Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-26198 |
9.8 (3.1)
|
ormar is vulnerable to SQL Injection through aggregate… |
collerek |
ormar |
2026-02-24T02:03:47.094Z | 2026-02-24T20:35:44.673Z |
| CVE-2026-22377 |
8.1 (3.1)
|
WordPress Saveo theme <= 1.1.2 - Local File Inclusion … |
AncoraThemes |
Saveo |
2026-02-20T15:47:05.960Z | 2026-02-24T20:30:39.293Z |
| CVE-2025-11847 |
4.9 (3.1)
|
A null pointer dereference vulnerability in the I… |
Zyxel |
VMG3625-T50B firmware |
2026-02-24T02:09:44.684Z | 2026-02-24T20:27:08.473Z |
| CVE-2025-11848 |
4.9 (3.1)
|
A null pointer dereference vulnerability in the W… |
Zyxel |
VMG3625-T50B firmware |
2026-02-24T02:14:18.688Z | 2026-02-24T20:25:28.725Z |
| CVE-2025-68841 |
7.5 (3.1)
|
WordPress TopperPack – Complete Elementor Addons, them… |
Themepul |
TopperPack – Complete Elementor Addons, Theme & CPT Builder |
2026-02-20T15:46:41.702Z | 2026-02-24T20:24:25.553Z |
| CVE-2025-69373 |
7.5 (3.1)
|
WordPress VidoRev theme <= 2.9.9.9.9.9.7 - Local File … |
beeteam368 |
VidoRev |
2026-02-20T15:46:51.695Z | 2026-02-24T20:24:25.192Z |
| CVE-2025-69387 |
7.5 (3.1)
|
WordPress Simple Retail Menus plugin <= 4.2.1 - Local … |
whatwouldjessedo |
Simple Retail Menus |
2026-02-20T15:46:54.745Z | 2026-02-24T20:09:12.911Z |
| CVE-2026-26331 |
8.8 (3.1)
|
yt-dlp: Arbitrary Command Injection when using the `--… |
yt-dlp |
yt-dlp |
2026-02-24T02:23:40.858Z | 2026-02-24T20:08:47.720Z |
| CVE-2025-69383 |
7.5 (3.1)
|
WordPress WP shop plugin <= 2.6.1 - Local File Inclusi… |
Agence web Eoxia - Montpellier |
WP shop |
2026-02-20T15:46:53.941Z | 2026-02-24T20:08:30.147Z |
| CVE-2026-22356 |
7.5 (3.1)
|
WordPress Jetpack CRM plugin <= 6.7.0 - Local File Inc… |
Automattic |
Jetpack CRM |
2026-02-20T15:47:01.362Z | 2026-02-24T20:06:17.125Z |
| CVE-2026-26981 |
6.5 (3.1)
|
OpenEXR has heap-buffer-overflow via signed integer un… |
AcademySoftwareFoundation |
openexr |
2026-02-24T02:26:16.659Z | 2026-02-24T20:03:54.667Z |
| CVE-2026-23803 |
6.4 (3.1)
|
WordPress Smart Auto Upload Images plugin <= 1.2.2 - S… |
Burhan Nasir |
Smart Auto Upload Images |
2026-02-19T08:26:50.148Z | 2026-02-24T19:57:55.720Z |
| CVE-2025-69299 |
7.2 (3.1)
|
WordPress Oxygen theme <= 6.0.8 - Server Side Request … |
Laborator |
Oxygen |
2026-02-20T15:46:46.533Z | 2026-02-24T19:57:23.888Z |
| CVE-2026-22341 |
5.4 (3.1)
|
WordPress Booked plugin <= 3.0.0 - Account Takeover vu… |
Case-Themes |
Booked |
2026-02-20T15:46:59.242Z | 2026-02-24T19:54:34.388Z |
| CVE-2025-69366 |
9.3 (3.1)
|
WordPress Emerce Core plugin <= 1.8 - SQL Injection vu… |
TeconceTheme |
Emerce Core |
2026-02-20T15:46:50.573Z | 2026-02-24T19:47:29.059Z |
| CVE-2025-69365 |
9.3 (3.1)
|
WordPress Uroan Core plugin <= 1.4.4 - SQL Injection v… |
TeconceTheme |
Uroan Core |
2026-02-20T15:46:50.375Z | 2026-02-24T19:47:28.889Z |
| CVE-2025-69337 |
9.3 (3.1)
|
WordPress Wolmart Core plugin <= 1.9.6 - SQL Injection… |
don-themes |
Wolmart Core |
2026-02-20T15:46:50.197Z | 2026-02-24T19:47:28.723Z |
| CVE-2025-69307 |
9.3 (3.1)
|
WordPress Medinik Core plugin <= 1.3.6 - SQL Injection… |
TeconceTheme |
Medinik Core |
2026-02-20T15:46:47.896Z | 2026-02-24T19:47:28.577Z |
| CVE-2025-69306 |
9.3 (3.1)
|
WordPress Electio Core plugin <= 1.4 - SQL Injection v… |
TeconceTheme |
Electio Core |
2026-02-20T15:46:47.710Z | 2026-02-24T19:47:28.415Z |
| CVE-2025-69305 |
9.3 (3.1)
|
WordPress Crete Core plugin <= 1.4.3 - SQL Injection v… |
TeconceTheme |
Crete Core |
2026-02-20T15:46:47.544Z | 2026-02-24T19:47:28.186Z |
| CVE-2026-27126 |
5.9 (4.0)
|
Craft CMS has Stored XSS in Table Field via "HTML" Col… |
craftcms |
cms |
2026-02-24T02:30:04.882Z | 2026-02-24T19:35:38.348Z |
| CVE-2026-22384 |
8.8 (3.1)
|
WordPress Applay - Shortcodes plugin <= 3.7 - PHP Obje… |
leafcolor |
Applay - Shortcodes |
2026-02-20T15:47:07.059Z | 2026-02-24T19:34:05.783Z |
| CVE-2026-3064 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
HummerRisk Cloud Task Scheduler ResourceCreateService.… |
n/a |
HummerRisk |
2026-02-24T02:32:08.524Z | 2026-02-24T19:30:05.511Z |
| CVE-2025-69304 |
9.3 (3.1)
|
WordPress Allmart plugin <= 1.1 - SQL Injection vulner… |
TeconceTheme |
Allmart |
2026-02-20T15:46:47.349Z | 2026-02-24T19:25:57.137Z |
| CVE-2025-69295 |
9.3 (3.1)
|
WordPress Coven Core plugin <= 1.3 - SQL Injection vul… |
TeconceTheme |
Coven Core |
2026-02-20T15:46:45.751Z | 2026-02-24T19:22:56.561Z |
| CVE-2025-67987 |
8.5 (3.1)
|
WordPress Quiz And Survey Master plugin <= 10.3.1 - SQ… |
ExpressTech Systems |
Quiz And Survey Master |
2026-02-20T15:46:31.764Z | 2026-02-24T19:21:20.336Z |
| CVE-2026-23805 |
7.6 (3.1)
|
WordPress Media Search Enhanced plugin <= 0.9.1 - SQL … |
Yoren Chang |
Media Search Enhanced |
2026-02-19T08:26:50.551Z | 2026-02-24T19:21:03.214Z |
| CVE-2026-27205 |
2.3 (4.0)
|
Flask session does not add `Vary: Cookie` header when … |
pallets |
flask |
2026-02-21T05:21:17.214Z | 2026-02-24T19:03:11.374Z |
| CVE-2026-27199 |
6.3 (4.0)
|
Werkzeug safe_join() allows Windows special device names |
pallets |
werkzeug |
2026-02-21T05:15:53.335Z | 2026-02-24T19:02:19.689Z |
| CVE-2026-27198 |
8.8 (3.1)
|
Formwork Improperly Manages Privileges During User Creation |
getformwork |
formwork |
2026-02-21T05:11:42.535Z | 2026-02-24T19:01:22.284Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-2103 |
7.1 (3.1)
|
Use of Hard-Coded Cryptographic Key for Password Storage |
Infor |
SyteLine ERP |
2026-02-06T16:22:28.282Z | 2026-02-06T16:39:17.314Z |
| CVE-2025-53523 |
5.4 (3.0)
4.8 (4.0)
|
Stored cross-site scripting vulnerabilities exist… |
Japan Total System Co.,Ltd. |
GroupSession Free edition |
2025-12-12T05:01:23.633Z | 2025-12-12T18:43:04.167Z |
| CVE-2025-54407 |
6.1 (3.0)
5.1 (4.0)
|
Stored cross-site scripting vulnerability exists … |
Japan Total System Co.,Ltd. |
GroupSession Free edition |
2025-12-12T05:01:05.335Z | 2025-12-12T18:41:39.394Z |
| CVE-2025-61950 |
4.3 (3.0)
5.3 (4.0)
|
In GroupSession, a Circular notice can be created… |
Japan Total System Co.,Ltd. |
GroupSession Free edition |
2025-12-12T05:02:11.514Z | 2025-12-12T18:44:39.141Z |
| CVE-2026-22038 |
8.1 (3.1)
|
AutoGPT's API Keys and Secrets Logged in Plaintext in … |
Significant-Gravitas |
AutoGPT |
2026-02-04T22:28:20.401Z | 2026-02-05T15:04:13.893Z |
| CVE-2025-32393 |
8.7 (4.0)
|
AutoGPT has a DoS vulnerability in ReadRSSFeedBlock |
Significant-Gravitas |
AutoGPT |
2026-02-05T22:57:54.441Z | 2026-02-06T19:29:52.815Z |
| CVE-2026-24312 |
5.2 (3.1)
|
Missing authorization check in SAP Business Workflow |
SAP_SE |
SAP Business Workflow |
2026-02-10T03:03:19.917Z | 2026-02-10T17:17:48.810Z |
| CVE-2025-61987 |
5.3 (3.0)
6.9 (4.0)
|
GroupSession Free edition prior to ver5.3.0, Grou… |
Japan Total System Co.,Ltd. |
GroupSession Free edition |
2025-12-12T05:02:22.443Z | 2025-12-12T20:22:14.823Z |
| CVE-2026-24319 |
5.8 (3.1)
|
Information Disclosure Vulnerability in SAP Business O… |
SAP_SE |
SAP Business One (B1 Client Memory Dump Files) |
2026-02-10T03:03:33.788Z | 2026-02-26T15:04:13.311Z |
| CVE-2026-26006 |
6.5 (3.1)
|
Redos (Regular Expression Denial of Service) at Code E… |
Significant-Gravitas |
AutoGPT |
2026-02-10T21:21:00.635Z | 2026-02-11T21:27:22.085Z |
| CVE-2026-24320 |
3.1 (3.1)
|
Memory Corruption vulnerability in SAP NetWeaver and A… |
SAP_SE |
SAP NetWeaver and ABAP Platform (Application Server ABAP) |
2026-02-10T03:03:42.731Z | 2026-02-10T16:25:30.720Z |
| CVE-2026-24321 |
5.3 (3.1)
|
Information Disclosure vulnerability in SAP Commerce Cloud |
SAP_SE |
SAP Commerce Cloud |
2026-02-10T03:03:52.708Z | 2026-02-10T17:01:39.830Z |
| CVE-2026-24322 |
7.7 (3.1)
|
