Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-27022 |
6.5 (3.1)
|
RediSearch Query Injection in @langchain/langgraph-che… |
langchain-ai |
langgraphjs |
2026-02-20T21:06:53.773Z | 2026-02-24T18:33:25.127Z |
| CVE-2026-27020 |
5.3 (4.0)
|
Photobooth has a XSS vulnerability in user input |
lukas12000 |
photobooth |
2026-02-20T21:03:42.431Z | 2026-02-24T18:31:33.136Z |
| CVE-2026-27190 |
8.1 (3.1)
|
Deno has a Command Injection via Incomplete shell meta… |
denoland |
deno |
2026-02-20T20:52:11.468Z | 2026-02-24T18:30:43.652Z |
| CVE-2026-27470 |
8.8 (3.1)
|
ZoneMinder: Second-Order SQL Injection in `getNearEven… |
ZoneMinder |
zoneminder |
2026-02-21T08:05:01.073Z | 2026-02-24T18:29:37.068Z |
| CVE-2026-2798 |
8.8 (3.1)
|
Use-after-free in the DOM: Core & HTML component |
Mozilla |
Firefox |
2026-02-24T13:33:28.034Z | 2026-02-24T18:25:31.688Z |
| CVE-2026-27479 |
7.7 (3.1)
|
Wallos: SSRF via Redirect Bypass in Logo/Icon URL Fetch |
ellite |
Wallos |
2026-02-21T08:15:19.953Z | 2026-02-24T18:24:31.376Z |
| CVE-2026-27487 |
7.6 (3.1)
|
OpenClaw: Prevent shell injection in macOS keychain cr… |
openclaw |
openclaw |
2026-02-21T09:35:28.935Z | 2026-02-24T18:21:54.882Z |
| CVE-2026-27486 |
4.3 (4.0)
|
OpenClaw: Process Safety - Unvalidated PID Kill via SI… |
openclaw |
openclaw |
2026-02-21T09:32:45.418Z | 2026-02-24T18:20:44.858Z |
| CVE-2026-23984 |
7.1 (4.0)
|
Apache Superset: SQLLab Read-Only Bypass on PostgreSQL |
Apache Software Foundation |
Apache Superset |
2026-02-24T12:51:07.027Z | 2026-02-24T18:19:39.664Z |
| CVE-2026-23983 |
2.3 (4.0)
|
Apache Superset: Sensitive Data Exposure via REST API … |
Apache Software Foundation |
Apache Superset |
2026-02-24T12:52:11.347Z | 2026-02-24T18:19:38.494Z |
| CVE-2026-23982 |
7.1 (4.0)
|
Apache Superset: Improper Authorization in Dataset Cre… |
Apache Software Foundation |
Apache Superset |
2026-02-24T12:52:44.361Z | 2026-02-24T18:19:37.487Z |
| CVE-2026-23980 |
5.3 (4.0)
|
Apache Superset: Improper Neutralization of Special El… |
Apache Software Foundation |
Apache Superset |
2026-02-24T12:54:09.946Z | 2026-02-24T18:19:36.414Z |
| CVE-2026-23969 |
5.3 (4.0)
|
Apache Superset: Exposure of Sensitive Information via… |
Apache Software Foundation |
Apache Superset |
2026-02-24T13:02:55.287Z | 2026-02-24T18:19:35.336Z |
| CVE-2026-27485 |
4.6 (4.0)
|
OpenClaw affected by Stored XSS in Control UI via unsa… |
openclaw |
openclaw |
2026-02-21T09:27:53.172Z | 2026-02-24T18:15:59.411Z |
| CVE-2026-27484 |
2.3 (4.0)
|
OpenClaw Discord moderation authorization used untrust… |
openclaw |
openclaw |
2026-02-21T09:21:16.568Z | 2026-02-24T18:14:56.099Z |
| CVE-2026-27480 |
5.3 (3.1)
|
Static Web Server: Timing-Based Username Enumeration i… |
static-web-server |
static-web-server |
2026-02-21T09:14:30.376Z | 2026-02-24T18:13:51.921Z |
| CVE-2026-25603 |
6.6 (3.1)
|
Path Traversal vulnerability in Linksys MR9600, Linksy… |
Linksys |
MR9600 |
2026-02-24T17:14:36.141Z | 2026-02-24T18:13:33.449Z |
| CVE-2026-27488 |
6.9 (4.0)
|
OpenClaw hardened cron webhook delivery against SSRF |
openclaw |
openclaw |
2026-02-21T09:49:04.956Z | 2026-02-24T18:12:40.027Z |
| CVE-2026-27576 |
4.8 (4.0)
|
OpenClaw: ACP prompt-size checks missing in local stdi… |
openclaw |
openclaw |
2026-02-21T10:00:12.193Z | 2026-02-24T18:11:33.124Z |
| CVE-2026-27574 |
10 (3.1)
|
OneUptime: node:vm sandbox escape in probe allows any … |
OneUptime |
oneuptime |
2026-02-21T10:13:03.840Z | 2026-02-24T18:10:23.455Z |
| CVE-2026-3069 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
itsourcecode Document Management System edtlbls.php sq… |
itsourcecode |
Document Management System |
2026-02-24T04:02:08.442Z | 2026-02-24T18:10:09.581Z |
| CVE-2026-27492 |
4.7 (3.1)
|
Lettermint Node.js SDK leaks email properties to unint… |
lettermint |
lettermint-node |
2026-02-21T10:16:03.913Z | 2026-02-24T18:08:44.011Z |
| CVE-2026-27579 |
7.4 (3.1)
|
CollabPlatform : CORS Misconfiguration Allows Arbitrar… |
karnop |
realtime-collaboration-platform |
2026-02-21T10:22:15.671Z | 2026-02-24T18:07:30.160Z |
| CVE-2026-1787 |
4.8 (3.1)
|
LearnPress Export Import <= 4.1.0 - Missing Authentica… |
thimpress |
LearnPress – Backup & Migration Tool |
2026-02-21T10:37:17.153Z | 2026-02-24T18:03:03.057Z |
| CVE-2026-2804 |
5.4 (3.1)
|
Use-after-free in the JavaScript: WebAssembly component |
Mozilla |
Firefox |
2026-02-24T13:33:32.144Z | 2026-02-24T17:30:44.942Z |
| CVE-2026-2802 |
4.2 (3.1)
|
Race condition in the JavaScript: GC component |
Mozilla |
Firefox |
2026-02-24T13:33:30.784Z | 2026-02-24T17:30:44.158Z |
| CVE-2026-2771 |
N/A
|
Undefined behavior in the DOM: Core & HTML component |
Mozilla |
Firefox |
2026-02-24T13:33:08.538Z | 2026-02-24T17:30:25.709Z |
| CVE-2026-2769 |
8.8 (3.1)
|
Use-after-free in the Storage: IndexedDB component |
Mozilla |
Firefox |
2026-02-24T13:33:06.912Z | 2026-02-24T17:30:21.670Z |
| CVE-2025-15589 |
5.1 (4.0)
3.8 (3.1)
3.8 (3.0)
|
MuYuCMS Template Management Template.php delete_dir_fi… |
n/a |
MuYuCMS |
2026-02-24T05:52:29.889Z | 2026-02-24T17:24:16.995Z |
| CVE-2026-3070 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
SourceCodester Modern Image Gallery App upload.php cro… |
SourceCodester |
Modern Image Gallery App |
2026-02-24T04:32:08.072Z | 2026-02-24T17:13:37.627Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-24323 |
6.1 (3.1)
|
Multiple vulnerabilities in BSP Applications of SAP Do… |
SAP_SE |
SAP Document Management System |
2026-02-10T03:04:11.848Z | 2026-02-10T16:22:54.274Z |
| CVE-2026-25478 |
7.4 (3.1)
|
Litestar has a CORS origin allowlist bypass due to une… |
litestar-org |
litestar |
2026-02-09T18:46:56.445Z | 2026-02-10T16:01:16.807Z |
| CVE-2026-24324 |
6.5 (3.1)
|
Denial of service (DOS) vulnerability in SAP BusinessO… |
SAP_SE |
SAP BusinessObjects Business Intelligence Platform (AdminTools) |
2026-02-10T03:04:21.162Z | 2026-02-10T16:17:50.858Z |
| CVE-2026-24325 |
4.8 (3.1)
|
Cross Site Scripting (XSS) vulnerability in SAP Busine… |
SAP_SE |
SAP BusinessObjects Enterprise (Central Management Console) |
2026-02-10T03:04:30.133Z | 2026-02-10T16:16:25.107Z |
| CVE-2025-64781 |
4.7 (3.0)
5.1 (4.0)
|
In GroupSession Free edition prior to ver5.7.1, G… |
Japan Total System Co.,Ltd. |
GroupSession Free edition |
2025-12-12T05:02:58.824Z | 2025-12-12T20:26:03.855Z |
| CVE-2026-25479 |
6.5 (3.1)
|
Litestar has an AllowedHosts validation bypass due to … |
litestar-org |
litestar |
2026-02-09T18:48:19.971Z | 2026-02-10T16:01:11.941Z |
| CVE-2026-24326 |
4.3 (3.1)
|
Missing authorization check in SAP S/4HANA Defense & S… |
SAP_SE |
SAP S/4HANA Defense & Security (Disconnected Operations) |
2026-02-10T03:04:39.908Z | 2026-02-10T16:15:32.371Z |
| CVE-2026-25480 |
6.5 (3.1)
|
FileStore key canonicalization collisions allow respon… |
litestar-org |
litestar |
2026-02-09T18:49:34.305Z | 2026-02-10T16:01:06.327Z |
| CVE-2026-24327 |
4.3 (3.1)
|
Missing Authorization Check in SAP Strategic Enterpris… |
SAP_SE |
SAP Strategic Enterprise Management (Balanced Scorecard in BSP Application) |
2026-02-10T03:04:46.790Z | 2026-02-10T16:12:07.367Z |
| CVE-2025-11547 |
7.8 (3.1)
|
AXIS Camera Station Pro contained a flaw to perfo… |
Axis Communications AB |
AXIS Camera Station Pro |
2026-02-10T05:35:50.903Z | 2026-02-26T15:04:12.686Z |
