Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-2796 |
N/A
|
JIT miscompilation in the JavaScript: WebAssembly component |
Mozilla |
Firefox |
2026-02-24T13:33:26.775Z | 2026-02-24T17:30:41.643Z |
| CVE-2026-2791 |
N/A
|
Mitigation bypass in the Networking: Cache component |
Mozilla |
Firefox |
2026-02-24T13:33:22.237Z | 2026-02-24T17:30:40.073Z |
| CVE-2026-2788 |
N/A
|
Incorrect boundary conditions in the Audio/Video: GMP … |
Mozilla |
Firefox |
2026-02-24T13:33:20.287Z | 2026-02-24T17:30:38.598Z |
| CVE-2026-2784 |
N/A
|
Mitigation bypass in the DOM: Security component |
Mozilla |
Firefox |
2026-02-24T13:33:17.554Z | 2026-02-24T17:30:36.359Z |
| CVE-2026-2779 |
N/A
|
Incorrect boundary conditions in the Networking: JAR c… |
Mozilla |
Firefox |
2026-02-24T13:33:14.195Z | 2026-02-24T17:30:31.538Z |
| CVE-2026-2778 |
N/A
|
Sandbox escape due to incorrect boundary conditions in… |
Mozilla |
Firefox |
2026-02-24T13:33:13.564Z | 2026-02-24T17:30:29.886Z |
| CVE-2026-2776 |
N/A
|
Sandbox escape due to incorrect boundary conditions in… |
Mozilla |
Firefox |
2026-02-24T13:33:12.247Z | 2026-02-24T17:30:28.178Z |
| CVE-2026-2775 |
N/A
|
Mitigation bypass in the DOM: HTML Parser component |
Mozilla |
Firefox |
2026-02-24T13:33:11.553Z | 2026-02-24T17:30:27.752Z |
| CVE-2026-2773 |
N/A
|
Incorrect boundary conditions in the Web Audio component |
Mozilla |
Firefox |
2026-02-24T13:33:10.177Z | 2026-02-24T17:30:26.682Z |
| CVE-2026-2771 |
N/A
|
Undefined behavior in the DOM: Core & HTML component |
Mozilla |
Firefox |
2026-02-24T13:33:08.538Z | 2026-02-24T17:30:25.709Z |
| CVE-2026-2769 |
8.8 (3.1)
|
Use-after-free in the Storage: IndexedDB component |
Mozilla |
Firefox |
2026-02-24T13:33:06.912Z | 2026-02-24T17:30:21.670Z |
| CVE-2026-2766 |
N/A
|
Use-after-free in the JavaScript Engine: JIT component |
Mozilla |
Firefox |
2026-02-24T13:33:04.946Z | 2026-02-24T17:30:20.471Z |
| CVE-2026-2765 |
N/A
|
Use-after-free in the JavaScript Engine component |
Mozilla |
Firefox |
2026-02-24T13:33:03.943Z | 2026-02-24T17:30:20.086Z |
| CVE-2026-2764 |
N/A
|
JIT miscompilation, use-after-free in the JavaScript E… |
Mozilla |
Firefox |
2026-02-24T13:33:03.207Z | 2026-02-24T17:30:19.453Z |
| CVE-2026-2763 |
N/A
|
Use-after-free in the JavaScript Engine component |
Mozilla |
Firefox |
2026-02-24T13:33:02.514Z | 2026-02-24T17:30:19.018Z |
| CVE-2026-2762 |
N/A
|
Integer overflow in the JavaScript: Standard Library c… |
Mozilla |
Firefox |
2026-02-24T13:33:01.761Z | 2026-02-24T17:30:16.322Z |
| CVE-2025-15589 |
5.1 (4.0)
3.8 (3.1)
3.8 (3.0)
|
MuYuCMS Template Management Template.php delete_dir_fi… |
n/a |
MuYuCMS |
2026-02-24T05:52:29.889Z | 2026-02-24T17:24:16.995Z |
| CVE-2026-3070 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
SourceCodester Modern Image Gallery App upload.php cro… |
SourceCodester |
Modern Image Gallery App |
2026-02-24T04:32:08.072Z | 2026-02-24T17:13:37.627Z |
| CVE-2026-27468 |
4.8 (4.0)
|
Mastodon may allow unconfirmed FASP to make subscriptions |
mastodon |
mastodon |
2026-02-24T17:12:40.349Z | 2026-02-24T17:12:40.349Z |
| CVE-2026-24314 |
4.3 (3.1)
|
Information Disclosure vulnerability in S/4HANA (Manag… |
SAP_SE |
S/4HANA (Manage Payment Media) |
2026-02-24T05:23:52.911Z | 2026-02-24T16:44:18.533Z |
| CVE-2025-62512 |
5.5 (4.0)
|
Piwigo Vulnerable to User Enumeration via Password Res… |
Piwigo |
Piwigo |
2026-02-24T16:43:28.919Z | 2026-02-24T16:43:28.919Z |
| CVE-2024-58041 |
9.1 (3.1)
|
Smolder versions through 1.51 for Perl uses insecure r… |
WONKO |
Smolder |
2026-02-23T23:54:23.396Z | 2026-02-24T16:41:35.824Z |
| CVE-2024-48928 |
2.7 (4.0)
|
Piwigo's secret key can be brute forced |
Piwigo |
Piwigo |
2026-02-24T16:39:56.944Z | 2026-02-24T16:39:56.944Z |
| CVE-2025-9120 |
8.6 (4.0)
|
RCE vulnerability has been discovered in OpenText™ Car… |
OpenText™ |
Carbonite Safe Server Backup |
2026-02-24T00:03:08.646Z | 2026-02-24T16:35:24.700Z |
| CVE-2026-27590 |
8.9 (4.0)
|
Caddy: Unicode case-folding length expansion causes in… |
caddyserver |
caddy |
2026-02-24T16:33:41.353Z | 2026-02-24T16:33:41.353Z |
| CVE-2026-27589 |
6.9 (4.0)
|
Caddy vulnerable to cross-origin config application vi… |
caddyserver |
caddy |
2026-02-24T16:30:52.016Z | 2026-02-24T16:31:35.510Z |
| CVE-2025-15386 |
8.8 (3.1)
|
Responsive Lightbox & Gallery < 2.6.1 - Unauthenticate… |
Unknown |
Responsive Lightbox & Gallery |
2026-02-24T06:00:07.864Z | 2026-02-24T16:29:30.065Z |
| CVE-2026-27588 |
7.7 (4.0)
|
Caddy: MatchHost becomes case-sensitive for large host… |
caddyserver |
caddy |
2026-02-24T16:28:28.106Z | 2026-02-24T16:28:28.106Z |
| CVE-2026-27587 |
7.7 (4.0)
|
Caddy: MatchPath %xx (escaped-path) branch skips case … |
caddyserver |
caddy |
2026-02-24T16:26:40.222Z | 2026-02-24T16:26:40.222Z |
| CVE-2025-11845 |
4.9 (3.1)
|
A null pointer dereference vulnerability in the c… |
Zyxel |
VMG3625-T50B firmware |
2026-02-24T01:30:50.433Z | 2026-02-24T16:12:02.942Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2023-1211 |
7.2 (3.0)
|
SQL Injection in phpipam/phpipam |
phpipam |
phpipam/phpipam |
2023-03-06T00:00:00.000Z | 2026-02-16T14:52:08.146Z |
| CVE-2022-4407 |
9.8 (3.0)
|
Cross-site Scripting (XSS) - Reflected in thorsten/phpmyfaq |
thorsten |
thorsten/phpmyfaq |
2022-12-11T00:00:00.000Z | 2026-02-16T14:50:53.905Z |
| CVE-2022-3766 |
7.3 (3.0)
|
Cross-site Scripting (XSS) - Reflected in thorsten/phpmyfaq |
thorsten |
thorsten/phpmyfaq |
2022-10-31T00:00:00.000Z | 2026-02-16T14:49:30.861Z |
| CVE-2022-0088 |
3.5 (3.0)
|
Cross-Site Request Forgery (CSRF) in yourls/yourls |
yourls |
yourls/yourls |
2022-04-03T08:50:10.000Z | 2026-02-16T14:48:06.656Z |
| CVE-2025-9566 |
8.1 (3.1)
|
Podman: podman kube play command may overwrite host files |
|
|
2025-09-05T19:54:30.503Z | 2026-02-16T12:51:17.342Z |
| CVE-2025-38162 |
N/A
|
netfilter: nft_set_pipapo: prevent overflow in lookup … |
Linux |
Linux |
2025-07-03T08:36:03.731Z | 2026-02-16T09:26:06.084Z |
| CVE-2026-23766 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none. | N/A | N/A | 2026-01-15T19:18:50.806Z | 2026-02-14T17:44:48.692Z |
| CVE-2025-69634 |
9 (3.1)
|
Cross Site Request Forgery vulnerability in Dolib… |
n/a |
n/a |
2026-02-12T00:00:00.000Z | 2026-02-14T04:30:49.309Z |
| CVE-2026-26303 |
N/A
|
Not used | N/A | N/A | 2026-02-14T03:55:05.907Z | |
| CVE-2026-26302 |
N/A
|
Not used | N/A | N/A | 2026-02-14T03:55:06.462Z | |
| CVE-2026-26301 |
N/A
|
Not used | N/A | N/A | 2026-02-14T03:55:06.945Z | |
| CVE-2026-26300 |
N/A
|
Not used | N/A | N/A | 2026-02-14T03:55:07.406Z | |
| CVE-2026-26299 |
N/A
|
Not used | N/A | N/A | 2026-02-14T03:55:07.938Z | |
| CVE-2026-26298 |
N/A
|
Not used | N/A | N/A | 2026-02-14T03:55:08.453Z | |
| CVE-2026-26297 |
N/A
|
Not used | N/A | N/A | 2026-02-14T03:55:08.914Z | |
| CVE-2026-26296 |
N/A
|
Not used | N/A | N/A | 2026-02-14T03:55:09.395Z | |
| CVE-2026-26295 |
N/A
|
Not used | N/A | N/A | 2026-02-14T03:55:09.951Z | |
| CVE-2025-9293 |
7.7 (4.0)
|
Insufficient Certificate Validation in Multiple Mobile… |
TP-Link Systems Inc. |
Tapo App |
2026-02-13T00:22:27.459Z | 2026-02-13T22:10:15.723Z |
