Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-27197 |
9.1 (3.1)
|
Sentry: Improper Authentication on SAML SSO process al… |
getsentry |
sentry |
2026-02-21T04:35:14.635Z | 2026-02-24T19:00:07.663Z |
| CVE-2026-27196 |
8.1 (3.1)
|
Statamic affected by privilege escalation via stored C… |
statamic |
cms |
2026-02-21T04:30:05.184Z | 2026-02-24T18:59:19.390Z |
| CVE-2026-27194 |
8.1 (4.0)
|
D-Tale affected by Remote Code Execution through the /… |
man-group |
dtale |
2026-02-21T04:25:38.628Z | 2026-02-24T18:58:24.887Z |
| CVE-2026-27461 |
6.9 (4.0)
|
Pimcore vulnerable to SQL injection via unsanitized fi… |
pimcore |
pimcore |
2026-02-24T02:50:48.287Z | 2026-02-24T18:58:07.625Z |
| CVE-2026-27206 |
8.1 (3.1)
|
Zumba Json Serializer has a potential PHP Object Injec… |
zumba |
json-serializer |
2026-02-21T07:01:00.843Z | 2026-02-24T18:57:10.054Z |
| CVE-2026-27458 |
8.7 (4.0)
|
LinkAce: Stored XSS in Atom Feed via CDATA Escape in L… |
Kovah |
LinkAce |
2026-02-21T06:54:41.308Z | 2026-02-24T18:55:40.498Z |
| CVE-2026-3066 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
HummerRisk Cloud Compliance Scanning PlatformUtils.jav… |
n/a |
HummerRisk |
2026-02-24T03:02:07.364Z | 2026-02-24T18:55:12.566Z |
| CVE-2026-27452 |
9.2 (4.0)
|
ASN.1 TypeScript Library: Decoding an INTEGER could le… |
JonathanWilbur |
asn1-ts |
2026-02-21T06:50:35.877Z | 2026-02-24T18:54:48.702Z |
| CVE-2026-27471 |
9.3 (4.0)
|
ERP: Document access through endpoints due to missing … |
frappe |
erpnext |
2026-02-21T06:38:11.220Z | 2026-02-24T18:53:57.291Z |
| CVE-2026-27212 |
9.4 (4.0)
|
Swiper has a Prototype Pollution Vulnerability |
nolimits4web |
swiper |
2026-02-21T05:43:07.072Z | 2026-02-24T18:53:04.131Z |
| CVE-2025-69308 |
9.3 (3.1)
|
WordPress Nestbyte Core plugin <= 1.2 - SQL Injection … |
TeconceTheme |
Nestbyte Core |
2026-02-20T15:46:48.088Z | 2026-02-24T18:52:10.320Z |
| CVE-2026-27482 |
5.9 (3.1)
|
Ray: Dashboard DELETE endpoints allow unauthenticated … |
ray-project |
ray |
2026-02-21T09:18:26.027Z | 2026-02-24T18:52:03.874Z |
| CVE-2025-69309 |
9.3 (3.1)
|
WordPress Saasplate Core plugin <= 1.2.8 - SQL Injecti… |
TeconceTheme |
Saasplate Core |
2026-02-20T15:46:48.321Z | 2026-02-24T18:51:23.216Z |
| CVE-2026-27464 |
7.7 (3.1)
|
Metabase: Server-Side Template Injection via Notificat… |
metabase |
metabase |
2026-02-21T07:57:50.957Z | 2026-02-24T18:51:05.408Z |
| CVE-2025-69310 |
9.3 (3.1)
|
WordPress Woodly Core plugin <= 1.4 - SQL Injection vu… |
TeconceTheme |
Woodly Core |
2026-02-20T15:46:48.517Z | 2026-02-24T18:50:38.167Z |
| CVE-2026-27469 |
6.1 (3.1)
|
Isso: Stored XSS via comment website field |
isso-comments |
isso |
2026-02-21T07:24:38.971Z | 2026-02-24T18:50:07.650Z |
| CVE-2026-27467 |
2 (3.1)
|
BigBlueButton: Audio from participants to the server i… |
bigbluebutton |
bigbluebutton |
2026-02-21T07:18:26.156Z | 2026-02-24T18:49:12.218Z |
| CVE-2025-69325 |
5.3 (3.1)
|
WordPress Primer MyData for Woocommerce plugin <= 4.2.… |
primersoftware |
Primer MyData for Woocommerce |
2026-02-20T15:46:49.332Z | 2026-02-24T18:49:05.122Z |
| CVE-2026-27466 |
7.2 (3.1)
|
BigBlueButton: Exposed ClamAV port enables Denial of Service |
bigbluebutton |
bigbluebutton |
2026-02-21T07:14:49.851Z | 2026-02-24T18:48:15.788Z |
| CVE-2026-3067 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
HummerRisk Archive Extraction CommandUtils.java extrac… |
n/a |
HummerRisk |
2026-02-24T03:32:07.867Z | 2026-02-24T18:47:21.803Z |
| CVE-2026-27026 |
6.9 (4.0)
|
pypdf possibly has long runtimes for malformed FlateDe… |
py-pdf |
pypdf |
2026-02-20T21:12:33.537Z | 2026-02-24T18:47:02.304Z |
| CVE-2025-69328 |
8.8 (3.1)
|
WordPress Booking and Rental Manager plugin <= 2.5.9 -… |
magepeopleteam |
Booking and Rental Manager |
2026-02-20T15:46:49.714Z | 2026-02-24T18:46:52.734Z |
| CVE-2026-27111 |
5.3 (4.0)
|
Kargo has Missing Authorization Vulnerabilities in App… |
akuity |
kargo |
2026-02-20T21:17:07.383Z | 2026-02-24T18:46:03.564Z |
| CVE-2025-69329 |
9.8 (3.1)
|
WordPress Prestige theme < 1.4.1 - PHP Object Injectio… |
Jthemes |
Prestige |
2026-02-20T15:46:49.874Z | 2026-02-24T18:45:58.923Z |
| CVE-2026-27112 |
9.4 (4.0)
|
Kargo has an Authorization Bypass Vulnerability in Bat… |
akuity |
kargo |
2026-02-20T21:22:56.719Z | 2026-02-24T18:43:40.423Z |
| CVE-2026-27118 |
5.3 (4.0)
|
Cache poisoning in @sveltejs/adapter-vercel |
sveltejs |
kit |
2026-02-20T21:24:55.577Z | 2026-02-24T18:42:11.028Z |
| CVE-2026-27120 |
6.1 (3.1)
|
Leaf-kit html escaping does not work on characters tha… |
vapor |
leaf-kit |
2026-02-20T21:27:09.642Z | 2026-02-24T18:41:10.070Z |
| CVE-2026-27025 |
6.9 (4.0)
|
pypdf has possible long runtimes/large memory usage fo… |
py-pdf |
pypdf |
2026-02-20T21:11:20.441Z | 2026-02-24T18:40:02.655Z |
| CVE-2026-22354 |
8.8 (3.1)
|
WordPress Woocommerce Category Banner Management plugi… |
Dotstore |
Woocommerce Category Banner Management |
2026-02-20T15:47:01.099Z | 2026-02-24T18:38:59.216Z |
| CVE-2026-22365 |
9.8 (3.1)
|
WordPress Soleng theme <= 1.0.5 - Local File Inclusion… |
axiomthemes |
Soleng |
2026-02-20T15:47:02.847Z | 2026-02-24T18:37:24.978Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-20757 |
6.5 (3.1)
|
In Modem, there is a possible system crash due to… |
MediaTek, Inc. |
MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797 |
2025-12-02T02:34:14.810Z | 2026-02-17T14:27:58.880Z |
| CVE-2025-20756 |
6.5 (3.1)
|
In Modem, there is a possible system crash due to… |
MediaTek, Inc. |
MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893 |
2025-12-02T02:34:16.530Z | 2026-02-17T14:27:33.293Z |
| CVE-2025-20752 |
6.5 (3.1)
|
In Modem, there is a possible system crash due to… |
MediaTek, Inc. |
MT2735, MT2737, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8676, MT8791T |
2025-12-02T02:34:18.215Z | 2026-02-17T14:27:10.658Z |
| CVE-2025-20751 |
6.5 (3.1)
|
In Modem, there is a possible system crash due to… |
MediaTek, Inc. |
MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797 |
2025-12-02T02:34:21.596Z | 2026-02-17T14:26:14.251Z |
| CVE-2025-20750 |
6.5 (3.1)
|
In Modem, there is a possible system crash due to… |
MediaTek, Inc. |
MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797 |
2025-12-02T02:34:23.299Z | 2026-02-17T14:46:58.578Z |
| CVE-2025-20708 |
8.8 (3.1)
|
In Modem, there is a possible out of bounds write… |
MediaTek, Inc. |
MT2735, MT2737, MT6813, MT6815, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8675, MT8676, MT8678, MT8771, MT8791, MT8791T, MT8792, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893 |
2025-09-01T05:12:16.345Z | 2026-02-26T17:49:57.019Z |
| CVE-2025-20704 |
8 (3.1)
|
In Modem, there is a possible out of bounds write… |
MediaTek, Inc. |
MT6813, MT6835, MT6835T, MT6878, MT6878M, MT6897, MT6899, MT6991, MT8676, MT8678, MT8792, MT8863, MT8873, MT8883 |
2025-09-01T05:12:19.494Z | 2026-02-26T17:49:56.712Z |
| CVE-2025-20703 |
6.5 (3.1)
|
In Modem, there is a possible out of bounds read … |
MediaTek, Inc. |
MT2735, MT2737, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8675, MT8676, MT8678, MT8771, MT8791, MT8791T, MT8792, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893 |
2025-09-01T05:12:17.909Z | 2026-02-17T14:30:14.121Z |
| CVE-2025-20678 |
6.5 (3.1)
|
In ims service, there is a possible system crash … |
MediaTek, Inc. |
MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893 |
2025-06-02T02:29:47.843Z | 2026-02-17T14:31:25.129Z |
| CVE-2025-20670 |
5.7 (3.1)
|
In Modem, there is a possible permission bypass d… |
MediaTek, Inc. |
MT2737, MT6813, MT6835, MT6835T, MT6878, MT6878M, MT6879, MT6886, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798 |