| CVE-2026-24328 |
6.1 (3.1)
|
Open Redirection vulnerability in Business Server Page… |
SAP_SE |
Business Server Pages Application (TAF_APPLAUNCHER) |
2026-02-10T03:04:54.749Z | 2026-02-10T15:41:55.313Z |
| CVE-2025-12757 |
4.6 (3.1)
|
An AXIS Camera Station Pro feature can be exploit… |
Axis Communications AB |
AXIS Camera Station Pro |
2026-02-10T05:47:20.339Z | 2026-02-10T20:16:37.549Z |
| CVE-2025-13064 |
4.5 (3.1)
|
A server-side injection was possible for a malici… |
Axis Communications AB |
AXIS Camera Station Pro |
2026-02-10T05:40:34.374Z | 2026-02-10T20:16:16.016Z |
| CVE-2025-65120 |
6.1 (3.0)
5.1 (4.0)
|
Reflected cross-site scripting vulnerability exis… |
Japan Total System Co.,Ltd. |
GroupSession Free edition |
2025-12-12T05:02:03.882Z | 2025-12-12T18:45:07.474Z |
| CVE-2025-12063 |
5.7 (3.1)
|
An insecure direct object reference allowed a non… |
Axis Communications AB |
AXIS Camera Station Pro |
2026-02-10T05:52:35.732Z | 2026-02-10T20:16:58.729Z |
| CVE-2026-2259 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
aardappel lobster Parsing parser.h ParseStatements mem… |
aardappel |
lobster |
2026-02-10T02:32:08.234Z | 2026-02-23T10:01:39.324Z |
| CVE-2025-66284 |
5.4 (3.0)
4.8 (4.0)
|
Stored cross-site scripting vulnerabilities exist… |
Japan Total System Co.,Ltd. |
GroupSession Free edition |
2025-12-12T05:01:37.675Z | 2025-12-12T18:43:52.015Z |
| CVE-2026-25956 |
6.1 (3.1)
|
Frappe Affected by XSS and Open Redirect in Sign Up |
frappe |
frappe |
2026-02-10T17:39:20.430Z | 2026-02-10T19:27:58.893Z |
| CVE-2025-70083 |
7.8 (3.1)
|
An issue was discovered in OpenSatKit 2.2.1. The … |
n/a |
n/a |
2026-02-11T00:00:00.000Z | 2026-02-12T14:55:55.149Z |
| CVE-2025-70084 |
7.5 (3.1)
|
Directory traversal vulnerability in OpenSatKit 2… |
n/a |
n/a |
2026-02-11T00:00:00.000Z | 2026-02-12T14:58:06.498Z |
| CVE-2025-70085 |
9.8 (3.1)
|
An issue was discovered in OpenSatKit 2.2.1. The … |
n/a |
n/a |
2026-02-11T00:00:00.000Z | 2026-02-12T15:02:00.414Z |
| CVE-2024-50618 |
4.3 (3.1)
|
A Use of Single-factor Authentication vulnerabili… |
n/a |
n/a |
2026-02-11T00:00:00.000Z | 2026-02-12T21:05:27.762Z |
| CVE-2025-70091 |
6.5 (3.1)
|
A cross-site scripting (XSS) vulnerability in the… |
n/a |
n/a |
2026-02-13T00:00:00.000Z | 2026-02-13T16:35:01.441Z |
| CVE-2025-70093 |
7.4 (3.1)
|
An issue in OpenSourcePOS v3.4.1 allows attackers… |
n/a |
n/a |
2026-02-13T00:00:00.000Z | 2026-02-13T21:04:14.693Z |
| CVE-2025-70094 |
6.5 (3.1)
|
A cross-site scripting (XSS) vulnerability in the… |
n/a |
n/a |
2026-02-13T00:00:00.000Z | 2026-02-13T16:36:56.152Z |
| CVE-2025-70095 |
6.5 (3.1)
|
A cross-site scripting (XSS) vulnerability in the… |
n/a |
n/a |
2026-02-13T00:00:00.000Z | 2026-02-13T16:33:57.399Z |
| CVE-2025-67737 |
3.1 (3.1)
|
AzuraCast Vulnerable to Pre-Auth File Deletion & Admin RCE |
AzuraCast |
AzuraCast |
2025-12-12T06:53:15.213Z | 2025-12-12T20:39:38.708Z |
| CVE-2026-24854 |
8.8 (3.1)
|
Church CRM has SQL injection in PaddleNumEditor.php |
ChurchCRM |
CRM |
2026-01-30T15:05:12.017Z | 2026-01-30T15:57:32.491Z |
| CVE-2026-24855 |
7.2 (4.0)
|
ChurchCRM has Stored Cross-Site Scripting (XSS) in Cre… |
ChurchCRM |
CRM |
2026-01-30T15:08:31.006Z | 2026-01-30T15:50:58.147Z |
| CVE-2026-1731 |
9.9 (4.0)
|
Remote code execution vulnerability in BeyondTrust Rem… |
BeyondTrust |
Remote Support(RS) & Privileged Remote Access(PRA) |
2026-02-06T21:49:20.844Z | 2026-02-26T15:04:15.451Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-25478 | Litestar is an Asynchronous Server Gateway Interface (ASGI) framework. Prior to 2.20.0, CORSConfig.… | 2026-02-09T20:15:57.017 | 2026-02-17T15:15:29.523 |
| fkie_cve-2026-24324 | SAP BusinessObjects Business Intelligence Platform (AdminTools) allows an authenticated attacker wi… | 2026-02-10T04:16:04.630 | 2026-02-17T15:15:09.090 |
| fkie_cve-2026-24325 | SAP BusinessObjects Enterprise does not sufficiently encode user-controlled inputs, leading to Stor… | 2026-02-10T04:16:04.790 | 2026-02-17T15:14:43.317 |
| fkie_cve-2025-64781 | In GroupSession Free edition prior to ver5.7.1, GroupSession byCloud prior to ver5.7.1, and GroupSe… | 2025-12-12T05:16:11.623 | 2026-02-17T15:14:09.757 |
| fkie_cve-2026-25479 | Litestar is an Asynchronous Server Gateway Interface (ASGI) framework. Prior to 2.20.0, in litestar… | 2026-02-09T20:15:57.177 | 2026-02-17T15:14:04.910 |
| fkie_cve-2026-24326 | Due to a missing authorization check in the Disconnected Operations of the SAP S/4HANA Defense & Se… | 2026-02-10T04:16:04.950 | 2026-02-17T15:13:03.900 |
| fkie_cve-2026-25480 | Litestar is an Asynchronous Server Gateway Interface (ASGI) framework. Prior to 2.20.0, FileStore m… | 2026-02-09T20:15:57.330 | 2026-02-17T15:12:34.963 |
| fkie_cve-2026-24327 | Due to missing authorization check in SAP Strategic Enterprise Management (Balanced Scorecard in Bu… | 2026-02-10T04:16:05.113 | 2026-02-17T15:12:00.680 |
| fkie_cve-2025-11547 | AXIS Camera Station Pro contained a flaw to perform a privilege escalation attack on the server as … | 2026-02-10T06:15:53.903 | 2026-02-17T15:10:57.130 |
| fkie_cve-2026-24328 | SAP TAF_APPLAUNCHER within Business Server Pages allows unauthenticated attacker to craft malicious… | 2026-02-10T04:16:05.273 | 2026-02-17T15:10:34.963 |
| fkie_cve-2025-12757 | An AXIS Camera Station Pro feature can be exploited in a way that allows a non-admin user to view i… | 2026-02-10T06:15:54.037 | 2026-02-17T15:10:09.890 |
| fkie_cve-2025-13064 | A server-side injection was possible for a malicious admin to manipulate the application to include… | 2026-02-10T06:15:54.170 | 2026-02-17T15:10:00.157 |
| fkie_cve-2025-65120 | Reflected cross-site scripting vulnerability exists in GroupSession Free edition prior to ver5.7.1,… | 2025-12-12T05:16:12.000 | 2026-02-17T15:09:46.407 |
| fkie_cve-2025-12063 | An insecure direct object reference allowed a non-admin user to modify or remove certain data objec… | 2026-02-10T07:16:12.553 | 2026-02-17T15:09:06.027 |
| fkie_cve-2026-2259 | A vulnerability has been found in aardappel lobster up to 2025.4. Affected by this issue is the fun… | 2026-02-10T04:16:05.433 | 2026-02-17T15:08:39.840 |
| fkie_cve-2025-66284 | Stored cross-site scripting vulnerabilities exist in GroupSession Free edition prior to ver5.7.1, G… | 2025-12-12T05:16:12.230 | 2026-02-17T15:07:21.693 |
| fkie_cve-2026-25956 | Frappe is a full-stack web application framework. Prior to 14.99.14 and 15.94.0, an attacker could … | 2026-02-10T18:16:38.653 | 2026-02-17T15:05:39.610 |
| fkie_cve-2025-70083 | An issue was discovered in OpenSatKit 2.2.1. The DirName field in the telecommand is provided by th… | 2026-02-11T18:16:06.337 | 2026-02-17T15:03:48.430 |
| fkie_cve-2025-70084 | Directory traversal vulnerability in OpenSatKit 2.2.1 allows attackers to gain access to sensitive … | 2026-02-11T18:16:06.483 | 2026-02-17T15:03:33.090 |
| fkie_cve-2025-70085 | An issue was discovered in OpenSatKit 2.2.1. The EventErrStr buffer has a fixed size of 256 bytes. … | 2026-02-11T18:16:06.600 | 2026-02-17T15:02:22.943 |
| fkie_cve-2024-50618 | A Use of Single-factor Authentication vulnerability in the Authentication component of CIPPlanner C… | 2026-02-11T20:16:07.017 | 2026-02-17T15:01:29.567 |
