Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-2872 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda A21 MAC Filtering Configuration Endpoint setBlac… |
Tenda |
A21 |
2026-02-21T16:02:10.216Z | 2026-02-23T19:39:05.567Z |
| CVE-2026-27113 |
6.3 (3.1)
|
Liquid Prompt arbitrary command injection via crafted … |
liquidprompt |
liquidprompt |
2026-02-20T21:34:22.107Z | 2026-02-23T19:39:02.895Z |
| CVE-2026-2871 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda A21 SetIpMacBind fromSetIpMacBind stack-based overflow |
Tenda |
A21 |
2026-02-21T15:32:09.853Z | 2026-02-23T19:38:22.083Z |
| CVE-2026-2870 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda A21 formSetQosBand set_qosMib_list stack-based o… |
Tenda |
A21 |
2026-02-21T14:32:12.603Z | 2026-02-23T19:37:36.449Z |
| CVE-2019-25454 |
5.3 (4.0)
7.2 (3.1)
|
phpMoAdmin 1.1.5 Stored Cross-Site Scripting via colle… |
Phpmoadmin |
phpMoAdmin |
2026-02-20T22:57:02.824Z | 2026-02-23T19:36:42.975Z |
| CVE-2026-2869 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
janet-lang janet handleattr specials.c janetc_varset o… |
janet-lang |
janet |
2026-02-21T14:32:08.938Z | 2026-02-23T19:36:13.428Z |
| CVE-2025-70329 |
8 (3.1)
|
TOTOLink X5000R v9.1.0cu_2415_B20250515 contains … |
n/a |
n/a |
2026-02-23T00:00:00.000Z | 2026-02-23T19:35:36.476Z |
| CVE-2026-27121 |
5.1 (4.0)
|
Svelte affected by cross-site scripting via spread att… |
sveltejs |
svelte |
2026-02-20T22:27:36.103Z | 2026-02-23T19:34:18.150Z |
| CVE-2025-15583 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
detronetdip E-commerce function.php get_safe_value cro… |
detronetdip |
E-commerce |
2026-02-20T16:32:10.015Z | 2026-02-23T19:34:06.226Z |
| CVE-2026-2867 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
itsourcecode Vehicle Management System billaction.php … |
itsourcecode |
Vehicle Management System |
2026-02-21T13:32:07.912Z | 2026-02-23T19:33:52.753Z |
| CVE-2025-63946 |
7.4 (3.1)
|
A privilege escalation (PE) vulnerability in the … |
n/a |
n/a |
2026-02-23T00:00:00.000Z | 2026-02-23T19:33:03.617Z |
| CVE-2026-2884 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
D-Link DWR-M960 WAN Interface Setting formWanConfigSet… |
D-Link |
DWR-M960 |
2026-02-21T20:32:09.601Z | 2026-02-23T19:32:58.848Z |
| CVE-2026-2885 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
D-Link DWR-M960 formIpv6Setup sub_469104 stack-based o… |
D-Link |
DWR-M960 |
2026-02-21T20:32:15.464Z | 2026-02-23T19:32:07.007Z |
| CVE-2025-63945 |
7.4 (3.1)
|
A privilege escalation (PE) vulnerability in the … |
n/a |
n/a |
2026-02-23T00:00:00.000Z | 2026-02-23T19:31:38.047Z |
| CVE-2026-2886 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda A21 SetOnlineDevName set_device_name stack-based… |
Tenda |
A21 |
2026-02-21T21:02:11.930Z | 2026-02-23T19:31:15.738Z |
| CVE-2026-2887 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
aardappel lobster idents.h TypeName recursion |
aardappel |
lobster |
2026-02-21T21:02:16.010Z | 2026-02-23T19:30:34.090Z |
| CVE-2026-26047 |
6.5 (3.1)
|
Moodle: moodle: uncontrolled resource consumption in t… |
|
|
2026-02-21T05:40:11.001Z | 2026-02-23T19:30:25.686Z |
| CVE-2026-2889 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
CCExtractor mp4.c processmp4 use after free |
n/a |
CCExtractor |
2026-02-21T22:02:11.011Z | 2026-02-23T19:29:40.587Z |
| CVE-2026-25896 |
9.3 (3.1)
|
fast-xml-parser has an entity encoding bypass via rege… |
NaturalIntelligence |
fast-xml-parser |
2026-02-20T20:57:48.074Z | 2026-02-23T19:29:10.187Z |
| CVE-2026-2861 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Foswiki Changes/Viewfile/Oops information disclosure |
n/a |
Foswiki |
2026-02-21T06:02:07.609Z | 2026-02-23T19:29:05.938Z |
| CVE-2026-2894 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
funadmin forget.html getMember information disclosure |
n/a |
funadmin |
2026-02-21T23:02:09.334Z | 2026-02-23T19:28:14.585Z |
| CVE-2026-2895 |
6.3 (4.0)
3.7 (3.1)
3.7 (3.0)
|
funadmin Member.php repass password recovery |
n/a |
funadmin |
2026-02-21T23:02:11.258Z | 2026-02-23T19:27:18.883Z |
| CVE-2026-2863 |
5.3 (4.0)
5.4 (3.1)
5.4 (3.0)
|
feng_ha_ha/megagao ssm-erp/production_ssm FileServiceI… |
feng_ha_ha |
ssm-erp |
2026-02-21T06:02:09.608Z | 2026-02-23T19:25:45.383Z |
| CVE-2026-2873 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda A21 openSchedWifi setSchedWifi stack-based overflow |
Tenda |
A21 |
2026-02-21T16:32:07.564Z | 2026-02-23T19:24:56.776Z |
| CVE-2026-2881 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
D-Link DWR-M960 Advanced Firewall Configuration Endpoi… |
D-Link |
DWR-M960 |
2026-02-21T19:32:09.010Z | 2026-02-23T19:24:16.120Z |
| CVE-2026-2896 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
funadmin Configuration Ajax.php setConfig improper aut… |
n/a |
funadmin |
2026-02-21T23:32:08.339Z | 2026-02-23T19:24:12.021Z |
| CVE-2026-2907 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda HG9 GPON Configuration Endpoint formgponConf sta… |
Tenda |
HG9 |
2026-02-22T01:32:12.542Z | 2026-02-23T19:23:03.755Z |
| CVE-2026-27122 |
5.1 (4.0)
|
Svelte SSR does not validate dynamic element tag names… |
sveltejs |
svelte |
2026-02-20T22:28:37.824Z | 2026-02-23T19:23:03.403Z |
| CVE-2026-2897 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
funadmin Backend index.html cross site scripting |
n/a |
funadmin |
2026-02-22T00:02:08.938Z | 2026-02-23T19:22:34.754Z |
| CVE-2026-2908 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda HG9 Loopback Detection Configuration Endpoint fo… |
Tenda |
HG9 |
2026-02-22T02:02:10.921Z | 2026-02-23T19:19:51.049Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-54150 |
4.9 (4.0)
|
Qsync Central |
QNAP Systems Inc. |
Qsync Central |
2026-02-11T12:18:29.651Z | 2026-02-11T16:57:37.867Z |
| CVE-2025-54151 |
4.9 (4.0)
|
Qsync Central |
QNAP Systems Inc. |
Qsync Central |
2026-02-11T12:18:23.495Z | 2026-02-11T15:43:18.985Z |
| CVE-2025-54152 |
1.3 (4.0)
|
Qsync Central |
QNAP Systems Inc. |
Qsync Central |
2026-02-11T12:18:16.611Z | 2026-02-11T15:43:24.212Z |
| CVE-2025-41768 |
5.5 (3.1)
|
Beckhoff: XSS Vulnerability in TwinCAT 3 HMI Server |
Beckhoff Automation |
TwinCAT.HMI.Server |
2026-01-20T08:02:53.356Z | 2026-02-12T09:00:27.685Z |
| CVE-2025-38234 |
N/A
|
sched/rt: Fix race in push_rt_task |
Linux |
Linux |
2025-07-04T13:37:46.960Z | 2026-02-12T08:19:23.791Z |
| CVE-2025-38201 |
N/A
|
netfilter: nft_set_pipapo: clamp maximum map bucket si… |
Linux |
Linux |
2025-07-04T13:37:22.732Z | 2026-02-12T08:19:22.366Z |
| CVE-2025-37822 |
N/A
|
riscv: uprobes: Add missing fence.i after building the… |
Linux |
Linux |
2025-05-08T06:26:16.209Z | 2026-02-12T08:19:20.991Z |
| CVE-2024-42079 |
N/A
|
gfs2: Fix NULL pointer dereference in gfs2_log_flush |
Linux |
Linux |
2024-07-29T15:52:41.360Z | 2026-02-12T08:19:19.560Z |
| CVE-2025-12059 |
9.8 (3.1)
|
Improper Access Control in Logo Software's Logo j-Platform |
Logo Software Industry and Trade Inc. |
Logo j-Platform |
2026-02-11T13:58:53.142Z | 2026-02-12T07:53:32.214Z |
| CVE-2024-57049 |
9.8 (3.1)
|
A vulnerability in the TP-Link Archer c20 router … |