2025-05-05T02:49:16.856Z | 2026-02-17T14:32:21.909Z |
| CVE-2025-20667 |
6.5 (3.1)
|
In Modem, there is a possible information disclos… |
MediaTek, Inc. |
MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8675, MT8676, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791, MT8791T, MT8797 |
2025-05-05T02:49:11.742Z | 2026-02-17T14:33:07.315Z |
| CVE-2025-20666 |
6.5 (3.1)
|
In Modem, there is a possible system crash due to… |
MediaTek, Inc. |
MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8666, MT8667, MT8673, MT8675, MT8771, MT8791, MT8791T, MT8795T, MT8797, MT8798 |
2025-05-05T02:49:10.026Z | 2026-02-17T14:33:35.841Z |
| CVE-2025-20659 |
6.5 (3.1)
|
In Modem, there is a possible system crash due to… |
MediaTek, Inc. |
MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8791T, MT8796, MT8797, MT8798, MT8863 |
2025-04-07T03:14:54.034Z | 2026-02-17T14:35:12.390Z |
| CVE-2025-20647 |
6.5 (3.1)
|
In Modem, there is a possible system crash due to… |
MediaTek, Inc. |
MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8666, MT8667, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798 |
2025-03-03T02:25:32.706Z | 2026-02-17T14:35:48.185Z |
| CVE-2025-20644 |
6.5 (3.1)
|
In Modem, there is a possible memory corruption d… |
MediaTek, Inc. |
MT2735, MT2737, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8673, MT8791T, MT8795T, MT8798 |
2025-03-03T02:25:27.877Z | 2026-02-17T14:39:46.712Z |
| CVE-2025-20634 |
8.8 (3.1)
|
In Modem, there is a possible out of bounds write… |
MediaTek, Inc. |
MT2737, MT6813, MT6835, MT6835T, MT6878, MT6878M, MT6879, MT6886, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8676, MT8678, MT8795T, MT8798, MT8863 |
2025-02-03T03:23:49.665Z | 2026-02-17T14:40:28.526Z |
| CVE-2024-20154 |
8.8 (3.1)
|
In Modem, there is a possible out of bounds write… |
MediaTek, Inc. |
MT2735, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6880T, MT6880U, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8666, MT8673, MT8675, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791T, MT8795T, MT8797, MT8798 |
2025-01-06T03:17:41.540Z | 2026-02-17T14:41:07.536Z |
| CVE-2026-24323 |
6.1 (3.1)
|
Multiple vulnerabilities in BSP Applications of SAP Do… |
SAP_SE |
SAP Document Management System |
2026-02-10T03:04:11.848Z | 2026-02-10T16:22:54.274Z |
| CVE-2026-25478 |
7.4 (3.1)
|
Litestar has a CORS origin allowlist bypass due to une… |
litestar-org |
litestar |
2026-02-09T18:46:56.445Z | 2026-02-10T16:01:16.807Z |
| CVE-2026-24324 |
6.5 (3.1)
|
Denial of service (DOS) vulnerability in SAP BusinessO… |
SAP_SE |
SAP BusinessObjects Business Intelligence Platform (AdminTools) |
2026-02-10T03:04:21.162Z | 2026-02-10T16:17:50.858Z |
| CVE-2026-24325 |
4.8 (3.1)
|
Cross Site Scripting (XSS) vulnerability in SAP Busine… |
SAP_SE |
SAP BusinessObjects Enterprise (Central Management Console) |
2026-02-10T03:04:30.133Z | 2026-02-10T16:16:25.107Z |
| CVE-2025-64781 |
4.7 (3.0)
5.1 (4.0)
|
In GroupSession Free edition prior to ver5.7.1, G… |
Japan Total System Co.,Ltd. |
GroupSession Free edition |
2025-12-12T05:02:58.824Z | 2025-12-12T20:26:03.855Z |
| CVE-2026-25479 |
6.5 (3.1)
|
Litestar has an AllowedHosts validation bypass due to … |
litestar-org |
litestar |
2026-02-09T18:48:19.971Z | 2026-02-10T16:01:11.941Z |
| CVE-2026-24326 |
4.3 (3.1)
|
Missing authorization check in SAP S/4HANA Defense & S… |
SAP_SE |
SAP S/4HANA Defense & Security (Disconnected Operations) |
2026-02-10T03:04:39.908Z | 2026-02-10T16:15:32.371Z |
| CVE-2026-25480 |
6.5 (3.1)
|
FileStore key canonicalization collisions allow respon… |
litestar-org |
litestar |
2026-02-09T18:49:34.305Z | 2026-02-10T16:01:06.327Z |
| CVE-2026-24327 |
4.3 (3.1)
|
Missing Authorization Check in SAP Strategic Enterpris… |
SAP_SE |
SAP Strategic Enterprise Management (Balanced Scorecard in BSP Application) |
2026-02-10T03:04:46.790Z | 2026-02-10T16:12:07.367Z |
| CVE-2025-11547 |
7.8 (3.1)
|
AXIS Camera Station Pro contained a flaw to perfo… |
Axis Communications AB |
AXIS Camera Station Pro |
2026-02-10T05:35:50.903Z | 2026-02-26T15:04:12.686Z |
| CVE-2026-24328 |
6.1 (3.1)
|
Open Redirection vulnerability in Business Server Page… |
SAP_SE |
Business Server Pages Application (TAF_APPLAUNCHER) |
2026-02-10T03:04:54.749Z | 2026-02-10T15:41:55.313Z |
| CVE-2025-12757 |
4.6 (3.1)
|
An AXIS Camera Station Pro feature can be exploit… |
Axis Communications AB |
AXIS Camera Station Pro |
2026-02-10T05:47:20.339Z | 2026-02-10T20:16:37.549Z |
| CVE-2025-13064 |
4.5 (3.1)
|
A server-side injection was possible for a malici… |
Axis Communications AB |
AXIS Camera Station Pro |
2026-02-10T05:40:34.374Z | 2026-02-10T20:16:16.016Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-64781 | In GroupSession Free edition prior to ver5.7.1, GroupSession byCloud prior to ver5.7.1, and GroupSe… | 2025-12-12T05:16:11.623 | 2026-02-17T15:14:09.757 |
| fkie_cve-2026-25479 | Litestar is an Asynchronous Server Gateway Interface (ASGI) framework. Prior to 2.20.0, in litestar… | 2026-02-09T20:15:57.177 | 2026-02-17T15:14:04.910 |
| fkie_cve-2026-24326 | Due to a missing authorization check in the Disconnected Operations of the SAP S/4HANA Defense & Se… | 2026-02-10T04:16:04.950 | 2026-02-17T15:13:03.900 |
| fkie_cve-2026-25480 | Litestar is an Asynchronous Server Gateway Interface (ASGI) framework. Prior to 2.20.0, FileStore m… | 2026-02-09T20:15:57.330 | 2026-02-17T15:12:34.963 |
| fkie_cve-2026-24327 | Due to missing authorization check in SAP Strategic Enterprise Management (Balanced Scorecard in Bu… | 2026-02-10T04:16:05.113 | 2026-02-17T15:12:00.680 |
| fkie_cve-2025-11547 | AXIS Camera Station Pro contained a flaw to perform a privilege escalation attack on the server as … | 2026-02-10T06:15:53.903 | 2026-02-17T15:10:57.130 |
| fkie_cve-2026-24328 | SAP TAF_APPLAUNCHER within Business Server Pages allows unauthenticated attacker to craft malicious… | 2026-02-10T04:16:05.273 | 2026-02-17T15:10:34.963 |
| fkie_cve-2025-12757 | An AXIS Camera Station Pro feature can be exploited in a way that allows a non-admin user to view i… | 2026-02-10T06:15:54.037 | 2026-02-17T15:10:09.890 |
| fkie_cve-2025-13064 | A server-side injection was possible for a malicious admin to manipulate the application to include… | 2026-02-10T06:15:54.170 | 2026-02-17T15:10:00.157 |
| fkie_cve-2025-65120 | Reflected cross-site scripting vulnerability exists in GroupSession Free edition prior to ver5.7.1,… | 2025-12-12T05:16:12.000 | 2026-02-17T15:09:46.407 |
| fkie_cve-2025-12063 | An insecure direct object reference allowed a non-admin user to modify or remove certain data objec… | 2026-02-10T07:16:12.553 | 2026-02-17T15:09:06.027 |
| fkie_cve-2026-2259 | A vulnerability has been found in aardappel lobster up to 2025.4. Affected by this issue is the fun… | 2026-02-10T04:16:05.433 | 2026-02-17T15:08:39.840 |
| fkie_cve-2025-66284 | Stored cross-site scripting vulnerabilities exist in GroupSession Free edition prior to ver5.7.1, G… | 2025-12-12T05:16:12.230 | 2026-02-17T15:07:21.693 |
| fkie_cve-2026-25956 | Frappe is a full-stack web application framework. Prior to 14.99.14 and 15.94.0, an attacker could … | 2026-02-10T18:16:38.653 | 2026-02-17T15:05:39.610 |
| fkie_cve-2025-70083 | An issue was discovered in OpenSatKit 2.2.1. The DirName field in the telecommand is provided by th… | 2026-02-11T18:16:06.337 | 2026-02-17T15:03:48.430 |
| fkie_cve-2025-70084 | Directory traversal vulnerability in OpenSatKit 2.2.1 allows attackers to gain access to sensitive … | 2026-02-11T18:16:06.483 | 2026-02-17T15:03:33.090 |
| fkie_cve-2025-70085 | An issue was discovered in OpenSatKit 2.2.1. The EventErrStr buffer has a fixed size of 256 bytes. … | 2026-02-11T18:16:06.600 | 2026-02-17T15:02:22.943 |
