Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-2771 |
N/A
|
Undefined behavior in the DOM: Core & HTML component |
Mozilla |
Firefox |
2026-02-24T13:33:08.538Z | 2026-02-24T17:30:25.709Z |
| CVE-2026-2769 |
8.8 (3.1)
|
Use-after-free in the Storage: IndexedDB component |
Mozilla |
Firefox |
2026-02-24T13:33:06.912Z | 2026-02-24T17:30:21.670Z |
| CVE-2025-15589 |
5.1 (4.0)
3.8 (3.1)
3.8 (3.0)
|
MuYuCMS Template Management Template.php delete_dir_fi… |
n/a |
MuYuCMS |
2026-02-24T05:52:29.889Z | 2026-02-24T17:24:16.995Z |
| CVE-2026-3070 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
SourceCodester Modern Image Gallery App upload.php cro… |
SourceCodester |
Modern Image Gallery App |
2026-02-24T04:32:08.072Z | 2026-02-24T17:13:37.627Z |
| CVE-2026-24314 |
4.3 (3.1)
|
Information Disclosure vulnerability in S/4HANA (Manag… |
SAP_SE |
S/4HANA (Manage Payment Media) |
2026-02-24T05:23:52.911Z | 2026-02-24T16:44:18.533Z |
| CVE-2024-58041 |
9.1 (3.1)
|
Smolder versions through 1.51 for Perl uses insecure r… |
WONKO |
Smolder |
2026-02-23T23:54:23.396Z | 2026-02-24T16:41:35.824Z |
| CVE-2025-9120 |
8.6 (4.0)
|
RCE vulnerability has been discovered in OpenText™ Car… |
OpenText™ |
Carbonite Safe Server Backup |
2026-02-24T00:03:08.646Z | 2026-02-24T16:35:24.700Z |
| CVE-2025-15386 |
8.8 (3.1)
|
Responsive Lightbox & Gallery < 2.6.1 - Unauthenticate… |
Unknown |
Responsive Lightbox & Gallery |
2026-02-24T06:00:07.864Z | 2026-02-24T16:29:30.065Z |
| CVE-2025-11845 |
4.9 (3.1)
|
A null pointer dereference vulnerability in the c… |
Zyxel |
VMG3625-T50B firmware |
2026-02-24T01:30:50.433Z | 2026-02-24T16:12:02.942Z |
| CVE-2025-11846 |
4.9 (3.1)
|
A null pointer dereference vulnerability in the a… |
Zyxel |
VMG3625-T50B firmware |
2026-02-24T01:37:57.257Z | 2026-02-24T16:09:10.139Z |
| CVE-2026-26744 |
5.3 (3.1)
|
A user enumeration vulnerability exists in FormaL… |
n/a |
n/a |
2026-02-19T00:00:00.000Z | 2026-02-24T15:53:13.623Z |
| CVE-2026-0399 |
4.9 (3.1)
|
Multiple post-authentication stack-based buffer o… |
SonicWall |
SonicOS |
2026-02-24T14:52:10.841Z | 2026-02-24T15:50:29.865Z |
| CVE-2026-2686 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
SECCN Dingcheng G10 session_login.cgi qq os command in… |
SECCN Dingcheng |
G10 |
2026-02-19T00:02:07.214Z | 2026-02-24T15:49:44.615Z |
| CVE-2026-2689 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
itsourcecode Event Management System manage_booking.ph… |
itsourcecode |
Event Management System |
2026-02-19T00:32:07.761Z | 2026-02-24T15:48:58.273Z |
| CVE-2026-2690 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
itsourcecode Event Management System Admin Login ajax.… |
itsourcecode |
Event Management System |
2026-02-19T01:02:07.372Z | 2026-02-24T15:45:07.906Z |
| CVE-2026-2691 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
itsourcecode Event Management System manage_register.p… |
itsourcecode |
Event Management System |
2026-02-19T01:32:07.068Z | 2026-02-24T15:41:47.584Z |
| CVE-2025-27555 |
N/A
|
Apache Airflow: Connection Secrets not masked in UI wh… |
Apache Software Foundation |
Apache Airflow |
2026-02-24T10:09:59.703Z | 2026-02-24T15:40:05.895Z |
| CVE-2026-2906 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda HG9 Samba Configuration Endpoint formSamba stack… |
Tenda |
HG9 |
2026-02-22T01:32:09.390Z | 2026-02-24T15:38:54.600Z |
| CVE-2026-2860 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
feng_ha_ha/megagao ssm-erp/production_ssm EmployeeCont… |
feng_ha_ha |
ssm-erp |
2026-02-21T04:32:06.851Z | 2026-02-24T15:37:22.550Z |
| CVE-2019-25447 |
5.3 (4.0)
4.3 (3.1)
|
OrientDB 3.0.17 Cross-Site Request Forgery |
Orientdb |
OrientDB |
2026-02-20T22:56:57.950Z | 2026-02-24T15:35:18.664Z |
| CVE-2026-0400 |
4.9 (3.1)
|
A post-authentication Format String vulnerability… |
SonicWall |
SonicOS |
2026-02-24T14:54:15.394Z | 2026-02-24T15:35:10.650Z |
| CVE-2026-0401 |
4.9 (3.1)
|
A post-authentication NULL Pointer Dereference vu… |
SonicWall |
SonicOS |
2026-02-24T14:55:57.545Z | 2026-02-24T15:34:30.604Z |
| CVE-2019-25441 |
9.3 (4.0)
9.8 (3.1)
|
thesystem 1.0 Command Injection via run_command endpoint |
kostasmitroglou |
thesystem |
2026-02-20T22:54:52.006Z | 2026-02-24T15:33:57.130Z |
| CVE-2026-0402 |
4.9 (3.1)
|
A post-authentication Out-of-bounds Read vulnerab… |
SonicWall |
SonicOS |
2026-02-24T14:58:37.608Z | 2026-02-24T15:33:50.674Z |
| CVE-2019-25438 |
8.8 (4.0)
8.2 (3.1)
|
LabCollector 5.423 SQL Injection via login.php |
Labcollector |
LabCollector |
2026-02-20T22:54:51.195Z | 2026-02-24T15:31:29.799Z |
| CVE-2019-25437 |
6.7 (4.0)
6.2 (3.1)
|
Foscam Video Management System 1.1.6.6 Buffer Overflow… |
Foscam |
Foscam Video Management System |
2026-02-20T22:54:50.198Z | 2026-02-24T15:29:50.923Z |
| CVE-2019-25436 |
5.1 (4.0)
6.5 (3.1)
|
Sricam DeviceViewer 3.12.0.1 Password Change Security Bypass |
Sricam |
DeviceViewer |
2026-02-20T22:54:49.282Z | 2026-02-24T15:28:48.370Z |
| CVE-2019-25435 |
8.4 (4.0)
7.8 (3.1)
|
Sricam DeviceViewer 3.12.0.1 Local Buffer Overflow DEP… |
Sricam |
Sricam DeviceViewer |
2026-02-20T22:54:48.319Z | 2026-02-24T15:27:24.837Z |
| CVE-2019-25434 |
6.7 (4.0)
7.5 (3.1)
|
SpotAuditor 5.3.1.0 Denial of Service via Registration… |
Nsasoft |
Nsauditor SpotAuditor |
2026-02-20T22:54:47.430Z | 2026-02-24T15:25:18.607Z |
| CVE-2019-25432 |
8.8 (4.0)
7.5 (3.1)
|
Part-DB 0.4 Authentication Bypass via login.php |
Part-DB |
Part-DB |
2026-02-20T22:54:46.521Z | 2026-02-24T15:23:40.735Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-24854 |
8.8 (3.1)
|
Church CRM has SQL injection in PaddleNumEditor.php |
ChurchCRM |
CRM |
2026-01-30T15:05:12.017Z | 2026-01-30T15:57:32.491Z |
| CVE-2026-24855 |
7.2 (4.0)
|
ChurchCRM has Stored Cross-Site Scripting (XSS) in Cre… |
ChurchCRM |
CRM |
2026-01-30T15:08:31.006Z | 2026-01-30T15:50:58.147Z |
| CVE-2026-1731 |
9.9 (4.0)
|
Remote code execution vulnerability in BeyondTrust Rem… |
BeyondTrust |
Remote Support(RS) & Privileged Remote Access(PRA) |
2026-02-06T21:49:20.844Z | 2026-02-26T15:04:15.451Z |
| CVE-2026-20620 |
7.7 (3.1)
|
An out-of-bounds read issue was addressed with im… |
Apple |
macOS |
2026-02-11T22:58:16.266Z | 2026-02-13T20:15:40.527Z |
| CVE-2026-20636 |
6.5 (3.1)
|
The issue was addressed with improved memory hand… |
Apple |
Safari |
2026-02-11T22:58:15.328Z | 2026-02-13T20:05:45.701Z |
| CVE-2026-20640 |
4.6 (3.1)
|
An inconsistent user interface issue was addresse… |
Apple |
iOS and iPadOS |
2026-02-11T22:58:22.823Z | 2026-02-13T19:20:00.274Z |
| CVE-2026-20641 |
7.1 (3.1)
|
A privacy issue was addressed with improved check… |
Apple |
macOS |
2026-02-11T22:58:19.210Z | 2026-02-13T19:27:51.774Z |
| CVE-2024-33648 |
6.5 (3.1)
|
WordPress Recencio Book Reviews plugin <= 1.66.0 - Cro… |
Kemory Grubb |
Recencio Book Reviews |
2024-04-29T04:54:32.290Z | 2026-02-17T12:40:22.274Z |
| CVE-2020-37007 |
5.1 (4.0)
5.3 (3.1)
|