n/a |
n/a |
2025-02-18T00:00:00.000Z | 2026-02-12T05:03:22.325Z |
| CVE-2026-26092 |
N/A
|
Not used | N/A | N/A | 2026-02-12T03:55:05.795Z | |
| CVE-2026-26091 |
N/A
|
Not used | N/A | N/A | 2026-02-12T03:55:06.293Z | |
| CVE-2026-26090 |
N/A
|
Not used | N/A | N/A | 2026-02-12T03:55:06.741Z | |
| CVE-2026-26089 |
N/A
|
Not used | N/A | N/A | 2026-02-12T03:55:07.229Z | |
| CVE-2026-26088 |
N/A
|
Not used | N/A | N/A | 2026-02-12T03:55:07.771Z | |
| CVE-2026-26087 |
N/A
|
Not used | N/A | N/A | 2026-02-12T03:55:08.263Z | |
| CVE-2026-26086 |
N/A
|
Not used | N/A | N/A | 2026-02-12T03:55:08.748Z | |
| CVE-2026-26085 |
N/A
|
Not used | N/A | N/A | 2026-02-12T03:55:09.260Z | |
| CVE-2026-23906 |
N/A
|
Apache Druid: Authentication Bypass via LDAP Anonymous Bind |
Apache Software Foundation |
Apache Druid |
2026-02-10T09:28:09.007Z | 2026-02-12T04:45:28.979Z |
| CVE-2026-25870 |
6.9 (4.0)
5.8 (3.1)
|
DoraCMS <= 3.1 UEditor Remote Image Fetch SSRF |
doramart |
DoraCMS |
2026-02-10T22:16:28.212Z | 2026-02-11T21:43:08.107Z |
| CVE-2026-21537 |
8.8 (3.1)
|
Microsoft Defender for Endpoint Linux Extension Remote… |
Microsoft |
Microsoft Defender for Endpoint for Linux |
2026-02-10T17:51:32.870Z | 2026-02-27T20:09:41.511Z |
| CVE-2026-21527 |
6.5 (3.1)
|
Microsoft Exchange Server Spoofing Vulnerability |
Microsoft |
Microsoft Exchange Server 2016 Cumulative Update 23 |
2026-02-10T17:51:30.280Z | 2026-02-27T20:09:38.628Z |
| CVE-2026-21523 |
8 (3.1)
|
GitHub Copilot and Visual Studio Code Remote Code Exec… |
Microsoft |
Visual Studio Code |
2026-02-10T17:51:25.077Z | 2026-02-27T20:09:31.663Z |
| CVE-2026-21516 |
8.8 (3.1)
|
GitHub Copilot for Jetbrains Remote Code Execution Vul… |
Microsoft |
GitHub Copilot Plugin for JetBrains IDEs |
2026-02-10T17:51:35.340Z | 2026-02-27T20:09:43.954Z |
| CVE-2025-3722 |
0 (4.0)
|
A path traversal vulnerability in System Informat… |
Trellix |
System Information Reporter |
2025-06-26T11:08:53.374Z | 2025-06-26T12:59:09.547Z |
| CVE-2025-3771 |
7.2 (4.0)
|
A path or symbolic link manipulation vulnerabilit… |
Trellix |
System Information Reporter |
2025-06-26T11:05:18.669Z | 2025-06-26T12:59:27.081Z |
| CVE-2026-21512 |
6.5 (3.1)
|
Azure DevOps Server Cross-Site Scripting Vulnerability |
Microsoft |
Azure DevOps Server 2022 |
2026-02-10T17:51:16.670Z | 2026-02-27T20:09:22.465Z |
| CVE-2025-3773 |
0 (4.0)
|
A sensitive information exposure vulnerability i… |
Trellix |
System Information Reporter |
2025-06-26T11:11:26.881Z | 2025-06-26T12:58:54.131Z |
| CVE-2025-39474 |
9.3 (3.1)
|
WordPress Amely theme <= 3.1.4 - SQL Injection vulnerability |
ThemeMove |
Amely |
2025-06-27T11:52:35.674Z | 2025-06-27T13:05:18.710Z |
| CVE-2025-27021 |
7 (3.1)
|
Operating System Misconfiguration in Infinera G42 |
Infinera |
G42 |
2025-07-02T08:45:05.475Z | 2025-07-02T14:32:53.922Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-21527 | User interface (ui) misrepresentation of critical information in Microsoft Exchange Server allows a… | 2026-02-10T18:16:35.093 | 2026-02-11T21:41:55.400 |
| fkie_cve-2026-21523 | Time-of-check time-of-use (toctou) race condition in GitHub Copilot and Visual Studio allows an aut… | 2026-02-10T18:16:34.743 | 2026-02-11T21:41:36.627 |
| fkie_cve-2026-21516 | Improper neutralization of special elements used in a command ('command injection') in Github Copil… | 2026-02-10T18:16:33.960 | 2026-02-11T21:40:45.440 |
| fkie_cve-2025-3722 | A path traversal vulnerability in System Information Reporter (SIR) 1.0.3 and prior allowed an aut… | 2025-06-26T11:15:26.427 | 2026-02-11T21:40:42.813 |
| fkie_cve-2025-3771 | A path or symbolic link manipulation vulnerability in SIR 1.0.3 and prior versions allows an authen… | 2025-06-26T11:15:29.030 | 2026-02-11T21:40:19.820 |
| fkie_cve-2026-21512 | Server-side request forgery (ssrf) in Azure DevOps Server allows an authorized attacker to perform … | 2026-02-10T18:16:33.493 | 2026-02-11T21:39:50.107 |
| fkie_cve-2025-3773 | A sensitive information exposure vulnerability in System Information Reporter (SIR) 1.0.3 and prio… | 2025-06-26T12:15:21.713 | 2026-02-11T21:39:41.160 |
| fkie_cve-2025-39474 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2025-06-27T12:15:36.243 | 2026-02-11T21:38:41.560 |
| fkie_cve-2025-27021 | The misconfiguration in the sudoers configuration of the operating system in Infinera G42 version … | 2025-07-02T09:15:25.117 | 2026-02-11T21:37:46.153 |
| fkie_cve-2026-21256 | Improper neutralization of special elements used in a command ('command injection') in GitHub Copil… | 2026-02-10T18:16:27.330 | 2026-02-11T21:37:01.630 |
| fkie_cve-2025-27022 | A path traversal vulnerability of the WebGUI HTTP endpoint in Infinera G42 version R6.1.3 allows r… | 2025-07-02T09:15:25.290 | 2026-02-11T21:31:52.680 |
| fkie_cve-2025-27023 | Lack or insufficent input validation in WebGUI CLI web in Infinera G42 version R6.1.3 allows remot… | 2025-07-02T10:15:22.540 | 2026-02-11T21:31:06.017 |
| fkie_cve-2025-27024 | Unrestricted access to OS file system in SFTP service in Infinera G42 version R6.1.3 allows remote… | 2025-07-02T10:15:22.730 | 2026-02-11T21:28:14.523 |
| fkie_cve-2025-27026 | A missing double-check feature in the WebGUI for CLI deactivation in Infinera G42 version R6.1.3 a… | 2025-07-02T14:15:23.900 | 2026-02-11T21:20:38.777 |
| fkie_cve-2025-52868 | A buffer overflow vulnerability has been reported to affect Qsync Central. If a remote attacker gai… | 2026-02-11T13:15:53.237 | 2026-02-11T21:19:07.190 |
| fkie_cve-2026-21222 | Insertion of sensitive information into log file in Windows Kernel allows an authorized attacker to… | 2026-02-10T18:16:23.130 | 2026-02-11T21:18:38.220 |
| fkie_cve-2025-48725 | A buffer overflow vulnerability has been reported to affect several QNAP operating system versions.… | 2026-02-11T13:15:52.967 | 2026-02-11T21:18:36.900 |
| fkie_cve-2025-48724 | A buffer overflow vulnerability has been reported to affect Qsync Central. If a remote attacker gai… | 2026-02-11T13:15:52.830 | 2026-02-11T21:18:17.263 |
| fkie_cve-2025-48723 | A buffer overflow vulnerability has been reported to affect Qsync Central. If a remote attacker gai… | 2026-02-11T13:15:52.693 | 2026-02-11T21:18:06.230 |
| fkie_cve-2025-48722 | A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote att… | 2026-02-11T13:15:52.560 | 2026-02-11T21:17:57.510 |
| fkie_cve-2025-47209 | A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote att… | 2026-02-11T13:15:52.427 | 2026-02-11T21:17:44.877 |
| fkie_cve-2025-68643 | Axigen Mail Server before 10.5.57 allows stored Cross-Site Scripting (XSS) in the handling of the t… | 2026-02-05T17:16:12.597 | 2026-02-11T21:16:17.923 |
| fkie_cve-2026-21229 | Improper input validation in Power BI allows an authorized attacker to execute code over a network. | 2026-02-10T18:16:23.453 | 2026-02-11T21:15:13.490 |
| fkie_cve-2024-4147 | In lunary-ai/lunary version 1.2.13, an insufficient granularity of access control vulnerability all… | 2026-02-02T11:16:16.443 | 2026-02-11T21:14:06.077 |