| CVE-2025-9292 |
2 (4.0)
|
Permissive Web Security Policy Allows Cross-Origin Acc… |
TP-Link Systems Inc. |
Omada Cloud Controller |
2026-02-13T00:21:24.168Z | 2026-02-13T22:09:17.957Z |
| CVE-2025-3546 |
8.6 (4.0)
8 (3.1)
8 (3.0)
|
H3C Magic BE18000 HTTP POST Request getLanguage FCGI_C… |
H3C |
Magic NX15 |
2025-04-14T01:31:07.222Z | 2025-04-14T15:54:23.768Z |
| CVE-2021-37914 |
N/A
|
In Argo Workflows through 3.1.3, if EXPRESSION_TE… |
n/a |
n/a |
2021-08-02T23:17:45.000Z | 2024-08-04T01:30:09.170Z |
| CVE-2025-13444 |
8.4 (3.1)
|
OS Command Injection Remote Code Execution Vulnerabili… |
Progress Software |
LoadMaster |
2026-01-13T14:26:50.661Z | 2026-02-26T15:04:46.116Z |
| CVE-2023-47240 |
6.5 (3.1)
|
WordPress CBX Map for Google Map & OpenStreetMap Plugi… |
Codeboxr |
CBX Map for Google Map & OpenStreetMap |
2023-11-16T18:48:08.324Z | 2024-09-04T20:30:24.640Z |
| CVE-2026-22549 |
4.9 (3.1)
6.9 (4.0)
|
BIG-IP Container Ingress Services vulnerability |
F5 |
F5 BIG-IP Container Ingress Services |
2026-02-04T15:15:36.466Z | 2026-02-04T15:58:22.668Z |
| CVE-2026-22548 |
5.9 (3.1)
8.2 (4.0)
|
BIG-IP Advanced WAF and ASM vulnerability |
F5 |
BIG-IP |
2026-02-04T15:02:05.724Z | 2026-02-04T16:04:59.113Z |
| CVE-2026-20732 |
3.1 (3.1)
2.3 (4.0)
|
BIG-IP Configuration utility vulnerability |
F5 |
BIG-IP |
2026-02-04T15:02:05.281Z | 2026-02-04T16:08:05.470Z |
| CVE-2023-1346 |
4.3 (3.1)
|
The RapidLoad Power-Up for Autoptimize plugin for… |
shakee93 |
RapidLoad Power-Up for Autoptimize |
2023-03-10T19:07:39.988Z | 2025-01-13T16:59:05.759Z |
| CVE-2023-1333 |
4.3 (3.1)
|
The RapidLoad Power-Up for Autoptimize plugin for… |
shakee93 |
RapidLoad Power-Up for Autoptimize |
2023-03-10T19:02:13.023Z | 2025-01-13T17:00:29.847Z |
| CVE-2026-26021 |
9.4 (4.0)
|
Prototype pollution in set-in |
ahdinosaur |
set-in |
2026-02-11T21:18:50.084Z | 2026-02-12T21:16:04.618Z |
| CVE-2026-26226 |
5.3 (4.0)
|
beautiful-mermaid < 0.1.3 SVG Attribute Injection |
lukilabs |
beautiful-mermaid |
2026-02-13T16:35:06.252Z | 2026-02-13T16:58:09.961Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-13444 | OS Command Injection Remote Code Execution Vulnerability in API in Progress LoadMaster allows an au… | 2026-01-13T15:15:57.913 | 2026-02-13T21:46:29.560 |
| fkie_cve-2023-47240 | Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Codeboxr CBX Map for Google… | 2023-11-16T19:15:07.913 | 2026-02-13T21:45:46.313 |
| fkie_cve-2026-22549 | A vulnerability exists in F5 BIG-IP Container Ingress Services that may allow excessive permissions… | 2026-02-04T16:16:19.290 | 2026-02-13T21:45:34.677 |
| fkie_cve-2026-22548 | When a BIG-IP Advanced WAF or ASM security policy is configured on a virtual server, undisclosed re… | 2026-02-04T15:16:14.913 | 2026-02-13T21:44:47.250 |
| fkie_cve-2026-20732 | A vulnerability exists in an undisclosed BIG-IP Configuration utility page that may allow an attack… | 2026-02-04T15:16:14.740 | 2026-02-13T21:44:33.627 |
| fkie_cve-2023-1346 | The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request For… | 2023-03-10T20:15:11.203 | 2026-02-13T21:44:25.630 |
| fkie_cve-2023-1333 | The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized loss of d… | 2023-03-10T20:15:10.060 | 2026-02-13T21:44:17.270 |
| fkie_cve-2026-26021 | set-in provides the set value of nested associative structure given array of keys. A prototype poll… | 2026-02-11T22:15:52.077 | 2026-02-13T21:43:27.900 |
| fkie_cve-2026-26226 | beautiful-mermaid versions prior to 0.1.3 contain an SVG attribute injection issue that can lead to… | 2026-02-13T17:16:14.073 | 2026-02-13T21:43:11.137 |
| fkie_cve-2026-26221 | Hyland OnBase contains an unauthenticated .NET Remoting exposure in the OnBase Workflow Timer Servi… | 2026-02-13T16:16:11.683 | 2026-02-13T21:43:11.137 |
| fkie_cve-2026-26208 | ADB Explorer is a fluent UI for ADB on Windows. Prior to Beta 0.9.26020, ADB Explorer is vulnerable… | 2026-02-13T19:17:29.420 | 2026-02-13T21:43:11.137 |
| fkie_cve-2025-69770 | A zip slip vulnerability in the /DesignTools/SkinList.aspx endpoint of MojoPortal CMS v2.9.0.1 allo… | 2026-02-13T18:16:18.043 | 2026-02-13T21:43:11.137 |
| fkie_cve-2025-66676 | An issue in IObit Unlocker v1.3.0.11 allows attackers to cause a Denial of Service (DoS) via a craf… | 2026-02-13T18:16:17.923 | 2026-02-13T21:43:11.137 |
| fkie_cve-2025-1790 | Local privilege escalation in Genetec Sipelia Plugin. An authenticated low-privileged Windows user … | 2026-02-13T17:16:10.917 | 2026-02-13T21:43:11.137 |
| fkie_cve-2026-26012 | vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitward… | 2026-02-11T22:15:51.703 | 2026-02-13T21:41:01.003 |
| fkie_cve-2024-50619 | Vulnerabilities in the My Account and User Management components in CIPPlanner CIPAce before 9.17 a… | 2026-02-11T22:15:50.020 | 2026-02-13T21:39:22.347 |
| fkie_cve-2024-50617 | Vulnerabilities in the File Download and Get File handler components in CIPPlanner CIPAce before 9.… | 2026-02-11T22:15:49.877 | 2026-02-13T21:38:59.390 |
| fkie_cve-2025-32709 | Null pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized atta… | 2025-05-13T17:16:04.020 | 2026-02-13T21:37:17.017 |
| fkie_cve-2026-20045 | A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications … | 2026-01-21T17:16:08.077 | 2026-02-13T21:37:06.717 |
| fkie_cve-2026-20730 | A vulnerability exists in BIG-IP Edge Client and browser VPN clients on Windows that may allow atta… | 2026-02-04T15:16:14.570 | 2026-02-13T21:36:18.327 |
| fkie_cve-2026-1642 | A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport L… | 2026-02-04T15:16:14.190 | 2026-02-13T21:35:01.730 |
| fkie_cve-2026-26010 | OpenMetadata is a unified metadata platform. Prior to 1.11.8, calls issued by the UI against /api/v… | 2026-02-11T21:16:21.117 | 2026-02-13T21:34:48.030 |
| fkie_cve-2026-25990 | Pillow is a Python imaging library. From 10.3.0 to before 12.1.1, n out-of-bounds write may be trig… | 2026-02-11T21:16:20.670 | 2026-02-13T21:32:55.623 |
| fkie_cve-2026-25924 | Kanboard is project management software focused on Kanban methodology. Prior to 1.2.50, a security … | 2026-02-11T21:16:19.283 | 2026-02-13T21:30:01.447 |
| fkie_cve-2026-25614 | Blesta 3.x through 5.x before 5.13.3 allows object injection, aka CORE-5680. | 2026-02-03T20:15:58.913 | 2026-02-13T21:27:41.227 |
| fkie_cve-2026-25615 | Blesta 3.x through 5.x before 5.13.3 allows object injection, aka CORE-5668. | 2026-02-03T20:15:59.077 | 2026-02-13T21:26:32.380 |
| fkie_cve-2023-33498 | alist <=3.16.3 is vulnerable to Incorrect Access Control. Low privilege accounts can upload any file. | 2023-06-07T14:15:09.917 | 2026-02-13T21:26:00.150 |
| fkie_cve-2025-63647 | A NULL pointer dereference in the parse_meta function (src/httpd_daap.c) of owntone-server commit 3… | 2026-01-20T21:16:04.220 | 2026-02-13T21:25:39.097 |
| fkie_cve-2025-24054 | External control of file name or path in Windows NTLM allows an unauthorized attacker to perform sp… | 2025-03-11T17:16:27.660 | 2026-02-13T21:25:23.527 |
