Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-12595 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda AC23 SetVirtualServerCfg formSetVirtualSer buffe… |
Tenda |
AC23 |
2025-11-02T10:02:07.134Z | 2026-02-24T06:20:56.156Z |
| CVE-2025-12594 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
code-projects Simple Online Hotel Reservation System a… |
code-projects |
Simple Online Hotel Reservation System |
2025-11-02T08:32:06.189Z | 2026-02-24T06:20:42.777Z |
| CVE-2025-12593 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
code-projects Simple Online Hotel Reservation System P… |
code-projects |
Simple Online Hotel Reservation System |
2025-11-02T06:02:05.981Z | 2026-02-24T06:20:29.609Z |
| CVE-2025-15390 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
PHPGurukul Small CRM edit-user.php authorization |
PHPGurukul |
Small CRM |
2025-12-31T15:32:06.699Z | 2026-02-24T06:20:17.626Z |
| CVE-2025-15375 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
EyouCMS arcpagelist Ajax.php unserialize deserialization |
n/a |
EyouCMS |
2025-12-31T05:02:09.241Z | 2026-02-24T06:20:02.916Z |
| CVE-2025-15374 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
EyouCMS Ask Module Ask.php cross site scripting |
n/a |
EyouCMS |
2025-12-31T04:32:08.144Z | 2026-02-24T06:19:48.095Z |
| CVE-2025-15373 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
EyouCMS function.php saveRemote server-side request forgery |
n/a |
EyouCMS |
2025-12-31T04:02:08.912Z | 2026-02-24T06:19:34.004Z |
| CVE-2025-15356 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda AC20 PowerSaveSet sscanf buffer overflow |
Tenda |
AC20 |
2025-12-30T20:32:08.560Z | 2026-02-24T06:19:20.131Z |
| CVE-2025-15263 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
BiggiDroid Simple PHP CMS Admin Login login.php sql in… |
BiggiDroid |
Simple PHP CMS |
2025-12-30T18:32:09.366Z | 2026-02-24T06:19:03.796Z |
| CVE-2025-15262 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
BiggiDroid Simple PHP CMS Site Logo edit.php unrestric… |
BiggiDroid |
Simple PHP CMS |
2025-12-30T18:02:09.475Z | 2026-02-24T06:18:45.960Z |
| CVE-2025-15258 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
Edimax BR-6208AC Web-based Configuration formALGSetup … |
Edimax |
BR-6208AC |
2025-12-30T17:32:05.860Z | 2026-02-24T06:18:29.080Z |
| CVE-2025-15257 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Edimax BR-6208AC Web-based Configuration formRoute com… |
Edimax |
BR-6208AC |
2025-12-30T17:02:06.973Z | 2026-02-24T06:18:16.458Z |
| CVE-2025-15256 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Edimax BR-6208AC Web-based Configuration formStaDrvSet… |
Edimax |
BR-6208AC |
2025-12-30T16:32:06.090Z | 2026-02-24T06:18:04.258Z |
| CVE-2025-15255 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
Tenda W6-S R7websSsecurityHandler httpd stack-based overflow |
Tenda |
W6-S |
2025-12-30T16:02:07.019Z | 2026-02-24T06:17:51.072Z |
| CVE-2025-15254 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Tenda W6-S ATE Service ate TendaAte os command injection |
Tenda |
W6-S |
2025-12-30T15:32:07.822Z | 2026-02-24T06:17:32.716Z |
| CVE-2025-15253 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda M3 exeCommand stack-based overflow |
Tenda |
M3 |
2025-12-30T15:02:06.940Z | 2026-02-24T06:17:18.964Z |
| CVE-2025-15252 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda M3 setDhcpAP formSetRemoteDhcpForAp stack-based … |
Tenda |
M3 |
2025-12-30T14:32:07.886Z | 2026-02-24T06:17:05.099Z |
| CVE-2025-15247 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
gmg137 snap7-rs client.rs download heap-based overflow |
gmg137 |
snap7-rs |
2025-12-30T12:02:09.529Z | 2026-02-24T06:16:51.503Z |
| CVE-2025-15246 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
aizuda snail-job API FurySerializer.deserialize deseri… |
aizuda |
snail-job |
2025-12-30T11:32:09.752Z | 2026-02-24T06:16:31.311Z |
| CVE-2025-15244 |
6.3 (4.0)
3.7 (3.1)
3.7 (3.0)
|
PHPEMS Purchase Request race condition |
n/a |
PHPEMS |
2025-12-30T10:32:05.640Z | 2026-02-24T06:16:12.068Z |
| CVE-2025-15243 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Simple Stock System login.php sql injection |
code-projects |
Simple Stock System |
2025-12-30T10:02:06.196Z | 2026-02-24T06:16:01.032Z |
| CVE-2025-15242 |
2.3 (4.0)
3.1 (3.1)
3.1 (3.0)
|
PHPEMS Coupon race condition |
n/a |
PHPEMS |
2025-12-30T09:32:07.221Z | 2026-02-24T06:15:47.302Z |
| CVE-2025-15234 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda M3 setInternetLanInfo formSetRemoteInternetLanIn… |
Tenda |
M3 |
2025-12-30T08:32:06.259Z | 2026-02-24T06:15:36.216Z |
| CVE-2025-15233 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda M3 setAdInfoDetail formSetAdInfoDetails heap-bas… |
Tenda |
M3 |
2025-12-30T08:02:06.822Z | 2026-02-24T06:15:19.863Z |
| CVE-2025-15232 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda M3 setAdPushInfo formSetAdPushInfo stack-based o… |
Tenda |
M3 |
2025-12-30T07:32:09.836Z | 2026-02-24T06:15:04.268Z |
| CVE-2025-15231 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda M3 setVlanInfo formSetRemoteVlanInfo stack-based… |
Tenda |
M3 |
2025-12-30T07:02:06.664Z | 2026-02-24T06:14:50.096Z |
| CVE-2025-15230 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda M3 setVlanPolicyData formSetVlanPolicy heap-base… |
Tenda |
M3 |
2025-12-30T06:32:07.597Z | 2026-02-24T06:14:32.967Z |
| CVE-2025-15229 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Tenda CH22 DhcpListClient fromDhcpListClient denial of… |
Tenda |
CH22 |
2025-12-30T06:02:07.970Z | 2026-02-24T06:14:17.826Z |
| CVE-2025-15218 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda AC10U POST Request Parameter AdvSetLanip fromadv… |
Tenda |
AC10U |
2025-12-30T03:32:08.254Z | 2026-02-24T06:14:02.531Z |
| CVE-2025-15217 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda AC23 HTTP POST Request formSetPPTPUserList buffe… |
Tenda |
AC23 |
2025-12-30T03:02:07.501Z | 2026-02-24T06:13:47.735Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-38501 |
7.5 (3.1)
|
ksmbd: limit repeated connections from clients with th… |
Linux |
Linux |
2025-08-16T05:30:09.138Z | 2025-11-04T21:10:11.398Z |
| CVE-2025-37947 |
7.8 (3.1)
|
ksmbd: prevent out-of-bounds stream writes by validati… |
Linux |
Linux |
2025-05-20T16:01:43.788Z | 2026-02-26T18:28:05.529Z |
| CVE-2025-8280 |
5.8 (3.1)
|
Contact Form 7 reCAPTCHA <= 1.2.0 - Reflected XSS via … |
Unknown |
Contact Form 7 reCAPTCHA |
2025-09-12T06:00:06.157Z | 2025-09-12T16:22:30.609Z |
| CVE-2025-37778 |
N/A
|
ksmbd: Fix dangling pointer in krb_authenticate |
Linux |
Linux |
2025-05-01T13:07:16.472Z | 2025-11-03T19:54:55.466Z |
| CVE-2025-37775 |
N/A
|
ksmbd: fix the warning from __kernel_write_iter |
Linux |
Linux |
2025-05-01T13:07:14.356Z | 2025-11-03T19:54:54.085Z |
| CVE-2025-38575 |
N/A
|
ksmbd: use aead_request_free to match aead_request_alloc |
Linux |
Linux |
2025-04-18T07:01:33.904Z | 2025-11-03T19:58:31.892Z |
| CVE-2025-46310 |
6 (3.1)
|
This issue was addressed through improved state m… |
Apple |
macOS |
2026-02-11T22:58:56.379Z | 2026-02-12T16:12:49.303Z |
| CVE-2026-20605 |
4.6 (3.1)
|
The issue was addressed with improved memory hand… |