| fkie_cve-2026-21231 | Concurrent execution using shared resource with improper synchronization ('race condition') in Wind… | 2026-02-10T18:16:23.600 | 2026-02-11T21:13:54.983 |
| fkie_cve-2025-30276 | An out-of-bounds write vulnerability has been reported to affect Qsync Central. If a remote attacke… | 2026-02-11T13:15:52.130 | 2026-02-11T21:13:45.030 |
| fkie_cve-2026-21232 | Untrusted pointer dereference in Windows HTTP.sys allows an authorized attacker to elevate privileg… | 2026-02-10T18:16:23.770 | 2026-02-11T21:12:11.617 |
| fkie_cve-2025-30269 | A use of externally-controlled format string vulnerability has been reported to affect Qsync Centra… | 2026-02-11T13:15:51.957 | 2026-02-11T21:10:50.490 |
| fkie_cve-2026-21234 | Concurrent execution using shared resource with improper synchronization ('race condition') in Wind… | 2026-02-10T18:16:23.930 | 2026-02-11T21:10:43.267 |
| fkie_cve-2026-21235 | Use after free in Microsoft Graphics Component allows an authorized attacker to elevate privileges … | 2026-02-10T18:16:24.090 | 2026-02-11T21:09:06.693 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-x877-5r2w-379h |
1.1 (4.0)
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-02-03T03:30:26Z | 2026-02-03T03:30:26Z |
| ghsa-vw9r-c6xc-fpxh |
3.7 (3.1)
6.3 (4.0)
|
On BIG-IP systems, undisclosed traffic can cause data corruption and unauthorized data modification… | 2025-10-15T15:30:28Z | 2026-02-03T03:30:26Z |
| ghsa-v687-vxc5-92hv |
1.1 (4.0)
|
Vulnerability in Wikimedia Foundation CheckUser. This vulnerability is associated with program file… | 2026-02-03T03:30:26Z | 2026-02-03T03:30:26Z |
| ghsa-v564-5h76-v6ch |
1.2 (4.0)
|
Vulnerability in Wikimedia Foundation MediaWiki. This vulnerability is associated with program file… | 2026-02-03T03:30:26Z | 2026-02-03T03:30:26Z |
| ghsa-rmgr-p64x-32gm |
7.1 (4.0)
|
A vulnerability in update-reports-purge-settings.sh script logging for Brocade SANnav before 2.4.0a… | 2026-02-03T03:30:26Z | 2026-02-03T03:30:26Z |
| ghsa-q897-j5gq-ggp7 |
0.0 (4.0)
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-02-03T03:30:26Z | 2026-02-03T03:30:26Z |
| ghsa-jvfr-hp47-8rx8 |
4.6 (4.0)
|
A vulnerability in the migration script for Brocade SANnav before 3.0 could allow the collection of… | 2026-02-03T03:30:26Z | 2026-02-03T03:30:26Z |
| ghsa-jrq3-c447-h584 |
0.0 (4.0)
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-02-03T03:30:26Z | 2026-02-03T03:30:26Z |
| ghsa-c7fq-95j5-94xc |
0.0 (4.0)
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-02-03T03:30:26Z | 2026-02-03T03:30:26Z |
| ghsa-c785-g8j7-23pr |
0.0 (4.0)
|
Vulnerability in Wikimedia Foundation OATHAuth. This vulnerability is associated with program files… | 2026-02-03T03:30:26Z | 2026-02-03T03:30:26Z |
| ghsa-v5mc-ffgc-f77v |
6.5 (3.1)
|
Under certain conditions, a potential data leak may occur in the Traffic Management Microkernels (T… | 2024-05-08T15:30:43Z | 2026-02-03T03:30:25Z |
| ghsa-xh35-43pp-33v2 |
0.0 (4.0)
|
Vulnerability in Wikimedia Foundation MediaWiki. This vulnerability is associated with program file… | 2026-02-03T00:30:19Z | 2026-02-03T00:30:19Z |
| ghsa-qmgg-3m8p-p8cc |
1.7 (4.0)
|
Vulnerability in Wikimedia Foundation MediaWiki. This vulnerability is associated with program file… | 2026-02-03T00:30:19Z | 2026-02-03T00:30:19Z |
| ghsa-pw42-76j9-fcp3 |
2.7 (4.0)
|
Vulnerability in Wikimedia Foundation MediaWiki. This vulnerability is associated with program file… | 2026-02-03T00:30:19Z | 2026-02-03T00:30:19Z |
| ghsa-mq9h-r82m-hvhc |
0.0 (4.0)
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-02-03T00:30:19Z | 2026-02-03T00:30:19Z |
| ghsa-j8mp-qmj4-gphg |
0.4 (4.0)
|
Vulnerability in Wikimedia Foundation CheckUser. This vulnerability is associated with program file… | 2026-02-03T00:30:19Z | 2026-02-03T00:30:19Z |
| ghsa-j3hj-c3rr-4j34 |
0.0 (4.0)
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-02-03T00:30:19Z | 2026-02-03T00:30:19Z |
| ghsa-gp65-637x-5v3w |
0.0 (4.0)
|
Vulnerability in Wikimedia Foundation ConfirmEdit. This vulnerability is associated with program fi… | 2026-02-03T00:30:19Z | 2026-02-03T00:30:19Z |
| ghsa-cc7r-67vc-28jh |
0.0 (4.0)
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-02-03T00:30:19Z | 2026-02-03T00:30:19Z |
| ghsa-7w79-29qq-c7v3 |
0.0 (4.0)
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-02-03T00:30:19Z | 2026-02-03T00:30:19Z |
| ghsa-664f-j627-v386 |
0.0 (4.0)
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-02-03T00:30:19Z | 2026-02-03T00:30:19Z |
| ghsa-62j4-5x45-jvf3 |
1.7 (4.0)
|
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Wikimedia Foundation Me… | 2026-02-03T00:30:19Z | 2026-02-03T00:30:19Z |
| ghsa-39fr-2fph-j42r |
0.0 (4.0)
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-02-03T00:30:19Z | 2026-02-03T00:30:19Z |
| ghsa-xrvg-9c6x-8hxj |
0.0 (4.0)
|
Vulnerability in Wikimedia Foundation MediaWiki. This vulnerability is associated with program file… | 2026-02-03T00:30:18Z | 2026-02-03T00:30:18Z |
| ghsa-wwh5-ppvv-q4q7 |
7.5 (3.1)
|
In Modem, there is a possible system crash due to improper input validation. This could lead to rem… | 2026-02-02T09:30:31Z | 2026-02-03T00:30:18Z |
| ghsa-wfpp-6h7f-cmmc |
6.0 (3.1)
|
IBM PowerVM Hypervisor FW1110.00 through FW1110.03, FW1060.00 through FW1060.51, and FW950.00 throu… | 2026-02-03T00:30:18Z | 2026-02-03T00:30:18Z |
| ghsa-vw3r-fh3c-r4pj |
2.3 (4.0)
|
Vulnerability in Wikimedia Foundation MediaWiki. This vulnerability is associated with program file… | 2026-02-03T00:30:18Z | 2026-02-03T00:30:18Z |
| ghsa-vfp9-7p35-gg6g |
2.8 (3.1)
|
IBM PowerVM Hypervisor FW1110.00 through FW1110.03, FW1060.00 through FW1060.51, and FW950.00 throu… | 2026-02-03T00:30:18Z | 2026-02-03T00:30:18Z |
| ghsa-v97q-699f-9m4x |
5.5 (3.1)
|
In imgsys, there is a possible memory corruption due to improper locking. This could lead to local … | 2026-02-02T09:30:31Z | 2026-02-03T00:30:18Z |
| ghsa-r9vx-549f-9225 |
7.5 (3.1)
|
In Modem, there is a possible system crash due to improper input validation. This could lead to rem… | 2026-02-02T09:30:31Z | 2026-02-03T00:30:18Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-2773 | A vulnerability classified as problematic has been found in Campcodes Online Marriage Reg… | 2024-04-03T05:02:25.913098Z |
| gsd-2024-2831 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.909991Z |
| gsd-2024-2877 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.906896Z |
| gsd-2024-2994 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.906022Z |
| gsd-2024-2998 | A vulnerability was found in Bdtask Multi-Store Inventory Management System up to 2024032… | 2024-04-03T05:02:25.904333Z |
| gsd-2024-2804 | The Network Summary plugin for WordPress is vulnerable to SQL Injection via the 'category… | 2024-04-03T05:02:25.902864Z |
| gsd-2024-2912 | An insecure deserialization vulnerability exists in the BentoML framework, allowing remot… | 2024-04-03T05:02:25.898384Z |
| gsd-2024-2812 | A vulnerability was found in Tenda AC15 15.03.05.18/15.03.20_multi. It has been classifie… | 2024-04-03T05:02:25.896265Z |
| gsd-2024-2851 | A vulnerability was found in Tenda AC15 15.03.05.18/15.03.20_multi. It has been classifie… | 2024-04-03T05:02:25.893430Z |