Liman 0.7 - Cross-Site Request Forgery (Change Password) |
salihciftci |
Liman |
2026-01-29T14:28:29.695Z | 2026-02-17T13:03:46.275Z |
| CVE-2026-20616 |
6.5 (3.1)
|
An out-of-bounds write issue was addressed with i… |
Apple |
macOS |
2026-02-11T22:58:20.068Z | 2026-02-13T20:55:28.088Z |
| CVE-2026-24532 |
4.3 (3.1)
|
WordPress SiteLock Security plugin <= 5.0.2 - Broken A… |
SiteLock |
SiteLock Security – WP Hardening, Login Security & Malware Scans |
2026-01-23T14:28:50.669Z | 2026-02-17T10:49:48.666Z |
| CVE-2025-63065 |
5.3 (3.1)
|
WordPress Media LIbrary Assistant plugin <= 3.29 - Bro… |
David Lingren |
Media LIbrary Assistant |
2025-12-09T14:52:34.653Z | 2026-02-17T15:45:11.466Z |
| CVE-2025-69055 |
6.5 (3.1)
|
WordPress BM Content Builder plugin < 3.16.3.3 - Arbit… |
SeaTheme |
BM Content Builder |
2026-01-22T16:52:21.243Z | 2026-02-17T08:43:40.916Z |
| CVE-2024-11831 |
5.4 (3.1)
|
Npm-serialize-javascript: cross-site scripting (xss) i… |
|
|
2025-02-10T15:27:46.732Z | 2026-02-25T19:09:57.176Z |
| CVE-2025-26637 |
6.8 (3.1)
|
Windows BitLocker Security Feature Bypass Vulnerability |
Microsoft |
Windows 10 Version 1507 |
2025-04-08T17:23:44.934Z | 2026-02-16T22:06:12.931Z |
| CVE-2026-1783 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage. | N/A | N/A | 2026-02-16T15:54:03.664Z | |
| CVE-2023-1211 |
7.2 (3.0)
|
SQL Injection in phpipam/phpipam |
phpipam |
phpipam/phpipam |
2023-03-06T00:00:00.000Z | 2026-02-16T14:52:08.146Z |
| CVE-2022-4407 |
9.8 (3.0)
|
Cross-site Scripting (XSS) - Reflected in thorsten/phpmyfaq |
thorsten |
thorsten/phpmyfaq |
2022-12-11T00:00:00.000Z | 2026-02-16T14:50:53.905Z |
| CVE-2022-3766 |
7.3 (3.0)
|
Cross-site Scripting (XSS) - Reflected in thorsten/phpmyfaq |
thorsten |
thorsten/phpmyfaq |
2022-10-31T00:00:00.000Z | 2026-02-16T14:49:30.861Z |
| CVE-2022-0088 |
3.5 (3.0)
|
Cross-Site Request Forgery (CSRF) in yourls/yourls |
yourls |
yourls/yourls |
2022-04-03T08:50:10.000Z | 2026-02-16T14:48:06.656Z |
| CVE-2025-9566 |
8.1 (3.1)
|
Podman: podman kube play command may overwrite host files |
|
|
2025-09-05T19:54:30.503Z | 2026-02-16T12:51:17.342Z |
| CVE-2025-38162 |
N/A
|
netfilter: nft_set_pipapo: prevent overflow in lookup … |
Linux |
Linux |
2025-07-03T08:36:03.731Z | 2026-02-16T09:26:06.084Z |
| CVE-2026-23766 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none. | N/A | N/A | 2026-01-15T19:18:50.806Z | 2026-02-14T17:44:48.692Z |
| CVE-2025-69634 |
9 (3.1)
|
Cross Site Request Forgery vulnerability in Dolib… |
n/a |
n/a |
2026-02-12T00:00:00.000Z | 2026-02-14T04:30:49.309Z |
| CVE-2026-26303 |
N/A
|
Not used | N/A | N/A | 2026-02-14T03:55:05.907Z | |
| CVE-2026-26302 |
N/A
|
Not used | N/A | N/A | 2026-02-14T03:55:06.462Z | |
| CVE-2026-26301 |
N/A
|
Not used | N/A | N/A | 2026-02-14T03:55:06.945Z | |
| CVE-2026-26300 |
N/A
|
Not used | N/A | N/A | 2026-02-14T03:55:07.406Z | |
| CVE-2026-26299 |
N/A
|
Not used | N/A | N/A | 2026-02-14T03:55:07.938Z | |
| CVE-2026-26298 |
N/A
|
Not used | N/A | N/A | 2026-02-14T03:55:08.453Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-24854 | ChurchCRM is an open-source church management system. A SQL Injection vulnerability exists in endpo… | 2026-01-30T16:16:13.620 | 2026-02-17T14:33:24.433 |
| fkie_cve-2026-24855 | ChurchCRM is an open-source church management system. Versions prior to 6.7.2 have a Stored Cross-S… | 2026-01-30T16:16:13.790 | 2026-02-17T14:32:44.697 |
| fkie_cve-2026-1731 | BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contai… | 2026-02-06T22:16:11.020 | 2026-02-17T13:40:10.320 |
| fkie_cve-2026-20620 | An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in ma… | 2026-02-11T23:16:05.577 | 2026-02-17T13:32:00.920 |
| fkie_cve-2026-20636 | The issue was addressed with improved memory handling. This issue is fixed in iOS 26.3 and iPadOS 2… | 2026-02-11T23:16:06.820 | 2026-02-17T13:31:29.687 |
| fkie_cve-2026-20640 | An inconsistent user interface issue was addressed with improved state management. This issue is fi… | 2026-02-11T23:16:07.023 | 2026-02-17T13:30:27.347 |
| fkie_cve-2026-20641 | A privacy issue was addressed with improved checks. This issue is fixed in watchOS 26.3, tvOS 26.3,… | 2026-02-11T23:16:07.123 | 2026-02-17T13:29:12.407 |
| fkie_cve-2024-33648 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2024-04-29T05:15:07.580 | 2026-02-17T13:16:16.770 |
| fkie_cve-2020-37007 | Liman 0.7 contains a cross-site request forgery vulnerability that allows attackers to manipulate u… | 2026-01-29T15:16:07.613 | 2026-02-17T13:16:16.513 |
| fkie_cve-2026-20616 | An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iO… | 2026-02-11T23:16:05.160 | 2026-02-17T13:13:35.767 |
| fkie_cve-2026-24532 | Missing Authorization vulnerability in SiteLock SiteLock Security – WP Hardening, Login Security & … | 2026-01-23T15:16:09.273 | 2026-02-17T11:16:05.023 |
| fkie_cve-2025-63065 | Authorization Bypass Through User-Controlled Key vulnerability in David Lingren Media LIbrary Assis… | 2025-12-09T16:18:12.170 | 2026-02-17T10:15:57.247 |
| fkie_cve-2025-69055 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Sea… | 2026-01-22T17:16:19.140 | 2026-02-17T09:15:56.100 |
| fkie_cve-2024-11831 | A flaw was found in npm-serialize-javascript. The vulnerability occurs because the serialize-javasc… | 2025-02-10T16:15:37.080 | 2026-02-17T03:16:00.883 |
| fkie_cve-2025-26637 | Protection mechanism failure in Windows BitLocker allows an unauthorized attacker to bypass a secur… | 2025-04-08T18:15:47.490 | 2026-02-16T23:18:26.953 |
| fkie_cve-2026-1783 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued i… | 2026-02-16T16:19:17.880 | 2026-02-16T16:19:17.880 |
| fkie_cve-2023-1211 | SQL Injection in GitHub repository phpipam/phpipam prior to v1.5.2. | 2023-03-07T00:15:09.220 | 2026-02-16T15:18:33.927 |
| fkie_cve-2022-4407 | Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.1.9. | 2022-12-11T15:15:10.653 | 2026-02-16T15:18:33.793 |
| fkie_cve-2022-3766 | Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.1.8. | 2022-10-31T11:15:10.247 | 2026-02-16T15:18:33.647 |
| fkie_cve-2022-0088 | Cross-Site Request Forgery (CSRF) in GitHub repository yourls/yourls prior to 1.8.3. | 2022-04-03T09:15:08.897 | 2026-02-16T15:18:32.940 |
| fkie_cve-2025-9566 | There's a vulnerability in podman where an attacker may use the kube play command to overwrite host… | 2025-09-05T20:15:36.727 | 2026-02-16T14:16:17.187 |
| fkie_cve-2025-38162 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: pre… | 2025-07-03T09:15:31.617 | 2026-02-16T10:16:06.630 |
| fkie_cve-2026-23766 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2026-01-15T20:16:06.057 | 2026-02-14T18:16:10.087 |
| fkie_cve-2025-69634 | Cross Site Request Forgery vulnerability in Dolibarr ERP & CRM v.22.0.9 allows a remote attacker to… | 2026-02-12T16:16:05.013 | 2026-02-14T05:16:13.900 |
