Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2019-25462 |
8.8 (4.0)
8.2 (3.1)
|
Web Ofisi Rent a Car v3 SQL Injection via klima Parameter |
Web-ofisi |
Rent a Car |
2026-02-22T14:12:15.978Z | 2026-02-23T19:03:38.927Z |
| CVE-2026-2954 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Dromara UJCMS ImportDataController import-channel impo… |
Dromara |
UJCMS |
2026-02-22T15:02:17.390Z | 2026-02-23T19:02:26.819Z |
| CVE-2026-2956 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
qinming99 dst-admin restore revertBackup command injection |
qinming99 |
dst-admin |
2026-02-22T22:02:42.385Z | 2026-02-23T19:01:50.411Z |
| CVE-2025-15582 |
5.3 (4.0)
5.4 (3.1)
5.4 (3.0)
|
detronetdip E-commerce Product Management Update autho… |
detronetdip |
E-commerce |
2026-02-20T16:32:07.871Z | 2026-02-23T19:01:50.090Z |
| CVE-2026-2819 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Dromara RuoYi-Vue-Plus Workflow deleteByInstanceIds Sa… |
Dromara |
RuoYi-Vue-Plus |
2026-02-20T01:32:06.214Z | 2026-02-23T19:00:57.578Z |
| CVE-2026-2822 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
JeecgBoot Backend airag_app,1,create_by sql injection |
n/a |
JeecgBoot |
2026-02-20T04:32:10.809Z | 2026-02-23T19:00:13.575Z |
| CVE-2026-3015 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
UTT HiPER 810G formPolicyRouteConf strcpy buffer overflow |
UTT |
HiPER 810G |
2026-02-23T14:32:08.483Z | 2026-02-23T18:53:43.628Z |
| CVE-2026-2962 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
D-Link DWR-M960 Scheduled Reboot Configuration Endpoin… |
D-Link |
DWR-M960 |
2026-02-23T00:32:11.927Z | 2026-02-23T18:48:59.412Z |
| CVE-2026-2588 |
9.1 (3.1)
|
Crypt::NaCl::Sodium versions through 2.001 for Perl ha… |
TIMLEGGE |
Crypt::NaCl::Sodium |
2026-02-22T23:31:19.720Z | 2026-02-23T18:47:51.202Z |
| CVE-2026-22568 |
5.5 (3.1)
|
Unauthorized information retrieval in ZIA Admin UI |
Zscaler |
ZIA Admin UI |
2026-02-23T16:12:52.917Z | 2026-02-23T18:47:28.205Z |
| CVE-2026-1055 |
4.4 (3.1)
|
TalkJS <= 0.1.15 - Authenticated (Administrator+) Stor… |
talkjs |
TalkJS |
2026-02-19T04:36:28.335Z | 2026-02-23T18:47:26.948Z |
| CVE-2026-2705 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Open Babel MOL2 File atom.h SetFormalCharge out-of-bounds |
n/a |
Open Babel |
2026-02-19T05:02:07.101Z | 2026-02-23T18:45:36.455Z |
| CVE-2026-2706 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
code-projects Patient Record Management System fecalys… |
code-projects |
Patient Record Management System |
2026-02-19T06:02:06.881Z | 2026-02-23T18:43:11.040Z |
| CVE-2026-22567 |
7.6 (3.1)
|
ZIA Admin UI Input Validation Bug |
Zscaler |
ZIA Admin UI |
2026-02-23T16:13:32.608Z | 2026-02-23T18:41:19.949Z |
| CVE-2026-27511 |
5.1 (4.0)
4.3 (3.1)
|
Tenda F3 Clickjacking in Web Management Interface |
Shenzhen Tenda Technology Co., Ltd. |
Tenda F3 |
2026-02-23T16:25:49.077Z | 2026-02-23T18:40:25.503Z |
| CVE-2026-2709 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
busy Callback app.js redirect |
n/a |
busy |
2026-02-19T06:32:06.498Z | 2026-02-23T18:38:38.945Z |
| CVE-2026-27512 |
5.1 (4.0)
6.1 (3.1)
|
Tenda F3 Reflected Script Execution via Missing nosnif… |
Shenzhen Tenda Technology Co., Ltd. |
Tenda F3 |
2026-02-23T16:26:20.398Z | 2026-02-23T18:37:42.335Z |
| CVE-2025-70833 |
9.4 (3.1)
|
An Authentication Bypass vulnerability in Smanga … |
n/a |
n/a |
2026-02-20T00:00:00.000Z | 2026-02-23T18:36:57.535Z |
| CVE-2026-27513 |
5.1 (4.0)
4.3 (3.1)
|
Tenda F3 CSRF in Web Management Interface |
Shenzhen Tenda Technology Co., Ltd. |
Tenda F3 |
2026-02-23T16:26:51.559Z | 2026-02-23T18:36:39.743Z |
| CVE-2026-26360 |
8.1 (3.1)
|
Dell Unisphere for PowerMax, version(s) 10.2, con… |
Dell |
Unisphere for PowerMax |
2026-02-19T08:41:00.849Z | 2026-02-23T18:35:11.184Z |
| CVE-2025-41023 |
6.9 (4.0)
|
Authentication bypass in AutoGPT de Thesamur |
Thesamur |
AutoGPT |
2026-02-19T08:50:36.880Z | 2026-02-23T18:33:12.573Z |
| CVE-2026-27514 |
7.1 (4.0)
6.5 (3.1)
|
Tenda F3 Plaintext Credential Exposure in Configuratio… |
Shenzhen Tenda Technology Co., Ltd. |
Tenda F3 |
2026-02-23T16:27:38.171Z | 2026-02-23T18:31:35.987Z |
| CVE-2025-15559 |
9.8 (3.1)
|
Unauthenticated OS Command Injection in NesterSoft WorkTime |
NesterSoft Inc. |
WorkTime (on-prem/cloud) |
2026-02-19T10:45:34.943Z | 2026-02-23T18:30:52.019Z |
| CVE-2025-15560 |
8.8 (3.1)
|
SQL Injection in NesterSoft WorkTime |
NesterSoft Inc. |
WorkTime (on-prem/cloud) |
2026-02-19T10:48:43.486Z | 2026-02-23T18:29:08.299Z |
| CVE-2025-15561 |
7.8 (3.1)
|
Local Privilege Escalation in NesterSoft WorkTime |
NesterSoft Inc. |
WorkTime (on-prem/cloud) |
2026-02-19T10:53:18.501Z | 2026-02-23T18:26:47.903Z |
| CVE-2025-67438 |
6.1 (3.1)
|
A Stored Cross-Site Scripting (XSS) vulnerability… |
n/a |
n/a |
2026-02-20T00:00:00.000Z | 2026-02-23T18:25:08.748Z |
| CVE-2026-1581 |
7.5 (3.1)
|
wpForo Forum <= 2.4.14 - Unauthenticated Time-Based SQ… |
tomdever |
wpForo Forum |
2026-02-19T16:24:55.855Z | 2026-02-23T18:24:37.511Z |
| CVE-2026-2232 |
7.5 (3.1)
|
Product Table and List Builder for WooCommerce Lite <=… |
wcproducttable |
Product Table and List Builder for WooCommerce Lite |
2026-02-19T16:24:56.496Z | 2026-02-23T18:23:06.338Z |
| CVE-2026-1369 |
4.3 (3.1)
|
Conditional CAPTCHA <= 4.0.0 - Open Redirect |
Unknown |
Conditional CAPTCHA |
2026-02-22T06:00:02.222Z | 2026-02-23T18:19:58.115Z |
| CVE-2026-2698 |
6.5 (3.1)
5.7 (4.0)
|
Improper Access Control |
Tenable |
Security Center |
2026-02-23T16:28:07.711Z | 2026-02-23T18:17:26.382Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-57708 |
2.3 (4.0)
|
Qsync Central |
QNAP Systems Inc. |
Qsync Central |
2026-02-11T12:17:27.631Z | 2026-02-11T15:43:46.025Z |
| CVE-2025-57709 |
1.3 (4.0)
|
Qsync Central |
QNAP Systems Inc. |
Qsync Central |
