27T23:00:00.000+00:00 |
| wid-sec-w-2024-0536 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2024-03-03T23:00:00.000+00:00 | 2025-01-27T23:00:00.000+00:00 |
| wid-sec-w-2023-0953 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2023-04-12T22:00:00.000+00:00 | 2025-01-27T23:00:00.000+00:00 |
| wid-sec-w-2025-0197 | Apache Solr: Mehrere Schwachstellen | 2025-01-26T23:00:00.000+00:00 | 2025-01-26T23:00:00.000+00:00 |
| wid-sec-w-2025-0196 | Microsoft Edge: Schwachstelle ermöglicht Darstellen falscher Informationen | 2025-01-26T23:00:00.000+00:00 | 2025-01-26T23:00:00.000+00:00 |
| wid-sec-w-2025-0195 | Apache Wicket: Schwachstelle ermöglicht Denial of Service | 2025-01-26T23:00:00.000+00:00 | 2025-01-26T23:00:00.000+00:00 |
| wid-sec-w-2025-0192 | Wind River VxWorks: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-01-26T23:00:00.000+00:00 | 2025-01-26T23:00:00.000+00:00 |
| wid-sec-w-2024-1372 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2021-10-24T22:00:00.000+00:00 | 2025-01-26T23:00:00.000+00:00 |
| wid-sec-w-2023-1250 | Linux Kernel: Mehrere Schwachstellen | 2023-05-18T22:00:00.000+00:00 | 2025-01-26T23:00:00.000+00:00 |
| wid-sec-w-2022-0159 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-03-23T23:00:00.000+00:00 | 2025-01-26T23:00:00.000+00:00 |
| wid-sec-w-2025-0185 | Cambium Networks cnPilot und cnMaestro: Schwachstelle ermöglicht Codeausführung | 2025-01-23T23:00:00.000+00:00 | 2025-01-23T23:00:00.000+00:00 |
| wid-sec-w-2025-0184 | Checkmk: Schwachstelle ermöglicht Injektion von Kommandos | 2025-01-23T23:00:00.000+00:00 | 2025-01-23T23:00:00.000+00:00 |
| wid-sec-w-2025-0174 | SonicWall SMA: Schwachstelle ermöglicht Ausführung von Kommandos | 2025-01-22T23:00:00.000+00:00 | 2025-01-23T23:00:00.000+00:00 |
| wid-sec-w-2024-3709 | Mattermost: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-12-16T23:00:00.000+00:00 | 2025-01-23T23:00:00.000+00:00 |
| wid-sec-w-2024-3122 | Microsoft SystemCenter: Mehrere Schwachstellen | 2024-10-08T22:00:00.000+00:00 | 2025-01-23T23:00:00.000+00:00 |
| wid-sec-w-2024-1291 | cyrus imapd: Schwachstelle ermöglicht Denial of Service | 2024-06-04T22:00:00.000+00:00 | 2025-01-23T23:00:00.000+00:00 |
| wid-sec-w-2022-2247 | Cacti: Schwachstelle ermöglicht Codeausführung | 2022-12-06T23:00:00.000+00:00 | 2025-01-23T23:00:00.000+00:00 |
| wid-sec-w-2022-0389 | cyrus imapd: Schwachstelle ermöglicht Denial of Service | 2021-08-31T22:00:00.000+00:00 | 2025-01-23T23:00:00.000+00:00 |
| wid-sec-w-2022-0388 | cyrus imapd: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2019-11-19T23:00:00.000+00:00 | 2025-01-23T23:00:00.000+00:00 |
| wid-sec-w-2025-0183 | Drupal: Mehrere Schwachstellen | 2025-01-22T23:00:00.000+00:00 | 2025-01-22T23:00:00.000+00:00 |
| wid-sec-w-2025-0182 | Octopus Deploy: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-01-22T23:00:00.000+00:00 | 2025-01-22T23:00:00.000+00:00 |
| wid-sec-w-2025-0181 | M-Files Server: Mehrere Schwachstellen | 2025-01-22T23:00:00.000+00:00 | 2025-01-22T23:00:00.000+00:00 |
| wid-sec-w-2025-0180 | Ubiquiti UniFi: Schwachstelle ermöglicht Umgehung von Sicherheitsmechanismen | 2025-01-22T23:00:00.000+00:00 | 2025-01-22T23:00:00.000+00:00 |
| wid-sec-w-2025-0179 | Kibana: Mehrere Schwachstellen | 2025-01-22T23:00:00.000+00:00 | 2025-01-22T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2015:2549 | Red Hat Security Advisory: libxml2 security update | 2015-12-07T10:13:44+00:00 | 2026-01-28T22:58:42+00:00 |
| rhsa-2016:1218 | Red Hat Security Advisory: Red Hat JBoss BPM Suite security and bug fix update | 2016-06-09T13:49:45+00:00 | 2026-01-28T22:58:41+00:00 |
| rhsa-2016:1089 | Red Hat Security Advisory: Red Hat JBoss Web Server 3.0.3 security update | 2016-05-17T16:12:21+00:00 | 2026-01-28T22:58:40+00:00 |
| rhsa-2016:0125 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.6 update | 2016-02-04T21:18:23+00:00 | 2026-01-28T22:58:40+00:00 |