Missing Authorization check in SAP Solution Tools Plug… |
SAP_SE |
SAP Solution Tools Plug-In (ST-PI) |
2026-02-10T03:04:01.992Z | 2026-02-10T17:00:38.519Z |
| CVE-2025-62192 |
5.4 (3.0)
5.3 (4.0)
|
SQL Injection vulnerability exists in GroupSessio… |
Japan Total System Co.,Ltd. |
GroupSession Free edition |
2025-12-12T05:02:38.764Z | 2025-12-12T20:36:24.896Z |
| CVE-2026-20422 |
6.5 (3.1)
|
In Modem, there is a possible system crash due to… |
MediaTek, Inc. |
MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8775, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893 |
2026-02-02T08:14:43.190Z | 2026-02-17T14:15:51.861Z |
| CVE-2026-20421 |
6.5 (3.1)
|
In Modem, there is a possible system crash due to… |
MediaTek, Inc. |
MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8791 |
2026-02-02T08:14:41.044Z | 2026-02-17T14:16:39.870Z |
| CVE-2026-20420 |
6.5 (3.1)
|
In Modem, there is a possible system crash due to… |
MediaTek, Inc. |
MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8676, MT8791 |
2026-02-02T08:14:32.385Z | 2026-02-17T14:18:26.562Z |
| CVE-2026-20406 |
6.5 (3.1)
|
In Modem, there is a possible system crash due to… |
MediaTek, Inc. |
MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893 |
2026-02-02T08:14:52.889Z | 2026-02-17T14:13:54.700Z |
| CVE-2026-20405 |
6.5 (3.1)
|
In Modem, there is a possible system crash due to… |
MediaTek, Inc. |
MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893 |
2026-02-02T08:14:50.854Z | 2026-02-17T14:14:19.474Z |
| CVE-2026-20404 |
6.5 (3.1)
|
In Modem, there is a possible system crash due to… |
MediaTek, Inc. |
MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893 |
2026-02-02T08:14:48.928Z | 2026-02-17T14:14:45.295Z |
| CVE-2026-20403 |
6.5 (3.1)
|
In Modem, there is a possible system crash due to… |
MediaTek, Inc. |
MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6989, MT6990, MT6991, MT6993, MT8673, MT8675, MT8676, MT8771, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8893 |
2026-02-02T08:14:45.891Z | 2026-02-17T14:15:26.288Z |
| CVE-2026-20402 |
6.5 (3.1)
|
In Modem, there is a possible system crash due to… |
MediaTek, Inc. |
MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797 |
2026-02-02T08:14:38.923Z | 2026-02-17T14:17:23.584Z |
| CVE-2026-20401 |
6.5 (3.1)
|
In Modem, there is a possible system crash due to… |
MediaTek, Inc. |
MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797 |
2026-02-02T08:14:35.625Z | 2026-02-17T14:18:07.056Z |
| CVE-2025-40905 |
7.3 (3.1)
|
WWW::OAuth 1.000 and earlier for Perl uses insecure ra… |
DBOOK |
WWW::OAuth |
2026-02-12T23:39:28.994Z | 2026-02-17T15:05:12.318Z |
| CVE-2025-20794 |
6.5 (3.1)
|
In Modem, there is a possible system crash due to… |
MediaTek, Inc. |
MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893 |
2026-01-06T01:46:31.408Z | 2026-02-17T14:21:13.568Z |
| CVE-2025-20793 |
6.5 (3.1)
|
In Modem, there is a possible system crash due to… |
MediaTek, Inc. |
MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6989, MT6990, MT6991, MT6993, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893 |
2026-01-06T01:46:33.180Z | 2026-02-17T14:20:42.396Z |
| CVE-2025-20791 |
6.5 (3.1)
|
In Modem, there is a possible system crash due to… |
MediaTek, Inc. |
MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797 |
2025-12-02T02:34:19.882Z | 2026-02-17T14:47:22.798Z |
| CVE-2025-20762 |
6.5 (3.1)
|
In Modem, there is a possible system crash due to… |
MediaTek, Inc. |
MT6835, MT6835T, MT6878, MT6878M, MT6897, MT6899, MT6991, MT8676, MT8678, MT8755, MT8792, MT8793, MT8863, MT8873, MT8883 |
2026-01-06T01:46:34.913Z | 2026-02-17T14:20:02.823Z |
| CVE-2025-20761 |
6.5 (3.1)
|
In Modem, there is a possible system crash due to… |
MediaTek, Inc. |
MT2735, MT2737, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893 |
2026-01-06T01:46:36.559Z | 2026-02-17T14:19:28.516Z |
| CVE-2025-20760 |
6.5 (3.1)
|
In Modem, there is a possible read of uninitializ… |
MediaTek, Inc. |
MT2735, MT2737, MT6833, MT6835, MT6853, MT6855, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893 |
2026-01-06T01:46:38.274Z | 2026-02-17T14:19:09.357Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-20402 | In Modem, there is a possible system crash due to improper input validation. This could lead to rem… | 2026-02-02T09:15:54.830 | 2026-02-17T15:16:20.853 |
| fkie_cve-2026-20401 | In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote … | 2026-02-02T09:15:54.663 | 2026-02-17T15:16:20.663 |
| fkie_cve-2025-40905 | WWW::OAuth 1.000 and earlier for Perl uses the rand() function as the default source of entropy, wh… | 2026-02-13T00:16:03.280 | 2026-02-17T15:16:18.387 |
| fkie_cve-2025-20794 | In Modem, there is a possible system crash due to improper input validation. This could lead to rem… | 2026-01-06T02:15:43.297 | 2026-02-17T15:16:18.177 |
| fkie_cve-2025-20793 | In Modem, there is a possible system crash due to incorrect error handling. This could lead to remo… | 2026-01-06T02:15:43.177 | 2026-02-17T15:16:17.960 |
| fkie_cve-2025-20791 | In Modem, there is a possible system crash due to incorrect error handling. This could lead to remo… | 2025-12-02T03:16:20.050 | 2026-02-17T15:16:17.633 |
| fkie_cve-2025-20762 | In Modem, there is a possible system crash due to incorrect error handling. This could lead to remo… | 2026-01-06T02:15:41.807 | 2026-02-17T15:16:17.400 |
| fkie_cve-2025-20761 | In Modem, there is a possible system crash due to incorrect error handling. This could lead to remo… | 2026-01-06T02:15:41.680 | 2026-02-17T15:16:17.167 |
| fkie_cve-2025-20760 | In Modem, there is a possible read of uninitialized heap data due to an uncaught exception. This co… | 2026-01-06T02:15:41.520 | 2026-02-17T15:16:16.953 |
| fkie_cve-2025-20757 | In Modem, there is a possible system crash due to improper input validation. This could lead to rem… | 2025-12-02T03:16:17.050 | 2026-02-17T15:16:16.777 |
| fkie_cve-2025-20756 | In Modem, there is a possible system crash due to a logic error. This could lead to remote denial o… | 2025-12-02T03:16:16.907 | 2026-02-17T15:16:16.593 |
| fkie_cve-2025-20752 | In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote… | 2025-12-02T03:16:16.353 | 2026-02-17T15:16:16.417 |
| fkie_cve-2025-20751 | In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote… | 2025-12-02T03:16:16.213 | 2026-02-17T15:16:16.240 |
| fkie_cve-2025-20750 | In Modem, there is a possible system crash due to improper input validation. This could lead to rem… | 2025-12-02T03:16:16.057 | 2026-02-17T15:16:08.647 |
| fkie_cve-2025-20708 | In Modem, there is a possible out of bounds write due to an incorrect bounds check. This could lead… | 2025-09-01T06:15:35.287 | 2026-02-17T15:16:08.460 |
| fkie_cve-2025-20704 | In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to… | 2025-09-01T06:15:34.630 | 2026-02-17T15:16:08.287 |
| fkie_cve-2025-20703 | In Modem, there is a possible out of bounds read due to an incorrect bounds check. This could lead … | 2025-09-01T06:15:33.357 | 2026-02-17T15:16:08.090 |
| fkie_cve-2025-20678 | In ims service, there is a possible system crash due to incorrect error handling. This could lead t… | 2025-06-02T03:15:25.230 | 2026-02-17T15:16:07.883 |
| fkie_cve-2025-20670 | In Modem, there is a possible permission bypass due to improper certificate validation. This could … | 2025-05-05T03:15:22.300 | 2026-02-17T15:16:07.697 |
| fkie_cve-2025-20667 | In Modem, there is a possible information disclosure due to incorrect error handling. This could le… | 2025-05-05T03:15:22.053 | 2026-02-17T15:16:07.510 |
| fkie_cve-2025-20666 | In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote … | 2025-05-05T03:15:21.940 | 2026-02-17T15:16:07.310 |