2026-02-11T12:17:22.554Z | 2026-02-11T15:43:51.003Z |
| CVE-2025-57710 |
3.6 (4.0)
|
Qsync Central |
QNAP Systems Inc. |
Qsync Central |
2026-02-11T12:17:16.943Z | 2026-02-11T15:43:57.824Z |
| CVE-2025-57711 |
3.6 (4.0)
|
Qsync Central |
QNAP Systems Inc. |
Qsync Central |
2026-02-11T12:17:11.126Z | 2026-02-11T16:56:55.874Z |
| CVE-2025-58467 |
1.3 (4.0)
|
Qsync Central |
QNAP Systems Inc. |
Qsync Central |
2026-02-11T12:16:46.830Z | 2026-02-11T16:54:19.711Z |
| CVE-2025-58470 |
1.3 (4.0)
|
Qsync Central |
QNAP Systems Inc. |
Qsync Central |
2026-02-11T12:16:38.831Z | 2026-02-11T16:52:58.831Z |
| CVE-2025-58471 |
1.2 (4.0)
|
Qsync Central |
QNAP Systems Inc. |
Qsync Central |
2026-02-11T12:16:32.407Z | 2026-02-11T15:47:06.495Z |
| CVE-2025-58472 |
1.2 (4.0)
|
Qsync Central |
QNAP Systems Inc. |
Qsync Central |
2026-02-11T12:16:26.763Z | 2026-02-11T15:48:46.190Z |
| CVE-2025-68406 |
1.3 (4.0)
|
Qsync Central |
QNAP Systems Inc. |
Qsync Central |
2026-02-11T12:15:30.860Z | 2026-02-11T16:43:00.799Z |
| CVE-2025-52869 |
0.6 (4.0)
|
Qsync Central |
QNAP Systems Inc. |
Qsync Central |
2026-02-11T12:19:05.466Z | 2026-02-11T14:53:55.316Z |
| CVE-2025-52870 |
0.6 (4.0)
|
Qsync Central |
QNAP Systems Inc. |
Qsync Central |
2026-02-11T12:18:59.439Z | 2026-02-11T16:59:50.333Z |
| CVE-2025-53598 |
0.6 (4.0)
|
Qsync Central |
QNAP Systems Inc. |
Qsync Central |
2026-02-11T12:18:54.742Z | 2026-02-11T16:59:33.191Z |
| CVE-2025-54146 |
1.3 (4.0)
|
Qsync Central |
QNAP Systems Inc. |
Qsync Central |
2026-02-11T12:18:50.129Z | 2026-02-11T16:59:15.991Z |
| CVE-2025-54147 |
1.3 (4.0)
|
Qsync Central |
QNAP Systems Inc. |
Qsync Central |
2026-02-11T12:18:45.923Z | 2026-02-11T16:58:56.313Z |
| CVE-2025-54148 |
1.3 (4.0)
|
Qsync Central |
QNAP Systems Inc. |
Qsync Central |
2026-02-11T12:18:40.809Z | 2026-02-11T16:58:32.698Z |
| CVE-2025-54149 |
4.9 (4.0)
|
Qsync Central |
QNAP Systems Inc. |
Qsync Central |
2026-02-11T12:18:34.659Z | 2026-02-11T16:58:13.445Z |
| CVE-2025-54150 |
4.9 (4.0)
|
Qsync Central |
QNAP Systems Inc. |
Qsync Central |
2026-02-11T12:18:29.651Z | 2026-02-11T16:57:37.867Z |
| CVE-2025-54151 |
4.9 (4.0)
|
Qsync Central |
QNAP Systems Inc. |
Qsync Central |
2026-02-11T12:18:23.495Z | 2026-02-11T15:43:18.985Z |
| CVE-2025-54152 |
1.3 (4.0)
|
Qsync Central |
QNAP Systems Inc. |
Qsync Central |
2026-02-11T12:18:16.611Z | 2026-02-11T15:43:24.212Z |
| CVE-2025-41768 |
5.5 (3.1)
|
Beckhoff: XSS Vulnerability in TwinCAT 3 HMI Server |
Beckhoff Automation |
TwinCAT.HMI.Server |
2026-01-20T08:02:53.356Z | 2026-02-12T09:00:27.685Z |
| CVE-2025-38234 |
N/A
|
sched/rt: Fix race in push_rt_task |
Linux |
Linux |
2025-07-04T13:37:46.960Z | 2026-02-12T08:19:23.791Z |
| CVE-2025-38201 |
N/A
|
netfilter: nft_set_pipapo: clamp maximum map bucket si… |
Linux |
Linux |
2025-07-04T13:37:22.732Z | 2026-02-12T08:19:22.366Z |
| CVE-2025-37822 |
N/A
|
riscv: uprobes: Add missing fence.i after building the… |
Linux |
Linux |
2025-05-08T06:26:16.209Z | 2026-02-12T08:19:20.991Z |
| CVE-2024-42079 |
N/A
|
gfs2: Fix NULL pointer dereference in gfs2_log_flush |
Linux |
Linux |
2024-07-29T15:52:41.360Z | 2026-02-12T08:19:19.560Z |
| CVE-2025-12059 |
9.8 (3.1)
|
Improper Access Control in Logo Software's Logo j-Platform |
Logo Software Industry and Trade Inc. |
Logo j-Platform |
2026-02-11T13:58:53.142Z | 2026-02-12T07:53:32.214Z |
| CVE-2024-57049 |
9.8 (3.1)
|
A vulnerability in the TP-Link Archer c20 router … |
n/a |
n/a |
2025-02-18T00:00:00.000Z | 2026-02-12T05:03:22.325Z |
| CVE-2026-26092 |
N/A
|
Not used | N/A | N/A | 2026-02-12T03:55:05.795Z | |
| CVE-2026-26091 |
N/A
|
Not used | N/A | N/A | 2026-02-12T03:55:06.293Z | |
| CVE-2026-26090 |
N/A
|
Not used | N/A | N/A | 2026-02-12T03:55:06.741Z | |
| CVE-2026-26089 |
N/A
|
Not used | N/A | N/A | 2026-02-12T03:55:07.229Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-57708 | An allocation of resources without limits or throttling vulnerability has been reported to affect Q… | 2026-02-11T13:15:55.757 | 2026-02-12T14:47:29.717 |
| fkie_cve-2025-57709 | A buffer overflow vulnerability has been reported to affect Qsync Central. If a remote attacker gai… | 2026-02-11T13:15:55.897 | 2026-02-12T14:46:09.850 |
| fkie_cve-2025-57710 | An allocation of resources without limits or throttling vulnerability has been reported to affect Q… | 2026-02-11T13:15:56.037 | 2026-02-12T14:41:27.283 |
| fkie_cve-2025-57711 | An allocation of resources without limits or throttling vulnerability has been reported to affect Q… | 2026-02-11T13:15:56.170 | 2026-02-12T14:41:07.550 |
| fkie_cve-2025-58467 | A relative path traversal vulnerability has been reported to affect Qsync Central. If a remote atta… | 2026-02-11T13:15:56.587 | 2026-02-12T14:40:38.657 |
| fkie_cve-2025-58470 | A path traversal vulnerability has been reported to affect Qsync Central. If a remote attacker gain… | 2026-02-11T13:15:56.830 | 2026-02-12T14:40:15.713 |
| fkie_cve-2025-58471 | An allocation of resources without limits or throttling vulnerability has been reported to affect Q… | 2026-02-11T13:15:56.997 | 2026-02-12T14:39:39.150 |
| fkie_cve-2025-58472 | A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote att… | 2026-02-11T13:15:57.397 | 2026-02-12T14:12:48.840 |
| fkie_cve-2025-68406 | A path traversal vulnerability has been reported to affect Qsync Central. If a remote attacker gain… | 2026-02-11T13:15:58.640 | 2026-02-12T14:12:12.053 |
| fkie_cve-2025-52869 | A buffer overflow vulnerability has been reported to affect Qsync Central. If a remote attacker gai… | 2026-02-11T13:15:53.377 | 2026-02-12T13:33:19.957 |
| fkie_cve-2025-52870 | A buffer overflow vulnerability has been reported to affect Qsync Central. If a remote attacker gai… | 2026-02-11T13:15:53.513 | 2026-02-12T13:32:53.600 |
