Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-11529 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
ChurchCRM API Endpoint AuthMiddleware.php AuthMiddlewa… |
n/a |
ChurchCRM |
2025-10-09T03:02:11.993Z | 2026-02-24T06:55:37.557Z |
| CVE-2025-11528 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda AC7 saveAutoQos stack-based overflow |
Tenda |
AC7 |
2025-10-09T03:02:07.634Z | 2026-02-24T06:55:23.480Z |
| CVE-2025-11527 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda AC7 fast_setting_pppoe_set stack-based overflow |
Tenda |
AC7 |
2025-10-09T02:32:13.681Z | 2026-02-24T06:55:06.629Z |
| CVE-2025-11526 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda AC7 WifiMacFilterSet stack-based overflow |
Tenda |
AC7 |
2025-10-09T02:32:10.251Z | 2026-02-24T06:54:51.401Z |
| CVE-2025-11525 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda AC7 SetUpnpCfg stack-based overflow |
Tenda |
AC7 |
2025-10-09T01:32:06.484Z | 2026-02-24T06:54:36.276Z |
| CVE-2025-11524 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda AC7 SetDDNSCfg stack-based overflow |
Tenda |
AC7 |
2025-10-09T01:02:11.216Z | 2026-02-24T06:54:21.080Z |
| CVE-2025-11523 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Tenda AC7 AdvSetLanip command injection |
Tenda |
AC7 |
2025-10-09T01:02:07.640Z | 2026-02-24T06:54:08.150Z |
| CVE-2025-11512 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
code-projects Voting System voters_add.php cross site … |
code-projects |
Voting System |
2025-10-08T23:32:06.161Z | 2026-02-24T06:53:53.940Z |
| CVE-2025-11508 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
code-projects Voting System voters_add.php unrestricte… |
code-projects |
Voting System |
2025-10-08T22:32:05.095Z | 2026-02-24T06:53:42.513Z |
| CVE-2025-11507 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
PHPGurukul Beauty Parlour Management System search-inv… |
PHPGurukul |
Beauty Parlour Management System |
2025-10-08T22:02:08.281Z | 2026-02-24T06:53:29.826Z |
| CVE-2025-11506 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
PHPGurukul Beauty Parlour Management System search-app… |
PHPGurukul |
Beauty Parlour Management System |
2025-10-08T21:32:10.029Z | 2026-02-24T06:53:15.471Z |
| CVE-2025-11505 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
PHPGurukul Beauty Parlour Management System new-appoin… |
PHPGurukul |
Beauty Parlour Management System |
2025-10-08T21:32:06.615Z | 2026-02-24T06:53:03.177Z |
| CVE-2025-11503 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
PHPGurukul Beauty Parlour Management System manage-ser… |
PHPGurukul |
Beauty Parlour Management System |
2025-10-08T20:02:11.395Z | 2026-02-24T06:52:49.608Z |
| CVE-2025-11495 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
GNU Binutils Linker elf64-x86-64.c elf_x86_64_relocate… |
GNU |
Binutils |
2025-10-08T20:02:07.807Z | 2026-02-24T06:52:37.405Z |
| CVE-2025-11494 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
GNU Binutils Linker elfxx-x86.c _bfd_x86_elf_late_size… |
GNU |
Binutils |
2025-10-08T19:32:07.225Z | 2026-02-24T06:52:23.272Z |
| CVE-2025-11475 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
projectworlds Advanced Library Management System view_… |
projectworlds |
Advanced Library Management System |
2025-10-08T13:02:06.025Z | 2026-02-24T06:52:07.874Z |
| CVE-2025-11444 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
TOTOLINK N600R HTTP Request cstecgi.cgi setWiFiBasicCo… |
TOTOLINK |
N600R |
2025-10-08T08:02:10.203Z | 2026-02-24T06:51:54.998Z |
| CVE-2025-11434 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
itsourcecode Student Transcript Processing System logi… |
itsourcecode |
Student Transcript Processing System |
2025-10-08T05:02:08.754Z | 2026-02-24T06:51:40.565Z |
| CVE-2025-11433 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
itsourcecode Leave Management System Query Parameter c… |
itsourcecode |
Leave Management System |
2025-10-08T05:02:05.738Z | 2026-02-24T06:51:28.596Z |
| CVE-2025-11432 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
itsourcecode Leave Management System reset.php sql injection |
itsourcecode |
Leave Management System |
2025-10-08T04:32:06.337Z | 2026-02-24T06:51:15.503Z |
| CVE-2025-11426 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
projectworlds Advanced Library Management System edit_… |
projectworlds |
Advanced Library Management System |
2025-10-08T03:02:05.413Z | 2026-02-24T06:51:02.439Z |
| CVE-2025-11425 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
projectworlds Advanced Library Management System edit_… |
projectworlds |
Advanced Library Management System |
2025-10-08T02:32:05.309Z | 2026-02-24T06:50:50.987Z |
| CVE-2025-11423 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
Tenda CH22 SafeEmailFilter formSafeEmailFilter memory … |
Tenda |
CH22 |
2025-10-08T02:02:06.119Z | 2026-02-24T06:50:37.437Z |
| CVE-2025-11421 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
code-projects Voting System candidates_edit.php cross … |
code-projects |
Voting System |
2025-10-08T01:02:06.070Z | 2026-02-24T06:50:22.349Z |
| CVE-2025-11418 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
Tenda CH22 HTTP Request AdvSetWrlsafeset formWrlsafese… |
Tenda |
CH22 |
2025-10-08T00:02:07.614Z | 2026-02-24T06:50:08.844Z |
| CVE-2025-11416 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
PHPGurukul Beauty Parlour Management System invoices.p… |
PHPGurukul |
Beauty Parlour Management System |
2025-10-07T23:02:10.983Z | 2026-02-24T06:49:52.910Z |
| CVE-2025-11415 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
PHPGurukul Beauty Parlour Management System customer-l… |
PHPGurukul |
Beauty Parlour Management System |
2025-10-07T23:02:07.436Z | 2026-02-24T06:49:40.605Z |
| CVE-2025-11414 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
GNU Binutils Linker elflink.c get_link_hash_entry out-… |
GNU |
Binutils |
2025-10-07T22:32:07.740Z | 2026-02-24T06:49:28.216Z |
| CVE-2025-11413 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
GNU Binutils Linker elflink.c elf_link_add_object_symb… |
GNU |
Binutils |
2025-10-07T22:02:12.368Z | 2026-02-24T06:49:14.455Z |
| CVE-2025-11412 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
GNU Binutils Linker elflink.c bfd_elf_gc_record_vtentr… |
GNU |
Binutils |
2025-10-07T22:02:08.093Z | 2026-02-24T06:48:59.029Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-36523 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:23.390Z | |
| CVE-2025-36517 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:24.329Z | |
| CVE-2025-35997 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:25.231Z | |
| CVE-2025-35993 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:26.165Z | |
