Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-67523 |
9.8 (3.1)
|
WordPress Exhibz theme <= 3.0.9 - Local File Inclusion… |
trippleS |
Exhibz |
2025-12-09T14:13:59.287Z | 2026-01-20T14:28:25.162Z |
| CVE-2025-67532 |
9.8 (3.1)
|
WordPress Hara theme <= 1.2.17 - Local File Inclusion … |
thembay |
Hara |
2025-12-09T14:14:03.164Z | 2026-01-20T14:28:25.158Z |
| CVE-2025-67527 |
9.8 (3.1)
|
WordPress Digiqole theme < 2.2.7 - Local File Inclusio… |
trippleS |
Digiqole |
2025-12-09T14:14:00.496Z | 2026-01-20T14:28:25.133Z |
| CVE-2025-67537 |
6.5 (3.1)
|
WordPress ThirstyAffiliates plugin <= 3.11.8 - Cross S… |
Blair Williams |
ThirstyAffiliates |
2025-12-09T14:14:04.310Z | 2026-01-20T14:28:25.132Z |
| CVE-2025-67470 |
4.3 (3.1)
|
WordPress Portfolio and Projects plugin <= 1.5.5 - Sen… |
Essential Plugin |
Portfolio and Projects |
2025-12-09T14:13:56.054Z | 2026-01-20T14:28:25.130Z |
| CVE-2025-67467 |
4.5 (3.1)
|
WordPress GiveWP plugin <= 4.13.1 - Cross Site Request… |
StellarWP |
GiveWP |
2025-12-09T15:03:54.450Z | 2026-01-20T14:28:25.119Z |
| CVE-2025-67522 |
9.8 (3.1)
|
WordPress Jobmonster theme <= 4.8.2 - Local File Inclu… |
NooTheme |
Jobmonster |
2025-12-09T14:13:59.066Z | 2026-01-20T14:28:25.110Z |
| CVE-2025-66533 |
7.8 (3.1)
|
WordPress GiveWP plugin <= 4.13.1 - Arbitrary Shortocd… |
StellarWP |
GiveWP |
2025-12-09T15:03:54.194Z | 2026-01-20T14:28:25.106Z |
| CVE-2025-67531 |
9.8 (3.1)
|
WordPress Turitor theme < 1.5.3 - Local File Inclusion… |
trippleS |
Turitor |
2025-12-09T14:14:01.550Z | 2026-01-20T14:28:25.095Z |
| CVE-2025-67474 |
4.3 (3.1)
|
WordPress ForumWP plugin <= 2.1.4 - Broken Access Cont… |
Ultimate Member |
ForumWP |
2025-12-09T14:13:57.009Z | 2026-01-20T14:28:25.033Z |
| CVE-2025-67521 |
9.8 (3.1)
|
WordPress Select Core plugin < 2.6 - Local File Inclus… |
Select-Themes |
Select Core |
2025-12-09T14:13:58.865Z | 2026-01-20T14:28:24.976Z |
| CVE-2025-67520 |
9.8 (3.1)
|
WordPress Media Library Tools plugin <= 1.6.15 - SQL I… |
Tiny Solutions |
Media Library Tools |
2025-12-09T14:13:58.651Z | 2026-01-20T14:28:24.948Z |
| CVE-2025-67525 |
9.8 (3.1)
|
WordPress ekommart theme < 4.3.1 - Local File Inclusio… |
Opal_WP |
ekommart |
2025-12-09T14:13:59.771Z | 2026-01-20T14:28:24.930Z |
| CVE-2025-67465 |
8.8 (3.1)
|
WordPress Simple Link Directory plugin <= 8.8.3 - Cros… |
QuantumCloud |
Simple Link Directory |
2025-12-09T14:13:55.262Z | 2026-01-20T14:28:24.889Z |
| CVE-2025-66532 |
8.8 (3.1)
|
WordPress Powerlift theme < 3.2.1 - Broken Access Cont… |
Mikado-Themes |
Powerlift |
2025-12-09T14:13:54.794Z | 2026-01-20T14:28:24.714Z |
| CVE-2025-66132 |
6.5 (3.1)
|
WordPress FAPI Member plugin <= 2.2.26 - Insecure Dire… |
FAPI Business s.r.o. |
FAPI Member |
2025-12-16T08:12:54.562Z | 2026-01-20T14:28:24.662Z |
| CVE-2025-66531 |
8.8 (3.1)
|
WordPress Salon booking system plugin <= 10.30.3 - Cro… |
Dimitri Grassi |
Salon booking system |
2025-12-09T14:13:54.558Z | 2026-01-20T14:28:24.641Z |
| CVE-2025-66129 |
5.3 (3.1)
|
WordPress Pochipp plugin <= 1.18.0 - Broken Access Con… |
wppochipp |
Pochipp |
2025-12-16T08:12:53.976Z | 2026-01-20T14:28:24.628Z |
| CVE-2025-66528 |
8.1 (3.1)
|
WordPress Thank You Page Customizer for WooCommerce pl… |
VillaTheme |
Thank You Page Customizer for WooCommerce |
2025-12-09T14:13:53.449Z | 2026-01-20T14:28:24.582Z |
| CVE-2025-66155 |
5.4 (3.1)
|
WordPress Questionar for Elementor plugin <= 1.1.7 - B… |
merkulove |
Questionar for Elementor |
2025-12-31T17:00:37.052Z | 2026-01-20T14:28:24.566Z |
| CVE-2025-66157 |
5.4 (3.1)
|
WordPress Slider for Elementor plugin <= 1.0.10 - Brok… |
merkulove |
Slider for Elementor |
2025-12-31T16:58:24.314Z | 2026-01-20T14:28:24.553Z |
| CVE-2025-66128 |
5.3 (3.1)
|
WordPress Sendinblue for WooCommerce plugin <= 4.0.49 … |
Brevo |
Sendinblue for WooCommerce |
2025-12-16T08:12:53.783Z | 2026-01-20T14:28:24.551Z |
| CVE-2025-66151 |
5.4 (3.1)
|
WordPress Countdowner for Elementor plugin <= 1.0.4 - … |
merkulove |
Countdowner for Elementor |
2025-12-31T18:32:49.483Z | 2026-01-20T14:28:24.546Z |
| CVE-2025-66150 |
5.4 (3.1)
|
WordPress Appender plugin <= 1.1.1 - Broken Access Con… |
merkulove |
Appender |
2025-12-31T18:35:57.735Z | 2026-01-20T14:28:24.539Z |
| CVE-2025-66160 |
5.4 (3.1)
|
WordPress Select Graphist for Elementor Graphist for … |
merkulove |
Select Graphist for Elementor Graphist for Elementor |
2025-12-31T16:50:19.182Z | 2026-01-20T14:28:24.538Z |
| CVE-2025-66530 |
8.8 (3.1)
|
WordPress Webba Booking plugin <= 6.2.1 - Broken Acces… |
Webba Appointment Booking |
Webba Booking |
2025-12-09T14:13:53.897Z | 2026-01-20T14:28:24.537Z |
| CVE-2025-66147 |
5.4 (3.1)
|
WordPress Coder for Elementor plugin <= 1.0.13 - Broke… |
merkulove |
Coder for Elementor |
2025-12-16T08:12:55.284Z | 2026-01-20T14:28:24.524Z |
| CVE-2025-66146 |
5.4 (3.1)
|
WordPress Logger for Elementor plugin <= 1.0.9 - Broke… |
merkulove |
Logger for Elementor |
2025-12-31T19:50:21.260Z | 2026-01-20T14:28:24.515Z |
| CVE-2025-66152 |
5.4 (3.1)
|
WordPress Criptopayer for Elementor plugin <= 1.0.1 - … |
merkulove |
Criptopayer for Elementor |
2025-12-31T18:32:07.924Z | 2026-01-20T14:28:24.511Z |
| CVE-2025-66149 |
5.4 (3.1)
|
WordPress UnGrabber plugin <= 3.1.3 - Broken Access Co… |
merkulove |
UnGrabber |
2025-12-31T18:38:14.772Z | 2026-01-20T14:28:24.511Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-71158 |
N/A
|
gpio: mpsse: ensure worker is torn down |
Linux |
Linux |
2026-01-23T15:23:57.016Z | 2026-01-26T06:52:32.070Z |
| CVE-2025-71157 |
N/A
|
RDMA/core: always drop device refcount in ib_del_sub_d… |
Linux |
Linux |
2026-01-23T14:25:56.458Z | 2026-01-23T14:25:56.458Z |
| CVE-2025-71156 |
N/A
|
gve: defer interrupt enabling until NAPI registration |
Linux |
Linux |
2026-01-23T14:25:55.456Z | 2026-01-23T14:25:55.456Z |
| CVE-2025-71155 |
N/A
|
KVM: s390: Fix gmap_helper_zap_one_page() again |
Linux |
Linux |
2026-01-23T14:25:54.663Z | 2026-01-23T14:25:54.663Z |
| CVE-2025-71154 |
N/A
|
net: usb: rtl8150: fix memory leak on usb_submit_urb()… |
Linux |
Linux |
2026-01-23T14:25:53.818Z | 2026-01-23T14:25:53.818Z |
| CVE-2025-71153 |
N/A
|
ksmbd: Fix memory leak in get_file_all_info() |
Linux |
Linux |
2026-01-23T14:25:52.988Z | 2026-01-23T14:25:52.988Z |
| CVE-2025-71152 |
N/A
|
net: dsa: properly keep track of conduit reference |
Linux |
Linux |
2026-01-23T14:25:52.022Z | 2026-01-23T14:25:52.022Z |
| CVE-2025-71151 |
N/A
|
cifs: Fix memory and information leak in smb3_reconfigure() |
Linux |
Linux |
2026-01-23T14:15:17.916Z | 2026-01-23T14:15:17.916Z |
| CVE-2025-71150 |
N/A
|
ksmbd: Fix refcount leak when invalid session is found… |
Linux |
Linux |
2026-01-23T14:15:16.898Z | 2026-01-26T06:52:30.374Z |
| CVE-2025-71149 |
N/A
|
io_uring/poll: correctly handle io_poll_add() return v… |
Linux |
Linux |
2026-01-23T14:15:15.878Z | 2026-01-23T14:15:15.878Z |
| CVE-2025-71148 |
N/A
|
net/handshake: restore destructor on submit failure |
Linux |
Linux |
2026-01-23T14:15:14.963Z | 2026-01-23T14:15:14.963Z |
| CVE-2025-71147 |
N/A
|
KEYS: trusted: Fix a memory leak in tpm2_load_cmd |
Linux |
Linux |
2026-01-23T14:15:13.945Z | 2026-01-23T14:15:13.945Z |
| CVE-2025-71146 |
N/A
|