Apple |
macOS |
2026-02-11T22:59:03.734Z | 2026-02-12T17:48:34.491Z |
| CVE-2026-20606 |
7.1 (3.1)
|
This issue was addressed by removing the vulnerab… |
Apple |
macOS |
2026-02-11T22:58:00.743Z | 2026-02-12T15:46:14.846Z |
| CVE-2026-20610 |
7.8 (3.1)
|
This issue was addressed with improved handling o… |
Apple |
macOS |
2026-02-11T22:58:02.574Z | 2026-02-26T14:44:23.153Z |
| CVE-2024-35224 |
7.6 (3.1)
|
Stored Cross-Site Scripting (XSS) in OpenProject |
opf |
openproject |
2024-05-23T12:53:04.336Z | 2024-08-02T03:07:46.774Z |
| CVE-2026-20612 |
5.5 (3.1)
|
A privacy issue was addressed with improved check… |
Apple |
macOS |
2026-02-11T22:58:52.712Z | 2026-02-12T19:13:35.179Z |
| CVE-2026-1578 |
5.1 (4.0)
|
HP App – Potential Cross-Site Scripting |
HP Inc |
HP App |
2026-02-13T14:56:42.725Z | 2026-02-13T16:14:36.813Z |
| CVE-2022-37020 |
6.8 (3.1)
|
HP PC BIOS May 2024 Security Updates for Potential Sta… |
HP Inc. |
HP PC products |
2024-06-10T22:13:26.904Z | 2024-10-28T18:34:17.212Z |
| CVE-2026-0958 |
7.5 (3.1)
|
Interpretation Conflict in GitLab |
GitLab |
GitLab |
2026-02-11T11:33:46.426Z | 2026-02-11T15:19:41.414Z |
| CVE-2025-8099 |
7.5 (3.1)
|
Allocation of Resources Without Limits or Throttling i… |
GitLab |
GitLab |
2026-02-11T11:35:11.456Z | 2026-02-11T15:14:09.487Z |
| CVE-2025-7659 |
8 (3.1)
|
Origin Validation Error in GitLab |
GitLab |
GitLab |
2026-02-11T11:35:16.441Z | 2026-02-26T14:44:27.435Z |
| CVE-2025-14594 |
3.5 (3.1)
|
Authorization Bypass Through User-Controlled Key in GitLab |
GitLab |
GitLab |
2026-02-11T11:34:06.815Z | 2026-02-11T15:17:25.802Z |
| CVE-2024-31397 |
4.9 (3.1)
|
Improper handling of extra values issue exists in… |
Cybozu, Inc. |
Cybozu Garoon |
2024-06-11T05:34:39.924Z | 2024-08-02T01:52:56.934Z |
| CVE-2026-23864 |
7.5 (3.1)
|
Multiple denial of service vulnerabilities exist … |
Meta |
react-server-dom-webpack |
2026-01-26T19:16:38.250Z | 2026-01-26T20:26:45.709Z |
| CVE-2025-57785 |
6.5 (3.1)
|
Double free in XSLT in 'show_index' |
Hiawatha |
Hiawatha Web server |
2026-01-26T17:46:09.707Z | 2026-01-26T20:54:04.714Z |
| CVE-2025-14592 |
3.7 (3.1)
|
Missing Authorization in GitLab |
GitLab |
GitLab |
2026-02-11T11:34:01.432Z | 2026-02-11T15:18:04.995Z |
| CVE-2025-14560 |
7.3 (3.1)
|
Improper Neutralization of Input During Web Page Gener… |
GitLab |
GitLab |
2026-02-11T11:34:16.431Z | 2026-02-26T14:44:27.727Z |
| CVE-2025-12575 |
5.4 (3.1)
|
Server-Side Request Forgery (SSRF) in GitLab |
GitLab |
GitLab |
2026-02-11T11:34:36.432Z | 2026-02-11T15:15:26.432Z |
| CVE-2025-68723 |
9 (3.1)
|
Axigen Mail Server before 10.5.57 contains multip… |
n/a |
n/a |
2026-02-05T00:00:00.000Z | 2026-02-13T14:18:05.943Z |
| CVE-2025-68721 |
8.1 (3.1)
|
Axigen Mail Server before 10.5.57 contains an imp… |
n/a |
n/a |
2026-02-05T00:00:00.000Z | 2026-02-13T14:26:38.750Z |
| CVE-2025-12073 |
4.3 (3.1)
|
Server-Side Request Forgery (SSRF) in GitLab |
GitLab |
GitLab |
2026-02-11T11:34:46.437Z | 2026-02-11T15:14:53.506Z |
| CVE-2025-70368 |
5.4 (3.1)
|
Worklenz version 2.1.5 contains a Stored Cross-Si… |
n/a |
n/a |
2026-01-26T00:00:00.000Z | 2026-01-27T19:56:00.363Z |
| CVE-2026-26023 |
5.3 (4.0)
|
Client‑side DOM XSS in the web chat app of Dify when u… |
langgenius |
dify |
2026-02-11T21:23:09.866Z | 2026-02-12T21:16:35.748Z |
| CVE-2025-59471 |
5.9 (3.1)
|
A denial of service vulnerability exists in self-… |
vercel |
next |
2026-01-26T21:43:05.094Z | 2026-01-27T14:55:15.271Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-37947 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: prevent out-of-bounds s… | 2025-05-20T16:15:32.677 | 2026-02-13T15:57:44.103 |
| fkie_cve-2025-8280 | The Contact Form 7 reCAPTCHA WordPress plugin through 1.2.0 does not escape the $_SERVER['REQUEST_U… | 2025-09-12T06:15:43.660 | 2026-02-13T15:54:12.670 |
| fkie_cve-2025-37778 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: Fix dangling pointer in… | 2025-05-01T14:15:41.617 | 2026-02-13T15:52:51.533 |
| fkie_cve-2025-37775 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix the warning from __… | 2025-05-01T14:15:41.197 | 2026-02-13T15:52:21.587 |
| fkie_cve-2025-38575 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: use aead_request_free t… | 2025-04-18T07:15:43.717 | 2026-02-13T15:50:14.600 |
| fkie_cve-2025-46310 | This issue was addressed through improved state management. This issue is fixed in macOS Sequoia 15… | 2026-02-11T23:16:03.120 | 2026-02-13T15:47:47.473 |
| fkie_cve-2026-20605 | The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.7.4,… | 2026-02-11T23:16:04.210 | 2026-02-13T15:47:23.443 |
| fkie_cve-2026-20606 | This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Tahoe 26.3, … | 2026-02-11T23:16:04.310 | 2026-02-13T15:46:40.683 |
| fkie_cve-2026-20610 | This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Tahoe 26.… | 2026-02-11T23:16:04.643 | 2026-02-13T15:45:52.137 |
| fkie_cve-2024-35224 | OpenProject is the leading open source project management software. OpenProject utilizes `tablesort… | 2024-05-23T13:15:09.380 | 2026-02-13T15:44:32.677 |
| fkie_cve-2026-20612 | A privacy issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, ma… | 2026-02-11T23:16:04.857 | 2026-02-13T15:43:59.103 |
| fkie_cve-2026-1578 | HP App for Android is potentially vulnerable to cross-site scripting (XSS) when using an outdated v… | 2026-02-13T15:15:57.853 | 2026-02-13T15:43:55.060 |
| fkie_cve-2022-37020 | Potential vulnerabilities have been identified in the system BIOS for certain HP PC products, which… | 2024-06-10T23:15:49.503 | 2026-02-13T15:36:39.150 |
| fkie_cve-2026-0958 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.4 before 18.6.6, 18.7… | 2026-02-11T12:16:03.970 | 2026-02-13T15:33:52.310 |
| fkie_cve-2025-8099 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.8 before 18.6.6, 18.7… | 2026-02-11T12:16:03.687 | 2026-02-13T15:33:05.570 |
| fkie_cve-2025-7659 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.2 before 18.6.6, 18.7… | 2026-02-11T12:16:03.533 | 2026-02-13T15:32:18.967 |
| fkie_cve-2025-14594 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.11 before 18.6.6, 18.… | 2026-02-11T12:16:03.267 | 2026-02-13T15:30:42.347 |
| fkie_cve-2024-31397 | Improper handling of extra values issue exists in Cybozu Garoon 5.0.0 to 5.15.2. If this vulnerabil… | 2024-06-11T06:15:10.057 | 2026-02-13T15:30:05.950 |
| fkie_cve-2026-23864 | Multiple denial of service vulnerabilities exist in React Server Components, affecting the followin… | 2026-01-26T20:16:16.773 | 2026-02-13T15:23:05.013 |
| fkie_cve-2025-57785 | A Double Free in XSLT `show_index` has been identified in Hiawatha webserver version 11.7 which all… | 2026-01-26T18:16:27.570 | 2026-02-13T15:21:40.900 |
| fkie_cve-2025-14592 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.6 before 18.6.6, 18.7… | 2026-02-11T12:16:03.123 | 2026-02-13T15:18:16.647 |
| fkie_cve-2025-14560 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.1 before 18.6.6, 18.7… | 2026-02-11T12:16:02.980 | 2026-02-13T15:16:54.370 |
| fkie_cve-2025-12575 | GitLab has remediated an issue in GitLab EE affecting all versions from 18.0 before 18.6.6, 18.7 be… | 2026-02-11T12:16:02.833 | 2026-02-13T15:16:07.330 |