| gsd-2024-2979 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.890560Z |
| gsd-2024-2897 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.885148Z |
| gsd-2024-2943 | A vulnerability has been found in Campcodes Online Examination System 1.0 and classified … | 2024-04-03T05:02:25.881557Z |
| gsd-2024-2832 | A vulnerability classified as problematic was found in Campcodes Online Shopping System 1… | 2024-04-03T05:02:25.879003Z |
| gsd-2024-2821 | A vulnerability, which was classified as problematic, has been found in DedeCMS 5.7. Affe… | 2024-04-03T05:02:25.877682Z |
| gsd-2024-2885 | Use after free in Dawn in Google Chrome prior to 123.0.6312.86 allowed a remote attacker … | 2024-04-03T05:02:25.876986Z |
| gsd-2024-2902 | A vulnerability was found in Tenda AC7 15.03.06.44 and classified as critical. This issue… | 2024-04-03T05:02:25.869811Z |
| gsd-2024-2863 | This vulnerability allows remote attackers to traverse paths via file upload on the affec… | 2024-04-03T05:02:25.867305Z |
| gsd-2024-2751 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.865864Z |
| gsd-2024-2778 | A vulnerability was found in Campcodes Online Marriage Registration System 1.0 and classi… | 2024-04-03T05:02:25.864884Z |
| gsd-2024-2968 | The WP-Eggdrop plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admi… | 2024-04-03T05:02:25.861272Z |
| gsd-2024-2700 | A vulnerability was found in the quarkus-core component. Quarkus captures the local envir… | 2024-04-03T05:02:25.860880Z |
| gsd-2024-2861 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.858989Z |
| gsd-2024-2936 | The Sydney Toolbox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via … | 2024-04-03T05:02:25.856150Z |
| gsd-2024-2780 | A vulnerability was found in Campcodes Online Marriage Registration System 1.0. It has be… | 2024-04-03T05:02:25.853849Z |
| gsd-2024-2908 | The Call Now Button WordPress plugin before 1.4.7 does not sanitise and escape some of i… | 2024-04-03T05:02:25.851921Z |
| gsd-2024-2768 | A vulnerability was found in Campcodes Complete Online Beauty Parlor Management System 1.… | 2024-04-03T05:02:25.850098Z |
| gsd-2024-2903 | A vulnerability was found in Tenda AC7 15.03.06.44. It has been classified as critical. A… | 2024-04-03T05:02:25.847265Z |
| gsd-2024-2882 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.840988Z |
| gsd-2024-2787 | The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Sc… | 2024-04-03T05:02:25.840779Z |
| gsd-2024-2848 | The Responsive theme for WordPress is vulnerable to unauthorized modification of data due… | 2024-04-03T05:02:25.840266Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-190563 | Malicious code in scriptstealer (npm) | 2025-11-18T05:22:44Z | 2025-11-24T16:09:31Z |
| mal-2025-190554 | Malicious code in pretty-jsonify (npm) | 2025-11-18T04:51:52Z | 2025-11-24T16:09:31Z |
| mal-2025-190629 | Malicious code in loliloli (npm) | 2025-11-24T04:52:58Z | 2025-11-24T16:09:30Z |
| mal-2025-190625 | Malicious code in lion-second-package (npm) | 2025-11-24T03:27:37Z | 2025-11-24T16:09:30Z |
| mal-2025-190620 | Malicious code in lyft-ui (npm) | 2025-11-22T12:47:35Z | 2025-11-24T16:09:30Z |
| mal-2025-190613 | Malicious code in linkedin-ui (npm) | 2025-11-22T12:46:58Z | 2025-11-24T16:09:30Z |
| mal-2025-190583 | Malicious code in node-calculator-fa00 (npm) | 2025-11-20T00:10:38Z | 2025-11-24T16:09:30Z |
| mal-2025-190580 | Malicious code in lululemon-b2b-utils (npm) | 2025-11-19T19:10:47Z | 2025-11-24T16:09:30Z |
| mal-2025-190578 | Malicious code in node-calculator-cf8c (npm) | 2025-11-19T13:58:04Z | 2025-11-24T16:09:30Z |
| mal-2025-190570 | Malicious code in node-calculator-8bf9 (npm) | 2025-11-19T03:31:19Z | 2025-11-24T16:09:30Z |
| mal-2025-190569 | Malicious code in node-calculator-b0e4 (npm) | 2025-11-19T03:25:12Z | 2025-11-24T16:09:30Z |
| mal-2025-190562 | Malicious code in node-calculator-3e62 (npm) | 2025-11-18T05:36:51Z | 2025-11-24T16:09:30Z |
| mal-2025-190561 | Malicious code in mystealer (npm) | 2025-11-18T05:22:44Z | 2025-11-24T16:09:30Z |
| mal-2025-190560 | Malicious code in mongoose-odm (npm) | 2025-11-18T05:26:43Z | 2025-11-24T16:09:30Z |
| mal-2025-190553 | Malicious code in multi-provider-settings (npm) | 2025-11-18T04:40:51Z | 2025-11-24T16:09:30Z |
| mal-2025-190551 | Malicious code in node-calculator-36ae (npm) | 2025-11-18T04:20:09Z | 2025-11-24T16:09:30Z |
| mal-2025-190628 | Malicious code in hash-guard (npm) | 2025-11-24T05:11:23Z | 2025-11-24T16:09:29Z |
| mal-2025-190619 | Malicious code in hyatt-ui (npm) | 2025-11-22T12:51:59Z | 2025-11-24T16:09:29Z |
| mal-2025-190612 | Malicious code in instacart-ui (npm) | 2025-11-22T12:46:03Z | 2025-11-24T16:09:29Z |
| mal-2025-190611 | Malicious code in hilton-ui (npm) | 2025-11-22T12:46:07Z | 2025-11-24T16:09:29Z |
| mal-2025-190586 | Malicious code in identity-authn-core-ui (npm) | 2025-11-20T08:26:20Z | 2025-11-24T16:09:29Z |
| mal-2025-190585 | Malicious code in expertsvc-onboard-offboard (npm) | 2025-11-20T08:26:56Z | 2025-11-24T16:09:29Z |
| mal-2025-190582 | Malicious code in just-a-calculator (npm) | 2025-11-20T00:10:38Z | 2025-11-24T16:09:29Z |
| mal-2025-190579 | Malicious code in hellospa (npm) | 2025-11-19T19:08:12Z | 2025-11-24T16:09:29Z |
| mal-2025-190559 | Malicious code in finastealer (npm) | 2025-11-18T05:22:44Z | 2025-11-24T16:09:29Z |
| mal-2025-190618 | Malicious code in epicgames-ui (npm) | 2025-11-22T12:50:56Z | 2025-11-24T16:09:28Z |
| mal-2025-190617 | Malicious code in doordash-ui (npm) | 2025-11-22T12:47:34Z | 2025-11-24T16:09:28Z |
| mal-2025-190581 | Malicious code in com.unity.polyspatial.xr (npm) | 2025-11-20T00:14:18Z | 2025-11-24T16:09:28Z |
| mal-2025-190568 | Malicious code in captcha-paypal (npm) | 2025-11-18T23:50:40Z | 2025-11-24T16:09:28Z |
| mal-2025-190552 | Malicious code in chai-type (npm) | 2025-11-18T05:19:03Z | 2025-11-24T16:09:28Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-3349 | Cisco AsyncOS: Schwachstelle ermöglicht Cross-Site Scripting | 2024-11-06T23:00:00.000+00:00 | 2024-11-06T23:00:00.000+00:00 |
| wid-sec-w-2024-3229 | Ubiquiti UniFi: Schwachstelle ermöglicht Privilegieneskalation | 2024-10-16T22:00:00.000+00:00 | 2024-11-06T23:00:00.000+00:00 |
| wid-sec-w-2024-3206 | Amazon Corretto: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-10-15T22:00:00.000+00:00 | 2024-11-06T23:00:00.000+00:00 |
| wid-sec-w-2024-3201 | Oracle Database Server: Mehrere Schwachstellen | 2024-10-15T22:00:00.000+00:00 | 2024-11-06T23:00:00.000+00:00 |
| wid-sec-w-2024-0797 | IBM WebSphere Application Server: Schwachstelle ermöglicht Denial of Service | 2024-04-04T22:00:00.000+00:00 | 2024-11-06T23:00:00.000+00:00 |
| wid-sec-w-2024-0780 | IBM WebSphere Application Server: Schwachstelle ermöglicht Denial of Service | 2024-04-03T22:00:00.000+00:00 | 2024-11-06T23:00:00.000+00:00 |
| wid-sec-w-2024-3348 | IBM TXSeries: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-11-05T23:00:00.000+00:00 | 2024-11-05T23:00:00.000+00:00 |
| wid-sec-w-2024-3347 | Apache Sling: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2021-12-16T23:00:00.000+00:00 | 2024-11-05T23:00:00.000+00:00 |