| CVE-2025-35976 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:27.321Z | |
| CVE-2025-35962 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:28.254Z | |
| CVE-2025-35961 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:29.217Z | |
| CVE-2025-35960 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:30.163Z | |
| CVE-2025-32734 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:31.105Z | |
| CVE-2025-32733 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:32.086Z | |
| CVE-2025-32090 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:33.149Z | |
| CVE-2025-32085 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:34.052Z | |
| CVE-2025-32082 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:34.967Z | |
| CVE-2025-32009 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:35.908Z | |
| CVE-2025-31942 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:36.831Z | |
| CVE-2025-31364 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:37.827Z | |
| CVE-2025-31358 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:38.910Z | |
| CVE-2025-31145 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:39.809Z | |
| CVE-2025-30517 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:40.775Z | |
| CVE-2025-29869 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:41.830Z | |
| CVE-2025-27941 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:42.759Z | |
| CVE-2025-27928 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:43.689Z | |
| CVE-2025-27573 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:44.839Z | |
| CVE-2025-27569 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:45.780Z | |
| CVE-2025-27251 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:46.735Z | |
| CVE-2025-26471 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:47.696Z | |
| CVE-2025-25049 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:48.644Z | |
| CVE-2025-24524 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:49.635Z | |
| CVE-2025-24518 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:50.751Z | |
| CVE-2025-24492 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:51.689Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-27928 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:29.443 | 2026-02-13T19:16:29.443 |
| fkie_cve-2025-27573 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:29.387 | 2026-02-13T19:16:29.387 |
| fkie_cve-2025-27569 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:29.327 | 2026-02-13T19:16:29.327 |
| fkie_cve-2025-27251 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:29.253 | 2026-02-13T19:16:29.253 |
| fkie_cve-2025-26471 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:28.970 | 2026-02-13T19:16:28.970 |
| fkie_cve-2025-25049 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:28.900 | 2026-02-13T19:16:28.900 |
| fkie_cve-2025-24524 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:28.103 | 2026-02-13T19:16:28.103 |
| fkie_cve-2025-24518 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:28.043 | 2026-02-13T19:16:28.043 |
| fkie_cve-2025-24492 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:27.983 | 2026-02-13T19:16:27.983 |
| fkie_cve-2025-24321 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:27.927 | 2026-02-13T19:16:27.927 |
| fkie_cve-2025-24300 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:27.860 | 2026-02-13T19:16:27.860 |
| fkie_cve-2025-22845 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:27.457 | 2026-02-13T19:16:27.457 |
| fkie_cve-2025-20110 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:27.397 | 2026-02-13T19:16:27.397 |
| fkie_cve-2025-20107 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:27.337 | 2026-02-13T19:16:27.337 |
| fkie_cve-2025-20098 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:27.277 | 2026-02-13T19:16:27.277 |
| fkie_cve-2025-20089 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:27.217 | 2026-02-13T19:16:27.217 |
| fkie_cve-2025-20078 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:27.153 | 2026-02-13T19:16:27.153 |
| fkie_cve-2025-20066 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:27.083 | 2026-02-13T19:16:27.083 |
| fkie_cve-2025-20038 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:27.013 | 2026-02-13T19:16:27.013 |
| fkie_cve-2025-20007 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:26.430 | 2026-02-13T19:16:26.430 |
| fkie_cve-2025-68458 | Webpack is a module bundler. From version 5.49.0 to before 5.104.1, when experiments.buildHttp is e… | 2026-02-05T23:15:53.940 | 2026-02-13T19:16:14.680 |
| fkie_cve-2026-25763 | OpenProject is an open-source, web-based project management software. Prior to versions 16.6.7 and … | 2026-02-06T22:16:12.420 | 2026-02-13T19:07:56.520 |
| fkie_cve-2026-25764 | OpenProject is an open-source, web-based project management software. Prior to versions 16.6.7 and … | 2026-02-06T22:16:12.560 | 2026-02-13T19:04:45.490 |
| fkie_cve-2026-20608 | This issue was addressed through improved state management. This issue is fixed in macOS Tahoe 26.3… | 2026-02-11T23:16:04.407 | 2026-02-13T19:03:45.190 |
| fkie_cve-2026-20609 | The issue was addressed with improved memory handling. This issue is fixed in watchOS 26.3, tvOS 26… | 2026-02-11T23:16:04.510 | 2026-02-13T19:03:23.540 |
| fkie_cve-2026-20611 | An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in w… | 2026-02-11T23:16:04.747 | 2026-02-13T19:01:45.393 |
| fkie_cve-2026-2068 | A vulnerability was detected in UTT 进取 520W 1.7.7-180627. This issue affects the function strcpy of… | 2026-02-06T22:16:12.710 | 2026-02-13T18:56:31.923 |
| fkie_cve-2026-2070 | A vulnerability has been found in UTT 进取 520W 1.7.7-180627. The affected element is the function st… | 2026-02-06T23:15:55.277 | 2026-02-13T18:55:44.693 |
| fkie_cve-2026-2071 | A vulnerability was found in UTT 进取 520W 1.7.7-180627. The impacted element is the function strcpy … | 2026-02-07T01:15:54.470 | 2026-02-13T18:55:05.520 |
| fkie_cve-2025-69229 | AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. In versions 3.13.2 … | 2026-01-06T00:15:48.347 | 2026-02-13T18:55:03.527 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-5v8r-9wmj-294x |
4.0 (3.1)
|
A vulnerability in the Dynamic Vectoring and Streaming (DVS) Engine implementation of Cisco AsyncOS… | 2026-02-04T18:30:42Z | 2026-02-04T18:30:42Z |
| ghsa-ppvw-hxrc-mgfc |
|
In the Linux kernel, the following vulnerability has been resolved: virtio_net: fix device mismatc… | 2026-02-04T18:30:41Z | 2026-02-04T18:30:41Z |
| ghsa-h5xw-xh97-3j7m |
|
In the Linux kernel, the following vulnerability has been resolved: udp: call skb_orphan() before … | 2026-02-04T18:30:41Z | 2026-02-04T18:30:41Z |
