Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-14993 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda AC18 HTTP Request SetDlnaCfg sprintf stack-based… |
Tenda |
AC18 |
2025-12-21T04:32:06.259Z | 2026-02-24T06:00:07.404Z |
| CVE-2025-14992 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda AC18 HTTP Request GetParentControlInfo strcpy st… |
Tenda |
AC18 |
2025-12-21T04:02:07.535Z | 2026-02-24T05:59:49.072Z |
| CVE-2025-14991 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
Campcodes Complete Online Beauty Parlor Management Sys… |
Campcodes |
Complete Online Beauty Parlor Management System |
2025-12-21T03:32:08.281Z | 2026-02-24T05:59:34.876Z |
| CVE-2025-14990 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Campcodes Complete Online Beauty Parlor Management Sys… |
Campcodes |
Complete Online Beauty Parlor Management System |
2025-12-21T03:02:06.319Z | 2026-02-24T05:59:21.928Z |
| CVE-2025-14989 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Campcodes Complete Online Beauty Parlor Management Sys… |
Campcodes |
Complete Online Beauty Parlor Management System |
2025-12-20T23:32:06.196Z | 2026-02-24T05:59:10.097Z |
| CVE-2025-14968 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Simple Stock System update.php sql injection |
code-projects |
Simple Stock System |
2025-12-19T20:02:06.387Z | 2026-02-24T05:58:57.185Z |
| CVE-2025-14966 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
FastAdmin Backend Controller Backend.php selectpage sq… |
n/a |
FastAdmin |
2025-12-19T19:32:08.599Z | 2026-02-24T05:58:44.319Z |
| CVE-2025-14964 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
TOTOLINK T10 cstecgi.cgi sprintf stack-based overflow |
TOTOLINK |
T10 |
2025-12-19T19:02:07.049Z | 2026-02-24T05:58:29.773Z |
| CVE-2025-14962 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
code-projects Simple Stock System chatuser.php cross s… |
code-projects |
Simple Stock System |
2025-12-19T18:32:08.426Z | 2026-02-24T05:58:08.680Z |
| CVE-2025-14959 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Simple Stock System signup.php sql injection |
code-projects |
Simple Stock System |
2025-12-19T18:02:06.093Z | 2026-02-24T05:57:57.140Z |
| CVE-2025-14957 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
WebAssembly Binaryen IRBuilder wasm-ir-builder.cpp mak… |
WebAssembly |
Binaryen |
2025-12-19T17:02:16.843Z | 2026-02-24T05:57:44.642Z |
| CVE-2025-14956 |
4.8 (4.0)
5.3 (3.1)
5.3 (3.0)
|
WebAssembly Binaryen wasm-binary.cpp readExport heap-b… |
WebAssembly |
Binaryen |
2025-12-19T16:32:12.536Z | 2026-02-24T05:57:29.961Z |
| CVE-2025-14955 |
6.3 (4.0)
3.7 (3.1)
3.7 (3.0)
|
Open5GS PFCP handler.c ogs_pfcp_handle_create_pdr init… |
n/a |
Open5GS |
2025-12-19T16:32:08.036Z | 2026-02-24T05:57:13.107Z |
| CVE-2025-14954 |
6.3 (4.0)
3.7 (3.1)
3.7 (3.0)
|
Open5GS QER/FAR/URR/PDR context.c ogs_pfcp_qer_find_or… |
n/a |
Open5GS |
2025-12-19T16:02:11.110Z | 2026-02-24T05:56:58.734Z |
| CVE-2025-14953 |
2.3 (4.0)
3.1 (3.1)
3.1 (3.0)
|
Open5GS FAR-ID handler.c ogs_pfcp_handle_create_pdr nu… |
n/a |
Open5GS |
2025-12-19T16:02:07.234Z | 2026-02-24T05:56:46.475Z |
| CVE-2025-14952 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Campcodes Supplier Management System add_category.php … |
Campcodes |
Supplier Management System |
2025-12-19T14:32:09.058Z | 2026-02-24T05:56:32.610Z |
| CVE-2025-14951 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Scholars Tracking System home.php sql in… |
code-projects |
Scholars Tracking System |
2025-12-19T14:32:06.003Z | 2026-02-24T05:56:19.799Z |
| CVE-2025-14950 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Scholars Tracking System delete_post.php… |
code-projects |
Scholars Tracking System |
2025-12-19T13:32:06.549Z | 2026-02-24T05:56:08.240Z |
| CVE-2025-14940 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Scholars Tracking System delete_user.php… |
code-projects |
Scholars Tracking System |
2025-12-19T04:02:08.625Z | 2026-02-24T05:55:55.720Z |
| CVE-2025-14910 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Edimax BR-6208AC FTP Daemon Service handle_retr path t… |
Edimax |
BR-6208AC |
2025-12-19T01:32:06.853Z | 2026-02-24T05:55:44.183Z |
| CVE-2025-14900 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
CodeAstro Real Estate Management System Administrator … |
CodeAstro |
Real Estate Management System |
2025-12-19T00:02:10.611Z | 2026-02-24T05:55:29.667Z |
| CVE-2025-14899 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
CodeAstro Real Estate Management System Administrator … |
CodeAstro |
Real Estate Management System |
2025-12-19T00:02:08.232Z | 2026-02-24T05:55:16.453Z |
| CVE-2025-14898 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
CodeAstro Real Estate Management System Administrator … |
CodeAstro |
Real Estate Management System |
2025-12-18T23:32:09.382Z | 2026-02-24T05:55:01.823Z |
| CVE-2025-14897 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
CodeAstro Real Estate Management System Administrator … |
CodeAstro |
Real Estate Management System |
2025-12-18T23:32:06.884Z | 2026-02-24T05:54:48.658Z |
| CVE-2025-14889 |
5.3 (4.0)
5.4 (3.1)
5.4 (3.0)
|
Campcodes Advanced Voting Management System Password v… |
Campcodes |
Advanced Voting Management System |
2025-12-18T20:02:07.993Z | 2026-02-24T05:54:36.637Z |
| CVE-2025-14879 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
Tenda WH450 HTTP Request onSSIDChange stack-based overflow |
Tenda |
WH450 |
2025-12-18T17:02:07.884Z | 2026-02-24T05:54:24.802Z |
| CVE-2025-14878 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
Tenda WH450 HTTP Request wirelessRestart stack-based o… |
Tenda |
WH450 |
2025-12-18T16:02:12.818Z | 2026-02-24T05:54:08.978Z |
| CVE-2025-14877 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Campcodes Supplier Management System add_retailer.php … |
Campcodes |
Supplier Management System |
2025-12-18T16:02:07.044Z | 2026-02-24T05:53:53.206Z |
| CVE-2025-14856 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
y_project RuoYi getnames code injection |
y_project |
RuoYi |
2025-12-18T01:32:07.806Z | 2026-02-24T05:53:39.348Z |
| CVE-2025-14841 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
OFFIS DCMTK dcmqrscp dcmqrdbi.cc startMoveRequest null… |
OFFIS |
DCMTK |
2025-12-18T00:02:08.256Z | 2026-02-24T05:53:27.564Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-24736 |
9.1 (3.1)
|
Squidex has Server-Side Request Forgery (SSRF) Issue i… |
Squidex |
squidex |
2026-01-27T20:54:51.489Z | 2026-01-28T15:17:12.814Z |
| CVE-2026-1282 |
3.5 (3.1)
|
Improper Neutralization of Script-Related HTML Tags in… |
GitLab |
GitLab |
2026-02-11T11:04:25.235Z | 2026-02-11T21:18:14.189Z |
| CVE-2026-1094 |
4.6 (3.1)
|
Improper Validation of Unsafe Equivalence in Input in GitLab |
GitLab |
GitLab |
2026-02-11T11:04:35.229Z | 2026-02-11T21:18:35.282Z |
| CVE-2025-14914 |
7.6 (3.1)
|
IBM WebSphere Application Server Liberty Path Traversal |
IBM |
WebSphere Application Server Liberty |
2026-02-02T15:17:57.060Z | 2026-02-26T15:04:36.806Z |
| CVE-2026-0595 |
7.3 (3.1)
