Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-11939 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
ChurchCRM Backup Restore RestoreJob.php path traversal |
n/a |
ChurchCRM |
2025-10-19T08:02:05.503Z | 2026-02-24T07:02:05.183Z |
| CVE-2025-11938 |
6.3 (4.0)
5.6 (3.1)
5.6 (3.0)
|
ChurchCRM setup.php deserialization |
n/a |
ChurchCRM |
2025-10-19T07:32:05.836Z | 2026-02-24T07:01:51.541Z |
| CVE-2026-25412 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-02-19T08:27:06.073Z | 2026-02-24T07:01:43.622Z |
| CVE-2025-11905 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
yanyutao0402 ChanCMS gather.js getArticle code injection |
yanyutao0402 |
ChanCMS |
2025-10-17T15:32:06.106Z | 2026-02-24T07:01:38.053Z |
| CVE-2025-11904 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
yanyutao0402 ChanCMS hasUse sql injection |
yanyutao0402 |
ChanCMS |
2025-10-17T15:02:05.703Z | 2026-02-24T07:01:24.738Z |
| CVE-2025-11903 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
yanyutao0402 ChanCMS update sql injection |
yanyutao0402 |
ChanCMS |
2025-10-17T14:02:07.265Z | 2026-02-24T07:01:13.447Z |
| CVE-2025-11902 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
yanyutao0402 ChanCMS findField sql injection |
yanyutao0402 |
ChanCMS |
2025-10-17T14:02:05.201Z | 2026-02-24T07:01:02.037Z |
| CVE-2025-11853 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Sismics Teedy API Endpoint file access control |
Sismics |
Teedy |
2025-10-16T19:02:07.747Z | 2026-02-24T07:00:48.654Z |
| CVE-2025-11840 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
GNU Binutils ldmisc.c vfinfo out-of-bounds |
GNU |
Binutils |
2025-10-16T15:32:11.651Z | 2026-02-24T07:00:36.056Z |
| CVE-2025-11839 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
GNU Binutils prdbg.c tg_tag_type return value |
GNU |
Binutils |
2025-10-16T14:02:13.689Z | 2026-02-24T07:00:22.354Z |
| CVE-2025-11664 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
Campcodes Online Beauty Parlor Management System searc… |
Campcodes |
Online Beauty Parlor Management System |
2025-10-13T06:02:06.037Z | 2026-02-24T07:00:07.453Z |
| CVE-2025-11663 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
Campcodes Online Beauty Parlor Management System manag… |
Campcodes |
Online Beauty Parlor Management System |
2025-10-13T05:32:06.799Z | 2026-02-24T06:59:49.192Z |
| CVE-2025-11609 |
6.3 (4.0)
3.7 (3.1)
3.7 (3.0)
|
code-projects Hospital Management System express-sessi… |
code-projects |
Hospital Management System |
2025-10-11T17:32:05.833Z | 2026-02-24T06:59:37.349Z |
| CVE-2025-11607 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
harry0703 MoneyPrinterTurbo API Endpoint music.py uplo… |
harry0703 |
MoneyPrinterTurbo |
2025-10-11T16:32:05.833Z | 2026-02-24T06:59:23.650Z |
| CVE-2025-11599 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Campcodes Online Apartment Visitor Management System f… |
Campcodes |
Online Apartment Visitor Management System |
2025-10-11T12:02:05.841Z | 2026-02-24T06:59:09.880Z |
| CVE-2025-11595 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
Campcodes Online Apartment Visitor Management System a… |
Campcodes |
Online Apartment Visitor Management System |
2025-10-11T09:32:06.781Z | 2026-02-24T06:58:57.906Z |
| CVE-2025-11593 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
CodeAstro Gym Management System delete-equipment.php s… |
CodeAstro |
Gym Management System |
2025-10-11T07:02:05.897Z | 2026-02-24T06:58:46.160Z |
| CVE-2025-11592 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
CodeAstro Gym Management System edit-equipmentform.php… |
CodeAstro |
Gym Management System |
2025-10-11T06:32:06.416Z | 2026-02-24T06:58:33.507Z |
| CVE-2025-11591 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
CodeAstro Gym Management System delete-member.php sql … |
CodeAstro |
Gym Management System |
2025-10-11T05:02:06.905Z | 2026-02-24T06:58:19.627Z |
| CVE-2025-11590 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
CodeAstro Gym Management System equipment-entry.php sq… |
CodeAstro |
Gym Management System |
2025-10-11T01:02:07.340Z | 2026-02-24T06:58:06.841Z |
| CVE-2025-11589 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
CodeAstro Gym Management System user-payment.php sql i… |
CodeAstro |
Gym Management System |
2025-10-10T21:32:09.530Z | 2026-02-24T06:57:52.805Z |
| CVE-2025-11588 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
CodeAstro Gym Management System index.php sql injection |
CodeAstro |
Gym Management System |
2025-10-10T21:32:06.853Z | 2026-02-24T06:57:39.019Z |
| CVE-2025-11586 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda AC7 setNotUpgrade stack-based overflow |
Tenda |
AC7 |
2025-10-10T21:02:10.890Z | 2026-02-24T06:57:26.088Z |
| CVE-2025-11581 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
PowerJob OpenAPIController runJob authorization |
n/a |
PowerJob |
2025-10-10T19:02:05.565Z | 2026-02-24T06:57:11.124Z |
| CVE-2025-11580 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
PowerJob list authorization |
n/a |
PowerJob |
2025-10-10T18:02:05.673Z | 2026-02-24T06:56:57.453Z |
| CVE-2025-11557 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
projectworlds Gate Pass Management System add-pass.php… |
projectworlds |
Gate Pass Management System |
2025-10-09T21:02:05.659Z | 2026-02-24T06:56:45.392Z |
| CVE-2025-11555 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Campcodes Online Learning Management System calendar_o… |
Campcodes |
Online Learning Management System |
2025-10-09T20:32:05.595Z | 2026-02-24T06:56:32.966Z |
| CVE-2025-11554 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Portabilis i-Educar User Type AccessLevelController.ph… |
Portabilis |
i-Educar |
2025-10-09T20:02:06.510Z | 2026-02-24T06:56:18.625Z |
| CVE-2025-11550 |
7.1 (4.0)
6.5 (3.1)
6.5 (3.0)
|
Tenda W12 HTTP Request modules wifiScheduledSet null p… |
Tenda |
W12 |
2025-10-09T18:02:06.757Z | 2026-02-24T06:56:06.954Z |
| CVE-2025-11549 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda W12 HTTP Request modules wifiMacFilterSet stack-… |
Tenda |
W12 |
2025-10-09T17:02:06.797Z | 2026-02-24T06:55:52.346Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-20619 |
5.5 (3.1)
|
A logging issue was addressed with improved data … |
Apple |
macOS |
2026-02-11T22:58:45.281Z | 2026-02-13T17:25:51.527Z |
| CVE-2026-20623 |
5.5 (3.1)
|
A permissions issue was addressed by removing the… |
Apple |
macOS |
2026-02-11T22:58:49.045Z | 2026-02-13T17:24:27.672Z |
| CVE-2026-20624 |
5.5 (3.1)
|
An injection issue was addressed with improved va… |
Apple |
macOS |
2026-02-11T22:58:58.055Z | 2026-02-13T16:55:16.817Z |
| CVE-2026-1446 |
5 (3.1)
|
XSS issue is Esri ArcGIS Pro versions 3.6.0 and earlier |
Esri |
ArcGIS Pro |
2026-01-26T17:24:12.411Z | 2026-02-06T06:04:15.645Z |