| fkie_cve-2025-70091 | A cross-site scripting (XSS) vulnerability in the Customers function of OpenSourcePOS v3.4.1 allows… | 2026-02-13T16:16:10.760 | 2026-02-17T15:00:22.087 |
| fkie_cve-2025-70093 | An issue in OpenSourcePOS v3.4.1 allows attackers to execute arbitrary code via returning a crafted… | 2026-02-13T16:16:10.867 | 2026-02-17T14:59:41.803 |
| fkie_cve-2025-70094 | A cross-site scripting (XSS) vulnerability in the Generate Item Barcode function of OpenSourcePOS v… | 2026-02-13T16:16:10.977 | 2026-02-17T14:59:24.453 |
| fkie_cve-2025-70095 | A cross-site scripting (XSS) vulnerability in the item management and sales invoice function of Ope… | 2026-02-13T16:16:11.080 | 2026-02-17T14:59:05.980 |
| fkie_cve-2025-67737 | AzuraCast is a self-hosted, all-in-one web radio management suite. Versions 0.23.1 mistakenly inclu… | 2025-12-12T07:15:45.417 | 2026-02-17T14:52:29.713 |
| fkie_cve-2026-24854 | ChurchCRM is an open-source church management system. A SQL Injection vulnerability exists in endpo… | 2026-01-30T16:16:13.620 | 2026-02-17T14:33:24.433 |
| fkie_cve-2026-24855 | ChurchCRM is an open-source church management system. Versions prior to 6.7.2 have a Stored Cross-S… | 2026-01-30T16:16:13.790 | 2026-02-17T14:32:44.697 |
| fkie_cve-2026-1731 | BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contai… | 2026-02-06T22:16:11.020 | 2026-02-17T13:40:10.320 |
| fkie_cve-2026-20620 | An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in ma… | 2026-02-11T23:16:05.577 | 2026-02-17T13:32:00.920 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-2448-826c-4v5m |
8.8 (3.1)
|
An unauthenticated remote attacker can trick a high privileged user into uploading a malicious payl… | 2026-01-13T09:31:30Z | 2026-02-05T09:31:12Z |
| ghsa-vjp6-rfgp-h63q |
7.2 (3.1)
|
A post‑authentication command injection vulnerability in the Dynamic DNS (DDNS) configuration CLI c… | 2026-02-05T03:30:17Z | 2026-02-05T03:30:17Z |
| ghsa-m3h9-rrjj-r246 |
8.8 (3.1)
|
Incorrect Default Permissions vulnerability in Mitsubishi Electric Corporation FREQSHIP-mini for Wi… | 2026-02-05T03:30:17Z | 2026-02-05T03:30:17Z |
| ghsa-ccch-v5jp-xrrh |
6.3 (3.1)
5.3 (4.0)
|
A vulnerability was determined in WeKan up to 8.20. This affects an unknown part of the file packag… | 2026-02-05T03:30:17Z | 2026-02-05T03:30:17Z |
| ghsa-4xx4-65hp-28vf |
4.3 (3.1)
5.3 (4.0)
|
A vulnerability was found in WeKan up to 8.20. Affected by this issue is some unknown functionality… | 2026-02-05T03:30:17Z | 2026-02-05T03:30:17Z |
| ghsa-434x-w66g-qw3r |
5.5 (4.0)
|
bytes has integer overflow in BytesMut::reserve | 2026-02-03T19:17:46Z | 2026-02-05T00:37:18Z |
| ghsa-8jx2-rhfh-q928 |
7.8 (3.1)
|
godot-mcp has Command Injection via unsanitized projectPath | 2026-02-04T20:02:32Z | 2026-02-05T00:37:12Z |
| ghsa-hrr4-3wgr-68x3 |
9.2 (4.0)
|
Navidrome affected by Denial of Service and disk exhaustion via oversized `size` parameter in `/res… | 2026-02-04T00:14:02Z | 2026-02-05T00:37:07Z |
| ghsa-rh3r-8pxm-hg4w |
6.1 (3.1)
|
Navidrome has XSS via comment from song metadata | 2026-02-04T00:12:20Z | 2026-02-05T00:37:01Z |
| ghsa-7h2j-956f-4vf2 |
8.7 (4.0)
|
@isaacs/brace-expansion has Uncontrolled Resource Consumption | 2026-02-03T19:41:15Z | 2026-02-05T00:36:54Z |
| ghsa-j92c-7v7g-gj3f |
6.3 (4.0)
|
HtmlSanitizer has a bypass via template tag | 2026-02-03T19:22:06Z | 2026-02-05T00:36:50Z |
| ghsa-c4jr-5q7w-f6r9 |
9.1 (3.1)
|
SiYuan has Arbitrary File Write via /api/file/copyFile leading to RCE | 2026-01-29T15:15:54Z | 2026-02-05T00:36:43Z |
| ghsa-8wpc-j9q9-j5m2 |
8.7 (4.0)
|
Devtron Attributes API Unauthorized Access Leading to API Token Signing Key Leakage | 2026-02-04T19:46:10Z | 2026-02-05T00:35:42Z |
| ghsa-h395-gr6q-cpjc |
5.5 (4.0)
|
jsonwebtoken has Type Confusion that leads to potential authorization bypass | 2026-02-03T18:47:40Z | 2026-02-05T00:34:49Z |
| ghsa-gjx9-j8f8-7j74 |
9.8 (3.1)
|
JinJava Bypass through ForTag leads to Arbitrary Java Execution | 2026-02-03T17:52:55Z | 2026-02-05T00:34:36Z |
| ghsa-rxrv-835q-v5mh |
9.4 (4.0)
|
locutus is vulnerable to Prototype Pollution | 2026-02-02T22:21:54Z | 2026-02-05T00:34:23Z |
| ghsa-vw42-p2xj-xq5q |
7.8 (3.1)
8.5 (4.0)
|
Wing FTP Server 6.0.7 contains an unquoted service path vulnerability that allows local attackers t… | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ghsa-rhmf-4wxg-qfjv |
7.8 (3.1)
8.5 (4.0)
|
NETGATE Data Backup 3.0.620 contains an unquoted service path vulnerability in its NGDatBckpSrv Win… | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ghsa-qww9-42v6-p5rh |
6.3 (3.1)
5.3 (4.0)
|
A vulnerability was detected in WeKan up to 8.20. This impacts an unknown function of the file mode… | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ghsa-p229-4hc8-7fpx |
7.8 (3.1)
8.5 (4.0)
|
BartVPN 1.2.2 contains an unquoted service path vulnerability in the BartVPNService that allows loc… | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ghsa-jgmp-9p3r-pcgr |
7.8 (3.1)
8.5 (4.0)
|
Studio 5000 Logix Designer 30.01.00 contains an unquoted service path vulnerability in the FactoryT… | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ghsa-j78q-c5h2-p5c8 |
7.8 (3.1)
8.5 (4.0)
|
TexasSoft CyberPlanet 6.4.131 contains an unquoted service path vulnerability in the CCSrvProxy ser… | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ghsa-fhpp-49xq-j82w |
7.8 (3.1)
8.5 (4.0)
|
Wacom WTabletService 6.6.7-3 contains an unquoted service path vulnerability that allows local atta… | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ghsa-f4jg-44mw-m46m |
7.8 (3.1)
8.5 (4.0)
|
NCP Secure Entry Client 9.2 contains an unquoted service path vulnerability in multiple Windows ser… | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ghsa-9p4g-qfj4-pjvf |
7.8 (3.1)
8.5 (4.0)
|
ProShow Producer 9.0.3797 contains an unquoted service path vulnerability in the ScsiAccess service… | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ghsa-7w2c-4c42-p32w |
6.3 (3.1)
5.3 (4.0)
|
A vulnerability has been found in WeKan up to 8.20. Affected by this vulnerability is the function … | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ghsa-744j-m22x-5p8h |
7.8 (3.1)
8.5 (4.0)
|
GCafé 3.0 contains an unquoted service path vulnerability in the gbClientService that allows local … | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ghsa-7338-r7v4-4j5w |
8.2 (3.1)
|
The Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Trigg… | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ghsa-695q-xr4m-vpv8 |
7.8 (3.1)
8.5 (4.0)
|
Shrew Soft VPN Client 2.2.2 contains an unquoted service path vulnerability that allows local users… | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ghsa-5fgg-w666-2wmp |
7.8 (3.1)
8.5 (4.0)
|
Easy-Hide-IP 5.0.0.3 contains an unquoted service path vulnerability in the EasyRedirect service th… | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-30077 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.193340Z |
| gsd-2024-30689 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.193146Z |
| gsd-2024-30705 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.192949Z |
| gsd-2024-30562 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.192702Z |
| gsd-2024-30493 | Cross-Site Request Forgery (CSRF) vulnerability in Andy Moyle Church Admin.This issue aff… | 2024-04-03T05:02:29.192111Z |