| fkie_cve-2025-53598 | A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote att… | 2026-02-11T13:15:53.647 | 2026-02-12T13:32:12.840 |
| fkie_cve-2025-54146 | A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote att… | 2026-02-11T13:15:53.787 | 2026-02-12T13:31:43.387 |
| fkie_cve-2025-54147 | A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote att… | 2026-02-11T13:15:53.923 | 2026-02-12T13:31:27.300 |
| fkie_cve-2025-54148 | A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote att… | 2026-02-11T13:15:54.063 | 2026-02-12T13:31:01.027 |
| fkie_cve-2025-54149 | An uncontrolled resource consumption vulnerability has been reported to affect Qsync Central. If a … | 2026-02-11T13:15:54.203 | 2026-02-12T13:30:14.533 |
| fkie_cve-2025-54150 | An uncontrolled resource consumption vulnerability has been reported to affect Qsync Central. If a … | 2026-02-11T13:15:54.340 | 2026-02-12T13:29:45.750 |
| fkie_cve-2025-54151 | An uncontrolled resource consumption vulnerability has been reported to affect Qsync Central. If a … | 2026-02-11T13:15:54.483 | 2026-02-12T13:29:25.920 |
| fkie_cve-2025-54152 | A use of out-of-range pointer offset vulnerability has been reported to affect Qsync Central. If a … | 2026-02-11T13:15:54.613 | 2026-02-12T13:28:06.267 |
| fkie_cve-2025-41768 | An high privileged remote attacker can inject arbitrary content into the custom CSS field on the af… | 2026-01-20T09:15:59.123 | 2026-02-12T09:16:07.780 |
| fkie_cve-2025-38234 | In the Linux kernel, the following vulnerability has been resolved: sched/rt: Fix race in push_rt_… | 2025-07-04T14:15:33.087 | 2026-02-12T09:16:07.240 |
| fkie_cve-2025-38201 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: cla… | 2025-07-04T14:15:28.000 | 2026-02-12T09:16:07.100 |
| fkie_cve-2025-37822 | In the Linux kernel, the following vulnerability has been resolved: riscv: uprobes: Add missing fe… | 2025-05-08T07:15:53.427 | 2026-02-12T09:16:06.950 |
| fkie_cve-2024-42079 | In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix NULL pointer derefer… | 2024-07-29T16:15:07.180 | 2026-02-12T09:16:06.777 |
| fkie_cve-2025-12059 | Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in Lo… | 2026-02-11T15:16:12.470 | 2026-02-12T08:16:00.800 |
| fkie_cve-2024-57049 | A vulnerability in the TP-Link Archer c20 router with firmware version V6.6_230412 and earlier perm… | 2025-02-18T15:15:16.890 | 2026-02-12T06:16:00.430 |
| fkie_cve-2026-26092 | Rejected reason: Not used | 2026-02-12T05:17:06.433 | 2026-02-12T05:17:06.433 |
| fkie_cve-2026-26091 | Rejected reason: Not used | 2026-02-12T05:17:06.373 | 2026-02-12T05:17:06.373 |
| fkie_cve-2026-26090 | Rejected reason: Not used | 2026-02-12T05:17:06.327 | 2026-02-12T05:17:06.327 |
| fkie_cve-2026-26089 | Rejected reason: Not used | 2026-02-12T05:17:06.267 | 2026-02-12T05:17:06.267 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-v97q-699f-9m4x |
5.5 (3.1)
|
In imgsys, there is a possible memory corruption due to improper locking. This could lead to local … | 2026-02-02T09:30:31Z | 2026-02-03T00:30:18Z |
| ghsa-r9vx-549f-9225 |
7.5 (3.1)
|
In Modem, there is a possible system crash due to improper input validation. This could lead to rem… | 2026-02-02T09:30:31Z | 2026-02-03T00:30:18Z |
| ghsa-r8cg-vqg3-34j4 |
0.0 (4.0)
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-02-03T00:30:18Z | 2026-02-03T00:30:18Z |
| ghsa-qr4c-wx99-f4h5 |
2.1 (4.0)
|
Vulnerability in Wikimedia Foundation MediaWiki. This vulnerability is associated with program file… | 2026-02-03T00:30:18Z | 2026-02-03T00:30:18Z |
| ghsa-mv9h-82v8-3r9p |
2.1 (4.0)
|
Vulnerability in Wikimedia Foundation MediaWiki. This vulnerability is associated with program file… | 2026-02-03T00:30:18Z | 2026-02-03T00:30:18Z |
| ghsa-gpf2-rxq3-v5rj |
7.1 (3.1)
|
IBM Business Automation Workflow containers V25.0.0 through V25.0.0-IF007, V24.0.1 - V24.0.1-IF007,… | 2026-02-03T00:30:18Z | 2026-02-03T00:30:18Z |
| ghsa-gc6v-8f4f-xvwp |
4.6 (4.0)
|
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Wikimedia Foundation Me… | 2026-02-03T00:30:18Z | 2026-02-03T00:30:18Z |
| ghsa-fg7c-83g8-7vg3 |
7.5 (3.1)
|
In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote… | 2026-02-02T09:30:31Z | 2026-02-03T00:30:18Z |
| ghsa-f3h2-gg3v-pg72 |
7.5 (3.1)
|
In Modem, there is a possible system crash due to incorrect error handling. This could lead to remo… | 2026-02-02T09:30:31Z | 2026-02-03T00:30:18Z |
| ghsa-cr4g-4vcj-5vxw |
7.8 (3.1)
|
In imgsys, there is a possible out of bounds write due to a missing bounds check. This could lead t… | 2026-02-02T09:30:31Z | 2026-02-03T00:30:18Z |
| ghsa-c2mj-vhqc-93h7 |
5.3 (3.1)
|
In pcie, there is a possible out of bounds write due to a missing bounds check. This could lead to … | 2026-02-02T09:30:31Z | 2026-02-03T00:30:18Z |
| ghsa-9r44-56w8-gqrx |
2.1 (4.0)
|
Vulnerability in Wikimedia Foundation AbuseFilter. This vulnerability is associated with program fi… | 2026-02-03T00:30:18Z | 2026-02-03T00:30:18Z |
| ghsa-9cpp-gf7m-944g |
5.9 (3.1)
|
IBM Concert 1.0.0 through 2.1.0 uses weaker than expected cryptographic algorithms that could allow… | 2026-02-03T00:30:18Z | 2026-02-03T00:30:18Z |
| ghsa-84w3-v7pc-5h8q |
8.8 (3.1)
|
In wlan STA driver, there is a possible escalation of privilege due to a missing bounds check. This… | 2026-02-02T09:30:31Z | 2026-02-03T00:30:18Z |
| ghsa-6876-43rc-gjmq |
7.5 (3.1)
|
In Modem, there is a possible system crash due to an uncaught exception. This could lead to remote … | 2026-02-02T09:30:31Z | 2026-02-03T00:30:18Z |
| ghsa-5rj2-f4xf-8m9q |
6.0 (4.0)
|
Brocade SANnav before Brocade SANnav 2.4.0b logs database passwords in clear text in the standby SA… | 2026-02-03T00:30:18Z | 2026-02-03T00:30:18Z |
| ghsa-5rc9-qhhx-3j46 |
7.3 (4.0)
|
BuhoCleaner contains an insecure XPC service that allows local, unprivileged users to escalate thei… | 2026-02-03T00:30:18Z | 2026-02-03T00:30:18Z |