| CVE-2024-51962 |
8.7 (3.1)
|
SQL injection vulnerability in ArcGIS Server |
Esri |
ArcGIS Server |
2025-03-03T19:58:48.928Z | 2026-02-06T06:08:07.932Z |
| CVE-2024-25709 |
6.1 (3.1)
|
Self-XSS style in move item dialog |
Esri |
Portal for ArcGIS |
2024-04-04T17:55:17.893Z | 2026-02-06T06:10:48.587Z |
| CVE-2024-25705 |
5.4 (3.1)
|
Cross site scripting issue in embed widget |
Esri |
Portal for ArcGIS |
2024-04-04T17:55:55.942Z | 2026-02-06T06:12:10.286Z |
| CVE-2024-51954 |
8.5 (3.1)
|
Unauthorized access to secure services in ArcGIS Server |
Esri |
ArcGIS Server |
2025-03-03T19:53:21.215Z | 2026-02-06T06:06:30.794Z |
| CVE-2024-25699 |
8.5 (3.1)
|
Portal for ArcGIS has an invalid authentication vulner… |
Esri |
Portal for ArcGIS |
2024-04-04T17:56:25.557Z | 2026-02-06T06:13:23.035Z |
| CVE-2024-8149 |
4.6 (3.1)
|
BUG-000168624 - Unvalidated redirect in Portal for ArcGIS. |
Esri |
Portal for ArcGIS |
2024-10-04T17:14:39.010Z | 2026-02-06T06:15:10.027Z |
| CVE-2023-25837 |
8.4 (3.1)
|
BUG-000133088 - ArcGIS Enterprise site builder is subj… |
Esri |
Portal for ArcGIS Sites |
2023-07-21T03:42:24.610Z | 2026-02-06T06:16:41.493Z |
| CVE-2023-25835 |
8.4 (3.1)
|
BUG-000153659 ArcGIS Enterprise Sites has a stored XS… |
Esri |
Portal for ArcGIS Sites |
2023-07-20T23:30:50.190Z | 2026-02-06T06:17:43.231Z |
| CVE-2026-22220 |
6.8 (4.0)
|
Improper Input Validation Leading to DoS on TP-Link Ar… |
TP-Link Systems Inc. |
Archer BE230 v1.2 |
2026-02-03T17:15:59.836Z | 2026-02-04T18:32:13.840Z |
| CVE-2026-22228 |
6.8 (4.0)
|
Improper Input Validation Leading to DoS on TP-Link Ar… |
TP-Link Systems Inc. |
Archer BE230 v1.2 |
2026-02-03T17:20:34.537Z | 2026-02-04T18:28:42.403Z |
| CVE-2025-68157 |
3.7 (3.1)
|
webpack buildHttp HttpUriPlugin allowedUris bypass via… |
webpack |
webpack |
2026-02-05T23:08:13.214Z | 2026-02-06T19:29:14.352Z |
| CVE-2025-64657 |
9.8 (3.1)
|
Azure Application Gateway Elevation of Privilege Vulne… |
Microsoft |
Azure App Gateway |
2025-11-26T00:20:52.352Z | 2026-02-26T16:07:28.437Z |
| CVE-2025-46305 |
5.7 (3.1)
|
The issue was addressed with improved bounds chec… |
Apple |
macOS |
2026-02-11T22:58:09.916Z | 2026-02-13T18:59:36.484Z |
| CVE-2025-46304 |
5.7 (3.1)
|
The issue was addressed with improved bounds chec… |
Apple |
macOS |
2026-02-11T22:58:04.411Z | 2026-02-13T18:59:39.713Z |
| CVE-2025-46303 |
5.7 (3.1)
|
The issue was addressed with improved bounds chec… |
Apple |
macOS |
2026-02-11T22:58:28.265Z | 2026-02-13T18:59:42.673Z |
| CVE-2025-46302 |
5.7 (3.1)
|
The issue was addressed with improved bounds chec… |
Apple |
macOS |
2026-02-11T22:58:14.458Z | 2026-02-13T18:59:50.297Z |
| CVE-2025-46301 |
5.7 (3.1)
|
The issue was addressed with improved bounds chec… |
Apple |
macOS |
2026-02-11T22:58:46.183Z | 2026-02-13T18:59:55.810Z |
| CVE-2025-46300 |
5.7 (3.1)
|
The issue was addressed with improved bounds chec… |
Apple |
macOS |
2026-02-11T22:58:30.792Z | 2026-02-13T19:00:07.999Z |
| CVE-2025-36552 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:10:42.204Z | |
| CVE-2025-36545 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:16.143Z | |
| CVE-2025-36542 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:17.424Z | |
| CVE-2025-36538 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:18.604Z | |
| CVE-2025-36534 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:19.538Z | |
| CVE-2025-36532 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:20.473Z | |
| CVE-2025-36526 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:21.535Z | |
| CVE-2025-36524 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:22.471Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-46300 | The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, i… | 2026-02-11T23:16:02.527 | 2026-02-13T19:16:31.773 |
| fkie_cve-2025-36552 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:31.700 | 2026-02-13T19:16:31.700 |
| fkie_cve-2025-36545 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:31.640 | 2026-02-13T19:16:31.640 |
| fkie_cve-2025-36542 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:31.580 | 2026-02-13T19:16:31.580 |
| fkie_cve-2025-36538 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:31.520 | 2026-02-13T19:16:31.520 |
| fkie_cve-2025-36534 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:31.460 | 2026-02-13T19:16:31.460 |
| fkie_cve-2025-36532 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:31.400 | 2026-02-13T19:16:31.400 |
| fkie_cve-2025-36526 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:31.343 | 2026-02-13T19:16:31.343 |
| fkie_cve-2025-36524 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:31.283 | 2026-02-13T19:16:31.283 |
| fkie_cve-2025-36523 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:31.220 | 2026-02-13T19:16:31.220 |
| fkie_cve-2025-36517 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:31.160 | 2026-02-13T19:16:31.160 |
| fkie_cve-2025-35997 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:31.103 | 2026-02-13T19:16:31.103 |
| fkie_cve-2025-35993 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:31.043 | 2026-02-13T19:16:31.043 |
| fkie_cve-2025-35976 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:30.980 | 2026-02-13T19:16:30.980 |
| fkie_cve-2025-35962 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:30.920 | 2026-02-13T19:16:30.920 |
| fkie_cve-2025-35961 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:30.863 | 2026-02-13T19:16:30.863 |
| fkie_cve-2025-35960 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:30.800 | 2026-02-13T19:16:30.800 |
| fkie_cve-2025-32734 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:30.447 | 2026-02-13T19:16:30.447 |
| fkie_cve-2025-32733 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:30.387 | 2026-02-13T19:16:30.387 |
| fkie_cve-2025-32090 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:30.330 | 2026-02-13T19:16:30.330 |
| fkie_cve-2025-32085 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:30.270 | 2026-02-13T19:16:30.270 |
| fkie_cve-2025-32082 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:30.213 | 2026-02-13T19:16:30.213 |
| fkie_cve-2025-32009 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:30.157 | 2026-02-13T19:16:30.157 |
| fkie_cve-2025-31942 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:30.093 | 2026-02-13T19:16:30.093 |
| fkie_cve-2025-31364 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:30.033 | 2026-02-13T19:16:30.033 |
| fkie_cve-2025-31358 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:29.877 | 2026-02-13T19:16:29.877 |
| fkie_cve-2025-31145 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:29.810 | 2026-02-13T19:16:29.810 |
| fkie_cve-2025-30517 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:29.747 | 2026-02-13T19:16:29.747 |