| gsd-2024-30286 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.191824Z |
| gsd-2024-30463 | Missing Authorization vulnerability in realmag777 BEAR.This issue affects BEAR: from n/a … | 2024-04-03T05:02:29.191227Z |
| gsd-2024-30747 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.190931Z |
| gsd-2024-30432 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:29.190309Z |
| gsd-2024-30615 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.189932Z |
| gsd-2024-30928 | SQL Injection vulnerability in DerbyNet v9.0 and below allows attackers to execute arbitr… | 2024-04-03T05:02:29.189737Z |
| gsd-2024-30794 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.189538Z |
| gsd-2024-30865 | netentsec NS-ASG 6.3 is vulnerable to SQL Injection via /admin/edit_user_login.php. | 2024-04-03T05:02:29.189154Z |
| gsd-2024-30891 | A command injection vulnerability exists in /goform/exeCommand in Tenda AC18 v15.03.05.05… | 2024-04-03T05:02:29.188777Z |
| gsd-2024-30282 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.188577Z |
| gsd-2024-30596 | Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability in the deviceId parameter … | 2024-04-03T05:02:29.188202Z |
| gsd-2024-30709 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.187942Z |
| gsd-2024-30081 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.187733Z |
| gsd-2024-30600 | Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the schedEndTime parameter of… | 2024-04-03T05:02:29.187357Z |
| gsd-2024-30542 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.187091Z |
| gsd-2024-30904 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.186870Z |
| gsd-2024-30424 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.186626Z |
| gsd-2024-30608 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.186428Z |
| gsd-2024-30651 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.186224Z |
| gsd-2024-30543 | Authorization Bypass Through User-Controlled Key vulnerability in UPQODE Whizz.This issue… | 2024-04-03T05:02:29.185641Z |
| gsd-2024-30875 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.185280Z |
| gsd-2024-30885 | Reflected Cross-Site Scripting (XSS) vulnerability in HadSky v7.6.3, allows remote attack… | 2024-04-03T05:02:29.185086Z |
| gsd-2024-30935 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.184880Z |
| gsd-2024-30621 | Tenda AX1803 v1.0.0.1 contains a stack overflow via the serverName parameter in the funct… | 2024-04-03T05:02:29.184499Z |
| gsd-2024-30568 | Netgear R6850 1.1.0.88 was discovered to contain a command injection vulnerability via th… | 2024-04-03T05:02:29.184224Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-191320 | Malicious code in @silgi/yoga (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191319 | Malicious code in @silgi/scalar (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191318 | Malicious code in @silgi/ratelimit (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191317 | Malicious code in @silgi/permission (npm) | 2025-11-24T23:28:20Z | 2025-12-01T04:28:26Z |
| mal-2025-191316 | Malicious code in @silgi/openapi (npm) | 2025-11-24T23:27:50Z | 2025-12-01T04:28:26Z |
| mal-2025-191315 | Malicious code in @silgi/module-builder (npm) | 2025-11-24T23:27:00Z | 2025-12-01T04:28:26Z |
| mal-2025-191314 | Malicious code in @silgi/graphql (npm) | 2025-11-24T23:26:24Z | 2025-12-01T04:28:26Z |
| mal-2025-191313 | Malicious code in @silgi/ecosystem (npm) | 2025-11-24T23:25:50Z | 2025-12-01T04:28:26Z |
| mal-2025-191312 | Malicious code in @silgi/drizzle (npm) | 2025-11-24T23:25:34Z | 2025-12-01T04:28:26Z |
| mal-2025-191311 | Malicious code in @silgi/better-auth (npm) | 2025-11-24T23:25:04Z | 2025-12-01T04:28:26Z |
| mal-2025-191310 | Malicious code in @sameepsi/sor2 (npm) | 2025-11-24T23:24:30Z | 2025-12-01T04:28:26Z |
| mal-2025-191309 | Malicious code in @sameepsi/sor (npm) | 2025-11-24T23:24:14Z | 2025-12-01T04:28:26Z |
| mal-2025-191308 | Malicious code in @quick-start-soft/quick-remove-image-background (npm) | 2025-11-24T23:23:43Z | 2025-12-01T04:28:26Z |
| mal-2025-191307 | Malicious code in @quick-start-soft/quick-markdown-translator (npm) | 2025-11-24T23:23:28Z | 2025-12-01T04:28:26Z |
| mal-2025-191306 | Malicious code in @quick-start-soft/quick-markdown-print (npm) | 2025-11-24T03:38:28Z | 2025-12-01T04:28:26Z |
| mal-2025-191305 | Malicious code in @productdevbook/ts-i18n (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191304 | Malicious code in @productdevbook/motion (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191303 | Malicious code in @productdevbook/chatwoot (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191302 | Malicious code in @productdevbook/auth (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191301 | Malicious code in @productdevbook/animejs-vue (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191300 | Malicious code in @posthog/zendesk-plugin (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191299 | Malicious code in @posthog/rrweb-replay (npm) | 2025-11-24T23:22:38Z | 2025-12-01T04:28:26Z |
| mal-2025-191298 | Malicious code in @posthog/postgres-plugin (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191297 | Malicious code in @posthog/netdata-event-processing (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191296 | Malicious code in @posthog/migrator3000-plugin (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191295 | Malicious code in @posthog/lemon-ui (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191294 | Malicious code in @posthog/laudspeaker-plugin (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191293 | Malicious code in @posthog/intercom-plugin (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191292 | Malicious code in @posthog/icons (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191291 | Malicious code in @posthog/heartbeat-plugin (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-3747 | Acronis Cyber Protect Cloud Agent: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-12-23T23:00:00.000+00:00 | 2024-12-23T23:00:00.000+00:00 |
| wid-sec-w-2024-1236 | IEEE 802.11 WLAN: Schwachstelle ermöglicht Umgehung von Sicherheitsmaßnahmen | 2024-05-26T22:00:00.000+00:00 | 2024-12-23T23:00:00.000+00:00 |
| wid-sec-w-2022-1380 | PostgreSQL: Mehrere Schwachstellen | 2019-08-08T22:00:00.000+00:00 | 2024-12-23T23:00:00.000+00:00 |
| wid-sec-w-2024-3741 | JetBrains TeamCity: Mehrere Schwachstellen | 2024-12-22T23:00:00.000+00:00 | 2024-12-22T23:00:00.000+00:00 |
| wid-sec-w-2024-3706 | MinIO: Schwachstelle ermöglicht Privilegieneskalation | 2024-12-16T23:00:00.000+00:00 | 2024-12-22T23:00:00.000+00:00 |
| wid-sec-w-2024-3498 | Laravel Framework: Schwachstelle ermöglicht Manipulation von Daten | 2024-11-18T23:00:00.000+00:00 | 2024-12-22T23:00:00.000+00:00 |
| wid-sec-w-2024-3121 | Microsoft Windows: Mehrere Schwachstellen | 2024-10-08T22:00:00.000+00:00 | 2024-12-22T23:00:00.000+00:00 |
| wid-sec-w-2024-3738 | Trellix ePolicy Orchestrator: Schwachstelle ermöglicht Cross-Site Scripting | 2024-12-19T23:00:00.000+00:00 | 2024-12-19T23:00:00.000+00:00 |
| wid-sec-w-2024-3737 | xwiki: Schwachstelle ermöglicht Codeausführung | 2024-12-19T23:00:00.000+00:00 | 2024-12-19T23:00:00.000+00:00 |