| ghsa-fmhv-7w67-r8mw |
|
In the Linux kernel, the following vulnerability has been resolved: PM: hibernate: Fix crash when … | 2026-02-04T18:30:41Z | 2026-02-04T18:30:41Z |
| ghsa-f2r6-xf7j-hxvf |
|
In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fix NULL pointer cras… | 2026-02-04T18:30:41Z | 2026-02-04T18:30:41Z |
| ghsa-c283-mfwm-22x2 |
|
In the Linux kernel, the following vulnerability has been resolved: net/ena: fix missing lock when… | 2026-02-04T18:30:41Z | 2026-02-04T18:30:41Z |
| ghsa-8936-48hj-4rqp |
|
In the Linux kernel, the following vulnerability has been resolved: idpf: fix aux device unpluggin… | 2026-02-04T18:30:41Z | 2026-02-04T18:30:41Z |
| ghsa-79jf-89ph-wp26 |
|
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix NULL pointer derefe… | 2026-02-04T18:30:41Z | 2026-02-04T18:30:41Z |
| ghsa-484m-2c5w-2g38 |
|
In the Linux kernel, the following vulnerability has been resolved: libceph: make calc_target() se… | 2026-02-04T18:30:41Z | 2026-02-04T18:30:41Z |
| ghsa-qv83-wx6q-j989 |
4.9 (3.1)
6.9 (4.0)
|
A vulnerability exists in F5 BIG-IP Container Ingress Services that may allow excessive permissions… | 2026-02-04T18:30:40Z | 2026-02-04T18:30:40Z |
| ghsa-4mqx-ggc6-9qj3 |
|
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211_hwsim: fix typo… | 2026-02-04T18:30:40Z | 2026-02-04T18:30:40Z |
| ghsa-629p-5p7m-6c4r |
|
In the Linux kernel, the following vulnerability has been resolved: ALSA: ac97: fix a double free … | 2026-02-04T18:30:39Z | 2026-02-04T18:30:39Z |
| ghsa-xf8g-xrmp-prrv |
9.8 (3.1)
|
TOTOLINK A950RG V4.1.2cu.5204_B20210112 contains a buffer overflow vulnerability in the setUrlFilte… | 2026-02-03T18:30:47Z | 2026-02-04T18:30:31Z |
| ghsa-qg48-mr48-98hv |
7.8 (3.1)
|
CyberArk Endpoint Privilege Manager Agent through 25.10.0 allows a local user to achieve privilege … | 2026-02-03T18:30:47Z | 2026-02-04T18:30:31Z |
| ghsa-83jp-7r6c-8wcg |
9.8 (3.1)
|
A stack-based buffer overflow vulnerability was identified in TOTOLINK A950RG V4.1.2cu.5204_B202101… | 2026-02-03T18:30:47Z | 2026-02-04T18:30:31Z |
| ghsa-2wwr-rx4c-q4hx |
6.1 (3.1)
|
ERPNext thru 15.88.1 does not sanitize or remove certain HTML tags specifically `<a>` hyperlinks in… | 2026-02-03T18:30:47Z | 2026-02-04T18:30:31Z |
| ghsa-xvxv-2qp5-99vx |
7.8 (3.1)
|
Insecure Permissions vulnerability in avanquest Driver Updater v.9.1.57803.1174 allows a local atta… | 2026-02-03T18:30:46Z | 2026-02-04T18:30:30Z |
| ghsa-wqww-g3x9-r7fw |
9.1 (3.1)
|
Tiny File Manager through 2.6 contains a server-side request forgery (SSRF) vulnerability in the UR… | 2026-02-03T18:30:45Z | 2026-02-04T18:30:30Z |
| ghsa-q84p-7rpp-c23x |
6.2 (3.1)
|
An issue was discovered in the Wi-Fi driver in Samsung Mobile Processor and Wearable Processor Exyn… | 2026-02-03T18:30:46Z | 2026-02-04T18:30:30Z |
| ghsa-mw9q-29mh-j9xh |
6.2 (3.1)
|
An issue was discovered in the Wi-Fi driver in Samsung Mobile Processor and Wearable Processor Exyn… | 2026-02-03T18:30:46Z | 2026-02-04T18:30:30Z |
| ghsa-mmmg-93rw-wxjf |
7.5 (3.1)
|
Articentgroup Zip Rar Extractor Tool 1.345.93.0 is vulnerable to Directory Traversal. The vulnerabi… | 2026-02-03T18:30:46Z | 2026-02-04T18:30:30Z |
| ghsa-jqjv-jw2p-vfq6 |
6.2 (3.1)
|
An issue was discovered in the Wi-Fi driver in Samsung Mobile Processor and Wearable Processor Exyn… | 2026-02-03T18:30:46Z | 2026-02-04T18:30:30Z |
| ghsa-jfr6-jpp6-f45g |
6.2 (3.1)
|
An issue was discovered in the Wi-Fi driver in Samsung Mobile Processor and Wearable Processor Exyn… | 2026-02-03T18:30:46Z | 2026-02-04T18:30:30Z |
| ghsa-j8ww-chcc-cgpm |
6.2 (3.1)
|
An issue was discovered in the Wi-Fi driver in Samsung Mobile Processor and Wearable Processor Exyn… | 2026-02-03T18:30:46Z | 2026-02-04T18:30:30Z |
| ghsa-hx48-54p9-66w5 |
9.8 (3.1)
|
An issue was discovered in MediaCrush thru 1.0.1 allowing remote unauthenticated attackers to uploa… | 2026-02-03T18:30:46Z | 2026-02-04T18:30:30Z |
| ghsa-g296-jp3g-x877 |
9.8 (3.1)
|
YouDataSum CPAS Audit Management System <=v4.9 is vulnerable to SQL Injection in /cpasList/findArch… | 2026-02-03T18:30:46Z | 2026-02-04T18:30:30Z |
| ghsa-f24j-7vph-7pq3 |
5.4 (3.1)
|
A Stored Cross-Site Scripting (XSS) vulnerability was discovered within the CSV import mechanism of… | 2026-02-03T18:30:47Z | 2026-02-04T18:30:30Z |
| ghsa-c733-8cxc-mvpw |
6.2 (3.1)
|
An issue was discovered in the Wi-Fi driver in Samsung Mobile Processor and Wearable Processor Exyn… | 2026-02-03T18:30:46Z | 2026-02-04T18:30:30Z |
| ghsa-937m-6vqx-36r2 |
9.8 (3.1)
|
SQL Injection vulnerability in Shandong Kede Electronics Co., Ltd IoT smart water meter monitoring … | 2026-02-03T18:30:46Z | 2026-02-04T18:30:30Z |
| ghsa-72w5-64xj-w84q |
6.2 (3.1)
|
An issue was discovered in the Wi-Fi driver in Samsung Mobile Processor and Wearable Processor Exyn… | 2026-02-03T18:30:46Z | 2026-02-04T18:30:30Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-30521 | Cross-Site Request Forgery (CSRF) vulnerability in Landingi Landingi Landing Pages.This i… | 2024-04-03T05:02:29.148870Z |
| gsd-2024-30273 | Illustrator versions 28.3, 27.9.2 and earlier are affected by a Stack-based Buffer Overfl… | 2024-04-03T05:02:29.148497Z |
| gsd-2024-30540 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.148304Z |
| gsd-2024-30164 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.148109Z |
| gsd-2024-30667 | Insecure deserialization vulnerability in ROS (Robot Operating System) Melodic Morenia in… | 2024-04-03T05:02:29.147867Z |
| gsd-2024-30871 | netentsec NS-ASG 6.3 is vulnerable to SQL Injection via /WebPages/applyhardware.php. | 2024-04-03T05:02:29.147484Z |
| gsd-2024-30165 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.147134Z |
| gsd-2024-30158 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.146935Z |
| gsd-2024-30949 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.146731Z |
| gsd-2024-30459 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.146534Z |
| gsd-2024-30953 | A stored cross-site scripting (XSS) vulnerability in Htmly v2.9.5 allows attackers to exe… | 2024-04-03T05:02:29.146333Z |
| gsd-2024-30546 | Cross-Site Request Forgery (CSRF) vulnerability in Pixelite Login With Ajax.This issue af… | 2024-04-03T05:02:29.146123Z |
| gsd-2024-30612 | Tenda AC10U v15.03.06.48 has a stack overflow vulnerability in the deviceId, limitSpeed, … | 2024-04-03T05:02:29.145737Z |
| gsd-2024-30160 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.145245Z |
| gsd-2024-30577 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.145036Z |
| gsd-2024-30234 | Missing Authorization vulnerability in Wholesale Team WholesaleX.This issue affects Whole… | 2024-04-03T05:02:29.144365Z |