| rhsa-2016:0124 | Red Hat Security Advisory: jboss-ec2-eap security and enhancement update for EAP 6.4.6 | 2016-02-04T21:18:29+00:00 | 2026-01-28T22:58:40+00:00 |
| rhsa-2016:0123 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.6 update on RHEL 7 | 2016-02-04T21:32:59+00:00 | 2026-01-28T22:58:40+00:00 |
| rhsa-2016:0122 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.6 update on RHEL 6 | 2016-02-04T21:36:01+00:00 | 2026-01-28T22:58:40+00:00 |
| rhsa-2016:0121 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.6 update on RHEL 5 | 2016-02-04T21:42:41+00:00 | 2026-01-28T22:58:39+00:00 |
| rhsa-2016:0066 | Red Hat Security Advisory: Red Hat JBoss Data Virtualization 6.2.0 security update | 2016-01-25T22:10:54+00:00 | 2026-01-28T22:58:39+00:00 |
| rhsa-2015:2661 | Red Hat Security Advisory: Red Hat JBoss Web Server 3.0.2 security update | 2015-12-16T18:19:41+00:00 | 2026-01-28T22:58:38+00:00 |
| rhsa-2015:2660 | Red Hat Security Advisory: Red Hat JBoss Web Server 3.0.2 security update | 2015-12-16T18:19:47+00:00 | 2026-01-28T22:58:38+00:00 |
| rhsa-2015:2659 | Red Hat Security Advisory: Red Hat JBoss Web Server 3.0.2 security update | 2015-12-16T18:19:59+00:00 | 2026-01-28T22:58:38+00:00 |
| rhsa-2015:2558 | Red Hat Security Advisory: Red Hat JBoss Fuse Service Works 6.2.1 update | 2015-12-07T20:46:48+00:00 | 2026-01-28T22:58:38+00:00 |
| rhsa-2015:2550 | Red Hat Security Advisory: libxml2 security update | 2015-12-07T11:59:33+00:00 | 2026-01-28T22:58:38+00:00 |
| rhsa-2015:1254 | Red Hat Security Advisory: curl security, bug fix, and enhancement update | 2015-07-20T13:50:03+00:00 | 2026-01-28T22:58:38+00:00 |
| rhsa-2015:2159 | Red Hat Security Advisory: curl security, bug fix, and enhancement update | 2015-11-19T03:26:18+00:00 | 2026-01-28T22:58:36+00:00 |
| rhsa-2015:1858 | Red Hat Security Advisory: mod_proxy_fcgi and ceph security and bug fix update | 2015-10-01T21:00:50+00:00 | 2026-01-28T22:58:36+00:00 |
| rhsa-2015:1855 | Red Hat Security Advisory: mod_proxy_fcgi security update | 2015-10-01T20:25:42+00:00 | 2026-01-28T22:58:36+00:00 |
| rhsa-2015:1695 | Red Hat Security Advisory: jakarta-taglibs-standard security update | 2015-08-31T09:04:49+00:00 | 2026-01-28T22:58:36+00:00 |
| rhsa-2015:1551 | Red Hat Security Advisory: Red Hat JBoss Fuse Service Works 6.0.0 security update | 2015-08-05T16:20:27+00:00 | 2026-01-28T22:58:36+00:00 |
| rhsa-2015:1546 | Red Hat Security Advisory: node.js security update | 2015-08-04T17:12:14+00:00 | 2026-01-28T22:58:36+00:00 |
| rhsa-2015:1545 | Red Hat Security Advisory: node.js security update | 2015-08-04T17:12:44+00:00 | 2026-01-28T22:58:35+00:00 |
| rhsa-2015:1539 | Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.1.2 update | 2015-08-03T19:41:04+00:00 | 2026-01-28T22:58:33+00:00 |
| rhsa-2015:1538 | Red Hat Security Advisory: Red Hat JBoss BRMS 6.1.2 update | 2015-08-03T19:41:41+00:00 | 2026-01-28T22:58:33+00:00 |
| rhsa-2015:1041 | Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.1.0 update | 2015-06-01T17:08:08+00:00 | 2026-01-28T22:58:33+00:00 |
| rhsa-2015:0920 | Red Hat Security Advisory: Red Hat JBoss Operations Network 3.3.2 update | 2015-04-30T16:09:30+00:00 | 2026-01-28T22:58:33+00:00 |
| rhsa-2015:0849 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.0 update | 2015-04-16T15:39:06+00:00 | 2026-01-28T22:58:32+00:00 |
| rhsa-2015:0848 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.0 update | 2015-04-16T16:26:01+00:00 | 2026-01-28T22:58:31+00:00 |
| rhsa-2015:0847 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.0 update | 2015-04-16T16:13:53+00:00 | 2026-01-28T22:58:31+00:00 |
| rhsa-2015:0846 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.0 update | 2015-04-16T16:17:12+00:00 | 2026-01-28T22:58:31+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-46152 | In PyTorch before 2.7.0, bitwise_right_shift produces incorrect output for certain out-of-bounds values of the "other" argument. | 2025-09-02T00:00:00.000Z | 2025-12-07T01:36:18.000Z |
