Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-14527 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
projectworlds Advanced Library Management System view_… |
projectworlds |
Advanced Library Management System |
2025-12-11T17:02:09.729Z | 2026-02-24T05:46:32.987Z |
| CVE-2025-14526 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda CH22 L7Im frmL7ImForm buffer overflow |
Tenda |
CH22 |
2025-12-11T16:32:09.328Z | 2026-02-24T05:46:21.260Z |
| CVE-2025-14518 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
PowerJob Network Request PingPongUtils.java checkConne… |
n/a |
PowerJob |
2025-12-11T15:02:08.153Z | 2026-02-24T05:46:06.690Z |
| CVE-2025-14515 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Campcodes Supplier Management System add_unit.php sql … |
Campcodes |
Supplier Management System |
2025-12-11T12:02:06.226Z | 2026-02-24T05:45:53.526Z |
| CVE-2025-14514 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Campcodes Supplier Management System add_distributor.p… |
Campcodes |
Supplier Management System |
2025-12-11T11:32:06.828Z | 2026-02-24T05:45:39.602Z |
| CVE-2025-14286 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Tenda AC9 Configuration File DownloadCfg.jpg informati… |
Tenda |
AC9 |
2025-12-09T01:32:07.198Z | 2026-02-24T05:45:24.166Z |
| CVE-2025-14285 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Employee Profile Management System edit_… |
code-projects |
Employee Profile Management System |
2025-12-09T01:02:05.842Z | 2026-02-24T05:45:11.317Z |
| CVE-2025-14276 |
6.3 (4.0)
5.6 (3.1)
5.6 (3.0)
|
Ilevia EVE X1 Server leaf_search.php command injection |
Ilevia |
EVE X1 Server |
2025-12-08T21:32:08.167Z | 2026-02-24T05:44:58.788Z |
| CVE-2025-14244 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
GreenCMS Menu Management CustomController.class.php cr… |
n/a |
GreenCMS |
2025-12-08T12:02:05.891Z | 2026-02-24T05:44:32.843Z |
| CVE-2025-14222 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
code-projects Employee Profile Management System print… |
code-projects |
Employee Profile Management System |
2025-12-08T07:32:05.544Z | 2026-02-24T05:44:19.591Z |
| CVE-2025-14219 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
Campcodes Retro Basketball Shoes Online Store admin_ru… |
Campcodes |
Retro Basketball Shoes Online Store |
2025-12-08T06:02:07.585Z | 2026-02-24T05:44:07.983Z |
| CVE-2025-14212 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
projectworlds Advanced Library Management System membe… |
projectworlds |
Advanced Library Management System |
2025-12-08T03:02:07.359Z | 2026-02-24T05:43:55.095Z |
| CVE-2025-14211 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
projectworlds Advanced Library Management System delet… |
projectworlds |
Advanced Library Management System |
2025-12-08T02:32:06.385Z | 2026-02-24T05:43:41.688Z |
| CVE-2025-14210 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
projectworlds Advanced Library Management System delet… |
projectworlds |
Advanced Library Management System |
2025-12-08T02:02:06.184Z | 2026-02-24T05:43:29.283Z |
| CVE-2025-14209 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Campcodes School File Management System update_query.p… |
Campcodes |
School File Management System |
2025-12-08T01:32:07.017Z | 2026-02-24T05:43:17.750Z |
| CVE-2025-14201 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
alokjaiswal Hotel-Management-services-using-MYSQL-and-… |
alokjaiswal |
Hotel-Management-services-using-MYSQL-and-php |
2025-12-07T18:02:05.645Z | 2026-02-24T05:43:05.476Z |
| CVE-2025-14200 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
alokjaiswal Hotel-Management-services-using-MYSQL-and-… |
alokjaiswal |
Hotel-Management-services-using-MYSQL-and-php |
2025-12-07T17:32:07.043Z | 2026-02-24T05:42:51.184Z |
| CVE-2025-14195 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
code-projects Employee Profile Management System add_f… |
code-projects |
Employee Profile Management System |
2025-12-07T15:02:05.771Z | 2026-02-24T05:42:38.842Z |
| CVE-2025-14194 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
code-projects Employee Profile Management System view_… |
code-projects |
Employee Profile Management System |
2025-12-07T14:32:06.854Z | 2026-02-24T05:42:25.040Z |
| CVE-2025-14193 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
code-projects Employee Profile Management System view_… |
code-projects |
Employee Profile Management System |
2025-12-07T14:02:05.879Z | 2026-02-24T05:42:12.330Z |
| CVE-2025-14182 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Sobey Media Convergence System upload path traversal |
Sobey |
Media Convergence System |
2025-12-07T02:02:06.467Z | 2026-02-24T05:41:59.239Z |
| CVE-2025-14117 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
fit2cloud Halo cross-site request forgery |
fit2cloud |
Halo |
2025-12-06T05:32:06.404Z | 2026-02-24T05:41:46.084Z |
| CVE-2025-14094 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
Edimax BR-6478AC V3 formSysCmd sub_44CCE4 os command i… |
Edimax |
BR-6478AC V3 |
2025-12-05T17:02:05.688Z | 2026-02-24T05:41:29.859Z |
| CVE-2025-14093 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
Edimax BR-6478AC V3 formTracerouteDiagnosticRun sub_41… |
Edimax |
BR-6478AC V3 |
2025-12-05T16:32:05.836Z | 2026-02-24T05:41:17.143Z |
| CVE-2025-14092 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
Edimax BR-6478AC V3 formDebugDiagnosticRun sub_416898 … |
Edimax |
BR-6478AC V3 |
2025-12-05T16:02:08.289Z | 2026-02-24T05:41:05.548Z |
| CVE-2025-14088 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
ketr JEPaaS load improper authorization |
ketr |
JEPaaS |
2025-12-05T14:32:07.388Z | 2026-02-24T05:40:51.727Z |
| CVE-2025-14013 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
JIZHICMS Comment addcomment.html cross site scripting |
n/a |
JIZHICMS |
2025-12-04T18:02:05.659Z | 2026-02-24T05:40:39.287Z |
| CVE-2025-14012 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
JIZHICMS Batch Delete Comments deleteAll.html delete s… |
n/a |
JIZHICMS |
2025-12-04T17:32:08.510Z | 2026-02-24T05:40:25.562Z |
| CVE-2025-14011 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
JIZHICMS Add Display Name Field addcomment.html commen… |
n/a |
JIZHICMS |
2025-12-04T17:32:06.179Z | 2026-02-24T05:40:11.562Z |
| CVE-2025-14008 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
dayrui XunRuiCMS Project Domain Change Test admin79f2e… |
dayrui |
XunRuiCMS |
2025-12-04T15:02:06.355Z | 2026-02-24T05:39:58.279Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-67645 |
8.8 (3.1)
|
OpenEMR Vulnerable to Broken Access Control in Profile… |
openemr |
openemr |
2026-01-27T23:20:18.515Z | 2026-01-28T21:05:33.217Z |
| CVE-2026-23830 |
10 (3.1)
|
SandboxJS has Sandbox Escape via Unprotected AsyncFunc… |
nyariv |
SandboxJS |
2026-01-27T23:32:16.104Z | 2026-01-28T15:09:44.543Z |
| CVE-2026-1466 |
6.1 (3.1)
|
Improper Neutralization of Input During Web Page Gener… |
Jirafeau project |
Jirafeau |
2026-01-28T06:33:15.181Z | 2026-01-28T20:48:25.368Z |
| CVE-2026-24772 |
8.9 (3.1)
|
OpenProject has SSRF and CSWSH in Hocuspocus Synchroni… |
opf |
openproject |
2026-01-28T18:07:02.278Z | 2026-01-28T18:31:44.037Z |
| CVE-2026-24775 |
6.3 (3.1)
|
OpenProject has Forced Actions, Content Spoofing, and … |
opf |
openproject |
2026-01-28T18:10:46.358Z | 2026-01-28T18:30:29.357Z |
| CVE-2026-20669 |
5.5 (3.1)
|
A parsing issue in the handling of directory path… |
Apple |
macOS |
2026-02-11T22:58:51.771Z | 2026-02-12T19:14:44.879Z |
| CVE-2025-54155 |
3.6 (4.0)
|
File Station 5 |
QNAP Systems Inc. |
File Station 5 |
2026-02-11T12:18:09.363Z | 2026-02-11T15:43:28.854Z |
| CVE-2025-54161 |
3.6 (4.0)
|
File Station 5 |
QNAP Systems Inc. |
File Station 5 |
2026-02-11T12:18:01.964Z | 2026-02-11T15:26:47.706Z |
| CVE-2025-54162 |