| fkie_cve-2025-29869 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:29.563 | 2026-02-13T19:16:29.563 |
| fkie_cve-2025-27941 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:29.500 | 2026-02-13T19:16:29.500 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-3gp7-mv7f-66rh |
|
In the Linux kernel, the following vulnerability has been resolved: tracing: Fix crash on syntheti… | 2026-02-04T18:30:44Z | 2026-02-04T18:30:44Z |
| ghsa-vjjp-v767-cx96 |
|
In the Linux kernel, the following vulnerability has been resolved: iommu/io-pgtable-arm: fix size… | 2026-02-04T18:30:43Z | 2026-02-04T18:30:43Z |
| ghsa-rx25-rppp-x99w |
|
In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix recvmsg() unconditi… | 2026-02-04T18:30:43Z | 2026-02-04T18:30:43Z |
| ghsa-rpmc-m7xh-8763 |
|
In the Linux kernel, the following vulnerability has been resolved: gpio: cdev: Fix resource leaks… | 2026-02-04T18:30:43Z | 2026-02-04T18:30:43Z |
| ghsa-jfpv-p5jh-pjp7 |
|
In the Linux kernel, the following vulnerability has been resolved: mm/vma: fix anon_vma UAF on mr… | 2026-02-04T18:30:43Z | 2026-02-04T18:30:43Z |
| ghsa-fm5m-5cr7-5q35 |
|
In the Linux kernel, the following vulnerability has been resolved: l2tp: Fix memleak in l2tp_udp_… | 2026-02-04T18:30:43Z | 2026-02-04T18:30:43Z |
| ghsa-9pxj-wr74-v9rh |
|
In the Linux kernel, the following vulnerability has been resolved: i2c: riic: Move suspend handli… | 2026-02-04T18:30:43Z | 2026-02-04T18:30:43Z |
| ghsa-6mm8-fcwp-3g49 |
|
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Sanitize payloa… | 2026-02-04T18:30:43Z | 2026-02-04T18:30:43Z |
| ghsa-692f-c3g3-7699 |
|
In the Linux kernel, the following vulnerability has been resolved: Octeontx2-af: Add proper check… | 2026-02-04T18:30:43Z | 2026-02-04T18:30:43Z |
| ghsa-64mr-2w58-753j |
|
In the Linux kernel, the following vulnerability has been resolved: net: phy: intel-xway: fix OF n… | 2026-02-04T18:30:43Z | 2026-02-04T18:30:43Z |
| ghsa-5vj7-8hh8-cpcc |
|
In the Linux kernel, the following vulnerability has been resolved: platform/x86: hp-bioscfg: Fix … | 2026-02-04T18:30:43Z | 2026-02-04T18:30:43Z |
| ghsa-4v3j-3fr4-cjrj |
|
In the Linux kernel, the following vulnerability has been resolved: platform/x86/amd: Fix memory l… | 2026-02-04T18:30:43Z | 2026-02-04T18:30:43Z |
| ghsa-2725-mxxg-w826 |
|
In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Coalesce only li… | 2026-02-04T18:30:43Z | 2026-02-04T18:30:43Z |
| ghsa-xjpf-mwm5-w4cr |
7.8 (3.1)
|
A maliciously crafted USD file, when loaded or imported into Autodesk Arnold or Autodesk 3ds Max, c… | 2026-02-04T18:30:42Z | 2026-02-04T18:30:42Z |
| ghsa-wqf4-5q2q-7334 |
|
In the Linux kernel, the following vulnerability has been resolved: phy: qcom-qusb2: Fix NULL poin… | 2026-02-04T18:30:42Z | 2026-02-04T18:30:42Z |
| ghsa-wpv7-jq7x-9x2j |
7.8 (3.1)
|
A maliciously crafted GIF file, when parsed through Autodesk 3ds Max, can cause a Stack-Based Buffe… | 2026-02-04T18:30:42Z | 2026-02-04T18:30:42Z |
| ghsa-qvpg-9fvc-x6cv |
|
In the Linux kernel, the following vulnerability has been resolved: ftrace: Do not over-allocate f… | 2026-02-04T18:30:42Z | 2026-02-04T18:30:42Z |
| ghsa-pxjv-j4wf-pfw9 |
|
In the Linux kernel, the following vulnerability has been resolved: pNFS: Fix a deadlock when retu… | 2026-02-04T18:30:42Z | 2026-02-04T18:30:42Z |
| ghsa-pjx5-3639-8fm2 |
4.8 (3.1)
|
A vulnerability in the web-based management interface of Cisco Prime Infrastructure could allow an … | 2026-02-04T18:30:42Z | 2026-02-04T18:30:42Z |
| ghsa-ph76-p2v9-4hmx |
|
In the Linux kernel, the following vulnerability has been resolved: iio: imu: st_lsm6dsx: fix iio_… | 2026-02-04T18:30:42Z | 2026-02-04T18:30:42Z |
| ghsa-mp3x-9r34-2hx4 |
7.5 (3.1)
|
A vulnerability in the text rendering subsystem of Cisco TelePresence Collaboration Endpoint (CE) S… | 2026-02-04T18:30:42Z | 2026-02-04T18:30:42Z |
| ghsa-jxvq-5vh3-x329 |
8.8 (3.1)
|
A vulnerability in the Certificate Management feature of Cisco Meeting Management could allow an au… | 2026-02-04T18:30:42Z | 2026-02-04T18:30:42Z |
| ghsa-j98v-582h-h35h |
7.8 (3.1)
|
A maliciously crafted project directory, when opening a max file in Autodesk 3ds Max, could lead to… | 2026-02-04T18:30:42Z | 2026-02-04T18:30:42Z |
| ghsa-h592-q89w-8q5r |
|
In the Linux kernel, the following vulnerability has been resolved: dmaengine: xilinx: xdma: Fix r… | 2026-02-04T18:30:42Z | 2026-02-04T18:30:42Z |
| ghsa-gqqf-v25p-495h |
7.8 (3.1)
|
A maliciously crafted RGB file, when parsed through Autodesk 3ds Max, can force a Memory Corruption… | 2026-02-04T18:30:42Z | 2026-02-04T18:30:42Z |
| ghsa-g7rw-373x-8c77 |
|
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix drm panic null… | 2026-02-04T18:30:42Z | 2026-02-04T18:30:42Z |
| ghsa-8vw9-4phq-rr32 |
4.3 (3.1)
|
A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager… | 2026-02-04T18:30:42Z | 2026-02-04T18:30:42Z |
| ghsa-89rw-2v88-2798 |
|
In the Linux kernel, the following vulnerability has been resolved: NFS: Fix a deadlock involving … | 2026-02-04T18:30:42Z | 2026-02-04T18:30:42Z |
| ghsa-7pw6-2xv6-25xh |
7.8 (3.1)
|
A maliciously crafted RGB file, when parsed through Autodesk 3ds Max, can force a Memory Corruption… | 2026-02-04T18:30:42Z | 2026-02-04T18:30:42Z |
| ghsa-7fpf-2ppc-w2v7 |
7.8 (3.1)
|
A maliciously crafted GIF file, when parsed through Autodesk 3ds Max, can force an Out-of-Bounds Wr… | 2026-02-04T18:30:42Z | 2026-02-04T18:30:42Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-30964 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.160224Z |
| gsd-2024-30335 | Foxit PDF Reader AcroForm Annotation Out-Of-Bounds Read Information Disclosure Vulnerabil… | 2024-04-03T05:02:29.159672Z |
| gsd-2024-30262 | Contao is an open source content management system. Prior to version 4.13.40, when a fron… | 2024-04-03T05:02:29.159404Z |
| gsd-2024-30670 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.159202Z |
| gsd-2024-30231 | Unrestricted Upload of File with Dangerous Type vulnerability in WebToffee Product Import… | 2024-04-03T05:02:29.158522Z |
| gsd-2024-30701 | An insecure logging vulnerability in ROS2 Galactic Geochelone ROS_VERSION 2 and ROS_PYTHO… | 2024-04-03T05:02:29.158024Z |
| gsd-2024-30195 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:29.157429Z |
| gsd-2024-30810 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.157145Z |
| gsd-2024-30753 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.156945Z |
| gsd-2024-30350 | Foxit PDF Reader Annotation Out-Of-Bounds Read Information Disclosure Vulnerability. This… | 2024-04-03T05:02:29.156424Z |
| gsd-2024-30925 | Cross Site Scripting vulnerability in DerbyNet v9.0 and below allows attackers to execute… | 2024-04-03T05:02:29.156144Z |