netfilter: nf_conncount: fix leaked ct in error paths |
Linux |
Linux |
2026-01-23T14:15:12.998Z | 2026-01-23T14:15:12.998Z |
| CVE-2025-71145 |
N/A
|
usb: phy: isp1301: fix non-OF device reference imbalance |
Linux |
Linux |
2026-01-23T13:39:17.857Z | 2026-01-23T13:39:17.857Z |
| CVE-2025-69908 |
7.5 (3.1)
|
An unauthenticated information disclosure vulnera… |
n/a |
n/a |
2026-01-23T00:00:00.000Z | 2026-01-23T15:43:24.471Z |
| CVE-2025-69907 |
7.5 (3.1)
|
An unauthenticated information disclosure vulnera… |
n/a |
n/a |
2026-01-23T00:00:00.000Z | 2026-01-23T21:53:33.121Z |
| CVE-2025-67847 |
8.8 (3.1)
|
Moodle: moodle: remote code execution via insufficient… |
|
|
2026-01-23T04:35:12.044Z | 2026-02-03T10:51:55.564Z |
| CVE-2025-67125 |
4.4 (3.1)
|
A signed integer overflow in docopt.cpp v0.6.2 (L… |
n/a |
n/a |
2026-01-23T00:00:00.000Z | 2026-01-23T16:14:32.425Z |
| CVE-2025-67124 |
6.8 (3.1)
|
A TOCTOU and symlink race in svenstaro/miniserve … |
n/a |
n/a |
2026-01-23T00:00:00.000Z | 2026-01-23T18:51:54.527Z |
| CVE-2025-66720 |
7.5 (3.1)
|
Null pointer dereference in free5gc pcf 1.4.0 in … |
n/a |
n/a |
2026-01-23T00:00:00.000Z | 2026-01-23T18:56:02.014Z |
| CVE-2025-66719 |
9.1 (3.1)
|
An issue was discovered in Free5gc NRF 1.4.0. In … |
n/a |
n/a |
2026-01-23T00:00:00.000Z | 2026-01-23T19:24:55.108Z |
| CVE-2025-4320 |
10 (3.1)
|
Information Disclosure in Birebirsoft's Sufirmam |
Birebirsoft Software and Technology Solutions |
Sufirmam |
2026-01-23T12:26:46.557Z | 2026-01-23T14:15:47.913Z |
| CVE-2025-4319 |
9.4 (3.1)
|
Improper Access Control in Birebirsoft's Sufirmam |
Birebirsoft Software and Technology Solutions |
Sufirmam |
2026-01-23T12:23:24.949Z | 2026-01-23T14:16:15.720Z |
| CVE-2025-3839 |
8 (3.1)
|
Epiphany: insecure external protocol invocation in epiphany |
|
|
2026-01-23T03:55:58.802Z | 2026-01-23T18:54:44.742Z |
| CVE-2025-2204 |
4.7 (3.1)
|
XSS in Tapandsign Technologies' Tap&Sign App |
Tapandsign Technologies Software Inc. |
Tap&Sign |
2026-01-23T11:55:25.318Z | 2026-01-23T14:16:40.547Z |
| CVE-2025-15522 |
6.4 (3.1)
|
Uncanny Automator – Easy Automation, Integration, Webh… |
uncannyowl |
Uncanny Automator – Easy Automation, Integration, Webhooks & Workflow Builder Plugin |
2026-01-23T04:34:58.155Z | 2026-01-23T18:47:06.284Z |
| CVE-2025-15351 |
7.8 (3.0)
|
Anritsu VectorStar CHX File Parsing Deserialization of… |
Anritsu |
VectorStar |
2026-01-23T03:31:31.696Z | 2026-01-23T19:04:54.797Z |
| CVE-2025-15350 |
7.8 (3.0)
|
Anritsu VectorStar CHX File Parsing Deserialization of… |
Anritsu |
VectorStar |
2026-01-23T03:31:26.025Z | 2026-01-23T19:05:28.858Z |
| CVE-2025-15349 |
7.5 (3.0)
|
Anritsu ShockLine SCPI Race Condition Remote Code Exec… |
Anritsu |
ShockLine |
2026-01-23T03:31:19.599Z | 2026-01-23T19:06:22.992Z |
| CVE-2025-15348 |
7.8 (3.0)
|
Anritsu ShockLine CHX File Parsing Deserialization of … |
Anritsu |
ShockLine |
2026-01-23T03:30:47.913Z | 2026-01-23T19:14:27.871Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-71157 | In the Linux kernel, the following vulnerability has been resolved: RDMA/core: always drop device … | 2026-01-23T15:16:06.690 | 2026-01-26T15:03:51.687 |
| fkie_cve-2025-71156 | In the Linux kernel, the following vulnerability has been resolved: gve: defer interrupt enabling … | 2026-01-23T15:16:06.570 | 2026-01-26T15:03:51.687 |
| fkie_cve-2025-71155 | In the Linux kernel, the following vulnerability has been resolved: KVM: s390: Fix gmap_helper_zap… | 2026-01-23T15:16:06.447 | 2026-01-26T15:03:51.687 |
| fkie_cve-2025-71154 | In the Linux kernel, the following vulnerability has been resolved: net: usb: rtl8150: fix memory … | 2026-01-23T15:16:06.327 | 2026-01-26T15:03:51.687 |
| fkie_cve-2025-71153 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: Fix memory leak in get_… | 2026-01-23T15:16:06.193 | 2026-01-26T15:03:51.687 |
| fkie_cve-2025-71152 | In the Linux kernel, the following vulnerability has been resolved: net: dsa: properly keep track … | 2026-01-23T15:16:06.050 | 2026-01-26T15:03:51.687 |
| fkie_cve-2025-71151 | In the Linux kernel, the following vulnerability has been resolved: cifs: Fix memory and informati… | 2026-01-23T15:16:05.917 | 2026-01-26T15:03:51.687 |
| fkie_cve-2025-71150 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: Fix refcount leak when … | 2026-01-23T15:16:05.773 | 2026-01-26T15:03:51.687 |
| fkie_cve-2025-71149 | In the Linux kernel, the following vulnerability has been resolved: io_uring/poll: correctly handl… | 2026-01-23T15:16:05.630 | 2026-01-26T15:03:51.687 |
| fkie_cve-2025-71148 | In the Linux kernel, the following vulnerability has been resolved: net/handshake: restore destruc… | 2026-01-23T15:16:05.503 | 2026-01-26T15:03:51.687 |
| fkie_cve-2025-71147 | In the Linux kernel, the following vulnerability has been resolved: KEYS: trusted: Fix a memory le… | 2026-01-23T15:16:05.363 | 2026-01-26T15:03:51.687 |
| fkie_cve-2025-71146 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conncount: fix l… | 2026-01-23T15:16:05.230 | 2026-01-26T15:03:51.687 |
| fkie_cve-2025-71145 | In the Linux kernel, the following vulnerability has been resolved: usb: phy: isp1301: fix non-OF … | 2026-01-23T14:16:12.873 | 2026-01-26T15:03:51.687 |
| fkie_cve-2025-69908 | An unauthenticated information disclosure vulnerability in Newgen OmniApp allows attackers to enume… | 2026-01-23T16:15:52.453 | 2026-01-26T15:03:51.687 |
| fkie_cve-2025-69907 | An unauthenticated information disclosure vulnerability exists in Newgen OmniDocs due to missing au… | 2026-01-23T15:16:05.093 | 2026-01-26T15:03:51.687 |
| fkie_cve-2025-67847 | A flaw was found in Moodle. An attacker with access to the restore interface could trigger server-s… | 2026-01-23T05:16:24.250 | 2026-01-26T15:03:51.687 |
| fkie_cve-2025-67125 | A signed integer overflow in docopt.cpp v0.6.2 (LeafPattern::match in docopt_private.h) when mergin… | 2026-01-23T16:15:52.347 | 2026-01-26T15:03:51.687 |
| fkie_cve-2025-67124 | A TOCTOU and symlink race in svenstaro/miniserve 0.32.0 upload finalization (when uploads are enabl… | 2026-01-23T16:15:52.247 | 2026-01-26T15:03:51.687 |
| fkie_cve-2025-66720 | Null pointer dereference in free5gc pcf 1.4.0 in file internal/sbi/processor/ampolicy.go in functio… | 2026-01-23T16:15:52.140 | 2026-01-26T15:03:51.687 |
| fkie_cve-2025-66719 | An issue was discovered in Free5gc NRF 1.4.0. In the access-token generation logic of free5GC, the … | 2026-01-23T16:15:51.220 | 2026-01-26T15:03:51.687 |
| fkie_cve-2025-4320 | Authentication Bypass by Primary Weakness, Weak Password Recovery Mechanism for Forgotten Password … | 2026-01-23T13:15:49.123 | 2026-01-26T15:03:51.687 |
| fkie_cve-2025-4319 | Improper Restriction of Excessive Authentication Attempts, Weak Password Recovery Mechanism for For… | 2026-01-23T13:15:48.967 | 2026-01-26T15:03:51.687 |
| fkie_cve-2025-3839 | A flaw was found in Epiphany, a tool that allows websites to open external URL handler applications… | 2026-01-23T05:16:21.753 | 2026-01-26T15:03:51.687 |
| fkie_cve-2025-2204 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-01-23T12:15:48.463 | 2026-01-26T15:03:51.687 |