4.8 (4.0)
|
File Station 5 |
QNAP Systems Inc. |
File Station 5 |
2026-02-11T12:17:56.681Z | 2026-02-11T15:02:31.019Z |
| CVE-2025-54163 |
1.2 (4.0)
|
File Station 5 |
QNAP Systems Inc. |
File Station 5 |
2026-02-11T12:17:51.265Z | 2026-02-11T15:04:51.723Z |
| CVE-2025-54169 |
4.9 (4.0)
|
File Station 5 |
QNAP Systems Inc. |
File Station 5 |
2026-02-11T12:17:45.813Z | 2026-02-11T15:09:52.672Z |
| CVE-2025-57707 |
1.1 (4.0)
|
File Station 5 |
QNAP Systems Inc. |
File Station 5 |
2026-02-11T12:17:33.929Z | 2026-02-11T15:43:39.764Z |
| CVE-2025-57713 |
1.3 (4.0)
|
File Station 5 |
QNAP Systems Inc. |
File Station 5 |
2026-02-11T12:17:04.636Z | 2026-02-11T16:56:22.334Z |
| CVE-2023-37525 |
5.3 (3.1)
|
HCL BigFix Compliance is vulnerable to a sensitive inf… |
HCLSoftware |
BigFix Compliance |
2026-01-28T19:58:49.005Z | 2026-01-29T18:11:32.011Z |
| CVE-2025-13979 |
5.4 (3.1)
|
Mini site - Moderately critical - Cross-Site Scripting… |
Drupal |
Mini site |
2026-01-28T20:00:38.256Z | 2026-01-29T17:10:16.561Z |
| CVE-2025-62853 |
5.2 (4.0)
|
File Station 5 |
QNAP Systems Inc. |
File Station 5 |
2026-02-11T12:16:12.855Z | 2026-02-11T15:50:48.976Z |
| CVE-2025-62854 |
1.3 (4.0)
|
File Station 5 |
QNAP Systems Inc. |
File Station 5 |
2026-02-11T12:16:07.030Z | 2026-02-11T15:51:20.062Z |
| CVE-2025-62855 |
1.3 (4.0)
|
File Station 5 |
QNAP Systems Inc. |
File Station 5 |
2026-02-11T12:16:00.950Z | 2026-02-11T21:05:57.561Z |
| CVE-2025-62856 |
1.3 (4.0)
|
File Station 5 |
QNAP Systems Inc. |
File Station 5 |
2026-02-11T12:15:55.297Z | 2026-02-11T16:50:14.744Z |
| CVE-2025-66278 |
1.3 (4.0)
|
File Station 5 |
QNAP Systems Inc. |
File Station 5 |
2026-02-11T12:15:37.428Z | 2026-02-11T16:43:29.616Z |
| CVE-2025-13980 |
5.3 (3.1)
|
CKEditor 5 Premium Features - Moderately critical - Ac… |
Drupal |
CKEditor 5 Premium Features |
2026-01-28T20:01:16.894Z | 2026-01-29T17:11:46.810Z |
| CVE-2025-1823 |
3.5 (3.1)
|
IBM Jazz Reporting Service Denial of Service |
IBM |
Jazz Reporting Service |
2026-02-04T21:07:17.979Z | 2026-02-05T14:32:02.968Z |
| CVE-2026-22894 |
1.3 (4.0)
|
File Station 5 |
QNAP Systems Inc. |
File Station 5 |
2026-02-11T12:15:21.357Z | 2026-02-11T16:36:57.274Z |
| CVE-2024-56807 |
1.7 (4.0)
|
Media Streaming add-on |
QNAP Systems Inc. |
Media Streaming add-on |
2026-02-11T12:20:14.724Z | 2026-02-11T14:23:50.298Z |
| CVE-2024-56808 |
2 (4.0)
|
Media Streaming add-on |
QNAP Systems Inc. |
Media Streaming add-on |
2026-02-11T12:20:08.765Z | 2026-02-11T14:27:11.982Z |
| CVE-2025-20360 |
5.8 (3.1)
|
Multiple Cisco Products Snort 3 MIME Denial of Service… |
Cisco |
Cisco Cyber Vision |
2025-10-15T16:19:46.840Z | 2026-02-12T18:57:32.487Z |
| CVE-2025-13379 |
8.6 (3.1)
|
A SQL Injection vulnerability has been addressed in IB… |
IBM |
Aspera Console |
2026-02-05T13:30:04.998Z | 2026-02-26T15:04:18.212Z |
| CVE-2026-21348 |
5.5 (3.1)
|
Substance3D - Modeler | Out-of-bounds Read (CWE-125) |
Adobe |
Substance3D - Modeler |
2026-02-10T19:33:36.529Z | 2026-02-10T20:07:58.148Z |
| CVE-2026-24300 |
9.8 (3.1)
|
Azure Front Door Elevation of Privilege Vulnerability |
Microsoft |
Azure Front Door |
2026-02-05T22:13:25.676Z | 2026-02-27T20:55:01.881Z |
| CVE-2025-13096 |
7.1 (3.1)
|
XML eXternal Entity injection (XXE) vulnerability affe… |
IBM |
Business Automation Workflow containers |
2026-02-02T20:56:48.318Z | 2026-02-03T15:39:59.140Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-57713 | A weak authentication vulnerability has been reported to affect File Station 5. The remote attacker… | 2026-02-11T13:15:56.303 | 2026-02-12T19:52:29.873 |
| fkie_cve-2023-37525 | A sensitive information disclosure in HCL BigFix Compliance allows a remote attacker to access file… | 2026-01-28T20:16:06.033 | 2026-02-12T19:51:52.143 |
| fkie_cve-2025-13979 | Privilege Defined With Unsafe Actions vulnerability in Drupal Mini site allows Stored XSS.This issu… | 2026-01-28T20:16:07.130 | 2026-02-12T19:50:47.080 |
| fkie_cve-2025-62853 | A path traversal vulnerability has been reported to affect File Station 5. If a remote attacker gai… | 2026-02-11T13:15:57.673 | 2026-02-12T19:50:32.323 |
| fkie_cve-2025-62854 | An uncontrolled resource consumption vulnerability has been reported to affect File Station 5. If a… | 2026-02-11T13:15:57.817 | 2026-02-12T19:48:21.780 |
| fkie_cve-2025-62855 | A path traversal vulnerability has been reported to affect File Station 5. If a local attacker gain… | 2026-02-11T13:15:57.950 | 2026-02-12T19:46:22.803 |
| fkie_cve-2025-62856 | A path traversal vulnerability has been reported to affect File Station 5. If a local attacker gain… | 2026-02-11T13:15:58.107 | 2026-02-12T19:45:34.143 |
| fkie_cve-2025-66278 | A path traversal vulnerability has been reported to affect File Station 5. If a remote attacker gai… | 2026-02-11T13:15:58.510 | 2026-02-12T19:43:46.360 |
| fkie_cve-2025-13980 | Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal CKEditor 5 Premium… | 2026-01-28T20:16:07.260 | 2026-02-12T19:43:39.363 |
| fkie_cve-2025-1823 | IBM Jazz Reporting Service could allow an authenticated user on the host network to cause a denial … | 2026-02-04T21:15:57.593 | 2026-02-12T19:41:38.020 |
| fkie_cve-2026-22894 | A path traversal vulnerability has been reported to affect File Station 6. If a remote attacker gai… | 2026-02-11T13:15:58.937 | 2026-02-12T19:40:11.477 |
| fkie_cve-2024-56807 | An out-of-bounds read vulnerability has been reported to affect Media Streaming add-on. If an attac… | 2026-02-11T13:15:51.463 | 2026-02-12T19:29:32.550 |
| fkie_cve-2024-56808 | A command injection vulnerability has been reported to affect Media Streaming add-on. If an attacke… | 2026-02-11T13:15:51.667 | 2026-02-12T19:24:00.003 |
| fkie_cve-2025-20360 | Multiple Cisco products are affected by a vulnerability in the Snort 3 HTTP Decoder that could allo… | 2025-10-15T17:15:49.433 | 2026-02-12T19:15:50.247 |
| fkie_cve-2025-13379 | IBM Aspera Console 3.4.0 through 3.4.8 is vulnerable to SQL injection. A remote attacker could send… | 2026-02-05T14:16:03.000 | 2026-02-12T19:08:57.793 |
| fkie_cve-2026-21348 | Substance3D - Modeler versions 1.22.5 and earlier are affected by an out-of-bounds read vulnerabili… | 2026-02-10T20:16:55.420 | 2026-02-12T19:07:46.840 |
| fkie_cve-2026-24300 | Azure Front Door Elevation of Privilege Vulnerability | 2026-02-05T23:15:54.490 | 2026-02-12T19:02:39.727 |
| fkie_cve-2025-13096 | IBM Business Automation Workflow containers V25.0.0 through V25.0.0-IF007, V24.0.1 - V24.0.1-IF007,… | 2026-02-02T23:15:58.600 | 2026-02-12T19:01:45.070 |
| fkie_cve-2026-21532 | Azure Function Information Disclosure Vulnerability | 2026-02-05T23:15:54.317 | 2026-02-12T19:01:06.173 |
| fkie_cve-2026-24302 | Azure Arc Elevation of Privilege Vulnerability | 2026-02-05T23:15:54.653 | 2026-02-12T18:39:54.910 |
| fkie_cve-2026-20960 | Improper authorization in Microsoft Power Apps allows an authorized attacker to execute code over a… | 2026-01-16T22:16:25.553 | 2026-02-12T18:37:37.203 |
| fkie_cve-2020-37113 | GUnet OpenEclass 1.7.3 allows authenticated users to bypass file extension restrictions when upload… | 2026-02-03T18:16:11.527 | 2026-02-12T18:33:09.553 |
| fkie_cve-2020-37112 | GUnet OpenEclass 1.7.3 contains multiple SQL injection vulnerabilities that allow authenticated att… | 2026-02-03T18:16:11.360 | 2026-02-12T18:28:10.327 |
| fkie_cve-2026-20666 | An authorization issue was addressed with improved state management. This issue is fixed in macOS T… | 2026-02-11T23:16:09.020 | 2026-02-12T18:27:31.410 |
| fkie_cve-2025-70997 | A vulnerability has been discovered in eladmin v2.7 and before. This vulnerability allows for an ar… | 2026-02-04T15:16:13.697 | 2026-02-12T18:16:08.983 |
| fkie_cve-2024-36355 | Improper input validation in the SMM handler could allow an attacker with Ring0 access to write to … | 2026-02-10T20:16:42.817 | 2026-02-12T18:16:06.423 |