| fkie_cve-2026-26303 | Rejected reason: Not used | 2026-02-14T04:15:57.600 | 2026-02-14T04:15:57.600 |
| fkie_cve-2026-26302 | Rejected reason: Not used | 2026-02-14T04:15:57.540 | 2026-02-14T04:15:57.540 |
| fkie_cve-2026-26301 | Rejected reason: Not used | 2026-02-14T04:15:57.487 | 2026-02-14T04:15:57.487 |
| fkie_cve-2026-26300 | Rejected reason: Not used | 2026-02-14T04:15:57.427 | 2026-02-14T04:15:57.427 |
| fkie_cve-2026-26299 | Rejected reason: Not used | 2026-02-14T04:15:57.363 | 2026-02-14T04:15:57.363 |
| fkie_cve-2026-26298 | Rejected reason: Not used | 2026-02-14T04:15:57.307 | 2026-02-14T04:15:57.307 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-744j-m22x-5p8h |
7.8 (3.1)
8.5 (4.0)
|
GCafé 3.0 contains an unquoted service path vulnerability in the gbClientService that allows local … | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ghsa-7338-r7v4-4j5w |
8.2 (3.1)
|
The Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Trigg… | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ghsa-695q-xr4m-vpv8 |
7.8 (3.1)
8.5 (4.0)
|
Shrew Soft VPN Client 2.2.2 contains an unquoted service path vulnerability that allows local users… | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ghsa-5fgg-w666-2wmp |
7.8 (3.1)
8.5 (4.0)
|
Easy-Hide-IP 5.0.0.3 contains an unquoted service path vulnerability in the EasyRedirect service th… | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ghsa-524c-cjc2-fv3g |
7.8 (3.1)
8.5 (4.0)
|
Amiti Antivirus 25.0.640 contains an unquoted service path vulnerability in its Windows service con… | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ghsa-4h69-f6q3-6pjc |
7.8 (3.1)
8.5 (4.0)
|
Adaware Web Companion version 4.8.2078.3950 contains an unquoted service path vulnerability in the … | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ghsa-2h5m-6pcf-vjf3 |
7.8 (3.1)
8.5 (4.0)
|
Alps Pointing-device Controller 8.1202.1711.04 contains an unquoted service path vulnerability in t… | 2026-02-05T00:31:01Z | 2026-02-05T00:31:01Z |
| ghsa-rxcq-q6q7-hm9r |
4.7 (3.1)
2.0 (4.0)
|
A weakness has been identified in ZenTao up to 21.7.6-85642. The impacted element is the function f… | 2026-02-05T00:31:00Z | 2026-02-05T00:31:00Z |
| ghsa-qhqq-r75h-hrvf |
5.0 (3.1)
2.3 (4.0)
|
A security vulnerability has been detected in WeKan up to 8.20. This affects the function setBoardO… | 2026-02-05T00:31:00Z | 2026-02-05T00:31:00Z |
| ghsa-pv5x-hh3r-86w9 |
6.5 (3.1)
|
Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal Microsoft Entra ID… | 2026-02-04T21:30:32Z | 2026-02-05T00:31:00Z |
| ghsa-mv4x-xj43-wwww |
4.8 (3.1)
|
Incorrect Authorization vulnerability in Drupal Drupal Canvas allows Forceful Browsing.This issue a… | 2026-02-04T21:30:32Z | 2026-02-05T00:31:00Z |
| ghsa-hfmp-6wvq-f326 |
4.8 (3.1)
|
Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") vulnerability … | 2026-02-04T21:30:32Z | 2026-02-05T00:31:00Z |
| ghsa-hfg5-h6jx-rgvq |
5.3 (3.1)
|
IBM Db2 Big SQL 7.6 on Cloud Pak for Data 4.8, 7.7 on Cloud Pak for Data 5.0, and 7.8 on Cloud Pak … | 2026-02-04T21:30:32Z | 2026-02-05T00:31:00Z |
| ghsa-fh84-5q42-44p3 |
6.3 (3.1)
|
IBM Concert 1.0.0 through 2.1.0 does not invalidate session after logout which could allow an authe… | 2026-02-05T00:31:00Z | 2026-02-05T00:31:00Z |
| ghsa-c2m2-2cpv-rg7h |
6.5 (3.1)
|
IBM Concert 1.0.0 through 2.1.0 is vulnerable to HTTP header injection, caused by improper validati… | 2026-02-05T00:31:00Z | 2026-02-05T00:31:00Z |
| ghsa-4gxg-c5q9-vqvm |
4.3 (3.1)
|
IBM Operations Analytics – Log Analysis versions 1.3.5.0 through 1.3.8.3 and IBM SmartCloud Analyti… | 2026-02-05T00:31:00Z | 2026-02-05T00:31:00Z |
| ghsa-g7vp-j25f-h34p |
6.7 (3.1)
|
EVE Has Partially Predetermined Vault Key | 2026-02-04T23:21:25Z | 2026-02-04T23:21:25Z |
| ghsa-hx74-4wmc-fwvf |
7.8 (3.1)
|
Duplicate Advisory: EVE Has Partially Predetermined Vault Key | 2023-09-21T15:30:15Z | 2026-02-04T23:20:37Z |
| ghsa-5h7v-g49c-h887 |
6.7 (3.1)
|
EVE Doesn't Protect Rootfs | 2026-02-04T23:14:42Z | 2026-02-04T23:14:42Z |
| ghsa-x9mp-jm4h-jjf8 |
8.8 (3.1)
|
Duplicate Advisory: EVE Doesn't Protect Rootfs | 2023-09-20T15:30:52Z | 2026-02-04T23:14:16Z |
| ghsa-4jvr-vj2c-8q37 |
6.7 (3.1)
|
EVE Seals Vault Key With SHA1 PCRs | 2026-02-04T23:12:29Z | 2026-02-04T23:12:29Z |
| ghsa-h929-fvvp-882c |
8.8 (3.1)
|
Duplicate Advisory: EVE Seals Vault Key With SHA1 PCRs | 2023-09-20T15:30:52Z | 2026-02-04T23:11:53Z |
| ghsa-m7xq-9374-9rvx |
9.8 (3.1)
8.7 (4.0)
|
Mongoose search injection vulnerability | 2024-12-02T21:31:20Z | 2026-02-04T22:47:45Z |
| ghsa-q728-gf8j-w49r |
7.7 (4.0)
|
Claude Code has a Path Restriction Bypass via ZSH Clobber which Allows Arbitrary File Writes | 2026-02-03T19:32:01Z | 2026-02-04T22:15:46Z |
| ghsa-6jcc-xgcr-q3h4 |
8.7 (4.0)
|
@fedify/fedify has Improper Authentication and Incorrect Authorization | 2025-08-08T14:29:48Z | 2026-02-04T22:13:40Z |
| ghsa-4qvv-g3vr-m348 |
5.1 (4.0)
|
Wagtail has improper permission handling on admin preview endpoints | 2026-02-03T18:35:52Z | 2026-02-04T21:58:34Z |
| ghsa-gwch-7m8v-7544 |
8.7 (4.0)
|
terraform-provider-proxmox has insecure sudo recommendation in the documentation | 2026-02-02T20:25:53Z | 2026-02-04T21:58:25Z |
| ghsa-5w5r-8xc6-2xhw |
7.5 (3.1)
6.6 (4.0)
|
Apache Answer Exposure of Private Personal Information to an Unauthorized Actor vulnerability | 2026-02-04T12:31:25Z | 2026-02-04T21:57:33Z |
| ghsa-pqqg-5f4f-8952 |
8.7 (4.0)
|
FacturaScripts has SQL Injection in Autocomplete Actions | 2026-02-03T18:17:24Z | 2026-02-04T21:57:23Z |
| ghsa-cjfx-qhwm-hf99 |
8.3 (4.0)
|
FacturaScripts has SQL Injection in API ORDER BY Clause | 2026-02-03T18:14:43Z | 2026-02-04T21:57:11Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-30430 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:29.183636Z |
| gsd-2024-30843 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.183356Z |
| gsd-2024-30539 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.183152Z |
| gsd-2024-30469 | Missing Authorization vulnerability in WPExperts Wholesale For WooCommerce.This issue aff… | 2024-04-03T05:02:29.182486Z |
| gsd-2024-30024 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.182095Z |
| gsd-2024-30033 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.181887Z |
| gsd-2024-30813 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.181684Z |
| gsd-2024-30346 | Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability. This vulner… | 2024-04-03T05:02:29.181119Z |
| gsd-2024-30559 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:29.180443Z |
| gsd-2024-30359 | Foxit PDF Reader AcroForm 3D Out-Of-Bounds Read Remote Code Execution Vulnerability. This… | 2024-04-03T05:02:29.179752Z |
| gsd-2024-30334 | Foxit PDF Reader Doc Object Use-After-Free Remote Code Execution Vulnerability. This vuln… | 2024-04-03T05:02:29.179458Z |
| gsd-2024-30298 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.179197Z |