| wid-sec-w-2024-3346 | IBM App Connect Enterprise: Schwachstelle ermöglicht Denial of Service | 2024-11-05T23:00:00.000+00:00 | 2024-11-05T23:00:00.000+00:00 |
| wid-sec-w-2024-3345 | IBM Maximo Asset Management: Schwachstelle ermöglicht Codeausführung und DoS | 2024-11-05T23:00:00.000+00:00 | 2024-11-05T23:00:00.000+00:00 |
| wid-sec-w-2024-3343 | Aruba ArubaOS: Mehrere Schwachstellen | 2024-11-05T23:00:00.000+00:00 | 2024-11-05T23:00:00.000+00:00 |
| wid-sec-w-2024-3341 | D-LINK Router DIR-823G: Mehrere Schwachstellen ermöglichen Codeausführung | 2024-11-05T23:00:00.000+00:00 | 2024-11-05T23:00:00.000+00:00 |
| wid-sec-w-2024-3323 | Red Hat Satellite: Mehrere Schwachstellen | 2024-10-31T23:00:00.000+00:00 | 2024-11-05T23:00:00.000+00:00 |
| wid-sec-w-2024-3314 | DrayTek Vigor: Mehrere Schwachstellen ermöglichen Codeausführung | 2024-10-30T23:00:00.000+00:00 | 2024-11-05T23:00:00.000+00:00 |
| wid-sec-w-2024-3071 | Jenkins: Mehrere Schwachstellen | 2024-10-03T22:00:00.000+00:00 | 2024-11-05T23:00:00.000+00:00 |
| wid-sec-w-2024-1018 | Jenkins: Mehrere Schwachstellen | 2024-05-02T22:00:00.000+00:00 | 2024-11-05T23:00:00.000+00:00 |
| wid-sec-w-2024-3332 | Poly G7500: Schwachstelle ermöglicht Codeausführung | 2024-11-04T23:00:00.000+00:00 | 2024-11-04T23:00:00.000+00:00 |
| wid-sec-w-2024-3328 | Android Patchday November 2024 | 2024-11-04T23:00:00.000+00:00 | 2024-11-04T23:00:00.000+00:00 |
| wid-sec-w-2024-1016 | WildFly Application Server: Schwachstelle ermöglicht Denial of Service | 2024-05-02T22:00:00.000+00:00 | 2024-11-04T23:00:00.000+00:00 |
| wid-sec-w-2024-3326 | Samsung Exynos: Schwachstelle ermöglicht Denial of Service | 2024-11-03T23:00:00.000+00:00 | 2024-11-03T23:00:00.000+00:00 |
| wid-sec-w-2024-3325 | IBM QRadar SIEM: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-11-03T23:00:00.000+00:00 | 2024-11-03T23:00:00.000+00:00 |
| wid-sec-w-2024-3324 | IBM SPSS Collaboration and Deployment Services: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-11-03T23:00:00.000+00:00 | 2024-11-03T23:00:00.000+00:00 |
| wid-sec-w-2024-1550 | IBM WebSphere Application Server: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2024-07-08T22:00:00.000+00:00 | 2024-11-03T23:00:00.000+00:00 |
| wid-sec-w-2024-1456 | IBM WebSphere Application Server: Schwachstelle ermöglicht Cross-Site Scripting | 2024-06-25T22:00:00.000+00:00 | 2024-11-03T23:00:00.000+00:00 |
| wid-sec-w-2024-1426 | IBM WebSphere Application Server: Schwachstelle ermöglicht Privilegieneskalation | 2024-06-20T22:00:00.000+00:00 | 2024-11-03T23:00:00.000+00:00 |
| wid-sec-w-2024-0970 | IBM WebSphere Application Server: Schwachstelle ermöglicht Denial of Service | 2024-04-24T22:00:00.000+00:00 | 2024-11-03T23:00:00.000+00:00 |
| wid-sec-w-2024-0509 | IBM WebSphere Application Server: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-02-28T23:00:00.000+00:00 | 2024-11-03T23:00:00.000+00:00 |
| wid-sec-w-2023-2481 | NGINX: Schwachstelle ermöglicht Manipulation von Daten | 2020-01-09T23:00:00.000+00:00 | 2024-11-03T23:00:00.000+00:00 |
| wid-sec-w-2022-1482 | TLS Implementierungen: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-01-09T23:00:00.000+00:00 | 2024-11-03T23:00:00.000+00:00 |
| wid-sec-w-2022-0463 | NGINX: Schwachstelle ermöglicht Denial of Service | 2021-05-25T22:00:00.000+00:00 | 2024-11-03T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2012:0076 | Red Hat Security Advisory: jbossweb security update | 2012-01-31T22:56:00+00:00 | 2026-01-28T22:34:23+00:00 |
| rhsa-2012:0075 | Red Hat Security Advisory: jbossweb security update | 2012-01-31T22:55:00+00:00 | 2026-01-28T22:34:23+00:00 |
| rhsa-2012:0074 | Red Hat Security Advisory: jbossweb security update | 2012-01-31T22:55:00+00:00 | 2026-01-28T22:34:22+00:00 |
| rhsa-2012:0060 | Red Hat Security Advisory: openssl security update | 2012-01-24T20:59:00+00:00 | 2026-01-28T22:34:22+00:00 |
| rhsa-2012:0041 | Red Hat Security Advisory: jbossweb security update | 2012-01-19T17:21:00+00:00 | 2026-01-28T22:34:21+00:00 |
| rhsa-2011:1854 | Red Hat Security Advisory: krb5-appl security update | 2011-12-28T19:05:00+00:00 | 2026-01-28T22:34:21+00:00 |
| rhsa-2011:1853 | Red Hat Security Advisory: krb5 security update | 2011-12-28T19:07:00+00:00 | 2026-01-28T22:34:21+00:00 |
| rhsa-2011:1852 | Red Hat Security Advisory: krb5-appl security update | 2011-12-27T16:16:00+00:00 | 2026-01-28T22:34:20+00:00 |
| rhsa-2011:1851 | Red Hat Security Advisory: krb5 security update | 2011-12-27T16:07:00+00:00 | 2026-01-28T22:34:20+00:00 |
| rhsa-2011:1369 | Red Hat Security Advisory: httpd security update | 2011-10-13T19:33:00+00:00 | 2026-01-28T22:34:20+00:00 |
| rhsa-2011:1845 | Red Hat Security Advisory: tomcat5 security update | 2011-12-20T17:16:00+00:00 | 2026-01-28T22:34:19+00:00 |
| rhsa-2011:1797 | Red Hat Security Advisory: perl security update | 2011-12-08T18:56:00+00:00 | 2026-01-28T22:34:18+00:00 |
| rhsa-2011:1780 | Red Hat Security Advisory: tomcat6 security and bug fix update | 2011-12-05T17:39:00+00:00 | 2026-01-28T22:34:18+00:00 |
| rhsa-2011:1424 | Red Hat Security Advisory: perl security update | 2011-11-03T20:38:00+00:00 | 2026-01-28T22:34:18+00:00 |
| rhsa-2011:1392 | Red Hat Security Advisory: httpd security and bug fix update | 2011-10-20T16:50:00+00:00 | 2026-01-28T22:34:17+00:00 |
| rhsa-2011:1391 | Red Hat Security Advisory: httpd security and bug fix update | 2011-10-20T16:48:00+00:00 | 2026-01-28T22:34:16+00:00 |
| rhsa-2011:1349 | Red Hat Security Advisory: rpm security update | 2011-10-03T20:08:00+00:00 | 2026-01-28T22:34:16+00:00 |
| rhsa-2011:1300 | Red Hat Security Advisory: httpd security update | 2011-09-15T17:42:00+00:00 | 2026-01-28T22:34:16+00:00 |
| rhsa-2011:0896 | Red Hat Security Advisory: JBoss Enterprise Web Server 1.0.2 update | 2011-06-22T23:14:00+00:00 | 2026-01-28T22:34:16+00:00 |
| rhsa-2011:1330 | Red Hat Security Advisory: JBoss Enterprise Web Server 1.0.2 security update | 2011-09-21T20:00:00+00:00 | 2026-01-28T22:34:14+00:00 |
| rhsa-2011:1329 | Red Hat Security Advisory: httpd and httpd22 security update | 2011-09-21T19:50:00+00:00 | 2026-01-28T22:34:14+00:00 |
| rhsa-2010:0861 | Red Hat Security Advisory: firefox security update | 2010-11-10T19:00:00+00:00 | 2026-01-28T22:34:14+00:00 |
| rhsa-2011:1294 | Red Hat Security Advisory: httpd security update | 2011-09-14T18:59:00+00:00 | 2026-01-28T22:34:13+00:00 |
| rhsa-2011:1245 | Red Hat Security Advisory: httpd security update | 2011-08-31T22:43:00+00:00 | 2026-01-28T22:34:12+00:00 |
| rhsa-2011:0897 | Red Hat Security Advisory: JBoss Enterprise Web Server 1.0.2 update | 2011-06-22T23:31:00+00:00 | 2026-01-28T22:34:12+00:00 |
| rhsa-2011:0858 | Red Hat Security Advisory: xerces-j2 security update | 2011-06-08T14:36:00+00:00 | 2026-01-28T22:34:11+00:00 |
| rhsa-2011:0791 | Red Hat Security Advisory: tomcat6 security and bug fix update | 2011-05-19T10:55:00+00:00 | 2026-01-28T22:34:10+00:00 |
| rhsa-2011:0568 | Red Hat Security Advisory: eclipse security, bug fix, and enhancement update | 2011-05-19T11:13:00+00:00 | 2026-01-28T22:34:10+00:00 |