| fkie_cve-2026-24881 | In GnuPG before 2.5.17, a crafted CMS (S/MIME) EnvelopedData message carrying an oversized wrapped … | 2026-01-27T19:16:16.517 | 2026-02-12T18:15:38.923 |
| fkie_cve-2025-55705 | This vulnerability occurs when the system permits multiple simultaneous connections to the backend… | 2026-01-22T23:15:50.137 | 2026-02-12T18:02:38.060 |
| fkie_cve-2025-67399 | An issue in AIRTH SMART HOME AQI MONITOR Bootloader v.1.005 allows a physically proximate attacker … | 2026-01-14T16:15:56.610 | 2026-02-12T17:54:40.487 |
| fkie_cve-2025-15464 | Exported Activity allows external applications to gain application context and directly launch Gmai… | 2026-01-08T21:15:42.980 | 2026-02-12T17:51:33.487 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-rq72-h4fj-xhch |
4.3 (3.1)
|
Missing Authorization vulnerability in Iulia Cazan Latest Post Shortcode latest-post-shortcode allo… | 2026-02-03T15:30:26Z | 2026-02-03T18:30:43Z |
| ghsa-qmh9-pqqv-cwmx |
5.3 (3.1)
|
Missing Authorization vulnerability in ILLID Share This Image share-this-image allows Exploiting In… | 2026-02-03T15:30:27Z | 2026-02-03T18:30:43Z |
| ghsa-pqqg-82v7-fxr2 |
5.3 (3.1)
|
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in WPMU DE… | 2026-02-03T15:30:26Z | 2026-02-03T18:30:43Z |
| ghsa-mh83-6pmq-wf9v |
4.3 (3.1)
|
Missing Authorization vulnerability in wpelemento WPElemento Importer wpelemento-importer allows Ex… | 2026-02-03T15:30:26Z | 2026-02-03T18:30:43Z |
| ghsa-g35p-qgfm-w6v2 |
5.3 (3.1)
|
Missing Authorization vulnerability in gfazioli WP Bannerize Pro wp-bannerize-pro allows Exploiting… | 2026-02-03T15:30:27Z | 2026-02-03T18:30:43Z |
| ghsa-ffxr-cwx4-68hm |
4.3 (3.1)
|
Cross-Site Request Forgery (CSRF) vulnerability in themelooks Enter Addons enteraddons allows Cross… | 2026-02-03T15:30:27Z | 2026-02-03T18:30:43Z |
| ghsa-f4vc-cxj3-j8vh |
5.3 (3.1)
|
Missing Authorization vulnerability in sunshinephotocart Sunshine Photo Cart sunshine-photo-cart al… | 2026-02-03T15:30:26Z | 2026-02-03T18:30:43Z |
| ghsa-9286-3frp-2c9j |
5.3 (3.1)
|
Missing Authorization vulnerability in Vito Peleg Atarim atarim-visual-collaboration allows Exploit… | 2026-02-03T15:30:27Z | 2026-02-03T18:30:43Z |
| ghsa-8rmw-4rx2-vh9r |
5.3 (3.1)
|
Missing Authorization vulnerability in Wired Impact Wired Impact Volunteer Management wired-impact-… | 2026-02-03T15:30:26Z | 2026-02-03T18:30:43Z |
| ghsa-7q5x-vfhw-vv5w |
5.3 (3.1)
|
Insertion of Sensitive Information Into Sent Data vulnerability in WPFactory Advanced WooCommerce P… | 2026-02-03T15:30:26Z | 2026-02-03T18:30:43Z |
| ghsa-54jx-h2q6-qwrf |
4.3 (3.1)
|
Cross-Site Request Forgery (CSRF) vulnerability in Stiofan UsersWP userswp allows Cross Site Reques… | 2026-02-03T15:30:27Z | 2026-02-03T18:30:43Z |
| ghsa-4vq2-qq4m-vp5x |
5.3 (3.1)
|
Authorization Bypass Through User-Controlled Key vulnerability in HT Plugins Extensions For CF7 ext… | 2026-02-03T15:30:26Z | 2026-02-03T18:30:43Z |
| ghsa-4pmc-x99v-23p3 |
5.3 (3.1)
|
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in mdedev … | 2026-02-03T15:30:27Z | 2026-02-03T18:30:43Z |
| ghsa-36fv-g9xp-84xv |
5.4 (3.1)
|
Missing Authorization vulnerability in Mizan Themes Mizan Demo Importer mizan-demo-importer allows … | 2026-02-03T15:30:27Z | 2026-02-03T18:30:43Z |
| ghsa-x6m4-w83h-hpr6 |
6.5 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-02-03T15:30:25Z | 2026-02-03T18:30:42Z |
| ghsa-rpmg-26wm-r5vr |
4.3 (3.1)
|
Cross-Site Request Forgery (CSRF) vulnerability in Copyscape Copyscape Premium copyscape-premium al… | 2026-02-03T15:30:25Z | 2026-02-03T18:30:42Z |
| ghsa-qrv4-qphh-gr42 |
4.3 (3.1)
|
Missing Authorization vulnerability in LA-Studio LA-Studio Element Kit for Elementor lastudio-eleme… | 2026-02-03T15:30:24Z | 2026-02-03T18:30:42Z |
| ghsa-j9hv-8hcm-6q67 |
5.4 (3.1)
|
Cross-Site Request Forgery (CSRF) vulnerability in wp.insider Simple Membership WP user Import simp… | 2026-02-03T15:30:26Z | 2026-02-03T18:30:42Z |
| ghsa-hr7m-wrqw-583q |
5.4 (3.1)
|
Server-Side Request Forgery (SSRF) vulnerability in ThemeGoods Grand Blog grandblog allows Server S… | 2026-02-03T15:30:25Z | 2026-02-03T18:30:42Z |
| ghsa-f5jh-v84w-pg57 |
4.3 (3.1)
|
Missing Authorization vulnerability in approveme WP Forms Signature Contract Add-On wp-forms-signat… | 2026-02-03T15:30:26Z | 2026-02-03T18:30:42Z |
| ghsa-9j3x-hwgj-4m3m |
4.3 (3.1)
|
Missing Authorization vulnerability in WP Chill Modula Image Gallery modula-best-grid-gallery allow… | 2026-02-03T15:30:24Z | 2026-02-03T18:30:42Z |
| ghsa-8g8c-j78f-p955 |
5.3 (3.1)
|
Missing Authorization vulnerability in ameliabooking Amelia ameliabooking allows Exploiting Incorre… | 2026-02-03T15:30:25Z | 2026-02-03T18:30:42Z |
| ghsa-83vq-9r9w-f849 |
6.5 (3.1)
|
Missing Authorization vulnerability in WP Chill Strong Testimonials strong-testimonials allows Expl… | 2026-02-03T15:30:25Z | 2026-02-03T18:30:42Z |
| ghsa-5xrj-cq63-86fg |
4.3 (3.1)
|
Missing Authorization vulnerability in Wasiliy Strecker / ContestGallery developer Contest Gallery … | 2026-02-03T15:30:25Z | 2026-02-03T18:30:42Z |
| ghsa-4cqf-xfcw-xgjv |
5.3 (3.1)
|
Missing Authorization vulnerability in Brainstorm Force Spectra ultimate-addons-for-gutenberg allow… | 2026-02-03T15:30:25Z | 2026-02-03T18:30:42Z |
| ghsa-2pmr-vgfj-fmm5 |
4.3 (3.1)
|
Cross-Site Request Forgery (CSRF) vulnerability in magepeopleteam WpEvently mage-eventpress allows … | 2026-02-03T15:30:24Z | 2026-02-03T18:30:42Z |
| ghsa-xvc7-7qxh-qw3m |
7.5 (3.1)
|
A stack overflow in the mk_http_index_lookup function (mk_server/mk_http.c) of monkey commit f37e98… | 2026-01-29T21:30:31Z | 2026-02-03T18:30:31Z |
| ghsa-pgh9-cmjh-p9cw |
7.5 (3.1)
|
An out-of-bounds read in the mk_ptr_to_buf in mk_core function (mk_memory.c) of monkey commit f37e9… | 2026-01-29T21:30:31Z | 2026-02-03T18:30:31Z |
| ghsa-p9xf-3w58-v7mw |
7.5 (3.1)
|
A use-after-free in the mk_string_char_search function (mk_core/mk_string.c) of monkey commit f37e9… | 2026-01-29T21:30:31Z | 2026-02-03T18:30:31Z |
| ghsa-9w8p-mp2m-7qp7 |
7.5 (3.1)
|
A NULL pointer dereference in the mk_http_range_parse function (mk_server/mk_http.c) of monkey comm… | 2026-01-29T21:30:31Z | 2026-02-03T18:30:31Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-28884 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:28.214847Z |
| gsd-2024-28881 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:28.205676Z |
| gsd-2024-28892 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:28.137573Z |
| gsd-2024-25572 | Cross-site request forgery (CSRF) vulnerability exists in Ninja Forms prior to 3.4.31. If… | 2024-04-03T05:02:26.520528Z |
| gsd-2024-25575 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:26.350211Z |
| gsd-2024-25564 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:26.342256Z |
| gsd-2024-2770 | A vulnerability was found in Campcodes Complete Online Beauty Parlor Management System 1.… | 2024-04-03T05:02:26.187712Z |
| gsd-2024-2974 | The Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerc… | 2024-04-03T05:02:26.185434Z |
| gsd-2024-2946 | The ShopLentor – WooCommerce Builder for Elementor & Gutenberg +12 Modules – All in One S… | 2024-04-03T05:02:26.184270Z |
| gsd-2024-2895 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:26.183700Z |
| gsd-2024-2872 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:26.179528Z |
| gsd-2024-2878 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:26.179311Z |
| gsd-2024-2935 | A vulnerability, which was classified as problematic, has been found in SourceCodester To… | 2024-04-03T05:02:26.175939Z |
| gsd-2024-2969 | The WP-Eggdrop plugin for WordPress is vulnerable to Cross-Site Request Forgery in all ve… | 2024-04-03T05:02:26.175332Z |