| fkie_cve-2025-20659 | In Modem, there is a possible system crash due to improper input validation. This could lead to rem… | 2025-04-07T04:15:19.820 | 2026-02-17T15:16:07.043 |
| fkie_cve-2025-20647 | In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote… | 2025-03-03T03:15:09.510 | 2026-02-17T15:16:06.853 |
| fkie_cve-2025-20644 | In Modem, there is a possible memory corruption due to incorrect error handling. This could lead to… | 2025-03-03T03:15:09.173 | 2026-02-17T15:16:06.640 |
| fkie_cve-2025-20634 | In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to… | 2025-02-03T04:15:08.423 | 2026-02-17T15:16:06.423 |
| fkie_cve-2024-20154 | In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to… | 2025-01-06T04:15:07.770 | 2026-02-17T15:16:05.517 |
| fkie_cve-2026-24323 | The BSP applications allow an unauthenticated user to inject malicious script content via user-cont… | 2026-02-10T04:16:04.467 | 2026-02-17T15:15:47.583 |
| fkie_cve-2026-25478 | Litestar is an Asynchronous Server Gateway Interface (ASGI) framework. Prior to 2.20.0, CORSConfig.… | 2026-02-09T20:15:57.017 | 2026-02-17T15:15:29.523 |
| fkie_cve-2026-24324 | SAP BusinessObjects Business Intelligence Platform (AdminTools) allows an authenticated attacker wi… | 2026-02-10T04:16:04.630 | 2026-02-17T15:15:09.090 |
| fkie_cve-2026-24325 | SAP BusinessObjects Enterprise does not sufficiently encode user-controlled inputs, leading to Stor… | 2026-02-10T04:16:04.790 | 2026-02-17T15:14:43.317 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-8mfp-f74j-7vph |
9.8 (3.1)
9.3 (4.0)
|
Edimax EW-7438RPn-v3 Mini 1.27 contains a remote code execution vulnerability that allows unauthent… | 2026-02-05T18:30:31Z | 2026-02-05T18:30:31Z |
| ghsa-77vf-q3xf-37g8 |
9.8 (3.1)
6.7 (4.0)
|
CODE::BLOCKS 16.01 contains a buffer overflow vulnerability that allows attackers to execute arbitr… | 2026-02-05T18:30:31Z | 2026-02-05T18:30:31Z |
| ghsa-755p-gj8q-88j5 |
6.2 (3.1)
6.7 (4.0)
|
UltraVNC Launcher 1.2.4.0 contains a denial of service vulnerability in its password configuration … | 2026-02-05T18:30:31Z | 2026-02-05T18:30:31Z |
| ghsa-3f26-hjxq-9434 |
6.2 (3.1)
6.7 (4.0)
|
ZOC Terminal 7.25.5 contains a script processing vulnerability that allows local attackers to crash… | 2026-02-05T18:30:31Z | 2026-02-05T18:30:31Z |
| ghsa-rq8q-2gpw-5fr2 |
6.1 (3.1)
7.4 (4.0)
|
Multiple cross-site scripting vulnerabilities in Admin UI of EZCast Pro II version 1.17478.146 allo… | 2026-01-27T12:31:18Z | 2026-02-05T18:30:30Z |
| ghsa-rgcm-m74w-vrfx |
4.2 (3.1)
|
XML Injection (aka Blind XPath Injection) vulnerability in Drupal Central Authentication System (CA… | 2026-02-04T21:30:32Z | 2026-02-05T18:30:30Z |
| ghsa-jm38-f2px-wcq3 |
8.2 (3.1)
8.8 (4.0)
|
phpMyChat Plus 1.98 contains a SQL injection vulnerability in the deluser.php page through the pmc_… | 2026-02-05T18:30:30Z | 2026-02-05T18:30:30Z |
| ghsa-w3m2-4m45-q2fh |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: hwmon: (coretemp) Simplify pla… | 2025-10-04T18:31:16Z | 2026-02-05T18:30:29Z |
| ghsa-v852-w8jm-hg43 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: jfs: fix invalid free of JFS_I… | 2025-10-04T18:31:16Z | 2026-02-05T18:30:29Z |
| ghsa-qcvv-hf25-xrrp |
5.4 (3.1)
5.1 (4.0)
|
Stored Cross-Site Scripting (XSS) in Poultry Farm Management System v1.0 due to the lack of proper … | 2026-01-20T15:33:12Z | 2026-02-05T18:30:29Z |
| ghsa-m8wv-9hr6-j68w |
4.7 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: mm/ksm: fix race with VMA iter… | 2025-10-04T18:31:16Z | 2026-02-05T18:30:29Z |
| ghsa-fq5x-5f3p-8v6r |
4.7 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix deletion ra… | 2025-10-04T18:31:16Z | 2026-02-05T18:30:29Z |
| ghsa-ff2v-mx9w-cwr7 |
5.4 (3.1)
5.1 (4.0)
|
Stored Cross-Site Scripting (XSS) in Poultry Farm Management System v1.0 due to the lack of proper … | 2026-01-20T12:31:17Z | 2026-02-05T18:30:29Z |
| ghsa-cr4v-m7hf-7hvj |
8.8 (3.1)
6.8 (4.0)
|
Cross-Site Request Forgery in Admin UI of EZCast Pro II version 1.17478.146 allows attackers to byp… | 2026-01-27T12:31:17Z | 2026-02-05T18:30:29Z |
| ghsa-cq4v-33m4-7gj5 |
9.1 (3.1)
7.6 (4.0)
|
Use of well-known default credentials in Admin UI of EZCast Pro II version 1.17478.146 allows attac… | 2026-01-27T12:31:17Z | 2026-02-05T18:30:29Z |
| ghsa-7r62-fw3j-xjqf |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ipmi_si: fix a memleak in try_… | 2025-10-04T18:31:16Z | 2026-02-05T18:30:29Z |
| ghsa-6789-c3xj-p7cq |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: dax: Fix dax_mapping_release()… | 2025-10-04T18:31:16Z | 2026-02-05T18:30:29Z |
| ghsa-45hq-rq49-xwcf |
5.3 (3.1)
5.7 (4.0)
|
Improper input validation in Admin UI of EZCast Pro II version 1.17478.146 allows attackers to mani… | 2026-01-27T12:31:18Z | 2026-02-05T18:30:29Z |
| ghsa-vqjq-cm24-xjp3 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: nfsd: clean up potential nfsd_… | 2025-10-04T18:31:16Z | 2026-02-05T18:30:28Z |
| ghsa-mj42-qmqq-f53f |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ALSA: ymfpci: Fix BUG_ON in pr… | 2025-10-04T18:31:16Z | 2026-02-05T18:30:28Z |
| ghsa-hvgm-3m44-563v |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: drm: amd: display: Fix memory … | 2025-10-04T18:31:16Z | 2026-02-05T18:30:28Z |
| ghsa-gjgv-497v-vq7g |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt76x0: fix oob ac… | 2025-10-04T18:31:14Z | 2026-02-05T18:30:28Z |
| ghsa-g3qq-fg79-63v4 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: nilfs2: fix potential UAF of s… | 2025-10-04T18:31:16Z | 2026-02-05T18:30:28Z |
| ghsa-9x8w-j6cc-w683 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: irqchip: Fix refcount leak in … | 2025-10-04T18:31:16Z | 2026-02-05T18:30:28Z |
| ghsa-3r4v-9hh7-vrpx |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: scsi: Revert "scsi: core: Do n… | 2025-10-04T18:31:16Z | 2026-02-05T18:30:28Z |
| ghsa-397q-f49x-2c9j |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Validate data run of… | 2025-10-04T18:31:14Z | 2026-02-05T18:30:28Z |
| ghsa-354h-9xfq-qm7v |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Fix pci device refc… | 2025-10-04T18:31:14Z | 2026-02-05T18:30:28Z |
| ghsa-2p73-743m-m4r5 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: drbd: only clone bio if we hav… | 2025-10-04T18:31:14Z | 2026-02-05T18:30:28Z |
| ghsa-5f7q-jpqc-wp7h |
5.9 (3.1)
|
Next.js has Unbounded Memory Consumption via PPR Resume Endpoint | 2026-01-28T15:20:55Z | 2026-02-05T17:17:16Z |
| ghsa-6c59-mwgh-r2x6 |
6.6 (4.0)
|
JSONPath vulnerable to Prototype Pollution due to insufficient input validation of object keys in l… | 2026-01-28T18:30:47Z | 2026-02-05T16:14:30Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-30674 | Unauthorized access vulnerability in ROS2 Iron Irwini in ROS_VERSION is 2 and ROS_PYTHON_… | 2024-04-03T05:02:29.244318Z |
| gsd-2024-30329 | Foxit PDF Reader Annotation Use-After-Free Information Disclosure Vulnerability. This vul… | 2024-04-03T05:02:29.244123Z |
| gsd-2024-30476 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.243917Z |
| gsd-2024-30090 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.243713Z |
| gsd-2024-30153 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.243520Z |
| gsd-2024-30920 | Cross Site Scripting vulnerability in DerbyNet v9.0 and below allows a remote attacker to… | 2024-04-03T05:02:29.243317Z |
| gsd-2024-30746 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.243104Z |
| gsd-2024-30177 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:29.242391Z |