| fkie_cve-2023-4911 | A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the G… | 2023-10-03T18:15:10.463 | 2026-02-13T21:25:07.227 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-vjp6-rfgp-h63q |
7.2 (3.1)
|
A post‑authentication command injection vulnerability in the Dynamic DNS (DDNS) configuration CLI c… | 2026-02-05T03:30:17Z | 2026-02-05T03:30:17Z |
| ghsa-m3h9-rrjj-r246 |
8.8 (3.1)
|
Incorrect Default Permissions vulnerability in Mitsubishi Electric Corporation FREQSHIP-mini for Wi… | 2026-02-05T03:30:17Z | 2026-02-05T03:30:17Z |
| ghsa-ccch-v5jp-xrrh |
6.3 (3.1)
5.3 (4.0)
|
A vulnerability was determined in WeKan up to 8.20. This affects an unknown part of the file packag… | 2026-02-05T03:30:17Z | 2026-02-05T03:30:17Z |
| ghsa-4xx4-65hp-28vf |
4.3 (3.1)
5.3 (4.0)
|
A vulnerability was found in WeKan up to 8.20. Affected by this issue is some unknown functionality… | 2026-02-05T03:30:17Z | 2026-02-05T03:30:17Z |
| ghsa-434x-w66g-qw3r |
5.5 (4.0)
|
bytes has integer overflow in BytesMut::reserve | 2026-02-03T19:17:46Z | 2026-02-05T00:37:18Z |
| ghsa-8jx2-rhfh-q928 |
7.8 (3.1)
|
godot-mcp has Command Injection via unsanitized projectPath | 2026-02-04T20:02:32Z | 2026-02-05T00:37:12Z |
| ghsa-hrr4-3wgr-68x3 |
9.2 (4.0)
|
Navidrome affected by Denial of Service and disk exhaustion via oversized `size` parameter in `/res… | 2026-02-04T00:14:02Z | 2026-02-05T00:37:07Z |
| ghsa-rh3r-8pxm-hg4w |
6.1 (3.1)
|
Navidrome has XSS via comment from song metadata | 2026-02-04T00:12:20Z | 2026-02-05T00:37:01Z |
| ghsa-7h2j-956f-4vf2 |
8.7 (4.0)
|
@isaacs/brace-expansion has Uncontrolled Resource Consumption | 2026-02-03T19:41:15Z | 2026-02-05T00:36:54Z |
| ghsa-j92c-7v7g-gj3f |
6.3 (4.0)
|
HtmlSanitizer has a bypass via template tag | 2026-02-03T19:22:06Z | 2026-02-05T00:36:50Z |
| ghsa-c4jr-5q7w-f6r9 |
9.1 (3.1)
|
SiYuan has Arbitrary File Write via /api/file/copyFile leading to RCE | 2026-01-29T15:15:54Z | 2026-02-05T00:36:43Z |
| ghsa-8wpc-j9q9-j5m2 |
8.7 (4.0)
|
Devtron Attributes API Unauthorized Access Leading to API Token Signing Key Leakage | 2026-02-04T19:46:10Z | 2026-02-05T00:35:42Z |
| ghsa-h395-gr6q-cpjc |
5.5 (4.0)
|
jsonwebtoken has Type Confusion that leads to potential authorization bypass | 2026-02-03T18:47:40Z | 2026-02-05T00:34:49Z |
| ghsa-gjx9-j8f8-7j74 |
9.8 (3.1)
|
JinJava Bypass through ForTag leads to Arbitrary Java Execution | 2026-02-03T17:52:55Z | 2026-02-05T00:34:36Z |
| ghsa-rxrv-835q-v5mh |
9.4 (4.0)
|
locutus is vulnerable to Prototype Pollution | 2026-02-02T22:21:54Z | 2026-02-05T00:34:23Z |
| ghsa-gx3x-vq4p-mhhv |
5.9 (3.1)
|
cert-manager-controller DoS via Specially Crafted DNS Response | 2026-02-02T22:11:06Z | 2026-02-05T00:34:16Z |
| ghsa-vw42-p2xj-xq5q |
7.8 (3.1)
8.5 (4.0)
|
Wing FTP Server 6.0.7 contains an unquoted service path vulnerability that allows local attackers t… | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ghsa-rhmf-4wxg-qfjv |
7.8 (3.1)
8.5 (4.0)
|
NETGATE Data Backup 3.0.620 contains an unquoted service path vulnerability in its NGDatBckpSrv Win… | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ghsa-qww9-42v6-p5rh |
6.3 (3.1)
5.3 (4.0)
|
A vulnerability was detected in WeKan up to 8.20. This impacts an unknown function of the file mode… | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ghsa-p229-4hc8-7fpx |
7.8 (3.1)
8.5 (4.0)
|
BartVPN 1.2.2 contains an unquoted service path vulnerability in the BartVPNService that allows loc… | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ghsa-jgmp-9p3r-pcgr |
7.8 (3.1)
8.5 (4.0)
|
Studio 5000 Logix Designer 30.01.00 contains an unquoted service path vulnerability in the FactoryT… | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ghsa-j78q-c5h2-p5c8 |
7.8 (3.1)
8.5 (4.0)
|
TexasSoft CyberPlanet 6.4.131 contains an unquoted service path vulnerability in the CCSrvProxy ser… | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ghsa-fhpp-49xq-j82w |
7.8 (3.1)
8.5 (4.0)
|
Wacom WTabletService 6.6.7-3 contains an unquoted service path vulnerability that allows local atta… | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ghsa-f4jg-44mw-m46m |
7.8 (3.1)
8.5 (4.0)
|
NCP Secure Entry Client 9.2 contains an unquoted service path vulnerability in multiple Windows ser… | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ghsa-9p4g-qfj4-pjvf |
7.8 (3.1)
8.5 (4.0)
|
ProShow Producer 9.0.3797 contains an unquoted service path vulnerability in the ScsiAccess service… | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ghsa-7w2c-4c42-p32w |
6.3 (3.1)
5.3 (4.0)
|
A vulnerability has been found in WeKan up to 8.20. Affected by this vulnerability is the function … | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ghsa-744j-m22x-5p8h |
7.8 (3.1)
8.5 (4.0)
|
GCafé 3.0 contains an unquoted service path vulnerability in the gbClientService that allows local … | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ghsa-7338-r7v4-4j5w |
8.2 (3.1)
|
The Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Trigg… | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ghsa-695q-xr4m-vpv8 |
7.8 (3.1)
8.5 (4.0)
|
Shrew Soft VPN Client 2.2.2 contains an unquoted service path vulnerability that allows local users… | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ghsa-5fgg-w666-2wmp |
7.8 (3.1)
8.5 (4.0)
|
Easy-Hide-IP 5.0.0.3 contains an unquoted service path vulnerability in the EasyRedirect service th… | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-30659 | Shell Injection vulnerability in ROS (Robot Operating System) Melodic Morenia versions RO… | 2024-04-03T05:02:29.214815Z |
| gsd-2024-30382 | An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daem… | 2024-04-03T05:02:29.214586Z |
| gsd-2024-30186 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:29.213922Z |
| gsd-2024-30983 | SQL Injection vulnerability in phpgurukul Cyber Cafe Management System Using PHP & MySQL … | 2024-04-03T05:02:29.213530Z |
| gsd-2024-30150 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.213298Z |
| gsd-2024-30226 | Deserialization of Untrusted Data vulnerability in WPDeveloper BetterDocs.This issue affe… | 2024-04-03T05:02:29.212681Z |
| gsd-2024-30332 | Foxit PDF Reader Doc Object Use-After-Free Remote Code Execution Vulnerability. This vuln… | 2024-04-03T05:02:29.212288Z |
| gsd-2024-30738 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.212047Z |
| gsd-2024-30429 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:29.211438Z |
| gsd-2024-30957 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.211154Z |
| gsd-2024-30806 | An issue was discovered in Bento4 v1.6.0-641-2-g1529b83. There is a heap overflow in AP4_… | 2024-04-03T05:02:29.210739Z |
| gsd-2024-30974 | SQL Injection vulnerability in autoexpress v.1.3.0 allows attackers to run arbitrary SQL … | 2024-04-03T05:02:29.210428Z |
| gsd-2024-30135 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.210232Z |
| gsd-2024-30902 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.210025Z |
| gsd-2024-30425 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:29.209429Z |
| gsd-2024-30200 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:29.208765Z |