| fkie_cve-2025-15522 | The Uncanny Automator – Easy Automation, Integration, Webhooks & Workflow Builder Plugin plugin for… | 2026-01-23T05:16:21.043 | 2026-01-26T15:03:51.687 |
| fkie_cve-2025-15351 | Anritsu VectorStar CHX File Parsing Deserialization of Untrusted Data Remote Code Execution Vulnera… | 2026-01-23T04:16:01.710 | 2026-01-26T15:03:51.687 |
| fkie_cve-2025-15350 | Anritsu VectorStar CHX File Parsing Deserialization of Untrusted Data Remote Code Execution Vulnera… | 2026-01-23T04:16:01.580 | 2026-01-26T15:03:51.687 |
| fkie_cve-2025-15349 | Anritsu ShockLine SCPI Race Condition Remote Code Execution Vulnerability. This vulnerability allow… | 2026-01-23T04:16:01.450 | 2026-01-26T15:03:51.687 |
| fkie_cve-2025-15348 | Anritsu ShockLine CHX File Parsing Deserialization of Untrusted Data Remote Code Execution Vulnerab… | 2026-01-23T04:16:01.310 | 2026-01-26T15:03:51.687 |
| fkie_cve-2025-15063 | Ollama MCP Server execAsync Command Injection Remote Code Execution Vulnerability. This vulnerabili… | 2026-01-23T04:16:01.170 | 2026-01-26T15:03:51.687 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-7g4f-748v-834w |
8.2 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T09:30:27Z | 2026-01-20T15:32:24Z |
| ghsa-72v9-r592-5f43 |
8.1 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T09:30:27Z | 2026-01-20T15:32:24Z |
| ghsa-6qx2-7pcq-f8mr |
8.2 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T09:30:27Z | 2026-01-20T15:32:24Z |
| ghsa-5jh2-79v8-cgvf |
9.8 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T09:30:27Z | 2026-01-20T15:32:24Z |
| ghsa-5fq9-crj9-m7rc |
8.2 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T09:30:27Z | 2026-01-20T15:32:24Z |
| ghsa-4w88-wfw7-28x2 |
8.1 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T09:30:27Z | 2026-01-20T15:32:24Z |
| ghsa-4h75-rhhf-h6mj |
7.6 (3.1)
|
Missing Authorization vulnerability in ThemeAtelier IDonatePro idonate-pro allows Exploiting Incorr… | 2025-12-18T09:30:27Z | 2026-01-20T15:32:24Z |
| ghsa-3pgp-22cc-4c6r |
9.3 (3.1)
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2025-12-18T09:30:27Z | 2026-01-20T15:32:24Z |
| ghsa-3j3f-qgjh-4vrp |
8.2 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T09:30:27Z | 2026-01-20T15:32:24Z |
| ghsa-2jm4-pp6h-mpwx |
8.2 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T09:30:27Z | 2026-01-20T15:32:24Z |
| ghsa-2265-g92x-3448 |
8.2 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T09:30:27Z | 2026-01-20T15:32:24Z |
| ghsa-v5xc-p48r-xqqp |
8.1 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T09:30:27Z | 2026-01-20T15:32:23Z |
| ghsa-v4c3-2phw-x8gp |
8.2 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T09:30:26Z | 2026-01-20T15:32:23Z |
| ghsa-fx3m-vpjv-5j8c |
8.2 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T09:30:27Z | 2026-01-20T15:32:23Z |
| ghsa-f6gp-582g-w83j |
8.2 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T09:30:27Z | 2026-01-20T15:32:23Z |
| ghsa-cwmw-q54x-973h |
8.1 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T09:30:27Z | 2026-01-20T15:32:23Z |
| ghsa-cwh7-h99w-45wr |
8.1 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T09:30:26Z | 2026-01-20T15:32:23Z |
| ghsa-c543-67r2-9w3m |
8.1 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T09:30:27Z | 2026-01-20T15:32:23Z |
| ghsa-8cc2-p983-p7mm |
8.1 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T09:30:27Z | 2026-01-20T15:32:23Z |
| ghsa-7cxp-qgqc-29gv |
8.1 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T09:30:27Z | 2026-01-20T15:32:23Z |
| ghsa-799q-38gr-qvmq |
8.2 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T09:30:27Z | 2026-01-20T15:32:23Z |
| ghsa-523j-cwgj-6f4r |
8.1 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T09:30:27Z | 2026-01-20T15:32:23Z |
| ghsa-3w26-g2pv-c7hf |
8.1 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T09:30:27Z | 2026-01-20T15:32:23Z |
| ghsa-rhv4-h554-jv3f |
8.1 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T09:30:26Z | 2026-01-20T15:32:22Z |
| ghsa-rgcf-2w43-rcc2 |
8.2 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T09:30:26Z | 2026-01-20T15:32:22Z |
| ghsa-rcq8-2vrm-5v77 |
8.2 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T09:30:26Z | 2026-01-20T15:32:22Z |
| ghsa-r4pj-gvf7-f2q6 |
7.5 (3.1)
|
Missing Authorization vulnerability in javothemes Javo Core javo-core allows Exploiting Incorrectly… | 2025-12-18T09:30:26Z | 2026-01-20T15:32:22Z |
| ghsa-hj95-h3q8-9f44 |
8.2 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T09:30:26Z | 2026-01-20T15:32:22Z |
| ghsa-g973-3hcj-2cj8 |
8.2 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T09:30:26Z | 2026-01-20T15:32:22Z |
| ghsa-fxfc-66xm-cx3q |
8.2 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T09:30:26Z | 2026-01-20T15:32:22Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-30502 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vuln… | 2024-04-03T05:02:29.273046Z |
| gsd-2024-30507 | Authorization Bypass Through User-Controlled Key vulnerability in Molongui.This issue aff… | 2024-04-03T05:02:29.272231Z |
| gsd-2024-30814 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.271757Z |
| gsd-2024-30874 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.271560Z |
| gsd-2024-30529 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.271357Z |
| gsd-2024-30971 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.271152Z |
| gsd-2024-30017 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.270942Z |
| gsd-2024-30802 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.270736Z |
| gsd-2024-30284 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.270482Z |
| gsd-2024-30428 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:29.269676Z |
| gsd-2024-30163 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.269327Z |
| gsd-2024-30427 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:29.268687Z |
| gsd-2024-30209 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.268408Z |
| gsd-2024-30277 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.268203Z |
| gsd-2024-30505 | Missing Authorization vulnerability in Andy Moyle Church Admin.This issue affects Church … | 2024-04-03T05:02:29.267615Z |
| gsd-2024-30754 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.267233Z |
| gsd-2024-30324 | Foxit PDF Reader Doc Object Use-After-Free Remote Code Execution Vulnerability. This vuln… | 2024-04-03T05:02:29.267031Z |
| gsd-2024-30452 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:29.266382Z |
| gsd-2024-30996 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.266104Z |
| gsd-2024-30704 | An insecure deserialization vulnerability has been identified in ROS2 Galactic Geochelone… | 2024-04-03T05:02:29.265905Z |
| gsd-2024-30571 | An information leak in the BRS_top.html component of Netgear R6850 v1.1.0.88 allows attac… | 2024-04-03T05:02:29.265708Z |
| gsd-2024-30788 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.265510Z |
| gsd-2024-30846 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.265261Z |
| gsd-2024-30914 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.265058Z |
| gsd-2024-30662 | An issue was discovered in ROS (Robot Operating System) Melodic Morenia in ROS_VERSION 1 … | 2024-04-03T05:02:29.264850Z |