| gsd-2024-30692 | A issue was discovered in ROS2 Galactic Geochelone versions ROS_VERSION 2 and ROS_PYTHON_… | 2024-04-03T05:02:29.242014Z |
| gsd-2024-30929 | Cross Site Scripting vulnerability in DerbyNet v9.0 and below allows attackers to execute… | 2024-04-03T05:02:29.241814Z |
| gsd-2024-30777 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.241617Z |
| gsd-2024-30773 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.241412Z |
| gsd-2024-30533 | Unrestricted Upload of File with Dangerous Type vulnerability in Techeshta Layouts for El… | 2024-04-03T05:02:29.240819Z |
| gsd-2024-30442 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:29.240067Z |
| gsd-2024-30756 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.239686Z |
| gsd-2024-30398 | An Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability … | 2024-04-03T05:02:29.239482Z |
| gsd-2024-30625 | Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the entrys parameter fro… | 2024-04-03T05:02:29.239092Z |
| gsd-2024-30492 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerabil… | 2024-04-03T05:02:29.238234Z |
| gsd-2024-30320 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.237943Z |
| gsd-2024-30878 | A cross-site scripting (XSS) vulnerability in RageFrame2 v2.6.43, allows remote attackers… | 2024-04-03T05:02:29.237728Z |
| gsd-2024-30938 | SQL Injection vulnerability in SEMCMS v.4.8 allows a remote attacker to obtain sensitive … | 2024-04-03T05:02:29.237518Z |
| gsd-2024-30105 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.237314Z |
| gsd-2024-30253 | @solana/web3.js is the Solana JavaScript SDK. Using particular inputs with `@solana/web3.… | 2024-04-03T05:02:29.237110Z |
| gsd-2024-30514 | Insertion of Sensitive Information into Log File vulnerability in Paid Memberships Pro Pa… | 2024-04-03T05:02:29.236477Z |
| gsd-2024-30648 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.236162Z |
| gsd-2024-30487 | Missing Authorization vulnerability in Sonaar Music MP3 Audio Player for Music, Radio & P… | 2024-04-03T05:02:29.235575Z |
| gsd-2024-30356 | Foxit PDF Reader AcroForm Out-Of-Bounds Read Information Disclosure Vulnerability. This v… | 2024-04-03T05:02:29.234967Z |
| gsd-2024-30169 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.234623Z |
| gsd-2024-30210 | IO-1020 Micro ELD uses a default WIFI password that could allow an adjacent attacker to c… | 2024-04-03T05:02:29.234432Z |
| gsd-2024-30117 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.234234Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-191120 | Malicious code in kns-error-code (npm) | 2025-11-24T23:03:51Z | 2025-12-01T04:28:29Z |
| mal-2025-191119 | Malicious code in kinvey-flex-scripts (npm) | 2025-11-24T23:03:35Z | 2025-12-01T04:28:29Z |
| mal-2025-191118 | Malicious code in kinvey-cli-wrapper (npm) | 2025-11-24T23:03:19Z | 2025-12-01T04:28:29Z |
| mal-2025-191117 | Malicious code in kinetix-default-token-list (npm) | 2025-11-24T23:02:30Z | 2025-12-01T04:28:29Z |
| mal-2025-191116 | Malicious code in kill-port (npm) | 2025-11-24T22:29:30Z | 2025-12-01T04:28:29Z |
| mal-2025-191115 | Malicious code in just-toasty (npm) | 2025-11-24T23:02:14Z | 2025-12-01T04:28:29Z |
| mal-2025-191114 | Malicious code in jsonsurge (npm) | 2025-11-24T23:01:59Z | 2025-12-01T04:28:29Z |
| mal-2025-191113 | Malicious code in jquery-bindings (npm) | 2025-11-24T22:30:50Z | 2025-12-01T04:28:29Z |
| mal-2025-191112 | Malicious code in jaetut-varit-test (npm) | 2025-11-24T23:01:32Z | 2025-12-01T04:28:29Z |
| mal-2025-191111 | Malicious code in insomnia-plugin-random-pick (npm) | 2025-11-24T23:00:55Z | 2025-12-01T04:28:29Z |
| mal-2025-191110 | Malicious code in inmaa-map (npm) | 2025-11-24T23:00:07Z | 2025-12-01T04:28:29Z |
| mal-2025-191109 | Malicious code in ids-enterprise-typings (npm) | 2025-11-24T22:59:49Z | 2025-12-01T04:28:29Z |
| mal-2025-191108 | Malicious code in ids-enterprise-ng (npm) | 2025-11-24T22:59:41Z | 2025-12-01T04:28:29Z |
| mal-2025-191107 | Malicious code in ids-enterprise-mcp-server (npm) | 2025-11-24T22:59:02Z | 2025-12-01T04:28:29Z |
| mal-2025-191106 | Malicious code in ids-css (npm) | 2025-11-24T22:58:31Z | 2025-12-01T04:28:29Z |
| mal-2025-191105 | Malicious code in gulp-inject-envs (npm) | 2025-11-24T22:32:50Z | 2025-12-01T04:28:29Z |
| mal-2025-191104 | Malicious code in gitsafe (npm) | 2025-11-24T22:34:41Z | 2025-12-01T04:28:29Z |
| mal-2025-191103 | Malicious code in get-them-args (npm) | 2025-11-24T22:35:46Z | 2025-12-01T04:28:29Z |
| mal-2025-191102 | Malicious code in generator-ng-itobuz (npm) | 2025-11-24T22:36:36Z | 2025-12-01T04:28:29Z |
| mal-2025-191101 | Malicious code in generator-meteor-stock (npm) | 2025-11-24T22:37:31Z | 2025-12-01T04:28:29Z |
| mal-2025-191396 | Malicious code in gatsby-plugin-antd (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:28Z |
| mal-2025-191395 | Malicious code in eslint-config-kinvey-flex-service (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:28Z |
| mal-2025-191392 | Malicious code in create-silgi (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:28Z |
| mal-2025-191391 | Malicious code in command-irail (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:28Z |
| mal-2025-191100 | Malicious code in gatsby-plugin-cname (npm) | 2025-11-24T22:37:21Z | 2025-12-01T04:28:28Z |
| mal-2025-191099 | Malicious code in fuzzy-finder (npm) | 2025-11-24T22:36:01Z | 2025-12-01T04:28:28Z |
| mal-2025-191098 | Malicious code in frontity-starter-theme (npm) | 2025-11-24T22:56:06Z | 2025-12-01T04:28:28Z |
| mal-2025-191097 | Malicious code in formik-store (npm) | 2025-11-24T22:35:11Z | 2025-12-01T04:28:28Z |
| mal-2025-191096 | Malicious code in formik-error-focus (npm) | 2025-11-24T22:34:46Z | 2025-12-01T04:28:28Z |
| mal-2025-191095 | Malicious code in flatten-unflatten (npm) | 2025-11-24T22:33:55Z | 2025-12-01T04:28:28Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-0076 | Aruba ArubaOS: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0075 | Rancher: Schwachstelle ermöglicht Cross-Site Scripting | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0074 | Arista EOS: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0073 | Ivanti Avalanche: Mehrere Schwachstellen | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0071 | Fortinet FortiClient: Mehrere Schwachstellen | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0069 | Fortinet FortiSwitch: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0068 | Fortinet FortiRecorder: Schwachstelle ermöglicht Manipulation von Dateien | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0067 | Fortinet FortiSIEM: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0066 | Fortinet FortiMail: Schwachstelle ermöglicht Codeausführung | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0065 | Fortinet FortiVoice: Mehrere Schwachstellen | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0062 | Phoenix Technologies BIOS: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0060 | PowerDNS: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes | 2018-05-10T22:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0059 | PowerDNS: Mehrere Schwachstellen ermöglichen Denial of Service | 2018-11-06T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0058 | PowerDNS: Mehrere Schwachstellen | 2020-09-22T22:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0050 | Mozilla Firefox: Mehrere Schwachstellen ermöglichen das Darstellen falscher Informationen | 2025-01-12T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2024-3622 | Pixel Patchday Dezember 2024: Mehrere Schwachstellen | 2024-12-05T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2023-2498 | Google Chrome / Microsoft Edge : Mehrere Schwachstellen ermöglichen Codeausführung | 2023-09-27T22:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2023-2337 | Apache Tomcat mod_jk Connector: Schwachstelle ermöglicht Umgehung von Sicherheitsmaßnahmen oder Offenlegung von Informationen | 2023-09-12T22:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2023-2305 | Google Chrome / Microsoft Edge: Schwachstelle ermöglicht Codeausführung | 2023-09-11T22:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2023-1738 | Red Hat OpenShift: Mehrere Schwachstellen | 2023-07-12T22:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2023-1230 | libssh2: Mehrere Schwachstellen | 2019-03-18T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2023-0842 | PowerDNS: Schwachstelle ermöglicht Denial of Service | 2022-03-27T22:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0057 | Zoom Video Communications: Mehrere Schwachstellen | 2025-01-13T23:00:00.000+00:00 | 2025-01-13T23:00:00.000+00:00 |