| gsd-2024-30681 | An OS command injection vulnerability has been discovered in ROS2 Iron Irwini version ROS… | 2024-04-03T05:02:29.208492Z |
| gsd-2024-30712 | A shell injection vulnerability was discovered in ROS2 (Robot Operating System 2) Dashing… | 2024-04-03T05:02:29.208270Z |
| gsd-2024-30190 | A vulnerability has been identified in SCALANCE W1748-1 M12 (6GK5748-1GY01-0AA0), SCALANC… | 2024-04-03T05:02:29.208076Z |
| gsd-2024-30742 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.207880Z |
| gsd-2024-30758 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.207676Z |
| gsd-2024-30506 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:29.207092Z |
| gsd-2024-30609 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.206682Z |
| gsd-2024-30227 | Deserialization of Untrusted Data vulnerability in INFINITUM FORM Geo Controller.This iss… | 2024-04-03T05:02:29.206060Z |
| gsd-2024-30816 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.205455Z |
| gsd-2024-30663 | An issue was discovered in the default configurations of ROS (Robot Operating System) Mel… | 2024-04-03T05:02:29.205255Z |
| gsd-2024-30627 | Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the deviceId parameter f… | 2024-04-03T05:02:29.204858Z |
| gsd-2024-30573 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.204500Z |
| gsd-2024-30990 | SQL Injection vulnerability in the "Invoices" page in phpgurukul Client Management System… | 2024-04-03T05:02:29.204297Z |
| gsd-2024-30274 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.204098Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-191343 | Malicious code in @voiceflow/dtos-interact (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:27Z |
| mal-2025-191342 | Malicious code in @voiceflow/dependency-cruiser-config (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:27Z |
| mal-2025-191340 | Malicious code in @voiceflow/common (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:27Z |
| mal-2025-191339 | Malicious code in @voiceflow/commitlint-config (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:27Z |
| mal-2025-191338 | Malicious code in @voiceflow/circleci-config-sdk-orb-import (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:27Z |
| mal-2025-191337 | Malicious code in @voiceflow/chat-types (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:27Z |
| mal-2025-191336 | Malicious code in @voiceflow/body-parser (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:27Z |
| mal-2025-191335 | Malicious code in @voiceflow/base-types (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:27Z |
| mal-2025-191334 | Malicious code in @voiceflow/backend-utils (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:27Z |
| mal-2025-191333 | Malicious code in @voiceflow/api-sdk (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:27Z |
| mal-2025-191332 | Malicious code in @voiceflow/anthropic (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:27Z |
| mal-2025-191330 | Malicious code in @vishadtyagi/full-year-calendar (npm) | 2025-11-24T23:33:32Z | 2025-12-01T04:28:27Z |
| mal-2025-191329 | Malicious code in @viapip/eslint-config (npm) | 2025-11-24T23:32:56Z | 2025-12-01T04:28:27Z |
| mal-2025-191328 | Malicious code in @trpc-rate-limiter/hono (npm) | 2025-11-24T23:32:41Z | 2025-12-01T04:28:27Z |
| mal-2025-191327 | Malicious code in @trpc-rate-limiter/cloudflare (npm) | 2025-11-24T23:32:11Z | 2025-12-01T04:28:27Z |
| mal-2025-191326 | Malicious code in @trackstar/test-package (npm) | 2025-11-24T23:31:56Z | 2025-12-01T04:28:27Z |
| mal-2025-191325 | Malicious code in @trackstar/test-angular-package (npm) | 2025-11-24T23:31:25Z | 2025-12-01T04:28:27Z |
| mal-2025-191324 | Malicious code in @trackstar/react-trackstar-link-upgrade (npm) | 2025-11-24T23:30:50Z | 2025-12-01T04:28:27Z |
| mal-2025-191323 | Malicious code in @trackstar/react-trackstar-link (npm) | 2025-11-24T23:30:20Z | 2025-12-01T04:28:27Z |
| mal-2025-191322 | Malicious code in @trackstar/angular-trackstar-link (npm) | 2025-11-24T23:30:00Z | 2025-12-01T04:28:27Z |
| mal-2025-191080 | Malicious code in bytes-to-x (npm) | 2025-11-24T22:47:33Z | 2025-12-01T04:28:27Z |
| mal-2025-191079 | Malicious code in bun-plugin-httpfile (npm) | 2025-11-24T22:55:40Z | 2025-12-01T04:28:27Z |
| mal-2025-191078 | Malicious code in buffered-interpolation-babylon6 (npm) | 2025-11-24T22:55:03Z | 2025-12-01T04:28:27Z |
| mal-2025-191077 | Malicious code in blob-to-base64 (npm) | 2025-11-24T22:44:53Z | 2025-12-01T04:28:27Z |
| mal-2025-191076 | Malicious code in blinqio-executions-cli (npm) | 2025-11-24T22:45:43Z | 2025-12-01T04:28:27Z |
| mal-2025-191074 | Malicious code in better-queue-nedb (npm) | 2025-11-24T22:53:42Z | 2025-12-01T04:28:27Z |
| mal-2025-191073 | Malicious code in better-auth-nuxt (npm) | 2025-11-24T22:52:24Z | 2025-12-01T04:28:27Z |
| mal-2025-191072 | Malicious code in best_gpio_controller (npm) | 2025-11-24T22:51:34Z | 2025-12-01T04:28:27Z |
| mal-2025-191071 | Malicious code in benmostyn-frame-print (npm) | 2025-11-24T22:46:48Z | 2025-12-01T04:28:27Z |
| mal-2025-191070 | Malicious code in barebones-css (npm) | 2025-11-24T22:45:58Z | 2025-12-01T04:28:27Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2022-0119 | Ruby: Mehrere Schwachstellen | 2022-04-12T22:00:00.000+00:00 | 2025-01-08T23:00:00.000+00:00 |
| wid-sec-w-2025-0027 | Joomla: Mehrere Schwachstellen | 2025-01-07T23:00:00.000+00:00 | 2025-01-07T23:00:00.000+00:00 |
| wid-sec-w-2025-0024 | Dell PowerScale: Schwachstelle ermöglicht Denial of Service | 2025-01-07T23:00:00.000+00:00 | 2025-01-07T23:00:00.000+00:00 |
| wid-sec-w-2025-0023 | ABB AC-500: Mehrere Schwachstellen | 2025-01-07T23:00:00.000+00:00 | 2025-01-07T23:00:00.000+00:00 |
| wid-sec-w-2025-0022 | VMware Cloud Foundation: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-01-07T23:00:00.000+00:00 | 2025-01-07T23:00:00.000+00:00 |
| wid-sec-w-2025-0021 | SonicWall SSL-VPN: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-01-07T23:00:00.000+00:00 | 2025-01-07T23:00:00.000+00:00 |
| wid-sec-w-2025-0019 | Red Hat JBoss Enterprise Application Platform: Mehrere Schwachstellen | 2020-10-13T22:00:00.000+00:00 | 2025-01-07T23:00:00.000+00:00 |
| wid-sec-w-2025-0018 | Ruby: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-01-07T23:00:00.000+00:00 | 2025-01-07T23:00:00.000+00:00 |
| wid-sec-w-2024-3405 | Broadcom Fabric OS: Mehrere Schwachstellen | 2024-11-11T23:00:00.000+00:00 | 2025-01-07T23:00:00.000+00:00 |
| wid-sec-w-2024-3141 | Mitel MiCollab: Mehrere Schwachstellen | 2024-10-09T22:00:00.000+00:00 | 2025-01-07T23:00:00.000+00:00 |
| wid-sec-w-2024-3049 | Apache Lucene Replicator: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2024-09-29T22:00:00.000+00:00 | 2025-01-07T23:00:00.000+00:00 |
| wid-sec-w-2024-2208 | CODESYS: Schwachstelle ermöglicht Denial of Service | 2024-09-23T22:00:00.000+00:00 | 2025-01-07T23:00:00.000+00:00 |
| wid-sec-w-2024-2207 | Red Hat Enterprise Linux: Mehrere Schwachstellen ermöglichen Privilegieneskalation und Codeausführung | 2024-09-23T22:00:00.000+00:00 | 2025-01-07T23:00:00.000+00:00 |