| msrc_cve-2025-40202 | ipmi: Rework user message limit handling | 2025-11-02T00:00:00.000Z | 2025-12-07T01:35:54.000Z |
| msrc_cve-2025-40204 | sctp: Fix MAC comparison to be constant-time | 2025-11-02T00:00:00.000Z | 2025-12-07T01:35:42.000Z |
| msrc_cve-2025-40193 | xtensa: simdisk: add input size check in proc_write_simdisk | 2025-11-02T00:00:00.000Z | 2025-12-07T01:35:30.000Z |
| msrc_cve-2025-12817 | PostgreSQL CREATE STATISTICS does not check for schema CREATE privilege | 2025-11-02T00:00:00.000Z | 2025-12-06T14:40:04.000Z |
| msrc_cve-2024-47866 | RGW DoS attack with empty HTTP header in S3 object copy | 2025-11-02T00:00:00.000Z | 2025-12-06T14:39:56.000Z |
| msrc_cve-2025-8277 | Libssh: memory exhaustion via repeated key exchange in libssh | 2025-09-02T00:00:00.000Z | 2025-12-06T14:37:35.000Z |
| msrc_cve-2023-53209 | wifi: mac80211_hwsim: Fix possible NULL dereference | 2025-09-02T00:00:00.000Z | 2025-12-06T01:01:33.000Z |
| msrc_cve-2022-50304 | mtd: core: fix possible resource leak in init_mtd() | 2025-09-02T00:00:00.000Z | 2025-12-06T01:01:27.000Z |
| msrc_cve-2022-50303 | drm/amdkfd: Fix double release compute pasid | 2025-09-02T00:00:00.000Z | 2025-12-06T01:01:22.000Z |
| msrc_cve-2025-38709 | loop: Avoid updating block size under exclusive owner | 2025-09-02T00:00:00.000Z | 2025-12-05T01:02:51.000Z |
| msrc_cve-2023-53254 | cacheinfo: Fix shared_cpu_map to handle shared caches at different levels | 2025-09-02T00:00:00.000Z | 2025-12-05T01:02:34.000Z |
| msrc_cve-2023-53248 | drm/amdgpu: install stub fence into potential unused fence pointers | 2025-09-02T00:00:00.000Z | 2025-12-05T01:02:29.000Z |
| msrc_cve-2023-53247 | btrfs: set_page_extent_mapped after read_folio in btrfs_cont_expand | 2025-09-02T00:00:00.000Z | 2025-12-05T01:02:23.000Z |
| msrc_cve-2023-53240 | xsk: check IFF_UP earlier in Tx path | 2025-09-02T00:00:00.000Z | 2025-12-05T01:02:17.000Z |
| msrc_cve-2023-53221 | bpf: Fix memleak due to fentry attach failure | 2025-09-02T00:00:00.000Z | 2025-12-05T01:02:12.000Z |
| msrc_cve-2023-53218 | rxrpc: Make it so that a waiting process can be aborted | 2025-09-02T00:00:00.000Z | 2025-12-05T01:02:06.000Z |
| msrc_cve-2025-66031 | node-forge ASN.1 Unbounded Recursion | 2025-11-02T00:00:00.000Z | 2025-12-04T14:36:01.000Z |
| msrc_cve-2025-66030 | node-forge ASN.1 OID Integer Truncation | 2025-11-02T00:00:00.000Z | 2025-12-04T14:35:55.000Z |
| msrc_cve-2025-12816 | CVE-2025-12816 | 2025-11-02T00:00:00.000Z | 2025-12-04T14:35:48.000Z |
| msrc_cve-2025-39829 | trace/fgraph: Fix the warning caused by missing unregister notifier | 2025-09-02T00:00:00.000Z | 2025-12-04T01:01:45.000Z |
| msrc_cve-2023-53292 | blk-mq: fix NULL dereference on q->elevator in blk_mq_elv_switch_none | 2025-09-02T00:00:00.000Z | 2025-12-04T01:01:35.000Z |
| msrc_cve-2022-50266 | kprobes: Fix check for probe enabled in kill_kprobe() | 2025-09-02T00:00:00.000Z | 2025-12-04T01:01:24.000Z |
| msrc_cve-2025-62223 | Microsoft Edge (Chromium-based) for Mac Spoofing Vulnerability | 2025-12-09T00:00:00.000Z | 2025-12-04T00:00:00.000Z |
| msrc_cve-2025-11494 | GNU Binutils Linker elfxx-x86.c _bfd_x86_elf_late_size_sections out-of-bounds | 2025-10-02T00:00:00.000Z | 2025-12-03T01:39:19.000Z |
| msrc_cve-2025-4953 | Podman: build context bind mount | 2025-09-02T00:00:00.000Z | 2025-12-03T01:39:03.000Z |
| msrc_cve-2025-38626 | f2fs: fix to trigger foreground gc during f2fs_map_blocks() in lfs mode | 2025-08-02T00:00:00.000Z | 2025-12-03T01:38:53.000Z |
| msrc_cve-2025-38597 | drm/rockchip: vop2: fail cleanly if missing a primary plane for a video-port | 2025-08-02T00:00:00.000Z | 2025-12-03T01:38:43.000Z |
| msrc_cve-2025-38659 | gfs2: No more self recovery | 2025-08-02T00:00:00.000Z | 2025-12-03T01:38:39.000Z |
| msrc_cve-2025-64506 | LIBPNG is vulnerable to a heap buffer over-read in `png_write_image_8bit` with grayscale+alpha or RGB/RGBA images | 2025-11-02T00:00:00.000Z | 2025-12-03T01:38:33.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202504-0591 | Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) versions prior to… | 2025-07-09T23:16:15.327000Z |