| ghsa-522m-952c-996v |
7.5 (3.1)
|
In Modem, there is a possible system crash due to improper input validation. This could lead to rem… | 2026-02-02T09:30:31Z | 2026-02-03T00:30:18Z |
| ghsa-33j4-gghf-cv63 |
7.1 (4.0)
|
A vulnerability in Brocade SANnav before 2.4.0b prints the Password-Based Encryption (PBE) key in … | 2026-02-03T00:30:18Z | 2026-02-03T00:30:18Z |
| ghsa-2rrf-rvr2-f97v |
7.5 (3.1)
|
In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote… | 2026-02-02T09:30:31Z | 2026-02-03T00:30:18Z |
| ghsa-mr6c-6hx8-737r |
7.5 (3.1)
|
An out-of-bounds read in the http_parser_transfer_encoding_chunked function (mk_server/mk_http_pars… | 2026-01-29T21:30:30Z | 2026-02-03T00:30:17Z |
| ghsa-jwvj-46jj-5gv7 |
7.5 (3.1)
|
In Modem, there is a possible system crash due to improper input validation. This could lead to rem… | 2026-02-02T09:30:31Z | 2026-02-03T00:30:17Z |
| ghsa-4wp9-cf5h-v2g5 |
10.0 (3.1)
|
Vulnerability in the Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in product of Oracle Fus… | 2026-01-21T00:31:43Z | 2026-02-03T00:30:17Z |
| ghsa-39h2-3mq3-959g |
5.7 (4.0)
|
When folding a long comment in an email header containing exclusively unfoldable characters, the pa… | 2026-01-21T00:31:42Z | 2026-02-03T00:30:17Z |
| ghsa-7p24-rq5q-3rrv |
8.2 (3.1)
|
Aggie 2.6.1 has a Host Header injection vulnerability in the forgot password functionality, allowin… | 2025-10-16T15:30:43Z | 2026-02-03T00:30:16Z |
| ghsa-g8p2-7wf7-98mq |
8.8 (3.1)
|
OpenClaw/Clawdbot has 1-Click RCE via Authentication Token Exfiltration From gatewayUrl | 2026-02-02T23:41:05Z | 2026-02-02T23:41:05Z |
| ghsa-qp2j-v5jg-hg68 |
7.1 (3.1)
7.1 (4.0)
|
LibreNMS contains an authenticated SQL Injection vulnerability | 2026-01-27T18:32:14Z | 2026-02-02T23:19:09Z |
| ghsa-fm4j-4xhm-xpwx |
|
Sandbox Breakout / Arbitrary Code Execution in sandbox | 2020-09-02T15:51:34Z | 2026-02-02T23:13:21Z |
| ghsa-gc25-3vc5-2jf9 |
|
Sandbox Breakout / Arbitrary Code Execution in sandbox | 2020-09-04T15:00:58Z | 2026-02-02T23:12:39Z |
| ghsa-gj28-gw7w-3pxc |
4.5 (4.0)
|
Crafter CMS has Improper Control of Dynamically-Managed Code Resources | 2026-02-02T18:31:33Z | 2026-02-02T22:36:58Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-2799 | The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cro… | 2024-04-03T05:02:25.687513Z |
| gsd-2024-2951 | Cross-Site Request Forgery (CSRF) vulnerability in Metagauss RegistrationMagic.This issue… | 2024-04-03T05:02:25.685349Z |
| gsd-2024-2933 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.684403Z |
| gsd-2024-2955 | T.38 dissector crash in Wireshark 4.2.0 to 4.0.3 and 4.0.0 to 4.0.13 allows denial of ser… | 2024-04-03T05:02:25.683058Z |
| gsd-2024-2758 | Tempesta FW rate limits are not enabled by default. They are either set too large to capt… | 2024-04-03T05:02:25.682571Z |
| gsd-2024-2853 | A vulnerability was found in Tenda AC10U 15.03.06.48/15.03.06.49. It has been rated as cr… | 2024-04-03T05:02:25.679374Z |
| gsd-2024-2750 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.674473Z |
| gsd-2024-2843 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.668273Z |
| gsd-2024-2987 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.665943Z |
| gsd-2024-2803 | The ElementsKit Elementor addons plugin for WordPress is vulnerable to Stored Cross-Site … | 2024-04-03T05:02:25.665610Z |
| gsd-2024-2788 | The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Sc… | 2024-04-03T05:02:25.662400Z |
| gsd-2024-2957 | The Simple Ajax Chat – Add a Fast, Secure Chat Box plugin for WordPress is vulnerable to … | 2024-04-03T05:02:25.660218Z |
| gsd-2024-2970 | The News Wall plugin for WordPress is vulnerable to Cross-Site Request Forgery in all ver… | 2024-04-03T05:02:25.659702Z |
| gsd-2024-2883 | Use after free in ANGLE in Google Chrome prior to 123.0.6312.86 allowed a remote attacker… | 2024-04-03T05:02:25.658942Z |
| gsd-2024-2925 | The Beaver Builder – WordPress Page Builder plugin for WordPress is vulnerable to Stored … | 2024-04-03T05:02:25.657802Z |
| gsd-2024-2875 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.656432Z |
| gsd-2024-2971 | Out-of-bounds array write in Xpdf 4.05 and earlier, triggered by negative object number i… | 2024-04-03T05:02:25.654975Z |
| gsd-2024-2926 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.653365Z |
| gsd-2024-2701 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.651096Z |
| gsd-2024-2984 | A vulnerability was found in Tenda FH1202 1.2.0.14(408). It has been classified as critic… | 2024-04-03T05:02:25.648816Z |
| gsd-2024-2898 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.646720Z |
| gsd-2024-2860 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.645144Z |
| gsd-2024-2783 | The GamiPress – The #1 gamification plugin to reward points, achievements, badges & ranks… | 2024-04-03T05:02:25.638436Z |
| gsd-2024-2749 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.636498Z |
| gsd-2024-2893 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.635972Z |
| gsd-2024-2965 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.631833Z |
| gsd-2024-2981 | A vulnerability, which was classified as critical, was found in Tenda FH1202 1.2.0.14(408… | 2024-04-03T05:02:25.631168Z |
| gsd-2024-2826 | A vulnerability classified as problematic was found in lakernote EasyAdmin up to 20240315… | 2024-04-03T05:02:25.630363Z |
| gsd-2024-2779 | A vulnerability was found in Campcodes Online Marriage Registration System 1.0. It has be… | 2024-04-03T05:02:25.626119Z |
| gsd-2024-2870 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.625238Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-190521 | Malicious code in node-calculator-7bea (npm) | 2025-11-17T13:15:47Z | 2025-11-17T17:39:46Z |