| fkie_cve-2024-50618 | A Use of Single-factor Authentication vulnerability in the Authentication component of CIPPlanner C… | 2026-02-11T20:16:07.017 | 2026-02-17T15:01:29.567 |
| fkie_cve-2025-70091 | A cross-site scripting (XSS) vulnerability in the Customers function of OpenSourcePOS v3.4.1 allows… | 2026-02-13T16:16:10.760 | 2026-02-17T15:00:22.087 |
| fkie_cve-2025-70093 | An issue in OpenSourcePOS v3.4.1 allows attackers to execute arbitrary code via returning a crafted… | 2026-02-13T16:16:10.867 | 2026-02-17T14:59:41.803 |
| fkie_cve-2025-70094 | A cross-site scripting (XSS) vulnerability in the Generate Item Barcode function of OpenSourcePOS v… | 2026-02-13T16:16:10.977 | 2026-02-17T14:59:24.453 |
| fkie_cve-2025-70095 | A cross-site scripting (XSS) vulnerability in the item management and sales invoice function of Ope… | 2026-02-13T16:16:11.080 | 2026-02-17T14:59:05.980 |
| fkie_cve-2025-67737 | AzuraCast is a self-hosted, all-in-one web radio management suite. Versions 0.23.1 mistakenly inclu… | 2025-12-12T07:15:45.417 | 2026-02-17T14:52:29.713 |
| fkie_cve-2026-24854 | ChurchCRM is an open-source church management system. A SQL Injection vulnerability exists in endpo… | 2026-01-30T16:16:13.620 | 2026-02-17T14:33:24.433 |
| fkie_cve-2026-24855 | ChurchCRM is an open-source church management system. Versions prior to 6.7.2 have a Stored Cross-S… | 2026-01-30T16:16:13.790 | 2026-02-17T14:32:44.697 |
| fkie_cve-2026-1731 | BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contai… | 2026-02-06T22:16:11.020 | 2026-02-17T13:40:10.320 |
| fkie_cve-2026-20620 | An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in ma… | 2026-02-11T23:16:05.577 | 2026-02-17T13:32:00.920 |
| fkie_cve-2026-20636 | The issue was addressed with improved memory handling. This issue is fixed in iOS 26.3 and iPadOS 2… | 2026-02-11T23:16:06.820 | 2026-02-17T13:31:29.687 |
| fkie_cve-2026-20640 | An inconsistent user interface issue was addressed with improved state management. This issue is fi… | 2026-02-11T23:16:07.023 | 2026-02-17T13:30:27.347 |
| fkie_cve-2026-20641 | A privacy issue was addressed with improved checks. This issue is fixed in watchOS 26.3, tvOS 26.3,… | 2026-02-11T23:16:07.123 | 2026-02-17T13:29:12.407 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-7gcm-g887-7qv7 |
8.2 (4.0)
|
protobuf affected by a JSON recursion depth bypass | 2026-01-23T15:31:35Z | 2026-02-05T15:47:43Z |
| ghsa-7p63-w6x9-6gr7 |
9.4 (4.0)
|
Eclipse Jersey has a Race Condition | 2025-11-18T18:32:51Z | 2026-02-05T15:43:36Z |
| ghsa-mw8w-q3f7-2v85 |
6.1 (3.1)
2.1 (4.0)
|
Podinfo affected by Arbitrary File Upload that leads to Stored Cross-Site Scripting (XSS) | 2026-02-03T18:30:47Z | 2026-02-05T15:41:47Z |
| ghsa-xqqc-9hrc-5xh7 |
8.6 (3.1)
|
IBM Aspera Console 3.4.0 through 3.4.8 is vulnerable to SQL injection. A remote attacker could send… | 2026-02-05T15:31:14Z | 2026-02-05T15:31:14Z |
| ghsa-vfmp-7mg9-25v9 |
6.3 (3.1)
|
Infinera DNA is vulnerable to a time-based SQL injection vulnerability due to insufficient input va… | 2026-02-05T09:31:12Z | 2026-02-05T15:31:14Z |
| ghsa-qmmq-r82h-32qv |
4.3 (3.1)
|
The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to unauthoriz… | 2026-02-05T15:31:14Z | 2026-02-05T15:31:14Z |
| ghsa-p3p7-9h4w-jqw2 |
3.8 (3.1)
|
It was possible to improperly access the parent directory of an os.Root by opening a filename endin… | 2026-02-05T00:31:01Z | 2026-02-05T15:31:14Z |
| ghsa-jc8f-h9g4-2cf5 |
7.5 (3.1)
|
Water-Melon Melon commit 9df9292 and below is vulnerable to Denial of Service. The HTTP component d… | 2026-02-04T21:30:32Z | 2026-02-05T15:31:14Z |
| ghsa-j42q-g27m-825x |
8.7 (4.0)
|
Path Traversal vulnerability in Digitek ADT1100 and Digitek DT950 from PRIMION DIGITEK, S.L.U (Azko… | 2026-02-05T15:31:14Z | 2026-02-05T15:31:14Z |
| ghsa-f4xv-648j-g6xj |
5.1 (3.1)
|
IBM App Connect Enterprise Certified Container up to 12.19.0 (Continuous Delivery) and 12.0 LTS (Lo… | 2026-02-05T15:31:14Z | 2026-02-05T15:31:14Z |
| ghsa-ch6m-4rg5-6h78 |
6.5 (3.1)
|
IBM webMethods Integration (on prem) - Integration Server 10.15 through IS_10.15_Core_Fix2411.1 to … | 2026-02-05T15:31:14Z | 2026-02-05T15:31:14Z |
| ghsa-8jvr-vh7g-f8gx |
8.6 (3.1)
|
A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the res… | 2026-02-05T06:31:23Z | 2026-02-05T15:31:14Z |
| ghsa-xhfr-4q2x-5mx4 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_fq: fix integer… | 2025-10-07T18:31:09Z | 2026-02-05T15:31:09Z |
| ghsa-wv35-4hfx-h763 |
9.8 (3.1)
|
A buffer overflow vulnerability exists in TOTOLINK A950RG V4.1.2cu.5204_B20210112. The issue reside… | 2026-02-03T18:30:47Z | 2026-02-05T15:31:09Z |
| ghsa-mx3r-64m3-f78g |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: drm/i915/gvt: fix vgpu debugfs… | 2025-10-07T18:31:09Z | 2026-02-05T15:31:09Z |
| ghsa-m43v-grhw-r4h4 |
7.5 (3.1)
|
The ORICO NAS CD3510 (version V1.9.12 and below) contains an Incorrect Symlink Follow vulnerability… | 2026-02-03T18:30:47Z | 2026-02-05T15:31:09Z |
| ghsa-m2rq-533f-3phc |
6.1 (3.1)
|
NetBox is an open-source infrastructure resource modeling and IP address management platform. A ref… | 2026-02-03T18:30:47Z | 2026-02-05T15:31:09Z |
| ghsa-hg9w-23hg-6pfv |
9.8 (3.1)
|
The ZSPACE Q2C NAS contains a vulnerability related to incorrect symbolic link following. Attackers… | 2026-02-03T18:30:47Z | 2026-02-05T15:31:09Z |
| ghsa-h734-xmpp-h957 |
5.4 (3.1)
|
Missing Authorization vulnerability in Element Invader ElementInvader Addons for Elementor elementi… | 2026-02-03T15:30:27Z | 2026-02-05T15:31:09Z |
| ghsa-frpp-8pwq-hjrx |
4.3 (3.1)
|
Hibernate Reactive Vulnerable to DoS via Connection Pool Exhaustion | 2026-01-26T21:30:36Z | 2026-02-05T15:31:09Z |
| ghsa-2cqf-mg5g-39xv |
9.8 (3.1)
|
An Incorrect Symlink Follow vulnerability exists in multiple Yottamaster NAS devices, including DM2… | 2026-02-03T18:30:47Z | 2026-02-05T15:31:09Z |
| ghsa-27qh-whg4-7h58 |
9.8 (3.1)
|
A buffer overflow vulnerability exists in the setParentalRules interface of TOTOLINK A950RG V4.1.2c… | 2026-02-03T18:30:47Z | 2026-02-05T15:31:09Z |
| ghsa-rf5c-crcv-v9wg |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: tipc: fix an information leak … | 2025-10-07T18:31:08Z | 2026-02-05T15:31:08Z |
| ghsa-qhmw-vr57-jm8g |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: memcontrol: ensure memcg acqui… | 2025-10-07T18:31:09Z | 2026-02-05T15:31:08Z |
| ghsa-q5wr-hr4c-4mfv |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: mlme: fix null… | 2025-10-07T18:31:08Z | 2026-02-05T15:31:08Z |
| ghsa-mh3q-xm25-mf6x |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: scsi: mpt3sas: Fix possible re… | 2025-10-07T18:31:08Z | 2026-02-05T15:31:08Z |
| ghsa-gjrx-w6pw-88ph |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: md: fix soft lockup in status_… | 2025-10-07T18:31:09Z | 2026-02-05T15:31:08Z |
| ghsa-g6cv-6crr-3rp7 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: blk-mq: fix null pointer deref… | 2025-10-07T18:31:08Z | 2026-02-05T15:31:08Z |
| ghsa-fj8x-7xh8-225g |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: Avoid nf… | 2025-10-07T18:31:09Z | 2026-02-05T15:31:08Z |
| ghsa-9pvh-f984-w7rj |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: soc: aspeed: socinfo: Add kfre… | 2025-10-07T18:31:09Z | 2026-02-05T15:31:08Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-30053 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.234037Z |
| gsd-2024-30908 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.233839Z |
| gsd-2024-30073 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.233634Z |