| var-202407-2437 | A vulnerability classified as critical was found in TOTOLINK A3600R 4.1.2cu.5182_B2020110… | 2025-07-09T23:14:43.171000Z |
| var-202506-3428 | A vulnerability classified as critical was found in D-Link DI-7300G+ 19.12.25A1. Affected… | 2025-07-09T23:14:41.405000Z |
| var-202506-3347 | A vulnerability was found in Tenda AC5 15.03.06.47 and classified as critical. Affected b… | 2025-07-09T23:14:05.659000Z |
| var-202405-4040 | TOTOLINK CPE CP450 v4.1.0cu.747_B20191224 was discovered to contain a stack buffer overfl… | 2025-07-09T23:13:42.076000Z |
| var-202407-2338 | A vulnerability, which was classified as critical, has been found in TOTOLINK A3600R 4.1.… | 2025-07-09T23:13:41.367000Z |
| var-202407-2401 | A vulnerability classified as critical has been found in TOTOLINK A3600R 4.1.2cu.5182_B20… | 2025-07-09T23:13:41.342000Z |
| var-202506-3359 | A vulnerability has been found in Tenda AC5 15.03.06.47 and classified as critical. Affec… | 2025-07-09T23:13:39.452000Z |
| var-202408-0215 | A vulnerability, which was classified as critical, was found in TOTOLINK EX1200L 9.3.5u.6… | 2025-07-09T23:07:08.506000Z |
| var-202410-3371 | Tenda G3 v15.01.0.5(2848_755)_EN was discovered to contain a hardcoded password vulnerabi… | 2025-07-09T23:04:24.083000Z |
| var-202402-2319 | A vulnerability classified as critical has been found in Totolink LR1200GB 9.1.0u.6619_B2… | 2025-07-09T23:01:28.547000Z |
| var-202403-2695 | TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain an unauthenticated remo… | 2025-07-09T23:01:28.337000Z |
| var-202408-0119 | A vulnerability was found in TOTOLINK N350RT 9.3.5u.6139_B20201216. It has been declared … | 2025-07-09T23:01:27.582000Z |
| var-202405-4039 | TOTOLINK CP450 v4.1.0cu.747_B20191224 was discovered to contain a stack buffer overflow v… | 2025-07-09T22:54:04.030000Z |
| var-202407-3082 | Buffer Overflow vulnerability in Tenda AC10 v4 US_AC10V4.0si_V16.03.10.20_cn allows a rem… | 2025-07-09T22:54:03.496000Z |
| var-202502-3865 | Opcenter Intelligence (formerly known as "Manufacturing Intelligence") connects manufactu… | 2025-07-09T22:54:01.924000Z |
| var-202506-1174 | A vulnerability was found in TOTOLINK A3002R 1.1.1-B20200824.0128. It has been rated as c… | 2025-07-09T19:34:40.324000Z |
| var-202012-0812 | On Tenda AC1200 (Model AC6) 15.03.06.51_multi devices, a large HTTP POST request sent to … | 2025-07-08T23:37:51.857000Z |
| var-202101-1836 | A Stored Cross-site scripting (XSS) vulnerability in /main.html Wifi Settings in Tenda AC… | 2025-07-08T23:36:09.489000Z |
| var-201301-0096 | Directory traversal vulnerability in the web server in SpecView 2.5 build 853 and earlier… | 2025-07-08T23:32:44.362000Z |
| var-202506-1267 | A vulnerability was found in TOTOLINK A3002R 1.1.1-B20200824.0128. It has been declared a… | 2025-07-08T23:31:22.968000Z |
| var-202211-1008 | The Tenda AC1200 V-W15Ev2 V15.11.0.10(1576) router is vulnerable to improper authorizatio… | 2025-07-08T23:29:55.280000Z |
| var-201211-0088 | These Sinapsi devices do not check the validity of the data before executing queries. By… | 2025-07-08T23:20:03.960000Z |
| var-201211-0090 | These Sinapsi devices do not check for special elements in commands sent to the system. … | 2025-07-08T23:20:03.908000Z |
| var-201211-0089 | These Sinapsi devices store hard-coded passwords in the PHP file of the device. By using … | 2025-07-08T23:20:03.856000Z |
| var-201211-0091 | These Sinapsi devices do not check if users that visit pages within the device have prop… | 2025-07-08T23:20:03.800000Z |
| var-202004-0712 | A vulnerability has been identified in Development/Evaluation Kits for PROFINET IO: EK-ER… | 2025-07-08T23:19:44.555000Z |
| var-202110-1352 | Multiple Cisco products are affected by a vulnerability in Snort rules that could allow a… | 2025-07-07T21:42:43.451000Z |