|
Improper Neutralization of Input During Web Page Gener… |
GitLab |
GitLab |
2026-02-11T11:33:56.425Z | 2026-02-26T14:44:28.036Z |
| CVE-2026-24741 |
8.1 (3.1)
|
ConvertX Vulnerable to Arbitrary File Deletion via Pat… |
C4illin |
ConvertX |
2026-01-27T21:11:57.295Z | 2026-01-28T15:14:23.019Z |
| CVE-2025-54373 |
7.1 (4.0)
|
OpenEMR may expose Contents of Clinical Notes and Care… |
openemr |
openemr |
2026-01-27T23:11:57.929Z | 2026-01-28T21:06:36.828Z |
| CVE-2025-67645 |
8.8 (3.1)
|
OpenEMR Vulnerable to Broken Access Control in Profile… |
openemr |
openemr |
2026-01-27T23:20:18.515Z | 2026-01-28T21:05:33.217Z |
| CVE-2026-23830 |
10 (3.1)
|
SandboxJS has Sandbox Escape via Unprotected AsyncFunc… |
nyariv |
SandboxJS |
2026-01-27T23:32:16.104Z | 2026-01-28T15:09:44.543Z |
| CVE-2026-1466 |
6.1 (3.1)
|
Improper Neutralization of Input During Web Page Gener… |
Jirafeau project |
Jirafeau |
2026-01-28T06:33:15.181Z | 2026-01-28T20:48:25.368Z |
| CVE-2026-24772 |
8.9 (3.1)
|
OpenProject has SSRF and CSWSH in Hocuspocus Synchroni… |
opf |
openproject |
2026-01-28T18:07:02.278Z | 2026-01-28T18:31:44.037Z |
| CVE-2026-24775 |
6.3 (3.1)
|
OpenProject has Forced Actions, Content Spoofing, and … |
opf |
openproject |
2026-01-28T18:10:46.358Z | 2026-01-28T18:30:29.357Z |
| CVE-2026-20669 |
5.5 (3.1)
|
A parsing issue in the handling of directory path… |
Apple |
macOS |
2026-02-11T22:58:51.771Z | 2026-02-12T19:14:44.879Z |
| CVE-2025-54155 |
3.6 (4.0)
|
File Station 5 |
QNAP Systems Inc. |
File Station 5 |
2026-02-11T12:18:09.363Z | 2026-02-11T15:43:28.854Z |
| CVE-2025-54161 |
3.6 (4.0)
|
File Station 5 |
QNAP Systems Inc. |
File Station 5 |
2026-02-11T12:18:01.964Z | 2026-02-11T15:26:47.706Z |
| CVE-2025-54162 |
4.8 (4.0)
|
File Station 5 |
QNAP Systems Inc. |
File Station 5 |
2026-02-11T12:17:56.681Z | 2026-02-11T15:02:31.019Z |
| CVE-2025-54163 |
1.2 (4.0)
|
File Station 5 |
QNAP Systems Inc. |
File Station 5 |
2026-02-11T12:17:51.265Z | 2026-02-11T15:04:51.723Z |
| CVE-2025-54169 |
4.9 (4.0)
|
File Station 5 |
QNAP Systems Inc. |
File Station 5 |
2026-02-11T12:17:45.813Z | 2026-02-11T15:09:52.672Z |
| CVE-2025-57707 |
1.1 (4.0)
|
File Station 5 |
QNAP Systems Inc. |
File Station 5 |
2026-02-11T12:17:33.929Z | 2026-02-11T15:43:39.764Z |
| CVE-2025-57713 |
1.3 (4.0)
|
File Station 5 |
QNAP Systems Inc. |
File Station 5 |
2026-02-11T12:17:04.636Z | 2026-02-11T16:56:22.334Z |
| CVE-2023-37525 |
5.3 (3.1)
|
HCL BigFix Compliance is vulnerable to a sensitive inf… |
HCLSoftware |
BigFix Compliance |
2026-01-28T19:58:49.005Z | 2026-01-29T18:11:32.011Z |
| CVE-2025-13979 |
5.4 (3.1)
|
Mini site - Moderately critical - Cross-Site Scripting… |
Drupal |
Mini site |
2026-01-28T20:00:38.256Z | 2026-01-29T17:10:16.561Z |
| CVE-2025-62853 |
5.2 (4.0)
|
File Station 5 |
QNAP Systems Inc. |
File Station 5 |
2026-02-11T12:16:12.855Z | 2026-02-11T15:50:48.976Z |
| CVE-2025-62854 |
1.3 (4.0)
|
File Station 5 |
QNAP Systems Inc. |
File Station 5 |
2026-02-11T12:16:07.030Z | 2026-02-11T15:51:20.062Z |
| CVE-2025-62855 |
1.3 (4.0)
|
File Station 5 |
QNAP Systems Inc. |
File Station 5 |
2026-02-11T12:16:00.950Z | 2026-02-11T21:05:57.561Z |
| CVE-2025-62856 |
1.3 (4.0)
|
File Station 5 |
QNAP Systems Inc. |
File Station 5 |
2026-02-11T12:15:55.297Z | 2026-02-11T16:50:14.744Z |
| CVE-2025-66278 |
1.3 (4.0)
|
File Station 5 |
QNAP Systems Inc. |
File Station 5 |
2026-02-11T12:15:37.428Z | 2026-02-11T16:43:29.616Z |
| CVE-2025-13980 |
5.3 (3.1)
|
CKEditor 5 Premium Features - Moderately critical - Ac… |
Drupal |
CKEditor 5 Premium Features |
2026-01-28T20:01:16.894Z | 2026-01-29T17:11:46.810Z |
| CVE-2025-1823 |
3.5 (3.1)
|
IBM Jazz Reporting Service Denial of Service |
IBM |
Jazz Reporting Service |
2026-02-04T21:07:17.979Z | 2026-02-05T14:32:02.968Z |
| CVE-2026-22894 |
1.3 (4.0)
|
File Station 5 |
QNAP Systems Inc. |
File Station 5 |
2026-02-11T12:15:21.357Z | 2026-02-11T16:36:57.274Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-13979 | Privilege Defined With Unsafe Actions vulnerability in Drupal Mini site allows Stored XSS.This issu… | 2026-01-28T20:16:07.130 | 2026-02-12T19:50:47.080 |
| fkie_cve-2025-62853 | A path traversal vulnerability has been reported to affect File Station 5. If a remote attacker gai… | 2026-02-11T13:15:57.673 | 2026-02-12T19:50:32.323 |
| fkie_cve-2025-62854 | An uncontrolled resource consumption vulnerability has been reported to affect File Station 5. If a… | 2026-02-11T13:15:57.817 | 2026-02-12T19:48:21.780 |
| fkie_cve-2025-62855 | A path traversal vulnerability has been reported to affect File Station 5. If a local attacker gain… | 2026-02-11T13:15:57.950 | 2026-02-12T19:46:22.803 |
| fkie_cve-2025-62856 | A path traversal vulnerability has been reported to affect File Station 5. If a local attacker gain… | 2026-02-11T13:15:58.107 | 2026-02-12T19:45:34.143 |
| fkie_cve-2025-66278 | A path traversal vulnerability has been reported to affect File Station 5. If a remote attacker gai… | 2026-02-11T13:15:58.510 | 2026-02-12T19:43:46.360 |
| fkie_cve-2025-13980 | Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal CKEditor 5 Premium… | 2026-01-28T20:16:07.260 | 2026-02-12T19:43:39.363 |
| fkie_cve-2025-1823 | IBM Jazz Reporting Service could allow an authenticated user on the host network to cause a denial … | 2026-02-04T21:15:57.593 | 2026-02-12T19:41:38.020 |
| fkie_cve-2026-22894 | A path traversal vulnerability has been reported to affect File Station 6. If a remote attacker gai… | 2026-02-11T13:15:58.937 | 2026-02-12T19:40:11.477 |
| fkie_cve-2024-56807 | An out-of-bounds read vulnerability has been reported to affect Media Streaming add-on. If an attac… | 2026-02-11T13:15:51.463 | 2026-02-12T19:29:32.550 |
| fkie_cve-2024-56808 | A command injection vulnerability has been reported to affect Media Streaming add-on. If an attacke… | 2026-02-11T13:15:51.667 | 2026-02-12T19:24:00.003 |
| fkie_cve-2025-20360 | Multiple Cisco products are affected by a vulnerability in the Snort 3 HTTP Decoder that could allo… | 2025-10-15T17:15:49.433 | 2026-02-12T19:15:50.247 |
| fkie_cve-2025-13379 | IBM Aspera Console 3.4.0 through 3.4.8 is vulnerable to SQL injection. A remote attacker could send… | 2026-02-05T14:16:03.000 | 2026-02-12T19:08:57.793 |
| fkie_cve-2026-21348 | Substance3D - Modeler versions 1.22.5 and earlier are affected by an out-of-bounds read vulnerabili… | 2026-02-10T20:16:55.420 | 2026-02-12T19:07:46.840 |
| fkie_cve-2026-24300 | Azure Front Door Elevation of Privilege Vulnerability | 2026-02-05T23:15:54.490 | 2026-02-12T19:02:39.727 |
| fkie_cve-2025-13096 | IBM Business Automation Workflow containers V25.0.0 through V25.0.0-IF007, V24.0.1 - V24.0.1-IF007,… | 2026-02-02T23:15:58.600 | 2026-02-12T19:01:45.070 |
| fkie_cve-2026-21532 | Azure Function Information Disclosure Vulnerability | 2026-02-05T23:15:54.317 | 2026-02-12T19:01:06.173 |
| fkie_cve-2026-24302 | Azure Arc Elevation of Privilege Vulnerability | 2026-02-05T23:15:54.653 | 2026-02-12T18:39:54.910 |