| gsd-2024-30755 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.155936Z |
| gsd-2024-30224 | Deserialization of Untrusted Data vulnerability in Wholesale Team WholesaleX.This issue a… | 2024-04-03T05:02:29.155347Z |
| gsd-2024-30122 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.154654Z |
| gsd-2024-30316 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.154455Z |
| gsd-2024-30887 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.154254Z |
| gsd-2024-30344 | Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability. This vulner… | 2024-04-03T05:02:29.153714Z |
| gsd-2024-30383 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.153433Z |
| gsd-2024-30547 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.153231Z |
| gsd-2024-30858 | netentsec NS-ASG 6.3 is vulnerable to SQL Injection via /admin/edit_fire_wall.php. | 2024-04-03T05:02:29.152839Z |
| gsd-2024-30035 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.152574Z |
| gsd-2024-30239 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vuln… | 2024-04-03T05:02:29.151960Z |
| gsd-2024-30278 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.151676Z |
| gsd-2024-30179 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:29.151020Z |
| gsd-2024-30208 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.150620Z |
| gsd-2024-30480 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.150425Z |
| gsd-2024-30145 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.150221Z |
| gsd-2024-30202 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.149909Z |
| gsd-2024-30021 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.149659Z |
| gsd-2024-30381 | An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Juniper Ne… | 2024-04-03T05:02:29.149457Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-191226 | Malicious code in @hover-design/core (npm) | 2025-11-24T23:45:04Z | 2025-12-01T04:28:26Z |
| mal-2025-191225 | Malicious code in @hapheus/n8n-nodes-pgp (npm) | 2025-11-24T23:44:44Z | 2025-12-01T04:28:26Z |
| mal-2025-191219 | Malicious code in @faq-component/react (npm) | 2025-11-24T23:41:28Z | 2025-12-01T04:28:26Z |
| mal-2025-191218 | Malicious code in @faq-component/core (npm) | 2025-11-24T23:41:08Z | 2025-12-01T04:28:26Z |
| mal-2025-191217 | Malicious code in @everreal/web-analytics (npm) | 2025-11-24T23:40:17Z | 2025-12-01T04:28:26Z |
| mal-2025-191216 | Malicious code in @everreal/validate-esmoduleinterop-imports (npm) | 2025-11-24T23:40:02Z | 2025-12-01T04:28:26Z |
| mal-2025-191215 | Malicious code in @everreal/react-charts (npm) | 2025-11-24T23:39:17Z | 2025-12-01T04:28:26Z |
| mal-2025-191214 | Malicious code in @dev-blinq/ui-systems (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191213 | Malicious code in @dev-blinq/cucumber_client (npm) | 2025-11-24T23:35:56Z | 2025-12-01T04:28:26Z |
| mal-2025-191212 | Malicious code in @dev-blinq/cucumber-js (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191210 | Malicious code in @dev-blinq/ai-qa-logic (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191209 | Malicious code in @commute/market-data-chartjs (npm) | 2025-11-25T00:05:13Z | 2025-12-01T04:28:26Z |
| mal-2025-191208 | Malicious code in @commute/market-data (npm) | 2025-11-25T00:04:57Z | 2025-12-01T04:28:26Z |
| mal-2025-191207 | Malicious code in @commute/bloom (npm) | 2025-11-25T00:04:42Z | 2025-12-01T04:28:26Z |
| mal-2025-191206 | Malicious code in @cllbk/ghl (npm) | 2025-11-25T00:04:07Z | 2025-12-01T04:28:26Z |
| mal-2025-191205 | Malicious code in @clausehq/flows-step-taskscreateurl (npm) | 2025-11-25T00:03:52Z | 2025-12-01T04:28:26Z |
| mal-2025-191204 | Malicious code in @clausehq/flows-step-sendgridemail (npm) | 2025-11-25T00:03:37Z | 2025-12-01T04:28:26Z |
| mal-2025-191203 | Malicious code in @clausehq/flows-step-mqtt (npm) | 2025-11-25T00:03:02Z | 2025-12-01T04:28:26Z |
| mal-2025-191202 | Malicious code in @clausehq/flows-step-jsontoxml (npm) | 2025-11-25T00:02:47Z | 2025-12-01T04:28:26Z |
| mal-2025-191201 | Malicious code in @clausehq/flows-step-httprequest (npm) | 2025-11-25T00:02:32Z | 2025-12-01T04:28:26Z |
| mal-2025-191200 | Malicious code in @chtijs/eslint-config (npm) | 2025-11-25T00:01:57Z | 2025-12-01T04:28:26Z |
| mal-2025-191199 | Malicious code in @browserbasehq/stagehand-docs (npm) | 2025-11-25T00:08:48Z | 2025-12-01T04:28:26Z |
| mal-2025-191198 | Malicious code in @browserbasehq/stagehand (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191197 | Malicious code in @browserbasehq/sdk-functions (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191196 | Malicious code in @browserbasehq/mcp-server-browserbase (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191195 | Malicious code in @browserbasehq/mcp (npm) | 2025-11-25T00:08:13Z | 2025-12-01T04:28:26Z |
| mal-2025-191194 | Malicious code in @browserbasehq/director-ai (npm) | 2025-11-25T00:07:43Z | 2025-12-01T04:28:26Z |
| mal-2025-191193 | Malicious code in @browserbasehq/bb9 (npm) | 2025-11-25T00:07:08Z | 2025-12-01T04:28:26Z |
| mal-2025-191192 | Malicious code in @bdkinc/knex-ibmi (npm) | 2025-11-25T00:13:59Z | 2025-12-01T04:28:26Z |
| mal-2025-191191 | Malicious code in @antstackio/shelbysam (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-3585 | Google Chrome / Microsoft Edge: Schwachstelle ermöglicht Codeausführung | 2024-12-03T23:00:00.000+00:00 | 2024-12-12T23:00:00.000+00:00 |
| wid-sec-w-2024-3215 | Red Hat OpenShift: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-10-15T22:00:00.000+00:00 | 2024-12-12T23:00:00.000+00:00 |
| wid-sec-w-2024-3106 | Apache Subversion: Schwachstelle ermöglicht Codeausführung | 2024-10-08T22:00:00.000+00:00 | 2024-12-12T23:00:00.000+00:00 |
| wid-sec-w-2023-2862 | Red Hat Enterprise Linux: Mehrere Schwachstellen | 2023-11-08T23:00:00.000+00:00 | 2024-12-12T23:00:00.000+00:00 |
| wid-sec-w-2023-1506 | PHP: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-06-19T22:00:00.000+00:00 | 2024-12-12T23:00:00.000+00:00 |
| wid-sec-w-2023-0849 | MediaWiki: Mehrere Schwachstellen ermöglichen Codeausführung | 2023-04-04T22:00:00.000+00:00 | 2024-12-12T23:00:00.000+00:00 |
| wid-sec-w-2024-3689 | Apple Safari: Mehrere Schwachstellen | 2024-12-11T23:00:00.000+00:00 | 2024-12-11T23:00:00.000+00:00 |
| wid-sec-w-2024-3684 | IBM QRadar SIEM: Mehrere Schwachstellen | 2024-12-11T23:00:00.000+00:00 | 2024-12-11T23:00:00.000+00:00 |
| wid-sec-w-2024-3479 | Veritas Enterprise Vault: Mehrere Schwachstellen | 2024-11-17T23:00:00.000+00:00 | 2024-12-11T23:00:00.000+00:00 |
| wid-sec-w-2022-1170 | GNU libc: Schwachstelle ermöglicht Denial of Service | 2021-01-27T23:00:00.000+00:00 | 2024-12-11T23:00:00.000+00:00 |