| fkie_cve-2025-68723 | Axigen Mail Server before 10.5.57 contains multiple stored Cross-Site Scripting (XSS) vulnerabiliti… | 2026-02-05T17:16:12.700 | 2026-02-13T15:15:57.503 |
| fkie_cve-2025-68721 | Axigen Mail Server before 10.5.57 contains an improper access control vulnerability in the WebAdmin… | 2026-02-05T16:15:50.630 | 2026-02-13T15:15:57.127 |
| fkie_cve-2025-12073 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.0 before 18.6.6, 18.7… | 2026-02-11T12:16:02.653 | 2026-02-13T15:15:12.320 |
| fkie_cve-2025-70368 | Worklenz version 2.1.5 contains a Stored Cross-Site Scripting (XSS) vulnerability in the Project Up… | 2026-01-26T19:16:09.410 | 2026-02-13T15:12:40.403 |
| fkie_cve-2026-26023 | Dify is an open-source LLM app development platform. Prior to 1.13.0, a cross site scripting vulner… | 2026-02-11T22:15:52.233 | 2026-02-13T15:04:10.663 |
| fkie_cve-2025-59471 | A denial of service vulnerability exists in self-hosted Next.js applications that have `remotePatte… | 2026-01-26T22:15:52.890 | 2026-02-13T15:03:20.290 |
| fkie_cve-2026-2320 | Inappropriate implementation in File input in Google Chrome prior to 145.0.7632.45 allowed a remote… | 2026-02-11T19:15:52.160 | 2026-02-13T14:52:29.383 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-2f92-9qpx-3m87 |
9.8 (3.1)
8.4 (4.0)
|
Remote Desktop Audit 2.3.0.157 contains a buffer overflow vulnerability that allows attackers to ex… | 2026-02-04T00:30:28Z | 2026-02-04T00:30:28Z |
| ghsa-28x7-22j7-wrcc |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: fbdev: omapfb: lcd_mipid: Fix … | 2025-10-07T18:31:10Z | 2026-02-04T00:30:28Z |
| ghsa-wvjj-gc57-3w9j |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: nvme-tcp: don't access release… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:27Z |
| ghsa-w939-vjpg-j262 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: clk: microchip: fix potential … | 2025-10-07T18:31:09Z | 2026-02-04T00:30:27Z |
| ghsa-v8v9-wq25-mffx |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: fix wron… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:27Z |
| ghsa-v24g-q75p-xqch |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: drm/i915/perf: add sentinel to… | 2025-10-07T18:31:10Z | 2026-02-04T00:30:27Z |
| ghsa-qw28-7x42-46v9 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: octeontx2-af: Add validation b… | 2025-10-07T18:31:10Z | 2026-02-04T00:30:27Z |
| ghsa-pw78-hwhh-29v2 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: bpf: Make bpf_refcount_acquire… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:27Z |
| ghsa-jw77-c2gh-pjqg |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: rcu: Avoid stack overflow due … | 2025-10-07T18:31:10Z | 2026-02-04T00:30:27Z |
| ghsa-jg3h-cxcf-h3vq |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: octeon_ep: cancel queued works… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:27Z |
| ghsa-j5px-w2f8-7x3g |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: vdpa: Add features attr to vdp… | 2025-10-07T18:31:10Z | 2026-02-04T00:30:27Z |
| ghsa-hh9m-7vg3-wpg4 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: hif_usb: fix memo… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:27Z |
| ghsa-hcvh-9qhf-6r43 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: media: radio-shark: Add endpoi… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:27Z |
| ghsa-h9cf-c7q8-gcqh |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: x86: fix clear_user_rep_good()… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:27Z |
| ghsa-cw77-x75c-4fx8 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ASoC: lpass: Fix for KASAN use… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:27Z |
| ghsa-c64q-8p7x-8r8g |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: wifi: ath6kl: reduce WARN to d… | 2025-10-07T18:31:10Z | 2026-02-04T00:30:27Z |
| ghsa-c2mm-xf5x-8rpj |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: Drivers: hv: vmbus: Don't dere… | 2025-10-07T18:31:10Z | 2026-02-04T00:30:27Z |
| ghsa-9w73-69h2-5rjg |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: media: i2c: ov772x: Fix memlea… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:27Z |
| ghsa-9ggf-w6f4-gjvq |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: media: amphion: fix REVERSE_IN… | 2025-10-07T18:31:10Z | 2026-02-04T00:30:27Z |
| ghsa-9597-9v22-38m3 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: Input: exc3000 - properly stop… | 2025-10-07T18:31:10Z | 2026-02-04T00:30:27Z |
| ghsa-933f-4h29-gq7r |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: perf trace: Really free the ev… | 2025-10-07T18:31:10Z | 2026-02-04T00:30:27Z |
| ghsa-523c-3cg7-7hhv |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ALSA: ac97: Fix possible NULL … | 2025-10-07T18:31:10Z | 2026-02-04T00:30:27Z |
| ghsa-xwrx-f4gw-ff4g |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: iommufd: Fix unpinning of page… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:26Z |
| ghsa-xvh8-f5vg-49g2 |
8.8 (3.1)
7.4 (4.0)
|
A security flaw has been discovered in D-Link DIR-825 up to 2.10. Affected by this vulnerability is… | 2025-09-18T15:30:32Z | 2026-02-04T00:30:26Z |
| ghsa-rxmq-8fwh-qv2c |
3.5 (3.1)
2.0 (4.0)
|
A vulnerability was identified in MiczFlor RPi-Jukebox-RFID up to 2.8.0. This vulnerability affects… | 2025-09-13T18:30:55Z | 2026-02-04T00:30:26Z |
| ghsa-rf27-4m25-62jv |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: fs: dlm: fix use after free in… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:26Z |
| ghsa-j389-h5qc-xpxp |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: accel/qaic: Fix a leak in map_… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:26Z |
| ghsa-hqcj-v9r7-994j |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Take RTNL lock when… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:26Z |
| ghsa-g934-mv7g-597h |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ext4: fix possible double unlo… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:26Z |
| ghsa-g6mx-q5xq-839q |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: platform/x86: dell-sysman: Fix… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:26Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-30345 | Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability. This vulner… | 2024-04-03T05:02:29.070286Z |
| gsd-2024-30125 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.070013Z |
| gsd-2024-30423 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:29.069412Z |
| gsd-2024-30583 | Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability in the mitInterface parame… | 2024-04-03T05:02:29.068934Z |
| gsd-2024-30379 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.068441Z |
| gsd-2024-30591 | Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability in the time parameter of t… | 2024-04-03T05:02:29.068057Z |
| gsd-2024-30328 | Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability. This vulner… | 2024-04-03T05:02:29.067564Z |
| gsd-2024-30431 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:29.066955Z |