| wid-sec-w-2024-1310 | IBM Java SDK: Schwachstelle ermöglicht Denial of Service | 2024-06-06T22:00:00.000+00:00 | 2025-01-07T23:00:00.000+00:00 |
| wid-sec-w-2024-1285 | CODESYS: Mehrere Schwachstellen | 2024-06-03T22:00:00.000+00:00 | 2025-01-07T23:00:00.000+00:00 |
| wid-sec-w-2024-0997 | Tinyproxy: Mehrere Schwachstellen | 2024-05-01T22:00:00.000+00:00 | 2025-01-07T23:00:00.000+00:00 |
| wid-sec-w-2024-0943 | CODESYS: Mehrere Schwachstellen | 2024-04-21T22:00:00.000+00:00 | 2025-01-07T23:00:00.000+00:00 |
| wid-sec-w-2023-1272 | Red Hat JBoss Enterprise Application Platform: Mehrere Schwachstellen | 2021-03-16T23:00:00.000+00:00 | 2025-01-07T23:00:00.000+00:00 |
| wid-sec-w-2022-0179 | E2FSProgs: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-05-16T22:00:00.000+00:00 | 2025-01-07T23:00:00.000+00:00 |
| wid-sec-w-2025-0015 | Progress Software Sitefinity: Mehrere Schwachstellen | 2025-01-06T23:00:00.000+00:00 | 2025-01-06T23:00:00.000+00:00 |
| wid-sec-w-2025-0014 | Samsung Android: Mehrere Schwachstellen | 2025-01-06T23:00:00.000+00:00 | 2025-01-06T23:00:00.000+00:00 |
| wid-sec-w-2025-0013 | Google Android: Mehrere Schwachstellen | 2025-01-06T23:00:00.000+00:00 | 2025-01-06T23:00:00.000+00:00 |
| wid-sec-w-2025-0012 | OpenVPN Connect: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-01-06T23:00:00.000+00:00 | 2025-01-06T23:00:00.000+00:00 |
| wid-sec-w-2024-1801 | SaltStack Salt: Mehrere Schwachstellen | 2020-11-03T23:00:00.000+00:00 | 2025-01-06T23:00:00.000+00:00 |
| wid-sec-w-2024-0578 | Apple macOS: Mehrere Schwachstellen | 2024-03-07T23:00:00.000+00:00 | 2025-01-06T23:00:00.000+00:00 |
| wid-sec-w-2023-0426 | IBM Spectrum Protect: Mehrere Schwachstellen | 2022-03-13T23:00:00.000+00:00 | 2025-01-06T23:00:00.000+00:00 |
| wid-sec-w-2022-0701 | Angular: Schwachstelle ermöglicht Cross-Site Scripting | 2022-07-17T22:00:00.000+00:00 | 2025-01-06T23:00:00.000+00:00 |
| wid-sec-w-2025-0010 | HCL BigFix Server Automation: Mehrere Schwachstellen | 2025-01-05T23:00:00.000+00:00 | 2025-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-0008 | F5 BIG-IP: Schwachstelle ermöglicht Denial of Service und Informationsoffenlegung | 2025-01-05T23:00:00.000+00:00 | 2025-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-0007 | Samsung Exynos: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-01-05T23:00:00.000+00:00 | 2025-01-05T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2013:0195 | Red Hat Security Advisory: JBoss Enterprise Web Platform 5.2.0 update | 2013-01-24T18:41:00+00:00 | 2026-01-28T22:54:11+00:00 |
| rhsa-2013:0194 | Red Hat Security Advisory: JBoss Enterprise Application Platform 5.2.0 update | 2013-01-24T18:07:00+00:00 | 2026-01-28T22:54:11+00:00 |
| rhsa-2013:0192 | Red Hat Security Advisory: JBoss Enterprise Application Platform 5.2.0 update | 2013-01-24T18:27:00+00:00 | 2026-01-28T22:54:11+00:00 |
| rhsa-2013:0191 | Red Hat Security Advisory: JBoss Enterprise Application Platform 5.2.0 update | 2013-01-24T18:28:00+00:00 | 2026-01-28T22:54:10+00:00 |
| rhsa-2013:0164 | Red Hat Security Advisory: jbossweb security update | 2013-01-15T19:02:00+00:00 | 2026-01-28T22:54:10+00:00 |
| rhsa-2013:0163 | Red Hat Security Advisory: jbossweb security update | 2013-01-15T18:54:00+00:00 | 2026-01-28T22:54:10+00:00 |
| rhsa-2013:0162 | Red Hat Security Advisory: JBoss Enterprise SOA Platform 4.2.0.CP05 and 4.3.0.CP05 update | 2013-01-15T18:53:00+00:00 | 2026-01-28T22:54:10+00:00 |
| rhsa-2013:0158 | Red Hat Security Advisory: tomcat6 security update | 2013-01-14T20:45:00+00:00 | 2026-01-28T22:54:09+00:00 |
| rhsa-2013:0157 | Red Hat Security Advisory: tomcat6 security update | 2013-01-14T20:43:00+00:00 | 2026-01-28T22:54:09+00:00 |
| rhsa-2013:0155 | Red Hat Security Advisory: Ruby on Rails security update | 2013-01-10T22:32:00+00:00 | 2026-01-28T22:54:09+00:00 |
| rhsa-2013:0154 | Red Hat Security Advisory: Ruby on Rails security update | 2013-01-10T20:39:00+00:00 | 2026-01-28T22:54:09+00:00 |
| rhsa-2013:0153 | Red Hat Security Advisory: Ruby on Rails security update | 2013-01-10T20:36:00+00:00 | 2026-01-28T22:54:09+00:00 |
| rhsa-2013:0151 | Red Hat Security Advisory: JBoss Enterprise Portal Platform 4.3 CP07 security update | 2013-01-10T05:36:00+00:00 | 2026-01-28T22:54:08+00:00 |
| rhsa-2013:0147 | Red Hat Security Advisory: jbossas security update | 2013-01-08T20:30:00+00:00 | 2026-01-28T22:54:08+00:00 |
| rhsa-2013:0146 | Red Hat Security Advisory: jbossweb security update | 2013-01-08T20:25:00+00:00 | 2026-01-28T22:54:08+00:00 |
| rhsa-2013:0128 | Red Hat Security Advisory: conga security, bug fix, and enhancement update | 2013-01-08T04:31:00+00:00 | 2026-01-28T22:54:08+00:00 |
| rhsa-2013:0005 | Red Hat Security Advisory: tomcat6 security update | 2013-01-03T22:49:00+00:00 | 2026-01-28T22:54:07+00:00 |
| rhsa-2013:0004 | Red Hat Security Advisory: tomcat6 security update | 2013-01-03T22:47:00+00:00 | 2026-01-28T22:54:07+00:00 |
| rhsa-2012:1592 | Red Hat Security Advisory: JBoss Enterprise Application Platform 6.0.1 update | 2012-12-18T22:23:00+00:00 | 2026-01-28T22:54:07+00:00 |
| rhsa-2012:1591 | Red Hat Security Advisory: JBoss Enterprise Application Platform 6.0.1 update | 2012-12-18T22:17:00+00:00 | 2026-01-28T22:54:07+00:00 |
| rhsa-2012:1542 | Red Hat Security Advisory: CloudForms Commons 1.1 security update | 2012-12-04T19:24:00+00:00 | 2026-01-28T22:54:07+00:00 |
| rhsa-2012:1365 | Red Hat Security Advisory: bind security update | 2012-10-12T19:39:00+00:00 | 2026-01-28T22:54:06+00:00 |
| rhsa-2012:1268 | Red Hat Security Advisory: bind security update | 2012-09-14T09:27:00+00:00 | 2026-01-28T22:54:06+00:00 |
| rhsa-2012:1267 | Red Hat Security Advisory: bind security and bug fix update | 2012-09-14T09:26:00+00:00 | 2026-01-28T22:54:06+00:00 |
| rhsa-2012:1266 | Red Hat Security Advisory: bind97 security update | 2012-09-14T09:24:00+00:00 | 2026-01-28T22:54:05+00:00 |
| rhsa-2012:1149 | Red Hat Security Advisory: sudo security and bug fix update | 2012-08-07T16:49:00+00:00 | 2026-01-28T22:54:05+00:00 |
| rhsa-2012:1125 | Red Hat Security Advisory: JBoss Enterprise SOA Platform 5.3.0 update | 2012-07-31T14:24:00+00:00 | 2026-01-28T22:54:05+00:00 |
| rhsa-2012:1123 | Red Hat Security Advisory: bind security update | 2012-07-31T03:50:00+00:00 | 2026-01-28T22:54:04+00:00 |
| rhsa-2012:1122 | Red Hat Security Advisory: bind97 security update | 2012-07-31T03:44:00+00:00 | 2026-01-28T22:54:04+00:00 |