| wid-sec-w-2025-0055 | TYPO3 Core: Mehrere Schwachstellen | 2025-01-13T23:00:00.000+00:00 | 2025-01-13T23:00:00.000+00:00 |
| wid-sec-w-2025-0053 | Qlik Sense: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes | 2025-01-13T23:00:00.000+00:00 | 2025-01-13T23:00:00.000+00:00 |
| wid-sec-w-2025-0052 | Apache CloudStack: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-01-13T23:00:00.000+00:00 | 2025-01-13T23:00:00.000+00:00 |
| wid-sec-w-2025-0051 | SAP Patchday Januar 2025: Mehrere Schwachstellen | 2025-01-13T23:00:00.000+00:00 | 2025-01-13T23:00:00.000+00:00 |
| wid-sec-w-2024-3726 | BeyondTrust Privileged Remote Access: Schwachstelle ermöglicht Ausführen von beliebigen Kommandos | 2024-12-18T23:00:00.000+00:00 | 2025-01-13T23:00:00.000+00:00 |
| wid-sec-w-2024-3424 | Intel Graphics Driver: Mehrere Schwachstellen | 2024-11-12T23:00:00.000+00:00 | 2025-01-13T23:00:00.000+00:00 |
| wid-sec-w-2023-2316 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2023-09-12T22:00:00.000+00:00 | 2025-01-13T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2017:3455 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.0 security update | 2017-12-13T17:57:25+00:00 | 2026-01-28T22:54:45+00:00 |
| rhsa-2017:3454 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.0 security update | 2017-12-13T17:48:09+00:00 | 2026-01-28T22:54:45+00:00 |
| rhsa-2017:2596 | Red Hat Security Advisory: rh-maven33-groovy security update | 2017-09-05T22:54:05+00:00 | 2026-01-28T22:54:45+00:00 |
| rhsa-2017:2486 | Red Hat Security Advisory: groovy security update | 2017-08-17T02:38:21+00:00 | 2026-01-28T22:54:45+00:00 |
| rhsa-2017:0868 | Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.3 R2 security and bug fix update | 2017-04-03T21:02:28+00:00 | 2026-01-28T22:54:44+00:00 |
| rhsa-2017:0272 | Red Hat Security Advisory: Red Hat JBoss Data Virtualization security and bug fix update | 2017-02-14T16:41:53+00:00 | 2026-01-28T22:54:43+00:00 |
| rhsa-2016:2593 | Red Hat Security Advisory: sudo security, bug fix, and enhancement update | 2016-11-03T08:10:56+00:00 | 2026-01-28T22:54:42+00:00 |
| rhsa-2016:1841 | Red Hat Security Advisory: JBoss Enterprise Application Platform 7.0.2 | 2016-09-08T18:12:58+00:00 | 2026-01-28T22:54:42+00:00 |
| rhsa-2016:1840 | Red Hat Security Advisory: eap7-jboss-ec2-eap security, bug fix, and enhancement update | 2016-09-08T18:14:07+00:00 | 2026-01-28T22:54:40+00:00 |
| rhsa-2016:1839 | Red Hat Security Advisory: JBoss Enterprise Application Platform 7.0.2 for RHEL 7 | 2016-09-08T18:38:52+00:00 | 2026-01-28T22:54:40+00:00 |
| rhsa-2016:1838 | Red Hat Security Advisory: JBoss Enterprise Application Platform 7.0.2 on RHEL 6 | 2016-09-08T18:17:08+00:00 | 2026-01-28T22:54:37+00:00 |
| rhsa-2015:0034 | Red Hat Security Advisory: Red Hat JBoss Data Virtualization 6.0.0 security update | 2015-01-12T17:32:39+00:00 | 2026-01-28T22:54:30+00:00 |
| rhsa-2014:1995 | Red Hat Security Advisory: Red Hat JBoss Fuse Service Works 6.0.0 security update | 2014-12-15T20:35:32+00:00 | 2026-01-28T22:54:30+00:00 |
| rhsa-2014:1291 | Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.0.3 update | 2014-09-23T20:19:49+00:00 | 2026-01-28T22:54:29+00:00 |
| rhsa-2014:1290 | Red Hat Security Advisory: Red Hat JBoss BRMS 6.0.3 update | 2014-09-23T20:19:55+00:00 | 2026-01-28T22:54:29+00:00 |
| rhsa-2014:0896 | Red Hat Security Advisory: Red Hat JBoss Web Framework Kit 2.6.0 update | 2014-07-16T17:12:11+00:00 | 2026-01-28T22:54:29+00:00 |
| rhsa-2014:0254 | Red Hat Security Advisory: activemq security update | 2014-03-05T19:05:16+00:00 | 2026-01-28T22:54:29+00:00 |
| rhsa-2014:0245 | Red Hat Security Advisory: activemq security update | 2014-03-03T18:25:38+00:00 | 2026-01-28T22:54:28+00:00 |
| rhsa-2013:1862 | Red Hat Security Advisory: Fuse ESB Enterprise/Fuse MQ Enterprise 7.1.0 update | 2013-12-19T22:49:00+00:00 | 2026-01-28T22:54:28+00:00 |
| rhsa-2013:1852 | Red Hat Security Advisory: Red Hat Enterprise MRG Grid 2.4 security update | 2013-12-17T18:29:00+00:00 | 2026-01-28T22:54:28+00:00 |
| rhsa-2013:1786 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.0 update | 2013-12-04T18:00:00+00:00 | 2026-01-28T22:54:28+00:00 |
| rhsa-2013:1785 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.0 update | 2013-12-04T17:58:00+00:00 | 2026-01-28T22:54:28+00:00 |
| rhsa-2013:1784 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.0 update | 2013-12-04T17:16:00+00:00 | 2026-01-28T22:54:27+00:00 |
| rhsa-2013:1456 | Red Hat Security Advisory: Red Hat Network Satellite server IBM Java Runtime security update | 2013-10-23T16:26:00+00:00 | 2026-01-28T22:54:27+00:00 |
| rhsa-2013:1455 | Red Hat Security Advisory: Red Hat Network Satellite server IBM Java Runtime security update | 2013-10-23T16:26:00+00:00 | 2026-01-28T22:54:27+00:00 |
| rhsa-2013:1441 | Red Hat Security Advisory: rubygems security update | 2013-10-17T17:15:00+00:00 | 2026-01-28T22:54:27+00:00 |
| rhsa-2013:1203 | Red Hat Security Advisory: rubygems security update | 2013-09-04T17:50:00+00:00 | 2026-01-28T22:54:27+00:00 |
| rhsa-2013:1185 | Red Hat Security Advisory: Red Hat JBoss Fuse 6.0.0 patch 2 | 2013-08-29T23:22:00+00:00 | 2026-01-28T22:54:27+00:00 |
| rhsa-2013:1147 | Red Hat Security Advisory: Red Hat JBoss SOA Platform 5.3.1 update | 2013-08-08T17:04:00+00:00 | 2026-01-28T22:54:27+00:00 |
| rhsa-2013:1028 | Red Hat Security Advisory: Fuse ESB Enterprise 7.1.0 update | 2013-07-09T17:35:00+00:00 | 2026-01-28T22:54:27+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-38544 | rxrpc: Fix bug due to prealloc collision | 2025-08-02T00:00:00.000Z | 2025-11-20T01:02:43.000Z |
| msrc_cve-2025-38524 | rxrpc: Fix recv-recv race of completed call | 2025-08-02T00:00:00.000Z | 2025-11-20T01:02:33.000Z |
| msrc_cve-2022-50116 | tty: n_gsm: fix deadlock and link starvation in outgoing data path | 2025-06-02T00:00:00.000Z | 2025-11-20T01:01:18.000Z |
| msrc_cve-2025-64657 | Azure Application Gateway Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-20T00:00:00.000Z |
| msrc_cve-2025-64656 | Azure Application Gateway Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-20T00:00:00.000Z |
| msrc_cve-2025-64655 | Dynamics OmniChannel SDK Storage Containers Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-20T00:00:00.000Z |
| msrc_cve-2025-62459 | Microsoft Defender Portal Spoofing Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-20T00:00:00.000Z |
| msrc_cve-2025-62207 | Azure Monitor Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-20T00:00:00.000Z |
| msrc_cve-2025-59245 | Microsoft SharePoint Online Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-20T00:00:00.000Z |