| gsd-2024-30349 | Foxit PDF Reader U3D File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability… | 2024-04-03T05:02:29.233110Z |
| gsd-2024-30911 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.232843Z |
| gsd-2024-30470 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.232646Z |
| gsd-2024-30087 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.232443Z |
| gsd-2024-30449 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:29.231841Z |
| gsd-2024-30553 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:29.231076Z |
| gsd-2024-30765 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.230690Z |
| gsd-2024-30249 | Cloudburst Network provides network components used within Cloudburst projects. A vulnera… | 2024-04-03T05:02:29.230487Z |
| gsd-2024-30494 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vuln… | 2024-04-03T05:02:29.229894Z |
| gsd-2024-30003 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.229602Z |
| gsd-2024-30743 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.229387Z |
| gsd-2024-30661 | An unauthorized access vulnerability has been discovered in ROS Melodic Morenia versions … | 2024-04-03T05:02:29.229163Z |
| gsd-2024-30201 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:29.228561Z |
| gsd-2024-30006 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.228098Z |
| gsd-2024-30715 | A buffer overflow vulnerability has been discovered in the C++ components of ROS2 Dashing… | 2024-04-03T05:02:29.227886Z |
| gsd-2024-30556 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:29.227294Z |
| gsd-2024-30626 | Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the schedEndTime paramet… | 2024-04-03T05:02:29.226322Z |
| gsd-2024-30387 | A Missing Synchronization vulnerability in the Packet Forwarding Engine (PFE) of Juniper … | 2024-04-03T05:02:29.225876Z |
| gsd-2024-30115 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.225602Z |
| gsd-2024-30511 | Insertion of Sensitive Information into Log File vulnerability in Frédéric GILLES FG Pres… | 2024-04-03T05:02:29.224847Z |
| gsd-2024-30108 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.224522Z |
| gsd-2024-30669 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.224333Z |
| gsd-2024-30803 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.224146Z |
| gsd-2024-30155 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.223950Z |
| gsd-2024-30703 | An arbitrary file upload vulnerability has been discovered in ROS2 (Robot Operating Syste… | 2024-04-03T05:02:29.223758Z |
| gsd-2024-30019 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.223509Z |
| gsd-2024-30690 | An unauthorized node injection vulnerability has been identified in ROS2 Galactic Geochel… | 2024-04-03T05:02:29.223321Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-191094 | Malicious code in flapstacks (npm) | 2025-11-24T22:32:45Z | 2025-12-01T04:28:28Z |
| mal-2025-191093 | Malicious code in fittxt (npm) | 2025-11-24T22:30:55Z | 2025-12-01T04:28:28Z |
| mal-2025-191092 | Malicious code in firestore-search-engine (npm) | 2025-11-24T22:30:20Z | 2025-12-01T04:28:28Z |
| mal-2025-191091 | Malicious code in feature-flip (npm) | 2025-11-24T22:28:44Z | 2025-12-01T04:28:28Z |
| mal-2025-191090 | Malicious code in fat-fingered (npm) | 2025-11-24T22:27:54Z | 2025-12-01T04:28:28Z |
| mal-2025-191089 | Malicious code in express-starter-template (npm) | 2025-11-24T22:55:35Z | 2025-12-01T04:28:28Z |
| mal-2025-191088 | Malicious code in expo-router-on-rails (npm) | 2025-11-24T22:55:10Z | 2025-12-01T04:28:28Z |
| mal-2025-191087 | Malicious code in esbuild-plugin-brotli (npm) | 2025-11-24T22:54:50Z | 2025-12-01T04:28:28Z |
| mal-2025-191086 | Malicious code in electron-volt (npm) | 2025-11-24T22:54:20Z | 2025-12-01T04:28:28Z |
| mal-2025-191085 | Malicious code in easypanel-sdk (npm) | 2025-11-24T22:53:42Z | 2025-12-01T04:28:28Z |
| mal-2025-191084 | Malicious code in csv-tool-cli (npm) | 2025-11-24T22:51:25Z | 2025-12-01T04:28:28Z |
| mal-2025-191083 | Malicious code in create-kinvey-flex-service (npm) | 2025-11-24T22:51:51Z | 2025-12-01T04:28:28Z |
| mal-2025-191082 | Malicious code in create-director-app (npm) | 2025-11-24T22:52:29Z | 2025-12-01T04:28:28Z |
| mal-2025-191081 | Malicious code in chrome-extension-downloads (npm) | 2025-11-24T22:46:55Z | 2025-12-01T04:28:28Z |
| mal-2025-191478 | Malicious code in bitcoin-lib-js (npm) | 2025-11-27T06:50:33Z | 2025-12-01T04:28:27Z |
| mal-2025-191477 | Malicious code in bitcoin-main-lib (npm) | 2025-11-26T10:15:45Z | 2025-12-01T04:28:27Z |
| mal-2025-191473 | Malicious code in chai-jsons (npm) | 2025-11-26T04:52:19Z | 2025-12-01T04:28:27Z |
| mal-2025-191471 | Malicious code in ahmed_salem_t (npm) | 2025-11-26T04:37:35Z | 2025-12-01T04:28:27Z |
| mal-2025-191469 | Malicious code in bip40 (npm) | 2025-11-25T17:50:44Z | 2025-12-01T04:28:27Z |
| mal-2025-191461 | Malicious code in baidu-src-test3 (npm) | 2025-11-25T07:20:40Z | 2025-12-01T04:28:27Z |
| mal-2025-191460 | Malicious code in baidu-src-test (npm) | 2025-11-25T07:12:12Z | 2025-12-01T04:28:27Z |
| mal-2025-191459 | Malicious code in @vleo-dev/a11y-js-service (npm) | 2025-11-25T06:25:16Z | 2025-12-01T04:28:27Z |
| mal-2025-191390 | Malicious code in ceviz (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:27Z |
| mal-2025-191389 | Malicious code in axios-cancelable (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:27Z |
| mal-2025-191388 | Malicious code in @vucod/email (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:27Z |
| mal-2025-191387 | Malicious code in @voiceflow/widget (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:27Z |
| mal-2025-191386 | Malicious code in @voiceflow/voiceflow-types (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:27Z |
| mal-2025-191385 | Malicious code in @voiceflow/voice-types (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:27Z |
| mal-2025-191384 | Malicious code in @voiceflow/vitest-config (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:27Z |
| mal-2025-191383 | Malicious code in @voiceflow/vite-config (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:27Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2023-0281 | Linux Kernel: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-02-05T23:00:00.000+00:00 | 2025-01-13T23:00:00.000+00:00 |
| wid-sec-w-2022-0357 | Linux Kernel: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-02-06T23:00:00.000+00:00 | 2025-01-13T23:00:00.000+00:00 |
| wid-sec-w-2025-0046 | expat: Schwachstelle ermöglicht Denial of Service | 2015-07-26T22:00:00.000+00:00 | 2025-01-12T23:00:00.000+00:00 |
| wid-sec-w-2025-0045 | expat: Schwachstelle ermöglicht Codeausführung | 2016-05-17T22:00:00.000+00:00 | 2025-01-12T23:00:00.000+00:00 |
| wid-sec-w-2024-2038 | Mozilla Firefox, Firefox ESR und Thunderbird: Mehrere Schwachstellen | 2024-09-03T22:00:00.000+00:00 | 2025-01-12T23:00:00.000+00:00 |
| wid-sec-w-2024-1712 | Canonical Snap: Mehrere Schwachstellen | 2024-07-25T22:00:00.000+00:00 | 2025-01-12T23:00:00.000+00:00 |
| wid-sec-w-2024-1444 | Ghostscript: Mehrere Schwachstellen | 2024-06-24T22:00:00.000+00:00 | 2025-01-12T23:00:00.000+00:00 |
| wid-sec-w-2024-0980 | Ghostscript: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-04-28T22:00:00.000+00:00 | 2025-01-12T23:00:00.000+00:00 |
| wid-sec-w-2024-0847 | Node.js: Schwachstelle ermöglicht Codeausführung | 2024-04-10T22:00:00.000+00:00 | 2025-01-12T23:00:00.000+00:00 |
| wid-sec-w-2024-0131 | GnuTLS: Mehrere Schwachstellen | 2024-01-16T23:00:00.000+00:00 | 2025-01-12T23:00:00.000+00:00 |