| gsd-2024-2776 | A vulnerability, which was classified as critical, was found in Campcodes Online Marriage… | 2024-04-03T05:02:26.174218Z |
| gsd-2024-2810 | A vulnerability has been found in Tenda AC15 15.03.05.18/15.03.20_multi and classified as… | 2024-04-03T05:02:26.172061Z |
| gsd-2024-2859 | By default, SANnav OVA is shipped with root user login enabled. While protected by a pas… | 2024-04-03T05:02:26.171571Z |
| gsd-2024-2980 | A vulnerability, which was classified as critical, has been found in Tenda FH1202 1.2.0.1… | 2024-04-03T05:02:26.165160Z |
| gsd-2024-2808 | A vulnerability, which was classified as critical, has been found in Tenda AC15 15.03.05.… | 2024-04-03T05:02:26.161236Z |
| gsd-2024-2814 | A vulnerability was found in Tenda AC15 15.03.20_multi. It has been rated as critical. Th… | 2024-04-03T05:02:26.159598Z |
| gsd-2024-2752 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:26.158385Z |
| gsd-2024-2939 | A vulnerability classified as problematic has been found in Campcodes Online Examination … | 2024-04-03T05:02:26.150515Z |
| gsd-2024-2841 | The Otter Blocks – Gutenberg Blocks, Page Builder for Gutenberg Editor & FSE plugin for W… | 2024-04-03T05:02:26.148206Z |
| gsd-2024-2827 | A vulnerability, which was classified as critical, has been found in lakernote EasyAdmin … | 2024-04-03T05:02:26.145978Z |
| gsd-2024-2941 | A vulnerability, which was classified as critical, has been found in Campcodes Online Exa… | 2024-04-03T05:02:26.145224Z |
| gsd-2024-2905 | A security vulnerability has been discovered within rpm-ostree, pertaining to the /etc/sh… | 2024-04-03T05:02:26.143005Z |
| gsd-2024-2755 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:26.141996Z |
| gsd-2024-2958 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:26.136748Z |
| gsd-2024-2993 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:26.136192Z |
| gsd-2024-2945 | A vulnerability was found in Campcodes Online Examination System 1.0. It has been classif… | 2024-04-03T05:02:26.134815Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-190749 | Malicious code in @posthog/nuxt (npm) | 2025-11-24T13:37:15Z | 2025-11-25T00:36:47Z |
| mal-2025-190748 | Malicious code in @posthog/agent (npm) | 2025-11-24T13:51:55Z | 2025-11-25T00:36:47Z |
| mal-2025-190747 | Malicious code in @kvytech/web (npm) | 2025-11-24T13:34:31Z | 2025-11-25T00:36:47Z |
| mal-2025-190746 | Malicious code in @kvytech/medusa-plugin-product-reviews (npm) | 2025-11-24T13:34:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190745 | Malicious code in @kvytech/medusa-plugin-management (npm) | 2025-11-24T13:35:19Z | 2025-11-25T00:36:47Z |
| mal-2025-190744 | Malicious code in @kvytech/medusa-plugin-announcement (npm) | 2025-11-24T13:37:49Z | 2025-11-25T00:36:47Z |
| mal-2025-190743 | Malicious code in @kvytech/components (npm) | 2025-11-24T13:37:16Z | 2025-11-25T00:36:47Z |
| mal-2025-190742 | Malicious code in @kvytech/cli (npm) | 2025-11-24T13:36:42Z | 2025-11-25T00:36:47Z |
| mal-2025-190741 | Malicious code in @ensdomains/vite-plugin-i18next-loader (npm) | 2025-11-24T14:19:45Z | 2025-11-25T00:36:47Z |
| mal-2025-190740 | Malicious code in @ensdomains/unicode-confusables (npm) | 2025-11-24T13:31:47Z | 2025-11-25T00:36:47Z |
| mal-2025-190739 | Malicious code in @ensdomains/thorin (npm) | 2025-11-24T14:06:32Z | 2025-11-25T00:36:47Z |
| mal-2025-190738 | Malicious code in @ensdomains/test-utils (npm) | 2025-11-24T14:10:48Z | 2025-11-25T00:36:47Z |
| mal-2025-190737 | Malicious code in @ensdomains/solsha1 (npm) | 2025-11-24T13:35:19Z | 2025-11-25T00:36:47Z |
| mal-2025-190736 | Malicious code in @ensdomains/reverse-records (npm) | 2025-11-24T13:32:36Z | 2025-11-25T00:36:47Z |
| mal-2025-190735 | Malicious code in @ensdomains/renewal-widget (npm) | 2025-11-24T14:10:48Z | 2025-11-25T00:36:47Z |
| mal-2025-190734 | Malicious code in @ensdomains/hardhat-toolbox-viem-extended (npm) | 2025-11-24T14:18:40Z | 2025-11-25T00:36:47Z |
| mal-2025-190733 | Malicious code in @ensdomains/hardhat-chai-matchers-viem (npm) | 2025-11-24T14:11:16Z | 2025-11-25T00:36:47Z |
| mal-2025-190732 | Malicious code in @ensdomains/hackathon-registrar (npm) | 2025-11-24T14:10:43Z | 2025-11-25T00:36:47Z |
| mal-2025-190731 | Malicious code in @ensdomains/ens-validation (npm) | 2025-11-24T13:47:43Z | 2025-11-25T00:36:47Z |
| mal-2025-190730 | Malicious code in @ensdomains/ens-avatar (npm) | 2025-11-24T13:58:56Z | 2025-11-25T00:36:47Z |
| mal-2025-190729 | Malicious code in @ensdomains/durin-middleware (npm) | 2025-11-24T13:31:30Z | 2025-11-25T00:36:47Z |
| mal-2025-190728 | Malicious code in @ensdomains/dnssecoraclejs (npm) | 2025-11-24T14:02:20Z | 2025-11-25T00:36:47Z |
| mal-2025-190727 | Malicious code in @ensdomains/dnsprovejs (npm) | 2025-11-24T13:32:52Z | 2025-11-25T00:36:47Z |
| mal-2025-190726 | Malicious code in @ensdomains/curvearithmetics (npm) | 2025-11-24T13:33:09Z | 2025-11-25T00:36:47Z |
| mal-2025-190725 | Malicious code in @ensdomains/ccip-read-worker-viem (npm) | 2025-11-24T13:30:57Z | 2025-11-25T00:36:47Z |
| mal-2025-190724 | Malicious code in @ensdomains/ccip-read-router (npm) | 2025-11-24T14:09:21Z | 2025-11-25T00:36:47Z |
| mal-2025-190723 | Malicious code in @ensdomains/ccip-read-dns-gateway (npm) | 2025-11-24T13:32:20Z | 2025-11-25T00:36:47Z |
| mal-2025-190722 | Malicious code in @ensdomains/blacklist (npm) | 2025-11-24T14:11:16Z | 2025-11-25T00:36:47Z |
| mal-2025-190721 | Malicious code in @asyncapi/web-component (npm) | 2025-11-24T13:36:43Z | 2025-11-25T00:36:47Z |
| mal-2025-190720 | Malicious code in @asyncapi/python-paho-template (npm) | 2025-11-24T14:17:35Z | 2025-11-25T00:36:47Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-0748 | libvirt: Schwachstelle ermöglicht Denial of Service | 2020-05-05T22:00:00.000+00:00 | 2024-11-17T23:00:00.000+00:00 |
| wid-sec-w-2023-3007 | Perl: Mehrere Schwachstellen ermöglichen Codeausführung | 2023-11-26T23:00:00.000+00:00 | 2024-11-17T23:00:00.000+00:00 |
| wid-sec-w-2023-2182 | Apache Tomcat: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-08-27T22:00:00.000+00:00 | 2024-11-17T23:00:00.000+00:00 |
| wid-sec-w-2024-3471 | MongoDB: Schwachstelle ermöglicht Denial of Service | 2024-11-14T23:00:00.000+00:00 | 2024-11-14T23:00:00.000+00:00 |
| wid-sec-w-2024-3469 | Microsoft Edge: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-11-14T23:00:00.000+00:00 | 2024-11-14T23:00:00.000+00:00 |
| wid-sec-w-2024-3455 | Intel VROC: Mehrere Schwachstellen | 2024-11-12T23:00:00.000+00:00 | 2024-11-14T23:00:00.000+00:00 |
| wid-sec-w-2024-3423 | Intel PROSet Wireless WiFi Software: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-11-12T23:00:00.000+00:00 | 2024-11-14T23:00:00.000+00:00 |
| wid-sec-w-2024-3146 | PaloAlto Networks Expedition: Mehrere Schwachstellen | 2024-10-10T22:00:00.000+00:00 | 2024-11-14T23:00:00.000+00:00 |
| wid-sec-w-2023-1377 | Golang Go: Mehrere Schwachstellen | 2023-06-06T22:00:00.000+00:00 | 2024-11-14T23:00:00.000+00:00 |
| wid-sec-w-2024-3467 | Sonatype Nexus Repository Manager: Mehrere Schwachstellen | 2024-11-13T23:00:00.000+00:00 | 2024-11-13T23:00:00.000+00:00 |
| wid-sec-w-2024-3465 | PaloAlto Networks PAN-OS: Mehrere Schwachstellen | 2024-11-13T23:00:00.000+00:00 | 2024-11-13T23:00:00.000+00:00 |
| wid-sec-w-2024-3462 | Linux Kernel: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-11-13T23:00:00.000+00:00 | 2024-11-13T23:00:00.000+00:00 |
| wid-sec-w-2024-3460 | Progress Software Telerik Report Server: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-11-13T23:00:00.000+00:00 | 2024-11-13T23:00:00.000+00:00 |
| wid-sec-w-2024-3458 | Drupal: Mehrere Schwachstellen | 2024-11-13T23:00:00.000+00:00 | 2024-11-13T23:00:00.000+00:00 |
| wid-sec-w-2024-2171 | LibreOffice: Schwachstelle ermöglicht Manipulation von Dateien | 2024-09-17T22:00:00.000+00:00 | 2024-11-13T23:00:00.000+00:00 |