| wid-sec-w-2024-3683 | GitLab: Mehrere Schwachstellen | 2024-12-10T23:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-3681 | Atlassian Bitbucket: Mehrere Schwachstellen | 2024-12-10T23:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-3680 | Ivanti Connect Secure und Policy Secure: Mehrere Schwachstellen ermöglichen Codeausführung | 2024-12-10T23:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-3679 | ILIAS: Mehrere Schwachstellen | 2024-12-10T23:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-3678 | Atlassian Confluence: Mehrere Schwachstellen | 2024-12-10T23:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-3677 | Adobe Creative Cloud Applikationen: Mehrere Schwachstellen | 2024-12-10T23:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-3675 | Adobe Photoshop: Schwachstelle ermöglicht Codeausführung | 2024-12-10T23:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-3673 | Trellix Data Loss Prevention: Schwachstelle ermöglicht Manipulation von Dateien | 2024-12-10T23:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-3672 | Ivanti Desktop and Server Management: Schwachstelle ermöglicht Löschen von Dateien | 2024-12-10T23:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-3671 | Ivanti Patch SDK: Schwachstelle ermöglicht Löschen von Dateien | 2024-12-10T23:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-3670 | Ivanti Sentry: Schwachstelle ermöglicht Manipulation von Dateien | 2024-12-10T23:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-3668 | Lenovo Computer: Schwachstelle ermöglicht Privilegieneskalation | 2024-12-10T23:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-3666 | HP Computer: Schwachstelle ermöglicht Denial of Service | 2024-12-10T23:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-3663 | Atlassian Bamboo: Mehrere Schwachstellen | 2024-12-10T23:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-3662 | Adobe Acrobat und Acrobat Reader: Mehrere Schwachstellen | 2024-12-10T23:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-3661 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2024-12-10T23:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-3659 | Adobe FrameMaker: Schwachstelle ermöglicht Codeausführung | 2024-12-10T23:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-3658 | TeamViewer: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-12-10T23:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-3656 | Siemens SIMATIC S7: Mehrere Schwachstellen ermöglichen Codeausführung | 2024-12-10T23:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-3655 | Siemens SICAM: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-12-10T23:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2010:0577 | Red Hat Security Advisory: freetype security update | 2010-07-30T15:33:00+00:00 | 2026-01-28T22:51:16+00:00 |
| rhsa-2010:0567 | Red Hat Security Advisory: lvm2-cluster security update | 2010-07-28T13:28:00+00:00 | 2026-01-28T22:51:16+00:00 |
| rhsa-2010:0558 | Red Hat Security Advisory: firefox security update | 2010-07-24T00:12:00+00:00 | 2026-01-28T22:51:15+00:00 |
| rhsa-2010:0557 | Red Hat Security Advisory: seamonkey security update | 2010-07-24T00:33:00+00:00 | 2026-01-28T22:51:15+00:00 |
| rhsa-2010:0556 | Red Hat Security Advisory: firefox security update | 2010-07-24T00:01:00+00:00 | 2026-01-28T22:51:15+00:00 |
| rhsa-2010:0547 | Red Hat Security Advisory: firefox security update | 2010-07-21T01:00:00+00:00 | 2026-01-28T22:51:14+00:00 |
| rhsa-2010:0546 | Red Hat Security Advisory: seamonkey security update | 2010-07-21T00:24:00+00:00 | 2026-01-28T22:51:14+00:00 |
| rhsa-2010:0545 | Red Hat Security Advisory: thunderbird security update | 2010-07-21T01:18:00+00:00 | 2026-01-28T22:51:14+00:00 |
| rhsa-2010:0544 | Red Hat Security Advisory: thunderbird security update | 2010-07-21T01:33:00+00:00 | 2026-01-28T22:51:14+00:00 |
| rhsa-2010:0543 | Red Hat Security Advisory: openldap security update | 2010-07-20T15:56:00+00:00 | 2026-01-28T22:51:13+00:00 |
| rhsa-2010:0542 | Red Hat Security Advisory: openldap security update | 2010-07-20T15:42:00+00:00 | 2026-01-28T22:51:13+00:00 |
| rhsa-2010:0534 | Red Hat Security Advisory: libpng security update | 2010-07-14T17:46:00+00:00 | 2026-01-28T22:51:12+00:00 |
| rhsa-2010:0533 | Red Hat Security Advisory: pcsc-lite security update | 2010-07-14T17:00:00+00:00 | 2026-01-28T22:51:12+00:00 |
| rhsa-2010:0520 | Red Hat Security Advisory: libtiff security update | 2010-07-08T15:42:00+00:00 | 2026-01-28T22:51:12+00:00 |
| rhsa-2010:0519 | Red Hat Security Advisory: libtiff security update | 2010-07-08T15:24:00+00:00 | 2026-01-28T22:51:12+00:00 |
| rhsa-2010:0501 | Red Hat Security Advisory: firefox security, bug fix, and enhancement update | 2010-06-22T22:29:00+00:00 | 2026-01-28T22:51:11+00:00 |
| rhsa-2010:0500 | Red Hat Security Advisory: firefox security, bug fix, and enhancement update | 2010-06-22T21:57:00+00:00 | 2026-01-28T22:51:11+00:00 |
| rhsa-2010:0499 | Red Hat Security Advisory: seamonkey security update | 2010-06-22T21:32:00+00:00 | 2026-01-28T22:51:11+00:00 |
| rhsa-2010:0490 | Red Hat Security Advisory: cups security update | 2010-06-17T22:10:00+00:00 | 2026-01-28T22:51:11+00:00 |
| rhsa-2010:0488 | Red Hat Security Advisory: samba and samba3x security update | 2010-06-16T21:24:00+00:00 | 2026-01-28T22:51:10+00:00 |
| rhsa-2010:0442 | Red Hat Security Advisory: mysql security update | 2010-05-26T14:57:00+00:00 | 2026-01-28T22:51:10+00:00 |
| rhsa-2010:0430 | Red Hat Security Advisory: postgresql84 security update | 2010-05-19T17:01:00+00:00 | 2026-01-28T22:51:10+00:00 |
| rhsa-2010:0429 | Red Hat Security Advisory: postgresql security update | 2010-05-19T16:29:00+00:00 | 2026-01-28T22:51:09+00:00 |
| rhsa-2010:0428 | Red Hat Security Advisory: postgresql security update | 2010-05-19T16:12:00+00:00 | 2026-01-28T22:51:08+00:00 |
| rhsa-2010:0427 | Red Hat Security Advisory: postgresql security update | 2010-05-19T15:47:00+00:00 | 2026-01-28T22:51:08+00:00 |
| rhsa-2010:0423 | Red Hat Security Advisory: krb5 security update | 2010-05-18T19:45:00+00:00 | 2026-01-28T22:51:08+00:00 |
| rhsa-2010:0361 | Red Hat Security Advisory: sudo security update | 2010-04-20T15:43:00+00:00 | 2026-01-28T22:51:08+00:00 |
| rhsa-2010:0333 | Red Hat Security Advisory: seamonkey security update | 2010-03-30T22:57:00+00:00 | 2026-01-28T22:51:07+00:00 |
| rhsa-2010:0332 | Red Hat Security Advisory: firefox security update | 2010-03-30T23:26:00+00:00 | 2026-01-28T22:51:07+00:00 |
| rhsa-2010:0163 | Red Hat Security Advisory: openssl security update | 2010-03-25T09:11:00+00:00 | 2026-01-28T22:51:07+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2024-57899 | wifi: mac80211: fix mbss changed flags corruption on 32 bit systems | 2025-01-02T00:00:00.000Z | 2025-10-19T01:01:38.000Z |