| gsd-2024-30770 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.066543Z |
| gsd-2024-30684 | An insecure logging vulnerability has been identified within ROS2 Iron Irwini versions RO… | 2024-04-03T05:02:29.066354Z |
| gsd-2024-30898 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.066115Z |
| gsd-2024-30672 | Arbitrary file upload vulnerability in ROS (Robot Operating System) Melodic Morenia in RO… | 2024-04-03T05:02:29.065926Z |
| gsd-2024-30687 | An insecure deserialization vulnerability has been identified in ROS2 Iron Irwini version… | 2024-04-03T05:02:29.065729Z |
| gsd-2024-30958 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.065535Z |
| gsd-2024-30937 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.065322Z |
| gsd-2024-30001 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.065122Z |
| gsd-2024-30970 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.064920Z |
| gsd-2024-30454 | Cross-Site Request Forgery (CSRF) vulnerability in VeronaLabs WP SMS.This issue affects W… | 2024-04-03T05:02:29.064323Z |
| gsd-2024-30868 | netentsec NS-ASG 6.3 is vulnerable to SQL Injection via /admin/add_getlogin.php. | 2024-04-03T05:02:29.063713Z |
| gsd-2024-30251 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.062854Z |
| gsd-2024-30300 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.062634Z |
| gsd-2024-30650 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.062352Z |
| gsd-2024-30978 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.062131Z |
| gsd-2024-30347 | Foxit PDF Reader U3D File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability… | 2024-04-03T05:02:29.061563Z |
| gsd-2024-30604 | Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the list1 parameter of the fr… | 2024-04-03T05:02:29.061067Z |
| gsd-2024-30301 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.060581Z |
| gsd-2024-30776 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.060376Z |
| gsd-2024-30455 | Cross-Site Request Forgery (CSRF) vulnerability in GamiPress.This issue affects GamiPress… | 2024-04-03T05:02:29.059765Z |
| gsd-2024-30407 | The Use of a Hard-coded Cryptographic Key vulnerability in Juniper Networks Juniper Cloud… | 2024-04-03T05:02:29.059395Z |
| gsd-2024-30525 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.059199Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-190831 | Malicious code in asyncapi-preview (npm) | 2025-11-24T15:01:21Z | 2025-11-25T00:36:48Z |
| mal-2025-190768 | Malicious code in devstart-cli (npm) | 2025-11-24T14:14:19Z | 2025-11-25T00:36:48Z |
| mal-2025-190767 | Malicious code in create-glee-app (npm) | 2025-11-24T13:41:57Z | 2025-11-25T00:36:48Z |
| mal-2025-190766 | Malicious code in capacitor-purchase-history (npm) | 2025-11-24T14:12:54Z | 2025-11-25T00:36:48Z |
| mal-2025-190765 | Malicious code in capacitor-plugin-scgssigninwithgoogle (npm) | 2025-11-24T14:13:25Z | 2025-11-25T00:36:48Z |
| mal-2025-190764 | Malicious code in atrix (npm) | 2025-11-24T13:30:41Z | 2025-11-25T00:36:48Z |
| mal-2025-190694 | Malicious code in crypto-addr-codec (npm) | 2025-11-24T12:38:03Z | 2025-11-25T00:36:48Z |
| mal-2025-190693 | Malicious code in bool-expressions (npm) | 2025-11-24T13:03:46Z | 2025-11-25T00:36:48Z |
| mal-2025-190692 | Malicious code in atrix-mongoose (npm) | 2025-11-24T12:56:15Z | 2025-11-25T00:36:48Z |
| mal-2025-190947 | Malicious code in @posthog/plugin-server (npm) | 2025-11-24T22:18:40Z | 2025-11-25T00:36:47Z |
| mal-2025-190946 | Malicious code in @posthog/drop-events-on-property-plugin (npm) | 2025-11-24T22:13:31Z | 2025-11-25T00:36:47Z |
| mal-2025-190945 | Malicious code in @posthog/clickhouse (npm) | 2025-11-24T22:11:24Z | 2025-11-25T00:36:47Z |
| mal-2025-190935 | Malicious code in @ensdomains/op-resolver-contracts (npm) | 2025-11-24T17:05:40Z | 2025-11-25T00:36:47Z |
| mal-2025-190934 | Malicious code in @ensdomains/ensjs-react (npm) | 2025-11-24T17:07:21Z | 2025-11-25T00:36:47Z |
| mal-2025-190933 | Malicious code in @ensdomains/ensjs (npm) | 2025-11-24T17:08:27Z | 2025-11-25T00:36:47Z |
| mal-2025-190932 | Malicious code in @ensdomains/ens-test-env (npm) | 2025-11-24T17:04:51Z | 2025-11-25T00:36:47Z |
| mal-2025-190931 | Malicious code in @ensdomains/ens-contracts (npm) | 2025-11-24T17:02:55Z | 2025-11-25T00:36:47Z |
| mal-2025-190930 | Malicious code in @ensdomains/durin (npm) | 2025-11-24T17:04:20Z | 2025-11-25T00:36:47Z |
| mal-2025-190929 | Malicious code in @ensdomains/ccip-read-cf-worker (npm) | 2025-11-24T17:06:30Z | 2025-11-25T00:36:47Z |
| mal-2025-190920 | Malicious code in @zapier/stubtree (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190919 | Malicious code in @zapier/spectral-api-ruleset (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190918 | Malicious code in @zapier/mcp-integration (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190917 | Malicious code in @zapier/ai-actions-react (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190913 | Malicious code in @postman/wdio-junit-reporter (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190912 | Malicious code in @postman/wdio-allure-reporter (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190910 | Malicious code in @postman/pretty-ms (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190909 | Malicious code in @postman/postman-mcp-server (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190908 | Malicious code in @postman/postman-mcp-cli (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190907 | Malicious code in @postman/postman-collection-fork (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190906 | Malicious code in @postman/pm-bin-windows-x64 (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-3533 | ownCloud Android App: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-11-24T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-3531 | IBM FileNet Content Manager (Apache uimaj): Schwachstelle ermöglicht Offenlegung von Informationen | 2024-11-24T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-3111 | Red Hat JBoss Enterprise Application Platform: Schwachstelle ermöglicht Codeausführung | 2024-10-08T22:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-1926 | Red Hat JBoss Enterprise Application Platform: Mehrere Schwachstellen | 2024-08-26T22:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-1852 | Adobe Creative Cloud: Mehrere Schwachstellen | 2024-08-13T22:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0714 | TeamViewer: Schwachstelle ermöglicht Privilegieneskalation und DoS | 2024-03-26T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0706 | Apple Safari: Schwachstelle ermöglicht Codeausführung | 2024-03-25T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0705 | Apple macOS: Schwachstelle ermöglicht Codeausführung | 2024-03-25T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0697 | Red Hat OpenShift: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-03-24T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0695 | JetBrains TeamCity: Schwachstelle ermöglicht Privilegieneskalation | 2024-03-21T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0693 | Rockwell