| gsd-2024-30807 | An issue was discovered in Bento4 v1.6.0-641-2-g1529b83. There is a heap-use-after-free i… | 2024-04-03T05:02:29.178673Z |
| gsd-2024-30147 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.178272Z |
| gsd-2024-30719 | An insecure deserialization vulnerability has been identified in ROS2 Dashing Diademata i… | 2024-04-03T05:02:29.177995Z |
| gsd-2024-30496 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vuln… | 2024-04-03T05:02:29.177180Z |
| gsd-2024-30198 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:29.176341Z |
| gsd-2024-30859 | netentsec NS-ASG 6.3 is vulnerable to SQL Injection via /admin/config_ISCGroupSSLCert.php. | 2024-04-03T05:02:29.175748Z |
| gsd-2024-30881 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.175477Z |
| gsd-2024-30016 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.175261Z |
| gsd-2024-30555 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:29.174677Z |
| gsd-2024-30739 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.174294Z |
| gsd-2024-30987 | Cross Site Scripting vulnerability in /bwdates-reports-ds.php of phpgurukul Client Manage… | 2024-04-03T05:02:29.174002Z |
| gsd-2024-30418 | Vulnerability of insufficient permission verification in the app management module. Impac… | 2024-04-03T05:02:29.173612Z |
| gsd-2024-30809 | An issue was discovered in Bento4 v1.6.0-641-2-g1529b83. There is a heap-use-after-free i… | 2024-04-03T05:02:29.172950Z |
| gsd-2024-30005 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.172543Z |
| gsd-2024-30735 | An arbitrary file upload vulnerability has been discovered in ROS Kinetic Kame in ROS_VER… | 2024-04-03T05:02:29.172233Z |
| gsd-2024-30315 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.171929Z |
| gsd-2024-30089 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.171622Z |
| gsd-2024-30348 | Foxit PDF Reader U3D File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability… | 2024-04-03T05:02:29.170803Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-191296 | Malicious code in @posthog/migrator3000-plugin (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191295 | Malicious code in @posthog/lemon-ui (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191294 | Malicious code in @posthog/laudspeaker-plugin (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191293 | Malicious code in @posthog/intercom-plugin (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191292 | Malicious code in @posthog/icons (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191291 | Malicious code in @posthog/heartbeat-plugin (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191290 | Malicious code in @posthog/filter-out-plugin (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191289 | Malicious code in @posthog/bitbucket-release-tracker (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191288 | Malicious code in @pergel/nuxt (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191287 | Malicious code in @pergel/module-ui (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191286 | Malicious code in @pergel/module-graphql (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191285 | Malicious code in @pergel/module-box (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191284 | Malicious code in @pergel/cli (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191283 | Malicious code in @oku-ui/visually-hidden (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191282 | Malicious code in @oku-ui/utils (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191281 | Malicious code in @oku-ui/tooltip (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191280 | Malicious code in @oku-ui/toolbar (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191279 | Malicious code in @oku-ui/toggle-group (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191278 | Malicious code in @oku-ui/toggle (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191277 | Malicious code in @oku-ui/toast (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191276 | Malicious code in @oku-ui/tabs (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191275 | Malicious code in @oku-ui/switch (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191274 | Malicious code in @oku-ui/slider (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191273 | Malicious code in @oku-ui/separator (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191272 | Malicious code in @oku-ui/scroll-area (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191271 | Malicious code in @oku-ui/roving-focus (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191270 | Malicious code in @oku-ui/radio-group (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191269 | Malicious code in @oku-ui/provide (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191268 | Malicious code in @oku-ui/progress (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191267 | Malicious code in @oku-ui/primitives-nuxt (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-3716 | IBM Security Guardium: Mehrere Schwachstellen ermöglichen die Offenlegung von Informationen | 2024-12-17T23:00:00.000+00:00 | 2024-12-17T23:00:00.000+00:00 |
| wid-sec-w-2024-3704 | Moodle: Mehrere Schwachstellen | 2024-12-16T23:00:00.000+00:00 | 2024-12-17T23:00:00.000+00:00 |
| wid-sec-w-2024-2083 | Red Hat OpenShift Keycloak: Mehrere Schwachstellen | 2024-09-09T22:00:00.000+00:00 | 2024-12-17T23:00:00.000+00:00 |
| wid-sec-w-2024-2046 | Keycloak: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-09-03T22:00:00.000+00:00 | 2024-12-17T23:00:00.000+00:00 |
| wid-sec-w-2024-1350 | Keycloak: Schwachstelle ermöglicht Erlangen von Administratorrechten | 2024-06-11T22:00:00.000+00:00 | 2024-12-17T23:00:00.000+00:00 |
| wid-sec-w-2024-1012 | pgAdmin: Mehrere Schwachstellen | 2024-05-01T22:00:00.000+00:00 | 2024-12-17T23:00:00.000+00:00 |
| wid-sec-w-2024-0947 | Red Hat OpenShift: Mehrere Schwachstellen | 2024-04-22T22:00:00.000+00:00 | 2024-12-17T23:00:00.000+00:00 |
| wid-sec-w-2024-0914 | Red Hat Enterprise Linux (keycloak): Mehrere Schwachstellen | 2024-04-16T22:00:00.000+00:00 | 2024-12-17T23:00:00.000+00:00 |
| wid-sec-w-2024-0576 | pgAdmin: Schwachstelle ermöglicht Codeausführung | 2024-03-06T23:00:00.000+00:00 | 2024-12-17T23:00:00.000+00:00 |
| wid-sec-w-2024-0203 | Red Hat Enterprise Linux Quarkus: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2024-01-25T23:00:00.000+00:00 | 2024-12-17T23:00:00.000+00:00 |
| wid-sec-w-2023-3072 | Red Hat Enterprise Linux(Cryostat): Mehrere Schwachstellen | 2023-12-06T23:00:00.000+00:00 | 2024-12-17T23:00:00.000+00:00 |
| wid-sec-w-2023-0893 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2023-04-10T22:00:00.000+00:00 | 2024-12-17T23:00:00.000+00:00 |
| wid-sec-w-2023-0444 | python-setuptools: Schwachstelle ermöglicht Denial of Service | 2023-02-21T23:00:00.000+00:00 | 2024-12-17T23:00:00.000+00:00 |