| var-202506-0907 | A vulnerability classified as critical was found in TOTOLINK EX1200T 4.1.2cu.5232_B202107… | 2025-07-06T23:48:44.767000Z |
| var-202506-1285 | A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been rated as critical. … | 2025-07-06T23:48:44.727000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2024:3338-1 | Security update for the Linux Kernel | 2024-09-19T14:32:01Z | 2024-09-19T14:32:01Z |
| suse-su-2024:3337-1 | Security update for the Linux Kernel | 2024-09-19T14:30:41Z | 2024-09-19T14:30:41Z |
| suse-su-2024:3336-1 | Security update for the Linux Kernel RT (Live Patch 13 for SLE 15 SP5) | 2024-09-19T13:33:31Z | 2024-09-19T13:33:31Z |
| suse-su-2024:3334-1 | Security update for the Linux Kernel RT (Live Patch 14 for SLE 15 SP5) | 2024-09-19T13:03:59Z | 2024-09-19T13:03:59Z |
| suse-su-2024:3333-1 | Security update for wireshark | 2024-09-19T09:11:49Z | 2024-09-19T09:11:49Z |
| suse-su-2024:3332-1 | Security update for ucode-intel | 2024-09-19T09:11:19Z | 2024-09-19T09:11:19Z |
| suse-su-2024:3324-1 | Security update for runc | 2024-09-19T06:52:10Z | 2024-09-19T06:52:10Z |
| suse-su-2024:3323-1 | Security update for wireshark | 2024-09-19T06:52:02Z | 2024-09-19T06:52:02Z |
| suse-su-2024:3322-1 | Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6) | 2024-09-18T21:03:53Z | 2024-09-18T21:03:53Z |
| suse-su-2024:3321-1 | Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6) | 2024-09-18T21:03:47Z | 2024-09-18T21:03:47Z |
| suse-su-2024:3320-1 | Security update for the Linux Kernel RT (Live Patch 15 for SLE 15 SP5) | 2024-09-18T21:03:40Z | 2024-09-18T21:03:40Z |
| suse-su-2024:3319-1 | Security update for the Linux Kernel RT (Live Patch 16 for SLE 15 SP5) | 2024-09-18T20:33:32Z | 2024-09-18T20:33:32Z |
| suse-su-2024:3318-1 | Security update for the Linux Kernel RT (Live Patch 11 for SLE 15 SP5) | 2024-09-18T20:03:45Z | 2024-09-18T20:03:45Z |
| suse-su-2024:3309-1 | Security update for libmfx | 2024-09-18T12:55:10Z | 2024-09-18T12:55:10Z |
| suse-su-2024:3307-1 | Security update for ucode-intel | 2024-09-18T12:54:54Z | 2024-09-18T12:54:54Z |
| suse-su-2024:3306-1 | Security update for clamav | 2024-09-18T12:54:46Z | 2024-09-18T12:54:46Z |
| suse-su-2024:3305-1 | Security update for clamav | 2024-09-18T12:53:47Z | 2024-09-18T12:53:47Z |
| suse-su-2024:3304-1 | Security update for the Linux Kernel | 2024-09-18T12:52:47Z | 2024-09-18T12:52:47Z |
| suse-su-2024:3303-1 | Security update for python312 | 2024-09-18T12:52:26Z | 2024-09-18T12:52:26Z |
| suse-su-2024:3302-1 | Security update for python3 | 2024-09-18T12:52:07Z | 2024-09-18T12:52:07Z |
| suse-su-2024:3301-1 | Security update for ffmpeg-4 | 2024-09-18T12:51:40Z | 2024-09-18T12:51:40Z |
| suse-su-2024:3298-1 | Security update for python-dnspython | 2024-09-18T10:59:07Z | 2024-09-18T10:59:07Z |
| suse-su-2024:3297-1 | Security update for python-dnspython | 2024-09-18T10:56:55Z | 2024-09-18T10:56:55Z |
| suse-su-2024:3295-1 | Security update for gstreamer-plugins-bad | 2024-09-18T07:35:12Z | 2024-09-18T07:35:12Z |
| suse-su-2024:3294-1 | Security update for python3 | 2024-09-18T06:39:50Z | 2024-09-18T06:39:50Z |
| suse-su-2024:3293-1 | Security update for python36 | 2024-09-18T06:39:04Z | 2024-09-18T06:39:04Z |
| suse-su-2024:3289-1 | Security update for gstreamer-plugins-bad, libvpl | 2024-09-17T12:27:10Z | 2024-09-17T12:27:10Z |
| suse-su-2024:3288-1 | Security update for golang-github-prometheus-prometheus | 2024-09-17T07:48:51Z | 2024-09-17T07:48:51Z |
| suse-su-2024:3267-1 | Security update for SUSE Manager Client Tools | 2024-09-17T07:43:02Z | 2024-09-17T07:43:02Z |