| wid-sec-w-2025-0041 | IBM App Connect Enterprise: Schwachstelle ermöglicht Denial of Service | 2025-01-09T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2025-0039 | Nagios Enterprises Nagios XI: Schwachstelle ermöglicht Cross-Site Scripting | 2025-01-09T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-3763 | Paessler PRTG: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-12-30T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-3522 | Red Hat OpenStack Platform: Mehrere Schwachstellen | 2024-11-20T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-3494 | Mattermost: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-11-18T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-3410 | Xen: Mehrere Schwachstellen | 2024-11-11T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-3329 | Mattermost: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2024-11-04T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-3315 | Drupal: Mehrere Schwachstellen | 2024-10-30T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-3268 | Drupal: Mehrere Schwachstellen | 2024-10-23T22:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-3127 | Drupal: Mehrere Schwachstellen | 2024-10-09T22:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-3070 | Drupal: Mehrere Schwachstellen | 2024-10-03T22:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-2178 | Drupal: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-09-18T22:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-2126 | Drupal: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen und Denial of Service | 2024-09-11T22:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-2055 | Drupal: Mehrere Schwachstellen | 2024-09-04T22:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-1943 | Drupal "Advanced Varnish" Extension: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-08-28T22:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-1940 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2024-08-27T22:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-1900 | Drupal Module: Mehrere Schwachstellen | 2024-08-21T22:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-1816 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2024-08-12T22:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-1791 | Drupal: Mehrere Schwachstellen ermöglichen Codeausführung und Cross Site Scripting | 2024-08-07T22:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-1740 | Drupal: Schwachstelle ermöglicht Cross-Site Scripting | 2024-07-31T22:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2013:1006 | Red Hat Security Advisory: Red Hat JBoss BRMS 5.3.1 update | 2013-07-01T15:10:00+00:00 | 2026-01-28T22:54:27+00:00 |
| rhsa-2013:0953 | Red Hat Security Advisory: Red Hat JBoss Portal 5.2.2 security update | 2013-06-18T14:41:00+00:00 | 2026-01-28T22:54:26+00:00 |
| rhsa-2013:0943 | Red Hat Security Advisory: Red Hat JBoss SOA Platform 5.3.1 update | 2013-06-12T16:36:00+00:00 | 2026-01-28T22:54:26+00:00 |
| rhsa-2013:0876 | Red Hat Security Advisory: JBoss Enterprise Web Platform 5.2.0 security update | 2013-05-28T17:36:00+00:00 | 2026-01-28T22:54:26+00:00 |
| rhsa-2013:0872 | Red Hat Security Advisory: tomcat5 and tomcat6 security update | 2013-05-28T17:31:00+00:00 | 2026-01-28T22:54:26+00:00 |
| rhsa-2013:0875 | Red Hat Security Advisory: JBoss Enterprise Application Platform 5.2.0 security update | 2013-05-28T17:36:00+00:00 | 2026-01-28T22:54:25+00:00 |
| rhsa-2013:0874 | Red Hat Security Advisory: JBoss Enterprise Web Platform 5.2.0 security update | 2013-05-28T17:35:00+00:00 | 2026-01-28T22:54:25+00:00 |
| rhsa-2013:0873 | Red Hat Security Advisory: JBoss Enterprise Application Platform 5.2.0 security update | 2013-05-28T17:34:00+00:00 | 2026-01-28T22:54:25+00:00 |
| rhsa-2013:0871 | Red Hat Security Advisory: tomcat6 and tomcat7 security update | 2013-05-28T17:29:00+00:00 | 2026-01-28T22:54:25+00:00 |
| rhsa-2013:0870 | Red Hat Security Advisory: tomcat5 security update | 2013-05-28T17:31:00+00:00 | 2026-01-28T22:54:24+00:00 |
| rhsa-2013:0869 | Red Hat Security Advisory: tomcat6 security update | 2013-05-28T17:28:00+00:00 | 2026-01-28T22:54:24+00:00 |
| rhsa-2013:0855 | Red Hat Security Advisory: java-1.5.0-ibm security update | 2013-05-22T18:33:00+00:00 | 2026-01-28T22:54:24+00:00 |
| rhsa-2013:0823 | Red Hat Security Advisory: java-1.6.0-ibm security update | 2013-05-14T17:49:00+00:00 | 2026-01-28T22:54:24+00:00 |
| rhsa-2013:0822 | Red Hat Security Advisory: java-1.7.0-ibm security update | 2013-05-14T17:49:00+00:00 | 2026-01-28T22:54:24+00:00 |
| rhsa-2013:0783 | Red Hat Security Advisory: openssl security update | 2013-05-01T17:59:00+00:00 | 2026-01-28T22:54:24+00:00 |
| rhsa-2013:0782 | Red Hat Security Advisory: openssl security update | 2013-05-01T17:58:00+00:00 | 2026-01-28T22:54:23+00:00 |
| rhsa-2013:0749 | Red Hat Security Advisory: apache-cxf security update | 2013-04-16T18:51:00+00:00 | 2026-01-28T22:54:23+00:00 |
| rhsa-2013:0728 | Red Hat Security Advisory: rubygem packages security update | 2013-04-09T18:08:00+00:00 | 2026-01-28T22:54:23+00:00 |
| rhsa-2013:0612 | Red Hat Security Advisory: ruby security update | 2013-03-07T18:53:00+00:00 | 2026-01-28T22:54:23+00:00 |
| rhsa-2013:0701 | Red Hat Security Advisory: ruby193-ruby, rubygem-json and rubygem-rdoc security update | 2013-04-02T19:58:00+00:00 | 2026-01-28T22:54:22+00:00 |
| rhsa-2013:0700 | Red Hat Security Advisory: jenkins security update | 2013-04-02T19:46:00+00:00 | 2026-01-28T22:54:22+00:00 |
| rhsa-2013:0699 | Red Hat Security Advisory: ruby193-rubygem-activerecord security update | 2013-04-02T19:42:00+00:00 | 2026-01-28T22:54:22+00:00 |
| rhsa-2013:0686 | Red Hat Security Advisory: Subscription Asset Manager 1.2.1 update | 2013-03-26T19:10:00+00:00 | 2026-01-28T22:54:22+00:00 |
| rhsa-2013:0665 | Red Hat Security Advisory: JBoss Data Grid 6.1.0 update | 2013-03-20T15:48:00+00:00 | 2026-01-28T22:54:22+00:00 |
| rhsa-2013:0645 | Red Hat Security Advisory: apache-cxf security update | 2013-03-13T18:43:00+00:00 | 2026-01-28T22:54:22+00:00 |
| rhsa-2013:0640 | Red Hat Security Advisory: tomcat5 security update | 2013-03-12T17:57:00+00:00 | 2026-01-28T22:54:22+00:00 |
| rhsa-2013:0649 | Red Hat Security Advisory: Fuse ESB Enterprise 7.1.0 update | 2013-03-14T16:40:00+00:00 | 2026-01-28T22:54:21+00:00 |
| rhsa-2013:0648 | Red Hat Security Advisory: jbossweb security update | 2013-03-14T16:40:00+00:00 | 2026-01-28T22:54:21+00:00 |
| rhsa-2013:0647 | Red Hat Security Advisory: jbossweb security update | 2013-03-14T16:46:00+00:00 | 2026-01-28T22:54:20+00:00 |
| rhsa-2013:0644 | Red Hat Security Advisory: apache-cxf security update | 2013-03-13T18:45:00+00:00 | 2026-01-28T22:54:20+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2023-49554 | Use After Free vulnerability in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the do_directive function in the modules/preprocs/nasm/nasm-pp.c component. | 2024-01-01T08:00:00.000Z | 2025-11-19T01:35:48.000Z |
| msrc_cve-2023-49555 | An issue in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the expand_smacro function in the modules/preprocs/nasm/nasm-pp.c component. | 2024-01-01T08:00:00.000Z | 2025-11-19T01:35:17.000Z |
| msrc_cve-2023-49557 | An issue in YASM 1.3.0.86.g9def allows a remote attacker to cause a denial of service via the yasm_section_bcs_first function in the libyasm/section.c component. | 2024-01-01T08:00:00.000Z | 2025-11-19T01:34:44.000Z |
| msrc_cve-2022-50167 | bpf: fix potential 32-bit overflow when accessing ARRAY map element | 2025-06-02T00:00:00.000Z | 2025-11-19T01:01:38.000Z |
| msrc_cve-2022-50166 | Bluetooth: When HCI work queue is drained, only queue chained work | 2025-06-02T00:00:00.000Z | 2025-11-19T01:01:33.000Z |