| wid-sec-w-2022-2302 | Red Hat JBoss Enterprise Application Platform: Mehrere Schwachstellen | 2022-12-13T23:00:00.000+00:00 | 2024-12-17T23:00:00.000+00:00 |
| wid-sec-w-2022-2219 | H2: Schwachstelle ermöglicht Privilegieneskalation | 2022-12-01T23:00:00.000+00:00 | 2024-12-17T23:00:00.000+00:00 |
| wid-sec-w-2022-1836 | Red Hat Enterprise Linux (BlueZ): Schwachstelle ermöglicht Denial of Service | 2022-05-10T22:00:00.000+00:00 | 2024-12-17T23:00:00.000+00:00 |
| wid-sec-w-2022-0028 | IBM Java: Mehrere Schwachstellen | 2022-06-01T22:00:00.000+00:00 | 2024-12-17T23:00:00.000+00:00 |
| wid-sec-w-2024-3708 | Hitachi Ops Center: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-12-16T23:00:00.000+00:00 | 2024-12-16T23:00:00.000+00:00 |
| wid-sec-w-2024-3707 | Siemens TIA Portal: Schwachstelle ermöglicht Codeausführung | 2024-12-16T23:00:00.000+00:00 | 2024-12-16T23:00:00.000+00:00 |
| wid-sec-w-2024-3705 | Red Hat Ansible Automation Platform: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-12-16T23:00:00.000+00:00 | 2024-12-16T23:00:00.000+00:00 |
| wid-sec-w-2024-0598 | Adobe ColdFusion: Mehrere Schwachstellen | 2024-03-12T23:00:00.000+00:00 | 2024-12-16T23:00:00.000+00:00 |
| wid-sec-w-2023-3068 | UEFI BIOS: Mehrere Schwachstellen | 2023-12-06T23:00:00.000+00:00 | 2024-12-16T23:00:00.000+00:00 |
| wid-sec-w-2023-1871 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2023-07-24T22:00:00.000+00:00 | 2024-12-16T23:00:00.000+00:00 |
| wid-sec-w-2023-1571 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2023-06-26T22:00:00.000+00:00 | 2024-12-16T23:00:00.000+00:00 |
| wid-sec-w-2023-1494 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2023-06-18T22:00:00.000+00:00 | 2024-12-16T23:00:00.000+00:00 |
| wid-sec-w-2023-1404 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2023-06-08T22:00:00.000+00:00 | 2024-12-16T23:00:00.000+00:00 |
| wid-sec-w-2023-0274 | Linux Kernel: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-02-02T23:00:00.000+00:00 | 2024-12-16T23:00:00.000+00:00 |
| wid-sec-w-2022-1987 | Intel NUC Firmware: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2022-11-08T23:00:00.000+00:00 | 2024-12-16T23:00:00.000+00:00 |
| wid-sec-w-2022-1573 | ImageMagick: Mehrere Schwachstellen | 2021-02-15T23:00:00.000+00:00 | 2024-12-16T23:00:00.000+00:00 |
| wid-sec-w-2022-1572 | ImageMagick: Schwachstelle ermöglicht Denial of Service | 2021-02-07T23:00:00.000+00:00 | 2024-12-16T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2011:0152 | Red Hat Security Advisory: java-1.4.2-ibm security update | 2011-01-17T16:40:00+00:00 | 2026-01-28T22:51:33+00:00 |
| rhsa-2010:0987 | Red Hat Security Advisory: java-1.6.0-ibm security and bug fix update | 2010-12-15T23:41:00+00:00 | 2026-01-28T22:51:33+00:00 |
| rhsa-2010:0979 | Red Hat Security Advisory: openssl security update | 2010-12-13T18:39:00+00:00 | 2026-01-28T22:51:33+00:00 |
| rhsa-2010:0978 | Red Hat Security Advisory: openssl security update | 2010-12-13T18:34:00+00:00 | 2026-01-28T22:51:32+00:00 |
| rhsa-2010:0977 | Red Hat Security Advisory: openssl security update | 2010-12-13T18:13:00+00:00 | 2026-01-28T22:51:32+00:00 |
| rhsa-2010:0976 | Red Hat Security Advisory: bind security update | 2010-12-13T17:53:00+00:00 | 2026-01-28T22:51:32+00:00 |
| rhsa-2010:0950 | Red Hat Security Advisory: apr-util security update | 2010-12-08T00:19:00+00:00 | 2026-01-28T22:51:31+00:00 |
| rhsa-2010:0945 | Red Hat Security Advisory: quagga security update | 2010-12-06T19:14:00+00:00 | 2026-01-28T22:51:31+00:00 |
| rhsa-2010:0935 | Red Hat Security Advisory: java-1.4.2-ibm security update | 2010-12-01T21:44:00+00:00 | 2026-01-28T22:51:31+00:00 |
| rhsa-2010:0924 | Red Hat Security Advisory: wireshark security update | 2010-11-30T18:27:00+00:00 | 2026-01-28T22:51:31+00:00 |
| rhsa-2010:0919 | Red Hat Security Advisory: php security update | 2010-11-29T21:31:00+00:00 | 2026-01-28T22:51:31+00:00 |
| rhsa-2010:0918 | Red Hat Security Advisory: cvs security update | 2010-11-29T21:05:00+00:00 | 2026-01-28T22:51:30+00:00 |
| rhsa-2010:0908 | Red Hat Security Advisory: postgresql security update | 2010-11-23T15:59:00+00:00 | 2026-01-28T22:51:30+00:00 |
| rhsa-2010:0891 | Red Hat Security Advisory: pam security update | 2010-11-16T17:51:00+00:00 | 2026-01-28T22:51:29+00:00 |
| rhsa-2010:0890 | Red Hat Security Advisory: pidgin security update | 2010-11-16T17:32:00+00:00 | 2026-01-28T22:51:29+00:00 |
| rhsa-2010:0889 | Red Hat Security Advisory: freetype security update | 2010-11-16T16:50:00+00:00 | 2026-01-28T22:51:29+00:00 |
| rhsa-2010:0873 | Red Hat Security Advisory: java-1.5.0-ibm security update | 2010-11-10T19:00:00+00:00 | 2026-01-28T22:51:29+00:00 |
| rhsa-2010:0866 | Red Hat Security Advisory: cups security update | 2010-11-10T19:00:00+00:00 | 2026-01-28T22:51:29+00:00 |
| rhsa-2010:0864 | Red Hat Security Advisory: freetype security update | 2010-11-10T19:00:00+00:00 | 2026-01-28T22:51:28+00:00 |
| rhsa-2010:0863 | Red Hat Security Advisory: krb5 security update | 2010-11-10T19:00:00+00:00 | 2026-01-28T22:51:28+00:00 |
| rhsa-2010:0862 | Red Hat Security Advisory: nss security update | 2010-11-10T19:00:00+00:00 | 2026-01-28T22:51:28+00:00 |
| rhsa-2010:0859 | Red Hat Security Advisory: poppler security update | 2010-11-10T19:00:00+00:00 | 2026-01-28T22:51:28+00:00 |
| rhsa-2010:0825 | Red Hat Security Advisory: mysql security update | 2010-11-03T20:18:00+00:00 | 2026-01-28T22:51:28+00:00 |
| rhsa-2010:0754 | Red Hat Security Advisory: cups security update | 2010-10-07T17:27:00+00:00 | 2026-01-28T22:51:27+00:00 |
| rhsa-2010:0824 | Red Hat Security Advisory: mysql security update | 2010-11-03T20:01:00+00:00 | 2026-01-28T22:51:26+00:00 |
| rhsa-2010:0819 | Red Hat Security Advisory: pam security update | 2010-11-01T19:45:00+00:00 | 2026-01-28T22:51:26+00:00 |
| rhsa-2010:0811 | Red Hat Security Advisory: cups security update | 2010-10-29T01:39:00+00:00 | 2026-01-28T22:51:26+00:00 |
| rhsa-2010:0807 | Red Hat Security Advisory: java-1.5.0-ibm security update | 2010-10-27T23:03:00+00:00 | 2026-01-28T22:51:26+00:00 |
| rhsa-2010:0788 | Red Hat Security Advisory: pidgin security update | 2010-10-21T16:47:00+00:00 | 2026-01-28T22:51:26+00:00 |
| rhsa-2010:0755 | Red Hat Security Advisory: cups security update | 2010-10-07T17:45:00+00:00 | 2026-01-28T22:51:26+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-53783 | Microsoft Teams Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-10-30T07:00:00.000Z |
| msrc_cve-2025-21750 | wifi: brcmfmac: Check the return value of of_property_read_string_index() | 2025-02-02T00:00:00.000Z | 2025-10-30T01:01:57.000Z |
| msrc_cve-2025-21738 | ata: libata-sff: Ensure that we cannot write outside the allocated buffer | 2025-02-02T00:00:00.000Z | 2025-10-30T01:01:51.000Z |
| msrc_cve-2025-21734 | misc: fastrpc: Fix copy buffer page size | 2025-02-02T00:00:00.000Z | 2025-10-30T01:01:46.000Z |