| gsd-2024-30184 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:29.264229Z |
| gsd-2024-30526 | Cross-Site Request Forgery (CSRF) vulnerability in Easy Social Feed.This issue affects Ea… | 2024-04-03T05:02:29.263612Z |
| gsd-2024-30097 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.263258Z |
| gsd-2024-30285 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.263061Z |
| gsd-2024-30141 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.262812Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-191280 | Malicious code in @oku-ui/toolbar (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191279 | Malicious code in @oku-ui/toggle-group (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191278 | Malicious code in @oku-ui/toggle (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191277 | Malicious code in @oku-ui/toast (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191276 | Malicious code in @oku-ui/tabs (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191275 | Malicious code in @oku-ui/switch (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191274 | Malicious code in @oku-ui/slider (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191273 | Malicious code in @oku-ui/separator (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191272 | Malicious code in @oku-ui/scroll-area (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191271 | Malicious code in @oku-ui/roving-focus (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191270 | Malicious code in @oku-ui/radio-group (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191269 | Malicious code in @oku-ui/provide (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191268 | Malicious code in @oku-ui/progress (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191267 | Malicious code in @oku-ui/primitives-nuxt (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191266 | Malicious code in @oku-ui/primitive (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191265 | Malicious code in @oku-ui/presence (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191264 | Malicious code in @oku-ui/portal (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191263 | Malicious code in @oku-ui/popper (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191262 | Malicious code in @oku-ui/popover (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191261 | Malicious code in @oku-ui/motion-nuxt (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191260 | Malicious code in @oku-ui/menu (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191259 | Malicious code in @oku-ui/hover-card (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191258 | Malicious code in @oku-ui/focus-guards (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191257 | Malicious code in @oku-ui/dismissable-layer (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191256 | Malicious code in @oku-ui/direction (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191255 | Malicious code in @oku-ui/dialog (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191254 | Malicious code in @oku-ui/collection (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191253 | Malicious code in @oku-ui/collapsible (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191252 | Malicious code in @oku-ui/checkbox (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191251 | Malicious code in @oku-ui/avatar (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-1916 | VMware Tanzu Spring Boot: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-08-22T22:00:00.000+00:00 | 2025-01-19T23:00:00.000+00:00 |
| wid-sec-w-2023-2177 | libssh2: Schwachstelle ermöglicht Denial of Service | 2023-08-27T22:00:00.000+00:00 | 2025-01-19T23:00:00.000+00:00 |
| wid-sec-w-2022-2028 | BusyBox: Mehrere Schwachstellen | 2021-11-09T23:00:00.000+00:00 | 2025-01-19T23:00:00.000+00:00 |
| wid-sec-w-2025-0114 | IBM InfoSphere Information Server: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-01-16T23:00:00.000+00:00 | 2025-01-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0113 | Canonical Snap: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-01-16T23:00:00.000+00:00 | 2025-01-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0061 | Siemens SIPROTEC: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-01-14T23:00:00.000+00:00 | 2025-01-16T23:00:00.000+00:00 |
| wid-sec-w-2022-0547 | GIMP: Schwachstelle ermöglicht Denial of Service | 2022-07-03T22:00:00.000+00:00 | 2025-01-16T23:00:00.000+00:00 |
| wid-sec-w-2025-0110 | Mattermost: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2025-01-15T23:00:00.000+00:00 | 2025-01-15T23:00:00.000+00:00 |
| wid-sec-w-2025-0108 | Splunk: Schwachstelle ermöglicht Denial of Service | 2025-01-15T23:00:00.000+00:00 | 2025-01-15T23:00:00.000+00:00 |
| wid-sec-w-2025-0107 | D-LINK Router (DIR-823X): Schwachstelle ermöglicht Denial of Service | 2025-01-15T23:00:00.000+00:00 | 2025-01-15T23:00:00.000+00:00 |
| wid-sec-w-2025-0103 | Drupal: Schwachstelle ermöglicht Manipulation von Dateien | 2025-01-15T23:00:00.000+00:00 | 2025-01-15T23:00:00.000+00:00 |
| wid-sec-w-2025-0102 | mutt: Mehrere Schwachstellen | 2018-07-29T22:00:00.000+00:00 | 2025-01-15T23:00:00.000+00:00 |
| wid-sec-w-2025-0101 | mutt: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2021-05-19T22:00:00.000+00:00 | 2025-01-15T23:00:00.000+00:00 |
| wid-sec-w-2025-0100 | Red Hat Enterprise Linux: Mehrere Schwachstellen | 2022-02-22T23:00:00.000+00:00 | 2025-01-15T23:00:00.000+00:00 |
| wid-sec-w-2024-3687 | Mattermost: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-12-11T23:00:00.000+00:00 | 2025-01-15T23:00:00.000+00:00 |
| wid-sec-w-2024-3502 | Google Chrome / Microsoft Edge: Schwachstelle ermöglicht Codeausführung | 2024-11-19T23:00:00.000+00:00 | 2025-01-15T23:00:00.000+00:00 |
| wid-sec-w-2024-3472 | mutt: Mehrere Schwachstellen | 2024-11-14T23:00:00.000+00:00 | 2025-01-15T23:00:00.000+00:00 |
| wid-sec-w-2022-2243 | mutt: Schwachstelle ermöglicht Manipulation von Daten | 2020-06-21T22:00:00.000+00:00 | 2025-01-15T23:00:00.000+00:00 |
| wid-sec-w-2022-2241 | mutt: Schwachstelle ermöglicht Offenlegung von Informationen | 2020-11-23T23:00:00.000+00:00 | 2025-01-15T23:00:00.000+00:00 |
| wid-sec-w-2022-0633 | mutt: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-04-18T22:00:00.000+00:00 | 2025-01-15T23:00:00.000+00:00 |
| wid-sec-w-2022-0571 | Red Hat Enterprise Linux: Mehrere Schwachstellen | 2021-11-09T23:00:00.000+00:00 | 2025-01-15T23:00:00.000+00:00 |
| wid-sec-w-2025-0099 | Microsoft Power Automate Desktop: Schwachstelle ermöglicht Codeausführung | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0098 | MediaWiki: Mehrere Schwachstellen | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0096 | Fortinet FortiAnalyzer und FortiManager: Mehrere Schwachstellen | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0095 | Fortinet Produkte: Mehrere Schwachstellen | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0094 | Microsoft Azure: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0092 | Microsoft Office: Mehrere Schwachstellen | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0089 | xwiki: Schwachstelle ermöglicht Privilegieneskalation | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0088 | Fortinet FortiOS: Mehrere Schwachstellen | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0087 | Fortinet FortiManager: Mehrere Schwachstellen | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhea-2022:1596 | Red Hat Enhancement Advisory: OpenShift Virtualization 4.9.4 Images | 2022-04-26T16:51:34+00:00 | 2026-01-28T22:14:55+00:00 |