| rhsa-2012:1116 | Red Hat Security Advisory: perl-DBD-Pg security update | 2012-07-25T16:55:00+00:00 | 2026-01-28T22:54:04+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-60720 | Windows Transport Driver Interface (TDI) Translation Driver Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60719 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60718 | Windows Administrator Protection Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60717 | Windows Broadcast DVR User Service Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60716 | DirectX Graphics Kernel Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60715 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60714 | Windows OLE Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60713 | Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60709 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60708 | Storvsp.sys Driver Denial of Service Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60707 | Multimedia Class Scheduler Service (MMCSS) Driver Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60706 | Windows Hyper-V Information Disclosure Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60705 | Windows Client-Side Caching Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60704 | Windows Kerberos Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-60703 | Windows Remote Desktop Services Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-59515 | Windows Broadcast DVR User Service Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-59514 | Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-59513 | Windows Bluetooth RFCOM Protocol Driver Information Disclosure Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-59512 | Customer Experience Improvement Program (CEIP) Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-59511 | Windows WLAN Service Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-59510 | Windows Routing and Remote Access Service (RRAS) Denial of Service Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-59509 | Windows Speech Recognition Information Disclosure Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-59508 | Windows Speech Recognition Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-59507 | Windows Speech Runtime Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-59506 | DirectX Graphics Kernel Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-59505 | Windows Smart Card Reader Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-59504 | Azure Monitor Agent Remote Code Execution Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-59499 | Microsoft SQL Server Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-59240 | Microsoft Excel Information Disclosure Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| msrc_cve-2025-47179 | Configuration Manager Elevation of Privilege Vulnerability | 2025-11-11T00:00:00.000Z | 2025-11-11T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202506-2992 | H3C Magic NX15000 10G Wi-Fi 6 Router is a high-end router for users and groups who pursue… | 2025-06-27T23:12:41.335000Z |
| var-202302-1336 | An uspecified endpoint in the web server of the switch does not properly authenticate the… | 2025-06-27T23:11:43.300000Z |
| var-202505-3492 | Exposure of file path, file size or file existence vulnerabilities in ASPECT provide atta… | 2025-06-27T23:11:39.387000Z |
| var-202505-4267 | Relative Path Traversal vulnerabilities in ASPECT allow access to file resources if sessi… | 2025-06-27T23:11:39.347000Z |
| var-202506-0800 | A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105. It has been classified as… | 2025-06-27T23:11:39.287000Z |
| var-202506-2184 | Sharp MX-3050V is a multifunctional digital copier. Shanghai Sharp Electric Co., Ltd. Sh… | 2025-06-27T23:11:38.372000Z |
| var-202506-2394 | XR500 is a router designed for e-sports. NETGEAR XR500 has an unauthorized access vulner… | 2025-06-27T23:11:38.265000Z |
| var-202506-2583 | e-STUDIO3008A is an A3-sized black-and-white digital multifunction machine with printing,… | 2025-06-27T23:11:38.158000Z |
| var-202506-2793 | H3C Magic NX15000 is a 10G Wi-Fi 6 router. H3C Magic NX15000 of H3C Technologies Co., Lt… | 2025-06-27T23:11:38.043000Z |
| var-201205-0115 | WellinTech KingSCADA 3.0 uses a cleartext base64 format for storage of passwords in user.… | 2025-06-27T23:11:30.359000Z |
| var-202506-1777 | Fujifilm Apeos C4571 is a high-speed color multifunction integrated printer. Fujifilm (C… | 2025-06-27T23:11:10.715000Z |
| var-202506-2579 | H3C NX54 is a Gigabit dual-band router that supports Wi-Fi 6 (802.11ax) protocol. H3C NX… | 2025-06-27T23:11:10.291000Z |
| var-202506-2789 | netcore NBR1005GPEV2 is a router produced by Netcore that supports multiple network funct… | 2025-06-27T23:11:10.189000Z |
| var-202506-2999 | H3C Magic NX15000 is a 10G Wi-Fi 6 router. H3C Magic NX15000 of H3C Technologies Co., Lt… | 2025-06-27T23:11:10.074000Z |
| var-202506-2382 | CentreWare Internet Services WorkCentre 3215 is a black and white laser multifunction pri… | 2025-06-27T23:09:55.037000Z |
| var-202506-2988 | HP Color LaserJet MFP M476dw is a color laser multifunction printer. HP Color LaserJet M… | 2025-06-27T23:09:54.723000Z |
| var-202505-1505 | Improper access controls in the web management portal of the Tenda RX2 Pro 16.03.30.14 al… | 2025-06-27T23:08:26.144000Z |
| var-202505-3345 | Large content vulnerabilities are present in ASPECT exposing a device to disk overutiliza… | 2025-06-27T23:08:26.057000Z |
| var-202505-4248 | Predictable filename vulnerabilities in ASPECT may expose sensitive information to a pote… | 2025-06-27T23:08:26.041000Z |
| var-202505-3882 | An escalation of privilege vulnerability in ASPECT could provide an attacker root access … | 2025-06-27T23:08:26.012000Z |
| var-202505-3144 | Weak password storage vulnerabilities exist in ASPECT if administrator credentials become… | 2025-06-27T23:08:25.996000Z |
| var-202506-1575 | NX15000 is a high-end router. H3C Technologies Co., Ltd. NX15000 has a command execution… | 2025-06-27T23:08:25.140000Z |
| var-202506-2589 | H3C Magic NX15000 is a 10G Wi-Fi 6 router. H3C Magic NX15000 of H3C Technologies Co., Lt… | 2025-06-27T23:08:20.950000Z |
| var-202506-2990 | TOSHIBA e-STUDI03505AC is a color digital multifunction printer. TOSHIBA e-STUDI03505AC … | 2025-06-27T23:08:20.679000Z |
| var-202505-1103 | Lack of access controls in the 'ate' management binary of the Tenda RX2 Pro 16.03.30.14 a… | 2025-06-27T23:06:23.678000Z |
| var-202505-2761 | Stored Absolute Path Traversal vulnerabilities in ASPECT could expose sensitive data if … | 2025-06-27T23:06:23.582000Z |
| var-202506-1772 | H3C NX15 is a home wireless router. H3C NX15 of H3C Technologies Co., Ltd. has an unauth… | 2025-06-27T23:06:22.763000Z |
| var-202506-2991 | Chengdu Zhenshi Technology Development Co., Ltd. is a high-tech research enterprise focus… | 2025-06-27T23:06:22.137000Z |
| var-201902-0127 | Mitsubishi Electric Q03/04/06/13/26UDVCPU: serial number 20081 and prior, Q04/06/13/26UDP… | 2025-06-27T23:05:24.314000Z |
| var-202505-0995 | Reuse of a static AES key and initialization vector for encrypted traffic to the 'ate' ma… | 2025-06-27T23:05:14.058000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2024:2926-1 | Security update for zziplib | 2024-08-15T07:01:40Z | 2024-08-15T07:01:40Z |
| suse-su-2024:2925-1 | Security update for zziplib | 2024-08-15T07:01:23Z | 2024-08-15T07:01:23Z |
| suse-su-2024:2923-1 | Security update for the Linux Kernel | 2024-08-15T07:01:07Z | 2024-08-15T07:01:07Z |
| suse-su-2024:2911-1 | Security update for kernel-firmware | 2024-08-14T14:18:02Z | 2024-08-14T14:18:02Z |
| suse-su-2024:2910-1 | Security update for 389-ds | 2024-08-14T14:17:45Z | 2024-08-14T14:17:45Z |