| fkie_cve-2026-20960 | Improper authorization in Microsoft Power Apps allows an authorized attacker to execute code over a… | 2026-01-16T22:16:25.553 | 2026-02-12T18:37:37.203 |
| fkie_cve-2020-37113 | GUnet OpenEclass 1.7.3 allows authenticated users to bypass file extension restrictions when upload… | 2026-02-03T18:16:11.527 | 2026-02-12T18:33:09.553 |
| fkie_cve-2020-37112 | GUnet OpenEclass 1.7.3 contains multiple SQL injection vulnerabilities that allow authenticated att… | 2026-02-03T18:16:11.360 | 2026-02-12T18:28:10.327 |
| fkie_cve-2026-20666 | An authorization issue was addressed with improved state management. This issue is fixed in macOS T… | 2026-02-11T23:16:09.020 | 2026-02-12T18:27:31.410 |
| fkie_cve-2025-70997 | A vulnerability has been discovered in eladmin v2.7 and before. This vulnerability allows for an ar… | 2026-02-04T15:16:13.697 | 2026-02-12T18:16:08.983 |
| fkie_cve-2024-36355 | Improper input validation in the SMM handler could allow an attacker with Ring0 access to write to … | 2026-02-10T20:16:42.817 | 2026-02-12T18:16:06.423 |
| fkie_cve-2026-24881 | In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message carrying an oversized wrapped … | 2026-01-27T19:16:16.517 | 2026-02-12T18:15:38.923 |
| fkie_cve-2025-55705 | This vulnerability occurs when the system permits multiple simultaneous connections to the backend… | 2026-01-22T23:15:50.137 | 2026-02-12T18:02:38.060 |
| fkie_cve-2025-67399 | An issue in AIRTH SMART HOME AQI MONITOR Bootloader v.1.005 allows a physically proximate attacker … | 2026-01-14T16:15:56.610 | 2026-02-12T17:54:40.487 |
| fkie_cve-2025-15464 | Exported Activity allows external applications to gain application context and directly launch Gmai… | 2026-01-08T21:15:42.980 | 2026-02-12T17:51:33.487 |
| fkie_cve-2026-22710 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-01-09T00:15:45.693 | 2026-02-12T17:50:39.720 |
| fkie_cve-2026-22712 | Improper Encoding or Escaping of Output due to magic word replacement in ParserAfterTidy vulnerabil… | 2026-01-09T00:15:45.837 | 2026-02-12T17:50:28.073 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-f5pr-pcc8-pgcp |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: spi: bcm-qspi: return error if… | 2025-10-07T18:31:10Z | 2026-02-03T21:31:46Z |
| ghsa-92f6-rh29-hfq6 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: KVM: nSVM: Check instead of as… | 2025-10-07T18:31:10Z | 2026-02-03T21:31:46Z |
| ghsa-75gq-3wgg-m886 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ASoC: codecs: wcd938x: fix mis… | 2025-10-07T18:31:10Z | 2026-02-03T21:31:46Z |
| ghsa-3wc5-j3q5-m2xc |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: md: don't dereference mddev af… | 2025-10-07T18:31:10Z | 2026-02-03T21:31:46Z |
| ghsa-3cqg-r9w7-gjfg |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ice: Don't tx before switchdev… | 2025-10-07T18:31:10Z | 2026-02-03T21:31:46Z |
| ghsa-v452-696f-f255 |
8.8 (3.1)
|
An issue was discovered in the Divi Builder plugin, Divi theme, and Divi Extra theme before 4.5.3 f… | 2022-05-24T17:37:51Z | 2026-02-03T21:31:45Z |
| ghsa-r92c-9c7f-3pj8 |
3.1 (3.1)
|
OpenTofu has High CPU usage in "tofu init" with maliciously-crafted module packages in .zip format | 2026-01-21T22:58:42Z | 2026-02-03T20:24:00Z |
| ghsa-v84m-gfw5-hm2w |
6.8 (3.1)
|
Apache Syncope: Reflected XSS on Enduser Login | 2026-02-03T18:30:44Z | 2026-02-03T19:54:38Z |
| ghsa-73f3-rqqf-2j54 |
4.9 (3.1)
|
Apache Syncope: Console XXE on Keymaster parameters | 2026-02-03T18:30:44Z | 2026-02-03T19:53:38Z |
| ghsa-r54g-49rx-98cr |
6.9 (4.0)
|
RustFS Logs Sensitive Credentials in Plaintext | 2026-02-03T17:37:33Z | 2026-02-03T19:44:18Z |
| ghsa-76wf-9vgp-pj7w |
|
Duplicate Advisory: Unencrypted md5 plaintext hash in metadata in AWS S3 Crypto SDK for golang | 2022-02-11T23:26:12Z | 2026-02-03T19:37:54Z |
| ghsa-6692-8qqf-79jc |
|
Duplicate Advisory: `Read` on uninitialized buffer may cause UB ('tectonic_xdv' crate) | 2022-06-17T00:24:29Z | 2026-02-03T19:37:22Z |
| ghsa-vwhw-vp9v-q9c9 |
5.4 (3.1)
|
Moodle vulnerable to Cross-site Scripting | 2026-02-03T12:30:29Z | 2026-02-03T19:36:41Z |
| ghsa-3fc5-9x9m-vqc4 |
9.8 (3.1)
|
Duplicate Advisory: Privilege Escalation in express-cart | 2019-06-03T17:31:32Z | 2026-02-03T19:36:21Z |
| ghsa-gvg8-93h5-g6qq |
8.1 (4.0)
|
Django has an SQL Injection issue | 2026-02-03T15:30:24Z | 2026-02-03T19:34:22Z |
| ghsa-mwm9-4648-f68q |
8.1 (4.0)
|
Django has an SQL Injection issue | 2026-02-03T15:30:23Z | 2026-02-03T19:32:56Z |
| ghsa-4rrr-2h4v-f3j9 |
2.7 (4.0)
|
Django has Inefficient Algorithmic Complexity | 2026-02-03T15:30:23Z | 2026-02-03T19:31:15Z |
| ghsa-33mw-q7rj-mjwj |
2.7 (4.0)
|
Django has Inefficient Algorithmic Complexity | 2026-02-03T15:30:23Z | 2026-02-03T19:29:47Z |
| ghsa-2mcm-79hx-8fxw |
2.7 (4.0)
|
Django has Observable Timing Discrepancy | 2026-02-03T15:30:23Z | 2026-02-03T19:22:54Z |
| ghsa-8jrv-wx83-w3xj |
4.3 (3.1)
|
Moodle Inserts Sensitive Information Into Sent Data | 2026-02-03T12:30:29Z | 2026-02-03T19:17:11Z |
| ghsa-hcm6-q6pc-xfhm |
5.4 (3.1)
|
Moodle has an authorization logic flaw | 2026-02-03T12:30:29Z | 2026-02-03T19:16:52Z |
| ghsa-j5jv-w5cw-j9ff |
8.1 (3.1)
|
Moodle authentication bypass vulnerability | 2026-02-03T12:30:28Z | 2026-02-03T19:16:26Z |
| ghsa-5cx4-w4fh-fr57 |
7.5 (3.1)
|
Moodle Affected by Improper Restriction of Excessive Authentication Attempts | 2026-02-03T12:30:29Z | 2026-02-03T19:15:22Z |
| ghsa-qv78-6gpp-hm68 |
3.5 (3.1)
|
Moodle Open Redirect vulnerability | 2026-02-03T12:30:29Z | 2026-02-03T19:07:08Z |
| ghsa-qfh6-h7j6-fvjv |
6.1 (3.1)
|
Moodle formula injection vulnerability | 2026-02-03T12:30:28Z | 2026-02-03T19:06:25Z |
| ghsa-6mmv-f6c6-v6q8 |
7.3 (3.1)
|
Moodle vulnerable to Cross-site Scripting | 2026-02-03T12:30:28Z | 2026-02-03T19:05:25Z |
| ghsa-mhf6-pp52-8wqj |
7.3 (3.1)
|
Moodle Cross-site Scripting (XSS) vulnerability | 2026-02-03T12:30:28Z | 2026-02-03T19:02:30Z |
| ghsa-rjrp-m2jw-pv9c |
7.2 (3.1)
8.7 (4.0)
|
SageMaker Python SDK has Exposed HMAC | 2026-02-02T23:33:32Z | 2026-02-03T19:01:11Z |
| ghsa-62rc-f4v9-h543 |
5.9 (3.1)
8.7 (4.0)
|
SageMaker Python SDK has Insecure TLS Configuration | 2026-02-02T23:24:50Z | 2026-02-03T19:01:03Z |
| ghsa-fc6g-2gcp-2qrq |
7.7 (4.0)
|
RustFS has SourceIp bypass via spoofed X-Forwarded-For/Real-IP headers | 2026-02-03T17:31:41Z | 2026-02-03T18:55:45Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-30827 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.059001Z |
| gsd-2024-30879 | Reflected Cross Site Scripting (XSS) vulnerability in RageFrame2 v2.6.43, allows remote a… | 2024-04-03T05:02:29.058744Z |
| gsd-2024-30322 | Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability. This vulner… | 2024-04-03T05:02:29.058546Z |
| gsd-2024-30732 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.058347Z |
| gsd-2024-30477 | Missing Authorization vulnerability in Klarna Klarna Payments for WooCommerce.This issue … | 2024-04-03T05:02:29.057755Z |
| gsd-2024-30124 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.057366Z |
| gsd-2024-30837 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.057136Z |