| gsd-2024-30586 | Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability in the security_5g paramet… | 2024-04-03T05:02:29.143665Z |
| gsd-2024-30930 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.143181Z |
| gsd-2024-30113 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.142962Z |
| gsd-2024-30371 | Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability. This vulner… | 2024-04-03T05:02:29.142410Z |
| gsd-2024-30575 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.142129Z |
| gsd-2024-30451 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:29.141521Z |
| gsd-2024-30523 | Insertion of Sensitive Information into Log File vulnerability in Paid Memberships Pro Pa… | 2024-04-03T05:02:29.140735Z |
| gsd-2024-30246 | Tuleap is an Open Source Suite to improve management of software developments and collabo… | 2024-04-03T05:02:29.139926Z |
| gsd-2024-30049 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.139550Z |
| gsd-2024-30863 | netentsec NS-ASG 6.3 is vulnerable to SQL Injection via /WebPages/history.php. | 2024-04-03T05:02:29.139159Z |
| gsd-2024-30194 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:29.138463Z |
| gsd-2024-30079 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.138006Z |
| gsd-2024-30749 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.137760Z |
| gsd-2024-30039 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.137565Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-191190 | Malicious code in @antstackio/json-to-graphql (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191189 | Malicious code in @antstackio/graphql-body-parser (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191188 | Malicious code in @antstackio/express-graphql-proxy (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191187 | Malicious code in @antstackio/eslint-config-antstack (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191186 | Malicious code in @alexcolls/nuxt-ux (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191185 | Malicious code in @alexcolls/nuxt-socket.io (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191184 | Malicious code in @alexadark/reusable-functions (npm) | 2025-11-25T00:13:29Z | 2025-12-01T04:28:26Z |
| mal-2025-191183 | Malicious code in @alexadark/gatsby-theme-wordpress-blog (npm) | 2025-11-25T00:13:09Z | 2025-12-01T04:28:26Z |
| mal-2025-191182 | Malicious code in @alexadark/gatsby-theme-events (npm) | 2025-11-25T00:12:54Z | 2025-12-01T04:28:26Z |
| mal-2025-191181 | Malicious code in @alexadark/amadeus-api (npm) | 2025-11-25T00:12:39Z | 2025-12-01T04:28:26Z |
| mal-2025-191180 | Malicious code in @afetcan/storage (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191179 | Malicious code in @afetcan/api (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191178 | Malicious code in @actbase/native (npm) | 2025-11-25T00:16:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191177 | Malicious code in @accordproject/template-engine (npm) | 2025-11-25T00:11:49Z | 2025-12-01T04:28:26Z |
| mal-2025-191176 | Malicious code in @accordproject/markdown-it-cicero (npm) | 2025-11-25T00:11:14Z | 2025-12-01T04:28:26Z |
| mal-2025-191175 | Malicious code in @accordproject/concerto-types (npm) | 2025-11-25T00:10:43Z | 2025-12-01T04:28:26Z |
| mal-2025-191174 | Malicious code in @accordproject/concerto-metamodel (npm) | 2025-11-25T00:10:08Z | 2025-12-01T04:28:26Z |
| mal-2025-191173 | Malicious code in @accordproject/concerto-linter-default-ruleset (npm) | 2025-11-25T00:09:53Z | 2025-12-01T04:28:26Z |
| mal-2025-191172 | Malicious code in @accordproject/concerto-linter (npm) | 2025-11-25T00:09:38Z | 2025-12-01T04:28:26Z |
| mal-2025-191171 | Malicious code in @accordproject/concerto-analysis (npm) | 2025-11-25T00:09:23Z | 2025-12-01T04:28:26Z |
| mal-2025-191054 | Malicious code in @suraj_h/medium-common (npm) | 2025-11-24T23:00:38Z | 2025-12-01T04:28:26Z |
| mal-2025-191053 | Malicious code in @seezo/sdr-mcp-server (npm) | 2025-11-24T23:00:07Z | 2025-12-01T04:28:26Z |
| mal-2025-191052 | Malicious code in @relyt/mcp-server-relytone (npm) | 2025-11-24T22:59:36Z | 2025-12-01T04:28:26Z |
| mal-2025-191051 | Malicious code in @relyt/claude-context-mcp (npm) | 2025-11-24T22:59:03Z | 2025-12-01T04:28:26Z |
| mal-2025-191050 | Malicious code in @relyt/claude-context-core (npm) | 2025-11-24T22:58:31Z | 2025-12-01T04:28:26Z |
| mal-2025-191049 | Malicious code in @pruthvi21/use-debounce (npm) | 2025-11-24T22:57:59Z | 2025-12-01T04:28:26Z |
| mal-2025-191048 | Malicious code in @pradhumngautam/common-app (npm) | 2025-11-24T22:57:31Z | 2025-12-01T04:28:26Z |
| mal-2025-191047 | Malicious code in @osmanekrem/error-handler (npm) | 2025-11-24T22:57:11Z | 2025-12-01T04:28:26Z |
| mal-2025-191046 | Malicious code in @osmanekrem/bmad (npm) | 2025-11-24T22:56:23Z | 2025-12-01T04:28:26Z |
| mal-2025-191045 | Malicious code in @orbitgtbelgium/mapbox-gl-draw-cut-polygon-mode (npm) | 2025-11-24T22:54:45Z | 2025-12-01T04:28:26Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-3653 | Ivanti Cloud Services Appliance: Mehrere Schwachstellen | 2024-12-10T23:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-3652 | Microsoft SystemCenter: Mehrere Schwachstellen | 2024-12-10T23:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-3651 | Microsoft Muzic: Schwachstelle ermöglicht Codeausführung | 2024-12-10T23:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-3650 | AMD Prozessoren: Schwachstelle ermöglicht Manipulation von Daten | 2024-12-10T23:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-3649 | Microsoft Office: Mehrere Schwachstellen | 2024-12-10T23:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-3580 | Android Patchday Dezember 2024: Mehrere Schwachstellen | 2024-12-02T23:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-3555 | VMware Aria Operations: Mehrere Schwachstellen | 2024-11-26T23:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-3126 | Intel TDX Module Firmware: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-10-08T22:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-1362 | Red Hat OpenShift: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen und Dateimanipulation | 2024-06-11T22:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-0692 | libvirt: Schwachstelle ermöglicht Denial of Service | 2024-03-21T23:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-0015 | Linux-Kernel (bluetooth): Schwachstelle ermöglicht Denial of Service und Code-Ausführung | 2024-01-04T23:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2023-1872 | libvirt: Schwachstelle ermöglicht Denial of Service | 2023-07-24T22:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2023-1209 | libvirt: Schwachstelle ermöglicht Denial of Service oder Offenlegung von Informationen | 2023-05-14T22:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2022-0319 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2022-02-06T23:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2024-3648 | Red Hat Enterprise Linux pki-core: Mehrere Schwachstellen | 2021-03-15T23:00:00.000+00:00 | 2024-12-09T23:00:00.000+00:00 |