| rhsa-2021:4618 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4 images and security updates | 2021-11-11T18:31:07+00:00 | 2026-01-28T22:14:16+00:00 |
| rhsa-2021:3925 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.3.3 bug fix, security, and image updates | 2021-10-20T03:54:29+00:00 | 2026-01-28T22:14:14+00:00 |
| rhsa-2021:3694 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.6.0 security & bugfix update | 2021-09-29T14:34:25+00:00 | 2026-01-28T22:14:14+00:00 |
| rhea-2021:3139 | Red Hat Enhancement Advisory: Web Terminal 1.3 release | 2021-08-11T17:23:34+00:00 | 2026-01-28T22:14:10+00:00 |
| rhsa-2021:4910 | Red Hat Security Advisory: OpenShift Virtualization 4.8.3 RPMs security and bug fix update | 2021-12-02T14:27:54+00:00 | 2026-01-28T22:14:01+00:00 |
| rhsa-2022:1329 | Red Hat Security Advisory: OpenShift Virtualization 4.8.5 RPMs security update | 2022-04-12T15:09:58+00:00 | 2026-01-28T22:13:59+00:00 |
| rhsa-2022:0998 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (golang-github-vbatts-tar-split) security update | 2022-03-23T22:12:28+00:00 | 2026-01-28T22:13:59+00:00 |
| rhsa-2022:0988 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (golang-github-vbatts-tar-split) security update | 2022-03-24T10:59:08+00:00 | 2026-01-28T22:13:59+00:00 |
| rhsa-2021:5086 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.9.0 enhancement, security, and bug fix update | 2021-12-13T19:26:22+00:00 | 2026-01-28T22:13:58+00:00 |
| rhsa-2022:0947 | Red Hat Security Advisory: OpenShift Virtualization 4.10.0 Images security and bug fix update | 2022-03-16T15:45:58+00:00 | 2026-01-28T22:13:57+00:00 |
| rhsa-2022:0260 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (etcd) security update | 2022-01-25T13:55:40+00:00 | 2026-01-28T22:13:56+00:00 |
| rhsa-2022:0237 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update | 2022-01-24T13:53:27+00:00 | 2026-01-28T22:13:55+00:00 |
| rhsa-2022:0191 | Red Hat Security Advisory: OpenShift Virtualization 4.9.2 Images security and bug fix update | 2022-01-19T17:48:00+00:00 | 2026-01-28T22:13:55+00:00 |
| rhsa-2021:5085 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.9.0 enhancement, security, and bug fix update | 2021-12-13T15:29:11+00:00 | 2026-01-28T22:13:54+00:00 |
| rhsa-2021:4914 | Red Hat Security Advisory: OpenShift Virtualization 4.8.3 Images security and bug fix update | 2021-12-02T16:59:15+00:00 | 2026-01-28T22:13:52+00:00 |
| rhsa-2021:4725 | Red Hat Security Advisory: OpenShift Virtualization 2.6.8 Images security and bug fix update | 2021-11-17T18:39:29+00:00 | 2026-01-28T22:13:52+00:00 |
| rhsa-2021:4722 | Red Hat Security Advisory: OpenShift Virtualization 2.6.8 RPMs security and bug fix update | 2021-11-17T15:38:20+00:00 | 2026-01-28T22:13:50+00:00 |
| rhsa-2021:4582 | Red Hat Security Advisory: Release of components for Service Telemetry Framework 1.3.3 - Container Images | 2021-11-10T11:52:54+00:00 | 2026-01-28T22:13:49+00:00 |
| rhsa-2021:4104 | Red Hat Security Advisory: OpenShift Virtualization 4.9.0 Images security and bug fix update | 2021-11-02T15:55:53+00:00 | 2026-01-28T22:13:49+00:00 |
| rhsa-2021:3820 | Red Hat Security Advisory: OpenShift Container Platform 4.8.15 packages and security update | 2021-10-19T20:23:34+00:00 | 2026-01-28T22:13:45+00:00 |
| rhsa-2021:3733 | Red Hat Security Advisory: OpenShift Virtualization 2.6.7 Images security and bug fix update | 2021-10-06T09:28:41+00:00 | 2026-01-28T22:13:43+00:00 |
| rhsa-2021:3598 | Red Hat Security Advisory: OpenShift Virtualization 4.8.2 Images security and bug fix update | 2021-09-21T11:04:54+00:00 | 2026-01-28T22:13:42+00:00 |
| rhsa-2021:3556 | Red Hat Security Advisory: Release of OpenShift Serverless 1.17.0 | 2021-09-16T18:38:06+00:00 | 2026-01-28T22:13:42+00:00 |
| rhsa-2021:3555 | Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.17.0 | 2021-09-16T15:24:35+00:00 | 2026-01-28T22:13:40+00:00 |
| rhsa-2021:3361 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.5.1 security and bug fix update | 2021-08-31T08:09:25+00:00 | 2026-01-28T22:13:39+00:00 |
| rhsa-2021:3259 | Red Hat Security Advisory: OpenShift Virtualization 4.8.1 Images security and bug fix update | 2021-08-24T16:15:20+00:00 | 2026-01-28T22:13:39+00:00 |
| rhsa-2021:3248 | Red Hat Security Advisory: OpenShift Container Platform 4.8.9 packages and security update | 2021-08-31T15:01:01+00:00 | 2026-01-28T22:13:38+00:00 |
| rhsa-2021:3229 | Red Hat Security Advisory: Red Hat OpenShift Jaeger 1.20.5 security update | 2021-08-19T12:33:40+00:00 | 2026-01-28T22:13:37+00:00 |
| rhsa-2021:3146 | Red Hat Security Advisory: ACS 3.64 security and enhancement update | 2021-08-12T01:53:39+00:00 | 2026-01-28T22:13:36+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-24073 | Microsoft DWM Core Library Elevation of Privilege Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-09T07:00:00.000Z |
| msrc_cve-2025-21222 | Windows Telephony Service Remote Code Execution Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-09T07:00:00.000Z |
| msrc_cve-2025-21221 | Windows Telephony Service Remote Code Execution Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-09T07:00:00.000Z |
| msrc_cve-2025-21205 | Windows Telephony Service Remote Code Execution Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-09T07:00:00.000Z |
| msrc_cve-2025-21197 | Windows NTFS Information Disclosure Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-09T07:00:00.000Z |
| msrc_cve-2025-21191 | Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-09T07:00:00.000Z |
| msrc_cve-2025-2312 | cifs.upcall makes an upcall to the wrong namespace in containerized environments | 2025-03-02T00:00:00.000Z | 2025-04-09T00:00:00.000Z |
| msrc_cve-2025-21867 | bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type() | 2025-03-02T00:00:00.000Z | 2025-04-09T00:00:00.000Z |
| msrc_cve-2025-21866 | powerpc/code-patching: Fix KASAN hit by not flagging text patching area as VM_ALLOC | 2025-03-02T00:00:00.000Z | 2025-04-09T00:00:00.000Z |
| msrc_cve-2025-21865 | gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl(). | 2025-03-02T00:00:00.000Z | 2025-04-09T00:00:00.000Z |
| msrc_cve-2025-21864 | tcp: drop secpath at the same time as we currently drop dst | 2025-03-02T00:00:00.000Z | 2025-04-09T00:00:00.000Z |
| msrc_cve-2025-21863 | io_uring: prevent opcode speculation | 2025-03-02T00:00:00.000Z | 2025-04-09T00:00:00.000Z |
| msrc_cve-2025-21862 | drop_monitor: fix incorrect initialization order | 2025-03-02T00:00:00.000Z | 2025-04-09T00:00:00.000Z |
| msrc_cve-2025-21859 | USB: gadget: f_midi: f_midi_complete to call queue_work | 2025-03-02T00:00:00.000Z | 2025-04-09T00:00:00.000Z |
| msrc_cve-2025-21858 | geneve: Fix use-after-free in geneve_find_dev(). | 2025-03-02T00:00:00.000Z | 2025-04-09T00:00:00.000Z |