| gsd-2024-30390 | An Improper Restriction of Excessive Authentication Attempts vulnerability in Juniper Net… | 2024-04-03T05:02:29.056946Z |
| gsd-2024-30154 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.056755Z |
| gsd-2024-30677 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.056564Z |
| gsd-2024-30980 | SQL Injection vulnerability in phpgurukul Cyber Cafe Management System Using PHP & MySQL … | 2024-04-03T05:02:29.056375Z |
| gsd-2024-30314 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.056182Z |
| gsd-2024-30926 | Cross Site Scripting vulnerability in DerbyNet v9.0 and below allows attackers to execute… | 2024-04-03T05:02:29.055973Z |
| gsd-2024-30406 | A Cleartext Storage in a File on Disk vulnerability in Juniper Networks Junos OS Evolved … | 2024-04-03T05:02:29.055727Z |
| gsd-2024-30293 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.055525Z |
| gsd-2024-30894 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.055315Z |
| gsd-2024-30453 | Server-Side Request Forgery (SSRF) vulnerability in Brave Brave Popup Builder.This issue … | 2024-04-03T05:02:29.054713Z |
| gsd-2024-30447 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:29.053937Z |
| gsd-2024-30639 | Tenda F1202 v1.2.0.20(408) has a stack overflow vulnerability in the page parameter of fr… | 2024-04-03T05:02:29.053372Z |
| gsd-2024-30766 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.053018Z |
| gsd-2024-30952 | A stored cross-site scripting (XSS) vulnerability in PESCMS-TEAM v2.3.6 allows attackers … | 2024-04-03T05:02:29.052820Z |
| gsd-2024-30305 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.052618Z |
| gsd-2024-30631 | Tenda FH1205 v2.0.0.7(775) has a stack overflow vulnerability in the schedStartTime param… | 2024-04-03T05:02:29.052175Z |
| gsd-2024-30287 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.051794Z |
| gsd-2024-30594 | Tenda FH1202 v1.2.0.14(408) has a stack overflow vulnerability in the deviceMac parameter… | 2024-04-03T05:02:29.051399Z |
| gsd-2024-30850 | An issue in tiagorlampert CHAOS v5.0.1 allows a remote attacker to execute arbitrary code… | 2024-04-03T05:02:29.050880Z |
| gsd-2024-30602 | Tenda FH1203 v2.0.1.6 has a stack overflow vulnerability in the schedStartTime parameter … | 2024-04-03T05:02:29.050472Z |
| gsd-2024-30080 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.049997Z |
| gsd-2024-30710 | An issue was discovered in ROS2 Dashing Diademata in ROS_VERSION 2 and ROS_PYTHON_VERSION… | 2024-04-03T05:02:29.049796Z |
| gsd-2024-30774 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:29.049599Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-190902 | Malicious code in @postman/mcp-ui-client (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190901 | Malicious code in @postman/final-node-keytar (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190900 | Malicious code in @posthog/wizard (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190899 | Malicious code in @posthog/web-dev-server (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190898 | Malicious code in @posthog/variance-plugin (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190897 | Malicious code in @posthog/url-normalizer-plugin (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190896 | Malicious code in @posthog/twitter-followers-plugin (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190895 | Malicious code in @posthog/twilio-plugin (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190894 | Malicious code in @posthog/taxonomy-plugin (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190893 | Malicious code in @posthog/snowflake-export-plugin (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190892 | Malicious code in @posthog/sendgrid-plugin (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190891 | Malicious code in @posthog/rrweb-player (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190890 | Malicious code in @posthog/react-rrweb-player (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190889 | Malicious code in @posthog/plugin-unduplicates (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190888 | Malicious code in @posthog/pagerduty-plugin (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190887 | Malicious code in @posthog/nextjs-config (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190886 | Malicious code in @posthog/nextjs (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190885 | Malicious code in @posthog/maxmind-plugin (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190884 | Malicious code in @posthog/kinesis-plugin (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190883 | Malicious code in @posthog/ingestion-alert-plugin (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190882 | Malicious code in @posthog/hedgehog-mode (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190881 | Malicious code in @posthog/gitub-star-sync-plugin (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190880 | Malicious code in @posthog/github-release-tracking-plugin (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190879 | Malicious code in @posthog/geoip-plugin (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190878 | Malicious code in @posthog/first-time-event-tracker (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190877 | Malicious code in @posthog/event-sequence-timer-plugin (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190876 | Malicious code in @posthog/databricks-plugin (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190875 | Malicious code in @posthog/customerio-plugin (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190874 | Malicious code in @posthog/currency-normalization-plugin (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190873 | Malicious code in @posthog/automatic-cohorts-plugin (npm) | 2025-11-24T16:31:47Z | 2025-11-25T00:36:47Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-0637 | Red Hat OpenShift Serverless: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-03-14T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0636 | Dell BIOS: Mehrere Schwachstellen | 2024-03-13T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0635 | Arcserve Unified Data Protection: Mehrere Schwachstellen | 2024-03-13T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0633 | PaloAlto Networks GlobalProtect: Mehrere Schwachstellen | 2024-03-13T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0631 | Cisco IOS XR: Mehrere Schwachstellen | 2024-03-13T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0629 | PaloAlto Networks PAN-OS: Schwachstelle ermöglicht Denial of Service | 2024-03-13T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0628 | JFrog Artifactory: Schwachstelle ermöglicht Cross-Site Scripting | 2024-03-13T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0625 | Zoom Video Communications Rooms: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-03-12T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0624 | Intel Chipset Software: Mehrere Schwachstellen | 2024-03-12T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0617 | Fortinet FortiOS und FortiProxy: Mehrere Schwachstellen | 2024-03-12T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0613 | Microsoft Apps: Mehrere Schwachstellen | 2024-03-12T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-0610 | SonicWall SonicOS: Mehrere Schwachstellen | 2024-03-12T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2023-3224 | Red Hat JBoss Enterprise Application Platform: Schwachstelle ermöglicht Denial of Service | 2023-12-27T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2023-3037 | Apache Camel: Mehrere Schwachstellen ermöglichen Denial of Service | 2023-11-30T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2022-2135 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Codeausführung | 2022-11-21T23:00:00.000+00:00 | 2024-11-24T23:00:00.000+00:00 |