| msrc_cve-2022-50073 | net: tap: NULL pointer derefence in dev_parse_header_protocol when skb->dev is null | 2025-06-02T00:00:00.000Z | 2025-11-19T01:01:27.000Z |
| msrc_cve-2022-50071 | mptcp: move subflow cleanup in mptcp_destroy_common() | 2025-06-02T00:00:00.000Z | 2025-11-19T01:01:22.000Z |
| msrc_cve-2022-50015 | ASoC: SOF: Intel: hda-ipc: Do not process IPC reply before firmware boot | 2025-06-02T00:00:00.000Z | 2025-11-18T01:37:37.000Z |
| msrc_cve-2025-40928 | JSON::XS before version 4.04 for Perl has an integer buffer overflow causing a segfault when parsing crafted JSON, enabling denial-of-service attacks or other unspecified impact | 2025-09-02T00:00:00.000Z | 2025-11-18T01:36:21.000Z |
| msrc_cve-2025-47906 | Unexpected paths returned from LookPath in os/exec | 2025-09-02T00:00:00.000Z | 2025-11-18T01:36:07.000Z |
| msrc_cve-2025-62209 | Windows License Manager Information Disclosure Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-18T00:00:00.000Z |
| msrc_cve-2025-62208 | Windows License Manager Information Disclosure Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-18T00:00:00.000Z |
| msrc_cve-2022-49980 | USB: gadget: Fix use-after-free Read in usb_udc_uevent() | 2025-06-02T00:00:00.000Z | 2025-11-16T01:01:47.000Z |
| msrc_cve-2022-49961 | bpf: Do mark_chain_precision for ARG_CONST_ALLOC_SIZE_OR_ZERO | 2025-06-02T00:00:00.000Z | 2025-11-16T01:01:36.000Z |
| msrc_cve-2022-49935 | dma-buf/dma-resv: check if the new fence is really later | 2025-06-02T00:00:00.000Z | 2025-11-16T01:01:22.000Z |
| msrc_cve-2025-2998 | PyTorch torch.nn.utils.rnn.pad_packed_sequence memory corruption | 2025-03-02T00:00:00.000Z | 2025-11-15T01:01:24.000Z |
| msrc_cve-2025-37820 | xen-netfront: handle NULL returned by xdp_convert_buff_to_frame() | 2025-05-02T00:00:00.000Z | 2025-11-14T01:03:58.000Z |
| msrc_cve-2023-53093 | tracing: Do not let histogram values have some modifiers | 2025-05-02T00:00:00.000Z | 2025-11-14T01:03:51.000Z |
| msrc_cve-2023-53074 | drm/amdgpu: fix ttm_bo calltrace warning in psp_hw_fini | 2025-05-02T00:00:00.000Z | 2025-11-14T01:03:45.000Z |
| msrc_cve-2023-53072 | mptcp: use the workqueue to destroy unaccepted sockets | 2025-05-02T00:00:00.000Z | 2025-11-14T01:03:40.000Z |
| msrc_cve-2023-53068 | net: usb: lan78xx: Limit packet length to skb->len | 2025-05-02T00:00:00.000Z | 2025-11-14T01:03:35.000Z |
| msrc_cve-2023-53042 | drm/amd/display: Do not set DRR on pipe Commit | 2025-05-02T00:00:00.000Z | 2025-11-14T01:03:29.000Z |
| msrc_cve-2023-53037 | scsi: mpi3mr: Bad drive in topology results kernel crash | 2025-05-02T00:00:00.000Z | 2025-11-14T01:03:24.000Z |
| msrc_cve-2022-49932 | KVM: VMX: Do _all_ initialization before exposing /dev/kvm to userspace | 2025-05-02T00:00:00.000Z | 2025-11-14T01:03:18.000Z |
| msrc_cve-2011-10034 | IRAI AUTOMGEN <= 8.0.0.7 Use-After-Free Remote DoS | 2025-11-02T00:00:00.000Z | 2025-11-14T01:01:24.000Z |
| msrc_cve-2025-40165 | media: nxp: imx8-isi: m2m: Fix streaming cleanup on release | 2025-11-02T00:00:00.000Z | 2025-11-13T01:02:47.000Z |
| msrc_cve-2025-40172 | accel/qaic: Treat remaining == 0 as error in find_and_map_user_pages() | 2025-11-02T00:00:00.000Z | 2025-11-13T01:02:30.000Z |
| msrc_cve-2025-62220 | Windows Subsystem for Linux GUI Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-13T00:00:00.000Z |
| msrc_cve-2025-37928 | dm-bufio: don't schedule in atomic context | 2025-05-02T00:00:00.000Z | 2025-11-12T01:02:14.000Z |
| msrc_cve-2023-53105 | net/mlx5e: Fix cleanup null-ptr deref on encap lock | 2025-05-02T00:00:00.000Z | 2025-11-12T01:01:38.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202407-1133 | TOTOLINK A6000R V1.0.1-B20201211.2000 was discovered to contain a command injection vulne… | 2025-06-29T22:58:20.838000Z |
| var-202407-1770 | TOTOLINK A6000R V1.0.1-B20201211.2000 was discovered to contain a command injection vulne… | 2025-06-29T22:51:23.885000Z |
| var-202407-2337 | A vulnerability was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. It has been classifi… | 2025-06-29T22:51:23.812000Z |
| var-202407-2400 | A vulnerability has been found in TOTOLINK A3600R 4.1.2cu.5182_B20201102 and classified a… | 2025-06-29T22:51:23.784000Z |
| var-202408-0320 | A vulnerability classified as critical has been found in TOTOLINK EX200 4.0.3c.7646_B2020… | 2025-06-29T22:51:23.690000Z |
| var-202409-0140 | A vulnerability has been found in TOTOLINK AC1200 T8 4.1.5cu.861_B20230220 and classified… | 2025-06-29T22:51:23.184000Z |
| var-202505-1655 | A vulnerability classified as critical has been found in TOTOLINK A3002R and A3002RU 3.0.… | 2025-06-29T19:33:16.793000Z |
| var-202506-0573 | A vulnerability was found in Tenda FH1202 1.2.0.14. It has been classified as critical. A… | 2025-06-29T19:33:16.641000Z |
| var-202506-0015 | A vulnerability, which was classified as critical, has been found in Linksys RE6500, RE62… | 2025-06-28T23:42:37.577000Z |
| var-202403-2113 | There is stack-based buffer overflow vulnerability in pc_change_act function in Linksys E… | 2025-06-28T23:40:25.365000Z |
| var-202506-0010 | A vulnerability classified as critical was found in Linksys RE6500, RE6250, RE6300, RE635… | 2025-06-28T23:38:46.259000Z |
| var-202411-2400 | An issue in TOTOLINK Bluetooth Wireless Adapter A600UB allows a local attacker to execute… | 2025-06-28T23:35:40.616000Z |
| var-202505-0993 | Initialization vector (IV) reuse in the web management portal of the Tenda RX2 Pro 16.03.… | 2025-06-28T23:33:02.695000Z |
| var-202503-0647 | In wl_notify_gscan_event of wl_cfgscan.c, there is a possible out of bounds write due to … | 2025-06-28T23:30:38.785000Z |
| var-202505-1738 | A vulnerability was found in Tenda A15 15.13.07.13. It has been declared as problematic. … | 2025-06-28T23:28:29.503000Z |
| var-202503-0652 | In ppcfw_deny_sec_dram_access of ppcfw.c, there is a possible arbitrary read from TEE mem… | 2025-06-28T23:25:43.389000Z |
| var-202505-4269 | TRENDnet is a leading global network equipment supplier, focusing on providing innovative… | 2025-06-28T23:25:42.787000Z |
| var-201805-0937 | Medtronic N'Vision Clinician Programmer 8840 N'Vision Clinician Programme and 8870 N'Visi… | 2025-06-28T23:14:03.579000Z |
| var-202506-1768 | HP LaserJet Pro MFP M126nw is a black and white laser all-in-one printer. HP LaserJet Pr… | 2025-06-27T23:19:23.993000Z |
| var-202506-2186 | NETGEAR Gateway C6300BD is a cable modem and router in one device, designed to provide qu… | 2025-06-27T23:19:23.805000Z |
| var-202506-2585 | D-link DWR-M961 is a 4G AC1200 LTE router. D-Link Electronics (Shanghai) Co., Ltd. DWR-M… | 2025-06-27T23:19:23.600000Z |
| var-202506-2795 | Suzhou Keda Technology Co., Ltd. is a leading provider of video and security products and… | 2025-06-27T23:19:23.501000Z |
| var-202502-1799 | A vulnerability classified as critical was found in D-Link DAP-1320 1.00. Affected by thi… | 2025-06-27T23:18:59.186000Z |
| var-202505-4073 | An Unchecked Loop Condition in ASPECT provides an attacker the ability to maliciously con… | 2025-06-27T23:18:58.580000Z |
| var-202506-2578 | Samsung SL-J3560FW is a multi-function inkjet printer. Samsung (China) Investment Co.,… | 2025-06-27T23:18:57.619000Z |
| var-202506-2788 | Logger1000 is a data collection, power control and protocol conversion device used in pho… | 2025-06-27T23:18:57.521000Z |
| var-202506-2998 | H3C Magic NX15000 10G Wi-Fi 6 Router is a high-end router for users and groups who pursue… | 2025-06-27T23:18:57.407000Z |
| var-201903-0002 | The potential exists for exposure of the product's password used to restrict unauthorized… | 2025-06-27T23:18:48.353000Z |