| wid-sec-w-2024-3647 | Dell Avamar: Mehrere Schwachstellen ermöglichen Codeausführung | 2024-12-09T23:00:00.000+00:00 | 2024-12-09T23:00:00.000+00:00 |
| wid-sec-w-2024-3646 | Autodesk FBX SDK: Schwachstelle ermöglicht Codeausführung | 2024-12-09T23:00:00.000+00:00 | 2024-12-09T23:00:00.000+00:00 |
| wid-sec-w-2024-3645 | Barco ClickShare: Schwachstelle ermöglicht Codeausführung | 2024-12-09T23:00:00.000+00:00 | 2024-12-09T23:00:00.000+00:00 |
| wid-sec-w-2024-3644 | Dell OpenManage Server Administrator: Mehrere Schwachstellen | 2024-12-09T23:00:00.000+00:00 | 2024-12-09T23:00:00.000+00:00 |
| wid-sec-w-2024-3643 | IBM App Connect Enterprise: Schwachstelle ermöglicht Denial of Service | 2024-12-09T23:00:00.000+00:00 | 2024-12-09T23:00:00.000+00:00 |
| wid-sec-w-2024-3642 | Qlik Sense: Mehrere Schwachstellen ermöglichen Codeausführung | 2024-12-09T23:00:00.000+00:00 | 2024-12-09T23:00:00.000+00:00 |
| wid-sec-w-2024-3641 | Apache Superset: Mehrere Schwachstellen | 2024-12-09T23:00:00.000+00:00 | 2024-12-09T23:00:00.000+00:00 |
| wid-sec-w-2024-3640 | SAP Patchday Dezember 2024: Mehrere Schwachstellen | 2024-12-09T23:00:00.000+00:00 | 2024-12-09T23:00:00.000+00:00 |
| wid-sec-w-2024-3638 | Linux Kernel: Mehrere Schwachstellen ermöglichen Codeausführung | 2019-08-19T22:00:00.000+00:00 | 2024-12-09T23:00:00.000+00:00 |
| wid-sec-w-2024-3520 | Drupal: Mehrere Schwachstellen | 2024-11-20T23:00:00.000+00:00 | 2024-12-09T23:00:00.000+00:00 |
| wid-sec-w-2023-2589 | avahi: Mehre Schwachstellen | 2023-10-08T22:00:00.000+00:00 | 2024-12-09T23:00:00.000+00:00 |
| wid-sec-w-2022-2258 | RabbitMQ: Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2021-06-28T22:00:00.000+00:00 | 2024-12-09T23:00:00.000+00:00 |
| wid-sec-w-2022-1944 | Red Hat Enterprise Linux (pki-core): Schwachstelle ermöglicht Offenlegung von Informationen | 2022-11-02T23:00:00.000+00:00 | 2024-12-09T23:00:00.000+00:00 |
| wid-sec-w-2022-0219 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2021-08-31T22:00:00.000+00:00 | 2024-12-09T23:00:00.000+00:00 |
| wid-sec-w-2024-3636 | Dell Avamar und NetWorker: Mehrere Schwachstellen | 2024-12-08T23:00:00.000+00:00 | 2024-12-08T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2010:0198 | Red Hat Security Advisory: openldap security and bug fix update | 2010-03-29T12:00:00+00:00 | 2026-01-28T22:51:06+00:00 |
| rhsa-2010:0166 | Red Hat Security Advisory: gnutls security update | 2010-03-25T10:19:00+00:00 | 2026-01-28T22:51:06+00:00 |
| rhsa-2010:0054 | Red Hat Security Advisory: openssl security update | 2010-01-20T00:23:00+00:00 | 2026-01-28T22:51:05+00:00 |
| rhsa-2010:0039 | Red Hat Security Advisory: gcc and gcc4 security update | 2010-01-13T17:22:00+00:00 | 2026-01-28T22:51:05+00:00 |
| rhsa-2009:1646 | Red Hat Security Advisory: libtool security update | 2009-12-08T19:00:00+00:00 | 2026-01-28T22:51:05+00:00 |
| rhsa-2009:1584 | Red Hat Security Advisory: java-1.6.0-openjdk security update | 2009-11-16T15:44:00+00:00 | 2026-01-28T22:51:05+00:00 |
| rhsa-2009:1571 | Red Hat Security Advisory: java-1.5.0-sun security update | 2009-11-10T19:30:00+00:00 | 2026-01-28T22:51:04+00:00 |
| rhsa-2009:1560 | Red Hat Security Advisory: java-1.6.0-sun security update | 2009-11-09T15:04:00+00:00 | 2026-01-28T22:51:03+00:00 |
| rhsa-2009:1432 | Red Hat Security Advisory: seamonkey security update | 2009-09-09T23:48:00+00:00 | 2026-01-28T22:51:03+00:00 |
| rhsa-2009:1207 | Red Hat Security Advisory: nspr and nss security update | 2009-08-12T14:31:00+00:00 | 2026-01-28T22:51:03+00:00 |
| rhsa-2009:1190 | Red Hat Security Advisory: nspr and nss security and bug fix update | 2009-07-31T14:26:00+00:00 | 2026-01-28T22:51:02+00:00 |
| rhsa-2009:1186 | Red Hat Security Advisory: nspr and nss security, bug fix, and enhancement update | 2009-07-30T22:20:00+00:00 | 2026-01-28T22:51:01+00:00 |
| rhsa-2009:1184 | Red Hat Security Advisory: nspr and nss security and bug fix update | 2009-07-30T22:09:00+00:00 | 2026-01-28T22:51:01+00:00 |
| rhsa-2005:564 | Red Hat Security Advisory: php security update | 2005-07-07T19:56:00+00:00 | 2026-01-28T22:51:00+00:00 |
| rhsa-2025:2426 | Red Hat Security Advisory: pki-core security update | 2025-03-06T00:33:10+00:00 | 2026-01-28T22:46:08+00:00 |
| rhsa-2025:3018 | Red Hat Security Advisory: Red Hat build of Cryostat 4.0.0: new RHEL 9 container image security update | 2025-03-19T20:36:44+00:00 | 2026-01-28T22:46:01+00:00 |
| rhsa-2025:1601 | Red Hat Security Advisory: gcc security update | 2025-02-17T15:03:01+00:00 | 2026-01-28T22:46:00+00:00 |
| rhsa-2025:1517 | Red Hat Security Advisory: libxml2 security update | 2025-02-17T01:37:34+00:00 | 2026-01-28T22:46:00+00:00 |
| rhsa-2025:1516 | Red Hat Security Advisory: libxml2 security update | 2025-02-17T01:31:59+00:00 | 2026-01-28T22:46:00+00:00 |
| rhsa-2025:1515 | Red Hat Security Advisory: idm:DL1 security update | 2025-02-17T00:13:24+00:00 | 2026-01-28T22:46:00+00:00 |
| rhsa-2025:1580 | Red Hat Security Advisory: gcc security update | 2025-02-17T12:12:31+00:00 | 2026-01-28T22:45:59+00:00 |
| rhsa-2025:1514 | Red Hat Security Advisory: ipa security update | 2025-02-17T00:17:04+00:00 | 2026-01-28T22:45:59+00:00 |
| rhsa-2025:1346 | Red Hat Security Advisory: gcc security update | 2025-02-12T07:06:05+00:00 | 2026-01-28T22:45:59+00:00 |
| rhsa-2025:1350 | Red Hat Security Advisory: libxml2 security update | 2025-02-12T15:32:32+00:00 | 2026-01-28T22:45:58+00:00 |
| rhsa-2025:1342 | Red Hat Security Advisory: gcc-toolset-13-gcc security update | 2025-02-12T05:37:00+00:00 | 2026-01-28T22:45:58+00:00 |
| rhsa-2025:1338 | Red Hat Security Advisory: gcc-toolset-14-gcc security update | 2025-02-12T00:40:25+00:00 | 2026-01-28T22:45:39+00:00 |
| rhsa-2025:1312 | Red Hat Security Advisory: gcc security update | 2025-02-11T13:28:13+00:00 | 2026-01-28T22:45:39+00:00 |
| rhsa-2025:1311 | Red Hat Security Advisory: gcc security update | 2025-02-11T14:43:08+00:00 | 2026-01-28T22:45:39+00:00 |
| rhsa-2025:1310 | Red Hat Security Advisory: gcc security update | 2025-02-11T12:52:38+00:00 | 2026-01-28T22:45:38+00:00 |
| rhsa-2025:1256 | Red Hat Security Advisory: doxygen security update | 2025-02-10T22:26:46+00:00 | 2026-01-28T22:45:38+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-40000 | wifi: rtw89: fix use-after-free in rtw89_core_tx_kick_off_and_wait() | 2025-10-02T00:00:00.000Z | 2025-10-16T01:02:49.000Z |