| wid-sec-w-2024-3530 | Microsoft Edge: Schwachstelle ermöglicht Darstellen falscher Informationen | 2024-11-21T23:00:00.000+00:00 | 2024-11-21T23:00:00.000+00:00 |
| wid-sec-w-2024-3529 | IBM SPSS (Netty): Mehrere Schwachstellen | 2024-11-21T23:00:00.000+00:00 | 2024-11-21T23:00:00.000+00:00 |
| wid-sec-w-2024-3526 | Adobe Creative Cloud: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-11-21T23:00:00.000+00:00 | 2024-11-21T23:00:00.000+00:00 |
| wid-sec-w-2024-3524 | Checkmk: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-11-21T23:00:00.000+00:00 | 2024-11-21T23:00:00.000+00:00 |
| wid-sec-w-2024-3398 | PaloAlto Networks PAN-OS: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2024-11-10T23:00:00.000+00:00 | 2024-11-21T23:00:00.000+00:00 |
| wid-sec-w-2024-3327 | Red Hat Enterprise Linux (xerces-c): Schwachstelle ermöglicht Codeausführung, Offenlegung von Informationen oder DoS | 2024-11-03T23:00:00.000+00:00 | 2024-11-21T23:00:00.000+00:00 |
| wid-sec-w-2024-1651 | Oracle Systems: Mehrere Schwachstellen | 2024-07-16T22:00:00.000+00:00 | 2024-11-21T23:00:00.000+00:00 |
| wid-sec-w-2024-1248 | Xerox FreeFlow Print Server: Mehrere Schwachstellen | 2024-05-28T22:00:00.000+00:00 | 2024-11-21T23:00:00.000+00:00 |
| wid-sec-w-2024-1109 | Apple macOS: Mehrere Schwachstellen | 2024-05-13T22:00:00.000+00:00 | 2024-11-21T23:00:00.000+00:00 |
| wid-sec-w-2024-0730 | Cisco Catalyst Center: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-03-27T23:00:00.000+00:00 | 2024-11-21T23:00:00.000+00:00 |
| wid-sec-w-2024-0727 | Wireshark: Schwachstelle ermöglicht Denial of Service | 2024-03-26T23:00:00.000+00:00 | 2024-11-21T23:00:00.000+00:00 |
| wid-sec-w-2024-0119 | Oracle MySQL: Mehrere Schwachstellen | 2024-01-16T23:00:00.000+00:00 | 2024-11-21T23:00:00.000+00:00 |
| wid-sec-w-2023-2035 | MIT Kerberos: Schwachstelle ermöglicht Denial of Service | 2023-08-10T22:00:00.000+00:00 | 2024-11-21T23:00:00.000+00:00 |
| wid-sec-w-2023-0137 | Oracle Communications: Mehrere Schwachstellen | 2023-01-17T23:00:00.000+00:00 | 2024-11-21T23:00:00.000+00:00 |
| wid-sec-w-2024-3521 | TeamViewer: Schwachstelle ermöglicht Privilegieneskalation | 2024-11-20T23:00:00.000+00:00 | 2024-11-20T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2014:0353 | Red Hat Security Advisory: libyaml security update | 2014-04-02T19:50:54+00:00 | 2026-01-28T22:37:58+00:00 |
| rhsa-2014:0345 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.2 update | 2014-03-31T16:47:38+00:00 | 2026-01-28T22:37:58+00:00 |
| rhsa-2014:0344 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.2 update | 2014-03-31T16:58:30+00:00 | 2026-01-28T22:37:58+00:00 |
| rhsa-2014:0343 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.2 update | 2014-03-31T16:47:44+00:00 | 2026-01-28T22:37:58+00:00 |
| rhsa-2014:0323 | Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ 6.0.0 security update | 2014-03-24T18:05:04+00:00 | 2026-01-28T22:37:58+00:00 |
| rhsa-2014:0294 | Red Hat Security Advisory: XStream security update | 2014-03-13T19:21:28+00:00 | 2026-01-28T22:37:57+00:00 |
| rhsa-2014:0253 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.1 security update | 2014-03-05T19:05:24+00:00 | 2026-01-28T22:37:57+00:00 |
| rhsa-2014:0252 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.1 security update | 2014-03-05T19:05:35+00:00 | 2026-01-28T22:37:57+00:00 |
| rhsa-2014:0216 | Red Hat Security Advisory: XStream security update | 2014-02-26T20:32:19+00:00 | 2026-01-28T22:37:57+00:00 |
| rhsa-2014:0195 | Red Hat Security Advisory: Red Hat JBoss Portal 6.1.1 update | 2014-02-20T17:22:15+00:00 | 2026-01-28T22:37:56+00:00 |
| rhsa-2014:0172 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.1 update | 2014-02-13T18:33:26+00:00 | 2026-01-28T22:37:56+00:00 |
| rhsa-2014:0171 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.1 update | 2014-02-13T18:33:33+00:00 | 2026-01-28T22:37:55+00:00 |
| rhsa-2014:0170 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.1 update | 2014-02-13T18:34:17+00:00 | 2026-01-28T22:37:55+00:00 |
| rhsa-2014:0041 | Red Hat Security Advisory: rhev-hypervisor6 security update | 2014-01-21T17:02:59+00:00 | 2026-01-28T22:37:55+00:00 |
| rhsa-2013:1815 | Red Hat Security Advisory: php security update | 2013-12-11T03:44:00+00:00 | 2026-01-28T22:37:55+00:00 |
| rhsa-2014:0015 | Red Hat Security Advisory: openssl security update | 2014-01-08T18:16:14+00:00 | 2026-01-28T22:37:54+00:00 |
| rhsa-2013:1826 | Red Hat Security Advisory: php security update | 2013-12-12T03:48:00+00:00 | 2026-01-28T22:37:53+00:00 |
| rhsa-2013:1825 | Red Hat Security Advisory: php53 security update | 2013-12-11T16:06:00+00:00 | 2026-01-28T22:37:53+00:00 |
| rhsa-2013:1824 | Red Hat Security Advisory: php security update | 2013-12-11T16:29:00+00:00 | 2026-01-28T22:37:53+00:00 |
| rhsa-2013:1814 | Red Hat Security Advisory: php security update | 2013-12-11T02:24:00+00:00 | 2026-01-28T22:37:52+00:00 |
| rhsa-2013:1813 | Red Hat Security Advisory: php53 and php security update | 2013-12-11T02:34:00+00:00 | 2026-01-28T22:37:51+00:00 |
| rhsa-2013:1804 | Red Hat Security Advisory: libjpeg security update | 2013-12-09T23:21:00+00:00 | 2026-01-28T22:37:51+00:00 |
| rhsa-2013:1803 | Red Hat Security Advisory: libjpeg-turbo security update | 2013-12-09T23:22:00+00:00 | 2026-01-28T22:37:50+00:00 |
| rhsa-2013:1514 | Red Hat Security Advisory: spacewalk-java security update | 2013-11-12T16:13:00+00:00 | 2026-01-28T22:37:50+00:00 |
| rhsa-2013:1513 | Red Hat Security Advisory: rhn-java-sat security update | 2013-11-12T16:06:00+00:00 | 2026-01-28T22:37:50+00:00 |
| rhsa-2013:1374 | Red Hat Security Advisory: jboss-remoting security update | 2013-09-30T17:46:00+00:00 | 2026-01-28T22:37:50+00:00 |
| rhsa-2013:1373 | Red Hat Security Advisory: jboss-remoting security update | 2013-09-30T17:43:00+00:00 | 2026-01-28T22:37:49+00:00 |
| rhsa-2013:1372 | Red Hat Security Advisory: jboss-remoting security update | 2013-09-30T17:42:00+00:00 | 2026-01-28T22:37:49+00:00 |
| rhsa-2013:1371 | Red Hat Security Advisory: jboss-remoting security update | 2013-09-30T17:42:00+00:00 | 2026-01-28T22:37:49+00:00 |