| msrc_cve-2024-31573 | XMLUnit for Java before 2.10.0, in the default configuration, might allow code execution via an untrusted stylesheet (used for an XSLT transformation), because XSLT extension functions are enabled. | 2025-10-02T00:00:00.000Z | 2025-10-19T01:01:21.000Z |
| msrc_cve-2025-62168 | Squid vulnerable to information disclosure via authentication credential leakage in error handling | 2025-10-02T00:00:00.000Z | 2025-10-19T01:01:13.000Z |
| msrc_cve-2025-21645 | platform/x86/amd/pmc: Only disable IRQ1 wakeup where i8042 actually enabled it | 2025-01-02T00:00:00.000Z | 2025-10-18T01:01:18.000Z |
| msrc_cve-2025-21629 | net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP packets | 2025-01-02T00:00:00.000Z | 2025-10-18T01:01:13.000Z |
| msrc_cve-2025-55320 | Configuration Manager Elevation of Privilege Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-17T07:00:00.000Z |
| msrc_cve-2024-56709 | io_uring: check if iowq is killed before queuing | 2024-12-02T00:00:00.000Z | 2025-10-17T01:01:42.000Z |
| msrc_cve-2024-53687 | riscv: Fix IPIs usage in kfence_protect_page() | 2025-01-02T00:00:00.000Z | 2025-10-17T01:01:36.000Z |
| msrc_cve-2024-49568 | net/smc: check v2_ext_offset/eid_cnt/ism_gid_cnt when receiving proposal msg | 2025-01-02T00:00:00.000Z | 2025-10-17T01:01:27.000Z |
| msrc_cve-2022-49133 | drm/amdkfd: svm range restore work deadlock when process exit | 2025-02-02T00:00:00.000Z | 2025-10-17T01:01:22.000Z |
| msrc_cve-2022-49124 | x86/mce: Work around an erratum on fast string copy instructions | 2025-02-02T00:00:00.000Z | 2025-10-17T01:01:16.000Z |
| msrc_cve-2025-53784 | Microsoft Word Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-10-16T07:00:00.000Z |
| msrc_cve-2025-53761 | Microsoft PowerPoint Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-10-16T07:00:00.000Z |
| msrc_cve-2025-53760 | Microsoft SharePoint Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-10-16T07:00:00.000Z |
| msrc_cve-2025-53759 | Microsoft Excel Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-10-16T07:00:00.000Z |
| msrc_cve-2025-53741 | Microsoft Excel Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-10-16T07:00:00.000Z |
| msrc_cve-2025-53740 | Microsoft Office Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-10-16T07:00:00.000Z |
| msrc_cve-2025-53739 | Microsoft Excel Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-10-16T07:00:00.000Z |
| msrc_cve-2025-53738 | Microsoft Word Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-10-16T07:00:00.000Z |
| msrc_cve-2025-53737 | Microsoft Excel Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-10-16T07:00:00.000Z |
| msrc_cve-2025-53736 | Microsoft Word Information Disclosure Vulnerability | 2025-08-12T07:00:00.000Z | 2025-10-16T07:00:00.000Z |
| msrc_cve-2025-53735 | Microsoft Excel Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-10-16T07:00:00.000Z |
| msrc_cve-2025-53733 | Microsoft Word Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-10-16T07:00:00.000Z |
| msrc_cve-2025-53731 | Microsoft Office Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-10-16T07:00:00.000Z |
| msrc_cve-2025-50154 | Microsoft Windows File Explorer Spoofing Vulnerability | 2025-08-12T07:00:00.000Z | 2025-10-16T07:00:00.000Z |
| msrc_cve-2025-39996 | media: b2c2: Fix use-after-free causing by irq_check_work in flexcop_pci_remove | 2025-10-02T00:00:00.000Z | 2025-10-16T01:03:22.000Z |
| msrc_cve-2025-39986 | can: sun4i_can: populate ndo_change_mtu() to prevent buffer overflow | 2025-10-02T00:00:00.000Z | 2025-10-16T01:03:16.000Z |
| msrc_cve-2025-39977 | futex: Prevent use-after-free during requeue-PI | 2025-10-02T00:00:00.000Z | 2025-10-16T01:03:11.000Z |
| msrc_cve-2025-39982 | Bluetooth: hci_event: Fix UAF in hci_acl_create_conn_sync | 2025-10-02T00:00:00.000Z | 2025-10-16T01:03:06.000Z |
| msrc_cve-2025-39987 | can: hi311x: populate ndo_change_mtu() to prevent buffer overflow | 2025-10-02T00:00:00.000Z | 2025-10-16T01:02:55.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202404-3442 | An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arb… | 2025-06-20T23:18:29.262000Z |
| var-202506-0417 | A vulnerability classified as critical has been found in TOTOLINK X15 1.0.0-B20230714.110… | 2025-06-20T23:18:27.213000Z |
| var-202308-1258 | Triangle MicroWorks SCADA Data Gateway DbasSectorFileToExecuteOnReset Exposed Dangerous F… | 2025-06-20T23:17:42.142000Z |
| var-202308-1638 | Triangle MicroWorks SCADA Data Gateway certificate Information Disclosure Vulnerability. … | 2025-06-20T23:17:42.100000Z |
| var-202401-0657 | Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stbpvid parameter in the… | 2025-06-20T23:16:32.702000Z |
| var-202401-2419 | Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.city.vlan parameter in the f… | 2025-06-20T23:16:32.588000Z |
| var-202506-0352 | A vulnerability has been found in TOTOLINK X15 1.0.0-B20230714.1105 and classified as cri… | 2025-06-20T23:16:29.994000Z |
| var-202506-0394 | A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105. It has been rated as crit… | 2025-06-20T23:16:29.971000Z |
| var-202308-1259 | Triangle MicroWorks SCADA Data Gateway Event Log Improper Output Neutralization For Logs … | 2025-06-20T23:15:17.151000Z |
| var-202506-0242 | A vulnerability was found in Tenda AC18 15.03.05.05. It has been rated as critical. This … | 2025-06-20T23:15:12.544000Z |
| var-202308-0677 | Triangle MicroWorks SCADA Data Gateway Directory Traversal Arbitrary File Creation Vulner… | 2025-06-20T23:14:18.629000Z |
| var-202506-0055 | A vulnerability was found in TOTOLINK A3002RU 2.1.1-B20230720.1011. It has been classifie… | 2025-06-20T23:14:13.534000Z |
| var-202405-3988 | Tenda AC18 v15.03.05.19 is vulnerable to Buffer Overflow in the formSetPPTPServer functio… | 2025-06-20T23:11:52.026000Z |
| var-202401-0924 | An issue was discovered on TRENDnet TV-IP1314PI 5.5.3 200714 devices. Command injection c… | 2025-06-20T23:10:16.900000Z |
| var-202506-0031 | A vulnerability, which was classified as critical, was found in TOTOLINK X15 1.0.0-B20230… | 2025-06-20T23:10:10.376000Z |
| var-202401-0719 | Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.stb.mode parameter in the fu… | 2025-06-20T23:08:29.457000Z |
| var-202404-2956 | In pblS2mpuResume of s2mpu.c, there is a possible mitigation bypass due to a logic error … | 2025-06-20T23:08:28.892000Z |
| var-202308-2037 | Triangle MicroWorks SCADA Data Gateway Use of Hard-coded Credentials Authentication Bypas… | 2025-06-20T23:06:59.521000Z |
| var-202308-2058 | Triangle MicroWorks SCADA Data Gateway Missing Authentication Vulnerability. This vulnera… | 2025-06-20T23:06:59.492000Z |
| var-202401-0266 | Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.stb.mode parameter in the fu… | 2025-06-20T23:06:58.859000Z |
| var-202401-1368 | An issue discovered in D-Link dir815 v.1.01SSb08.bin allows a remote attacker to execute … | 2025-06-20T23:06:58.782000Z |