| wid-sec-w-2023-3067 | Red Hat OpenShift: Mehrere Schwachstellen | 2023-12-05T23:00:00.000+00:00 | 2024-11-13T23:00:00.000+00:00 |
| wid-sec-w-2024-3454 | Microsoft Azure: Mehrere Schwachstellen | 2024-11-12T23:00:00.000+00:00 | 2024-11-12T23:00:00.000+00:00 |
| wid-sec-w-2024-3451 | Microsoft SQL Server: Mehrere Schwachstellen ermöglichen Codeausführung | 2024-11-12T23:00:00.000+00:00 | 2024-11-12T23:00:00.000+00:00 |
| wid-sec-w-2024-3450 | Fortinet FortiClient für macOS und Windows: Mehrere Schwachstellen | 2024-11-12T23:00:00.000+00:00 | 2024-11-12T23:00:00.000+00:00 |
| wid-sec-w-2024-3449 | Microsoft LightGBM und TorchGeo: Mehrere Schwachstellen ermöglichen Codeausführung | 2024-11-12T23:00:00.000+00:00 | 2024-11-12T23:00:00.000+00:00 |
| wid-sec-w-2024-3447 | Fortinet FortiAnalyzer: Mehrere Schwachstellen | 2024-11-12T23:00:00.000+00:00 | 2024-11-12T23:00:00.000+00:00 |
| wid-sec-w-2024-3446 | Microsoft Office: Mehrere Schwachstellen ermöglichen Codeausführung | 2024-11-12T23:00:00.000+00:00 | 2024-11-12T23:00:00.000+00:00 |
| wid-sec-w-2024-3442 | AMD EPYC Embedded Prozessoren: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-11-12T23:00:00.000+00:00 | 2024-11-12T23:00:00.000+00:00 |
| wid-sec-w-2024-3441 | Fortinet FortiWeb: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-11-12T23:00:00.000+00:00 | 2024-11-12T23:00:00.000+00:00 |
| wid-sec-w-2024-3440 | Fortinet FortiPortal: Mehrere Schwachstellen | 2024-11-12T23:00:00.000+00:00 | 2024-11-12T23:00:00.000+00:00 |
| wid-sec-w-2024-3439 | Adobe Photoshop: Schwachstelle ermöglicht Codeausführung | 2024-11-12T23:00:00.000+00:00 | 2024-11-12T23:00:00.000+00:00 |
| wid-sec-w-2024-3438 | Fortinet FortiOS undFortiProxy: Mehrere Schwachstellen | 2024-11-12T23:00:00.000+00:00 | 2024-11-12T23:00:00.000+00:00 |
| wid-sec-w-2024-3435 | Ivanti Endpoint Manager: Mehrere Schwachstellen ermöglichen Codeausführung | 2024-11-12T23:00:00.000+00:00 | 2024-11-12T23:00:00.000+00:00 |
| wid-sec-w-2024-3434 | Ivanti Avalanche: Mehrere Schwachstellen ermöglichen Denial of Service und Offenlegung von Informationen | 2024-11-12T23:00:00.000+00:00 | 2024-11-12T23:00:00.000+00:00 |
| wid-sec-w-2024-3433 | Ivanti Connect Secure: Mehrere Schwachstellen | 2024-11-12T23:00:00.000+00:00 | 2024-11-12T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2014:0150 | Red Hat Security Advisory: gc security update | 2014-02-10T17:29:19+00:00 | 2026-01-28T22:35:02+00:00 |
| rhsa-2014:0149 | Red Hat Security Advisory: gc security update | 2014-02-10T17:29:25+00:00 | 2026-01-28T22:35:02+00:00 |
| rhsa-2014:0029 | Red Hat Security Advisory: Red Hat JBoss Data Grid 6.2.0 update | 2014-01-15T17:45:50+00:00 | 2026-01-28T22:35:02+00:00 |
| rhsa-2013:1853 | Red Hat Security Advisory: Red Hat JBoss Operations Network 3.2.0 update | 2013-12-17T18:30:00+00:00 | 2026-01-28T22:35:02+00:00 |
| rhsa-2013:1451 | Red Hat Security Advisory: java-1.7.0-openjdk security update | 2013-10-22T17:13:00+00:00 | 2026-01-28T22:35:02+00:00 |
| rhsa-2013:1771 | Red Hat Security Advisory: Red Hat JBoss Web Framework Kit 2.4.0 update | 2013-11-27T17:08:00+00:00 | 2026-01-28T22:35:01+00:00 |
| rhsa-2013:1505 | Red Hat Security Advisory: java-1.6.0-openjdk security update | 2013-11-05T17:58:00+00:00 | 2026-01-28T22:35:01+00:00 |
| rhsa-2013:1500 | Red Hat Security Advisory: gc security update | 2013-11-04T18:10:00+00:00 | 2026-01-28T22:35:00+00:00 |
| rhsa-2013:1428 | Red Hat Security Advisory: jakarta-commons-fileupload security update | 2013-10-15T18:18:00+00:00 | 2026-01-28T22:35:00+00:00 |
| rhsa-2013:1448 | Red Hat Security Advisory: Red Hat JBoss Operations Network 3.1.2 update | 2013-10-21T17:22:00+00:00 | 2026-01-28T22:34:59+00:00 |
| rhsa-2013:1447 | Red Hat Security Advisory: java-1.7.0-openjdk security update | 2013-10-21T17:37:00+00:00 | 2026-01-28T22:34:59+00:00 |
| rhsa-2013:1442 | Red Hat Security Advisory: commons-fileupload security update | 2013-10-17T17:17:00+00:00 | 2026-01-28T22:34:59+00:00 |
| rhsa-2013:1440 | Red Hat Security Advisory: java-1.7.0-oracle security update | 2013-10-17T17:31:00+00:00 | 2026-01-28T22:34:59+00:00 |
| rhsa-2013:1437 | Red Hat Security Advisory: Red Hat JBoss Portal 6.1.0 update | 2013-10-16T16:45:00+00:00 | 2026-01-28T22:34:59+00:00 |
| rhsa-2013:1430 | Red Hat Security Advisory: commons-fileupload security update | 2013-10-15T18:31:00+00:00 | 2026-01-28T22:34:59+00:00 |
| rhsa-2013:1429 | Red Hat Security Advisory: jakarta-commons-fileupload security update | 2013-10-15T18:30:00+00:00 | 2026-01-28T22:34:58+00:00 |
| rhsa-2013:1375 | Red Hat Security Advisory: Red Hat JBoss BRMS 5.3.1 update | 2013-09-30T17:48:00+00:00 | 2026-01-28T22:34:57+00:00 |
| rhsa-2013:1284 | Red Hat Security Advisory: ruby193-puppet security update | 2013-09-24T18:02:00+00:00 | 2026-01-28T22:34:57+00:00 |
| rhsa-2013:1283 | Red Hat Security Advisory: puppet security update | 2013-09-24T18:01:00+00:00 | 2026-01-28T22:34:57+00:00 |
| rhsa-2013:1221 | Red Hat Security Advisory: Fuse Message Broker 5.5.1 security update | 2013-09-09T16:54:00+00:00 | 2026-01-28T22:34:57+00:00 |
| rhsa-2013:1220 | Red Hat Security Advisory: xml-security security update | 2013-09-09T16:51:00+00:00 | 2026-01-28T22:34:57+00:00 |
| rhsa-2013:1219 | Red Hat Security Advisory: xml-security security update | 2013-09-09T16:51:00+00:00 | 2026-01-28T22:34:57+00:00 |
| rhsa-2013:1218 | Red Hat Security Advisory: xml-security security update | 2013-09-09T16:50:00+00:00 | 2026-01-28T22:34:56+00:00 |
| rhsa-2013:1217 | Red Hat Security Advisory: xml-security security update | 2013-09-09T16:50:00+00:00 | 2026-01-28T22:34:56+00:00 |
| rhsa-2013:1209 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.1.1 update | 2013-09-04T18:46:00+00:00 | 2026-01-28T22:34:56+00:00 |
| rhsa-2013:1208 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.1.1 update | 2013-09-04T18:45:00+00:00 | 2026-01-28T22:34:55+00:00 |
| rhsa-2013:1207 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.1.1 update | 2013-09-04T18:43:00+00:00 | 2026-01-28T22:34:55+00:00 |
| rhsa-2013:1170 | Red Hat Security Advisory: mongodb and pymongo security and enhancement update | 2013-08-21T17:27:00+00:00 | 2026-01-28T22:34:55+00:00 |
| rhsa-2013:1137 | Red Hat Security Advisory: ruby193-ruby security update | 2013-08-05T16:00:00+00:00 | 2026-01-28T22:34:55+00:00 |
| rhsa-2013:1103 | Red Hat Security Advisory: ruby193-ruby security update | 2013-07-23T17:44:00+00:00 | 2026-01-28T22:34:54+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2022-21626 | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplie | 2022-10-02T00:00:00.000Z | 2025-10-01T23:11:15.000Z |
| msrc_cve-2022-21624 | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web | 2022-10-02T00:00:00.000Z | 2025-10-01T23:11:15.000Z |
| msrc_cve-2022-21619 | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a | 2022-10-02T00:00:00.000Z | 2025-10-01T23:11:15.000Z |
| msrc_cve-2022-21541 | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Com | 2022-07-02T00:00:00.000Z | 2025-10-01T23:11:15.000Z |
| msrc_cve-2022-21540 | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which | 2022-07-02T00:00:00.000Z | 2025-10-01T23:11:14.000Z |
| msrc_cve-2022-20001 | Injection in fish | 2022-03-02T00:00:00.000Z | 2025-10-01T23:11:14.000Z |
| msrc_cve-2022-1966 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage. | 2022-06-02T00:00:00.000Z | 2025-10-01T23:11:14.000Z |
| msrc_cve-2022-1615 | In Samba, GnuTLS gnutls_rnd() can fail and give predictable random values. | 2022-09-02T00:00:00.000Z | 2025-10-01T23:11:13.000Z |
| msrc_cve-2022-1249 | A NULL pointer dereference flaw was found in pesign's cms_set_pw_data() function of the cms_common.c file. The function fails to handle the NULL pwdata invocation from daemon.c, which leads to an explicit NULL dereference and crash on all attempts to daemonize pesign. | 2022-04-02T00:00:00.000Z | 2025-10-01T23:11:13.000Z |