| wid-sec-w-2024-3735 | Sophos Firewall: Mehrere Schwachstellen | 2024-12-19T23:00:00.000+00:00 | 2024-12-19T23:00:00.000+00:00 |
| wid-sec-w-2024-3723 | BeyondTrust Privileged Remote Access und Remote Support: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Benutzerrechten | 2024-12-17T23:00:00.000+00:00 | 2024-12-19T23:00:00.000+00:00 |
| wid-sec-w-2024-3579 | Samsung Android: Mehrere Schwachstellen | 2024-12-02T23:00:00.000+00:00 | 2024-12-19T23:00:00.000+00:00 |
| wid-sec-w-2024-3288 | Apple iOS und iPadOS: Mehrere Schwachstellen | 2024-10-28T23:00:00.000+00:00 | 2024-12-19T23:00:00.000+00:00 |
| wid-sec-w-2024-3254 | Red Hat Enterprise Linux (NetworkManager-libreswan): Schwachstelle ermöglicht Privilegieneskalation | 2024-10-22T22:00:00.000+00:00 | 2024-12-19T23:00:00.000+00:00 |
| wid-sec-w-2022-0721 | Red Hat Enterprise Linux: Mehrere Schwachstellen | 2021-06-29T22:00:00.000+00:00 | 2024-12-19T23:00:00.000+00:00 |
| wid-sec-w-2024-3734 | Trend Micro Deep Security Agent: Schwachstelle ermöglicht Privilegieneskalation | 2024-12-18T23:00:00.000+00:00 | 2024-12-18T23:00:00.000+00:00 |
| wid-sec-w-2024-3731 | IBM Sterling Connect: Direct Web Service: Mehrere Schwachstellen | 2024-12-18T23:00:00.000+00:00 | 2024-12-18T23:00:00.000+00:00 |
| wid-sec-w-2024-3730 | Fortinet FortiManager: Schwachstelle ermöglicht Ausführung von Kommandos | 2024-12-18T23:00:00.000+00:00 | 2024-12-18T23:00:00.000+00:00 |
| wid-sec-w-2024-3729 | Fortinet FortiClient: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-12-18T23:00:00.000+00:00 | 2024-12-18T23:00:00.000+00:00 |
| wid-sec-w-2024-3724 | IBM Security Guardium: Schwachstelle ermöglicht Offenlegung von Netzwerkinformationen | 2024-12-18T23:00:00.000+00:00 | 2024-12-18T23:00:00.000+00:00 |
| wid-sec-w-2024-3344 | HCL BigFix WebUI: Mehrere Open Source Schwachstellen | 2024-11-05T23:00:00.000+00:00 | 2024-12-18T23:00:00.000+00:00 |
| wid-sec-w-2024-1590 | HCL BigFix: Mehrere Schwachstellen | 2024-07-10T22:00:00.000+00:00 | 2024-12-18T23:00:00.000+00:00 |
| wid-sec-w-2024-0605 | Fortinet FortiClientEMS: Mehrere Schwachstellen ermöglichen Codeausführung | 2024-03-12T23:00:00.000+00:00 | 2024-12-18T23:00:00.000+00:00 |
| wid-sec-w-2022-0941 | Red Hat OpenShift: Mehrere Schwachstellen | 2021-08-09T22:00:00.000+00:00 | 2024-12-18T23:00:00.000+00:00 |
| wid-sec-w-2022-0033 | VMware Tanzu Spring Framework: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode | 2022-03-30T22:00:00.000+00:00 | 2024-12-18T23:00:00.000+00:00 |
| wid-sec-w-2024-3721 | Liferay Liferay DXP: Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2024-12-17T23:00:00.000+00:00 | 2024-12-17T23:00:00.000+00:00 |
| wid-sec-w-2024-3720 | HCL BigFix: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-12-17T23:00:00.000+00:00 | 2024-12-17T23:00:00.000+00:00 |
| wid-sec-w-2024-3719 | Keycloak: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-12-17T23:00:00.000+00:00 | 2024-12-17T23:00:00.000+00:00 |
| wid-sec-w-2024-3718 | Elasticsearch: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-12-17T23:00:00.000+00:00 | 2024-12-17T23:00:00.000+00:00 |
| wid-sec-w-2024-3717 | IBM FileNet und Content Manager: Mehrere Schwachstellen | 2024-12-17T23:00:00.000+00:00 | 2024-12-17T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2011:1749 | Red Hat Security Advisory: libxml2 security and bug fix update | 2011-12-05T19:54:00+00:00 | 2026-01-28T22:51:41+00:00 |
| rhsa-2011:1741 | Red Hat Security Advisory: php-pear security and bug fix update | 2011-12-05T19:54:00+00:00 | 2026-01-28T22:51:41+00:00 |
| rhsa-2011:1379 | Red Hat Security Advisory: krb5 security update | 2011-10-18T22:56:00+00:00 | 2026-01-28T22:51:41+00:00 |
| rhsa-2011:0999 | Red Hat Security Advisory: rsync security, bug fix, and enhancement update | 2011-07-21T09:22:00+00:00 | 2026-01-28T22:51:41+00:00 |
| rhsa-2011:0910 | Red Hat Security Advisory: ruby security update | 2011-06-28T17:30:00+00:00 | 2026-01-28T22:51:41+00:00 |
| rhsa-2011:0909 | Red Hat Security Advisory: ruby security update | 2011-06-28T17:27:00+00:00 | 2026-01-28T22:51:40+00:00 |
| rhsa-2011:0880 | Red Hat Security Advisory: Red Hat Network Satellite server IBM Java Runtime security update | 2011-06-16T19:13:00+00:00 | 2026-01-28T22:51:40+00:00 |
| rhsa-2011:0844 | Red Hat Security Advisory: apr security update | 2011-05-31T15:42:00+00:00 | 2026-01-28T22:51:40+00:00 |
| rhsa-2011:0554 | Red Hat Security Advisory: python security, bug fix, and enhancement update | 2011-05-19T11:20:00+00:00 | 2026-01-28T22:51:39+00:00 |
| rhsa-2011:0545 | Red Hat Security Advisory: squid security and bug fix update | 2011-05-19T11:15:00+00:00 | 2026-01-28T22:51:39+00:00 |
| rhsa-2011:0492 | Red Hat Security Advisory: python security update | 2011-05-05T18:16:00+00:00 | 2026-01-28T22:51:39+00:00 |
| rhsa-2011:0491 | Red Hat Security Advisory: python security update | 2011-05-05T18:52:00+00:00 | 2026-01-28T22:51:39+00:00 |
| rhsa-2011:0413 | Red Hat Security Advisory: glibc security update | 2011-04-04T20:17:00+00:00 | 2026-01-28T22:51:39+00:00 |
| rhsa-2011:0412 | Red Hat Security Advisory: glibc security update | 2011-04-04T20:01:00+00:00 | 2026-01-28T22:51:39+00:00 |
| rhsa-2011:0370 | Red Hat Security Advisory: wireshark security update | 2011-03-21T19:38:00+00:00 | 2026-01-28T22:51:38+00:00 |
| rhsa-2011:0356 | Red Hat Security Advisory: krb5 security update | 2011-03-16T10:10:00+00:00 | 2026-01-28T22:51:38+00:00 |
| rhsa-2011:0350 | Red Hat Security Advisory: tomcat5 and tomcat6 security update | 2011-03-11T01:04:00+00:00 | 2026-01-28T22:51:38+00:00 |
| rhsa-2011:0348 | Red Hat Security Advisory: tomcat6 security update | 2011-03-11T00:35:00+00:00 | 2026-01-28T22:51:37+00:00 |
| rhsa-2011:0335 | Red Hat Security Advisory: tomcat6 security and bug fix update | 2011-03-09T20:48:00+00:00 | 2026-01-28T22:51:37+00:00 |
| rhsa-2010:0975 | Red Hat Security Advisory: bind security update | 2010-12-13T17:44:00+00:00 | 2026-01-28T22:51:37+00:00 |
| rhsa-2011:0309 | Red Hat Security Advisory: pango security update | 2011-03-01T23:40:00+00:00 | 2026-01-28T22:51:36+00:00 |
| rhsa-2011:0308 | Red Hat Security Advisory: mailman security update | 2011-03-01T22:48:00+00:00 | 2026-01-28T22:51:36+00:00 |
| rhsa-2011:0307 | Red Hat Security Advisory: mailman security update | 2011-03-01T22:42:00+00:00 | 2026-01-28T22:51:36+00:00 |
| rhsa-2011:0200 | Red Hat Security Advisory: krb5 security update | 2011-02-08T21:48:00+00:00 | 2026-01-28T22:51:36+00:00 |
| rhsa-2011:0199 | Red Hat Security Advisory: krb5 security update | 2011-02-08T21:39:00+00:00 | 2026-01-28T22:51:35+00:00 |
| rhsa-2011:0183 | Red Hat Security Advisory: openoffice.org security and bug fix update | 2011-01-28T15:20:00+00:00 | 2026-01-28T22:51:35+00:00 |
| rhsa-2011:0182 | Red Hat Security Advisory: openoffice.org security update | 2011-01-28T12:57:00+00:00 | 2026-01-28T22:51:35+00:00 |
| rhsa-2011:0181 | Red Hat Security Advisory: openoffice.org and openoffice.org2 security update | 2011-01-28T12:55:00+00:00 | 2026-01-28T22:51:34+00:00 |
| rhsa-2011:0170 | Red Hat Security Advisory: libuser security update | 2011-01-20T16:29:00+00:00 | 2026-01-28T22:51:34+00:00 |