| var-202308-0676 | Triangle MicroWorks SCADA Data Gateway get_config Missing Authentication Information Disc… | 2025-06-20T23:05:23.745000Z |
| var-202506-0293 | A vulnerability classified as critical has been found in Tenda AC18 15.03.05.05. Affected… | 2025-06-20T23:05:15.979000Z |
| var-202506-0390 | A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105. It has been declared as c… | 2025-06-20T23:01:26.223000Z |
| var-202401-2418 | Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stballvlans parameter in… | 2025-06-20T22:57:08.189000Z |
| var-202401-2614 | Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.city.vlan parameter in the f… | 2025-06-20T22:57:08.166000Z |
| var-202408-2879 | Tenda FH1206 V1.2.0.8(8155)_EN contains a Buffer Overflow vulnerability via the function … | 2025-06-19T23:41:27.904000Z |
| var-202506-0454 | A vulnerability was found in Tenda AC7 15.03.06.44 and classified as critical. This issue… | 2025-06-19T23:41:26.471000Z |
| var-202506-0540 | A vulnerability classified as critical has been found in Tenda AC6 15.03.05.16. Affected … | 2025-06-19T23:41:26.445000Z |
| var-202505-2329 | TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow via the… | 2025-06-19T23:40:58.975000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2024:2610-1 | Security update for libgit2 | 2024-07-27T14:43:06Z | 2024-07-27T14:43:06Z |
| suse-su-2024:2607-1 | Security update for giflib | 2024-07-25T21:52:04Z | 2024-07-25T21:52:04Z |
| suse-su-2024:2605-1 | Security update for python-dnspython | 2024-07-25T09:43:52Z | 2024-07-25T09:43:52Z |
| suse-su-2024:2603-1 | Security update for shadow | 2024-07-23T10:37:18Z | 2024-07-23T10:37:18Z |
| suse-su-2024:2600-1 | Security update for mozilla-nss | 2024-07-23T07:16:10Z | 2024-07-23T07:16:10Z |
| suse-su-2024:2599-1 | Security update for git | 2024-07-23T07:05:02Z | 2024-07-23T07:05:02Z |
| suse-su-2024:2598-1 | Security update for libgit2 | 2024-07-23T07:04:49Z | 2024-07-23T07:04:49Z |
| suse-su-2024:2597-1 | Security update for apache2 | 2024-07-23T07:04:00Z | 2024-07-23T07:04:00Z |
| suse-su-2024:2592-1 | Security update for git | 2024-07-22T13:33:47Z | 2024-07-22T13:33:47Z |
| suse-su-2024:2591-1 | Security update for apache2 | 2024-07-22T12:41:41Z | 2024-07-22T12:41:41Z |
| suse-su-2024:2590-1 | Security update for java-11-openjdk | 2024-07-22T12:13:40Z | 2024-07-22T12:13:40Z |
| suse-su-2024:2589-1 | Security update for gnome-shell | 2024-07-22T12:06:07Z | 2024-07-22T12:06:07Z |
| suse-su-2024:2585-1 | Security update for kernel-firmware-nvidia-gspx-G06 | 2024-07-22T11:44:18Z | 2024-07-22T11:44:18Z |
| suse-su-2024:2584-1 | Security update for libgit2 | 2024-07-22T11:40:56Z | 2024-07-22T11:40:56Z |
| suse-su-2024:2583-1 | Security update for libgit2 | 2024-07-22T11:40:46Z | 2024-07-22T11:40:46Z |
| suse-su-2024:2579-1 | Security update for git | 2024-07-22T10:36:35Z | 2024-07-22T10:36:35Z |
| suse-su-2024:2578-1 | Security update for java-21-openjdk | 2024-07-22T10:36:16Z | 2024-07-22T10:36:16Z |
| suse-su-2024:2577-1 | Security update for python-Django | 2024-07-22T10:35:59Z | 2024-07-22T10:35:59Z |
| suse-su-2024:2576-1 | Security update for gnome-shell | 2024-07-22T10:35:48Z | 2024-07-22T10:35:48Z |
| suse-su-2024:2575-1 | Security update for kernel-firmware | 2024-07-22T10:35:34Z | 2024-07-22T10:35:34Z |
| suse-su-2024:2574-1 | Security update for nodejs20 | 2024-07-22T10:35:15Z | 2024-07-22T10:35:15Z |
| suse-su-2024:2572-1 | Security update for python312 | 2024-07-22T10:34:49Z | 2024-07-22T10:34:49Z |
| suse-su-2024:2571-1 | Security update for the Linux Kernel | 2024-07-22T10:34:18Z | 2024-07-22T10:34:18Z |
| suse-su-2024:2568-1 | Security update for mockito, snakeyaml, testng | 2024-07-22T03:19:30Z | 2024-07-22T03:19:30Z |
| suse-su-2024:2567-1 | Security update for emacs | 2024-07-19T17:52:48Z | 2024-07-19T17:52:48Z |
| suse-ru-2024:2564-1 | Recommended update for mozilla-nss | 2024-07-19T11:16:01Z | 2024-07-19T11:16:01Z |
| suse-su-2024:2561-1 | Security update for the Linux Kernel | 2024-07-18T14:04:33Z | 2024-07-18T14:04:33Z |
| suse-su-2024:2560-1 | Security update for apache2 | 2024-07-18T13:57:20Z | 2024-07-18T13:57:20Z |
| suse-su-2024:2559-1 | Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5) | 2024-07-18T09:05:12Z | 2024-07-18T09:05:12Z |
| suse-su-2024:2558-1 | Security update for the Linux Kernel (Live Patch 54 for SLE 12 SP5) | 2024-07-18T09:05:03Z | 2024-07-18T09:05:03Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:11588-1 | java-11-openjdk-11.0.13.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11587-1 | java-17-openjdk-17.0.1.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11586-1 | apr-util-devel-1.6.1-8.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11585-1 | php8-8.0.12-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11584-1 | java-15-openjdk-15.0.5.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11583-1 | java-13-openjdk-13.0.9.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11582-1 | jackson-dataformat-cbor-2.13.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11581-1 | python36-sqlparse-0.4.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11580-1 | mc-4.8.27-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11579-1 | docker-20.10.9_ce-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11578-1 | python36-suds-community-0.8.5-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11577-1 | ruby2.7-rubygem-nokogiri-1.12.5-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11576-1 | autobuild-2.11.0-6.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11575-1 | libmosquitto1-2.0.12-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11574-1 | flatpak-1.12.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11573-1 | fetchmail-6.4.22-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11572-1 | chromedriver-94.0.4606.81-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11571-1 | MozillaThunderbird-91.2.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11570-1 | MozillaFirefox-93.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11569-1 | php7-7.4.24-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11568-1 | go1.17-1.17.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11567-1 | go1.16-1.16.9-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11566-1 | docker-20.10.9_ce-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11565-1 | containerd-1.4.11-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11564-1 | ImageMagick-7.1.0.9-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11563-1 | redis-6.2.6-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11562-1 | liblz4-1-1.9.3-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11561-1 | hiredis-1.0.