| rhsa-2013:1370 | Red Hat Security Advisory: jboss-remoting security update | 2013-09-30T17:41:00+00:00 | 2026-01-28T22:37:49+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-39938 | ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed | 2025-10-02T00:00:00.000Z | 2025-10-05T01:02:11.000Z |
| msrc_cve-2025-39929 | smb: client: fix smbdirect_recv_io leak in smbd_negotiate() error path | 2025-10-02T00:00:00.000Z | 2025-10-05T01:02:06.000Z |
| msrc_cve-2025-39934 | drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ | 2025-10-02T00:00:00.000Z | 2025-10-05T01:02:01.000Z |
| msrc_cve-2024-39508 | io_uring/io-wq: Use set_bit() and test_bit() at worker->flags | 2024-07-01T07:00:00.000Z | 2025-10-05T01:01:52.000Z |
| msrc_cve-2024-38620 | Bluetooth: HCI: Remove HCI_AMP support | 2024-06-02T07:00:00.000Z | 2025-10-05T01:01:47.000Z |
| msrc_cve-2024-42273 | f2fs: assign CURSEG_ALL_DATA_ATGC if blkaddr is valid | 2024-08-02T00:00:00.000Z | 2025-10-04T01:01:17.000Z |
| msrc_cve-2025-9648 | Denial of Service in CivetWeb | 2025-09-02T00:00:00.000Z | 2025-10-03T01:01:47.000Z |
| msrc_cve-2024-36951 | drm/amdkfd: range check cp bad op exception interrupts | 2024-05-02T07:00:00.000Z | 2025-10-03T01:01:40.000Z |
| msrc_cve-2024-36949 | amd/amdkfd: sync all devices to wait all processes being evicted | 2024-05-02T07:00:00.000Z | 2025-10-03T01:01:33.000Z |
| msrc_cve-2024-36922 | wifi: iwlwifi: read txq->read_ptr under lock | 2024-05-02T07:00:00.000Z | 2025-10-03T01:01:28.000Z |
| msrc_cve-2024-36920 | scsi: mpi3mr: Avoid memcpy field-spanning write WARNING | 2024-05-02T07:00:00.000Z | 2025-10-03T01:01:23.000Z |
| msrc_cve-2024-36244 | net/sched: taprio: extend minimum interval restriction to entire cycle too | 2024-06-02T07:00:00.000Z | 2025-10-03T01:01:17.000Z |
| msrc_cve-2023-53469 | af_unix: Fix null-ptr-deref in unix_stream_sendpage(). | 2025-10-02T00:00:00.000Z | 2025-10-02T01:07:32.000Z |
| msrc_cve-2025-39914 | tracing: Silence warning when chunk allocation fails in trace_pid_write | 2025-10-02T00:00:00.000Z | 2025-10-02T01:07:27.000Z |
| msrc_cve-2025-39898 | e1000e: fix heap overflow in e1000_set_eeprom | 2025-10-02T00:00:00.000Z | 2025-10-02T01:07:22.000Z |
| msrc_cve-2025-39916 | mm/damon/reclaim: avoid divide-by-zero in damon_reclaim_apply_parameters() | 2025-10-02T00:00:00.000Z | 2025-10-02T01:07:03.000Z |
| msrc_cve-2025-39910 | mm/vmalloc, mm/kasan: respect gfp mask in kasan_populate_vmalloc() | 2025-10-02T00:00:00.000Z | 2025-10-02T01:06:52.000Z |
| msrc_cve-2025-39909 | mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters() | 2025-10-02T00:00:00.000Z | 2025-10-02T01:06:47.000Z |
| msrc_cve-2025-39891 | wifi: mwifiex: Initialize the chan_stats array to zero | 2025-10-02T00:00:00.000Z | 2025-10-02T01:06:37.000Z |
| msrc_cve-2025-39895 | sched: Fix sched_numa_find_nth_cpu() if mask offline | 2025-10-02T00:00:00.000Z | 2025-10-02T01:06:30.000Z |
| msrc_cve-2024-36911 | hv_netvsc: Don't free decrypted memory | 2024-05-02T07:00:00.000Z | 2025-10-02T01:06:20.000Z |
| msrc_cve-2024-36909 | Drivers: hv: vmbus: Don't free ring buffers that couldn't be re-encrypted | 2024-05-02T07:00:00.000Z | 2025-10-02T01:06:15.000Z |
| msrc_cve-2024-36900 | net: hns3: fix kernel crash when devlink reload during initialization | 2024-05-02T07:00:00.000Z | 2025-10-02T01:06:10.000Z |
| msrc_cve-2024-36021 | net: hns3: fix kernel crash when devlink reload during pf initialization | 2024-05-02T07:00:00.000Z | 2025-10-02T01:06:04.000Z |
| msrc_cve-2025-46150 | In PyTorch before 2.7.0, when torch.compile is used, FractionalMaxPool2d has inconsistent results. | 2025-09-02T00:00:00.000Z | 2025-10-02T01:05:21.000Z |
| msrc_cve-2025-55557 | A Name Error occurs in pytorch v2.7.0 when a PyTorch model consists of torch.cummin and is compiled by Inductor, leading to a Denial of Service (DoS). | 2025-09-02T00:00:00.000Z | 2025-10-02T01:05:13.000Z |
| msrc_cve-2025-46149 | In PyTorch before 2.7.0, when inductor is used, nn.Fold has an assertion error. | 2025-09-02T00:00:00.000Z | 2025-10-02T01:05:06.000Z |
| msrc_cve-2025-46153 | PyTorch before 3.7.0 has a bernoulli_p decompose function in decompositions.py even though it lacks full consistency with the eager CPU implementation, negatively affecting nn.Dropout1d, nn.Dropout2d, and nn.Dropout3d for fallback_random=True. | 2025-09-02T00:00:00.000Z | 2025-10-02T01:04:57.000Z |
| msrc_cve-2025-11083 | GNU Binutils Linker elfcode.h elf_swap_shdr heap-based overflow | 2025-09-02T00:00:00.000Z | 2025-10-02T01:04:49.000Z |
| msrc_cve-2025-11082 | GNU Binutils Linker elf-eh-frame.c _bfd_elf_parse_eh_frame heap-based overflow | 2025-09-02T00:00:00.000Z | 2025-10-02T01:04:39.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202505-2357 | FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the remote_ip … | 2025-06-08T23:20:18.548000Z |
| var-202410-0079 | A vulnerability was found in D-Link DIR-605L 2.13B01 BETA. It has been classified as crit… | 2025-06-08T23:19:23.321000Z |
| var-202505-2242 | FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the stp_conf_n… | 2025-06-08T23:19:22.096000Z |
| var-202306-0504 | On Triangle MicroWorks' SCADA Data Gateway version <= v5.01.03, an unauthenticated attack… | 2025-06-08T23:18:12.835000Z |
| var-202410-0027 | A vulnerability was found in D-Link DIR-605L 2.13B01 BETA. It has been declared as critic… | 2025-06-08T23:18:07.072000Z |
| var-202412-0606 | A NULL pointer dereference in D-Link DIR-860L REVB_FIRMWARE_2.04.B04_ic5b allows attacker… | 2025-06-08T23:18:06.564000Z |
| var-202405-4084 | Tenda FH1206 V1.2.0.8(8155)_EN was discovered to contain a stack-based buffer overflow vu… | 2025-06-08T23:17:42.139000Z |
| var-202505-2333 | FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the host_ip pa… | 2025-06-08T23:17:36.770000Z |
| var-202405-4095 | Tenda FH1206 V1.2.0.8(8155)_EN was discovered to contain a stack-based buffer overflow vu… | 2025-06-08T23:16:32.231000Z |
| var-202405-4019 | Tenda FH1206 V1.2.0.8(8155)_EN was discovered to contain a stack-based buffer overflow vu… | 2025-06-08T23:14:54.207000Z |
| var-202505-2459 | FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the radIpkey p… | 2025-06-08T23:14:52.443000Z |
| var-202405-3649 | Tenda AX1806 v1.0.0.1 contains a stack overflow via the iptv.stb.port parameter in the fu… | 2025-06-08T23:11:17.568000Z |
| var-202410-0040 | A vulnerability was found in D-Link DIR-605L 2.13B01 BETA and classified as critical. Thi… | 2025-06-08T23:11:16.986000Z |
| var-202410-0061 | A vulnerability classified as critical has been found in D-Link DIR-605L 2.13B01 BETA. Th… | 2025-06-08T23:11:16.964000Z |
| var-202410-0036 | A vulnerability was found in D-Link DIR-605L 2.13B01 BETA. It has been classified as crit… | 2025-06-08T23:09:46.005000Z |
| var-202410-0078 | A vulnerability, which was classified as critical, has been found in D-Link DIR-605L 2.13… | 2025-06-08T23:09:45.983000Z |
| var-202505-2360 | FW-WGS-804HPT v1.305b241111 was discovered to contain a stack overflow via the web_sys_in… | 2025-06-08T23:09:44.734000Z |