| mal-2025-190519 | Malicious code in node-calculator-fc9a (npm) | 2025-11-17T12:22:32Z | 2025-11-17T17:39:46Z |
| mal-2025-190518 | Malicious code in node-calculator-9e41 (npm) | 2025-11-17T12:35:48Z | 2025-11-17T17:39:46Z |
| mal-2025-190517 | Malicious code in node-calculator-1b6e (npm) | 2025-11-17T12:30:37Z | 2025-11-17T17:39:46Z |
| mal-2025-190515 | Malicious code in node-calculator-f4d5 (npm) | 2025-11-17T09:53:01Z | 2025-11-17T17:39:46Z |
| mal-2025-190514 | Malicious code in node-calculator-6a88 (npm) | 2025-11-17T09:46:04Z | 2025-11-17T17:39:46Z |
| mal-2025-190513 | Malicious code in tailwind-view-ui (npm) | 2025-11-17T04:56:07Z | 2025-11-17T17:39:46Z |
| mal-2025-190511 | Malicious code in signals-embed (npm) | 2025-11-17T01:25:04Z | 2025-11-17T17:39:46Z |
| mal-2025-190510 | Malicious code in react-native-animated-shine (npm) | 2025-11-17T01:02:56Z | 2025-11-17T17:39:46Z |
| mal-2025-190509 | Malicious code in react-confetti-modern (npm) | 2025-11-17T01:02:55Z | 2025-11-17T17:39:46Z |
| mal-2025-190501 | Malicious code in tailwind-styled-scrollbar (npm) | 2025-11-17T00:27:47Z | 2025-11-17T17:39:46Z |
| mal-2025-190497 | Malicious code in tailwindcss-setflex (npm) | 2025-11-14T03:46:55Z | 2025-11-17T17:39:46Z |
| mal-2025-190508 | Malicious code in integrator-filescrypt2025 (npm) | 2025-11-17T01:25:04Z | 2025-11-17T17:39:45Z |
| mal-2025-190507 | Malicious code in integrator-2830 (npm) | 2025-11-17T01:25:04Z | 2025-11-17T17:39:45Z |
| mal-2025-190506 | Malicious code in integrator-2829 (npm) | 2025-11-17T01:25:04Z | 2025-11-17T17:39:45Z |
| mal-2025-190505 | Malicious code in dsidospsodlks (npm) | 2025-11-17T01:25:04Z | 2025-11-17T17:39:45Z |
| mal-2025-190499 | Malicious code in filifecycleserv-paypal (npm) | 2025-11-15T19:18:44Z | 2025-11-17T17:39:45Z |
| mal-2025-190512 | Malicious code in bcryptkit (npm) | 2025-11-17T02:03:03Z | 2025-11-17T17:39:44Z |
| mal-2025-190504 | Malicious code in chai-proxify (npm) | 2025-11-17T01:13:58Z | 2025-11-17T17:39:44Z |
| mal-2025-190503 | Malicious code in applicationooks21 (npm) | 2025-11-17T01:25:04Z | 2025-11-17T17:39:44Z |
| mal-2025-190502 | Malicious code in application-phskck (npm) | 2025-11-17T01:25:04Z | 2025-11-17T17:39:44Z |
| mal-2025-190500 | Malicious code in com.mixpanel.unity (npm) | 2025-11-16T19:46:57Z | 2025-11-17T17:39:44Z |
| mal-2025-190546 | Malicious code in node-calculator-feea (npm) | 2025-11-17T17:14:41Z | 2025-11-17T17:14:41Z |
| mal-2025-190545 | Malicious code in node-calculator-f209 (npm) | 2025-11-17T17:14:41Z | 2025-11-17T17:14:41Z |
| mal-2025-190544 | Malicious code in node-calculator-ecec (npm) | 2025-11-17T17:14:41Z | 2025-11-17T17:14:41Z |
| mal-2025-190543 | Malicious code in node-calculator-e0b2 (npm) | 2025-11-17T17:14:41Z | 2025-11-17T17:14:41Z |
| mal-2025-190542 | Malicious code in node-calculator-de84 (npm) | 2025-11-17T17:14:41Z | 2025-11-17T17:14:41Z |
| mal-2025-190541 | Malicious code in node-calculator-d234 (npm) | 2025-11-17T17:14:41Z | 2025-11-17T17:14:41Z |
| mal-2025-190540 | Malicious code in node-calculator-c3ef (npm) | 2025-11-17T17:14:41Z | 2025-11-17T17:14:41Z |
| mal-2025-190535 | Malicious code in node-calculator-98b6 (npm) | 2025-11-17T17:14:41Z | 2025-11-17T17:14:41Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-3260 | Fortinet FortiManager: Schwachstelle ermöglicht Codeausführung | 2024-10-22T22:00:00.000+00:00 | 2024-10-23T22:00:00.000+00:00 |
| wid-sec-w-2024-3119 | Google Chrome und Microsoft Edge: Mehrere Schwachstellen | 2024-10-08T22:00:00.000+00:00 | 2024-10-23T22:00:00.000+00:00 |
| wid-sec-w-2024-2163 | Google Chrome: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2024-09-17T22:00:00.000+00:00 | 2024-10-23T22:00:00.000+00:00 |
| wid-sec-w-2024-1099 | python-crypto: Mehrere Schwachstellen | 2018-12-10T23:00:00.000+00:00 | 2024-10-23T22:00:00.000+00:00 |
| wid-sec-w-2024-0741 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2024-03-27T23:00:00.000+00:00 | 2024-10-23T22:00:00.000+00:00 |
| wid-sec-w-2024-0437 | QEMU: Schwachstelle ermöglicht Codeausführung | 2024-02-20T23:00:00.000+00:00 | 2024-10-23T22:00:00.000+00:00 |
| wid-sec-w-2024-0086 | Linux Kernel: Mehrere Schwachstellen | 2024-01-15T23:00:00.000+00:00 | 2024-10-23T22:00:00.000+00:00 |
| wid-sec-w-2024-0072 | Linux Kernel: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-01-11T23:00:00.000+00:00 | 2024-10-23T22:00:00.000+00:00 |
| wid-sec-w-2024-0071 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2024-01-11T23:00:00.000+00:00 | 2024-10-23T22:00:00.000+00:00 |
| wid-sec-w-2024-0070 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2024-01-11T23:00:00.000+00:00 | 2024-10-23T22:00:00.000+00:00 |
| wid-sec-w-2023-2835 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2023-11-06T23:00:00.000+00:00 | 2024-10-23T22:00:00.000+00:00 |
| wid-sec-w-2024-3258 | Netgate pfSense: Schwachstelle ermöglicht Cross-Site Scripting | 2024-10-22T22:00:00.000+00:00 | 2024-10-22T22:00:00.000+00:00 |
| wid-sec-w-2024-3256 | Trend Micro AntiVirus: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2024-10-22T22:00:00.000+00:00 | 2024-10-22T22:00:00.000+00:00 |
| wid-sec-w-2024-3252 | Liferay DXP und Portal: Mehrere Schwachstellen | 2024-10-22T22:00:00.000+00:00 | 2024-10-22T22:00:00.000+00:00 |
| wid-sec-w-2024-3095 | Samsung Android: Mehrere Schwachstellen | 2024-10-07T22:00:00.000+00:00 | 2024-10-22T22:00:00.000+00:00 |
| wid-sec-w-2024-3091 | Samsung Exynos: Schwachstelle ermöglicht Privilegieneskalation | 2024-10-06T22:00:00.000+00:00 | 2024-10-22T22:00:00.000+00:00 |
| wid-sec-w-2024-2220 | Foxit PDF Editor und Reader: Mehrere Schwachstellen | 2024-09-25T22:00:00.000+00:00 | 2024-10-22T22:00:00.000+00:00 |