Automation FactoryTalk: Schwachstelle ermöglicht Denial of Service | 2024-03-21T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0688 | OpenVPN: Mehrere Schwachstellen | 2024-03-20T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0685 | Microsoft Edge: Schwachstelle ermöglicht Darstellen falscher Informationen | 2024-03-20T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0683 | MISP: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-03-20T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0680 | Jenkins: Schwachstelle ermöglicht Denial of Service | 2024-03-20T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0677 | Micro Focus ArcSight: Schwachstelle ermöglicht Codeausführung | 2024-03-20T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0674 | Progress Software MOVEit: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-03-20T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0671 | Atlassian Jira Software: Mehrere Schwachstellen ermöglichen Codeausführung und DoS | 2024-03-19T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0668 | Atlassian Confluence: Schwachstelle ermöglicht Gefährdung der Vertraulichkeit, Integrität und Verfügbarkeit | 2024-03-19T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0657 | Acronis Cyber Protect: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2024-03-18T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0656 | Apache Wicket: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-03-18T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0651 | Apple Xcode: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-03-17T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0650 | Tenable Security Nessus: Schwachstelle ermöglicht Privilegieneskalation | 2024-03-17T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0649 | Autodesk AutoCAD / DWG TrueView: Schwachstelle ermöglicht Codeausführung, DoS und Informationsoffenlegung | 2024-03-17T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0648 | Mattermost: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2024-03-17T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0647 | Red Hat OpenShift: Schwachstelle ermöglicht Cross-Site Scripting | 2024-03-17T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0644 | Microsoft Edge: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2024-03-14T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0643 | Fortra GoAnywhere MFT: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-03-14T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0640 | IBM Integration Bus: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-03-14T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0638 | Apple iTunes: Schwachstelle ermöglicht Privilegieneskalation | 2024-03-14T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2014:0582 | Red Hat Security Advisory: Red Hat JBoss SOA Platform 5.3.1 update | 2014-05-29T20:26:23+00:00 | 2026-01-28T22:38:05+00:00 |
| rhsa-2014:0528 | Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 tomcat6 security update | 2014-05-21T15:45:27+00:00 | 2026-01-28T22:38:05+00:00 |
| rhsa-2014:0527 | Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 tomcat7 security update | 2014-05-21T15:45:31+00:00 | 2026-01-28T22:38:05+00:00 |
| rhsa-2014:0526 | Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 tomcat7 security update | 2014-05-21T16:06:31+00:00 | 2026-01-28T22:38:05+00:00 |
| rhsa-2014:0525 | Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 tomcat6 security update | 2014-05-21T15:45:35+00:00 | 2026-01-28T22:38:04+00:00 |
| rhsa-2014:0511 | Red Hat Security Advisory: Red Hat JBoss Operations Network 3.2.1 security update | 2014-05-15T17:18:12+00:00 | 2026-01-28T22:38:04+00:00 |
| rhsa-2014:0509 | Red Hat Security Advisory: java-1.5.0-ibm security update | 2014-05-15T18:19:34+00:00 | 2026-01-28T22:38:04+00:00 |
| rhsa-2014:0508 | Red Hat Security Advisory: java-1.6.0-ibm security update | 2014-05-15T17:28:29+00:00 | 2026-01-28T22:38:04+00:00 |
| rhsa-2014:0486 | Red Hat Security Advisory: java-1.7.0-ibm security update | 2014-05-13T19:47:47+00:00 | 2026-01-28T22:38:03+00:00 |
| rhsa-2014:0473 | Red Hat Security Advisory: Red Hat JBoss Operations Network 3.2.1 update | 2014-05-06T18:01:23+00:00 | 2026-01-28T22:38:03+00:00 |
| rhsa-2014:0459 | Red Hat Security Advisory: Red Hat JBoss Fuse Service Works 6.0.0 security update | 2014-04-30T19:00:31+00:00 | 2026-01-28T22:38:03+00:00 |
| rhsa-2014:0458 | Red Hat Security Advisory: Red Hat JBoss Data Virtualization 6.0.0 security update | 2014-04-30T19:01:13+00:00 | 2026-01-28T22:38:03+00:00 |
| rhsa-2014:0452 | Red Hat Security Advisory: Fuse ESB Enterprise/Fuse MQ Enterprise 7.1.0 update | 2014-04-30T18:49:57+00:00 | 2026-01-28T22:38:02+00:00 |
| rhsa-2014:0429 | Red Hat Security Advisory: tomcat6 security update | 2014-04-23T18:27:58+00:00 | 2026-01-28T22:38:02+00:00 |
| rhsa-2014:0415 | Red Hat Security Advisory: libyaml security update | 2014-04-17T12:01:57+00:00 | 2026-01-28T22:38:02+00:00 |
| rhsa-2014:0413 | Red Hat Security Advisory: java-1.7.0-oracle security update | 2014-04-17T09:28:25+00:00 | 2026-01-28T22:38:02+00:00 |
| rhsa-2014:0412 | Red Hat Security Advisory: java-1.7.0-oracle security update | 2014-04-17T09:28:34+00:00 | 2026-01-28T22:38:02+00:00 |
| rhsa-2014:0401 | Red Hat Security Advisory: Red Hat JBoss A-MQ 6.1.0 update | 2014-04-14T13:46:41+00:00 | 2026-01-28T22:38:01+00:00 |
| rhsa-2014:0396 | Red Hat Security Advisory: rhev-hypervisor6 security update | 2014-04-10T19:52:04+00:00 | 2026-01-28T22:38:01+00:00 |
| rhsa-2014:0389 | Red Hat Security Advisory: jasperreports-server-pro security update | 2014-04-09T18:02:28+00:00 | 2026-01-28T22:38:01+00:00 |
| rhsa-2014:0378 | Red Hat Security Advisory: rhev-hypervisor6 security update | 2014-04-08T11:14:53+00:00 | 2026-01-28T22:38:01+00:00 |
| rhsa-2014:0377 | Red Hat Security Advisory: openssl security update | 2014-04-08T06:58:02+00:00 | 2026-01-28T22:38:01+00:00 |
| rhsa-2014:0376 | Red Hat Security Advisory: openssl security update | 2014-04-08T03:03:51+00:00 | 2026-01-28T22:38:01+00:00 |
| rhsa-2014:0374 | Red Hat Security Advisory: Red Hat JBoss Data Grid 6.2.1 update | 2014-04-03T22:01:40+00:00 | 2026-01-28T22:38:00+00:00 |
| rhsa-2014:0373 | Red Hat Security Advisory: Apache Commons Fileupload and JBoss Web security update | 2014-04-03T21:19:48+00:00 | 2026-01-28T22:38:00+00:00 |
| rhsa-2014:0372 | Red Hat Security Advisory: Red Hat JBoss BRMS 6.0.1 update | 2014-04-03T21:30:03+00:00 | 2026-01-28T22:38:00+00:00 |
| rhsa-2014:0371 | Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.0.1 update | 2014-04-03T21:19:56+00:00 | 2026-01-28T22:37:59+00:00 |
| rhsa-2014:0364 | Red Hat Security Advisory: ruby193-libyaml security update | 2014-04-03T20:18:42+00:00 | 2026-01-28T22:37:59+00:00 |
| rhsa-2014:0355 | Red Hat Security Advisory: ruby193-libyaml security update | 2014-04-02T19:50:41+00:00 | 2026-01-28T22:37:59+00:00 |
| rhsa-2014:0354 | Red Hat Security Advisory: libyaml security update | 2014-04-02T19:50:48+00:00 | 2026-01-28T22:37:59+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-59247 | Azure PlayFab Elevation of Privilege Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-09T07:00:00.000Z |