| msrc_cve-2025-39994 | media: tuner: xc5000: Fix use-after-free in xc5000_release | 2025-10-02T00:00:00.000Z | 2025-10-16T01:02:44.000Z |
| msrc_cve-2025-39980 | nexthop: Forbid FDB status change while nexthop is in a group | 2025-10-02T00:00:00.000Z | 2025-10-16T01:02:38.000Z |
| msrc_cve-2025-39998 | scsi: target: target_core_configfs: Add length check to avoid buffer overflow | 2025-10-02T00:00:00.000Z | 2025-10-16T01:02:33.000Z |
| msrc_cve-2025-39993 | media: rc: fix races with imon_disconnect() | 2025-10-02T00:00:00.000Z | 2025-10-16T01:02:22.000Z |
| msrc_cve-2025-39973 | i40e: add validation for ring_len param | 2025-10-02T00:00:00.000Z | 2025-10-16T01:02:16.000Z |
| msrc_cve-2025-39995 | media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in probe | 2025-10-02T00:00:00.000Z | 2025-10-16T01:02:10.000Z |
| msrc_cve-2025-39969 | i40e: fix validation of VF state in get resources | 2025-10-02T00:00:00.000Z | 2025-10-16T01:02:04.000Z |
| msrc_cve-2025-39978 | octeontx2-pf: Fix potential use after free in otx2_tc_add_flow() | 2025-10-02T00:00:00.000Z | 2025-10-16T01:01:59.000Z |
| msrc_cve-2025-39972 | i40e: fix idx validation in i40e_validate_queue_map | 2025-10-02T00:00:00.000Z | 2025-10-16T01:01:53.000Z |
| msrc_cve-2025-39971 | i40e: fix idx validation in config queues msg | 2025-10-02T00:00:00.000Z | 2025-10-16T01:01:48.000Z |
| msrc_cve-2025-39988 | can: etas_es58x: populate ndo_change_mtu() to prevent buffer overflow | 2025-10-02T00:00:00.000Z | 2025-10-16T01:01:43.000Z |
| msrc_cve-2025-39985 | can: mcba_usb: populate ndo_change_mtu() to prevent buffer overflow | 2025-10-02T00:00:00.000Z | 2025-10-16T01:01:37.000Z |
| msrc_cve-2025-39970 | i40e: fix input validation logic for action_meta | 2025-10-02T00:00:00.000Z | 2025-10-16T01:01:31.000Z |
| msrc_cve-2025-39967 | fbcon: fix integer overflow in fbcon_do_set_font | 2025-10-02T00:00:00.000Z | 2025-10-16T01:01:26.000Z |
| msrc_cve-2025-39968 | i40e: add max boundary check for VF filters | 2025-10-02T00:00:00.000Z | 2025-10-16T01:01:21.000Z |
| msrc_cve-2022-49069 | drm/amd/display: Fix by adding FPU protection for dcn30_internal_validate_bw | 2025-02-02T00:00:00.000Z | 2025-10-16T01:01:15.000Z |
| msrc_cve-2025-59233 | Microsoft Excel Remote Code Execution Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-15T07:00:00.000Z |
| msrc_cve-2025-59227 | Microsoft Office Remote Code Execution Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-15T07:00:00.000Z |
| msrc_cve-2025-58724 | Arc Enabled Servers - Azure Connected Machine Agent Elevation of Privilege Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-15T07:00:00.000Z |
| msrc_cve-2025-47989 | Arc Enabled Servers - Azure Connected Machine Agent Elevation of Privilege Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-15T07:00:00.000Z |
| msrc_cve-2025-39964 | crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg | 2025-10-02T00:00:00.000Z | 2025-10-15T01:01:33.000Z |
| msrc_cve-2025-39965 | xfrm: xfrm_alloc_spi shouldn't use 0 as SPI | 2025-10-02T00:00:00.000Z | 2025-10-15T01:01:28.000Z |
| msrc_cve-2025-59502 | Remote Procedure Call Denial of Service Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-59497 | Microsoft Defender for Linux Denial of Service Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-59494 | Azure Monitor Agent Elevation of Privilege Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-59294 | Windows Taskbar Live Preview Information Disclosure Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-59292 | Azure Compute Gallery Elevation of Privilege Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-59291 | Confidential Azure Container Instances Elevation of Privilege Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| msrc_cve-2025-59290 | Windows Bluetooth Service Elevation of Privilege Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202506-0330 | A vulnerability, which was classified as critical, has been found in TOTOLINK X2000R 1.0.… | 2025-06-19T23:40:58.853000Z |
| var-202506-0475 | A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been declared as critical.… | 2025-06-19T23:40:58.808000Z |
| var-202506-0532 | A vulnerability was found in TOTOLINK T10 4.1.8cu.5207 and classified as critical. This i… | 2025-06-19T23:40:41.678000Z |
| var-202408-0746 | Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the page para… | 2025-06-19T23:40:11.132000Z |
| var-202405-1409 | Totolink AC1200 Wireless Dual Band Gigabit Router A3002R_V4 Firmware V4.0.0-B20230531.140… | 2025-06-19T23:39:21.621000Z |
| var-202505-1375 | Tenda W20E V15.11.0.6 was found to contain a command injection vulnerability in the formS… | 2025-06-19T23:39:19.791000Z |
| var-202506-0476 | A vulnerability, which was classified as problematic, was found in Tenda AC9 15.03.02.13.… | 2025-06-19T23:39:19.550000Z |
| var-202506-0395 | A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105. It has been classified as… | 2025-06-19T23:37:55.968000Z |
| var-202506-0521 | A vulnerability classified as critical was found in TOTOLINK EX1200T up to 4.1.2cu.5232_B… | 2025-06-19T23:37:55.941000Z |
| var-202404-0345 | A vulnerability was found in Tenda 4G300 1.01.42. It has been rated as critical. This iss… | 2025-06-19T23:37:18.015000Z |
| var-202404-1374 | Tenda FH1206 V1.2.0.8(8155)_EN was discovered to contain a stack-based buffer overflow vu… | 2025-06-19T23:37:17.954000Z |
| var-202408-0172 | A vulnerability classified as critical was found in TOTOLINK CP900 6.3c.566. This vulnera… | 2025-06-19T23:36:23.554000Z |
| var-202506-0021 | A vulnerability has been found in TOTOLINK X2000R 1.0.0-B20230726.1108 and classified as … | 2025-06-19T23:36:21.961000Z |
| var-202506-0273 | A vulnerability was found in Tenda AC18 15.03.05.05. It has been declared as critical. Th… | 2025-06-19T23:36:21.930000Z |
| var-202404-0323 | A vulnerability, which was classified as critical, has been found in Tenda G3 15.11.0.17(… | 2025-06-19T23:35:27.016000Z |
| var-202506-0317 | A vulnerability, which was classified as critical, has been found in Tenda CH22 1.0.0.1. … | 2025-06-19T23:35:21.236000Z |
| var-202506-0380 | A vulnerability, which was classified as critical, was found in Tenda AC5 1.0/15.03.06.47… | 2025-06-19T23:35:21.211000Z |
| var-202506-0464 | A vulnerability was found in Tenda AC15 15.03.05.19_multi and classified as critical. Aff… | 2025-06-19T23:35:21.169000Z |
| var-202408-2384 | Tenda FH1206 V1.2.0.8(8155)_EN contains a Buffer Overflow vulnerability via the function … | 2025-06-19T23:34:55.151000Z |
| var-202506-0478 | A vulnerability has been found in Tenda AC7 15.03.06.44 and classified as critical. This … | 2025-06-19T23:34:53.693000Z |