| msrc_cve-2022-0480 | A flaw was found in the filelock_init in fs/locks.c function in the Linux kernel. This issue can lead to host memory exhaustion due to memcg not limiting the number of Portable Operating System Interface (POSIX) file locks. | 2022-08-02T00:00:00.000Z | 2025-10-01T23:11:13.000Z |
| msrc_cve-2022-0216 | A use-after-free vulnerability was found in the LSI53C895A SCSI Host Bus Adapter emulation of QEMU. The flaw occurs while processing repeated messages to cancel the current SCSI request via the lsi_do_msgout function. This flaw allows a malicious privileged user within the guest to crash the QEMU process on the host, resulting in a denial of service. | 2022-08-02T00:00:00.000Z | 2025-10-01T23:11:13.000Z |
| msrc_cve-2021-44038 | An issue was discovered in Quagga through 1.2.4. Unsafe chown/chmod operations in the suggested spec file allow users (with control of the non-root-owned directory /etc/quagga) to escalate their privileges to root upon package installation or update. | 2021-11-02T00:00:00.000Z | 2025-10-01T23:11:12.000Z |
| msrc_cve-2021-41186 | ReDoS vulnerability in parser_apache2 | 2021-10-02T00:00:00.000Z | 2025-10-01T23:11:12.000Z |
| msrc_cve-2021-3996 | A logic error was found in the libmount library of util-linux in the function that allows an unprivileged user to unmount a FUSE filesystem. This flaw allows a local user on a vulnerable system to unmount other users' filesystems that are either world-writable themselves (like /tmp) or mounted in a world-writable directory. An attacker may use this flaw to cause a denial of service to applications that use the affected filesystems. | 2022-08-02T00:00:00.000Z | 2025-10-01T23:11:12.000Z |
| msrc_cve-2021-3995 | A logic error was found in the libmount library of util-linux in the function that allows an unprivileged user to unmount a FUSE filesystem. This flaw allows an unprivileged local attacker to unmount FUSE filesystems that belong to certain other users who have a UID that is a prefix of the UID of the attacker in its string form. An attacker may use this flaw to cause a denial of service to applications that use the affected filesystems. | 2022-08-02T00:00:00.000Z | 2025-10-01T23:11:12.000Z |
| msrc_cve-2021-3773 | A flaw in netfilter could allow a network-connected attacker to infer openvpn connection endpoint information for further use in traditional network attacks. | 2022-02-02T00:00:00.000Z | 2025-10-01T23:11:11.000Z |
| msrc_cve-2021-37714 | Crafted input may cause the jsoup HTML and XML parser to get stuck, timeout, or throw unchecked exceptions | 2021-08-02T00:00:00.000Z | 2025-10-01T23:11:11.000Z |
| msrc_cve-2021-3716 | A flaw was found in nbdkit due to to improperly caching plaintext state across the STARTTLS encryption boundary. A MitM attacker could use this flaw to inject a plaintext NBD_OPT_STRUCTURED_REPLY before proxying everything else a client sends to the server, potentially leading the client to terminate the NBD session. The highest threat from this vulnerability is to system availability. | 2022-03-02T00:00:00.000Z | 2025-10-01T23:11:11.000Z |
| msrc_cve-2021-3670 | MaxQueryDuration not honoured in Samba AD DC LDAP | 2022-08-02T00:00:00.000Z | 2025-10-01T23:11:11.000Z |
| msrc_cve-2021-3634 | A flaw has been found in libssh in versions prior to 0.9.6. The SSH protocol keeps track of two shared secrets during the lifetime of the session. One of them is called secret_hash and the other session_id. Initially, both of them are the same, but after key re-exchange, previous session_id is kept and used as an input to new secret_hash. Historically, both of these buffers had shared length variable, which worked as long as these buffers were same. But the key re-exchange operation can also change the key exchange method, which can be based on hash of different size, eventually creating "secret_hash" of different size than the session_id has. This becomes an issue when the session_id memory is zeroed or when it is used again during second key re-exchange. | 2021-08-02T00:00:00.000Z | 2025-10-01T23:11:10.000Z |
| msrc_cve-2021-3571 | A flaw was found in the ptp4l program of the linuxptp package. When ptp4l is operating on a little-endian architecture as a PTP transparent clock, a remote attacker could send a crafted one-step sync message to cause an information leak or crash. The highest threat from this vulnerability is to data confidentiality and system availability. This flaw affects linuxptp versions before 3.1.1 and before 2.0.1. | 2021-07-02T00:00:00.000Z | 2025-10-01T23:11:10.000Z |
| msrc_cve-2021-3544 | Several memory leaks were found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. They exist in contrib/vhost-user-gpu/vhost-user-gpu.c and contrib/vhost-user-gpu/virgl.c due to improper release of memory (i.e., free) after effective lifetime. | 2021-06-02T00:00:00.000Z | 2025-10-01T23:11:10.000Z |
| msrc_cve-2021-3507 | A heap buffer overflow was found in the floppy disk emulator of QEMU up to 6.0.0 (including). It could occur in fdctrl_transfer_handler() in hw/block/fdc.c while processing DMA read data transfers from the floppy drive to the guest system. A privileged guest user could use this flaw to crash the QEMU process on the host resulting in DoS scenario, or potential information leakage from the host memory. | 2021-05-02T00:00:00.000Z | 2025-10-01T23:11:10.000Z |
| msrc_cve-2021-28543 | Varnish varnish-modules before 0.17.1 allows remote attackers to cause a denial of service (daemon restart) in some configurations. This does not affect organizations that only install the Varnish Cache product; however, it is common to install both Varnish Cache and varnish-modules. Specifically, an assertion failure or NULL pointer dereference can be triggered in Varnish Cache through the varnish-modules header.append() and header.copy() functions. For some Varnish Configuration Language (VCL) files, this gives remote clients an opportunity to cause a Varnish Cache restart. A restart reduces overall availability and performance due to an increased number of cache misses, and may cause higher load on backend servers. | 2021-03-02T00:00:00.000Z | 2025-10-01T23:11:09.000Z |
| msrc_cve-2021-27367 | Controller/Backend/FileEditController.php and Controller/Backend/FilemanagerController.php in Bolt before 4.1.13 allow Directory Traversal. | 2021-02-02T00:00:00.000Z | 2025-10-01T23:11:09.000Z |
| msrc_cve-2021-25741 | Symlink Exchange Can Allow Host Filesystem Access | 2021-09-02T00:00:00.000Z | 2025-10-01T23:11:09.000Z |
| msrc_cve-2021-21708 | UAF due to php_filter_float() failing | 2022-02-02T00:00:00.000Z | 2025-10-01T23:11:08.000Z |
| msrc_cve-2021-21707 | Special characters break path parsing in XML functions | 2021-11-02T00:00:00.000Z | 2025-10-01T23:11:08.000Z |
| msrc_cve-2021-21705 | Incorrect URL validation in FILTER_VALIDATE_URL | 2021-10-02T00:00:00.000Z | 2025-10-01T23:11:08.000Z |
| msrc_cve-2021-21704 | Multiple vulnerabilities in Firebird client extension | 2021-10-02T00:00:00.000Z | 2025-10-01T23:11:08.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202505-3179 | N300 Wi-Fi Router is a high-performance wireless router. EDIMAX N300 Wi-Fi Router has a … | 2025-06-04T23:05:12.852000Z |
| var-202505-4103 | N300 Wi-Fi Router is a high-performance wireless router. EDIMAX N300 Wi-Fi Router has a … | 2025-06-04T23:05:12.413000Z |
| var-202401-0491 | Tenda AX3 v16.03.12.11 was discovered to contain a remote code execution (RCE) vulnerabil… | 2025-06-04T23:02:25.438000Z |
| var-202505-2803 | H3C Magic R365 is a full-gigabit wireless router for home smart networking needs. H3C Mag… | 2025-06-04T23:02:22.200000Z |
| var-202505-3181 | D-Link DI-7003GV2 is a router from D-Link, a Chinese company. D-Link DI-7003GV2 has a lo… | 2025-06-04T23:02:22.018000Z |