| suse-su-2024:3266-1 | Security update for SUSE Manager Client Tools | 2024-09-17T07:42:22Z | 2024-09-17T07:42:22Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:11948-1 | spotifyd-0.3.3-5.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11947-1 | apptainer-1.0.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11946-1 | parsec-tool-0.5.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11945-1 | parsec-1.0.0~rc3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11944-1 | libcrypto47-3.4.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11943-1 | abcm2ps-8.14.13-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11942-1 | python310-waitress-2.1.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11941-1 | kanidm-1.1.0~alpha7~git0.c8468199-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11940-1 | libtcmu2-1.5.4-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11939-1 | kernel-devel-5.16.15-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11938-1 | libwavpack1-32bit-5.4.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11937-1 | git-delta-0.12.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11936-1 | fish-3.4.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11935-1 | arm-trusted-firmware-2.6-8.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11934-1 | zabbix-agent-4.0.39-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11933-1 | libopenssl-1_1-devel-1.1.1n-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11932-1 | chromedriver-99.0.4844.74-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11931-1 | aws-nitro-enclaves-binaryblobs-upstream-1.2.0~git2.841ef94-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11930-1 | xen-4.16.0_06-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11929-1 | squid-5.4.1-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11928-1 | pleaser-0.5.1~git0.ce9627c-4.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11927-1 | libopenssl-3-devel-3.0.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11926-1 | grub2-2.06-18.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11925-1 | firecracker-1.0.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11924-1 | cscreen-1.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11923-1 | sccache-0.2.15~git0.6b6d2f7-11.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11922-1 | rustup-1.24.3~0-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11921-1 | rage-encryption-0.7.1+0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11920-1 | cargo-audit-0.16.0~git0.625c965-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11919-1 | apache2-2.4.53-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2020-13310 | 2024-03-06T11:22:23.680Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13309 | 2024-03-06T11:22:24.941Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13308 | 2024-03-06T11:22:26.221Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13307 | 2024-03-06T11:22:27.444Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13306 | 2024-03-06T11:22:28.700Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13305 | 2024-03-06T11:22:29.951Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13304 | 2024-03-06T11:22:31.183Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13303 | 2024-03-06T11:22:32.460Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13302 | 2024-03-06T11:22:33.743Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13301 | 2024-03-06T11:22:35.003Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13300 | 2024-03-06T11:22:36.290Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13299 | 2024-03-06T11:22:37.550Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13298 | 2024-03-06T11:22:38.789Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13297 | 2024-03-06T11:22:40.028Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13296 | 2024-03-06T11:22:41.282Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13294 | 2024-03-06T11:22:42.497Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13293 | 2024-03-06T11:22:43.736Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13292 | 2024-03-06T11:22:45.050Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13291 | 2024-03-06T11:22:46.374Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13290 | 2024-03-06T11:22:47.645Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13289 | 2024-03-06T11:22:48.889Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13288 | 2024-03-06T11:22:50.137Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13287 | 2024-03-06T11:22:51.384Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13286 | 2024-03-06T11:22:52.654Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13285 | 2024-03-06T11:22:53.955Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13284 | 2024-03-06T11:22:55.215Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13283 | 2024-03-06T11:22:56.484Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13282 | 2024-03-06T11:22:57.722Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13281 | 2024-03-06T11:22:58.974Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13280 | 2024-03-06T11:23:00.208Z | 2025-04-03T14:40:37.652Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-21851 | Medical Card Generation System /admin/unreadenq.ph文件SQL注入漏洞 | 2025-06-11 | 2025-09-19 |
| cnvd-2025-21850 | Medical Card Generation System /admin/readenq.php文件SQL注入漏洞 | 2025-06-11 | 2025-09-19 |
| cnvd-2025-21849 | Medical Card Generation System /admin/manage-card.php文件SQL注入漏洞 | 2025-06-11 | 2025-09-19 |
| cnvd-2025-21848 | Medical Card Generation System跨站脚本漏洞 | 2025-07-07 | 2025-09-19 |
| cnvd-2025-21847 | Medical Card Generation System Manage Card功能跨站请求伪造漏洞 | 2025-07-07 | 2025-09-19 |
| cnvd-2025-21844 | Vehicle Parking Management System view-outgoingvehicle-detail.php文件SQL注入漏洞 | 2025-07-18 | 2025-09-19 |
| cnvd-2025-21843 | Vehicle Parking Management System view--detail.php文件SQL注入漏洞 | 2025-07-18 | 2025-09-19 |
| cnvd-2025-21842 | Vehicle Parking Management System signup.php文件SQL注入漏洞 | 2025-07-18 | 2025-09-19 |
| cnvd-2025-21841 | Vehicle Parking Management System search-vehicle.php文件SQL注入漏洞 | 2025-07-18 | 2025-09-19 |
| cnvd-2025-21840 | Vehicle Parking Management System reg-users.php文件SQL注入漏洞 | 2025-07-18 | 2025-09-19 |
| cnvd-2025-21839 | Vehicle Parking Management System profile.php文件SQL注入漏洞 | 2025-07-18 | 2025-09-19 |
| cnvd-2025-21706 | Vehicle Parking Management System print.php文件SQL注入漏洞 | 2025-07-18 | 2025-09-19 |
| cnvd-2025-21705 | Vehicle Parking Management System manage-outgoingvehicle.php文件SQL注入漏洞 | 2025-07-18 | 2025-09-19 |
| cnvd-2025-21704 | Vehicle Parking Management System manage-incomingvehicle.php文件SQL注入漏洞 | 2025-07-18 | 2025-09-19 |
| cnvd-2025-21692 | Online Library Management System存在未明漏洞(CNVD-2025-21692) | 2025-03-12 | 2025-09-19 |
| cnvd-2025-21691 | Vehicle Parking Management System manage-category.php文件SQL注入漏洞 | 2025-07-18 | 2025-09-19 |
| cnvd-2025-21690 | Vehicle Parking Management System index.php文件SQL注入漏洞 | 2025-07-18 | 2025-09-19 |
| cnvd-2025-21689 | Vehicle Parking Management System forgot-password.php文件SQL注入漏洞 | 2025-07-18 | 2025-09-19 |
| cnvd-2025-21688 | Online Library Management System跨站脚本漏洞 | 2025-07-21 | 2025-09-19 |
| cnvd-2025-21687 | Online Library Management System /admin/student-history.php文件SQL注入漏洞 | 2025-07-21 | 2025-09-19 |
| cnvd-2025-21686 | Online Library Management System存在未明漏洞 | 2025-08-01 | 2025-09-19 |
| cnvd-2025-20837 | Belkin F9K1122堆栈缓冲区溢出漏洞(CNVD-2025-20837) | 2025-07-11 | 2025-09-19 |
| cnvd-2025-21703 | Online Fire Reporting System /details.php文件SQL注入漏洞 | 2025-06-11 | 2025-09-18 |
| cnvd-2025-21702 | Online Fire Reporting System /admin/profile.php文件SQL注入漏洞 | 2025-06-11 | 2025-09-18 |
| cnvd-2025-21701 | Online Fire Reporting System /admin/edit-team.php文件SQL注入漏洞 | 2025-06-11 | 2025-09-18 |
| cnvd-2025-21700 | Online Fire Reporting System workin-progress-requests.php文件SQL注入漏洞 | 2025-07-21 | 2025-09-18 |
| cnvd-2025-21699 | Online Fire Reporting System team-ontheway-requests.php文件SQL注入漏洞 | 2025-07-21 | 2025-09-18 |
| cnvd-2025-21698 | Online Fire Reporting System new-requests.php文件SQL注入漏洞 | 2025-07-21 | 2025-09-18 |
| cnvd-2025-21697 | Online Fire Reporting System completed-requests.php文件SQL注入漏洞 | 2025-07-21 | 2025-09-18 |