| msrc_cve-2025-54099 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2025-09-09T00:00:00.000Z | 2025-11-20T00:00:00.000Z |
| msrc_cve-2025-59777 | NULL pointer dereference vulnerability exists in GNU libmicrohttpd v1.0.2 and earlier. The vulnerability was fixed in commit ff13abc on the master branch of the libmicrohttpd Git repository, after the v1.0.2 tag. A specially crafted packet sent by an attacker could cause a denial-of-service (DoS) condition. | 2025-11-02T00:00:00.000Z | 2025-11-19T14:35:32.000Z |
| msrc_cve-2023-52481 | arm64: errata: Add Cortex-A520 speculative unprivileged load workaround | 2024-02-02T08:00:00.000Z | 2025-11-19T01:55:07.000Z |
| msrc_cve-2024-26830 | i40e: Do not allow untrusted VF to remove administratively set MAC | 2024-04-02T07:00:00.000Z | 2025-11-19T01:54:51.000Z |
| msrc_cve-2024-26837 | net: bridge: switchdev: Skip MDB replays of deferred events on offload | 2024-04-02T07:00:00.000Z | 2025-11-19T01:54:44.000Z |
| msrc_cve-2024-38543 | lib/test_hmm.c: handle src_pfns and dst_pfns allocation failure | 2024-06-02T07:00:00.000Z | 2025-11-19T01:54:21.000Z |
| msrc_cve-2024-25621 | containerd affected by a local privilege escalation via wide permissions on CRI directory | 2025-11-02T00:00:00.000Z | 2025-11-19T01:52:07.000Z |
| msrc_cve-2024-26759 | mm/swap: fix race when skipping swapcache | 2024-04-02T07:00:00.000Z | 2025-11-19T01:46:21.000Z |
| msrc_cve-2024-26740 | net/sched: act_mirred: use the backlog for mirred ingress | 2024-04-02T07:00:00.000Z | 2025-11-19T01:46:00.000Z |
| msrc_cve-2024-26669 | net/sched: flower: Fix chain template offload | 2024-04-02T07:00:00.000Z | 2025-11-19T01:45:22.000Z |
| msrc_cve-2024-26869 | f2fs: fix to truncate meta inode pages forcely | 2024-04-02T07:00:00.000Z | 2025-11-19T01:44:59.000Z |
| msrc_cve-2024-26680 | net: atlantic: Fix DMA mapping for PTP hwts ring | 2024-04-02T07:00:00.000Z | 2025-11-19T01:44:55.000Z |
| msrc_cve-2024-36924 | scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() | 2024-05-02T07:00:00.000Z | 2025-11-19T01:44:05.000Z |
| msrc_cve-2021-33464 | An issue was discovered in yasm version 1.3.0. There is a heap-buffer-overflow in inc_fopen() in modules/preprocs/nasm/nasm-pp.c. | 2022-07-02T00:00:00.000Z | 2025-11-19T01:41:19.000Z |
| msrc_cve-2021-33463 | An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in yasm_expr__copy_except() in libyasm/expr.c. | 2022-07-02T00:00:00.000Z | 2025-11-19T01:41:01.000Z |
| msrc_cve-2024-26662 | drm/amd/display: Fix 'panel_cntl' could be null in 'dcn21_set_backlight_level()' | 2024-04-02T07:00:00.000Z | 2025-11-19T01:38:42.000Z |
| msrc_cve-2024-27062 | nouveau: lock the client object tree. | 2024-05-02T07:00:00.000Z | 2025-11-19T01:38:03.000Z |
| msrc_cve-2024-27041 | drm/amd/display: fix NULL checks for adev->dm.dc in amdgpu_dm_fini() | 2024-05-02T07:00:00.000Z | 2025-11-19T01:37:43.000Z |
| msrc_cve-2023-52653 | SUNRPC: fix a memleak in gss_import_v2_context | 2024-05-02T07:00:00.000Z | 2025-11-19T01:36:54.000Z |
| msrc_cve-2024-38630 | watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger | 2024-06-02T07:00:00.000Z | 2025-11-19T01:36:48.000Z |
| msrc_cve-2024-35865 | smb: client: fix potential UAF in smb2_is_valid_oplock_break() | 2024-05-02T07:00:00.000Z | 2025-11-19T01:36:17.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202506-0804 | A vulnerability classified as critical was found in TOTOLINK T10 4.1.8cu.5207. Affected b… | 2025-07-01T23:16:14.217000Z |
| var-202506-0463 | A vulnerability, which was classified as critical, was found in Tenda AC6 15.03.05.16. Th… | 2025-07-01T23:11:18.630000Z |
| var-201301-0164 | When an affected product receives a valid CIP message from an unauthorized or unintended … | 2025-07-01T23:04:31.199000Z |
| var-201301-0154 | The device does not properly authenticate users and the potential exists for a remote use… | 2025-07-01T23:04:31.157000Z |
| var-201301-0158 | An information exposure of confidential information results when the device receives a sp… | 2025-07-01T23:04:31.087000Z |
| var-201301-0157 | The Web server password authentication mechanism used by the products is vulnerable to a … | 2025-07-01T23:04:31.043000Z |
| var-201301-0159 | When an affected product receives a valid CIP message from an unauthorized or unintended … | 2025-07-01T23:04:30.999000Z |
| var-201301-0155 | The device does not properly validate the data being sent to the buffer. An attacker can … | 2025-07-01T23:04:30.950000Z |
| var-201301-0153 | The device does not properly validate the data being sent to the buffer. An attacker can … | 2025-07-01T23:04:30.882000Z |
| var-201301-0156 | When an affected product receives a valid CIP message from an unauthorized or unintended… | 2025-07-01T23:04:30.839000Z |
| var-202404-0121 | HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that… | 2025-07-01T21:18:45.102000Z |
| var-202506-0442 | CWE-400: Uncontrolled Resource Consumption vulnerability exists that could cause Denial o… | 2025-07-01T19:32:54.288000Z |
| var-202404-0085 | OS command injection vulnerability in BUFFALO wireless LAN routers allows a logged-in use… | 2025-06-30T23:13:10.349000Z |
| var-202404-0086 | Plaintext storage of a password issue exists in BUFFALO wireless LAN routers, which may a… | 2025-06-30T23:13:10.331000Z |
| var-202408-0337 | A vulnerability classified as critical has been found in TOTOLINK N350RT 9.3.5u.6139_B202… | 2025-06-29T23:22:56.274000Z |
| var-202504-3413 | A vulnerability classified as critical was found in Netgear EX6120 1.0.0.68. Affected by … | 2025-06-29T23:22:35.388000Z |
| var-202506-0539 | A vulnerability was found in D-Link DIR-632 FW103B08. It has been declared as critical. T… | 2025-06-29T23:21:13.331000Z |
| var-202407-1769 | TOTOLINK A6000R V1.0.1-B20201211.2000 was discovered to contain a command injection vulne… | 2025-06-29T23:20:19.445000Z |
| var-202412-1095 | TP-Link TL-WR845N(UN)_V4_190219 was discovered to transmit credentials in base64 encoded … | 2025-06-29T23:20:18.751000Z |
| var-202504-3377 | A vulnerability was found in Netgear WG302v2 up to 5.2.9 and classified as critical. Affe… | 2025-06-29T23:20:18.066000Z |
| var-202505-2005 | A vulnerability classified as critical has been found in Tenda FH451 1.0.0.9. Affected is… | 2025-06-29T23:18:50.690000Z |
| var-202506-0002 | A vulnerability, which was classified as critical, was found in Linksys RE6500, RE6250, R… | 2025-06-29T23:17:28.071000Z |
| var-202506-1138 | A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105. It has been declared as c… | 2025-06-29T23:15:33.462000Z |
| var-202408-0332 | A vulnerability classified as critical was found in TOTOLINK EX200 4.0.3c.7646_B20201211.… | 2025-06-29T23:14:10.133000Z |
| var-202505-1677 | A vulnerability, which was classified as critical, has been found in TOTOLINK A3002R and … | 2025-06-29T23:14:08.809000Z |
| var-202408-0368 | A vulnerability, which was classified as critical, has been found in TOTOLINK CP900 6.3c.… | 2025-06-29T23:10:19.996000Z |
| var-202505-1723 | A vulnerability was found in TOTOLINK A3002R and A3002RU 3.0.0-B20230809.1615. It has bee… | 2025-06-29T23:06:38.347000Z |
| var-202407-0984 | TOTOLINK A6000R V1.0.1-B20201211.2000 was discovered to contain a command injection vulne… | 2025-06-29T23:05:40.173000Z |
| var-202408-0177 | A vulnerability was found in TOTOLINK CP450 4.1.0cu.747_B20191224. It has been classified… | 2025-06-29T23:02:45.111000Z |
| var-202408-0282 | A vulnerability was found in TOTOLINK A3300R 17.0.0cu.557_B20221024 and classified as cri… | 2025-06-29T23:02:45.085000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2024:3095-1 | Security update for ucode-intel | 2024-09-03T14:35:35Z | 2024-09-03T14:35:35Z |