| msrc_cve-2025-21857 | net/sched: cls_api: fix error handling causing NULL dereference | 2025-03-02T00:00:00.000Z | 2025-04-09T00:00:00.000Z |
| msrc_cve-2025-21856 | s390/ism: add release function for struct device | 2025-03-02T00:00:00.000Z | 2025-04-09T00:00:00.000Z |
| msrc_cve-2025-21855 | ibmvnic: Don't reference skb after sending to VIOS | 2025-03-02T00:00:00.000Z | 2025-04-09T00:00:00.000Z |
| msrc_cve-2025-21854 | sockmap, vsock: For connectible sockets allow only connected | 2025-03-02T00:00:00.000Z | 2025-04-09T00:00:00.000Z |
| msrc_cve-2025-21853 | bpf: avoid holding freeze_mutex during mmap operation | 2025-03-02T00:00:00.000Z | 2025-04-09T00:00:00.000Z |
| msrc_cve-2025-21848 | nfp: bpf: Add check for nfp_app_ctrl_msg_alloc() | 2025-03-02T00:00:00.000Z | 2025-04-09T00:00:00.000Z |
| msrc_cve-2025-21847 | ASoC: SOF: stream-ipc: Check for cstream nullity in sof_ipc_msg_data() | 2025-03-02T00:00:00.000Z | 2025-04-09T00:00:00.000Z |
| msrc_cve-2025-21846 | acct: perform last write from workqueue | 2025-03-02T00:00:00.000Z | 2025-04-09T00:00:00.000Z |
| msrc_cve-2025-21844 | smb: client: Add check for next_buffer in receive_encrypted_standard() | 2025-03-02T00:00:00.000Z | 2025-04-09T00:00:00.000Z |
| msrc_cve-2025-21794 | HID: hid-thrustmaster: fix stack-out-of-bounds read in usb_check_int_endpoints() | 2025-02-02T00:00:00.000Z | 2025-04-09T00:00:00.000Z |
| msrc_cve-2025-21793 | spi: sn-f-ospi: Fix division by zero | 2025-02-02T00:00:00.000Z | 2025-04-09T00:00:00.000Z |
| msrc_cve-2025-21792 | ax25: Fix refcount leak caused by setting SO_BINDTODEVICE sockopt | 2025-02-02T00:00:00.000Z | 2025-04-09T00:00:00.000Z |
| msrc_cve-2025-21791 | vrf: use RCU protection in l3mdev_l3_out() | 2025-02-02T00:00:00.000Z | 2025-04-09T00:00:00.000Z |
| msrc_cve-2025-21790 | vxlan: check vxlan_vnigroup_init() return value | 2025-02-02T00:00:00.000Z | 2025-04-09T00:00:00.000Z |
| msrc_cve-2025-21789 | LoongArch: csum: Fix OoB access in IP checksum code for negative lengths | 2025-02-02T00:00:00.000Z | 2025-04-09T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202506-1367 | A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been classified as criti… | 2025-07-06T23:44:13.663000Z |
| var-202501-1467 | A vulnerability classified as critical has been found in Tenda AC15 15.13.07.13. This aff… | 2025-07-06T23:43:22.270000Z |
| var-202506-0039 | A vulnerability classified as critical has been found in Linksys RE6500, RE6250, RE6300, … | 2025-07-06T23:29:04.131000Z |
| var-202506-0001 | A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.… | 2025-07-06T23:25:47.063000Z |
| var-202506-1030 | A vulnerability, which was classified as critical, was found in TOTOLINK EX1200T 4.1.2cu.… | 2025-07-06T23:25:46.976000Z |
| var-202506-0051 | A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.… | 2025-07-06T19:33:23.931000Z |
| var-202506-1246 | A vulnerability classified as critical has been found in TOTOLINK EX1200T 4.1.2cu.5232_B2… | 2025-07-06T19:33:23.844000Z |
| var-202506-0003 | A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.… | 2025-07-05T23:31:29.355000Z |
| var-202405-4010 | TOTOLINK EX200 V4.0.3c.7646_B20201211 was discovered to contain a hardcoded password for … | 2025-07-05T23:30:59.795000Z |
| var-202408-3013 | TOTOLINK AC1200 Wireless Router A3002RU V2.1.1-B20230720.1011 is vulnerable to Buffer Ove… | 2025-07-05T23:30:59.372000Z |
| var-202404-2194 | IBM MQ Appliance 9.3 CD and LTS are vulnerable to a heap-based buffer overflow, caused by… | 2025-07-05T23:28:50.124000Z |
| var-202406-2008 | TOTOLINK CP300 V2.0.4-B20201102 was discovered to contain a hardcoded password vulnerabil… | 2025-07-05T23:28:49.795000Z |
| var-202506-1064 | A vulnerability was found in D-Link DIR-619L 2.06B01. It has been declared as critical. T… | 2025-07-05T23:28:48.015000Z |
| var-202506-3353 | A vulnerability classified as critical has been found in TOTOLINK X15 up to 1.0.0-B202307… | 2025-07-05T23:28:47.852000Z |
| var-202405-2316 | TOTOLINK LR350 V9.3.5u.6369_B20220309 was discovered to contain a stack overflow via the … | 2025-07-05T23:26:53.294000Z |
| var-202406-1058 | TOTOLINK LR350 V9.3.5u.6369_B20220309 was discovered to contain a command injection via t… | 2025-07-05T23:25:25.549000Z |
| var-202405-2515 | TOTOLINK CP900L v4.1.5cu.798_B20221228 was discovered to contain a stack overflow via the… | 2025-07-05T23:22:02.562000Z |
| var-202403-0233 | Linksys E2000 Ver.1.0.06 build 1 is vulnerable to authentication bypass via the position.… | 2025-07-05T23:21:33.787000Z |
| var-202405-2315 | TOTOLINK CP900L v4.1.5cu.798_B20221228 was discovered to contain a command injection vuln… | 2025-07-05T23:21:33.346000Z |
| var-202405-3091 | TOTOLINK CP900L v4.1.5cu.798_B20221228 was discovered to contain a hardcoded password for… | 2025-07-05T23:21:33.297000Z |
| var-202503-2843 | A vulnerability has been found in TOTOLINK A3000RU up to 5.9c.5185 and classified as prob… | 2025-07-05T23:20:23.154000Z |
| var-202506-1093 | A vulnerability, which was classified as critical, has been found in D-Link DIR-619L 2.06… | 2025-07-05T23:20:22.645000Z |
| var-202412-2591 | IBM MQ Appliance 9.3 LTS, 9.3 CD, and 9.4 LTS web console could allow an authenticated us… | 2025-07-05T23:14:21.756000Z |
| var-202506-1140 | A vulnerability classified as critical was found in D-Link DIR-619L 2.06B01. Affected by … | 2025-07-05T23:12:31.120000Z |
| var-202405-2701 | TOTOLINK CP900L v4.1.5cu.798_B20221228 was discovered to contain a hardcoded password vul… | 2025-07-05T23:09:27.618000Z |
| var-202506-1091 | A vulnerability, which was classified as critical, was found in TOTOLINK X15 1.0.0-B20230… | 2025-07-05T23:09:25.166000Z |
| var-202404-0833 | Tenda AC15 v15.03.20_multi, v15.03.05.19, and v15.03.05.18 firmware has a stack overflow … | 2025-07-05T23:04:24.379000Z |
| var-202506-0949 | A vulnerability has been found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713 and classified … | 2025-07-04T23:51:32.670000Z |
| var-202406-1045 | TOTOLINK A3700R V9.1.2u.6165_20211012 was discovered to contain a stack overflow via ssid… | 2025-07-04T23:51:10.327000Z |
| var-202407-2610 | TOTOLINK A6000R V1.0.1-B20201211.2000 was discovered to contain a command injection vulne… | 2025-07-04T23:51:10.122000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2024:3077-1 | Security update for qemu | 2024-09-02T14:42:23Z | 2024-09-02T14:42:23Z |
| suse-su-2024:3076-1 | Security update for python39 | 2024-09-02T14:41:42Z | 2024-09-02T14:41:42Z |
| suse-su-2024:3075-1 | Security update for xen | 2024-09-02T14:41:08Z | 2024-09-02T14:41:08Z |
| suse-su-2024:3074-1 | Security update for unbound | 2024-09-02T14:40:47Z | 2024-09-02T14:40:47Z |
| suse-su-2024:3073-1 | Security update for bubblewrap and flatpak | 2024-09-02T14:13:53Z | 2024-09-02T14:13:53Z |
| suse-su-2024:3062-1 | Security update for podman | 2024-08-30T08:20:33Z | 2024-08-30T08:20:33Z |
| suse-su-2024:3061-1 | Security update for apache2 | 2024-08-29T07:14:03Z | 2024-08-29T07:14:03Z |
| suse-su-2024:3060-1 | Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6) | 2024-08-28T14:03:44Z | 2024-08-28T14:03:44Z |