| var-202404-0211 | A vulnerability was found in Tenda 4G300 1.01.42 and classified as critical. Affected by … | 2025-06-19T23:33:58.441000Z |
| var-202505-0404 | Tenda W20E V15.11.0.6 was found to contain a command injection vulnerability in the formS… | 2025-06-19T23:33:51.738000Z |
| var-202505-1515 | Tenda W20E V15.11.0.6 was found to contain a command injection vulnerability in the formS… | 2025-06-19T23:33:51.680000Z |
| var-202505-2316 | TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow via the… | 2025-06-19T23:33:17.142000Z |
| var-202506-0488 | A vulnerability has been found in TOTOLINK T10 4.1.8cu.5207 and classified as critical. T… | 2025-06-19T23:33:16.988000Z |
| var-202412-0238 | Stack-based Buffer Overflow vulnerability in Shenzhen Tenda Technology Co Tenda AC6V2 (fr… | 2025-06-19T23:32:12.265000Z |
| var-202505-1259 | Tenda W20E V15.11.0.6 was found to contain a command injection vulnerability in the formS… | 2025-06-19T23:32:11.390000Z |
| var-202506-0081 | Tenda AC6 V15.03.05.16 was discovered to contain a stack overflow via the time parameter … | 2025-06-19T23:32:11.204000Z |
| var-202506-0333 | A vulnerability was found in Tenda AC8 16.03.34.09. It has been declared as critical. Aff… | 2025-06-19T23:32:11.171000Z |
| var-202404-1912 | Tenda FH1206 V1.2.0.8(8155)_EN was discovered to contain a stack-based buffer overflow vu… | 2025-06-19T23:30:43.010000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2024:2549-1 | Security update for the Linux Kernel (Live Patch 49 for SLE 12 SP5) | 2024-07-18T09:04:30Z | 2024-07-18T09:04:30Z |
| suse-su-2024:2548-1 | Security update for podman | 2024-07-17T21:36:00Z | 2024-07-17T21:36:00Z |
| suse-su-2024:2547-1 | Security update for ghostscript | 2024-07-17T17:33:44Z | 2024-07-17T17:33:44Z |
| suse-su-2024:2546-1 | Security update for gnutls | 2024-07-17T12:44:32Z | 2024-07-17T12:44:32Z |
| suse-su-2024:2545-1 | Security update for python-Django | 2024-07-17T11:58:55Z | 2024-07-17T11:58:55Z |
| suse-su-2024:2543-1 | Security update for nodejs20 | 2024-07-17T07:51:52Z | 2024-07-17T07:51:52Z |
| suse-su-2024:2542-1 | Security update for nodejs18 | 2024-07-17T07:51:37Z | 2024-07-17T07:51:37Z |
| suse-su-2024:2541-1 | Security update for libndp | 2024-07-17T06:33:39Z | 2024-07-17T06:33:39Z |
| suse-su-2024:2539-1 | Security update for tomcat | 2024-07-16T20:36:04Z | 2024-07-16T20:36:04Z |
| suse-su-2024:2535-1 | Security update for xen | 2024-07-16T12:12:51Z | 2024-07-16T12:12:51Z |
| suse-su-2024:2534-1 | Security update for xen | 2024-07-16T12:12:43Z | 2024-07-16T12:12:43Z |
| suse-su-2024:2533-1 | Security update for xen | 2024-07-16T12:12:35Z | 2024-07-16T12:12:35Z |
| suse-su-2024:2531-1 | Security update for xen | 2024-07-16T12:12:13Z | 2024-07-16T12:12:13Z |
| suse-su-2024:2530-1 | Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP5) | 2024-07-16T11:54:00Z | 2024-07-16T11:54:00Z |
| suse-su-2024:2496-1 | Security update for nodejs18 | 2024-07-16T07:33:47Z | 2024-07-16T07:33:47Z |
| suse-su-2024:2495-1 | Security update for the Linux Kernel | 2024-07-16T07:30:13Z | 2024-07-16T07:30:13Z |
| suse-su-2024:2494-1 | Security update for cockpit | 2024-07-16T05:33:47Z | 2024-07-16T05:33:47Z |
| suse-su-2024:2493-1 | Security update for the Linux Kernel | 2024-07-16T01:38:11Z | 2024-07-16T01:38:11Z |
| suse-su-2024:2488-1 | Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP5) | 2024-07-15T15:03:44Z | 2024-07-15T15:03:44Z |
| suse-su-2024:2487-1 | Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP5) | 2024-07-15T15:03:38Z | 2024-07-15T15:03:38Z |
| suse-su-2024:2485-1 | Security update for tomcat | 2024-07-15T12:37:28Z | 2024-07-15T12:37:28Z |
| suse-su-2024:2481-1 | Security update for python-black | 2024-07-15T09:30:04Z | 2024-07-15T09:30:04Z |
| suse-su-2024:2480-1 | Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP5) | 2024-07-15T09:03:49Z | 2024-07-15T09:03:49Z |
| suse-su-2024:2479-1 | Security update for python3 | 2024-07-15T08:34:13Z | 2024-07-15T08:34:13Z |
| suse-su-2024:2050-2 | Security update for podman | 2024-07-15T05:48:24Z | 2024-07-15T05:48:24Z |
| suse-su-2024:2050-1 | Security update for podman | 2024-07-15T05:48:24Z | 2024-07-15T05:48:24Z |
| suse-su-2024:2478-1 | Security update for cockpit | 2024-07-14T20:38:39Z | 2024-07-14T20:38:39Z |
| suse-su-2024:2477-1 | Security update for cockpit | 2024-07-13T02:33:41Z | 2024-07-13T02:33:41Z |
| suse-su-2024:2476-1 | Security update for cockpit | 2024-07-13T01:03:55Z | 2024-07-13T01:03:55Z |
| suse-su-2024:2475-1 | Security update for p7zip | 2024-07-12T22:09:00Z | 2024-07-12T22:09:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:11558-1 | python-Scrapy-doc-2.5.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11557-1 | python-onionshare-2.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11556-1 | ibm-data-db2-6.12.0-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11555-1 | chromedriver-94.0.4606.71-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11554-1 | velero-plugin-for-aws-1.3.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11553-1 | velero-1.7.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11552-1 | libmbedcrypto7-2.27.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11551-1 | python-2.7.18-9.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11550-1 | nodejs-electron-13.5.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11549-1 | krb5-1.19.2-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11548-1 | ffmpeg-4-4.4-6.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11547-1 | gdm-41.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11546-1 | libzzip-0-13-0.13.72-1.4 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11545-1 | zypper-1.14.49-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11544-1 | libzstd-devel-1.5.0-1.13 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11543-1 | zsh-5.8-7.7 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11542-1 | znc-1.8.2-1.11 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11541-1 | zim-0.73.5-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11540-1 | libzmq5-32bit-4.3.4-2.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11539-1 | zabbix-agent-4.0.32-1.4 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11538-1 | yubikey-manager-4.0.3-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11537-1 | libykcs11-2-2.2.0-1.5 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11536-1 | yast2-security-4.4.1-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11535-1 | yast2-samba-provision-1.0.5-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11534-1 | yast2-rmt-1.3.3-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11533-1 | yast2-multipath-4.4.1-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11532-1 | yast2-buildtools-4.4.1-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11531-1 | yast2-core-4.4.0-1.4 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11530-1 | libyara-devel-4.1.1-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11529-1 | libyaml-cpp0_6-0.6.3-1.8 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-21028 | Freescout反序列化漏洞 | 2025-09-05 | 2025-09-11 |