| var-202505-2973 | Comfast CF-616AC V2 is a wireless router. Shenzhen Sihai Zhonglian Network Technology Co… | 2025-06-04T23:01:30.988000Z |
| var-202505-3752 | H3C NX54 is a Gigabit dual-band router that supports Wi-Fi 6 (802.11ax) protocol. H3C NX… | 2025-06-04T23:00:05.678000Z |
| var-202505-3920 | H3C Technologies Co., Ltd. is a global leader in digital solutions. H3C Magic R3010 Giga… | 2025-06-04T23:00:05.593000Z |
| var-202505-2806 | H3C M60 is a new generation of enterprise-class high-performance wireless AP manager laun… | 2025-06-04T22:58:20.846000Z |
| var-202505-3560 | HP Color LaserJet Pro M452dn is a color laser printer designed for commercial use. HP Co… | 2025-06-04T22:58:20.483000Z |
| var-202505-3381 | N300 Wi-Fi Router is a high-performance wireless router. EDIMAX N300 Wi-Fi Router has a … | 2025-06-04T22:57:10.525000Z |
| var-202209-0152 | The location module has a vulnerability of bypassing permission verification.Successful e… | 2025-06-04T22:56:29.052000Z |
| var-202505-3911 | Shenzhen Congwen Security Electronics Co., Ltd. was founded in Shenzhen in 1993. It is co… | 2025-06-04T22:54:48.701000Z |
| var-202505-2802 | AC10 is a high-performance router with Gigabit ports for both WAN and LAN ports. Shenzhe… | 2025-06-04T22:52:31.257000Z |
| var-202505-3180 | TP-Link Technologies Co., Ltd. is a leading ICT equipment and solution provider. TP-Link… | 2025-06-04T22:52:31.063000Z |
| var-202505-4104 | A15 is a dual-band 3G wireless router suitable for fiber-optic homes within 1000M. Shenz… | 2025-06-04T22:48:32.216000Z |
| var-202505-3385 | D-Link DIR-823X is a wireless router from D-Link, a Chinese company. D-Link DIR-823x has… | 2025-06-04T19:33:35.551000Z |
| var-202401-2371 | Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.stb.port parameter in the fu… | 2025-06-03T23:40:25.980000Z |
| var-202312-0136 | D-Link Go-RT-AC750 revA_v101b03 was discovered to contain a command injection vulnerabili… | 2025-06-03T23:39:01.997000Z |
| var-202401-1377 | TOTOlink A3700R v9.1.2u.5822_B20200513 was discovered to contain a remote command executi… | 2025-06-03T23:39:01.798000Z |
| var-202505-2315 | A command injection vulnerability in the component /cgi-bin/qos.cgi of Wavlink WL-WN579A3… | 2025-06-03T23:37:57.228000Z |
| var-202401-0265 | Tenda AX1803 v1.0.0.1 contains a stack overflow via the iptv.stb.port parameter in the fu… | 2025-06-03T23:37:36.895000Z |
| var-202401-1378 | TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vul… | 2025-06-03T23:37:36.767000Z |
| var-202401-1714 | Tenda AX1803 v1.0.0.1 contains a stack overflow via the adv.iptv.stbpvid parameter in the… | 2025-06-03T23:37:36.675000Z |
| var-202408-1859 | In Modem, there is a possible memory corruption due to a missing bounds check. This could… | 2025-06-03T23:37:35.117000Z |
| var-202401-1391 | TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vul… | 2025-06-03T23:36:17.993000Z |
| var-202410-3635 | DrayTek Vigor3910 devices through 4.3.2.6 have a stack-based overflow when processing que… | 2025-06-03T23:35:51.040000Z |
| var-202401-1179 | In Modem IMS SMS UA, there is a possible out of bounds write due to a missing bounds chec… | 2025-06-03T23:31:29.568000Z |
| var-202401-1112 | Tenda A18 v15.13.07.09 was discovered to contain a stack overflow via the devName paramet… | 2025-06-03T23:30:58.629000Z |
| var-202402-1635 | Teltonika RUT240 devices with firmware before 07.04.2, when bridge mode is used, sometime… | 2025-06-03T23:30:33.862000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2024:1946-1 | Security update for python-requests | 2024-06-07T15:05:36Z | 2024-06-07T15:05:36Z |
| suse-su-2024:1945-1 | Security update for gstreamer-plugins-base | 2024-06-07T15:05:11Z | 2024-06-07T15:05:11Z |
| suse-su-2024:1944-1 | Security update for webkit2gtk3 | 2024-06-07T15:04:40Z | 2024-06-07T15:04:40Z |
| suse-su-2024:1943-1 | Security update for util-linux | 2024-06-07T15:04:07Z | 2024-06-07T15:04:07Z |
| suse-su-2024:1941-1 | Security update for sssd | 2024-06-07T14:33:39Z | 2024-06-07T14:33:39Z |
| suse-su-2024:0613-2 | Security update for libxml2 | 2024-06-07T14:02:00Z | 2024-06-07T14:02:00Z |
| suse-su-2024:0613-1 | Security update for libxml2 | 2024-06-07T14:02:00Z | 2024-06-07T14:02:00Z |
| suse-su-2024:1939-1 | Security update for python-idna | 2024-06-07T12:03:22Z | 2024-06-07T12:03:22Z |
| suse-su-2024:1938-1 | Security update for python-docker | 2024-06-07T12:02:53Z | 2024-06-07T12:02:53Z |
| suse-su-2024:1937-1 | Security update for python-docker | 2024-06-07T10:57:14Z | 2024-06-07T10:57:14Z |
| suse-su-2024:1936-1 | Security update for go1.21 | 2024-06-07T08:26:47Z | 2024-06-07T08:26:47Z |
| suse-su-2024:1935-1 | Security update for go1.22 | 2024-06-07T08:25:49Z | 2024-06-07T08:25:49Z |
| suse-su-2024:1925-1 | Security update for python-PyMySQL | 2024-06-05T11:51:49Z | 2024-06-05T11:51:49Z |
| suse-su-2024:1923-1 | Security update for unbound | 2024-06-04T11:50:47Z | 2024-06-04T11:50:47Z |
| suse-su-2024:1922-1 | Security update for mariadb104 | 2024-06-04T11:48:11Z | 2024-06-04T11:48:11Z |
| suse-su-2024:1911-1 | Security update for squid | 2024-06-03T15:30:09Z | 2024-06-03T15:30:09Z |
| suse-su-2024:1910-1 | Security update for gstreamer-plugins-base | 2024-06-03T15:29:38Z | 2024-06-03T15:29:38Z |
| suse-su-2024:1909-1 | Security update for ffmpeg-4 | 2024-06-03T15:29:04Z | 2024-06-03T15:29:04Z |
| suse-su-2024:1908-1 | Security update for ffmpeg | 2024-06-03T15:28:06Z | 2024-06-03T15:28:06Z |
| suse-su-2024:1907-1 | Security update for ffmpeg-4 | 2024-06-03T15:25:45Z | 2024-06-03T15:25:45Z |
| suse-su-2024:1906-1 | Security update for 389-ds | 2024-06-03T15:25:18Z | 2024-06-03T15:25:18Z |
| suse-su-2024:1901-1 | Security update for poppler | 2024-06-03T13:26:36Z | 2024-06-03T13:26:36Z |
| suse-su-2024:1900-1 | Security update for poppler | 2024-06-03T13:26:22Z | 2024-06-03T13:26:22Z |
| suse-su-2024:1899-1 | Security update for poppler | 2024-06-03T13:26:08Z | 2024-06-03T13:26:08Z |
| suse-su-2024:1271-2 | Security update for gnutls | 2024-06-03T13:00:49Z | 2024-06-03T13:00:49Z |
| suse-su-2024:1896-1 | Security update for squid | 2024-06-03T08:08:18Z | 2024-06-03T08:08:18Z |
| suse-su-2024:1895-2 | Security update for glibc | 2024-06-03T07:00:59Z | 2024-06-03T07:00:59Z |
| suse-su-2024:1895-1 | Security update for glibc | 2024-06-03T07:00:31Z | 2024-06-03T07:00:31Z |
| suse-su-2024:1894-1 | Security update for bind | 2024-06-03T06:58:27Z | 2024-06-03T06:58:27Z |
| suse-su-2024:1893-1 | Security update for gstreamer-plugins-base | 2024-06-03T06:57:17Z | 2024-06-03T06:57:17Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:11228-1 | python36-dulwich-0.20.24-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11227-1 | python36-djangorestframework-3.12.4-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11226-1 | python36-django-registration-3.2-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11225-1 | python36-django-debug-toolbar-3.2.1-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11224-1 | python36-django-allauth-0.42.0-1.7 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11223-1 | python36-cryptography-3.3.2-2.4 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11222-1 | python36-colander-1.7.0-5.6 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11221-1 | python36-bugzilla-3.0.2-1.6 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11220-1 | python-bottle-doc-0.12.19-1.8 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11219-1 | python36-bleach-3.3.0-1.4 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11218-1 | python36-bjoern-3.1.0-1.8 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11217-1 | python-azure-agent-2.2.49.2-4.5 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11216-1 | python38-autobahn-21.3.1-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11215-1 | python38-asyncpg-0.22.0-2.