| suse-su-2024:2909-1 | Security update for openssl-1_1 | 2024-08-14T12:48:03Z | 2024-08-14T12:48:03Z |
| suse-su-2024:2908-1 | Security update for python-Pillow | 2024-08-14T12:46:45Z | 2024-08-14T12:46:45Z |
| suse-su-2024:2907-1 | Security update for python310-setuptools | 2024-08-14T11:04:06Z | 2024-08-14T11:04:06Z |
| suse-su-2024:2906-1 | Security update for python39-setuptools | 2024-08-14T09:04:09Z | 2024-08-14T09:04:09Z |
| suse-su-2024:2905-1 | Security update for webkit2gtk3 | 2024-08-14T07:48:17Z | 2024-08-14T07:48:17Z |
| suse-su-2024:2904-1 | Security update for python312-setuptools | 2024-08-14T07:32:23Z | 2024-08-14T07:32:23Z |
| suse-su-2024:2902-1 | Security update for the Linux Kernel | 2024-08-14T07:25:23Z | 2024-08-14T07:25:23Z |
| suse-su-2024:2901-1 | Security update for the Linux Kernel | 2024-08-14T07:24:46Z | 2024-08-14T07:24:46Z |
| suse-su-2024:2900-1 | Security update for python-setuptools | 2024-08-14T06:55:58Z | 2024-08-14T06:55:58Z |
| suse-su-2024:2899-1 | Security update for python-setuptools | 2024-08-14T00:38:03Z | 2024-08-14T00:38:03Z |
| suse-su-2024:2898-1 | Security update for gtk3 | 2024-08-13T14:58:06Z | 2024-08-13T14:58:06Z |
| suse-su-2024:2897-1 | Security update for gtk2 | 2024-08-13T14:57:25Z | 2024-08-13T14:57:25Z |
| suse-su-2024:2896-1 | Security update for the Linux Kernel | 2024-08-13T14:09:50Z | 2024-08-13T14:09:50Z |
| suse-su-2024:2895-1 | Security update for the Linux Kernel | 2024-08-13T14:08:42Z | 2024-08-13T14:08:42Z |
| suse-su-2024:2894-1 | Security update for the Linux Kernel | 2024-08-13T14:07:49Z | 2024-08-13T14:07:49Z |
| suse-su-2024:2893-1 | Security update for the Linux Kernel | 2024-08-13T14:06:26Z | 2024-08-13T14:06:26Z |
| suse-su-2024:2892-1 | Security update for the Linux Kernel | 2024-08-13T14:05:51Z | 2024-08-13T14:05:51Z |
| suse-su-2024:2876-1 | Security update for MozillaFirefox | 2024-08-13T10:01:46Z | 2024-08-13T10:01:46Z |
| suse-su-2024:2891-1 | Security update for openssl-1_1 | 2024-08-13T09:39:54Z | 2024-08-13T09:39:54Z |
| suse-su-2024:2890-1 | Security update for libqt5-qtbase | 2024-08-13T09:38:11Z | 2024-08-13T09:38:11Z |
| suse-su-2024:1166-2 | Security update for kubernetes1.23 | 2024-08-13T09:03:51Z | 2024-08-13T09:03:51Z |
| suse-su-2024:2883-1 | Security update for libqt5-qtbase | 2024-08-12T15:41:26Z | 2024-08-12T15:41:26Z |
| suse-su-2024:2882-1 | Security update for libqt5-qtbase | 2024-08-12T15:40:48Z | 2024-08-12T15:40:48Z |
| suse-su-2024:2881-1 | Security update for python-gunicorn | 2024-08-12T15:40:08Z | 2024-08-12T15:40:08Z |
| suse-su-2024:2880-1 | Security update for python-Twisted | 2024-08-12T15:39:09Z | 2024-08-12T15:39:09Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:11738-1 | busybox-1.35.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11737-1 | gvim-8.2.4063-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11736-1 | prosody-0.11.12-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11735-1 | kubevirt-container-disk-0.49.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11734-1 | gajim-1.3.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11733-1 | MozillaThunderbird-91.5.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11732-1 | MozillaFirefox-96.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11731-1 | libsystemd0-249.7-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11730-1 | corepack17-17.3.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11729-1 | zram-generator-1.1.1~git5.8612dbb-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11728-1 | python3-watchman-1.4.0-6.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11727-1 | liburiparser1-0.9.6-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11726-1 | rke-1.3.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11725-1 | python310-Django-4.0.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11724-1 | pcmanfm-1.3.2-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11723-1 | gnuplot-5.4.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11722-1 | spotifyd-0.3.3-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11721-1 | librav1e0-0.5.1+0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11720-1 | cargo-c-0.8.1~git0.cce1b08-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11719-1 | neomutt-20211029-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11718-1 | jawn-ast-0.14.1-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11717-1 | tuigreet-0.7.1-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11716-1 | sccache-0.2.15~git0.6b6d2f7-8.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11715-1 | rustup-1.24.3~git1.0a74fef5-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11714-1 | rustscan-2.0.1+0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11713-1 | python-lxml-doc-4.6.5-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11712-1 | libIex-3_1-30-3.1.3-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11711-1 | kanidm-1.1.0~alpha7~git0.c8468199-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11710-1 | greetd-0.8.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11709-1 | cflow-1.7-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-django-2020-24583 | 2024-03-06T10:56:12.583Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2020-13596 | 2024-03-06T10:56:25.690Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2020-13254 | 2024-03-06T10:56:35.291Z | 2025-04-03T14:40:37.652Z | |
| bit-discourse-2022-37458 | 2024-03-06T11:04:36.097Z | 2025-04-03T14:40:37.652Z | |
| bit-discourse-2022-23548 | 2024-03-06T11:07:21.771Z | 2025-04-03T14:40:37.652Z | |
| bit-discourse-2020-24327 | 2024-03-06T11:10:18.981Z | 2025-04-03T14:40:37.652Z | |
| bit-couchdb-2020-1955 | 2024-03-06T10:51:42.871Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2022-40716 | 2024-03-06T10:51:50.990Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2022-29153 | 2024-03-06T10:52:10.905Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2022-24687 | 2024-03-06T10:52:21.903Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2021-41805 | 2024-03-06T10:52:33.477Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2021-41803 | 2024-03-06T10:52:42.202Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2021-38698 | 2024-03-06T10:52:52.988Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2021-37219 | 2024-03-06T10:53:02.967Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2021-36213 | 2024-03-06T10:53:11.575Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2021-32574 | 2024-03-06T10:53:21.700Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2021-3121 | 2024-03-06T10:53:33.669Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2021-28156 | 2024-03-06T10:53:45.007Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2020-7955 | 2024-03-06T10:53:55.191Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2020-7219 | 2024-03-06T10:54:04.970Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2020-28053 | 2024-03-06T10:54:15.090Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2020-25864 | 2024-03-06T10:54:23.598Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2020-13250 | 2024-03-06T10:54:43.689Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2020-13170 | 2024-03-06T10:54:54.162Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2020-12797 | 2024-03-06T10:55:03.903Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2020-12758 | 2024-03-06T10:55:15.268Z | 2025-04-03T14:40:37.652Z | |