| rhsa-2011:0434 | Red Hat Security Advisory: security update for Red Hat Network Satellite | 2011-04-11T20:24:00+00:00 | 2026-01-28T22:34:10+00:00 |
| rhsa-2010:0896 | Red Hat Security Advisory: thunderbird security update | 2010-11-17T15:14:00+00:00 | 2026-01-28T22:34:10+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2024-57924 | fs: relax assertions on failure to encode file handles | 2025-01-02T00:00:00.000Z | 2025-09-28T01:02:02.000Z |
| msrc_cve-2024-57893 | ALSA: seq: oss: Fix races at processing SysEx messages | 2025-01-02T00:00:00.000Z | 2025-09-28T01:01:57.000Z |
| msrc_cve-2024-57876 | drm/dp_mst: Fix resetting msg rx state after topology removal | 2025-01-02T00:00:00.000Z | 2025-09-28T01:01:52.000Z |
| msrc_cve-2024-41069 | ASoC: topology: Fix references to freed memory | 2024-07-01T07:00:00.000Z | 2025-09-28T01:01:40.000Z |
| msrc_cve-2024-35826 | block: Fix page refcounts for unaligned buffers in __bio_release_pages() | 2024-05-02T07:00:00.000Z | 2025-09-28T01:01:35.000Z |
| msrc_cve-2024-35803 | x86/efistub: Call mixed mode boot services on the firmware's stack | 2024-05-02T07:00:00.000Z | 2025-09-28T01:01:29.000Z |
| msrc_cve-2023-52916 | media: aspeed: Fix memory overwrite if timing is 1600x900 | 2024-09-01T07:00:00.000Z | 2025-09-28T01:01:17.000Z |
| msrc_cve-2025-22247 | Insecure file handling vulnerability | 2025-05-02T00:00:00.000Z | 2025-09-27T01:03:15.000Z |
| msrc_cve-2025-9900 | Libtiff: libtiff write-what-where | 2025-09-02T00:00:00.000Z | 2025-09-27T01:03:04.000Z |
| msrc_cve-2025-8869 | Fallback tar extraction in pip doesn't check symbolic links point to extraction directory | 2025-09-02T00:00:00.000Z | 2025-09-27T01:02:56.000Z |
| msrc_cve-2024-57843 | virtio-net: fix overflow inside virtnet_rq_alloc | 2025-01-02T00:00:00.000Z | 2025-09-27T01:02:44.000Z |
| msrc_cve-2024-41030 | ksmbd: discard write access to the directory open | 2024-07-01T07:00:00.000Z | 2025-09-27T01:02:35.000Z |
| msrc_cve-2024-41013 | xfs: don't walk off the end of a directory data block | 2024-07-01T07:00:00.000Z | 2025-09-27T01:02:30.000Z |
| msrc_cve-2024-40998 | ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super() | 2024-07-01T07:00:00.000Z | 2025-09-27T01:02:25.000Z |
| msrc_cve-2024-35995 | ACPI: CPPC: Use access_width over bit_width for system memory accesses | 2024-05-02T07:00:00.000Z | 2025-09-27T01:02:20.000Z |
| msrc_cve-2024-35971 | net: ks8851: Handle softirqs at the end of IRQ thread to fix hang | 2024-05-02T07:00:00.000Z | 2025-09-27T01:02:14.000Z |
| msrc_cve-2024-35965 | Bluetooth: L2CAP: Fix not validating setsockopt user input | 2024-05-02T07:00:00.000Z | 2025-09-27T01:02:09.000Z |
| msrc_cve-2024-35951 | drm/panfrost: Fix the error path in panfrost_mmu_map_fault_addr() | 2024-05-02T07:00:00.000Z | 2025-09-27T01:02:04.000Z |
| msrc_cve-2024-35939 | dma-direct: Leak pages on dma_set_decrypted() failure | 2024-05-02T07:00:00.000Z | 2025-09-27T01:01:58.000Z |
| msrc_cve-2024-35924 | usb: typec: ucsi: Limit read size on v1.2 | 2024-05-02T07:00:00.000Z | 2025-09-27T01:01:50.000Z |
| msrc_cve-2024-35875 | x86/coco: Require seeding RNG with RDRAND on CoCo systems | 2024-05-02T07:00:00.000Z | 2025-09-27T01:01:44.000Z |
| msrc_cve-2024-35839 | netfilter: bridge: replace physindev with physinif in nf_bridge_info | 2024-05-02T07:00:00.000Z | 2025-09-27T01:01:39.000Z |
| msrc_cve-2023-52732 | ceph: blocklist the kclient when receiving corrupted snap trace | 2024-05-02T07:00:00.000Z | 2025-09-27T01:01:34.000Z |
| msrc_cve-2023-52676 | bpf: Guard stack limits against 32bit overflow | 2024-05-02T07:00:00.000Z | 2025-09-27T01:01:29.000Z |
| msrc_cve-2023-52671 | drm/amd/display: Fix hang/underflow when transitioning to ODM4:1 | 2024-05-02T07:00:00.000Z | 2025-09-27T01:01:23.000Z |
| msrc_cve-2023-52660 | media: rkisp1: Fix IRQ handling due to shared interrupts | 2024-05-02T07:00:00.000Z | 2025-09-27T01:01:18.000Z |
| msrc_cve-2024-56566 | mm/slub: Avoid list corruption when removing a slab from the full list | 2024-12-02T00:00:00.000Z | 2025-09-25T01:02:33.000Z |
| msrc_cve-2024-41935 | f2fs: fix to shrink read extent node in batches | 2025-01-02T00:00:00.000Z | 2025-09-25T01:02:23.000Z |
| msrc_cve-2024-36000 | mm/hugetlb: fix missing hugetlb_lock for resv uncharge | 2024-05-02T07:00:00.000Z | 2025-09-25T01:02:15.000Z |
| msrc_cve-2024-35956 | btrfs: qgroup: fix qgroup prealloc rsv leak in subvolume operations | 2024-05-02T07:00:00.000Z | 2025-09-25T01:02:09.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202411-0858 | A vulnerability was found in Tenda AC10 16.03.10.13 and classified as critical. Affected … | 2025-05-30T23:27:01.716000Z |
| var-202412-0112 | Stack-based Buffer Overflow vulnerability in Shenzhen Tenda Technology Co Tenda AC6V2 (se… | 2025-05-30T23:25:45.878000Z |
| var-202505-0869 | TOTOLINK NR1800X V9.1.0u.6681_B20230703 was discovered to contain an authenticated stack … | 2025-05-30T23:25:45.013000Z |
| var-202505-1816 | A vulnerability, which was classified as problematic, has been found in D-Link DI-7003GV2… | 2025-05-30T23:25:44.915000Z |
| var-202505-0299 | A vulnerability classified as problematic was found in TOTOLINK N150RT 3.4.0-B20190525. T… | 2025-05-30T23:25:25.532000Z |
| var-202505-2166 | TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a command injection vulne… | 2025-05-30T23:25:25.386000Z |
| var-202404-2116 | A vulnerability was found in Tenda A301 15.13.08.12_multi_TDE01. It has been rated as cri… | 2025-05-30T23:24:34.388000Z |
| var-202504-3332 | A vulnerability classified as critical has been found in Netgear JWNR2000v2 1.0.0.11. Aff… | 2025-05-30T23:24:29.019000Z |
| var-202505-1749 | A vulnerability classified as problematic has been found in D-Link DAP-2695 120b36r137_AL… | 2025-05-30T23:23:34.661000Z |
| var-202505-1833 | A vulnerability classified as problematic was found in D-Link DI-7003GV2 24.04.18D1 R(681… | 2025-05-30T23:23:34.635000Z |
| var-202412-0272 | Stack-based Buffer Overflow vulnerability in Shenzhen Tenda Technology Co Tenda AC6V2 (fr… | 2025-05-30T23:23:08.990000Z |
| var-202505-0242 | NETGEAR RAX5 (AX1600 WiFi Router) V1.0.2.26 was discovered to contain a command injection… | 2025-05-30T23:23:08.201000Z |
| var-201706-0198 | Lenovo Mouse Suite before 6.73 allows local users to run arbitrary code with administrato… | 2025-05-30T23:22:43.033000Z |
| var-202412-2377 | A vulnerability, which was classified as critical, has been found in DrayTek Vigor2960 an… | 2025-05-30T23:22:03.827000Z |
| var-202501-1425 | A vulnerability, which was classified as critical, has been found in Tenda AC8, AC10 and … | 2025-05-30T23:22:03.721000Z |
| var-202504-0829 | A vulnerability was found in Tenda FH1202 1.2.0.14(408). It has been declared as critical… | 2025-05-30T23:22:03.234000Z |
| var-202505-0171 | NETGEAR RAX5 (AX1600 WiFi Router) v1.0.2.26 was discovered to contain a command injection… | 2025-05-30T23:22:03.064000Z |
| var-202412-0271 | Stack-based Buffer Overflow vulnerability in Shenzhen Tenda Technology Co Tenda AC6V2 (se… | 2025-05-30T23:21:28.847000Z |