| var-202505-4266 | Device commissioning parameters in ASPECT may be modified by an external source if admini… | 2025-06-27T23:18:36.908000Z |
| var-202506-2182 | MP C3004ex is a color digital multifunction printer. Ricoh (China) Investment Co., Ltd. … | 2025-06-27T23:18:36.187000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2024:3030-1 | Security update for the Linux Kernel (Live Patch 35 for SLE 15 SP3) | 2024-08-27T15:33:48Z | 2024-08-27T15:33:48Z |
| suse-su-2024:3034-1 | Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP3) | 2024-08-27T14:33:50Z | 2024-08-27T14:33:50Z |
| suse-su-2024:3032-1 | Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6) | 2024-08-27T14:03:49Z | 2024-08-27T14:03:49Z |
| suse-su-2024:3031-1 | Security update for keepalived | 2024-08-27T13:32:40Z | 2024-08-27T13:32:40Z |
| suse-su-2024:3027-1 | Security update for the Linux Kernel (Live Patch 53 for SLE 12 SP5) | 2024-08-27T13:04:04Z | 2024-08-27T13:04:04Z |
| suse-su-2024:3023-1 | Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP2) | 2024-08-27T10:04:09Z | 2024-08-27T10:04:09Z |
| suse-su-2024:3021-1 | Security update for the Linux Kernel (Live Patch 48 for SLE 12 SP5) | 2024-08-27T10:03:55Z | 2024-08-27T10:03:55Z |
| suse-su-2024:3019-1 | Security update for openssl-3 | 2024-08-27T08:50:29Z | 2024-08-27T08:50:29Z |
| suse-su-2024:3018-1 | Security update for mariadb | 2024-08-27T07:52:13Z | 2024-08-27T07:52:13Z |
| suse-su-2024:3015-1 | Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5) | 2024-08-27T01:34:00Z | 2024-08-27T01:34:00Z |
| suse-su-2024:3014-1 | Security update for the Linux Kernel (Live Patch 49 for SLE 12 SP5) | 2024-08-27T01:33:52Z | 2024-08-27T01:33:52Z |
| suse-su-2024:3010-1 | Security update for xen | 2024-08-26T09:52:00Z | 2024-08-26T09:52:00Z |
| suse-su-2024:3007-1 | Security update for libofx | 2024-08-23T14:46:59Z | 2024-08-23T14:46:59Z |
| suse-su-2024:3006-1 | Security update for fetchmail | 2024-08-23T14:46:48Z | 2024-08-23T14:46:48Z |
| suse-su-2024:3005-1 | Security update for webkit2gtk3 | 2024-08-23T11:28:04Z | 2024-08-23T11:28:04Z |
| suse-su-2024:3004-1 | Security update for expat | 2024-08-23T11:27:46Z | 2024-08-23T11:27:46Z |
| suse-su-2024:3003-1 | Security update for MozillaFirefox | 2024-08-23T10:44:22Z | 2024-08-23T10:44:22Z |
| suse-su-2024:3001-1 | Security update for xen | 2024-08-23T08:15:47Z | 2024-08-23T08:15:47Z |
| suse-su-2024:2999-1 | Security update for apache2 | 2024-08-22T15:05:16Z | 2024-08-22T15:05:16Z |
| suse-su-2024:2998-1 | Security update for glib2 | 2024-08-22T10:52:22Z | 2024-08-22T10:52:22Z |
| suse-su-2024:2997-1 | Security update for apache2 | 2024-08-21T15:33:21Z | 2024-08-21T15:33:21Z |
| suse-su-2024:2994-1 | Security update for xen | 2024-08-21T10:37:54Z | 2024-08-21T10:37:54Z |
| suse-su-2024:2993-1 | Security update for oniguruma | 2024-08-21T10:37:46Z | 2024-08-21T10:37:46Z |
| suse-su-2024:2991-1 | Security update for openssl1 | 2024-08-20T14:17:31Z | 2024-08-20T14:17:31Z |
| suse-su-2024:2989-1 | Security update for openssl-1_0_0 | 2024-08-20T14:17:16Z | 2024-08-20T14:17:16Z |
| suse-su-2024:2985-1 | Security update for libqt5-qtquick3d | 2024-08-20T09:11:14Z | 2024-08-20T09:11:14Z |
| suse-su-2024:2984-1 | Security update for libqt5-qt3d | 2024-08-20T09:10:46Z | 2024-08-20T09:10:46Z |
| suse-su-2024:2983-1 | Security update for qemu | 2024-08-20T09:10:06Z | 2024-08-20T09:10:06Z |
| suse-su-2024:2982-1 | Security update for python311 | 2024-08-20T09:08:57Z | 2024-08-20T09:08:57Z |
| suse-su-2024:2980-1 | Security update for kernel-firmware | 2024-08-20T09:08:20Z | 2024-08-20T09:08:20Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:11798-1 | java-11-openjdk-11.0.14.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11797-1 | libopenssl-3-devel-3.0.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11796-1 | kernel-devel-5.16.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11795-1 | ruby3.1-rubygem-fluentd-1.14.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11794-1 | exiftool-12.39-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11793-1 | expat-2.4.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11792-1 | connman-1.41-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11791-1 | python310-sentry-sdk-1.5.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11790-1 | element-web-1.9.9-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11789-1 | element-desktop-1.9.9-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11788-1 | gegl-0.4.34-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11787-1 | libsphinxclient-0_0_1-2.2.11-6.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11786-1 | libruby3_1-3_1-3.1.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11785-1 | keylime-agent-6.3.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11784-1 | libblkid-devel-2.37.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11783-1 | perl-App-cpanminus-1.7045-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11782-1 | gstreamer-plugins-bad-1.18.5-5.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11781-1 | xen-4.16.0_04-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11780-1 | libpolkit-agent-1-0-0.120-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11779-1 | isync-1.4.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11778-1 | gstreamer-plugins-good-1.18.5-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11777-1 | gstreamer-plugins-base-1.18.5-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11776-1 | gstreamer-1.18.5-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11775-1 | kernel-devel-5.16.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11774-1 | usbview-3.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11773-1 | pure-ftpd-1.0.50-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11772-1 | zabbix-agent-4.0.37-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11771-1 | python3-virtualbox-6.1.32-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11770-1 | libvirglrenderer1-0.9.1-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11769-1 | cargo1.58-1.58.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-elasticsearch-2020-7009 | 2024-03-06T10:54:57.683Z | 2025-04-03T14:40:37.652Z | |
| bit-ejbca-2022-34831 | 2024-03-06T10:51:28.966Z | 2025-04-03T14:40:37.652Z | |
| bit-ejbca-2021-40089 | 2024-03-06T10:51:40.512Z | 2025-04-03T14:40:37.652Z | |
| bit-ejbca-2021-40088 | 2024-03-06T10:51:53.209Z | 2025-04-03T14:40:37.652Z | |
| bit-ejbca-2021-40087 | 2024-03-06T10:52:04.494Z | 2025-04-03T14:40:37.652Z | |
| bit-ejbca-2021-40086 | 2024-03-06T10:52:17.174Z | 2025-04-03T14:40:37.652Z | |
| bit-ejbca-2020-28942 | 2024-03-06T10:52:27.072Z | 2025-04-03T14:40:37.652Z | |