| suse-su-2024:3055-1 | Security update for python-setuptools | 2024-08-28T12:49:37Z | 2024-08-28T12:49:37Z |
| suse-su-2024:3054-1 | Security update for python3-setuptools | 2024-08-28T12:48:45Z | 2024-08-28T12:48:45Z |
| suse-su-2024:3052-1 | Security update for webkit2gtk3 | 2024-08-28T06:57:22Z | 2024-08-28T06:57:22Z |
| suse-su-2024:3039-1 | Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3) | 2024-08-27T18:03:53Z | 2024-08-27T18:03:53Z |
| suse-su-2024:3048-1 | Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP3) | 2024-08-27T16:34:47Z | 2024-08-27T16:34:47Z |
| suse-su-2024:3041-1 | Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP3) | 2024-08-27T16:34:39Z | 2024-08-27T16:34:39Z |
| suse-su-2024:3044-1 | Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP2) | 2024-08-27T16:34:13Z | 2024-08-27T16:34:13Z |
| suse-su-2024:3043-1 | Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP2) | 2024-08-27T16:34:03Z | 2024-08-27T16:34:03Z |
| suse-su-2024:3040-1 | Security update for the Linux Kernel (Live Patch 47 for SLE 12 SP5) | 2024-08-27T16:33:38Z | 2024-08-27T16:33:38Z |
| suse-su-2024:3037-1 | Security update for the Linux Kernel (Live Patch 54 for SLE 12 SP5) | 2024-08-27T16:04:00Z | 2024-08-27T16:04:00Z |
| suse-su-2024:3030-1 | Security update for the Linux Kernel (Live Patch 35 for SLE 15 SP3) | 2024-08-27T15:33:48Z | 2024-08-27T15:33:48Z |
| suse-su-2024:3034-1 | Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP3) | 2024-08-27T14:33:50Z | 2024-08-27T14:33:50Z |
| suse-su-2024:3032-1 | Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6) | 2024-08-27T14:03:49Z | 2024-08-27T14:03:49Z |
| suse-su-2024:3031-1 | Security update for keepalived | 2024-08-27T13:32:40Z | 2024-08-27T13:32:40Z |
| suse-su-2024:3027-1 | Security update for the Linux Kernel (Live Patch 53 for SLE 12 SP5) | 2024-08-27T13:04:04Z | 2024-08-27T13:04:04Z |
| suse-su-2024:3023-1 | Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP2) | 2024-08-27T10:04:09Z | 2024-08-27T10:04:09Z |
| suse-su-2024:3021-1 | Security update for the Linux Kernel (Live Patch 48 for SLE 12 SP5) | 2024-08-27T10:03:55Z | 2024-08-27T10:03:55Z |
| suse-su-2024:3019-1 | Security update for openssl-3 | 2024-08-27T08:50:29Z | 2024-08-27T08:50:29Z |
| suse-su-2024:3018-1 | Security update for mariadb | 2024-08-27T07:52:13Z | 2024-08-27T07:52:13Z |
| suse-su-2024:3015-1 | Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5) | 2024-08-27T01:34:00Z | 2024-08-27T01:34:00Z |
| suse-su-2024:3014-1 | Security update for the Linux Kernel (Live Patch 49 for SLE 12 SP5) | 2024-08-27T01:33:52Z | 2024-08-27T01:33:52Z |
| suse-su-2024:3010-1 | Security update for xen | 2024-08-26T09:52:00Z | 2024-08-26T09:52:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:11865-1 | apr-devel-1.7.0-4.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11864-1 | tomcat-9.0.43-5.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11863-1 | libshp-devel-1.5.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11862-1 | qemu-6.2.0-40.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11861-1 | php7-7.4.28-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11860-1 | cosign-1.5.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11859-1 | blender-3.0.1-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11858-1 | libwireshark15-3.6.2-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11857-1 | kernel-devel-5.16.10-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11856-1 | MozillaThunderbird-91.6.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11855-1 | libpodofo-devel-0.9.7-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11854-1 | php8-8.1.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11853-1 | cobbler-3.3.1.0+git.f5b0599a-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11852-1 | perl-GD-2.76-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11851-1 | mujs-1.2.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11850-1 | glibc-2.35-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11849-1 | chromedriver-98.0.4758.102-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11848-1 | atheme-7.2.12-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11847-1 | ruby3.1-rubygem-puma-5.6.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11846-1 | qtox-1.17.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11845-1 | xerces-j2-2.12.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11844-1 | go1.17-1.17.7-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11843-1 | go1.16-1.16.14-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11842-1 | MozillaThunderbird-91.6.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11841-1 | python-Twisted-doc-22.1.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11840-1 | ucode-intel-20220207-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11839-1 | python-2.7.18-16.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11838-1 | kafka-kit-2.1.0-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11837-1 | MozillaFirefox-97.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11836-1 | grafana-8.3.5-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitea-2021-29134 | 2024-03-06T10:55:18.365Z | 2025-04-03T14:40:37.652Z | |
| bit-gitea-2021-28378 | 2024-03-06T10:55:28.275Z | 2025-04-03T14:40:37.652Z | |
| bit-gitea-2020-28991 | 2024-03-06T10:55:38.711Z | 2025-04-03T14:40:37.652Z | |
| bit-gitea-2020-14144 | 2024-03-06T10:55:48.587Z | 2025-04-03T14:40:37.652Z | |
| bit-gitea-2020-13246 | 2024-03-06T10:55:58.572Z | 2025-04-03T14:40:37.652Z | |
| bit-ghost-2024-23725 | 2024-03-06T10:52:01.089Z | 2025-04-03T14:40:37.652Z | |
| bit-ghost-2023-32235 | 2024-03-06T10:52:21.101Z | 2025-04-03T14:40:37.652Z | |
| bit-ghost-2023-26510 | 2024-03-06T10:52:39.807Z | 2025-04-03T14:40:37.652Z | |
| bit-ghost-2022-41697 | 2024-03-06T10:53:30.902Z | 2025-04-03T14:40:37.652Z | |
| bit-ghost-2022-41654 | 2024-03-06T10:53:41.472Z | 2025-04-03T14:40:37.652Z | |
| bit-ghost-2022-28397 | 2024-03-06T10:53:51.564Z | 2025-04-03T14:40:37.652Z | |
| bit-ghost-2022-27139 | 2024-03-06T10:54:02.089Z | 2025-04-03T14:40:37.652Z | |
| bit-ghost-2020-8134 | 2024-03-06T10:54:36.209Z | 2025-04-03T14:40:37.652Z | |
| bit-gdal-2021-45943 | 2024-03-06T10:52:03.078Z | 2025-04-03T14:40:37.652Z | |
| bit-flink-2020-1960 | 2024-03-06T10:51:46.472Z | 2025-04-03T14:40:37.652Z | |
| bit-etcd-2022-34038 | 2024-03-06T10:51:58.470Z | 2025-04-03T14:40:37.652Z | |
| bit-etcd-2021-28235 | 2024-03-06T10:52:10.197Z | 2025-04-03T14:40:37.652Z | |
| bit-envoy-2021-29258 | 2024-03-06T10:58:52.386Z | 2025-04-03T14:40:37.652Z | |
| bit-envoy-2021-28683 | 2024-03-06T10:59:03.268Z | 2025-04-03T14:40:37.652Z | |
| bit-envoy-2021-28682 | 2024-03-06T10:59:14.669Z | 2025-04-03T14:40:37.652Z | |
| bit-envoy-2020-8663 | 2024-03-06T10:59:37.479Z | 2025-04-03T14:40:37.652Z | |
| bit-envoy-2020-8660 | 2024-03-06T10:59:45.972Z | 2025-04-03T14:40:37.652Z | |
| bit-envoy-2020-35471 | 2024-03-06T10:59:56.472Z | 2025-04-03T14:40:37.652Z | |
| bit-envoy-2020-35470 | 2024-03-06T11:00:08.110Z | 2025-04-03T14:40:37.652Z | |
| bit-envoy-2020-25017 | 2024-03-06T11:00:20.705Z | 2025-04-03T14:40:37.652Z | |