| suse-su-2024:3094-1 | Security update for kubernetes1.26 | 2024-09-03T14:34:48Z | 2024-09-03T14:34:48Z |
| suse-su-2024:3091-1 | Security update for webkit2gtk3 | 2024-09-03T13:54:13Z | 2024-09-03T13:54:13Z |
| suse-su-2024:3090-1 | Security update for frr | 2024-09-03T13:53:21Z | 2024-09-03T13:53:21Z |
| suse-su-2024:3089-1 | Security update for go1.21-openssl | 2024-09-03T13:52:11Z | 2024-09-03T13:52:11Z |
| suse-su-2024:3086-1 | Security update for glib2 | 2024-09-03T06:57:34Z | 2024-09-03T06:57:34Z |
| suse-su-2024:3083-1 | Security update for zziplib | 2024-09-02T14:45:14Z | 2024-09-02T14:45:14Z |
| suse-su-2024:3082-1 | Security update for 389-ds | 2024-09-02T14:44:56Z | 2024-09-02T14:44:56Z |
| suse-su-2024:3081-1 | Security update for kernel-firmware | 2024-09-02T14:44:35Z | 2024-09-02T14:44:35Z |
| suse-su-2024:3080-1 | Security update for curl | 2024-09-02T14:44:00Z | 2024-09-02T14:44:00Z |
| suse-su-2024:3079-1 | Security update for libqt5-qt3d | 2024-09-02T14:43:20Z | 2024-09-02T14:43:20Z |
| suse-su-2024:3078-1 | Security update for libqt5-qtquick3d | 2024-09-02T14:43:00Z | 2024-09-02T14:43:00Z |
| suse-su-2024:3077-1 | Security update for qemu | 2024-09-02T14:42:23Z | 2024-09-02T14:42:23Z |
| suse-su-2024:3076-1 | Security update for python39 | 2024-09-02T14:41:42Z | 2024-09-02T14:41:42Z |
| suse-su-2024:3075-1 | Security update for xen | 2024-09-02T14:41:08Z | 2024-09-02T14:41:08Z |
| suse-su-2024:3074-1 | Security update for unbound | 2024-09-02T14:40:47Z | 2024-09-02T14:40:47Z |
| suse-su-2024:3073-1 | Security update for bubblewrap and flatpak | 2024-09-02T14:13:53Z | 2024-09-02T14:13:53Z |
| suse-su-2024:3062-1 | Security update for podman | 2024-08-30T08:20:33Z | 2024-08-30T08:20:33Z |
| suse-su-2024:3061-1 | Security update for apache2 | 2024-08-29T07:14:03Z | 2024-08-29T07:14:03Z |
| suse-su-2024:3060-1 | Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP6) | 2024-08-28T14:03:44Z | 2024-08-28T14:03:44Z |
| suse-su-2024:3055-1 | Security update for python-setuptools | 2024-08-28T12:49:37Z | 2024-08-28T12:49:37Z |
| suse-su-2024:3054-1 | Security update for python3-setuptools | 2024-08-28T12:48:45Z | 2024-08-28T12:48:45Z |
| suse-su-2024:3052-1 | Security update for webkit2gtk3 | 2024-08-28T06:57:22Z | 2024-08-28T06:57:22Z |
| suse-su-2024:3039-1 | Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3) | 2024-08-27T18:03:53Z | 2024-08-27T18:03:53Z |
| suse-su-2024:3048-1 | Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP3) | 2024-08-27T16:34:47Z | 2024-08-27T16:34:47Z |
| suse-su-2024:3041-1 | Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP3) | 2024-08-27T16:34:39Z | 2024-08-27T16:34:39Z |
| suse-su-2024:3044-1 | Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP2) | 2024-08-27T16:34:13Z | 2024-08-27T16:34:13Z |
| suse-su-2024:3043-1 | Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP2) | 2024-08-27T16:34:03Z | 2024-08-27T16:34:03Z |
| suse-su-2024:3040-1 | Security update for the Linux Kernel (Live Patch 47 for SLE 12 SP5) | 2024-08-27T16:33:38Z | 2024-08-27T16:33:38Z |
| suse-su-2024:3037-1 | Security update for the Linux Kernel (Live Patch 54 for SLE 12 SP5) | 2024-08-27T16:04:00Z | 2024-08-27T16:04:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:11828-1 | ruby3.1-rubygem-activesupport-6.0-6.0.4.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11827-1 | ruby3.1-rubygem-activestorage-6.0-6.0.4.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11826-1 | ruby3.1-rubygem-activerecord-6.0-6.0.4.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11825-1 | ruby3.1-rubygem-activemodel-6.0-6.0.4.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11824-1 | ruby3.1-rubygem-activejob-6.0-6.0.4.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11823-1 | ruby3.1-rubygem-actionview-6.0-6.0.4.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11822-1 | ruby3.1-rubygem-actiontext-6.0-6.0.4.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11821-1 | ruby3.1-rubygem-actionpack-6.0-6.0.4.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11820-1 | ruby3.1-rubygem-actionmailer-6.0-6.0.4.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11819-1 | ruby3.1-rubygem-actionmailbox-6.0-6.0.4.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11818-1 | ruby3.1-rubygem-actioncable-6.0-6.0.4.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11817-1 | openscad-2021.01-4.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11816-1 | grafana-8.3.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11815-1 | libvirglrenderer1-0.9.1-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11814-1 | python310-Pillow-9.0.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11813-1 | libQt5Bootstrap-devel-static-32bit-5.15.2+kde294-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11812-1 | gvim-8.2.4286-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11811-1 | chromedriver-98.0.4758.80-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11810-1 | java-13-openjdk-13.0.10.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11809-1 | xstream-1.4.19-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11808-1 | strongswan-5.9.5-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11807-1 | ctdb-4.15.5+git.328.f1f29505d84-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11806-1 | python310-treq-22.1.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11805-1 | python310-scikit-learn-1.0.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11804-1 | python310-Django-4.0.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11803-1 | glade-catalog-libgda-6.0.0-5.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11802-1 | ldns-1.8.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11801-1 | kate-21.12.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11800-1 | java-17-openjdk-17.0.2.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11799-1 | java-15-openjdk-15.0.6.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-envoy-2021-28682 | 2024-03-06T10:59:14.669Z | 2025-04-03T14:40:37.652Z | |
| bit-envoy-2020-8663 | 2024-03-06T10:59:37.479Z | 2025-04-03T14:40:37.652Z | |
| bit-envoy-2020-8660 | 2024-03-06T10:59:45.972Z | 2025-04-03T14:40:37.652Z | |
| bit-envoy-2020-35471 | 2024-03-06T10:59:56.472Z | 2025-04-03T14:40:37.652Z | |
| bit-envoy-2020-35470 | 2024-03-06T11:00:08.110Z | 2025-04-03T14:40:37.652Z | |
| bit-envoy-2020-25017 | 2024-03-06T11:00:20.705Z | 2025-04-03T14:40:37.652Z | |
| bit-envoy-2020-12605 | 2024-03-06T11:00:40.816Z | 2025-04-03T14:40:37.652Z | |
| bit-envoy-2020-12604 | 2024-03-06T11:00:51.569Z | 2025-04-03T14:40:37.652Z | |
| bit-envoy-2020-12603 | 2024-03-06T11:01:02.906Z | 2025-04-03T14:40:37.652Z | |
| bit-envoy-2020-11767 | 2024-03-06T11:01:15.092Z | 2025-04-03T14:40:37.652Z | |
| bit-elk-2024-43708 | 2025-01-27T07:09:55.231Z | 2025-04-03T14:40:37.652Z | |
| bit-elk-2024-37288 | 2024-09-11T07:10:22.120Z | 2025-04-03T14:40:37.652Z | |
| bit-elk-2024-23443 | 2024-06-21T07:17:42.200Z | 2025-04-03T14:40:37.652Z | |
| bit-elk-2020-7017 | 2024-03-06T10:51:36.803Z | 2025-04-03T14:40:37.652Z | |
| bit-elk-2020-7016 | 2024-03-06T10:51:48.566Z | 2025-04-03T14:40:37.652Z | |
| bit-elasticsearch-2023-49921 | 2024-07-31T07:18:47.750Z | 2025-04-03T14:40:37.652Z | |
| bit-elasticsearch-2023-46673 | 2024-03-06T10:51:39.565Z | 2025-04-03T14:40:37.652Z | |
| bit-elasticsearch-2022-23712 | 2024-03-06T10:52:20.467Z | 2025-04-03T14:40:37.652Z | |
| bit-elasticsearch-2022-23708 | 2024-03-06T10:52:31.870Z | 2025-04-03T14:40:37.652Z | |