| wid-sec-w-2024-2050 | HAProxy Enterprise und ALOHA: Schwachstelle ermöglicht Denial of Service | 2024-09-03T22:00:00.000+00:00 | 2024-10-22T22:00:00.000+00:00 |
| wid-sec-w-2024-1759 | Foxit PDF Editor: Mehrere Schwachstellen | 2024-08-05T22:00:00.000+00:00 | 2024-10-22T22:00:00.000+00:00 |
| wid-sec-w-2024-1584 | Microsoft Office: Mehrere Schwachstellen | 2024-07-09T22:00:00.000+00:00 | 2024-10-22T22:00:00.000+00:00 |
| wid-sec-w-2024-0418 | Apache Camel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-02-18T23:00:00.000+00:00 | 2024-10-22T22:00:00.000+00:00 |
| wid-sec-w-2024-3248 | Irfan Skiljan IrfanView: Schwachstelle ermöglicht Denial of Service | 2024-10-21T22:00:00.000+00:00 | 2024-10-21T22:00:00.000+00:00 |
| wid-sec-w-2024-3247 | Zyxel Firewall: Schwachstelle ermöglicht Privilegieneskalation | 2024-10-21T22:00:00.000+00:00 | 2024-10-21T22:00:00.000+00:00 |
| wid-sec-w-2024-3174 | Mozilla Firefox: Schwachstelle ermöglicht Denial of Service | 2024-10-14T22:00:00.000+00:00 | 2024-10-21T22:00:00.000+00:00 |
| wid-sec-w-2024-1318 | Roundcube: Mehrere Schwachstellen | 2024-06-06T22:00:00.000+00:00 | 2024-10-21T22:00:00.000+00:00 |
| wid-sec-w-2024-1193 | Roundcube: Mehrere Schwachstellen | 2024-05-20T22:00:00.000+00:00 | 2024-10-21T22:00:00.000+00:00 |
| wid-sec-w-2024-3245 | MariaDB: Schwachstelle ermöglicht Codeausführung | 2024-10-20T22:00:00.000+00:00 | 2024-10-20T22:00:00.000+00:00 |
| wid-sec-w-2024-3244 | HPE OneView: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-10-20T22:00:00.000+00:00 | 2024-10-20T22:00:00.000+00:00 |
| wid-sec-w-2024-3243 | IBM SPSS: Schwachstelle ermöglicht Denial of Service | 2024-10-20T22:00:00.000+00:00 | 2024-10-20T22:00:00.000+00:00 |
| wid-sec-w-2024-3242 | Asterisk: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-10-20T22:00:00.000+00:00 | 2024-10-20T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2022:0318 | Red Hat Security Advisory: Red Hat OpenShift distributed tracing 2.1.0 security update | 2022-01-27T16:52:20+00:00 | 2026-01-28T22:15:07+00:00 |
| rhsa-2022:0163 | Red Hat Security Advisory: Cryostat security update | 2022-01-18T16:36:19+00:00 | 2026-01-28T22:15:06+00:00 |
| rhsa-2022:0002 | Red Hat Security Advisory: grafana security update | 2022-01-03T07:54:50+00:00 | 2026-01-28T22:15:05+00:00 |
| rhsa-2022:0001 | Red Hat Security Advisory: grafana security update | 2022-01-03T07:53:46+00:00 | 2026-01-28T22:15:04+00:00 |
| rhsa-2021:5160 | Red Hat Security Advisory: go-toolset:rhel8 security and bug fix update | 2021-12-15T16:33:39+00:00 | 2026-01-28T22:15:02+00:00 |
| rhsa-2021:5072 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (etcd) security update | 2021-12-09T20:19:15+00:00 | 2026-01-28T22:15:01+00:00 |
| rhsa-2021:4766 | Red Hat Security Advisory: Release of OpenShift Serverless 1.19.0 | 2021-11-23T10:48:14+00:00 | 2026-01-28T22:14:59+00:00 |
| rhsa-2021:4765 | Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.19.0 | 2021-11-23T08:45:19+00:00 | 2026-01-28T22:14:59+00:00 |
| rhsa-2021:4156 | Red Hat Security Advisory: go-toolset:rhel8 security, bug fix, and enhancement update | 2021-11-09T17:49:22+00:00 | 2026-01-28T22:14:58+00:00 |
| rhsa-2021:3487 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update | 2021-09-15T13:41:24+00:00 | 2026-01-28T22:14:57+00:00 |
| rhea-2022:1596 | Red Hat Enhancement Advisory: OpenShift Virtualization 4.9.4 Images | 2022-04-26T16:51:34+00:00 | 2026-01-28T22:14:55+00:00 |
| rhsa-2021:4618 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4 images and security updates | 2021-11-11T18:31:07+00:00 | 2026-01-28T22:14:16+00:00 |
| rhsa-2021:3925 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.3.3 bug fix, security, and image updates | 2021-10-20T03:54:29+00:00 | 2026-01-28T22:14:14+00:00 |
| rhsa-2021:3694 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.6.0 security & bugfix update | 2021-09-29T14:34:25+00:00 | 2026-01-28T22:14:14+00:00 |
| rhea-2021:3139 | Red Hat Enhancement Advisory: Web Terminal 1.3 release | 2021-08-11T17:23:34+00:00 | 2026-01-28T22:14:10+00:00 |
| rhsa-2021:4910 | Red Hat Security Advisory: OpenShift Virtualization 4.8.3 RPMs security and bug fix update | 2021-12-02T14:27:54+00:00 | 2026-01-28T22:14:01+00:00 |
| rhsa-2022:1329 | Red Hat Security Advisory: OpenShift Virtualization 4.8.5 RPMs security update | 2022-04-12T15:09:58+00:00 | 2026-01-28T22:13:59+00:00 |
| rhsa-2022:0998 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (golang-github-vbatts-tar-split) security update | 2022-03-23T22:12:28+00:00 | 2026-01-28T22:13:59+00:00 |
| rhsa-2022:0988 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (golang-github-vbatts-tar-split) security update | 2022-03-24T10:59:08+00:00 | 2026-01-28T22:13:59+00:00 |
| rhsa-2021:5086 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.9.0 enhancement, security, and bug fix update | 2021-12-13T19:26:22+00:00 | 2026-01-28T22:13:58+00:00 |
| rhsa-2022:0947 | Red Hat Security Advisory: OpenShift Virtualization 4.10.0 Images security and bug fix update | 2022-03-16T15:45:58+00:00 | 2026-01-28T22:13:57+00:00 |
| rhsa-2022:0260 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (etcd) security update | 2022-01-25T13:55:40+00:00 | 2026-01-28T22:13:56+00:00 |
| rhsa-2022:0237 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (etcd) security update | 2022-01-24T13:53:27+00:00 | 2026-01-28T22:13:55+00:00 |
| rhsa-2022:0191 | Red Hat Security Advisory: OpenShift Virtualization 4.9.2 Images security and bug fix update | 2022-01-19T17:48:00+00:00 | 2026-01-28T22:13:55+00:00 |
| rhsa-2021:5085 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.9.0 enhancement, security, and bug fix update | 2021-12-13T15:29:11+00:00 | 2026-01-28T22:13:54+00:00 |
| rhsa-2021:4914 | Red Hat Security Advisory: OpenShift Virtualization 4.8.3 Images security and bug fix update | 2021-12-02T16:59:15+00:00 | 2026-01-28T22:13:52+00:00 |