| bit-concourse-2022-31683 | 2024-03-06T10:50:52.308Z | 2025-04-03T14:40:37.652Z | |
| bit-clickhouse-2020-26759 | 2024-03-06T10:50:51.666Z | 2025-04-03T14:40:37.652Z | |
| bit-cassandra-2020-17516 | 2024-03-06T10:51:09.067Z | 2025-04-03T14:40:37.652Z | |
| bit-cassandra-2020-13946 | 2024-03-06T10:51:19.779Z | 2025-04-03T14:40:37.652Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-21343 | Intel Data Center GPU Flex Series缓冲区溢出漏洞 | 2025-05-28 | 2025-09-16 |
| cnvd-2025-21342 | Intel Data Center GPU Flex Series访问控制错误漏洞(CNVD-2025-21342) | 2025-05-28 | 2025-09-16 |
| cnvd-2025-21341 | Intel Data Center GPU Flex Series访问控制错误漏洞 | 2025-05-28 | 2025-09-16 |
| cnvd-2025-21335 | FoxCMS SQL注入漏洞 | 2025-09-12 | 2025-09-16 |
| cnvd-2025-21334 | WordPress Certifica跨站脚本漏洞 | 2025-09-12 | 2025-09-16 |
| cnvd-2025-21333 | WordPress Evenium插件跨站脚本漏洞 | 2025-09-12 | 2025-09-16 |
| cnvd-2025-21332 | WordPress WP Easy FAQs plugin跨站脚本漏洞 | 2025-09-15 | 2025-09-16 |
| cnvd-2025-21331 | Xen存在未明漏洞(CNVD-2025-21331) | 2025-09-15 | 2025-09-16 |
| cnvd-2025-21330 | openDCIM跨站脚本漏洞 | 2025-09-15 | 2025-09-16 |
| cnvd-2025-21329 | Tenda G3 modifyDhcpRule函数缓冲区溢出漏洞 | 2025-09-11 | 2025-09-16 |
| cnvd-2025-21328 | Tenda G3 ipMacBindListStore函数缓冲区溢出漏洞 | 2025-09-11 | 2025-09-16 |
| cnvd-2025-21327 | Tenda G3 guestWifiRuleRefresh函数缓冲区溢出漏洞 | 2025-09-11 | 2025-09-16 |
| cnvd-2025-21326 | Tenda G3 getsinglepppuser函数缓冲区溢出漏洞 | 2025-09-11 | 2025-09-16 |
| cnvd-2025-21325 | Tenda F3 goform/setWifi文件缓冲区溢出漏洞 | 2025-09-12 | 2025-09-16 |
| cnvd-2025-21324 | Tenda F3 goform/setQoS文件缓冲区溢出漏洞 | 2025-09-12 | 2025-09-16 |
| cnvd-2025-21323 | Tenda F3 goform/setParentControl文件缓冲区溢出漏洞 | 2025-09-12 | 2025-09-16 |
| cnvd-2025-21322 | Tenda F3 goform/setNAT文件portList参数缓冲区溢出漏洞 | 2025-09-12 | 2025-09-16 |
| cnvd-2025-21321 | Tenda F3 macFilterList参数缓冲区溢出漏洞 | 2025-09-12 | 2025-09-16 |
| cnvd-2025-21314 | Intel Processors信息泄露漏洞 | 2025-05-28 | 2025-09-16 |
| cnvd-2025-21313 | Intel Atom Processors信息泄露漏洞 | 2025-05-28 | 2025-09-16 |
| cnvd-2025-21387 | Fuji Electric FRENIC RHC Loader缓冲区溢出漏洞 | 2023-06-12 | 2025-09-15 |
| cnvd-2025-21386 | Fuji Electric FRENIC RHC Loader越界读取漏洞 | 2023-06-12 | 2025-09-15 |
| cnvd-2025-21385 | Fuji Electric FRENIC RHC Loader XML外部实体引用漏洞 | 2023-06-12 | 2025-09-15 |
| cnvd-2025-21384 | Tenda AC6 R7WebsSecurityHandler函数缓冲区溢出漏洞 | 2023-09-01 | 2025-09-15 |
| cnvd-2025-21383 | Tenda AC6 sub_ADF3C函数命令执行漏洞 | 2023-09-01 | 2025-09-15 |
| cnvd-2025-21382 | Tenda AC6 sub_7D858函数缓冲区溢出漏洞 | 2023-09-01 | 2025-09-15 |
| cnvd-2025-21381 | Tenda AC6 sub_73004函缓冲区溢出漏洞 | 2023-09-01 | 2025-09-15 |
| cnvd-2025-21380 | Tenda AC6 sub_3A1D0函数命令执行漏洞 | 2023-09-01 | 2025-09-15 |
| cnvd-2025-21379 | Tenda AC6 sub_34FD0函数缓冲区溢出漏洞 | 2023-09-01 | 2025-09-15 |
| cnvd-2025-21378 | Tenda AC6 initIpAddrInfo函数缓冲区溢出漏洞 | 2023-09-01 | 2025-09-15 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2022-avi-050 | Multiples vulnérabilités dans Oracle Database Server | 2022-01-19T00:00:00.000000 | 2022-01-19T00:00:00.000000 |
| certfr-2022-avi-049 | Vulnérabilité dans les produits VMware | 2022-01-19T00:00:00.000000 | 2022-01-19T00:00:00.000000 |
| certfr-2022-avi-048 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2022-01-19T00:00:00.000000 | 2022-01-19T00:00:00.000000 |
| certfr-2022-avi-047 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2022-01-19T00:00:00.000000 | 2022-01-19T00:00:00.000000 |
| certfr-2022-avi-046 | Vulnérabilité dans SolarWinds Serv-U | 2022-01-18T00:00:00.000000 | 2022-01-18T00:00:00.000000 |
| certfr-2022-avi-045 | Multiples vulnérabilités dans Postfix | 2022-01-17T00:00:00.000000 | 2022-01-17T00:00:00.000000 |
| certfr-2022-avi-044 | Vulnérabilité dans Juniper Junos | 2022-01-17T00:00:00.000000 | 2022-01-17T00:00:00.000000 |
| certfr-2022-avi-043 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2022-01-17T00:00:00.000000 | 2022-01-17T00:00:00.000000 |
| certfr-2022-avi-042 | Vulnérabilité dans Junos OS et Junos OS Evolved | 2022-01-14T00:00:00.000000 | 2022-01-14T00:00:00.000000 |
| certfr-2022-avi-041 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2022-01-14T00:00:00.000000 | 2022-01-14T00:00:00.000000 |
| certfr-2022-avi-040 | Multiples vulnérabilités dans les produits Juniper | 2022-01-13T00:00:00.000000 | 2022-01-13T00:00:00.000000 |
| certfr-2022-avi-039 | Multiples vulnérabilités dans Moxa VPort | 2022-01-13T00:00:00.000000 | 2022-01-13T00:00:00.000000 |
| certfr-2022-avi-038 | Multiples vulnérabilités dans Tenable.sc | 2022-01-13T00:00:00.000000 | 2022-01-13T00:00:00.000000 |
| certfr-2022-avi-037 | Multiples vulnérabilités dans Citrix Hypervisor | 2022-01-13T00:00:00.000000 | 2022-01-13T00:00:00.000000 |
| certfr-2022-avi-036 | Vulnérabilité dans ClamAV | 2022-01-13T00:00:00.000000 | 2022-01-13T00:00:00.000000 |
| certfr-2022-avi-035 | Multiples vulnérabilités dans IBM WebSphere | 2022-01-13T00:00:00.000000 | 2022-01-13T00:00:00.000000 |
| certfr-2022-avi-034 | Vulnérabilité dans Apple iOS et iPadOS | 2022-01-13T00:00:00.000000 | 2022-01-13T00:00:00.000000 |
| certfr-2022-avi-033 | Multiples vulnérabilités dans les produits QNAP | 2022-01-13T00:00:00.000000 | 2022-01-13T00:00:00.000000 |
| certfr-2022-avi-032 | Multiples vulnérabilités dans Palo Alto Cortex XDR | 2022-01-13T00:00:00.000000 | 2022-01-13T00:00:00.000000 |
| certfr-2022-avi-031 | Vulnérabilité dans Cisco Unified Contact Center | 2022-01-13T00:00:00.000000 | 2022-01-13T00:00:00.000000 |
| certfr-2022-avi-030 | Multiples vulnérabilités dans Synology DiskStation Manager | 2022-01-13T00:00:00.000000 | 2022-01-13T00:00:00.000000 |
| certfr-2022-avi-029 | Multiples vulnérabilités dans les produits Microsoft | 2022-01-12T00:00:00.000000 | 2022-01-12T00:00:00.000000 |
| certfr-2022-avi-028 | Vulnérabilité dans Microsoft .Net | 2022-01-12T00:00:00.000000 | 2022-01-12T00:00:00.000000 |
| certfr-2022-avi-027 | Multiples vulnérabilités dans Microsoft Windows | 2022-01-12T00:00:00.000000 | 2022-01-12T00:00:00.000000 |
| certfr-2022-avi-026 | Multiples vulnérabilités dans Microsoft Office | 2022-01-12T00:00:00.000000 | 2022-01-12T00:00:00.000000 |
| certfr-2022-avi-025 | Multiples vulnérabilités dans les produits GitLab | 2022-01-12T00:00:00.000000 | 2022-01-12T00:00:00.000000 |
| certfr-2022-avi-024 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2022-01-12T00:00:00.000000 | 2022-01-12T00:00:00.000000 |
| certfr-2022-avi-023 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2022-01-12T00:00:00.000000 | 2022-01-12T00:00:00.000000 |
| certfr-2022-avi-022 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2022-01-12T00:00:00.000000 | 2022-01-12T00:00:00.000000 |
| certfr-2022-avi-021 | Multiples vulnérabilités dans Thunderbird | 2022-01-12T00:00:00.000000 | 2022-01-12T00:00:00.000000 |