| cnvd-2025-21696 | Online Fire Reporting System bwdates-report-result.php文件SQL注入漏洞 | 2025-07-21 | 2025-09-18 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2022-avi-261 | Multiples vulnérabilités dans Sophos UTM | 2022-03-22T00:00:00.000000 | 2022-03-22T00:00:00.000000 |
| certfr-2022-avi-260 | Multiples vulnérabilités dans Moodle | 2022-03-21T00:00:00.000000 | 2022-03-21T00:00:00.000000 |
| certfr-2022-avi-259 | Multiples vulnérabilités dans les produits IBM | 2022-03-21T00:00:00.000000 | 2022-03-21T00:00:00.000000 |
| certfr-2022-avi-258 | Vulnérabilité dans les produits Sophos | 2022-03-21T00:00:00.000000 | 2022-03-21T00:00:00.000000 |
| certfr-2022-avi-257 | Multiples vulnérabilités dans Microsoft Edge | 2022-03-18T00:00:00.000000 | 2022-03-18T00:00:00.000000 |
| certfr-2022-avi-256 | Multiples vulnérabilités dans ownCloud Android App | 2022-03-18T00:00:00.000000 | 2022-03-18T00:00:00.000000 |
| certfr-2022-avi-255 | Vulnérabilité dans les produits Check Point | 2022-03-18T00:00:00.000000 | 2022-03-18T00:00:00.000000 |
| certfr-2022-avi-254 | Multiples vulnérabilités dans ISC BIND | 2022-03-17T00:00:00.000000 | 2022-03-17T00:00:00.000000 |
| certfr-2022-avi-253 | Multiples vulnérabilités dans IBM Spectrum Protect Server | 2022-03-17T00:00:00.000000 | 2022-03-17T00:00:00.000000 |
| certfr-2022-avi-252 | Multiples vulnérabilités dans Drupal | 2022-03-17T00:00:00.000000 | 2022-03-17T00:00:00.000000 |
| certfr-2022-avi-251 | Multiples vulnérabilités dans WordPress | 2022-03-17T00:00:00.000000 | 2022-03-17T00:00:00.000000 |
| certfr-2022-avi-250 | Vulnérabilité dans OpenSSL | 2022-03-16T00:00:00.000000 | 2022-03-16T00:00:00.000000 |
| certfr-2022-avi-249 | Multiples vulnérabilités dans IBM WebSphere Application Server | 2022-03-16T00:00:00.000000 | 2022-03-16T00:00:00.000000 |
| certfr-2022-avi-248 | Multiples vulnérabilités dans Google Chrome | 2022-03-16T00:00:00.000000 | 2022-03-16T00:00:00.000000 |
| certfr-2022-avi-247 | Vulnérabilité dans PostgreSQL pgAdmin | 2022-03-16T00:00:00.000000 | 2022-03-16T00:00:00.000000 |
| certfr-2022-avi-246 | Multiples vulnérabilités dans Apple Safari | 2022-03-16T00:00:00.000000 | 2022-03-16T00:00:00.000000 |
| certfr-2022-avi-245 | Multiples vulnérabilités dans Belden HiLCOS | 2022-03-16T00:00:00.000000 | 2022-03-16T00:00:00.000000 |
| certfr-2022-avi-169 | Multiples vulnérabilités dans les produits STMicroelectronics | 2022-02-22T00:00:00.000000 | 2022-03-16T00:00:00.000000 |
| certfr-2022-avi-244 | Vulnérabilité dans IBM Spectrum Protect | 2022-03-15T00:00:00.000000 | 2022-03-15T00:00:00.000000 |
| certfr-2022-avi-243 | Multiples vulnérabilités dans les produits Apple | 2022-03-15T00:00:00.000000 | 2022-03-15T00:00:00.000000 |
| certfr-2022-avi-242 | Multiples vulnérabilités dans les produits Veeam | 2022-03-14T00:00:00.000000 | 2022-03-14T00:00:00.000000 |
| certfr-2022-avi-241 | Multiples vulnérabilités dans Apache HTTP Server | 2022-03-14T00:00:00.000000 | 2022-03-14T00:00:00.000000 |
| certfr-2022-avi-240 | Vulnérabilité dans SonicWall SMA et SRA | 2022-03-14T00:00:00.000000 | 2022-03-14T00:00:00.000000 |
| certfr-2022-avi-239 | Multiples vulnérabilités dans les produits IBM | 2022-03-14T00:00:00.000000 | 2022-03-14T00:00:00.000000 |
| certfr-2022-avi-238 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2022-03-14T00:00:00.000000 | 2022-03-14T00:00:00.000000 |
| certfr-2022-avi-237 | Vulnérabilité dans Nextcloud Text | 2022-03-14T00:00:00.000000 | 2022-03-14T00:00:00.000000 |
| certfr-2022-avi-234 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2022-03-10T00:00:00.000000 | 2022-03-14T00:00:00.000000 |
| certfr-2022-avi-173 | Vulnérabilité dans Mitel MiCollab et MiVoice Business Express | 2022-02-23T00:00:00.000000 | 2022-03-14T00:00:00.000000 |
| certfr-2022-avi-236 | Multiples vulnérabilités dans Xen | 2022-03-10T00:00:00.000000 | 2022-03-10T00:00:00.000000 |
| certfr-2022-avi-235 | Multiples vulnérabilités dans Mozilla Thunderbird | 2022-03-10T00:00:00.000000 | 2022-03-10T00:00:00.000000 |