| msrc_cve-2025-59246 | Azure Entra ID Elevation of Privilege Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-09T07:00:00.000Z |
| msrc_cve-2025-59218 | Azure Entra ID Elevation of Privilege Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-09T07:00:00.000Z |
| msrc_cve-2025-55321 | Azure Monitor Log Analytics Spoofing Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-09T07:00:00.000Z |
| msrc_cve-2023-36038 | ASP.NET Core Denial of Service Vulnerability | 2023-11-14T08:00:00.000Z | 2025-10-08T07:00:00.000Z |
| msrc_cve-2025-61984 | ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.) | 2025-10-02T00:00:00.000Z | 2025-10-08T01:02:05.000Z |
| msrc_cve-2025-61985 | ssh in OpenSSH before 10.1 allows the '\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used. | 2025-10-02T00:00:00.000Z | 2025-10-08T01:02:00.000Z |
| msrc_cve-2025-49844 | Redis Lua Use-After-Free may lead to remote code execution | 2025-10-02T00:00:00.000Z | 2025-10-08T01:01:53.000Z |
| msrc_cve-2024-56707 | octeontx2-pf: handle otx2_mbox_get_rsp errors in otx2_dmac_flt.c | 2024-12-02T00:00:00.000Z | 2025-10-08T01:01:47.000Z |
| msrc_cve-2024-56641 | net/smc: initialize close_work early to avoid warning | 2024-12-02T00:00:00.000Z | 2025-10-08T01:01:42.000Z |
| msrc_cve-2024-40989 | KVM: arm64: Disassociate vcpus from redistributor region on teardown | 2024-07-01T07:00:00.000Z | 2025-10-08T01:01:37.000Z |
| msrc_cve-2024-40966 | tty: add the option to have a tty reject a new ldisc | 2024-07-01T07:00:00.000Z | 2025-10-08T01:01:31.000Z |
| msrc_cve-2022-48816 | SUNRPC: lock against ->sock changing during sysfs read | 2024-07-01T07:00:00.000Z | 2025-10-08T01:01:25.000Z |
| msrc_cve-2025-10729 | Use-after-free vulnerability in Qt SVG qsvghandler.cpp allows denial of service via crafted SVG | 2025-10-02T00:00:00.000Z | 2025-10-07T01:01:34.000Z |
| msrc_cve-2025-10728 | Uncontrolled recursion in Qt SVG module | 2025-10-02T00:00:00.000Z | 2025-10-07T01:01:25.000Z |
| msrc_cve-2025-11234 | Qemu-kvm: vnc websocket handshake use-after-free | 2025-10-02T00:00:00.000Z | 2025-10-07T01:01:16.000Z |
| msrc_cve-2022-50502 | mm: /proc/pid/smaps_rollup: fix no vma's null-deref | 2025-10-02T00:00:00.000Z | 2025-10-06T01:38:02.000Z |
| msrc_cve-2025-39947 | net/mlx5e: Harden uplink netdev access against device unbind | 2025-10-02T00:00:00.000Z | 2025-10-05T01:03:29.000Z |
| msrc_cve-2025-39944 | octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() | 2025-10-02T00:00:00.000Z | 2025-10-05T01:03:24.000Z |
| msrc_cve-2025-39931 | crypto: af_alg - Set merge to zero early in af_alg_sendmsg | 2025-10-02T00:00:00.000Z | 2025-10-05T01:03:19.000Z |
| msrc_cve-2025-39933 | smb: client: let recv_done verify data_offset, data_length and remaining_data_length | 2025-10-02T00:00:00.000Z | 2025-10-05T01:03:08.000Z |
| msrc_cve-2025-39953 | cgroup: split cgroup_destroy_wq into 3 workqueues | 2025-10-02T00:00:00.000Z | 2025-10-05T01:03:03.000Z |
| msrc_cve-2025-39945 | cnic: Fix use-after-free bugs in cnic_delete_task | 2025-10-02T00:00:00.000Z | 2025-10-05T01:02:58.000Z |
| msrc_cve-2025-39952 | wifi: wilc1000: avoid buffer overflow in WID string configuration | 2025-10-02T00:00:00.000Z | 2025-10-05T01:02:53.000Z |
| msrc_cve-2025-39949 | qed: Don't collect too many protection override GRC elements | 2025-10-02T00:00:00.000Z | 2025-10-05T01:02:48.000Z |
| msrc_cve-2025-39937 | net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer | 2025-10-02T00:00:00.000Z | 2025-10-05T01:02:37.000Z |
| msrc_cve-2025-39951 | um: virtio_uml: Fix use-after-free after put_device in probe | 2025-10-02T00:00:00.000Z | 2025-10-05T01:02:32.000Z |
| msrc_cve-2025-39943 | ksmbd: smbdirect: validate data_offset and data_length field of smb_direct_data_transfer | 2025-10-02T00:00:00.000Z | 2025-10-05T01:02:27.000Z |
| msrc_cve-2025-39946 | tls: make sure to abort the stream if headers are bogus | 2025-10-02T00:00:00.000Z | 2025-10-05T01:02:22.000Z |
| msrc_cve-2025-39942 | ksmbd: smbdirect: verify remaining_data_length respects max_fragmented_recv_size | 2025-10-02T00:00:00.000Z | 2025-10-05T01:02:17.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202407-0735 | A vulnerability classified as critical was found in Tenda O3 1.0.0.10. This vulnerability… | 2025-06-12T01:56:31.103000Z |
| var-202504-3238 | A vulnerability was found in TOTOLINK N150RT 3.4.0-B20190525. It has been rated as proble… | 2025-06-12T01:56:25.123000Z |
| var-202505-1003 | TOTOLINK A950RG V4.1.2cu.5204_B20210112 contains a command execution vulnerability in the… | 2025-06-11T19:33:26.398000Z |
| var-202001-1848 | A vulnerability has been identified in APOGEE MEC/MBC/PXC (P2) (All versions < V2.8.2), A… | 2025-06-10T23:21:39.242000Z |
| var-202502-1396 | D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulne… | 2025-06-10T23:19:50.689000Z |
| var-202404-3637 | Cross-Site Request Forgery (CSRF) vulnerability in Planet IGS-4215-16T2S, affecting firmw… | 2025-06-10T23:19:15.631000Z |
| var-202405-4015 | Tenda FH1206 V1.2.0.8(8155)_EN was discovered to contain a stack-based buffer overflow vu… | 2025-06-10T23:17:58.945000Z |
| var-202406-1207 | WAVLINK WN551K1 found a command injection vulnerability through the start_hour parameter … | 2025-06-10T23:16:19.539000Z |
| var-202406-2575 | WAVLINK WN551K1'live_mfg.shtml enables attackers to obtain sensitive router information. … | 2025-06-10T23:13:54.109000Z |
| var-202405-3273 | Tenda AX1806 v1.0.0.1 contains a stack overflow via the iptv.city.vlan parameter in the f… | 2025-06-10T23:02:11.446000Z |
| var-202311-1968 | Buffer Overflow vulnerability in Tenda Ac19 v.1.0, AC18, AC9 v.1.0, AC6 v.2.0 and v.1.0 a… | 2025-06-10T22:53:02.208000Z |
| var-202502-0440 | D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulne… | 2025-06-10T22:52:25.849000Z |
| var-202404-3491 | Operating system command injection vulnerability in Planet IGS-4215-16T2S, affecting firm… | 2025-06-09T23:26:59.392000Z |
| var-202502-1395 | D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulne… | 2025-06-09T23:23:16.655000Z |
| var-202404-1559 | Tenda FH1206 V1.2.0.8(8155)_EN was discovered to contain a stack-based buffer overflow vu… | 2025-06-09T23:21:47.678000Z |
| var-202404-1726 | Tenda FH1206 V1.2.0.8(8155)_EN was discovered to contain a stack-based buffer overflow vu… | 2025-06-09T23:21:47.652000Z |
| var-202405-2518 | Tenda FH1206 V1.2.0.8(8155) was discovered to contain a command injection vulnerability v… | 2025-06-09T23:15:31.529000Z |
| var-202404-3041 | Information exposure vulnerability in Planet IGS-4215-16T2S, affecting firmware version 1… | 2025-06-09T23:14:07.393000Z |
| var-202502-0304 | D-Link DIR-853 A1 FW1.20B07 was discovered to contain a command injection vulnerability i… | 2025-06-09T23:14:05.687000Z |
| var-202502-0689 | D-Link DIR-853 A1 FW1.20B07 was discovered to contain a stack-based buffer overflow vulne… | 2025-06-09T23:08:55.818000Z |
| var-201501-0119 | Buffer overflow in the png_read_IDAT_data function in pngrutil.c in libpng before 1.5.21 … | 2025-06-09T22:10:06.075000Z |