| rhsa-2011:0164 | Red Hat Security Advisory: mysql security update | 2011-01-18T18:38:00+00:00 | 2026-01-28T22:51:33+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-58189 | ALPN negotiation error contains attacker controlled information in crypto/tls | 2025-10-02T00:00:00.000Z | 2025-10-31T01:09:20.000Z |
| msrc_cve-2025-21838 | usb: gadget: core: flush gadget workqueue after device removal | 2025-03-02T00:00:00.000Z | 2025-10-31T01:03:01.000Z |
| msrc_cve-2025-21831 | PCI: Avoid putting some root ports into D3 on TUXEDO Sirius Gen1 | 2025-03-02T00:00:00.000Z | 2025-10-31T01:02:56.000Z |
| msrc_cve-2025-53783 | Microsoft Teams Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-10-30T07:00:00.000Z |
| msrc_cve-2025-21750 | wifi: brcmfmac: Check the return value of of_property_read_string_index() | 2025-02-02T00:00:00.000Z | 2025-10-30T01:01:57.000Z |
| msrc_cve-2025-21738 | ata: libata-sff: Ensure that we cannot write outside the allocated buffer | 2025-02-02T00:00:00.000Z | 2025-10-30T01:01:51.000Z |
| msrc_cve-2025-21734 | misc: fastrpc: Fix copy buffer page size | 2025-02-02T00:00:00.000Z | 2025-10-30T01:01:46.000Z |
| msrc_cve-2023-52981 | drm/i915: Fix request ref counting during error capture & debugfs dump | 2025-03-02T00:00:00.000Z | 2025-10-30T01:01:26.000Z |
| msrc_cve-2024-58094 | jfs: add check read-only before truncation in jfs_truncate_nolock() | 2025-04-02T00:00:00.000Z | 2025-10-30T01:01:20.000Z |
| msrc_cve-2025-40071 | tty: n_gsm: Don't block input queue by waiting MSC | 2025-10-02T00:00:00.000Z | 2025-10-29T01:05:06.000Z |
| msrc_cve-2025-40079 | riscv, bpf: Sign extend struct ops return values properly | 2025-10-02T00:00:00.000Z | 2025-10-29T01:05:01.000Z |
| msrc_cve-2025-40068 | fs: ntfs3: Fix integer overflow in run_unpack() | 2025-10-02T00:00:00.000Z | 2025-10-29T01:04:55.000Z |
| msrc_cve-2025-40027 | net/9p: fix double req put in p9_fd_cancelled | 2025-10-02T00:00:00.000Z | 2025-10-29T01:04:34.000Z |
| msrc_cve-2025-11840 | GNU Binutils ldmisc.c vfinfo out-of-bounds | 2025-10-02T00:00:00.000Z | 2025-10-29T01:04:28.000Z |
| msrc_cve-2025-40049 | Squashfs: fix uninit-value in squashfs_get_parent | 2025-10-02T00:00:00.000Z | 2025-10-29T01:04:20.000Z |
| msrc_cve-2025-40081 | perf: arm_spe: Prevent overflow in PERF_IDX2OFF() | 2025-10-02T00:00:00.000Z | 2025-10-29T01:04:15.000Z |
| msrc_cve-2025-40048 | uio_hv_generic: Let userspace take care of interrupt mask | 2025-10-02T00:00:00.000Z | 2025-10-29T01:04:10.000Z |
| msrc_cve-2025-40036 | misc: fastrpc: fix possible map leak in fastrpc_put_args | 2025-10-02T00:00:00.000Z | 2025-10-29T01:04:04.000Z |
| msrc_cve-2025-40039 | ksmbd: Fix race condition in RPC handle list access | 2025-10-02T00:00:00.000Z | 2025-10-29T01:03:59.000Z |
| msrc_cve-2025-40043 | net: nfc: nci: Add parameter validation for packet data | 2025-10-02T00:00:00.000Z | 2025-10-29T01:03:54.000Z |
| msrc_cve-2025-40033 | remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable() | 2025-10-02T00:00:00.000Z | 2025-10-29T01:03:37.000Z |
| msrc_cve-2025-40077 | f2fs: fix to avoid overflow while left shift operation | 2025-10-02T00:00:00.000Z | 2025-10-29T01:03:32.000Z |
| msrc_cve-2025-40032 | PCI: endpoint: pci-epf-test: Add NULL check for DMA channels before release | 2025-10-02T00:00:00.000Z | 2025-10-29T01:03:26.000Z |
| msrc_cve-2025-40080 | nbd: restrict sockets to TCP and UDP | 2025-10-02T00:00:00.000Z | 2025-10-29T01:03:21.000Z |
| msrc_cve-2025-40060 | coresight: trbe: Return NULL pointer for allocation failures | 2025-10-02T00:00:00.000Z | 2025-10-29T01:03:16.000Z |
| msrc_cve-2025-40026 | KVM: x86: Don't (re)check L1 intercepts when completing userspace I/O | 2025-10-02T00:00:00.000Z | 2025-10-29T01:03:10.000Z |
| msrc_cve-2025-40056 | vhost: vringh: Fix copy_to_iter return value check | 2025-10-02T00:00:00.000Z | 2025-10-29T01:02:59.000Z |
| msrc_cve-2025-40051 | vhost: vringh: Modify the return value check | 2025-10-02T00:00:00.000Z | 2025-10-29T01:02:54.000Z |
| msrc_cve-2025-40055 | ocfs2: fix double free in user_cluster_connect() | 2025-10-02T00:00:00.000Z | 2025-10-29T01:02:49.000Z |
| msrc_cve-2025-40025 | f2fs: fix to do sanity check on node footer for non inode dnode | 2025-10-02T00:00:00.000Z | 2025-10-29T01:02:43.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202308-2222 | A vulnerability was discovered in the Rockwell Automation Armor PowerFlex device when th… | 2025-06-26T23:36:08.655000Z |
| var-202406-1455 | An issue in Netgear WNR614 JNR1010V2 N300-V1.1.0.54_1.0.1 allows attackers to bypass auth… | 2025-06-26T23:36:07.305000Z |
| var-202505-0750 | Netgear EX8000 V1.0.0.126 is vulnerable to Command Injection via the Iface parameter in t… | 2025-06-26T23:36:05.720000Z |
| var-202403-2678 | An information leak in the debuginfo.htm component of Netgear CBR40 2.5.0.28, Netgear CBK… | 2025-06-26T23:35:45.960000Z |
| var-202406-1057 | Netgear WNR614 JNR1010V2/N300-V1.1.0.54_1.0.1 was discovered to store credentials in plai… | 2025-06-26T23:35:45.518000Z |
| var-202406-2007 | An issue in the implementation of the WPS in Netgear WNR614 JNR1010V2/N300-V1.1.0.54_1.0.… | 2025-06-26T23:30:34.427000Z |
| var-202406-2616 | Netgear WNR614 JNR1010V2 N300-V1.1.0.54_1.0.1 does not properly set the HTTPOnly flag for… | 2025-06-26T23:30:34.382000Z |
| var-202506-0044 | A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.… | 2025-06-26T23:29:27.685000Z |
| var-202403-2112 | An information leak in the currentsetting.htm component of Netgear CBR40 2.5.0.28, Netgea… | 2025-06-26T23:27:23.351000Z |
| var-202505-3718 | Predictable filename vulnerabilities in ASPECT may expose sensitive information to a pote… | 2025-06-26T23:27:21.220000Z |
| var-202302-1213 | A vulnerability has been found in Netgear WNDR3700v2 1.0.1.14 and classified as critical.… | 2025-06-26T23:23:18.799000Z |
| var-202406-1250 | An issue in Netgear WNR614 JNR1010V2/N300-V1.1.0.54_1.0.1 allows attackers to create pass… | 2025-06-26T23:23:12.326000Z |
| var-202506-0836 | A vulnerability classified as critical was found in Tenda FH1205 2.0.0.7(775). This vulne… | 2025-06-26T23:22:37.028000Z |
| var-202412-2475 | A vulnerability has been found in Netgear R6900P and R7000P 1.3.3.154 and classified as c… | 2025-06-26T23:20:50.288000Z |
| var-202506-0506 | A vulnerability was found in Netgear EX3700 up to 1.0.0.88. It has been classified as cri… | 2025-06-26T23:20:45.734000Z |
| var-202506-1094 | A vulnerability classified as critical has been found in D-Link DIR-619L 2.06B01. Affecte… | 2025-06-26T23:20:45.661000Z |
| var-202505-2760 | Serialized configuration information may be disclosed during device commissioning while u… | 2025-06-26T23:18:23.068000Z |
| var-202505-2939 | Large content vulnerabilities are present in ASPECT exposing a device to disk overutiliza… | 2025-06-26T19:34:19.737000Z |
| var-202506-0835 | A vulnerability, which was classified as critical, was found in Tenda FH1203 2.0.1.6. Aff… | 2025-06-26T19:34:19.587000Z |
| var-202505-3350 | One way hash with predictable salt vulnerabilities in ASPECT may expose sensitive informa… | 2025-06-25T23:27:30.820000Z |
| var-202505-2598 | Sensitive device logger information in ASPECT may be exposed if administrator credentials… | 2025-06-25T23:27:08.087000Z |