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11214-1 | python36-XStatic-jquery-ui-1.12.1.1-2.11 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11213-1 | python36-Werkzeug-2.0.1-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11212-1 | python-Twisted-doc-21.7.0-3.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11211-1 | python-SQLAlchemy-doc-1.4.22-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11210-1 | python36-PyYAML-5.4.1-1.6 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11209-1 | python36-Pillow-8.3.2-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11208-1 | python36-Jinja2-3.0.1-3.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11207-1 | HyperKitty-web-1.3.4-5.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11206-1 | python36-Flask-Cors-3.0.10-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11205-1 | python36-Django-3.2.7-2.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11204-1 | python36-CherryPy-18.6.1-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11203-1 | python36-Beaker-1.11.0-5.5 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11202-1 | python-2.7.18-8.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11201-1 | putty-0.76-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11200-1 | libpulse-devel-15.0-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11199-1 | pspp-1.4.1-2.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-20243 | libbiosig堆栈缓冲区溢出漏洞(CNVD-2025-20243) | 2025-08-28 | 2025-09-04 |
| cnvd-2025-20242 | libbiosig堆栈缓冲区溢出漏洞(CNVD-2025-20242) | 2025-08-28 | 2025-09-04 |
| cnvd-2025-20241 | libbiosig堆缓冲区溢出漏洞 | 2025-08-28 | 2025-09-04 |
| cnvd-2025-20240 | libbiosig堆栈缓冲区溢出漏洞(CNVD-2025-20240) | 2025-08-28 | 2025-09-04 |
| cnvd-2025-20239 | libbiosig堆栈缓冲区溢出漏洞(CNVD-2025-20239) | 2025-08-28 | 2025-09-04 |
| cnvd-2025-20238 | libbiosig堆栈缓冲区溢出漏洞 | 2025-08-28 | 2025-09-04 |
| cnvd-2025-20237 | libbiosig RHS2000解析功能缓冲区溢出漏洞 | 2025-08-28 | 2025-09-04 |
| cnvd-2025-20236 | libbiosig越界读取漏洞 | 2025-08-28 | 2025-09-04 |
| cnvd-2025-20235 | libbiosig MFER解析功能缓冲区溢出漏洞 | 2025-08-28 | 2025-09-04 |
| cnvd-2025-20234 | libbiosig ISHNE解析功能缓冲区溢出漏洞 | 2025-08-28 | 2025-09-04 |
| cnvd-2025-20233 | libbiosig输入验证错误漏洞 | 2025-08-28 | 2025-09-04 |
| cnvd-2025-20232 | libbiosig输入验证错误漏洞(CNVD-2025-20232) | 2025-08-28 | 2025-09-04 |
| cnvd-2025-20231 | WordPress插件Beaver Builder跨站脚本漏洞 | 2025-08-31 | 2025-09-04 |
| cnvd-2025-20230 | WordPress插件B Slider访问控制中断漏洞 | 2025-08-31 | 2025-09-04 |
| cnvd-2025-20229 | WordPress插件AutoWP访问控制中断漏洞 | 2025-08-31 | 2025-09-04 |
| cnvd-2025-20228 | WordPress插件ATT YouTube Widget跨站请求伪造漏洞 | 2025-08-31 | 2025-09-04 |
| cnvd-2025-20227 | WordPress插件All Bootstrap Blocks访问控制中断漏洞 | 2025-08-31 | 2025-09-04 |
| cnvd-2025-20226 | WordPress插件Ajax Search Lite信息泄露漏洞 | 2025-08-31 | 2025-09-04 |
| cnvd-2025-20225 | WordPress插件Advance Food Menu跨站脚本漏洞 | 2025-08-31 | 2025-09-04 |
| cnvd-2025-20224 | WordPress插件Add Code To Head跨站脚本漏洞 | 2025-08-31 | 2025-09-04 |
| cnvd-2025-20223 | GeoVision ASManager Windows Application凭据泄露漏洞 | 2025-03-26 | 2025-09-04 |
| cnvd-2025-20222 | Geovision GV-ASWeb代码注入漏洞 | 2025-03-03 | 2025-09-04 |
| cnvd-2025-20506 | Hospital Management System edit-doctor.php文件SQL注入漏洞 | 2025-08-20 | 2025-09-03 |
| cnvd-2025-20505 | Hospital Management System SQL注入漏洞 | 2025-08-20 | 2025-09-03 |
| cnvd-2025-20161 | 深圳市吉祥腾达科技有限公司AC6 fgets函数缓冲区溢出漏洞 | 2023-08-24 | 2025-09-03 |
| cnvd-2025-20160 | Tenda AC6 Index参数缓冲区溢出漏洞 | 2023-10-11 | 2025-09-03 |
| cnvd-2025-20159 | 深圳市吉祥腾达科技有限公司AC6堆栈缓冲区溢出漏洞 | 2024-02-26 | 2025-09-03 |
| cnvd-2025-20158 | Tenda AC6代码执行漏洞(CNVD-2025-20158) | 2025-08-22 | 2025-09-03 |
| cnvd-2025-20157 | Tenda AC6 /goform/getproductInfo信息泄露漏洞 | 2025-08-25 | 2025-09-03 |
| cnvd-2025-20156 | Tenda AC6固件签名验证功能代码执行漏洞 | 2025-08-25 | 2025-09-03 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2021-avi-525 | Multiples vulnérabilités dans Adobe Acrobat | 2021-07-15T00:00:00.000000 | 2021-07-15T00:00:00.000000 |
| certfr-2021-avi-523 | Multiples vulnérabilités dans les produits SAP | 2021-07-15T00:00:00.000000 | 2021-07-15T00:00:00.000000 |
| certfr-2021-avi-522 | Multiples vulnérabilités dans les produits Microsoft | 2021-07-15T00:00:00.000000 | 2021-07-15T00:00:00.000000 |
| certfr-2021-avi-521 | Vulnérabilité dans Microsoft .Net | 2021-07-15T00:00:00.000000 | 2021-07-15T00:00:00.000000 |
| certfr-2021-avi-520 | Multiples vulnérabilités dans Microsoft Windows | 2021-07-15T00:00:00.000000 | 2021-07-15T00:00:00.000000 |
| certfr-2021-avi-519 | Multiples vulnérabilités dans Microsoft Office | 2021-07-15T00:00:00.000000 | 2021-07-15T00:00:00.000000 |
| certfr-2021-avi-518 | Multiples vulnérabilités dans les produits Siemens | 2021-07-13T00:00:00.000000 | 2021-07-13T00:00:00.000000 |
| certfr-2021-avi-517 | Multiples vulnérabilités dans les produits Schneider | 2021-07-13T00:00:00.000000 | 2021-07-13T00:00:00.000000 |
| certfr-2021-avi-516 | Vulnérabilité dans SolarWinds Serv-U | 2021-07-13T00:00:00.000000 | 2021-07-13T00:00:00.000000 |
| certfr-2021-avi-515 | Multiples vulnérabilités dans Stormshield Endpoint Security | 2021-07-13T00:00:00.000000 | 2021-07-13T00:00:00.000000 |
| certfr-2021-avi-514 | Multiples vulnérabilités dans Kaseya VSA | 2021-07-12T00:00:00.000000 | 2021-07-12T00:00:00.000000 |
| certfr-2021-avi-513 | Vulnérabilité dans les produits TrendMicro | 2021-07-12T00:00:00.000000 | 2021-07-12T00:00:00.000000 |
| certfr-2021-avi-512 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2021-07-09T00:00:00.000000 | 2021-07-09T00:00:00.000000 |
| certfr-2021-avi-511 | Vulnérabilité dans SonicWall Switch | 2021-07-09T00:00:00.000000 | 2021-07-09T00:00:00.000000 |
| certfr-2021-avi-510 | Multiples vulnérabilités dans les produits Fortinet | 2021-07-08T00:00:00.000000 | 2021-07-08T00:00:00.000000 |
| certfr-2021-avi-509 | Multiples vulnérabilités dans F5 BIG-IP | 2021-07-08T00:00:00.000000 | 2021-07-08T00:00:00.000000 |
| certfr-2021-avi-508 | Multiples vulnérabilités dans les produits Cisco | 2021-07-08T00:00:00.000000 | 2021-07-08T00:00:00.000000 |
| certfr-2021-avi-507 | Vulnérabilité dans GitLab | 2021-07-08T00:00:00.000000 | 2021-07-08T00:00:00.000000 |
| certfr-2021-avi-506 | Vulnérabilité dans Microsoft Windows | 2021-07-07T00:00:00.000000 | 2021-07-07T00:00:00.000000 |
| certfr-2021-avi-505 | Multiples vulnérabilités dans IBM Spectrum | 2021-07-07T00:00:00.000000 | 2021-07-07T00:00:00.000000 |
| certfr-2021-avi-504 | Multiples vulnérabilités dans Joomla | 2021-07-07T00:00:00.000000 | 2021-07-07T00:00:00.000000 |
| certfr-2021-avi-503 | Vulnérabilité dans Qnap HBS | 2021-07-06T00:00:00.000000 | 2021-07-06T00:00:00.000000 |
| certfr-2021-avi-502 | Multiples vulnérabilités dans GitLab | 2021-07-02T00:00:00.000000 | 2021-07-02T00:00:00.000000 |
| certfr-2021-avi-501 | Multiples vulnérabilités dans PHP | 2021-07-01T00:00:00.000000 | 2021-07-02T00:00:00.000000 |
| certfr-2021-avi-500 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2021-07-01T00:00:00.000000 | 2021-07-01T00:00:00.000000 |
| certfr-2021-avi-499 | Multiples vulnérabilités dans Google Chrome OS | 2021-07-01T00:00:00.000000 | 2021-07-01T00:00:00.000000 |
| certfr-2021-avi-498 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2021-07-01T00:00:00.000000 | 2021-07-01T00:00:00.000000 |
| certfr-2021-avi-497 | Multiples vulnérabilités dans les produits QNAP | 2021-07-01T00:00:00.000000 | 2021-07-01T00:00:00.000000 |
| certfr-2021-avi-496 | Multiples vulnérabilités dans Aruba ClearPass Policy Manager | 2021-06-30T00:00:00.000000 | 2021-06-30T00:00:00.000000 |
| certfr-2021-avi-495 | Vulnérabilité dans Tenable Nessus Agent | 2021-06-30T00:00:00.000000 | 2021-06-30T00:00:00.000000 |