| msrc_cve-2023-52981 | drm/i915: Fix request ref counting during error capture & debugfs dump | 2025-03-02T00:00:00.000Z | 2025-10-30T01:01:26.000Z |
| msrc_cve-2024-58094 | jfs: add check read-only before truncation in jfs_truncate_nolock() | 2025-04-02T00:00:00.000Z | 2025-10-30T01:01:20.000Z |
| msrc_cve-2025-40071 | tty: n_gsm: Don't block input queue by waiting MSC | 2025-10-02T00:00:00.000Z | 2025-10-29T01:05:06.000Z |
| msrc_cve-2025-40079 | riscv, bpf: Sign extend struct ops return values properly | 2025-10-02T00:00:00.000Z | 2025-10-29T01:05:01.000Z |
| msrc_cve-2025-40068 | fs: ntfs3: Fix integer overflow in run_unpack() | 2025-10-02T00:00:00.000Z | 2025-10-29T01:04:55.000Z |
| msrc_cve-2025-40027 | net/9p: fix double req put in p9_fd_cancelled | 2025-10-02T00:00:00.000Z | 2025-10-29T01:04:34.000Z |
| msrc_cve-2025-11840 | GNU Binutils ldmisc.c vfinfo out-of-bounds | 2025-10-02T00:00:00.000Z | 2025-10-29T01:04:28.000Z |
| msrc_cve-2025-40049 | Squashfs: fix uninit-value in squashfs_get_parent | 2025-10-02T00:00:00.000Z | 2025-10-29T01:04:20.000Z |
| msrc_cve-2025-40081 | perf: arm_spe: Prevent overflow in PERF_IDX2OFF() | 2025-10-02T00:00:00.000Z | 2025-10-29T01:04:15.000Z |
| msrc_cve-2025-40048 | uio_hv_generic: Let userspace take care of interrupt mask | 2025-10-02T00:00:00.000Z | 2025-10-29T01:04:10.000Z |
| msrc_cve-2025-40036 | misc: fastrpc: fix possible map leak in fastrpc_put_args | 2025-10-02T00:00:00.000Z | 2025-10-29T01:04:04.000Z |
| msrc_cve-2025-40043 | net: nfc: nci: Add parameter validation for packet data | 2025-10-02T00:00:00.000Z | 2025-10-29T01:03:54.000Z |
| msrc_cve-2025-40033 | remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable() | 2025-10-02T00:00:00.000Z | 2025-10-29T01:03:37.000Z |
| msrc_cve-2025-40077 | f2fs: fix to avoid overflow while left shift operation | 2025-10-02T00:00:00.000Z | 2025-10-29T01:03:32.000Z |
| msrc_cve-2025-40032 | PCI: endpoint: pci-epf-test: Add NULL check for DMA channels before release | 2025-10-02T00:00:00.000Z | 2025-10-29T01:03:26.000Z |
| msrc_cve-2025-40080 | nbd: restrict sockets to TCP and UDP | 2025-10-02T00:00:00.000Z | 2025-10-29T01:03:21.000Z |
| msrc_cve-2025-40060 | coresight: trbe: Return NULL pointer for allocation failures | 2025-10-02T00:00:00.000Z | 2025-10-29T01:03:16.000Z |
| msrc_cve-2025-40026 | KVM: x86: Don't (re)check L1 intercepts when completing userspace I/O | 2025-10-02T00:00:00.000Z | 2025-10-29T01:03:10.000Z |
| msrc_cve-2025-40056 | vhost: vringh: Fix copy_to_iter return value check | 2025-10-02T00:00:00.000Z | 2025-10-29T01:02:59.000Z |
| msrc_cve-2025-40051 | vhost: vringh: Modify the return value check | 2025-10-02T00:00:00.000Z | 2025-10-29T01:02:54.000Z |
| msrc_cve-2025-40055 | ocfs2: fix double free in user_cluster_connect() | 2025-10-02T00:00:00.000Z | 2025-10-29T01:02:49.000Z |
| msrc_cve-2025-40025 | f2fs: fix to do sanity check on node footer for non inode dnode | 2025-10-02T00:00:00.000Z | 2025-10-29T01:02:43.000Z |
| msrc_cve-2025-40053 | net: dlink: handle copy_thresh allocation failure | 2025-10-02T00:00:00.000Z | 2025-10-29T01:02:38.000Z |
| msrc_cve-2025-40035 | Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak | 2025-10-02T00:00:00.000Z | 2025-10-29T01:02:33.000Z |
| msrc_cve-2025-40030 | pinctrl: check the return value of pinmux_ops::get_function_name() | 2025-10-02T00:00:00.000Z | 2025-10-29T01:02:27.000Z |
| msrc_cve-2025-40052 | smb: client: fix crypto buffers in non-linear memory | 2025-10-02T00:00:00.000Z | 2025-10-29T01:02:22.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202404-2274 | Netgear R6850 1.1.0.88 was discovered to contain a command injection vulnerability via th… | 2025-06-24T23:21:34.975000Z |
| var-202505-1630 | A vulnerability was found in TOTOLINK A3002R and A3002RU 3.0.0-B20230809.1615. It has bee… | 2025-06-24T23:21:33.016000Z |
| var-202505-1746 | A vulnerability classified as critical was found in TOTOLINK A3002R and A3002RU 3.0.0-B20… | 2025-06-24T23:16:47.239000Z |
| var-202404-1791 | Netgear R6850 1.1.0.88 was discovered to contain a command injection vulnerability via th… | 2025-06-24T23:15:04.817000Z |
| var-202505-1905 | A vulnerability, which was classified as problematic, has been found in Netgear DGND3700 … | 2025-06-24T23:15:02.694000Z |
| var-202505-2212 | TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow via the… | 2025-06-22T23:10:57.901000Z |
| var-202308-1260 | Triangle MicroWorks SCADA Data Gateway Event Log Directory Traversal Arbitrary File Creat… | 2025-06-21T23:39:23.489000Z |
| var-202407-2398 | A vulnerability has been found in TOTOLINK A3600R 4.1.2cu.5182_B20201102 and classified a… | 2025-06-21T23:39:21.288000Z |
| var-202506-0507 | A vulnerability, which was classified as critical, has been found in TOTOLINK EX1200T up … | 2025-06-21T23:39:19.667000Z |
| var-202501-0795 | TP-Link TL-WR940N V3 and V4 with firmware 3.16.9 and earlier contain a buffer overflow vi… | 2025-06-21T23:39:01.074000Z |
| var-202503-0079 | A vulnerability, which was classified as critical, was found in D-Link DAP-1562 1.10. Thi… | 2025-06-21T23:37:54.106000Z |
| var-202401-2186 | TOTOLINK A8000RU v7.1cu.643_B20200521 was discovered to contain a hardcoded password for … | 2025-06-21T23:35:55.228000Z |
| var-202408-0553 | A vulnerability, which was classified as critical, was found in TOTOLINK EX1200L 9.3.5u.6… | 2025-06-21T23:35:54.041000Z |
| var-202410-0065 | A vulnerability classified as critical has been found in D-Link DIR-605L 2.13B01 BETA. Th… | 2025-06-21T23:35:02.496000Z |
| var-202506-0372 | A vulnerability has been found in TOTOLINK N302R Plus up to 3.4.0-B20201028 and classifie… | 2025-06-21T23:34:07.559000Z |
| var-202308-1066 | Triangle MicroWorks SCADA Data Gateway Trusted Certification Unrestricted Upload of File … | 2025-06-21T23:33:47.751000Z |
| var-202407-2336 | A vulnerability classified as critical has been found in TOTOLINK A3600R 4.1.2cu.5182_B20… | 2025-06-21T23:33:45.955000Z |
| var-202407-2399 | A vulnerability was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. It has been rated as… | 2025-06-21T23:33:45.931000Z |
| var-202502-3667 | A buffer overflow vulnerability was discovered in D-Link DSL-3782 v1.01 via the destinati… | 2025-06-21T23:31:36.775000Z |
| var-202401-1390 | TOTOlink A3700R v9.1.2u.5822_B20200513 was discovered to contain a remote command executi… | 2025-06-21T23:30:43.805000Z |
| var-202407-2332 | A vulnerability, which was classified as critical, has been found in TOTOLINK A7000R 9.1.… | 2025-06-21T23:30:42.758000Z |
| var-202502-2909 | An OS command injection vulnerability was discovered in D-Link DSL-3782 v1.01 via the inI… | 2025-06-21T23:30:41.718000Z |
| var-202506-0531 | A vulnerability was found in TOTOLINK EX1200T up to 4.1.2cu.5232_B20210713 and classified… | 2025-06-21T23:30:41.180000Z |