| bit-elasticsearch-2021-22147 | 2024-03-06T10:52:52.691Z | 2025-04-03T14:40:37.652Z | |
| bit-elasticsearch-2021-22146 | 2024-03-06T10:53:02.276Z | 2025-04-03T14:40:37.652Z | |
| bit-elasticsearch-2021-22144 | 2024-03-06T10:53:22.503Z | 2025-04-03T14:40:37.652Z | |
| bit-elasticsearch-2021-22137 | 2024-03-06T10:53:35.098Z | 2025-04-03T14:40:37.652Z | |
| bit-elasticsearch-2021-22135 | 2024-03-06T10:53:44.675Z | 2025-04-03T14:40:37.652Z | |
| bit-elasticsearch-2021-22134 | 2024-03-06T10:53:55.889Z | 2025-04-03T14:40:37.652Z | |
| bit-elasticsearch-2021-22132 | 2024-03-06T10:54:05.664Z | 2025-04-03T14:40:37.652Z | |
| bit-elasticsearch-2020-7021 | 2024-03-06T10:54:14.978Z | 2025-04-03T14:40:37.652Z | |
| bit-elasticsearch-2020-7020 | 2024-03-06T10:54:24.872Z | 2025-04-03T14:40:37.652Z | |
| bit-elasticsearch-2020-7019 | 2024-03-06T10:54:38.792Z | 2025-04-03T14:40:37.652Z | |
| bit-elasticsearch-2020-7014 | 2024-03-06T10:54:49.268Z | 2025-04-03T14:40:37.652Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-21451 | Apartment Visitors Management System create-pass.php文件跨站脚本漏洞 | 2025-07-25 | 2025-09-17 |
| cnvd-2025-21450 | Apartment Visitors Management System category.php文件跨站脚本漏洞 | 2025-07-25 | 2025-09-17 |
| cnvd-2025-21449 | Apartment Visitors Management System bwdates-reports.php文件跨站脚本漏洞 | 2025-07-25 | 2025-09-17 |
| cnvd-2025-21448 | Mattermost Confluence Plugin存在未明漏洞(CNVD-2025-21448) | 2025-08-15 | 2025-09-17 |
| cnvd-2025-21447 | Mattermost Confluence Plugin存在未明漏洞(CNVD-2025-21447) | 2025-08-15 | 2025-09-17 |
| cnvd-2025-21446 | ChanCMS SQL注入漏洞 | 2025-09-12 | 2025-09-17 |
| cnvd-2025-21445 | InstantCMS代码问题漏洞 | 2025-09-12 | 2025-09-17 |
| cnvd-2025-21444 | Unmark代码问题漏洞 | 2025-09-16 | 2025-09-17 |
| cnvd-2025-21443 | Unmark searchform.php文件跨站脚本漏洞 | 2025-09-16 | 2025-09-17 |
| cnvd-2025-21442 | Unmark Marks.php文件跨站脚本漏洞 | 2025-09-16 | 2025-09-17 |
| cnvd-2025-21441 | Unmark info.php文件跨站脚本漏洞 | 2025-09-16 | 2025-09-17 |
| cnvd-2025-21440 | SueamCMS存在未明漏洞(CNVD-2025-21440) | 2025-09-16 | 2025-09-17 |
| cnvd-2025-21439 | RuoYi授权问题漏洞 | 2025-09-16 | 2025-09-17 |
| cnvd-2025-21437 | Rockwell Automation Arena本地代码执行漏洞(CNVD-2025-21437) | 2025-04-18 | 2025-09-17 |
| cnvd-2025-21436 | Rockwell Automation Arena本地代码执行漏洞(CNVD-2025-21436) | 2025-04-18 | 2025-09-17 |
| cnvd-2025-21435 | Rockwell Automation Arena本地代码执行漏洞(CNVD-2025-21435) | 2025-04-18 | 2025-09-17 |
| cnvd-2025-21434 | Rockwell Automation Arena本地代码执行漏洞(CNVD-2025-21434) | 2025-04-18 | 2025-09-17 |
| cnvd-2025-21433 | Rockwell Automation Arena本地代码执行漏洞(CNVD-2025-21433) | 2025-04-18 | 2025-09-17 |
| cnvd-2025-21432 | Rockwell Automation Arena本地代码执行漏洞(CNVD-2025-21432) | 2025-04-18 | 2025-09-17 |
| cnvd-2025-21431 | Rockwell Automation Arena存在未明漏洞(CNVD-2025-21431) | 2025-04-18 | 2025-09-17 |
| cnvd-2025-21430 | Rockwell Automation Arena本地代码执行漏洞(CNVD-2025-21430) | 2025-04-18 | 2025-09-17 |
| cnvd-2025-21429 | Rockwell Automation Arena本地代码执行漏洞(CNVD-2025-21429) | 2025-04-18 | 2025-09-17 |
| cnvd-2025-21428 | Rockwell Automation Arena本地代码执行漏洞 | 2025-04-18 | 2025-09-17 |
| cnvd-2025-21427 | Doctor Appointment Management System跨站脚本漏洞(CNVD-2025-21427) | 2024-11-01 | 2025-09-17 |
| cnvd-2025-21426 | Doctor Appointment Management System /doctor/search.php文件SQL注入漏洞 | 2025-03-19 | 2025-09-17 |
| cnvd-2025-21425 | Doctor Appointment Management System check-appointment.php文件SQL注入漏洞 | 2025-03-27 | 2025-09-17 |
| cnvd-2025-21424 | Doctor Appointment Management System跨站脚本漏洞 | 2025-09-05 | 2025-09-17 |
| cnvd-2025-21423 | Adobe Substance3D Viewer越界写入漏洞(CNVD-2025-21423) | 2025-09-11 | 2025-09-17 |
| cnvd-2025-21422 | Adobe Substance3D Viewer越界写入漏洞(CNVD-2025-21422) | 2025-09-11 | 2025-09-17 |
| cnvd-2025-21421 | Adobe Substance3D Viewer堆缓冲区溢出漏洞 | 2025-09-11 | 2025-09-17 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2022-avi-141 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2022-02-11T00:00:00.000000 | 2022-02-11T00:00:00.000000 |
| certfr-2022-avi-140 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2022-02-11T00:00:00.000000 | 2022-02-11T00:00:00.000000 |
| certfr-2022-avi-139 | Multiples vulnérabilités dans Wireshark | 2022-02-11T00:00:00.000000 | 2022-02-11T00:00:00.000000 |
| certfr-2022-avi-138 | Vulnérabilité dans Microsoft Edge | 2022-02-11T00:00:00.000000 | 2022-02-11T00:00:00.000000 |
| certfr-2022-avi-137 | Vulnérabilité dans les produits Apple | 2022-02-11T00:00:00.000000 | 2022-02-11T00:00:00.000000 |
| certfr-2022-avi-136 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2022-02-10T00:00:00.000000 | 2022-02-10T00:00:00.000000 |
| certfr-2022-avi-135 | Multiples vulnérabilités dans Stormshield Network Security | 2022-02-10T00:00:00.000000 | 2022-02-10T00:00:00.000000 |
| certfr-2022-avi-134 | Multiples vulnérabilités dans Tenable Nessus | 2022-02-10T00:00:00.000000 | 2022-02-10T00:00:00.000000 |
| certfr-2022-avi-133 | Multiples vulnérabilités dans Citrix Hypervisor | 2022-02-10T00:00:00.000000 | 2022-02-10T00:00:00.000000 |
| certfr-2022-avi-132 | Multiples vulnérabilités dans les produits Microsoft | 2022-02-09T00:00:00.000000 | 2022-02-09T00:00:00.000000 |
| certfr-2022-avi-131 | Vulnérabilité dans Microsoft .Net | 2022-02-09T00:00:00.000000 | 2022-02-09T00:00:00.000000 |
| certfr-2022-avi-130 | Multiples vulnérabilités dans Microsoft Windows | 2022-02-09T00:00:00.000000 | 2022-02-09T00:00:00.000000 |
| certfr-2022-avi-129 | Multiples vulnérabilités dans Microsoft Office | 2022-02-09T00:00:00.000000 | 2022-02-09T00:00:00.000000 |
| certfr-2022-avi-128 | Vulnérabilité dans les produits F-Secure | 2022-02-09T00:00:00.000000 | 2022-02-09T00:00:00.000000 |
| certfr-2022-avi-127 | Multiples vulnérabilités dans les produits Intel | 2022-02-09T00:00:00.000000 | 2022-02-09T00:00:00.000000 |
| certfr-2022-avi-126 | Multiples vulnérabilités dans Mozilla Firefox | 2022-02-09T00:00:00.000000 | 2022-02-09T00:00:00.000000 |
| certfr-2022-avi-125 | Multiples vulnérabilités dans les produits SAP | 2022-02-09T00:00:00.000000 | 2022-02-09T00:00:00.000000 |
| certfr-2022-avi-124 | Multiples vulnérabilités dans les produits Siemens | 2022-02-09T00:00:00.000000 | 2022-02-09T00:00:00.000000 |
| certfr-2022-avi-123 | Multiples vulnérabilités dans les produits Schneider | 2022-02-09T00:00:00.000000 | 2022-02-09T00:00:00.000000 |
| certfr-2022-avi-118 | [MàJ] Multiples vulnérabilités dans Zimbra | 2022-02-07T00:00:00.000000 | 2022-02-09T00:00:00.000000 |
| certfr-2022-avi-122 | Multiples vulnérabilités dans Google Android | 2022-02-08T00:00:00.000000 | 2022-02-08T00:00:00.000000 |
| certfr-2022-avi-121 | Multiples vulnérabilités dans Google Chrome OS | 2022-02-08T00:00:00.000000 | 2022-02-08T00:00:00.000000 |
| certfr-2022-avi-120 | Vulnérabilité dans Red Hat Gluster Storage Server | 2022-02-08T00:00:00.000000 | 2022-02-08T00:00:00.000000 |
| certfr-2022-avi-119 | Vulnérabilité dans SonicWall SMA1000 | 2022-02-08T00:00:00.000000 | 2022-02-08T00:00:00.000000 |
| certfr-2022-avi-094 | Vulnérabilité dans Symfony | 2022-01-31T00:00:00.000000 | 2022-02-08T00:00:00.000000 |
| certfr-2022-avi-117 | Multiples vulnérabilités dans Postfix | 2022-02-07T00:00:00.000000 | 2022-02-07T00:00:00.000000 |
| certfr-2022-avi-116 | Vulnérabilité dans MongoDB | 2022-02-07T00:00:00.000000 | 2022-02-07T00:00:00.000000 |
| certfr-2022-avi-115 | Vulnérabilité dans IBM WebSphere | 2022-02-07T00:00:00.000000 | 2022-02-07T00:00:00.000000 |
| certfr-2022-avi-114 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2022-02-07T00:00:00.000000 | 2022-02-07T00:00:00.000000 |
| certfr-2022-avi-113 | Multiples vulnérabilités dans les produits NetApp | 2022-02-04T00:00:00.000000 | 2022-02-04T00:00:00.000000 |