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11560-1 | apache2-2.4.51-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11559-1 | squid-5.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-21125 | appRain CMF跨站脚本漏洞(CNVD-2025-21125) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21124 | appRain CMF跨站脚本漏洞(CNVD-2025-21124) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21123 | appRain CMF跨站脚本漏洞(CNVD-2025-21123) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21122 | appRain CMF跨站脚本漏洞(CNVD-2025-21122) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21121 | appRain CMF跨站脚本漏洞(CNVD-2025-21121) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21120 | appRain CMF跨站脚本漏洞(CNVD-2025-21120) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21119 | appRain CMF跨站脚本漏洞(CNVD-2025-21119) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21118 | appRain CMF跨站脚本漏洞(CNVD-2025-21118) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21117 | appRain CMF跨站脚本漏洞(CNVD-2025-21117) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21116 | appRain CMF跨站脚本漏洞(CNVD-2025-21116) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21115 | appRain CMF跨站脚本漏洞(CNVD-2025-21115) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21114 | appRain CMF跨站脚本漏洞(CNVD-2025-21114) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21113 | appRain CMF跨站脚本漏洞(CNVD-2025-21113) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21112 | appRain CMF跨站脚本漏洞(CNVD-2025-21112) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21111 | appRain CMF跨站脚本漏洞(CNVD-2025-21111) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21110 | appRain CMF跨站脚本漏洞(CNVD-2025-21110) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21109 | appRain CMF跨站脚本漏洞(CNVD-2025-21109) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21108 | appRain CMF SQL注入漏洞(CNVD-2025-21108) | 2025-09-08 | 2025-09-11 |
| cnvd-2025-21061 | Triangle MicroWorks SCADA Data Gateway文件上传漏洞 | 2023-08-07 | 2025-09-11 |
| cnvd-2025-21060 | Fuji Electric Monitouch V-SFT缓冲区溢出漏洞 | 2024-06-03 | 2025-09-11 |
| cnvd-2025-21059 | Triangle MicroWorks SCADA Data Gateway信息泄露漏洞 | 2024-07-19 | 2025-09-11 |
| cnvd-2025-21058 | Fuji Electric Monitouch V-SFT缓冲区溢出漏洞(CNVD-2025-21058) | 2024-12-03 | 2025-09-11 |
| cnvd-2025-21057 | Fuji Electric Monitouch V-SFT缓冲区溢出漏洞(CNVD-2025-21057) | 2024-12-03 | 2025-09-11 |
| cnvd-2025-21035 | Akinsoft MyRezzta存在未明漏洞 | 2025-09-05 | 2025-09-11 |
| cnvd-2025-21034 | Akinsoft MyRezzta身份验证绕过漏洞 | 2025-09-05 | 2025-09-11 |
| cnvd-2025-21033 | Akinsoft MyRezzta认证绕过漏洞 | 2025-09-05 | 2025-09-11 |
| cnvd-2025-21032 | Freescout set函数反序列化漏洞 | 2025-06-11 | 2025-09-11 |
| cnvd-2025-21031 | Freescout字符串格式化漏洞 | 2025-06-11 | 2025-09-11 |
| cnvd-2025-21030 | Freescout权限问题漏洞 | 2025-06-11 | 2025-09-11 |
| cnvd-2025-21029 | Freescout Helper::decrypt()函数反序列化漏洞 | 2025-07-28 | 2025-09-11 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2021-avi-885 | Multiples vulnérabilités dans Stormshield Management Center | 2021-11-18T00:00:00.000000 | 2021-11-18T00:00:00.000000 |
| certfr-2021-avi-884 | Vulnérabilité dans Microsoft Azure Active Directory | 2021-11-18T00:00:00.000000 | 2021-11-18T00:00:00.000000 |
| certfr-2021-avi-883 | Multiples vulnérabilités dans Drupal | 2021-11-18T00:00:00.000000 | 2021-11-18T00:00:00.000000 |
| certfr-2021-avi-882 | Multiples vulnérabilités dans Wireshark | 2021-11-18T00:00:00.000000 | 2021-11-18T00:00:00.000000 |
| certfr-2021-avi-881 | Multiples vulnérabilités dans les produits IBM | 2021-11-17T00:00:00.000000 | 2021-11-17T00:00:00.000000 |
| certfr-2021-avi-880 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2021-11-17T00:00:00.000000 | 2021-11-17T00:00:00.000000 |
| certfr-2021-avi-879 | Vulnérabilité dans Microsoft Windows | 2021-11-17T00:00:00.000000 | 2021-11-17T00:00:00.000000 |
| certfr-2021-avi-878 | Vulnérabilité dans Synology Mail Station | 2021-11-16T00:00:00.000000 | 2021-11-16T00:00:00.000000 |
| certfr-2021-avi-877 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2021-11-16T00:00:00.000000 | 2021-11-16T00:00:00.000000 |
| certfr-2021-avi-876 | Multiples vulnérabilités dans Moodle | 2021-11-16T00:00:00.000000 | 2021-11-16T00:00:00.000000 |
| certfr-2021-avi-862 | Multiples vulnérabilités dans Microsoft Windows | 2021-11-10T00:00:00.000000 | 2021-11-16T00:00:00.000000 |
| certfr-2021-avi-875 | Multiples vulnérabilités dans les produits Check Point | 2021-11-15T00:00:00.000000 | 2021-11-15T00:00:00.000000 |
| certfr-2021-avi-874 | Multiples vulnérabilités dans PostgreSQL Odyssey | 2021-11-15T00:00:00.000000 | 2021-11-15T00:00:00.000000 |
| certfr-2021-avi-873 | Vulnérabilité dans les produits QNAP | 2021-11-15T00:00:00.000000 | 2021-11-15T00:00:00.000000 |
| certfr-2021-avi-872 | Multiples vulnérabilités dans Google Chrome OS | 2021-11-15T00:00:00.000000 | 2021-11-15T00:00:00.000000 |
| certfr-2021-avi-871 | Vulnérabilité dans F5 NGINX Ingress Controller | 2021-11-12T00:00:00.000000 | 2021-11-12T00:00:00.000000 |
| certfr-2021-avi-870 | Vulnérabilité dans VMware Tanzu Application | 2021-11-12T00:00:00.000000 | 2021-11-12T00:00:00.000000 |
| certfr-2021-avi-869 | Multiples vulnérabilités dans SUSE le noyau Linux de SUSE | 2021-11-12T00:00:00.000000 | 2021-11-12T00:00:00.000000 |
| certfr-2021-avi-868 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2021-11-12T00:00:00.000000 | 2021-11-12T00:00:00.000000 |
| certfr-2021-avi-867 | Multiples vulnérabilités dans PostgreSQL | 2021-11-12T00:00:00.000000 | 2021-11-12T00:00:00.000000 |
| certfr-2021-avi-866 | Vulnérabilité dans WordPress | 2021-11-12T00:00:00.000000 | 2021-11-12T00:00:00.000000 |
| certfr-2021-avi-865 | Multiples vulnérabilités dans Palo Alto Networks PAN-OS | 2021-11-12T00:00:00.000000 | 2021-11-12T00:00:00.000000 |
| certfr-2021-avi-864 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2021-11-12T00:00:00.000000 | 2021-11-12T00:00:00.000000 |
| certfr-2021-avi-863 | Multiples vulnérabilités dans les produits Microsoft | 2021-11-10T00:00:00.000000 | 2021-11-10T00:00:00.000000 |
| certfr-2021-avi-861 | Multiples vulnérabilités dans Microsoft Office | 2021-11-10T00:00:00.000000 | 2021-11-10T00:00:00.000000 |
| certfr-2021-avi-860 | Vulnérabilité dans Microsoft Edge | 2021-11-10T00:00:00.000000 | 2021-11-10T00:00:00.000000 |
| certfr-2021-avi-859 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2021-11-10T00:00:00.000000 | 2021-11-10T00:00:00.000000 |
| certfr-2021-avi-858 | Multiples vulnérabilités dans les produits Intel | 2021-11-10T00:00:00.000000 | 2021-11-10T00:00:00.000000 |
| certfr-2021-avi-857 | Multiples vulnérabilités dans Samba | 2021-11-10T00:00:00.000000 | 2021-11-10T00:00:00.000000 |
| certfr-2021-avi-856 | Multiples vulnérabilités dans les produits Citrix | 2021-11-10T00:00:00.000000 | 2021-11-10T00:00:00.000000 |