| var-202303-1599 | An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses … | 2025-06-09T22:06:20.008000Z |
| var-202204-0632 | ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in… | 2025-06-09T22:01:46.452000Z |
| var-201501-0704 | Heap-based buffer overflow in the png_combine_row function in libpng before 1.5.21 and 1.… | 2025-06-09T20:22:08.730000Z |
| var-202104-0328 | curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS … | 2025-06-09T19:56:53.106000Z |
| var-202109-1795 | When sending data to an MQTT server, libcurl <= 7.73.0 and 7.78.0 could in some circumsta… | 2025-06-09T19:45:11.348000Z |
| var-202505-2314 | FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the byruleEdit… | 2025-06-08T23:23:27.984000Z |
| var-202501-1968 | An information disclosure vulnerability in the component d_status.asp of D-Link 816A2_FWv… | 2025-06-08T23:22:08.646000Z |
| var-202502-0092 | A vulnerability has been found in D-Link DHP-W310AV 1.04 and classified as critical. This… | 2025-06-08T23:22:08.535000Z |
| var-202410-0067 | A vulnerability was found in D-Link DIR-605L 2.13B01 BETA and classified as critical. Thi… | 2025-06-08T23:20:19.735000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2024:2135-1 | Security update for the Linux Kernel | 2024-06-21T11:03:42Z | 2024-06-21T11:03:42Z |
| suse-su-2024:2124-1 | Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP3) | 2024-06-21T10:34:33Z | 2024-06-21T10:34:33Z |
| suse-su-2024:2130-1 | Security update for the Linux Kernel (Live Patch 54 for SLE 12 SP5) | 2024-06-21T10:34:24Z | 2024-06-21T10:34:24Z |
| suse-su-2024:2121-1 | Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP2) | 2024-06-21T09:33:58Z | 2024-06-21T09:33:58Z |
| suse-su-2024:2120-1 | Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP2) | 2024-06-21T09:33:48Z | 2024-06-21T09:33:48Z |
| suse-su-2024:2115-1 | Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP2) | 2024-06-21T08:04:10Z | 2024-06-21T08:04:10Z |
| suse-su-2024:2123-1 | Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP2) | 2024-06-21T08:03:48Z | 2024-06-21T08:03:48Z |
| suse-su-2024:2109-1 | Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP2) | 2024-06-21T07:33:45Z | 2024-06-21T07:33:45Z |
| suse-ru-2024:1637-2 | Recommended update for google-cloud SDK | 2024-06-20T18:33:51Z | 2024-06-20T18:33:51Z |
| suse-su-2024:2108-1 | Security update for containerd | 2024-06-20T17:36:17Z | 2024-06-20T17:36:17Z |
| suse-su-2024:2107-1 | Security update for php-composer2 | 2024-06-20T15:33:36Z | 2024-06-20T15:33:36Z |
| suse-su-2024:2106-1 | Security update for php-composer2 | 2024-06-20T14:19:04Z | 2024-06-20T14:19:04Z |
| suse-su-2024:2105-1 | Security update for hdf5 | 2024-06-20T08:45:07Z | 2024-06-20T08:45:07Z |
| suse-su-2024:2102-1 | Security update for opencc | 2024-06-19T14:39:16Z | 2024-06-19T14:39:16Z |
| suse-su-2024:2101-1 | Security update for the Linux Kernel RT (Live Patch 13 for SLE 15 SP5) | 2024-06-19T14:34:11Z | 2024-06-19T14:34:11Z |
| suse-su-2024:2100-1 | Security update for the Linux Kernel RT (Live Patch 11 for SLE 15 SP5) | 2024-06-19T14:34:06Z | 2024-06-19T14:34:06Z |
| suse-su-2024:2099-1 | Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP5) | 2024-06-19T14:34:01Z | 2024-06-19T14:34:01Z |
| suse-su-2024:2096-1 | Security update for the Linux Kernel RT (Live Patch 6 for SLE 15 SP5) | 2024-06-19T14:33:52Z | 2024-06-19T14:33:52Z |
| suse-su-2024:2094-1 | Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP5) | 2024-06-19T14:33:35Z | 2024-06-19T14:33:35Z |
| suse-su-2024:2092-1 | Security update for the Linux Kernel RT (Live Patch 10 for SLE 15 SP5) | 2024-06-19T14:03:43Z | 2024-06-19T14:03:43Z |
| suse-su-2024:2091-1 | Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP5) | 2024-06-19T14:03:38Z | 2024-06-19T14:03:38Z |
| suse-su-2024:2090-1 | Security update for podman | 2024-06-19T10:38:55Z | 2024-06-19T10:38:55Z |
| suse-su-2024:2089-1 | Security update for openssl-1_1 | 2024-06-19T10:38:14Z | 2024-06-19T10:38:14Z |
| suse-su-2024:2088-1 | Security update for openssl-3 | 2024-06-19T10:37:27Z | 2024-06-19T10:37:27Z |
| suse-su-2024:2083-1 | Security update for libarchive | 2024-06-19T06:33:39Z | 2024-06-19T06:33:39Z |
| suse-su-2024:2082-1 | Security update for libarchive | 2024-06-19T05:33:57Z | 2024-06-19T05:33:57Z |
| suse-su-2024:2081-1 | Security update for libarchive | 2024-06-19T05:04:14Z | 2024-06-19T05:04:14Z |
| suse-su-2024:2080-1 | Security update for libzypp, zypper | 2024-06-19T05:04:01Z | 2024-06-19T05:04:01Z |
| suse-fu-2024:2078-1 | Feature update for rabbitmq-server313, erlang26, elixir115 | 2024-06-19T03:36:36Z | 2024-06-19T03:36:36Z |
| suse-su-2024:2077-2 | Security update for gdk-pixbuf | 2024-06-19T03:33:14Z | 2024-06-19T03:33:14Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:11348-1 | ruby2.7-rubygem-rails-6.0-6.0.4-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11347-1 | ruby2.7-rubygem-rails-5.2-5.2.6-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11346-1 | ruby2.7-rubygem-rack-2.0-2.0.9-1.10 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11345-1 | ruby2.7-rubygem-rack-1_6-1.6.13-1.13 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11344-1 | ruby2.7-rubygem-rack-2.2.3-1.7 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11343-1 | ruby2.7-rubygem-puma-4-4.3.8-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11342-1 | ruby2.7-rubygem-puma-5.4.0-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11341-1 | ruby2.7-rubygem-passenger-6.0.8-3.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11340-1 | ruby2.7-rubygem-nokogiri-1.12.3-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11339-1 | ruby2.7-rubygem-multi_xml-0.6.0-1.14 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11338-1 | ruby2.7-rubygem-minitar-0.9-1.4 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11337-1 | ruby2.7-rubygem-loofah-2.12.0-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11336-1 | ruby2.7-rubygem-kramdown-2.3.1-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11335-1 | ruby2.7-rubygem-json_pure-2.5.1-1.4 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11334-1 | ruby2.7-rubygem-jquery-rails-4.4.0-1.7 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11333-1 | ruby2.7-rubygem-http-cookie-1.0.4-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11332-1 | ruby2.7-rubygem-archive-tar-minitar-0.5.2-9.23 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11331-1 | ruby2.7-rubygem-activesupport-6.0-6.0.4-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11330-1 | ruby2.7-rubygem-activesupport-5.2-5.2.6-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11329-1 | ruby2.7-rubygem-activestorage-6.0-6.0.4-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11328-1 | ruby2.7-rubygem-activestorage-5.2-5.2.6-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11327-1 | ruby2.7-rubygem-activerecord-6.0-6.0.4-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11326-1 | ruby2.7-rubygem-activerecord-5.2-5.2.6-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11325-1 | ruby2.7-rubygem-activemodel-6.0-6.0.4-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11324-1 | ruby2.7-rubygem-activemodel-5.2-5.2.6-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11323-1 | ruby2.7-rubygem-activejob-6.0-6.0.4-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11322-1 | ruby2.7-rubygem-activejob-5.2-5.2.6-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11321-1 | ruby2.7-rubygem-actionview-6.0-6.0.4-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11320-1 | ruby2.7-rubygem-actionview-5.2-5.2.6-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11319-1 | ruby2.7-rubygem-actiontext-6.0-6.0.4-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-20601 | D-Link DIR-619L formWlanSetup函数缓冲区溢出漏洞 | 2025-08-26 | 2025-09-05 |