| cnvd-2025-21027 | TOTOLINK A860R downloadfile.cgi缓冲区溢出漏洞 | 2022-09-08 | 2025-09-11 |
| cnvd-2025-21026 | TOTOLINK A860R /etc/shadow.sample硬编码漏洞 | 2022-09-08 | 2025-09-11 |
| cnvd-2025-21025 | TOTOLINK A860R命令注入漏洞 | 2022-09-08 | 2025-09-11 |
| cnvd-2025-21024 | TOTOLINK NR1800X setSmsCfg方法的text参数缓冲区溢出漏洞 | 2022-10-08 | 2025-09-11 |
| cnvd-2025-21023 | TOTOLINK NR1800X setDiagnosisCfg方法的ip参数缓冲区溢出漏洞 | 2022-10-08 | 2025-09-11 |
| cnvd-2025-21022 | TOTOLINK NR1800X setParentalRules方法缓冲区溢出漏洞 | 2022-10-08 | 2025-09-11 |
| cnvd-2025-21021 | TOTOLINK NR1800X setTracerouteCfg方法缓冲区溢出漏洞 | 2022-10-08 | 2025-09-11 |
| cnvd-2025-21020 | TOTOLINK NR1800X main方法缓冲区溢出漏洞 | 2022-10-08 | 2025-09-11 |
| cnvd-2025-21019 | TOTOLINK NR1800X OpModeCfg命令注入漏洞 | 2022-10-08 | 2025-09-10 |
| cnvd-2025-21018 | TOTOLINK LR350 main函数缓冲区溢出漏洞 | 2022-11-25 | 2025-09-10 |
| cnvd-2025-21017 | TOTOLINK LR350 setDiagnosisCfg函数缓冲区溢出漏洞 | 2022-11-25 | 2025-09-10 |
| cnvd-2025-21016 | TOTOLINK LR350 setIpPortFilterRules函数缓冲区溢出漏洞 | 2022-11-25 | 2025-09-10 |
| cnvd-2025-21015 | TOTOLINK LR350 setLanguageCfg函数缓冲区溢出漏洞 | 2022-11-25 | 2025-09-10 |
| cnvd-2025-21014 | TOTOLINK LR350 setOpModeCfg函数缓冲区溢出漏洞 | 2022-11-25 | 2025-09-10 |
| cnvd-2025-21013 | TOTOLINK LR350 setParentalRules函数缓冲区溢出漏洞 | 2022-11-25 | 2025-09-10 |
| cnvd-2025-21012 | TOTOLINK LR350 setSmsCfg函数缓冲区溢出漏洞 | 2022-11-25 | 2025-09-10 |
| cnvd-2025-21011 | TOTOLINK NR1800X setOpModeCfg函数命令注入漏洞 | 2022-11-25 | 2025-09-10 |
| cnvd-2025-21010 | TOTOLINK NR1800X setUploadSetting函数命令注入漏洞 | 2022-11-25 | 2025-09-10 |
| cnvd-2025-21009 | TOTOLINK NR1800X setUssd函数命令注入漏洞 | 2022-11-25 | 2025-09-10 |
| cnvd-2025-21008 | TOTOLINK NR1800X命令注入漏洞 | 2022-11-25 | 2025-09-10 |
| cnvd-2025-21007 | TOTOLINK A830R QUERY_STRING命令注入漏洞 | 2023-01-30 | 2025-09-10 |
| cnvd-2025-21006 | TOTOLINK A830R信息泄露漏洞 | 2023-01-30 | 2025-09-10 |
| cnvd-2025-20963 | TOTOLINK A830R身份验证绕过漏洞 | 2023-02-02 | 2025-09-10 |
| cnvd-2025-20962 | TOTOLINK T8硬编码漏洞 | 2023-02-07 | 2025-09-10 |
| cnvd-2025-20961 | TOTOLINK T8 updateWifiInfo方法命令注入漏洞 | 2023-02-07 | 2025-09-10 |
| cnvd-2025-20960 | TOTOLINK T8 setUpgradeFW方法命令注入漏洞 | 2023-02-07 | 2025-09-10 |
| cnvd-2025-20959 | TOTOLINK T8 recvSlaveCloudCheckStatus方法version参数命令注入漏洞 | 2023-02-07 | 2025-09-10 |
| cnvd-2025-20958 | TOTOLINK T8 recvSlaveUpgstatus方法命令注入漏洞 | 2023-02-07 | 2025-09-10 |
| cnvd-2025-20957 | TOTOLINK T8 recvSlaveCloudCheckStatus方法ip参数命令注入漏洞 | 2023-02-07 | 2025-09-10 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2021-avi-855 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2021-11-09T00:00:00.000000 | 2021-11-09T00:00:00.000000 |
| certfr-2021-avi-854 | Multiples vulnérabilités dans les produits Siemens | 2021-11-09T00:00:00.000000 | 2021-11-09T00:00:00.000000 |
| certfr-2021-avi-853 | Multiples vulnérabilités dans les produits Schneider | 2021-11-09T00:00:00.000000 | 2021-11-09T00:00:00.000000 |
| certfr-2021-avi-852 | Multiples vulnérabilités dans les produits SAP | 2021-11-09T00:00:00.000000 | 2021-11-09T00:00:00.000000 |
| certfr-2021-avi-851 | Vulnérabilité dans Postfix | 2021-11-09T00:00:00.000000 | 2021-11-09T00:00:00.000000 |
| certfr-2021-avi-850 | Multiples vulnérabilités dans IBM QRadar | 2021-11-09T00:00:00.000000 | 2021-11-09T00:00:00.000000 |
| certfr-2021-avi-849 | Vulnérabilité dans VMware Spring | 2021-11-05T00:00:00.000000 | 2021-11-05T00:00:00.000000 |
| certfr-2021-avi-848 | Multiples vulnérabilités dans les produits NetApp | 2021-11-04T00:00:00.000000 | 2021-11-04T00:00:00.000000 |
| certfr-2021-avi-847 | Multiples vulnérabilités dans Mozilla Thunderbird | 2021-11-04T00:00:00.000000 | 2021-11-04T00:00:00.000000 |
| certfr-2021-avi-846 | Multiples vulnérabilités dans les produits Cisco | 2021-11-04T00:00:00.000000 | 2021-11-04T00:00:00.000000 |
| certfr-2021-avi-845 | Multiples vulnérabilités dans les produits Fortinet | 2021-11-04T00:00:00.000000 | 2021-11-04T00:00:00.000000 |
| certfr-2021-avi-844 | Multiples vulnérabilités dans Nagios XI | 2021-11-03T00:00:00.000000 | 2021-11-03T00:00:00.000000 |
| certfr-2021-avi-843 | Multiples vulnérabilités dans Mozilla Firefox | 2021-11-03T00:00:00.000000 | 2021-11-03T00:00:00.000000 |
| certfr-2021-avi-842 | Vulnérabilité dans les produits NetApp | 2021-11-03T00:00:00.000000 | 2021-11-03T00:00:00.000000 |
| certfr-2021-avi-841 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2021-11-03T00:00:00.000000 | 2021-11-03T00:00:00.000000 |
| certfr-2021-avi-267 | Multiples vulnérabilités dans les produits Gitlab | 2021-04-15T00:00:00.000000 | 2021-11-03T00:00:00.000000 |
| certfr-2021-avi-840 | Multiples vulnérabilités dans Microsoft Edge | 2021-11-02T00:00:00.000000 | 2021-11-02T00:00:00.000000 |
| certfr-2021-avi-839 | Multiples vulnérabilités dans les produits Kaspersky | 2021-11-02T00:00:00.000000 | 2021-11-02T00:00:00.000000 |
| certfr-2021-avi-838 | Vulnérabilité dans les produits Synology | 2021-11-02T00:00:00.000000 | 2021-11-02T00:00:00.000000 |
| certfr-2021-avi-837 | Multiples vulnérabilités dans Google Android | 2021-11-02T00:00:00.000000 | 2021-11-02T00:00:00.000000 |
| certfr-2021-avi-836 | Vulnérabilité dans Tenable Nessus Agent | 2021-11-02T00:00:00.000000 | 2021-11-02T00:00:00.000000 |
| certfr-2021-avi-835 | Multiples vulnérabilités dans Google Chrome OS | 2021-11-02T00:00:00.000000 | 2021-11-02T00:00:00.000000 |
| certfr-2021-avi-830 | Multiples vulnérabilités dans GitLab | 2021-10-29T00:00:00.000000 | 2021-11-02T00:00:00.000000 |
| certfr-2021-avi-834 | Multiples vulnérabilités dans les produits NetApp | 2021-10-29T00:00:00.000000 | 2021-10-29T00:00:00.000000 |
| certfr-2021-avi-833 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2021-10-29T00:00:00.000000 | 2021-10-29T00:00:00.000000 |
| certfr-2021-avi-832 | Vulnérabilité dans PHP | 2021-10-29T00:00:00.000000 | 2021-10-29T00:00:00.000000 |
| certfr-2021-avi-831 | Multiples vulnérabilités dans Google Chrome | 2021-10-29T00:00:00.000000 | 2021-10-29T00:00:00.000000 |
| certfr-2021-avi-829 | Multiples vulnérabilités dans les produits Cisco | 2021-10-28T00:00:00.000000 | 2021-10-28T00:00:00.000000 |
| certfr-2021-avi-828 | Vulnérabilité dans ISC BIND | 2021-10-28T00:00:00.000000 | 2021-10-28T00:00:00.000000 |
| certfr-2021-avi-827 | Multiples vulnérabilités dans Apple Safari | 2021-10-28T00:00:00.000000 | 2021-10-28T00:00:00.000000 |