| var-202405-4001 | Tenda FH1206 V1.2.0.8(8155)_EN was discovered to contain a stack-based buffer overflow vu… | 2025-06-08T23:07:24.172000Z |
| var-202405-3088 | Tenda AX1806 v1.0.0.1 contains a stack overflow via the iptv.stb.mode parameter in the fu… | 2025-06-08T22:58:59.383000Z |
| var-202405-3825 | Tenda AX1806 v1.0.0.1 contains a stack overflow via the adv.iptv.stballvlans parameter in… | 2025-06-08T22:58:59.335000Z |
| var-202410-0039 | A vulnerability was found in D-Link DIR-605L 2.13B01 BETA. It has been declared as critic… | 2025-06-08T22:58:54.673000Z |
| var-202501-0005 | A vulnerability classified as critical was found in D-Link DIR-816 A2 1.10CNB05_R1B011D88… | 2025-06-08T19:33:41.137000Z |
| var-202307-1275 | The Rockwell Automation PowerMonitor 1000 contains stored cross-site scripting vulnerabil… | 2025-06-07T23:55:15.593000Z |
| var-202412-2453 | A relative path traversal in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 thro… | 2025-06-07T23:55:13.186000Z |
| var-202505-2067 | A vulnerability classified as critical has been found in D-Link DCS-5020L 1.01_B2. This a… | 2025-06-07T23:45:30.659000Z |
| var-202505-3817 | Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulner… | 2025-06-07T23:41:30.276000Z |
| var-202401-0796 | Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stballvlans parameter in… | 2025-06-07T23:36:00.841000Z |
| var-202502-2174 | Vigor165/166 4.2.7 and earlier; Vigor2620/LTE200 3.9.8.9 and earlier; Vigor2860/2925 3.9.… | 2025-06-06T23:33:03.729000Z |
| var-202503-2527 | A vulnerability was found in D-Link DAP-1620 1.03 and classified as critical. This issue … | 2025-06-06T23:32:42.040000Z |
| var-202505-1109 | There is a stack overflow vulnerability in Tenda RX3 V1.0br_V16.03.13.11 In the fromSetWi… | 2025-06-06T23:32:41.699000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2024:2077-1 | Security update for gdk-pixbuf | 2024-06-19T03:32:59Z | 2024-06-19T03:32:59Z |
| suse-su-2024:2076-1 | Security update for gdk-pixbuf | 2024-06-19T03:25:08Z | 2024-06-19T03:25:08Z |
| suse-su-2024:1624-2 | Security update for python-Werkzeug | 2024-06-18T20:04:01Z | 2024-06-18T20:04:01Z |
| suse-su-2024:2074-1 | Security update for ntfs-3g_ntfsprogs | 2024-06-18T15:47:36Z | 2024-06-18T15:47:36Z |
| suse-su-2024:2073-1 | Security update for MozillaThunderbird | 2024-06-18T15:47:16Z | 2024-06-18T15:47:16Z |
| suse-su-2024:2068-1 | Security update for python-requests | 2024-06-18T11:16:52Z | 2024-06-18T11:16:52Z |
| suse-su-2024:2067-1 | Security update for xdg-desktop-portal | 2024-06-18T11:16:25Z | 2024-06-18T11:16:25Z |
| suse-su-2024:2066-1 | Security update for openssl-3 | 2024-06-18T11:16:10Z | 2024-06-18T11:16:10Z |
| suse-su-2024:2065-1 | Security update for webkit2gtk3 | 2024-06-18T11:15:22Z | 2024-06-18T11:15:22Z |
| suse-su-2024:2064-1 | Security update for python-Authlib | 2024-06-18T11:14:32Z | 2024-06-18T11:14:32Z |
| suse-su-2024:2063-1 | Security update for booth | 2024-06-18T11:14:17Z | 2024-06-18T11:14:17Z |
| suse-su-2024:2062-1 | Security update for booth | 2024-06-18T11:14:08Z | 2024-06-18T11:14:08Z |
| suse-su-2024:2061-1 | Security update for MozillaFirefox | 2024-06-18T11:13:13Z | 2024-06-18T11:13:13Z |
| suse-su-2024:2060-1 | Security update for less | 2024-06-18T11:11:48Z | 2024-06-18T11:11:48Z |
| suse-su-2024:2059-1 | Security update for openssl-1_1 | 2024-06-18T11:11:30Z | 2024-06-18T11:11:30Z |
| suse-su-2024:2056-1 | Security update for libaom | 2024-06-18T11:06:41Z | 2024-06-18T11:06:41Z |
| suse-su-2024:1591-2 | Security update for python-Werkzeug | 2024-06-18T11:06:29Z | 2024-06-18T11:06:29Z |
| suse-su-2024:1590-2 | Security update for ghostscript | 2024-06-18T11:06:19Z | 2024-06-18T11:06:19Z |
| suse-su-2024:1539-2 | Security update for bouncycastle | 2024-06-18T11:05:53Z | 2024-06-18T11:05:53Z |
| suse-su-2024:1486-2 | Security update for cosign | 2024-06-18T11:05:34Z | 2024-06-18T11:05:34Z |
| suse-su-2024:1499-2 | Security update for java-17-openjdk | 2024-06-18T11:05:03Z | 2024-06-18T11:05:03Z |
| suse-su-2024:1079-2 | Security update for netty, netty-tcnative | 2024-06-18T11:04:38Z | 2024-06-18T11:04:38Z |
| suse-su-2024:2052-1 | Security update for libaom | 2024-06-18T08:34:57Z | 2024-06-18T08:34:57Z |
| suse-su-2024:1498-2 | Security update for java-11-openjdk | 2024-06-18T08:34:19Z | 2024-06-18T08:34:19Z |
| suse-su-2024:2051-2 | Security update for openssl-1_1 | 2024-06-18T07:16:09Z | 2024-06-18T07:16:09Z |
| suse-su-2024:2051-1 | Security update for openssl-1_1 | 2024-06-18T07:16:02Z | 2024-06-18T07:16:02Z |
| suse-su-2024:2043-1 | Security update for webkit2gtk3 | 2024-06-17T07:33:46Z | 2024-06-17T07:33:46Z |
| suse-su-2024:2042-1 | Security update for booth | 2024-06-17T07:33:04Z | 2024-06-17T07:33:04Z |
| suse-su-2024:2041-1 | Security update for booth | 2024-06-17T07:32:56Z | 2024-06-17T07:32:56Z |
| suse-su-2024:2040-1 | Security update for booth | 2024-06-17T07:32:39Z | 2024-06-17T07:32:39Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:11318-1 | ruby2.7-rubygem-actionpack-6.0-6.0.4-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11317-1 | ruby2.7-rubygem-actionpack-5.2-5.2.6-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11316-1 | ruby2.7-rubygem-actionmailer-6.0-6.0.4-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11315-1 | ruby2.7-rubygem-actionmailer-5.2-5.2.6-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11314-1 | ruby2.7-rubygem-actionmailbox-6.0-6.0.4-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11313-1 | ruby2.7-rubygem-actioncable-6.0-6.0.4-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11312-1 | ruby2.7-rubygem-actioncable-5.2-5.2.6-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11311-1 | libruby3_0-3_0-3.0.1-3.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11310-1 | libruby2_7-2_7-2.7.3-3.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11309-1 | rsyslog-8.2106.0-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11308-1 | rsync-3.2.3-2.6 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11307-1 | rpmlint-2.1+git20210924.ad0cf53-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11306-1 | rpmdevtools-8.10-7.5 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11305-1 | librpmbuild9-4.16.1.3-3.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11304-1 | rpcbind-1.2.6-2.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11303-1 | roundcubemail-1.4.11-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11302-1 | librnp0-0.15.2-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11301-1 | rkhunter-1.4.6-5.6 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11300-1 | ripgrep-13.0.0-2.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11299-1 | redis-6.2.5-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11298-1 | rdesktop-1.9.0-4.6 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11297-1 | rclone-1.55.1-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11296-1 | libraptor-devel-2.0.15-3.8 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11295-1 | radare2-5.3.1-2.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11294-1 | erlang-rabbitmq-client-3.9.7-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11293-1 | librabbitmq-devel-0.11.0-2.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11292-1 | qutebrowser-2.3.1-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11291-1 | quassel-base-0.13.1-4.10 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11290-1 | libfpm_pb0-1.2.4-2.14 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11289-1 | libqpdf28-10.3.2-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-20448 | Marvell QConvergeConsole路径遍历漏洞(CNVD-2025-20448) | 2025-07-11 | 2025-09-05 |