| rhsa-2021:4725 | Red Hat Security Advisory: OpenShift Virtualization 2.6.8 Images security and bug fix update | 2021-11-17T18:39:29+00:00 | 2026-01-28T22:13:52+00:00 |
| rhsa-2021:4722 | Red Hat Security Advisory: OpenShift Virtualization 2.6.8 RPMs security and bug fix update | 2021-11-17T15:38:20+00:00 | 2026-01-28T22:13:50+00:00 |
| rhsa-2021:4582 | Red Hat Security Advisory: Release of components for Service Telemetry Framework 1.3.3 - Container Images | 2021-11-10T11:52:54+00:00 | 2026-01-28T22:13:49+00:00 |
| rhsa-2021:4104 | Red Hat Security Advisory: OpenShift Virtualization 4.9.0 Images security and bug fix update | 2021-11-02T15:55:53+00:00 | 2026-01-28T22:13:49+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-39849 | wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() | 2025-09-02T00:00:00.000Z | 2025-09-21T01:01:29.000Z |
| msrc_cve-2025-39843 | mm: slub: avoid wake up kswapd in set_track_prepare | 2025-09-02T00:00:00.000Z | 2025-09-21T01:01:24.000Z |
| msrc_cve-2025-39832 | net/mlx5: Fix lockdep assertion on sync reset unload event | 2025-09-02T00:00:00.000Z | 2025-09-20T01:08:42.000Z |
| msrc_cve-2022-48633 | drm/gma500: Fix WARN_ON(lock->magic != lock) error | 2024-04-02T07:00:00.000Z | 2025-09-20T01:08:10.000Z |
| msrc_cve-2025-9906 | Arbitrary Code execution in Keras Safe Mode | 2025-09-02T00:00:00.000Z | 2025-09-20T01:03:50.000Z |
| msrc_cve-2025-9905 | Arbitary Code execution in Keras load_model() | 2025-09-02T00:00:00.000Z | 2025-09-20T01:03:44.000Z |
| msrc_cve-2024-36898 | gpiolib: cdev: fix uninitialised kfifo | 2024-05-02T07:00:00.000Z | 2025-09-20T01:03:38.000Z |
| msrc_cve-2024-27408 | dmaengine: dw-edma: eDMA: Add sync read before starting the DMA transfer in remote setup | 2024-05-02T07:00:00.000Z | 2025-09-20T01:03:33.000Z |
| msrc_cve-2024-27389 | pstore: inode: Only d_invalidate() is needed | 2024-05-02T07:00:00.000Z | 2025-09-20T01:03:27.000Z |
| msrc_cve-2024-27056 | wifi: iwlwifi: mvm: ensure offloading TID queue exists | 2024-05-02T07:00:00.000Z | 2025-09-20T01:03:21.000Z |
| msrc_cve-2024-27035 | f2fs: compress: fix to guarantee persisting compressed blocks by CP | 2024-05-02T07:00:00.000Z | 2025-09-20T01:03:15.000Z |
| msrc_cve-2024-26938 | drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode() | 2024-05-02T07:00:00.000Z | 2025-09-20T01:02:58.000Z |
| msrc_cve-2022-48668 | smb3: fix temporary data corruption in collapse range | 2024-04-02T07:00:00.000Z | 2025-09-20T01:02:52.000Z |
| msrc_cve-2022-48667 | smb3: fix temporary data corruption in insert range | 2024-04-02T07:00:00.000Z | 2025-09-20T01:02:46.000Z |
| msrc_cve-2022-50380 | mm: /proc/pid/smaps_rollup: fix no vma's null-deref | 2025-09-02T00:00:00.000Z | 2025-09-20T01:02:40.000Z |
| msrc_cve-2024-40918 | parisc: Try to fix random segmentation faults in package builds | 2024-07-01T07:00:00.000Z | 2025-09-20T01:02:09.000Z |
| msrc_cve-2024-40915 | riscv: rewrite __kernel_map_pages() to fix sleeping in invalid context | 2024-07-01T07:00:00.000Z | 2025-09-20T01:02:03.000Z |
| msrc_cve-2024-37354 | btrfs: fix crash on racing fsync and size-extending write into prealloc | 2024-06-02T07:00:00.000Z | 2025-09-20T01:01:58.000Z |
| msrc_cve-2024-36917 | block: fix overflow in blk_ioctl_discard() | 2024-05-02T07:00:00.000Z | 2025-09-20T01:01:52.000Z |
| msrc_cve-2024-36915 | nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies | 2024-05-02T07:00:00.000Z | 2025-09-20T01:01:46.000Z |
| msrc_cve-2024-36914 | drm/amd/display: Skip on writeback when it's not applicable | 2024-05-02T07:00:00.000Z | 2025-09-20T01:01:40.000Z |
| msrc_cve-2024-26920 | tracing/trigger: Fix to return error if failed to alloc snapshot | 2024-04-02T07:00:00.000Z | 2025-09-20T01:01:23.000Z |
| msrc_cve-2025-59216 | Windows Graphics Component Elevation of Privilege Vulnerability | 2025-09-09T00:00:00.000Z | 2025-09-18T00:00:00.000Z |
| msrc_cve-2025-59215 | Windows Graphics Component Elevation of Privilege Vulnerability | 2025-09-09T00:00:00.000Z | 2025-09-18T00:00:00.000Z |
| msrc_cve-2025-55241 | Azure Entra ID Elevation of Privilege Vulnerability | 2025-09-09T00:00:00.000Z | 2025-09-18T00:00:00.000Z |
| msrc_cve-2025-39794 | ARM: tegra: Use I/O memcpy to write to IRAM | 2025-09-02T00:00:00.000Z | 2025-09-16T01:01:56.000Z |
| msrc_cve-2025-39799 | ACPI: processor: perflib: Move problematic pr->performance check | 2025-09-02T00:00:00.000Z | 2025-09-16T01:01:50.000Z |
| msrc_cve-2025-39801 | usb: dwc3: Remove WARN_ON for device endpoint command timeouts | 2025-09-02T00:00:00.000Z | 2025-09-16T01:01:45.000Z |
| msrc_cve-2025-59375 | libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing. | 2025-09-02T00:00:00.000Z | 2025-09-16T01:01:15.000Z |
| msrc_cve-2025-54910 | Microsoft Office Remote Code Execution Vulnerability | 2025-09-09T00:00:00.000Z | 2025-09-16T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202505-1871 | A vulnerability was found in TOTOLINK A702R, A3002R and A3002RU 3.0.0-B20230809.1615. It … | 2025-05-29T23:33:52.578000Z |
| var-202312-0020 | In 5G Modem, there is a possible system crash due to improper error handling. This could … | 2025-05-29T23:29:09.663000Z |
| var-202408-0543 | Tenda FH1206 v02.03.01.35 was discovered to contain a stack overflow via the page paramet… | 2025-05-29T23:29:07.927000Z |
| var-202408-0585 | Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the page para… | 2025-05-29T23:29:07.905000Z |
| var-202505-1820 | A vulnerability, which was classified as critical, was found in TOTOLINK A702R, A3002R an… | 2025-05-29T23:29:02.580000Z |
| var-202505-1841 | A vulnerability classified as critical has been found in TOTOLINK N300RH 6.1c.1390_B20191… | 2025-05-29T23:29:02.559000Z |
| var-202401-2083 | TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vul… | 2025-05-29T23:25:19.374000Z |