| cnvd-2025-20600 | D-Link DIR-619L formSysCmd函数缓冲区溢出漏洞 | 2025-08-26 | 2025-09-05 |
| cnvd-2025-20599 | D-Link DIR-619L缓冲区溢出漏洞 | 2025-08-26 | 2025-09-05 |
| cnvd-2025-20554 | Tenda AC7 fromSetWirelessRepeat方法缓冲区溢出漏洞 | 2024-03-28 | 2025-09-05 |
| cnvd-2025-20553 | Tenda AC7命令注入漏洞 | 2024-03-28 | 2025-09-05 |
| cnvd-2025-20552 | Tenda AC7 setSchedWifi方法缓冲区溢出漏洞 | 2024-03-28 | 2025-09-05 |
| cnvd-2025-20551 | Tenda AC7 formSetCfm方法缓冲区溢出漏洞 | 2024-03-28 | 2025-09-05 |
| cnvd-2025-20550 | Tenda AC7 fromSetWifiGusetBasic方法缓冲区溢出漏洞 | 2024-03-28 | 2025-09-05 |
| cnvd-2025-20549 | Tenda AC7 fromSetRouteStatic方法缓冲区溢出漏洞 | 2024-03-28 | 2025-09-05 |
| cnvd-2025-20548 | Tenda AC7缓冲区溢出漏洞 | 2024-03-28 | 2025-09-05 |
| cnvd-2025-20547 | Tenda AC7命令注入漏洞 | 2024-04-22 | 2025-09-05 |
| cnvd-2025-20467 | WordPress bidorbuy Store Integrator plugin代码注入漏洞 | 2025-08-31 | 2025-09-05 |
| cnvd-2025-20466 | WordPress BetPress plugin跨站请求伪造漏洞 | 2025-08-31 | 2025-09-05 |
| cnvd-2025-20465 | WordPress Ultimate Tag Warrior Importer plugin跨站请求伪造漏洞 | 2025-09-02 | 2025-09-05 |
| cnvd-2025-20464 | WordPress TablePress Plugin跨站脚本漏洞 | 2025-09-02 | 2025-09-05 |
| cnvd-2025-20463 | WordPress Solwin Blog Designer PRO plugin文件包含漏洞 | 2025-09-02 | 2025-09-05 |
| cnvd-2025-20462 | WordPress Slider Revolution plugin路径遍历漏洞 | 2025-09-02 | 2025-09-05 |
| cnvd-2025-20461 | WordPress Related Posts Lite plugin跨站请求伪造漏洞 | 2025-09-02 | 2025-09-05 |
| cnvd-2025-20460 | WordPress Pro Bulk Watermark plugin路径遍历漏洞 | 2025-09-02 | 2025-09-05 |
| cnvd-2025-20459 | WordPress OSM Map Widget for Elementor plugin跨站脚本漏洞 | 2025-09-02 | 2025-09-05 |
| cnvd-2025-20458 | WordPress Ocean Extra plugin跨站脚本漏洞 | 2025-09-02 | 2025-09-05 |
| cnvd-2025-20457 | WordPress Mojoomla School Management plugin文件上传漏洞 | 2025-09-02 | 2025-09-05 |
| cnvd-2025-20456 | WordPress LWSCache plugin授权问题漏洞 | 2025-09-02 | 2025-09-05 |
| cnvd-2025-20455 | WordPress Login with phone number plugin缺少授权漏洞 | 2025-09-02 | 2025-09-05 |
| cnvd-2025-20454 | WordPress List Subpages plugin跨站脚本漏洞 | 2025-09-02 | 2025-09-05 |
| cnvd-2025-20453 | WordPress iATS Online Forms plugin SQL注入漏洞 | 2025-09-02 | 2025-09-05 |
| cnvd-2025-20452 | Marvell QConvergeConsole路径遍历漏洞(CNVD-2025-20452) | 2025-07-11 | 2025-09-05 |
| cnvd-2025-20451 | Marvell QConvergeConsole路径遍历漏洞(CNVD-2025-20451) | 2025-07-11 | 2025-09-05 |
| cnvd-2025-20450 | Marvell QConvergeConsole径遍历漏洞(CNVD-2025-20450) | 2025-07-11 | 2025-09-05 |
| cnvd-2025-20449 | Marvell QConvergeConsole路径遍历漏洞(CNVD-2025-20449) | 2025-07-11 | 2025-09-05 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2021-avi-578 | Multiples vulnérabilités dans Foxit PDF Reader et PDF Editor | 2021-07-27T00:00:00.000000 | 2021-08-23T00:00:00.000000 |
| certfr-2021-avi-648 | Multiples vulnérabilités dans Microsoft Edge | 2021-08-20T00:00:00.000000 | 2021-08-20T00:00:00.000000 |
| certfr-2021-avi-647 | Vulnérabilité dans VMware Workspace | 2021-08-20T00:00:00.000000 | 2021-08-20T00:00:00.000000 |
| certfr-2021-avi-646 | Vulnérabilité dans Ruby on Rails | 2021-08-20T00:00:00.000000 | 2021-08-20T00:00:00.000000 |
| certfr-2021-avi-641 | Multiples vulnérabilités dans le client Nextcloud Desktop | 2021-08-19T00:00:00.000000 | 2021-08-20T00:00:00.000000 |
| certfr-2021-avi-645 | Vulnérabilité dans le client Siemens SINEMA Remote Connect | 2021-08-19T00:00:00.000000 | 2021-08-19T00:00:00.000000 |
| certfr-2021-avi-643 | Multiples vulnérabilités dans IBM WebSphere Application Server | 2021-08-19T00:00:00.000000 | 2021-08-19T00:00:00.000000 |
| certfr-2021-avi-642 | Vulnérabilité dans les produits Cisco | 2021-08-19T00:00:00.000000 | 2021-08-19T00:00:00.000000 |
| certfr-2021-avi-640 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2021-08-19T00:00:00.000000 | 2021-08-19T00:00:00.000000 |
| certfr-2021-avi-524 | Vulnérabilité dans SonicWall SMA/SRA | 2021-07-15T00:00:00.000000 | 2021-08-19T00:00:00.000000 |
| certfr-2021-avi-639 | Multiples vulnérabilités dans des systèmes d'exploitation temps réel | 2021-08-18T00:00:00.000000 | 2021-08-18T00:00:00.000000 |
| certfr-2021-avi-638 | Multiples vulnérabilités dans Juniper Junos Space | 2021-08-18T00:00:00.000000 | 2021-08-18T00:00:00.000000 |
| certfr-2021-avi-637 | Multiples vulnérabilités dans Aruba AirWave Management Platform | 2021-08-18T00:00:00.000000 | 2021-08-18T00:00:00.000000 |
| certfr-2021-avi-636 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2021-08-18T00:00:00.000000 | 2021-08-18T00:00:00.000000 |
| certfr-2021-avi-635 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2021-08-18T00:00:00.000000 | 2021-08-18T00:00:00.000000 |
| certfr-2021-avi-634 | Vulnérabilité dans les produits Mozilla | 2021-08-18T00:00:00.000000 | 2021-08-18T00:00:00.000000 |
| certfr-2021-avi-632 | Multiples vulnérabilités dans Apple iCloud pour Windows | 2021-08-17T00:00:00.000000 | 2021-08-17T00:00:00.000000 |
| certfr-2021-avi-631 | Multiples vulnérabilités dans Google Chrome | 2021-08-17T00:00:00.000000 | 2021-08-17T00:00:00.000000 |
| certfr-2021-avi-630 | Multiples vulnérabilités dans Google Chrome OS | 2021-08-17T00:00:00.000000 | 2021-08-17T00:00:00.000000 |
| certfr-2021-avi-629 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2021-08-16T00:00:00.000000 | 2021-08-16T00:00:00.000000 |
| certfr-2021-avi-628 | Vulnérabilité dans le noyau Linux d'Ubuntu | 2021-08-13T00:00:00.000000 | 2021-08-13T00:00:00.000000 |
| certfr-2021-avi-627 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2021-08-13T00:00:00.000000 | 2021-08-13T00:00:00.000000 |
| certfr-2021-avi-626 | Vulnérabilité dans PostgreSQL | 2021-08-13T00:00:00.000000 | 2021-08-13T00:00:00.000000 |
| certfr-2021-avi-625 | Multiples vulnérabilités dans Drupal | 2021-08-13T00:00:00.000000 | 2021-08-13T00:00:00.000000 |
| certfr-2021-avi-624 | Vulnérabilité dans Microsoft Windows | 2021-08-12T00:00:00.000000 | 2021-08-12T00:00:00.000000 |
| certfr-2021-avi-623 | Multiples vulnérabilités dans Mozilla Thunderbird | 2021-08-12T00:00:00.000000 | 2021-08-12T00:00:00.000000 |
| certfr-2021-avi-622 | Multiples vulnérabilités dans les produits Schneider Electric | 2021-08-12T00:00:00.000000 | 2021-08-12T00:00:00.000000 |
| certfr-2021-avi-621 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2021-08-12T00:00:00.000000 | 2021-08-12T00:00:00.000000 |
| certfr-2021-avi-620 | Multiples vulnérabilités dans les produits Microsoft | 2021-08-11T00:00:00.000000 | 2021-08-11T00:00:00.000000 |
| certfr-2021-avi-619 | Multiples vulnérabilités dans Microsoft .Net | 2021-08-11T00:00:00.000000 | 2021-08-11T00:00:00.000000 |