| var-202505-0127 | NETGEAR RAX5 (AX1600 WiFi Router) V1.0.2.26 was discovered to contain a command injection… | 2025-05-30T23:21:28.022000Z |
| var-202505-1878 | A vulnerability has been found in D-Link DI-7003GV2 24.04.18D1 R(68125) and classified as… | 2025-05-30T23:21:27.890000Z |
| var-202505-0243 | NETGEAR RAX5 (AX1600 WiFi Router) V1.0.2.26 was discovered to contain a command injection… | 2025-05-30T23:20:16.528000Z |
| var-202505-0749 | Tenda FH451 V1.0.0.9 has a stack overflow vulnerability in the function.frmL7ImForm. Shen… | 2025-05-30T23:20:16.488000Z |
| var-202505-0872 | TOTOlink A950RG V4.1.2cu.5204_B20210112 contains a buffer overflow vulnerability. The vul… | 2025-05-30T23:17:22.545000Z |
| var-202505-1101 | Cleartext transmission of sensitive information in the web management portal of the Tenda… | 2025-05-30T23:17:22.520000Z |
| var-202505-2167 | TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow via the… | 2025-05-30T23:17:22.376000Z |
| var-202411-0032 | Floodlight SDN OpenFlow Controller v.1.2 has an issue that allows local hosts to construc… | 2025-05-30T23:16:46.158000Z |
| var-202505-0152 | NETGEAR RAX5 (AX1600 WiFi Router) V1.0.2.26 was discovered to contain a command injection… | 2025-05-30T23:16:45.171000Z |
| var-202505-0406 | TOTOLINK CA600-PoE V5.3c.6665_B20180820 was found to contain a command injection vulnerab… | 2025-05-30T23:16:45.137000Z |
| var-202505-0994 | Improper access controls in the web management portal of the Tenda RX2 Pro 16.03.30.14 al… | 2025-05-30T23:16:45.082000Z |
| var-202505-1895 | A vulnerability was found in D-Link DAP-2695 120b36r137_ALL_en_20210528. It has been rate… | 2025-05-30T23:16:44.999000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2024:1726-1 | Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP5) | 2024-05-21T14:03:42Z | 2024-05-21T14:03:42Z |
| suse-su-2024:1723-1 | Security update for the Linux Kernel RT (Live Patch 11 for SLE 15 SP5) | 2024-05-21T11:33:31Z | 2024-05-21T11:33:31Z |
| suse-su-2024:1720-1 | Security update for the Linux Kernel (Live Patch 35 for SLE 15 SP3) | 2024-05-21T11:03:49Z | 2024-05-21T11:03:49Z |
| suse-su-2024:1719-1 | Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP2) | 2024-05-21T10:04:07Z | 2024-05-21T10:04:07Z |
| suse-su-2024:1712-1 | Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP2) | 2024-05-21T10:03:49Z | 2024-05-21T10:03:49Z |
| suse-su-2024:1713-1 | Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP2) | 2024-05-21T09:33:33Z | 2024-05-21T09:33:33Z |
| suse-su-2024:1711-1 | Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP5) | 2024-05-21T08:34:01Z | 2024-05-21T08:34:01Z |
| suse-su-2024:1709-1 | Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP2) | 2024-05-21T03:33:42Z | 2024-05-21T03:33:42Z |
| suse-su-2024:1708-1 | Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP3) | 2024-05-20T23:34:20Z | 2024-05-20T23:34:20Z |
| suse-su-2024:1707-1 | Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP3) | 2024-05-20T22:11:56Z | 2024-05-20T22:11:56Z |
| suse-su-2024:1706-1 | Security update for the Linux Kernel (Live Patch 38 for SLE 15 SP3) | 2024-05-20T22:11:49Z | 2024-05-20T22:11:49Z |
| suse-su-2024:1705-1 | Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP5) | 2024-05-20T21:10:56Z | 2024-05-20T21:10:56Z |
| suse-su-2024:1704-2 | Security update for cairo | 2024-05-20T18:10:08Z | 2024-05-20T18:10:08Z |
| suse-su-2024:1704-1 | Security update for cairo | 2024-05-20T18:09:50Z | 2024-05-20T18:09:50Z |
| suse-su-2024:1703-1 | Security update for postgresql14 | 2024-05-20T18:09:28Z | 2024-05-20T18:09:28Z |
| suse-su-2024:1702-1 | Security update for krb5 | 2024-05-20T18:09:12Z | 2024-05-20T18:09:12Z |
| suse-su-2024:1700-1 | Security update for libosinfo | 2024-05-20T18:08:48Z | 2024-05-20T18:08:48Z |
| suse-su-2024:1699-1 | Security update for gdk-pixbuf | 2024-05-20T18:08:23Z | 2024-05-20T18:08:23Z |
| suse-su-2024:1698-1 | Security update for python310 | 2024-05-20T18:08:03Z | 2024-05-20T18:08:03Z |
| suse-su-2024:1696-1 | Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP3) | 2024-05-20T17:33:41Z | 2024-05-20T17:33:41Z |
| suse-su-2024:1695-1 | Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP5) | 2024-05-20T15:34:41Z | 2024-05-20T15:34:41Z |
| suse-su-2024:1694-1 | Security update for the Linux Kernel (Live Patch 54 for SLE 12 SP5) | 2024-05-20T15:34:35Z | 2024-05-20T15:34:35Z |
| suse-su-2024:1692-1 | Security update for the Linux Kernel (Live Patch 51 for SLE 12 SP5) | 2024-05-20T15:34:22Z | 2024-05-20T15:34:22Z |
| suse-su-2024:1686-1 | Security update for the Linux Kernel (Live Patch 43 for SLE 12 SP5) | 2024-05-20T15:33:47Z | 2024-05-20T15:33:47Z |
| suse-su-2024:1685-1 | Security update for the Linux Kernel RT (Live Patch 9 for SLE 15 SP5) | 2024-05-20T15:03:54Z | 2024-05-20T15:03:54Z |
| suse-su-2024:1684-1 | Security update for ucode-intel | 2024-05-18T17:58:41Z | 2024-05-18T17:58:41Z |
| suse-su-2024:1683-1 | Security update for the Linux Kernel RT (Live Patch 13 for SLE 15 SP5) | 2024-05-17T20:38:17Z | 2024-05-17T20:38:17Z |
| suse-su-2024:1682-1 | Security update for the Linux Kernel RT (Live Patch 10 for SLE 15 SP5) | 2024-05-17T20:03:49Z | 2024-05-17T20:03:49Z |
| suse-su-2024:1680-1 | Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP5) | 2024-05-17T20:03:37Z | 2024-05-17T20:03:37Z |
| suse-su-2024:1679-1 | Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP5) | 2024-05-17T19:33:35Z | 2024-05-17T19:33:35Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:11108-1 | oci-cli-3.0.2-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11107-1 | obs-service-appimage-0.10.28.1632141620.a8837d3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11106-1 | obs-service-source_validator-0.21-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11105-1 | obs-service-refresh_patches-0.3.9+git.1625238904.d59f20e-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11104-1 | liboath-devel-2.6.7-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11103-1 | libntpc1-1.2.1-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11102-1 | ntp-4.2.8p15-7.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11101-1 | libntfs-3g-devel-2021.8.22-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11100-1 | nsd-4.3.7-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11099-1 | monitoring-plugins-nrpe-4.0.3-3.5 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11098-1 | notary-0.7.0-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11097-1 | nodejs16-16.6.2-2.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11096-1 | nodejs14-14.17.5-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11095-1 | nodejs-underscore-1.13.1-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11094-1 | ncat-7.92-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11093-1 | nim-1.2.12-1.7 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11092-1 | nginx-1.21.3-1.4 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11091-1 | libnghttp2-14-1.43.0-1.6 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11090-1 | libnfsidmap1-1.0-26.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11089-1 | nfdump-1.6.23-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11088-1 | caja-extension-nextcloud-3.3.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11087-1 | nextcloud-22.1.1-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11086-1 | newlib-4.1.0-2.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11085-1 | netty-4.1.60-1.4 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11084-1 | libnetpbm-devel-10.93.0-1.6 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11083-1 | netdata-1.31.0-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11082-1 | libsnmp30-32bit-5.9-3.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11081-1 | neovim-0.5.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11080-1 | libneon-devel-0.31.2-2.6 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11079-1 | neomutt-20210205-3.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-20490 | JetBrains TeamCity跨站请求伪造漏洞 | 2025-07-30 | 2025-09-01 |