| var-202401-1120 | D-Link DIR-822+ V1.0.2 contains a login bypass in the HNAP1 interface, which allows attac… | 2025-06-21T23:30:15.029000Z |
| var-202402-0623 | An issue in Dlink DIR-816A2 v.1.10CNB05 allows a remote attacker to execute arbitrary cod… | 2025-06-21T23:30:14.821000Z |
| var-202506-0487 | A vulnerability has been found in TOTOLINK EX1200T up to 4.1.2cu.5232_B20210713 and class… | 2025-06-21T23:30:12.356000Z |
| var-202403-2869 | DIR-845L router <= v1.01KRb03 has an Unauthenticated remote code execution vulnerability … | 2025-06-21T23:28:06.350000Z |
| var-202408-0531 | A vulnerability has been found in TOTOLINK EX1200L 9.3.5u.6146_B20201023 and classified a… | 2025-06-21T23:28:05.606000Z |
| var-202409-0258 | A vulnerability was found in TOTOLINK AC1200 T8 and AC1200 T10 4.1.5cu.861_B20230220/4.1.… | 2025-06-21T23:28:05.469000Z |
| var-202502-2107 | A buffer overflow vulnerability was discovered in D-Link DSL-3782 v1.01, triggered by the… | 2025-06-21T23:28:04.591000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2024:2759-1 | Security update for the Linux Kernel (Live Patch 48 for SLE 15 SP2) | 2024-08-05T20:03:58Z | 2024-08-05T20:03:58Z |
| suse-su-2024:2758-1 | Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP2) | 2024-08-05T20:03:50Z | 2024-08-05T20:03:50Z |
| suse-su-2024:2757-1 | Security update for python-Twisted | 2024-08-05T19:58:56Z | 2024-08-05T19:58:56Z |
| suse-su-2024:2756-1 | Security update for ksh | 2024-08-05T19:57:56Z | 2024-08-05T19:57:56Z |
| suse-su-2024:2755-1 | Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP3) | 2024-08-05T19:04:08Z | 2024-08-05T19:04:08Z |
| suse-su-2024:2754-1 | Security update for skopeo | 2024-08-05T19:03:58Z | 2024-08-05T19:03:58Z |
| suse-su-2024:2751-1 | Security update for the Linux Kernel RT (Live Patch 11 for SLE 15 SP5) | 2024-08-05T16:33:39Z | 2024-08-05T16:33:39Z |
| suse-su-2024:2750-1 | Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP5) | 2024-08-05T16:33:31Z | 2024-08-05T16:33:31Z |
| suse-su-2024:2734-1 | Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP5) | 2024-08-05T15:34:35Z | 2024-08-05T15:34:35Z |
| suse-su-2024:2740-1 | Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP2) | 2024-08-05T15:34:28Z | 2024-08-05T15:34:28Z |
| suse-su-2024:2732-1 | Security update for python-Twisted | 2024-08-05T10:56:13Z | 2024-08-05T10:56:13Z |
| suse-su-2024:2726-1 | Security update for the Linux Kernel RT (Live Patch 14 for SLE 15 SP5) | 2024-08-02T20:03:57Z | 2024-08-02T20:03:57Z |
| suse-su-2024:2725-1 | Security update for the Linux Kernel RT (Live Patch 13 for SLE 15 SP5) | 2024-08-02T20:03:49Z | 2024-08-02T20:03:49Z |
| suse-su-2024:2724-1 | Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP5) | 2024-08-02T20:03:44Z | 2024-08-02T20:03:44Z |
| suse-su-2024:2723-1 | Security update for the Linux Kernel RT (Live Patch 15 for SLE 15 SP5) | 2024-08-02T19:33:56Z | 2024-08-02T19:33:56Z |
| suse-su-2024:2722-1 | Security update for the Linux Kernel RT (Live Patch 10 for SLE 15 SP5) | 2024-08-02T19:33:49Z | 2024-08-02T19:33:49Z |
| suse-su-2024:2719-1 | Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP5) | 2024-08-02T19:33:36Z | 2024-08-02T19:33:36Z |
| suse-su-2024:2709-1 | Security update for docker | 2024-08-02T08:26:40Z | 2024-08-02T08:26:40Z |
| suse-su-2024:2704-1 | Security update for patch | 2024-08-01T21:34:45Z | 2024-08-01T21:34:45Z |
| suse-su-2024:2685-1 | Security update for python-requests | 2024-07-31T23:48:22Z | 2024-07-31T23:48:22Z |
| suse-su-2024:1880-2 | Security update for python-requests | 2024-07-31T23:46:44Z | 2024-07-31T23:46:44Z |
| suse-ru-2024:2684-1 | Recommended update for mozilla-nss | 2024-07-31T18:05:14Z | 2024-07-31T18:05:14Z |
| suse-su-2024:2681-1 | Security update for gvfs | 2024-07-31T12:42:59Z | 2024-07-31T12:42:59Z |
| suse-su-2024:2262-3 | Security update for postgresql14 | 2024-07-31T08:31:24Z | 2024-07-31T08:31:24Z |
| suse-su-2024:2262-2 | Security update for postgresql14 | 2024-07-31T08:31:24Z | 2024-07-31T08:31:24Z |
| suse-su-2024:2669-1 | Security update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container, virt-pr-helper-container | 2024-07-30T14:15:24Z | 2024-07-30T14:15:24Z |
| suse-su-2024:2668-1 | Security update for cdi-apiserver-container, cdi-cloner-container, cdi-controller-container, cdi-importer-container, cdi-operator-container, cdi-uploadproxy-container, cdi-uploadserver-container, containerized-data-importer | 2024-07-30T14:14:58Z | 2024-07-30T14:14:58Z |
| suse-su-2024:2663-1 | Security update for orc | 2024-07-30T13:44:39Z | 2024-07-30T13:44:39Z |
| suse-su-2024:2662-1 | Security update for python-urllib3 | 2024-07-30T13:41:42Z | 2024-07-30T13:41:42Z |
| suse-su-2024:2661-1 | Security update for gtk3 | 2024-07-30T13:40:27Z | 2024-07-30T13:40:27Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:11656-1 | nodejs-electron-13.6.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11655-1 | strongswan-5.9.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11654-1 | libzapojit-0_0-0-0.0.3-7.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11653-1 | dnsmasq-2.86-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11652-1 | ceph-16.2.6.463+g22e7612f9ad-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11651-1 | grafana-7.5.11-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11650-1 | cargo1.56-1.56.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11649-1 | matrix-synapse-1.47.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11648-1 | libmariadbd-devel-10.6.5-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11647-1 | docker-20.10.11_ce-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11646-1 | containerd-1.4.12-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11645-1 | libnss_slurm2-21.08.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11644-1 | python3-mailman-3.3.5-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11643-1 | opensc-0.22.0-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11642-1 | aom-tools-3.2.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11641-1 | libwireshark14-3.4.10-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11640-1 | php7-7.4.26-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11639-1 | tor-0.4.6.8-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11638-1 | php8-8.0.13-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11637-1 | corepack16-16.13.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11636-1 | gmp-devel-32bit-6.2.1-4.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11635-1 | liblldpctl4-1.0.13-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11634-1 | binutils-2.37-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11633-1 | barrier-2.4.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11632-1 | libspeex1-1.2-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11631-1 | ctdb-4.15.2+git.193.a4d6307f1fd-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11630-1 | jupyter-nbdime-6.1.2-8.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11629-1 | libecpg6-14.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11628-1 | postgresql13-13.5-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11627-1 | postgresql12-12.9-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-21188 | esri Portal for ArcGIS Enterprise Sites跨站脚本漏洞(CNVD-2025-21188) | 2025-08-27 | 2025-09-12 |