| cnvd-2025-20447 | Marvell QConvergeConsole路径遍历漏洞(CNVD-2025-20447) | 2025-07-11 | 2025-09-05 |
| cnvd-2025-20446 | Marvell QConvergeConsole路径遍历漏洞(CNVD-2025-20446) | 2025-07-11 | 2025-09-05 |
| cnvd-2025-20445 | Marvell QConvergeConsole路径遍历漏洞(CNVD-2025-20445) | 2025-07-11 | 2025-09-05 |
| cnvd-2025-20444 | Marvell QConvergeConsole路径遍历漏洞(CNVD-2025-20444) | 2025-07-11 | 2025-09-05 |
| cnvd-2025-20443 | Marvell QConvergeConsole路径遍历漏洞(CNVD-2025-20443) | 2025-07-11 | 2025-09-05 |
| cnvd-2025-20442 | Marvell QConvergeConsole路径遍历漏洞(CNVD-2025-20442) | 2025-07-11 | 2025-09-05 |
| cnvd-2025-20441 | Marvell QConvergeConsole路径遍历漏洞(CNVD-2025-20441) | 2025-07-11 | 2025-09-05 |
| cnvd-2025-20440 | Belkin F9K1122堆栈缓冲区溢出漏洞 | 2025-07-11 | 2025-09-05 |
| cnvd-2025-20439 | WordPress插件FooGallery跨站脚本漏洞 | 2025-07-18 | 2025-09-05 |
| cnvd-2025-20438 | WordPress插件Infility Global跨站脚本漏洞 | 2025-07-23 | 2025-09-05 |
| cnvd-2025-20437 | Emby Server跨站请求伪造漏洞 | 2020-10-20 | 2025-09-05 |
| cnvd-2025-20436 | Emby Server任意文件读取漏洞 | 2021-09-12 | 2025-09-05 |
| cnvd-2025-20435 | Emby Server跨站脚本漏洞(CNVD-2025-20435) | 2022-12-20 | 2025-09-05 |
| cnvd-2025-20434 | Emby Server跨站脚本漏洞(CNVD-2025-20434) | 2023-07-12 | 2025-09-05 |
| cnvd-2025-20433 | Emby Server存在未明漏洞 | 2023-07-12 | 2025-09-05 |
| cnvd-2025-20432 | Emby Server跨站脚本漏洞 | 2023-08-10 | 2025-09-05 |
| cnvd-2025-20431 | Emby Media Server跨站脚本漏洞 | 2024-06-26 | 2025-09-05 |
| cnvd-2025-20427 | Kenwood DMX958XR命令注入漏洞(CNVD-2025-20427) | 2025-08-18 | 2025-09-05 |
| cnvd-2025-20426 | Kenwood DMX958XR命令注入漏洞(CNVD-2025-20426) | 2025-08-18 | 2025-09-05 |
| cnvd-2025-20425 | Kenwood DMX958XR命令注入漏洞(CNVD-2025-20425) | 2025-08-18 | 2025-09-05 |
| cnvd-2025-20424 | Kenwood DMX958XR命令注入漏洞(CNVD-2025-20424) | 2025-08-18 | 2025-09-05 |
| cnvd-2025-20423 | Kenwood DMX958XR命令注入漏洞(CNVD-2025-20423) | 2025-08-18 | 2025-09-05 |
| cnvd-2025-20422 | Kenwood DMX958XR命令注入漏洞(CNVD-2025-20422) | 2025-08-18 | 2025-09-05 |
| cnvd-2025-20421 | Kenwood DMX958XR命令注入漏洞(CNVD-2025-20421) | 2025-08-18 | 2025-09-05 |
| cnvd-2025-20420 | Kenwood DMX958XR命令注入漏洞(CNVD-2025-20420) | 2025-08-18 | 2025-09-05 |
| cnvd-2025-20419 | Kenwood DMX958XR命令注入漏洞(CNVD-2025-20419) | 2025-08-18 | 2025-09-05 |
| cnvd-2025-20301 | Kenwood DMX958XR命令注入漏洞(CNVD-2025-20301) | 2025-08-18 | 2025-09-05 |
| cnvd-2025-20298 | Kenwood DMX958XR命令注入漏洞(CNVD-2025-20298) | 2025-08-18 | 2025-09-05 |
| cnvd-2025-20288 | Kenwood DMX958XR命令注入漏洞 | 2025-08-18 | 2025-09-05 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2021-avi-618 | Multiples vulnérabilités dans Microsoft Windows | 2021-08-11T00:00:00.000000 | 2021-08-11T00:00:00.000000 |
| certfr-2021-avi-617 | Multiples vulnérabilités dans Microsoft Office | 2021-08-11T00:00:00.000000 | 2021-08-11T00:00:00.000000 |
| certfr-2021-avi-616 | Multiples vulnérabilités dans les produits Intel | 2021-08-11T00:00:00.000000 | 2021-08-11T00:00:00.000000 |
| certfr-2021-avi-615 | Multiples vulnérabilités dans F-Secure SAFE Browser | 2021-08-11T00:00:00.000000 | 2021-08-11T00:00:00.000000 |
| certfr-2021-avi-614 | Multiples vulnérabilités dans les produits Mozilla | 2021-08-11T00:00:00.000000 | 2021-08-11T00:00:00.000000 |
| certfr-2021-avi-613 | Vulnérabilité dans SonicWall Analytics | 2021-08-11T00:00:00.000000 | 2021-08-11T00:00:00.000000 |
| certfr-2021-avi-612 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2021-08-11T00:00:00.000000 | 2021-08-11T00:00:00.000000 |
| certfr-2021-avi-611 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2021-08-11T00:00:00.000000 | 2021-08-11T00:00:00.000000 |
| certfr-2021-avi-610 | Vulnérabilité dans Citrix ShareFile storage zones controller | 2021-08-11T00:00:00.000000 | 2021-08-11T00:00:00.000000 |
| certfr-2021-avi-609 | Multiples vulnérabilités dans Magento | 2021-08-11T00:00:00.000000 | 2021-08-11T00:00:00.000000 |
| certfr-2021-avi-608 | Multiples vulnérabilités dans les produits Siemens | 2021-08-10T00:00:00.000000 | 2021-08-10T00:00:00.000000 |
| certfr-2021-avi-607 | Multiples vulnérabilités dans les produits SAP | 2021-08-10T00:00:00.000000 | 2021-08-10T00:00:00.000000 |
| certfr-2021-avi-606 | Vulnérabilité dans Moxa EDS-405A | 2021-08-09T00:00:00.000000 | 2021-08-09T00:00:00.000000 |
| certfr-2021-avi-605 | Vulnérabilité dans F5 BIG-IP | 2021-08-06T00:00:00.000000 | 2021-08-06T00:00:00.000000 |
| certfr-2021-avi-604 | Multiples vulnérabilités dans les produits VMware | 2021-08-06T00:00:00.000000 | 2021-08-06T00:00:00.000000 |
| certfr-2021-avi-603 | Multiples vulnérabilités dans Pulse Connect Secure | 2021-08-06T00:00:00.000000 | 2021-08-06T00:00:00.000000 |
| certfr-2021-avi-602 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2021-08-06T00:00:00.000000 | 2021-08-06T00:00:00.000000 |
| certfr-2021-avi-601 | Multiples vulnérabilités dans Microsoft Edge | 2021-08-06T00:00:00.000000 | 2021-08-06T00:00:00.000000 |
| certfr-2021-avi-600 | Multiples vulnérabilités dans les produits Cisco | 2021-08-05T00:00:00.000000 | 2021-08-05T00:00:00.000000 |
| certfr-2021-avi-599 | Multiples vulnérabilités dans les produits Siemens | 2021-08-04T00:00:00.000000 | 2021-08-04T00:00:00.000000 |
| certfr-2021-avi-598 | Multiples vulnérabilités dans les produits Fortinet | 2021-08-04T00:00:00.000000 | 2021-08-04T00:00:00.000000 |
| certfr-2021-avi-597 | Vulnérabilité dans Aruba ALE | 2021-08-04T00:00:00.000000 | 2021-08-04T00:00:00.000000 |
| certfr-2021-avi-596 | Multiples vulnérabilités dans Google Chrome | 2021-08-04T00:00:00.000000 | 2021-08-04T00:00:00.000000 |
| certfr-2021-avi-595 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2021-08-04T00:00:00.000000 | 2021-08-04T00:00:00.000000 |
| certfr-2021-avi-594 | Multiples vulnérabilités dans GitLab | 2021-08-04T00:00:00.000000 | 2021-08-04T00:00:00.000000 |
| certfr-2021-avi-593 | Multiples vulnérabilités dans Elasticsearch | 2021-08-04T00:00:00.000000 | 2021-08-04T00:00:00.000000 |
| certfr-2021-avi-592 | Vulnérabilité dans IBM AIX | 2021-08-04T00:00:00.000000 | 2021-08-04T00:00:00.000000 |
| certfr-2021-avi-591 | Multiples vulnérabilités dans ARC Informatique PcVue | 2021-08-03T00:00:00.000000 | 2021-08-03T00:00:00.000000 |
| certfr-2021-avi-590 | Multiples vulnérabilités dans Google Android | 2021-08-03T00:00:00.000000 | 2021-08-03T00:00:00.000000 |
| certfr-2021-avi-589 | Multiples vulnérabilités dans Juniper Junos Space Log Collector | 2021-08-03T00:00:00.000000 | 2021-08-03T00:00:00.000000 |