| bit-envoy-2020-12605 | 2024-03-06T11:00:40.816Z | 2025-04-03T14:40:37.652Z | |
| bit-envoy-2020-12604 | 2024-03-06T11:00:51.569Z | 2025-04-03T14:40:37.652Z | |
| bit-envoy-2020-12603 | 2024-03-06T11:01:02.906Z | 2025-04-03T14:40:37.652Z | |
| bit-envoy-2020-11767 | 2024-03-06T11:01:15.092Z | 2025-04-03T14:40:37.652Z | |
| bit-elk-2024-43708 | 2025-01-27T07:09:55.231Z | 2025-04-03T14:40:37.652Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-21133 | appRain CMF SQL注入漏洞(CNVD-2025-21133) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21132 | appRain CMF SQL注入漏洞(CNVD-2025-21132) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21131 | appRain CMF跨站脚本漏洞(CNVD-2025-21131) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21130 | appRain CMF跨站脚本漏洞(CNVD-2025-21130) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21129 | appRain CMF跨站脚本漏洞(CNVD-2025-21129) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21128 | appRain CMF跨站脚本漏洞(CNVD-2025-21128) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21127 | appRain CMF跨站脚本漏洞(CNVD-2025-21127) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21126 | appRain CMF跨站脚本漏洞(CNVD-2025-21126) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21125 | appRain CMF跨站脚本漏洞(CNVD-2025-21125) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21124 | appRain CMF跨站脚本漏洞(CNVD-2025-21124) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21123 | appRain CMF跨站脚本漏洞(CNVD-2025-21123) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21122 | appRain CMF跨站脚本漏洞(CNVD-2025-21122) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21121 | appRain CMF跨站脚本漏洞(CNVD-2025-21121) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21120 | appRain CMF跨站脚本漏洞(CNVD-2025-21120) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21119 | appRain CMF跨站脚本漏洞(CNVD-2025-21119) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21118 | appRain CMF跨站脚本漏洞(CNVD-2025-21118) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21117 | appRain CMF跨站脚本漏洞(CNVD-2025-21117) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21116 | appRain CMF跨站脚本漏洞(CNVD-2025-21116) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21115 | appRain CMF跨站脚本漏洞(CNVD-2025-21115) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21114 | appRain CMF跨站脚本漏洞(CNVD-2025-21114) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21113 | appRain CMF跨站脚本漏洞(CNVD-2025-21113) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21112 | appRain CMF跨站脚本漏洞(CNVD-2025-21112) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21111 | appRain CMF跨站脚本漏洞(CNVD-2025-21111) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21110 | appRain CMF跨站脚本漏洞(CNVD-2025-21110) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21109 | appRain CMF跨站脚本漏洞(CNVD-2025-21109) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21108 | appRain CMF SQL注入漏洞(CNVD-2025-21108) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21061 | Triangle MicroWorks SCADA Data Gateway文件上传漏洞 | 2023-08-07 | 2025-09-11 |
| cnvd-2025-21060 | Fuji Electric Monitouch V-SFT缓冲区溢出漏洞 | 2024-06-03 | 2025-09-11 |
| cnvd-2025-21059 | Triangle MicroWorks SCADA Data Gateway信息泄露漏洞 | 2024-07-19 | 2025-09-11 |
| cnvd-2025-21058 | Fuji Electric Monitouch V-SFT缓冲区溢出漏洞(CNVD-2025-21058) | 2024-12-03 | 2025-09-11 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2022-avi-135 | Multiples vulnérabilités dans Stormshield Network Security | 2022-02-10T00:00:00.000000 | 2022-02-10T00:00:00.000000 |
| certfr-2022-avi-134 | Multiples vulnérabilités dans Tenable Nessus | 2022-02-10T00:00:00.000000 | 2022-02-10T00:00:00.000000 |
| certfr-2022-avi-133 | Multiples vulnérabilités dans Citrix Hypervisor | 2022-02-10T00:00:00.000000 | 2022-02-10T00:00:00.000000 |
| certfr-2022-avi-132 | Multiples vulnérabilités dans les produits Microsoft | 2022-02-09T00:00:00.000000 | 2022-02-09T00:00:00.000000 |
| certfr-2022-avi-131 | Vulnérabilité dans Microsoft .Net | 2022-02-09T00:00:00.000000 | 2022-02-09T00:00:00.000000 |
| certfr-2022-avi-130 | Multiples vulnérabilités dans Microsoft Windows | 2022-02-09T00:00:00.000000 | 2022-02-09T00:00:00.000000 |
| certfr-2022-avi-129 | Multiples vulnérabilités dans Microsoft Office | 2022-02-09T00:00:00.000000 | 2022-02-09T00:00:00.000000 |
| certfr-2022-avi-128 | Vulnérabilité dans les produits F-Secure | 2022-02-09T00:00:00.000000 | 2022-02-09T00:00:00.000000 |
| certfr-2022-avi-127 | Multiples vulnérabilités dans les produits Intel | 2022-02-09T00:00:00.000000 | 2022-02-09T00:00:00.000000 |
| certfr-2022-avi-126 | Multiples vulnérabilités dans Mozilla Firefox | 2022-02-09T00:00:00.000000 | 2022-02-09T00:00:00.000000 |
| certfr-2022-avi-125 | Multiples vulnérabilités dans les produits SAP | 2022-02-09T00:00:00.000000 | 2022-02-09T00:00:00.000000 |
| certfr-2022-avi-124 | Multiples vulnérabilités dans les produits Siemens | 2022-02-09T00:00:00.000000 | 2022-02-09T00:00:00.000000 |
| certfr-2022-avi-123 | Multiples vulnérabilités dans les produits Schneider | 2022-02-09T00:00:00.000000 | 2022-02-09T00:00:00.000000 |
| certfr-2022-avi-118 | [MàJ] Multiples vulnérabilités dans Zimbra | 2022-02-07T00:00:00.000000 | 2022-02-09T00:00:00.000000 |
| certfr-2022-avi-122 | Multiples vulnérabilités dans Google Android | 2022-02-08T00:00:00.000000 | 2022-02-08T00:00:00.000000 |
| certfr-2022-avi-121 | Multiples vulnérabilités dans Google Chrome OS | 2022-02-08T00:00:00.000000 | 2022-02-08T00:00:00.000000 |
| certfr-2022-avi-120 | Vulnérabilité dans Red Hat Gluster Storage Server | 2022-02-08T00:00:00.000000 | 2022-02-08T00:00:00.000000 |
| certfr-2022-avi-119 | Vulnérabilité dans SonicWall SMA1000 | 2022-02-08T00:00:00.000000 | 2022-02-08T00:00:00.000000 |
| certfr-2022-avi-094 | Vulnérabilité dans Symfony | 2022-01-31T00:00:00.000000 | 2022-02-08T00:00:00.000000 |
| certfr-2022-avi-117 | Multiples vulnérabilités dans Postfix | 2022-02-07T00:00:00.000000 | 2022-02-07T00:00:00.000000 |
| certfr-2022-avi-116 | Vulnérabilité dans MongoDB | 2022-02-07T00:00:00.000000 | 2022-02-07T00:00:00.000000 |
| certfr-2022-avi-115 | Vulnérabilité dans IBM WebSphere | 2022-02-07T00:00:00.000000 | 2022-02-07T00:00:00.000000 |
| certfr-2022-avi-114 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2022-02-07T00:00:00.000000 | 2022-02-07T00:00:00.000000 |
| certfr-2022-avi-113 | Multiples vulnérabilités dans les produits NetApp | 2022-02-04T00:00:00.000000 | 2022-02-04T00:00:00.000000 |
| certfr-2022-avi-112 | Multiples vulnérabilités dans les produits GitLab | 2022-02-04T00:00:00.000000 | 2022-02-04T00:00:00.000000 |
| certfr-2022-avi-111 | Multiples vulnérabilités dans F5 BIG-IP et BIG-IQ | 2022-02-04T00:00:00.000000 | 2022-02-04T00:00:00.000000 |
| certfr-2022-avi-110 | Multiples vulnérabilités dans Microsoft Edge | 2022-02-04T00:00:00.000000 | 2022-02-04T00:00:00.000000 |
| certfr-2022-avi-109 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2022-02-04T00:00:00.000000 | 2022-02-04T00:00:00.000000 |
| certfr-2022-avi-108 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2022-02-04T00:00:00.000000 | 2022-02-04T00:00:00.000000 |
| certfr-2022-avi-107 | Multiples vulnérabilités dans Cisco Small Business RV | 2022-02-03T00:00:00.000000 | 2022-02-03T00:00:00.000000 |