| var-202303-0879 | NETGEAR Nighthawk WiFi6 Router prior to V1.0.10.94 contains a format string vulnerability… | 2025-06-25T23:24:13.344000Z |
| var-202303-1641 | A command execution vulnerability exists in the ubus backend communications functionality… | 2025-06-25T23:17:09.466000Z |
| var-202505-2938 | Log injection vulnerabilities in ASPECT provide attacker access to inject malicious brows… | 2025-06-25T23:17:05.551000Z |
| var-202303-0770 | NETGEAR Nighthawk WiFi6 Router prior to V1.0.10.94 contains a file sharing mechanism that… | 2025-06-25T23:16:34.311000Z |
| var-202306-2299 | NETGEAR RAX30 UPnP Command Injection Remote Code Execution Vulnerability. This vulnerabil… | 2025-06-25T23:16:33.766000Z |
| var-202309-0028 | Buffer Overflow vulnerability in NETGEAR R6400v2 before version 1.0.4.118, allows remote … | 2025-06-25T23:16:33.434000Z |
| var-202505-4071 | 2nd Order SQL injection vulnerabilities in ASPECT allow unintended access and manipulatio… | 2025-06-25T23:12:49.113000Z |
| var-202303-0894 | NETGEAR Nighthawk WiFi6 Router prior to V1.0.10.94 contains a buffer overflow vulnerabili… | 2025-06-25T23:10:58.597000Z |
| var-202505-4265 | SSL Verification Bypass vulnerabilities exist in ASPECT if administrator credentials beco… | 2025-06-25T23:10:54.240000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2024:2814-1 | Security update for ffmpeg | 2024-08-07T10:02:37Z | 2024-08-07T10:02:37Z |
| suse-su-2024:2813-1 | Security update for libnbd | 2024-08-07T10:01:38Z | 2024-08-07T10:01:38Z |
| suse-su-2024:2811-1 | Security update for bind | 2024-08-07T07:51:15Z | 2024-08-07T07:51:15Z |
| suse-su-2024:2810-1 | Security update for bind | 2024-08-07T07:50:37Z | 2024-08-07T07:50:37Z |
| suse-su-2024:2809-1 | Security update for shadow | 2024-08-07T07:49:50Z | 2024-08-07T07:49:50Z |
| suse-su-2024:2808-1 | Security update for shadow | 2024-08-07T07:49:33Z | 2024-08-07T07:49:33Z |
| suse-su-2024:2807-1 | Security update for shadow | 2024-08-07T07:49:21Z | 2024-08-07T07:49:21Z |
| suse-su-2024:2806-1 | Security update for shadow | 2024-08-07T07:49:09Z | 2024-08-07T07:49:09Z |
| suse-su-2024:2805-1 | Security update for shadow | 2024-08-07T07:48:49Z | 2024-08-07T07:48:49Z |
| suse-su-2024:2804-1 | Security update for shadow | 2024-08-07T07:48:32Z | 2024-08-07T07:48:32Z |
| suse-su-2024:2803-1 | Security update for ffmpeg-4 | 2024-08-07T07:47:56Z | 2024-08-07T07:47:56Z |
| suse-su-2024:2802-1 | Security update for the Linux Kernel | 2024-08-07T07:46:03Z | 2024-08-07T07:46:03Z |
| suse-su-2024:2797-1 | Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP3) | 2024-08-06T17:03:47Z | 2024-08-06T17:03:47Z |
| suse-su-2024:2793-1 | Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP3) | 2024-08-06T15:33:43Z | 2024-08-06T15:33:43Z |
| suse-su-2024:2792-1 | Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3) | 2024-08-06T15:03:52Z | 2024-08-06T15:03:52Z |
| suse-su-2024:2790-1 | Security update for MozillaThunderbird | 2024-08-06T14:18:49Z | 2024-08-06T14:18:49Z |
| suse-su-2024:2789-1 | Security update for libnbd | 2024-08-06T14:10:32Z | 2024-08-06T14:10:32Z |
| suse-su-2024:2786-1 | Security update for java-1_8_0-openjdk | 2024-08-06T13:00:18Z | 2024-08-06T13:00:18Z |
| suse-su-2024:2785-1 | Security update for kernel-firmware | 2024-08-06T12:59:02Z | 2024-08-06T12:59:02Z |
| suse-su-2024:2784-1 | Security update for curl | 2024-08-06T12:58:40Z | 2024-08-06T12:58:40Z |
| suse-su-2024:2780-1 | Security update for patch | 2024-08-06T12:36:07Z | 2024-08-06T12:36:07Z |
| suse-su-2024:2776-1 | Security update for dri3proto, presentproto, wayland-protocols, xwayland | 2024-08-06T12:33:59Z | 2024-08-06T12:33:59Z |
| suse-su-2024:2773-1 | Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP3) | 2024-08-06T11:03:50Z | 2024-08-06T11:03:50Z |
| suse-su-2024:2771-1 | Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP3) | 2024-08-06T11:03:41Z | 2024-08-06T11:03:41Z |
| suse-su-2024:2273-2 | Security update for podman | 2024-08-06T09:45:47Z | 2024-08-06T09:45:47Z |
| suse-su-2024:2273-1 | Security update for podman | 2024-08-06T09:45:47Z | 2024-08-06T09:45:47Z |
| suse-su-2024:2767-1 | Security update for ca-certificates-mozilla | 2024-08-06T08:55:24Z | 2024-08-06T08:55:24Z |
| suse-su-2024:2766-1 | Security update for java-1_8_0-openjdk | 2024-08-06T08:54:50Z | 2024-08-06T08:54:50Z |
| suse-su-2024:2761-1 | Security update for openssl-3-livepatches | 2024-08-06T05:18:23Z | 2024-08-06T05:18:23Z |
| suse-su-2024:2760-1 | Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP2) | 2024-08-05T20:36:14Z | 2024-08-05T20:36:14Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:11678-1 | velocity-custom-parser-example-2.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11677-1 | privoxy-3.0.33-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11676-1 | junit-4.13.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11675-1 | janus-gateway-0.11.6-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11674-1 | podman-3.4.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11673-1 | libmysofa-devel-1.2.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11672-1 | go1.17-1.17.5-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11671-1 | go1.16-1.16.12-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11670-1 | MozillaThunderbird-91.4.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11669-1 | MozillaFirefox-95.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11668-1 | velero-plugin-for-microsoft-azure-1.3.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11667-1 | velero-1.7.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11666-1 | log4j-2.13.2-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11665-1 | parsec-0.8.0-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11664-1 | runc-1.0.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11663-1 | libfreebl3-3.73-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11662-1 | kernel-devel-5.15.6-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11661-1 | Botan-2.18.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11660-1 | bind-9.16.20-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11659-1 | singularity-3.8.5-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11658-1 | libruby3_0-3_0-3.0.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11657-1 | libruby2_7-2_7-2.7.5-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11656-1 | nodejs-electron-13.6.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11655-1 | strongswan-5.9.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11654-1 | libzapojit-0_0-0-0.0.3-7.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11653-1 | dnsmasq-2.86-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11652-1 | ceph-16.2.6.463+g22e7612f9ad-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11651-1 | grafana-7.5.11-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11650-1 | cargo1.56-1.56.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11649-1 | matrix-synapse-1.47.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2022-4315 | 2024-11-05T07:26:59.363Z | 2024-11-27T19:40:48.342Z | |
| bit-envoy-2024-7207 | 2024-09-26T07:10:09.460Z | 2024-09-26T07:51:02.528Z | |
| bit-wordpress-2023-28492 | 2024-07-18T07:44:25.068Z | 2024-07-18T07:56:34.499Z | |