| cnvd-2025-20489 | JetBrains TeamCity权限提升漏洞(CNVD-2025-20489) | 2025-07-30 | 2025-09-01 |
| cnvd-2025-20488 | JetBrains TeamCity跨站脚本漏洞 | 2025-07-30 | 2025-09-01 |
| cnvd-2025-20487 | JetBrains TeamCity信息泄露漏洞 | 2025-07-30 | 2025-09-01 |
| cnvd-2025-20486 | Adobe After Effects越界读取漏洞 | 2021-12-27 | 2025-09-01 |
| cnvd-2025-20485 | Adobe Premiere Pro越界读取漏洞 | 2021-12-28 | 2025-09-01 |
| cnvd-2025-20484 | Adobe Premiere Pro释放后重用漏洞 | 2021-12-28 | 2025-09-01 |
| cnvd-2025-20483 | Adobe Media Encoder越界读取漏洞(CNVD-2025-20483) | 2021-12-28 | 2025-09-01 |
| cnvd-2025-20482 | Adobe Media Encoder越界读取漏洞(CNVD-2025-20482) | 2021-12-28 | 2025-09-01 |
| cnvd-2025-20481 | Adobe Media Encoder越界读取漏洞 | 2021-12-28 | 2025-09-01 |
| cnvd-2025-20480 | Adobe Illustrator越界写入漏洞 | 2025-08-20 | 2025-09-01 |
| cnvd-2025-20479 | Adobe Illustrator空指针取消引用漏洞 | 2025-08-20 | 2025-09-01 |
| cnvd-2025-20478 | Adobe Illustrator栈缓冲区溢出漏洞 | 2025-08-20 | 2025-09-01 |
| cnvd-2025-20477 | Adobe Animate释放后重用漏洞(CNVD-2025-20477) | 2025-08-20 | 2025-09-01 |
| cnvd-2025-20476 | Google Chrome释放后重用漏洞(CNVD-2025-20476) | 2024-05-20 | 2025-09-01 |
| cnvd-2025-20475 | Google Chrome堆缓冲区溢出漏洞(CNVD-2025-20475) | 2024-05-23 | 2025-09-01 |
| cnvd-2025-20474 | Google Chrome权限问题漏洞 | 2024-08-22 | 2025-09-01 |
| cnvd-2025-20473 | Google Chrome数据验证不足漏洞 | 2024-08-22 | 2025-09-01 |
| cnvd-2025-20472 | Google Chrome堆缓冲区溢出漏洞 | 2024-08-22 | 2025-09-01 |
| cnvd-2025-20471 | Google Chrome类型混淆漏洞 | 2024-12-17 | 2025-09-01 |
| cnvd-2025-20470 | Google Chrome释放后重用漏洞(CNVD-2025-20470) | 2025-08-01 | 2025-09-01 |
| cnvd-2025-20469 | Google Chrome输入验证错误漏洞 | 2025-08-11 | 2025-09-01 |
| cnvd-2025-20468 | Google ChromeV8引擎越界写入漏洞 | 2025-08-25 | 2025-09-01 |
| cnvd-2025-20398 | JetBrains TeamCity注入漏洞 | 2025-08-27 | 2025-09-01 |
| cnvd-2025-20397 | JetBrains TeamCity权限提升漏洞 | 2025-08-27 | 2025-09-01 |
| cnvd-2025-20396 | Google Chrome释放后重用漏洞 | 2025-08-28 | 2025-09-01 |
| cnvd-2025-19966 | Adobe Premiere Pro越界读取漏洞(CNVD-2025-19966) | 2021-12-27 | 2025-09-01 |
| cnvd-2025-19965 | JetBrains TeamCity存在未明漏洞 | 2024-04-03 | 2025-09-01 |
| cnvd-2025-19964 | Adobe Animate释放后重用漏洞 | 2025-08-20 | 2025-09-01 |
| cnvd-2025-19963 | Google Android权限提升漏洞(CNVD-2025-19963) | 2025-08-28 | 2025-09-01 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2021-avi-406 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2021-05-27T00:00:00.000000 | 2021-05-27T00:00:00.000000 |
| certfr-2021-avi-405 | Multiples vulnérabilités dans le protocole Bluetooth | 2021-05-26T00:00:00.000000 | 2021-05-26T00:00:00.000000 |
| certfr-2021-avi-404 | Multiples vulnérabilités dans Google Chrome | 2021-05-26T00:00:00.000000 | 2021-05-26T00:00:00.000000 |
| certfr-2021-avi-403 | Multiples vulnérabilités dans les produits VMware | 2021-05-26T00:00:00.000000 | 2021-05-26T00:00:00.000000 |
| certfr-2021-avi-402 | Multiples vulnérabilités dans Siemens Solid Edge | 2021-05-26T00:00:00.000000 | 2021-05-26T00:00:00.000000 |
| certfr-2021-avi-401 | Vulnérabilité dans IBM Db2 | 2021-05-26T00:00:00.000000 | 2021-05-26T00:00:00.000000 |
| certfr-2021-avi-400 | Multiples vulnérabilités dans Joomla! | 2021-05-26T00:00:00.000000 | 2021-05-26T00:00:00.000000 |
| certfr-2021-avi-399 | Vulnérabilité dans Nginx | 2021-05-26T00:00:00.000000 | 2021-05-26T00:00:00.000000 |
| certfr-2021-avi-398 | Multiples vulnérabilités dans les produits Apple | 2021-05-25T00:00:00.000000 | 2021-05-25T00:00:00.000000 |
| certfr-2021-avi-197 | Multiples vulnérabilités dans Moxa VPort | 2021-03-16T00:00:00.000000 | 2021-05-25T00:00:00.000000 |
| certfr-2021-avi-397 | Vulnérabilité dans les produits QNAP | 2021-05-21T00:00:00.000000 | 2021-05-21T00:00:00.000000 |
| certfr-2021-avi-396 | Multiples vulnérabilités dans les produits VMware | 2021-05-21T00:00:00.000000 | 2021-05-21T00:00:00.000000 |
| certfr-2021-avi-395 | Multiples vulnérabilités dans IBM Spectrum Control | 2021-05-21T00:00:00.000000 | 2021-05-21T00:00:00.000000 |
| certfr-2021-avi-394 | Multiples vulnérabilités dans les produits Cisco | 2021-05-20T00:00:00.000000 | 2021-05-20T00:00:00.000000 |
| certfr-2021-avi-393 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2021-05-20T00:00:00.000000 | 2021-05-20T00:00:00.000000 |
| certfr-2021-avi-392 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2021-05-20T00:00:00.000000 | 2021-05-20T00:00:00.000000 |
| certfr-2021-avi-391 | Multiples vulnérabilités dans Google Chrome OS | 2021-05-19T00:00:00.000000 | 2021-05-19T00:00:00.000000 |
| certfr-2021-avi-390 | Multiples vulnérabilités dans Mozilla Thunderbird | 2021-05-18T00:00:00.000000 | 2021-05-18T00:00:00.000000 |
| certfr-2021-avi-389 | Vulnérabilité dans Apple Boot Camp | 2021-05-18T00:00:00.000000 | 2021-05-18T00:00:00.000000 |
| certfr-2021-avi-388 | Vulnérabilité dans Stormshield Endpoint Security | 2021-05-18T00:00:00.000000 | 2021-05-18T00:00:00.000000 |
| certfr-2021-avi-387 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2021-05-18T00:00:00.000000 | 2021-05-18T00:00:00.000000 |
| certfr-2021-avi-386 | Multiples vulnérabilités dans Moodle | 2021-05-17T00:00:00.000000 | 2021-05-17T00:00:00.000000 |
| certfr-2021-avi-385 | Multiples vulnérabilités dans les produits Siemens | 2021-05-17T00:00:00.000000 | 2021-05-17T00:00:00.000000 |
| certfr-2021-avi-383 | Multiples vulnérabilités dans Microsoft Edge | 2021-05-14T00:00:00.000000 | 2021-05-14T00:00:00.000000 |
| certfr-2021-avi-382 | Vulnérabilité dans MongoDB | 2021-05-14T00:00:00.000000 | 2021-05-14T00:00:00.000000 |
| certfr-2021-avi-381 | Multiples vulnérabilités dans PostgreSQL | 2021-05-14T00:00:00.000000 | 2021-05-14T00:00:00.000000 |
| certfr-2021-avi-380 | Vulnérabilité dans SonicWall Email Security Virtual Appliance | 2021-05-14T00:00:00.000000 | 2021-05-14T00:00:00.000000 |
| certfr-2021-avi-379 | Multiples vulnérabilités dans les produits Qnap | 2021-05-14T00:00:00.000000 | 2021-05-14T00:00:00.000000 |
| certfr-2021-avi-378 | Multiples vulnérabilités dans WordPress | 2021-05-14T00:00:00.000000 | 2021-05-14T00:00:00.000000 |
| certfr-2021-avi-377 | Vulnérabilité dans Belden HiOS et HiSecOS | 2021-05-14T00:00:00.000000 | 2021-05-14T00:00:00.000000 |