| cnvd-2025-21187 | esri Portal for ArcGIS Enterprise Sites跨站脚本漏洞(CNVD-2025-21187) | 2025-08-27 | 2025-09-12 |
| cnvd-2025-21186 | esri Portal for ArcGIS Enterprise Sites跨站脚本漏洞(CNVD-2025-21186) | 2025-08-27 | 2025-09-12 |
| cnvd-2025-21185 | esri Portal for ArcGIS Enterprise Sites跨站脚本漏洞 | 2025-08-27 | 2025-09-12 |
| cnvd-2025-21184 | NVIDIA GPU Display Driver存在未明漏洞(CNVD-2025-21184) | 2025-08-10 | 2025-09-12 |
| cnvd-2025-21183 | NVIDIA GPU Display Driver存在未明漏洞(CNVD-2025-21183) | 2025-08-10 | 2025-09-12 |
| cnvd-2025-21182 | NVIDIA GPU Display Driver存在未明漏洞 | 2025-08-10 | 2025-09-12 |
| cnvd-2025-21181 | NVIDIA DOCA存在未明漏洞 | 2025-09-08 | 2025-09-12 |
| cnvd-2025-21180 | NVIDIA DOCA存在未明漏洞(CNVD-2025-21180) | 2025-09-08 | 2025-09-12 |
| cnvd-2025-21179 | NVIDIA ConnectX存在未明漏洞(CNVD-2025-21179) | 2025-09-08 | 2025-09-12 |
| cnvd-2025-21178 | NVIDIA BlueField存在未明漏洞(CNVD-2025-21178) | 2025-09-08 | 2025-09-12 |
| cnvd-2025-21177 | NVIDIA NVDebug存在未明漏洞(CNVD-2025-21177) | 2025-09-11 | 2025-09-12 |
| cnvd-2025-21175 | Fortinet FortiDDoS-F操作系统命令注入漏洞 | 2025-09-11 | 2025-09-12 |
| cnvd-2025-21174 | Rockwell Automation FactoryTalk Activation Manager数据泄露漏洞 | 2025-09-11 | 2025-09-12 |
| cnvd-2025-21173 | Adobe Experience Manager代码执行漏洞 | 2025-08-11 | 2025-09-12 |
| cnvd-2025-21172 | Adobe Experience Manager XML实体注入漏洞(CNVD-2025-21172) | 2025-08-11 | 2025-09-12 |
| cnvd-2025-21171 | Tenda CP6加密问题漏洞 | 2025-09-04 | 2025-09-12 |
| cnvd-2025-21170 | Tenda AC20缓冲区溢出漏洞 | 2025-09-04 | 2025-09-12 |
| cnvd-2025-21169 | Tenda AC20缓冲区溢出漏洞 | 2025-09-11 | 2025-09-12 |
| cnvd-2025-21167 | Adobe After Effects越界读取漏洞(CNVD-2025-21167) | 2021-12-27 | 2025-09-12 |
| cnvd-2025-21166 | Adobe After Effects越界读取漏洞(CNVD-2025-21166) | 2021-12-27 | 2025-09-12 |
| cnvd-2025-21165 | Adobe Experience Manager输入验证错误漏洞(CNVD-2025-21165) | 2025-09-11 | 2025-09-12 |
| cnvd-2025-21164 | Tenda G3 formDelDhcpRule函数缓冲区溢出漏洞 | 2025-09-11 | 2025-09-12 |
| cnvd-2025-21163 | Tenda G3 formAddVpnUsers函数缓冲区溢出漏洞 | 2025-09-11 | 2025-09-12 |
| cnvd-2025-21162 | Tenda G3 dns_forward_rule_store函数缓冲区溢出漏洞 | 2025-09-11 | 2025-09-12 |
| cnvd-2025-21161 | Tenda G3 addDhcpRule函数缓冲区溢出漏洞 | 2025-09-11 | 2025-09-12 |
| cnvd-2025-21160 | SAP NetWeaver存在未明漏洞(CNVD-2025-21160) | 2025-09-11 | 2025-09-12 |
| cnvd-2025-21159 | SAP NetWeaver Application Server存在未明漏洞(CNVD-2025-21159) | 2025-09-11 | 2025-09-12 |
| cnvd-2025-21158 | Rockwell Automation ThinManager服务端请求伪造漏洞 | 2025-09-11 | 2025-09-12 |
| cnvd-2025-21156 | Adobe Experience Manager输入验证错误漏洞(CNVD-2025-21156) | 2025-09-11 | 2025-09-12 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2021-avi-952 | Multiples vulnérabilités dans les produits IBM | 2021-12-15T00:00:00.000000 | 2021-12-15T00:00:00.000000 |
| certfr-2021-avi-951 | Multiples vulnérabilités dans le noyau Linux de RedHat | 2021-12-15T00:00:00.000000 | 2021-12-15T00:00:00.000000 |
| certfr-2021-avi-950 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2021-12-15T00:00:00.000000 | 2021-12-15T00:00:00.000000 |
| certfr-2021-avi-949 | Multiples vulnérabilités dans les produits Siemens | 2021-12-15T00:00:00.000000 | 2021-12-15T00:00:00.000000 |
| certfr-2021-avi-948 | Multiples vulnérabilités dans les produits SAP | 2021-12-14T00:00:00.000000 | 2021-12-14T00:00:00.000000 |
| certfr-2021-avi-946 | Multiples vulnérabilités dans Google Chrome | 2021-12-14T00:00:00.000000 | 2021-12-14T00:00:00.000000 |
| certfr-2021-avi-945 | Multiples vulnérabilités dans les produits Apple | 2021-12-14T00:00:00.000000 | 2021-12-14T00:00:00.000000 |
| certfr-2021-avi-944 | Multiples vulnérabilités dans Microsoft Edge | 2021-12-13T00:00:00.000000 | 2021-12-13T00:00:00.000000 |
| certfr-2021-avi-943 | Multiples vulnérabilités dans les produits IBM | 2021-12-13T00:00:00.000000 | 2021-12-13T00:00:00.000000 |
| certfr-2021-avi-942 | Multiples vulnérabilités dans les produits GitLab | 2021-12-13T00:00:00.000000 | 2021-12-13T00:00:00.000000 |
| certfr-2021-avi-941 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2021-12-13T00:00:00.000000 | 2021-12-13T00:00:00.000000 |
| certfr-2021-avi-940 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2021-12-10T00:00:00.000000 | 2021-12-10T00:00:00.000000 |
| certfr-2021-avi-934 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2021-12-10T00:00:00.000000 | 2021-12-10T00:00:00.000000 |
| certfr-2021-avi-933 | Vulnérabilité dans les produits QNAP | 2021-12-10T00:00:00.000000 | 2021-12-10T00:00:00.000000 |
| certfr-2021-avi-932 | Multiples vulnérabilités dans les produits IBM | 2021-12-10T00:00:00.000000 | 2021-12-10T00:00:00.000000 |
| certfr-2021-avi-931 | Multiples vulnérabilités dans les produits Cisco | 2021-12-10T00:00:00.000000 | 2021-12-10T00:00:00.000000 |
| certfr-2021-avi-930 | Multiples vulnérabilités dans SolarWinds Serv-U | 2021-12-09T00:00:00.000000 | 2021-12-09T00:00:00.000000 |
| certfr-2021-avi-929 | Vulnérabilité dans SonicWall Global VPN Client | 2021-12-09T00:00:00.000000 | 2021-12-09T00:00:00.000000 |
| certfr-2021-avi-927 | Multiples vulnérabilités dans les produits Fortinet | 2021-12-08T00:00:00.000000 | 2021-12-08T00:00:00.000000 |
| certfr-2021-avi-926 | Multiples vulnérabilités dans les produits SonicWall | 2021-12-08T00:00:00.000000 | 2021-12-08T00:00:00.000000 |
| certfr-2021-avi-925 | Multiples vulnérabilités dans Mozilla Thunderbird | 2021-12-08T00:00:00.000000 | 2021-12-08T00:00:00.000000 |
| certfr-2021-avi-924 | Multiples vulnérabilités dans Mozilla Firefox et Firefox ESR | 2021-12-08T00:00:00.000000 | 2021-12-08T00:00:00.000000 |
| certfr-2021-avi-923 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2021-12-08T00:00:00.000000 | 2021-12-08T00:00:00.000000 |
| certfr-2021-avi-922 | Vulnérabilité dans Red Hat | 2021-12-08T00:00:00.000000 | 2021-12-08T00:00:00.000000 |
| certfr-2021-avi-921 | Multiples vulnérabilités dans les produits GitLab | 2021-12-07T00:00:00.000000 | 2021-12-07T00:00:00.000000 |
| certfr-2021-avi-920 | Multiples vulnérabilités dans Android | 2021-12-07T00:00:00.000000 | 2021-12-07T00:00:00.000000 |
| certfr-2021-avi-919 | Multiples vulnérabilités dans Google Chrome | 2021-12-07T00:00:00.000000 | 2021-12-07T00:00:00.000000 |
| certfr-2021-avi-910 | Vulnérabilité dans Fortinet FortiClient | 2021-11-30T00:00:00.000000 | 2021-12-07T00:00:00.000000 |
| certfr-2021-avi-918 | Vulnérabilité dans F5 NGINX | 2021-12-06T00:00:00.000000 | 2021-12-06T00:00:00.000000 |
| certfr-2021-avi-917 | Vulnérabilité dans Red Hat | 2021-12-06T00:00:00.000000 | 2021-12-06T00:00:00.000000 |