| bit-solr-2023-44487 | 2024-03-06T11:05:51.759Z | 2024-06-23T19:56:34.118Z | |
| bit-kafka-2024-27309 | 2024-04-16T07:20:25.284Z | 2024-05-02T07:52:56.618Z | |
| bit-rabbitmq-2021-22117 | 2024-03-06T11:03:44.606Z | 2024-03-06T11:25:28.861Z | |
| bit-rabbitmq-2020-5419 | 2024-03-06T11:04:02.503Z | 2024-03-06T11:25:28.861Z | |
| bit-postgresql-2024-24213 | 2024-03-06T11:02:10.168Z | 2024-03-06T11:25:28.861Z | |
| bit-mariadb-2022-27458 | 2024-03-06T10:58:21.495Z | 2024-03-06T11:25:28.861Z | |
| bit-golang-2021-33194 | 2024-03-06T11:05:26.460Z | 2024-03-06T11:25:28.861Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-21264 | WordPress Maspik plugin授权问题漏洞 | 2025-09-12 | 2025-09-15 |
| cnvd-2025-21263 | WordPress Maspik – Ultimate Spam Protection plugin跨站请求伪造漏洞 | 2025-09-12 | 2025-09-15 |
| cnvd-2025-21262 | WordPress Heateor Login plugin跨站脚本漏洞 | 2025-09-12 | 2025-09-15 |
| cnvd-2025-21256 | Cisco Webex Meetings跨站脚本漏洞(CNVD-2025-21256) | 2025-09-05 | 2025-09-12 |
| cnvd-2025-21255 | Cisco Integrated Management Controller跨站脚本漏洞 | 2025-09-09 | 2025-09-12 |
| cnvd-2025-21254 | Cisco Integrated Management Controller输入验证错误漏洞 | 2025-09-09 | 2025-09-12 |
| cnvd-2025-21253 | Cisco IOS XR资源管理错误漏洞(CNVD-2025-21253) | 2025-09-12 | 2025-09-12 |
| cnvd-2025-21252 | Cisco IOS XR数据伪造问题漏洞(CNVD-2025-21252) | 2025-09-12 | 2025-09-12 |
| cnvd-2025-21251 | Cisco IOS XR访问控制错误漏洞(CNVD-2025-21251) | 2025-09-12 | 2025-09-12 |
| cnvd-2025-21214 | Tenda G3 formSetStaticRoute函数堆栈缓冲区溢出漏洞 | 2025-09-11 | 2025-09-12 |
| cnvd-2025-21213 | Tenda G3 formSetDebugCfg函数堆栈缓冲区溢出漏洞 | 2025-09-11 | 2025-09-12 |
| cnvd-2025-21212 | Tenda G3 formModifyPppAuthWhiteMac函数堆栈缓冲区溢出漏洞 | 2025-09-11 | 2025-09-12 |
| cnvd-2025-21211 | Tenda G3 formIPMacBindModify函数堆栈缓冲区溢出漏洞 | 2025-09-11 | 2025-09-12 |
| cnvd-2025-21210 | Tenda G3 formDelPortMapping函数堆栈缓冲区溢出漏洞 | 2025-09-11 | 2025-09-12 |
| cnvd-2025-21209 | SAP NetWeaver ABAP Platform跨站脚本漏洞 | 2025-08-18 | 2025-09-12 |
| cnvd-2025-21208 | SAP NetWeaver Application Server ABAP HTML注入漏洞 | 2025-08-18 | 2025-09-12 |
| cnvd-2025-21207 | SAP NetWeaver Application Server for ABAP跨站脚本漏洞(CNVD-2025-21207) | 2025-08-18 | 2025-09-12 |
| cnvd-2025-21206 | SAP Supplier Relationship Management跨站脚本漏洞(CNVD-2025-21206) | 2025-09-11 | 2025-09-12 |
| cnvd-2025-21205 | SAP NetWeaver反序列化漏洞 | 2025-09-11 | 2025-09-12 |
| cnvd-2025-21204 | SAP NetWeaver Application Server Java访问控制错误漏洞(CNVD-2025-21204) | 2025-09-11 | 2025-09-12 |
| cnvd-2025-21203 | SAP NetWeaver ABAP Platform跨站脚本漏洞 | 2025-09-11 | 2025-09-12 |
| cnvd-2025-21202 | SAP Fiori App Manage Work Center Groups跨站请求伪造漏洞 | 2025-09-11 | 2025-09-12 |
| cnvd-2025-21201 | WordPress Duplicate Page and Post plugin SQL注入漏洞 | 2025-09-12 | 2025-09-12 |
| cnvd-2025-21195 | NVIDIA NvContainer信任管理问题漏洞 | 2025-05-07 | 2025-09-12 |
| cnvd-2025-21194 | NVIDIA GPU Display Driver存在未明漏洞(CNVD-2025-21194) | 2025-08-10 | 2025-09-12 |
| cnvd-2025-21193 | NVIDIA GPU Display Driver存在未明漏洞(CNVD-2025-21193) | 2025-08-10 | 2025-09-12 |
| cnvd-2025-21192 | NVIDIA GPU Display Driver信息泄露漏洞 | 2025-08-10 | 2025-09-12 |
| cnvd-2025-21191 | NVIDIA GPU Display Driver存在未明漏洞(CNVD-2025-21191) | 2025-08-10 | 2025-09-12 |
| cnvd-2025-21190 | NVIDIA GPU Display Driver存在未明漏洞(CNVD-2025-21190) | 2025-08-10 | 2025-09-12 |
| cnvd-2025-21189 | Esri Portal For ArcGis跨站请求伪造漏洞 | 2025-06-11 | 2025-09-12 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2021-avi-981 | Multiples vulnérabilités dans SolarWinds Web Help Desk | 2021-12-27T00:00:00.000000 | 2021-12-27T00:00:00.000000 |
| certfr-2021-avi-980 | Vulnérabilité dans les produits F-Secure | 2021-12-22T00:00:00.000000 | 2021-12-22T00:00:00.000000 |
| certfr-2021-avi-979 | Multiples vulnérabilités dans SonicWall SMA100 | 2021-12-22T00:00:00.000000 | 2021-12-22T00:00:00.000000 |
| certfr-2021-avi-978 | Vulnérabilité dans le noyau Linux de Red Hat | 2021-12-22T00:00:00.000000 | 2021-12-22T00:00:00.000000 |
| certfr-2021-avi-977 | Multiples vulnérabilités dans Stormshield Endpoint Security | 2021-12-22T00:00:00.000000 | 2021-12-22T00:00:00.000000 |
| certfr-2021-avi-976 | Vulnérabilité dans le client ownCloud | 2021-12-22T00:00:00.000000 | 2021-12-22T00:00:00.000000 |
| certfr-2021-avi-975 | Vulnérabilité dans NetApp StorageGRID | 2021-12-22T00:00:00.000000 | 2021-12-22T00:00:00.000000 |
| certfr-2021-avi-974 | Multiples vulnérabilités dans Mozilla Thunderbird | 2021-12-21T00:00:00.000000 | 2021-12-21T00:00:00.000000 |
| certfr-2021-avi-973 | Multiples vulnérabilités dans Xen | 2021-12-21T00:00:00.000000 | 2021-12-21T00:00:00.000000 |
| certfr-2021-avi-972 | Multiples vulnérabilités dans Apache httpd | 2021-12-21T00:00:00.000000 | 2021-12-21T00:00:00.000000 |
| certfr-2021-avi-971 | Multiples vulnérabilités dans SolarWinds Orion | 2021-12-21T00:00:00.000000 | 2021-12-21T00:00:00.000000 |
| certfr-2021-avi-970 | Multiples vulnérabilités dans les produits VMware | 2021-12-20T00:00:00.000000 | 2021-12-20T00:00:00.000000 |
| certfr-2021-avi-969 | Multiples vulnérabilités dans le noyau Linux de Debian | 2021-12-20T00:00:00.000000 | 2021-12-20T00:00:00.000000 |
| certfr-2021-avi-957 | Multiples vulnérabilités dans Microsoft Edge | 2021-12-15T00:00:00.000000 | 2021-12-20T00:00:00.000000 |
| certfr-2021-avi-928 | Multiples vulnérabilités dans les produits Stormshield | 2021-12-08T00:00:00.000000 | 2021-12-20T00:00:00.000000 |
| certfr-2021-avi-968 | Vulnérabilité dans RedHat OpenShift Container Platform | 2021-12-17T00:00:00.000000 | 2021-12-17T00:00:00.000000 |
| certfr-2021-avi-967 | Vulnérabilité dans F5 BIG-IP | 2021-12-17T00:00:00.000000 | 2021-12-17T00:00:00.000000 |
| certfr-2021-avi-966 | Multiples vulnérabilités dans F-Secure SAFE Browser | 2021-12-17T00:00:00.000000 | 2021-12-17T00:00:00.000000 |
| certfr-2021-avi-965 | Vulnérabilité dans VMware Workspace ONE UEM console | 2021-12-17T00:00:00.000000 | 2021-12-17T00:00:00.000000 |
| certfr-2021-avi-964 | Vulnérabilité dans F5 NGINX Swagger UI | 2021-12-16T00:00:00.000000 | 2021-12-16T00:00:00.000000 |
| certfr-2021-avi-963 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2021-12-16T00:00:00.000000 | 2021-12-16T00:00:00.000000 |
| certfr-2021-avi-962 | Vulnérabilité dans MongoDB | 2021-12-16T00:00:00.000000 | 2021-12-16T00:00:00.000000 |
| certfr-2021-avi-961 | Multiples vulnérabilités dans les produits Microsoft | 2021-12-15T00:00:00.000000 | 2021-12-15T00:00:00.000000 |
| certfr-2021-avi-960 | Multiples vulnérabilités dans Microsoft .Net | 2021-12-15T00:00:00.000000 | 2021-12-15T00:00:00.000000 |
| certfr-2021-avi-959 | Multiples vulnérabilités dans Microsoft Windows | 2021-12-15T00:00:00.000000 | 2021-12-15T00:00:00.000000 |
| certfr-2021-avi-958 | Multiples vulnérabilités dans Microsoft Office | 2021-12-15T00:00:00.000000 | 2021-12-15T00:00:00.000000 |
| certfr-2021-avi-956 | Multiples vulnérabilités dans Apple Safari | 2021-12-15T00:00:00.000000 | 2021-12-15T00:00:00.000000 |
| certfr-2021-avi-955 | Vulnérabilité dans OpenSSL | 2021-12-15T00:00:00.000000 | 2021-12-15T00:00:00.000000 |
| certfr-2021-avi-954 | Vulnérabilité dans Moxa NPort | 2021-12-15T00:00:00.000000 | 2021-12-15T00:00:00.000000 |
| certfr-2021-avi-953 | Multiples vulnérabilités dans les produits Schneider | 2021-12-15T00:00:00.000000 | 2021-12-15T00:00:00.000000 |