| bit-ejbca-2020-25276 | 2024-03-06T10:52:38.396Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2022-25278 | 2024-03-06T10:52:33.986Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2022-25277 | 2024-03-06T10:52:46.499Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2022-25276 | 2024-03-06T10:52:55.802Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2022-25275 | 2024-03-06T10:53:08.904Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2022-25274 | 2024-03-06T10:53:18.690Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2022-25273 | 2024-03-06T10:53:28.666Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2022-25271 | 2024-03-06T10:53:39.007Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2022-25270 | 2024-03-06T10:53:49.081Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2021-33829 | 2024-03-06T10:55:26.487Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2020-9281 | 2024-03-06T10:55:38.980Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2020-28948 | 2024-03-06T10:56:10.686Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2020-13688 | 2024-03-06T10:56:19.474Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2020-13677 | 2024-03-06T10:56:30.677Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2020-13676 | 2024-03-06T10:56:40.705Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2020-13675 | 2024-03-06T10:56:51.003Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2020-13674 | 2024-03-06T10:56:59.186Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2020-13672 | 2024-03-06T10:57:10.585Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2020-13670 | 2024-03-06T10:57:29.673Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2020-13669 | 2024-03-06T10:57:40.474Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2020-13667 | 2024-03-06T10:58:01.865Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2020-13666 | 2024-03-06T10:58:14.593Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2020-13665 | 2024-03-06T10:58:25.802Z | 2025-04-03T14:40:37.652Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-21420 | Adobe Substance3D Modeler内存错误引用漏洞 | 2025-09-11 | 2025-09-17 |
| cnvd-2025-21419 | Adobe Substance3D Modeler代码执行漏洞 | 2025-09-11 | 2025-09-17 |
| cnvd-2025-21418 | Adobe Substance3D Modeler越界读取漏洞(CNVD-2025-21418) | 2025-09-11 | 2025-09-17 |
| cnvd-2025-21417 | Adobe Commerce安全绕过漏洞(CNVD-2025-21417) | 2025-09-11 | 2025-09-17 |
| cnvd-2025-21416 | Online Shopping Portal参数value跨站脚本漏洞 | 2024-11-07 | 2025-09-17 |
| cnvd-2025-21415 | Flowise访问控制错误漏洞 | 2025-09-16 | 2025-09-17 |
| cnvd-2025-21414 | D-Link DIR-823x命令注入漏洞 | 2025-09-16 | 2025-09-17 |
| cnvd-2025-21413 | curl存在未明漏洞(CNVD-2025-21413) | 2025-09-16 | 2025-09-17 |
| cnvd-2025-21412 | 西安众邦网络科技有限公司CRMEB服务端请求伪造漏洞 | 2025-09-16 | 2025-09-17 |
| cnvd-2025-21411 | AXIS BANK Axis Mobile App存在未明漏洞 | 2025-09-16 | 2025-09-17 |
| cnvd-2025-21410 | Axios资源管理错误漏洞 | 2025-09-16 | 2025-09-17 |
| cnvd-2025-21409 | Adobe ColdFusion路径遍历漏洞(CNVD-2025-21409) | 2025-09-11 | 2025-09-17 |
| cnvd-2025-21408 | Microsoft Office代码执行漏洞(CNVD-2025-21408) | 2025-08-15 | 2025-09-17 |
| cnvd-2025-21407 | Beauty Parlour Management System view-enquiry.php文件SQL注入漏洞 | 2025-09-16 | 2025-09-17 |
| cnvd-2025-21406 | Beauty Parlour Management System readenq.php文件SQL注入漏洞 | 2025-09-16 | 2025-09-17 |
| cnvd-2025-21405 | Online Shopping Portal deferred_table.php跨站脚本漏洞 | 2024-11-07 | 2025-09-17 |
| cnvd-2025-21404 | Online Shopping Portal /admin/assets跨站脚本漏洞 | 2024-11-07 | 2025-09-17 |
| cnvd-2025-21403 | Online Shopping Portal /shopping/track-orders.phpSQL注入漏洞 | 2025-02-19 | 2025-09-17 |
| cnvd-2025-21402 | Online Shopping Portal product-details.php文件SQL注入漏洞 | 2025-03-07 | 2025-09-17 |
| cnvd-2025-21401 | Online Shopping Portal文件上传漏洞 | 2025-09-05 | 2025-09-17 |
| cnvd-2025-21400 | Online Shopping Portal /admin/updateorder.php跨站脚本漏洞 | 2025-09-08 | 2025-09-17 |
| cnvd-2025-21399 | Online Shopping Portal跨站脚本漏洞 | 2025-09-16 | 2025-09-17 |
| cnvd-2025-21398 | Microsoft Excel代码执行漏洞(CNVD-2025-21398) | 2025-09-11 | 2025-09-17 |
| cnvd-2025-21397 | Microsoft Excel代码执行漏洞(CNVD-2025-21397) | 2025-09-11 | 2025-09-17 |
| cnvd-2025-21396 | Microsoft Excel代码执行漏洞(CNVD-2025-21396) | 2025-09-11 | 2025-09-17 |
| cnvd-2025-21395 | Microsoft Excel代码执行漏洞(CNVD-2025-21395) | 2025-09-11 | 2025-09-17 |
| cnvd-2025-21394 | Microsoft Excel代码执行漏洞(CNVD-2025-21394) | 2025-09-11 | 2025-09-17 |
| cnvd-2025-21393 | Microsoft Excel信息泄露漏洞(CNVD-2025-21393) | 2025-09-11 | 2025-09-17 |
| cnvd-2025-21392 | Microsoft Excel代码执行漏洞(CNVD-2025-21392) | 2025-09-11 | 2025-09-17 |
| cnvd-2025-21391 | Microsoft Excel代码执行漏洞(CNVD-2025-21391) | 2025-09-11 | 2025-09-17 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2022-avi-112 | Multiples vulnérabilités dans les produits GitLab | 2022-02-04T00:00:00.000000 | 2022-02-04T00:00:00.000000 |
| certfr-2022-avi-111 | Multiples vulnérabilités dans F5 BIG-IP et BIG-IQ | 2022-02-04T00:00:00.000000 | 2022-02-04T00:00:00.000000 |
| certfr-2022-avi-110 | Multiples vulnérabilités dans Microsoft Edge | 2022-02-04T00:00:00.000000 | 2022-02-04T00:00:00.000000 |
| certfr-2022-avi-109 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2022-02-04T00:00:00.000000 | 2022-02-04T00:00:00.000000 |
| certfr-2022-avi-108 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2022-02-04T00:00:00.000000 | 2022-02-04T00:00:00.000000 |
| certfr-2022-avi-107 | Multiples vulnérabilités dans Cisco Small Business RV | 2022-02-03T00:00:00.000000 | 2022-02-03T00:00:00.000000 |
| certfr-2022-avi-106 | Vulnérabilité dans PostgreSQL JDBC | 2022-02-03T00:00:00.000000 | 2022-02-03T00:00:00.000000 |
| certfr-2022-avi-105 | Multiples vulnérabilités dans Google Chrome | 2022-02-02T00:00:00.000000 | 2022-02-02T00:00:00.000000 |
| certfr-2022-avi-104 | Multiples vulnérabilités dans les produits Fortinet | 2022-02-02T00:00:00.000000 | 2022-02-02T00:00:00.000000 |
| certfr-2022-avi-103 | Vulnérabilité dans F5 BIG-IP et BIG-IQ | 2022-02-02T00:00:00.000000 | 2022-02-02T00:00:00.000000 |
| certfr-2022-avi-102 | Vulnérabilité dans Sophos Capsule8 | 2022-02-02T00:00:00.000000 | 2022-02-02T00:00:00.000000 |
| certfr-2022-avi-101 | Vulnérabilité dans le noyau Linux de Red Hat | 2022-02-02T00:00:00.000000 | 2022-02-02T00:00:00.000000 |
| certfr-2022-avi-100 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2022-02-02T00:00:00.000000 | 2022-02-02T00:00:00.000000 |
| certfr-2022-avi-099 | Vulnérabilité dans Tenable Nessus | 2022-02-01T00:00:00.000000 | 2022-02-01T00:00:00.000000 |
| certfr-2022-avi-098 | Vulnérabilité dans VMware Cloud Foundation | 2022-02-01T00:00:00.000000 | 2022-02-01T00:00:00.000000 |
| certfr-2022-avi-097 | Multiples vulnérabilités dans IBM Spectrum Protect Plus | 2022-02-01T00:00:00.000000 | 2022-02-01T00:00:00.000000 |
| certfr-2022-avi-096 | Multiples vulnérabilités dans Samba | 2022-02-01T00:00:00.000000 | 2022-02-01T00:00:00.000000 |
| certfr-2022-avi-095 | Vulnérabilité dans les produits ESET | 2022-01-31T00:00:00.000000 | 2022-01-31T00:00:00.000000 |
| certfr-2022-avi-093 | Vulnérabilité dans OpenSSL pour MIPS | 2022-01-31T00:00:00.000000 | 2022-01-31T00:00:00.000000 |
| certfr-2022-avi-092 | Multiples vulnérabilités dans IBM Spectrum Protect Plus | 2022-01-31T00:00:00.000000 | 2022-01-31T00:00:00.000000 |
| certfr-2022-avi-090 | Multiples vulnérabilités dans Foxit PDF Reader et Foxit PDF Editor | 2022-01-28T00:00:00.000000 | 2022-01-28T00:00:00.000000 |
| certfr-2022-avi-089 | Vulnérabilité dans Trend Micro Worry-Free Business Security Server | 2022-01-28T00:00:00.000000 | 2022-01-28T00:00:00.000000 |
| certfr-2022-avi-088 | Multiples vulnérabilités dans les produits Apple | 2022-01-27T00:00:00.000000 | 2022-01-27T00:00:00.000000 |
| certfr-2022-avi-087 | Vulnérabilité dans Nextcloud pour Android | 2022-01-27T00:00:00.000000 | 2022-01-27T00:00:00.000000 |
| certfr-2022-avi-086 | Vulnérabilité dans pkexec de PolicyKit sur SUSE | 2022-01-27T00:00:00.000000 | 2022-01-27T00:00:00.000000 |
| certfr-2022-avi-085 | Vulnérabilité dans pkexec de PolicyKit sur Debian | 2022-01-27T00:00:00.000000 | 2022-01-27T00:00:00.000000 |
| certfr-2022-avi-084 | Vulnérabilité dans pkexec de PolicyKit sur Red Hat | 2022-01-27T00:00:00.000000 | 2022-01-27T00:00:00.000000 |
| certfr-2022-avi-083 | Vulnérabilité dans pkexec de PolicyKit sur Ubuntu | 2022-01-27T00:00:00.000000 | 2022-01-27T00:00:00.000000 |
| certfr-2022-avi-082 | Multiples vulnérabilités dans Apache Tomcat | 2022-01-26T00:00:00.000000 | 2022-01-26T00:00:00.000000 |
| certfr-2022-avi-081 | Multiples vulnérabilités dans Xen | 2022-01-26T00:00:00.000000 | 2022-01-26T00:00:00.000000 |