| var-202401-1620 | Trend Micro uiAirSupport, included in the Trend Micro Security 2023 family of consumer pr… | 2025-05-29T23:18:55.012000Z |
| var-202209-0772 | A memory corruption issue was addressed with improved input validation. This issue is fix… | 2025-05-29T23:11:33.584000Z |
| var-202201-1853 | TeslaMate before 1.25.1 (when using the default Docker configuration) allows attackers to… | 2025-05-29T23:02:59.835000Z |
| var-202209-0769 | The issue was addressed with improved memory handling. This issue is fixed in macOS Monte… | 2025-05-29T21:53:25.722000Z |
| var-202209-0763 | A logic issue was addressed with improved restrictions. This issue is fixed in macOS Mont… | 2025-05-29T21:38:10.825000Z |
| var-202505-0643 | Tenda AC9 V15.03.06.42_multi was found to contain a command injection vulnerability in th… | 2025-05-29T19:32:18.336000Z |
| var-202505-1252 | TOTOLINK NR1800X V9.1.0u.6681_B20230703 was discovered to contain an authenticated stack … | 2025-05-29T19:32:18.279000Z |
| var-202505-1840 | A vulnerability classified as critical was found in TOTOLINK N300RH 6.1c.1390_B20191101. … | 2025-05-29T19:32:18.154000Z |
| var-202209-1476 | This issue was addressed by enabling hardened runtime. This issue is fixed in macOS Monte… | 2025-05-28T23:25:13.130000Z |
| var-202412-0623 | A NULL pointer dereference in D-Link DAP-1513 REVA_FIRMWARE_1.01 allows attackers to caus… | 2025-05-28T23:25:09.379000Z |
| var-202208-2225 | There is a traffic hijacking vulnerability in WS7200-10 11.0.2.13. Successful exploitatio… | 2025-05-28T23:24:24.550000Z |
| var-202312-0446 | Tenda AX12 V22.03.01.46 has been discovered to contain a command injection vulnerability … | 2025-05-28T23:24:01.440000Z |
| var-202408-2474 | Shenzhen Tenda Technology Co.,Ltd. of ax1806 An out-of-bounds write vulnerability exists … | 2025-05-28T23:24:00.100000Z |
| var-202209-1437 | A logic issue was addressed with improved state management. This issue is fixed in Safari… | 2025-05-28T23:23:12.470000Z |
| var-202408-0203 | A vulnerability, which was classified as critical, has been found in Tenda i22 1.0.0.3(46… | 2025-05-28T23:23:05.814000Z |
| var-202412-0018 | A vulnerability was found in Netgear R6900 1.0.1.26_1.0.20. It has been declared as criti… | 2025-05-28T23:23:05.234000Z |
| var-202503-3474 | Netgear DC112A V1.0.0.64 has an OS command injection vulnerability in the usb_adv.cgi, wh… | 2025-05-28T23:22:41.050000Z |
| var-202408-0167 | A vulnerability classified as critical has been found in Tenda A301 15.13.08.12. This aff… | 2025-05-28T23:22:19.824000Z |
| var-202209-1423 | This issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.4… | 2025-05-28T23:22:03.342000Z |
| var-202505-0754 | TOTOLINK CA300-POE V6.2c.884_B20180522 was found to contain a command injection vulnerabi… | 2025-05-28T23:21:55.039000Z |
| var-202505-1260 | TOTOLINK CA300-POE V6.2c.884_B20180522 was found to contain a command injection vulnerabi… | 2025-05-28T23:21:55.002000Z |
| var-202206-2226 | There is a password verification vulnerability in WS7200-10 11.0.2.13. Attackers on the L… | 2025-05-28T23:20:52.991000Z |
| var-202212-1427 | RSFirewall tries to identify the original IP address by looking at different HTTP headers… | 2025-05-28T23:20:52.304000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2024:1569-1 | Security update for avahi | 2024-05-09T11:17:29Z | 2024-05-09T11:17:29Z |
| suse-su-2024:1568-1 | Security update for ghostscript | 2024-05-09T11:17:16Z | 2024-05-09T11:17:16Z |
| suse-su-2024:1563-1 | Security update for sssd | 2024-05-09T09:01:09Z | 2024-05-09T09:01:09Z |
| suse-su-2024:1562-1 | Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP3) | 2024-05-08T15:42:14Z | 2024-05-08T15:42:14Z |
| suse-su-2024:1558-1 | Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP3) | 2024-05-08T14:03:46Z | 2024-05-08T14:03:46Z |
| suse-su-2024:1557-3 | Security update for rpm | 2024-05-08T09:43:05Z | 2024-05-08T09:43:05Z |
| suse-su-2024:1557-1 | Security update for rpm | 2024-05-08T09:42:44Z | 2024-05-08T09:42:44Z |
| suse-su-2024:1556-1 | Security update for python311 | 2024-05-08T09:40:49Z | 2024-05-08T09:40:49Z |
| suse-su-2024:1554-1 | Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP2) | 2024-05-07T22:03:37Z | 2024-05-07T22:03:37Z |
| suse-su-2024:1551-1 | Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP2) | 2024-05-07T16:33:27Z | 2024-05-07T16:33:27Z |
| suse-su-2024:1550-1 | Security update for less | 2024-05-07T14:23:51Z | 2024-05-07T14:23:51Z |
| suse-su-2024:1549-1 | Security update for sssd | 2024-05-07T14:06:52Z | 2024-05-07T14:06:52Z |
| suse-su-2024:1548-1 | Security update for flatpak | 2024-05-07T14:05:57Z | 2024-05-07T14:05:57Z |
| suse-su-2024:1547-1 | Security update for flatpak | 2024-05-07T14:05:44Z | 2024-05-07T14:05:44Z |
| suse-su-2024:1545-1 | Security update for the Linux Kernel (Live Patch 35 for SLE 15 SP2) | 2024-05-07T13:33:27Z | 2024-05-07T13:33:27Z |
| suse-su-2024:1541-1 | Security update for xen | 2024-05-07T07:24:34Z | 2024-05-07T07:24:34Z |
| suse-su-2024:1540-1 | Security update for xen | 2024-05-07T07:24:26Z | 2024-05-07T07:24:26Z |
| suse-su-2024:1539-1 | Security update for bouncycastle | 2024-05-07T07:23:51Z | 2024-05-07T07:23:51Z |
| suse-su-2024:1537-1 | Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP2) | 2024-05-07T00:03:32Z | 2024-05-07T00:03:32Z |
| suse-su-2024:1151-2 | Security update for curl | 2024-05-06T15:40:42Z | 2024-05-06T15:40:42Z |
| suse-su-2024:1536-1 | Security update for flatpak | 2024-05-06T12:56:18Z | 2024-05-06T12:56:18Z |
| suse-su-2024:1535-1 | Security update for flatpak | 2024-05-06T12:56:00Z | 2024-05-06T12:56:00Z |
| suse-su-2024:1534-1 | Security update for less | 2024-05-06T12:55:36Z | 2024-05-06T12:55:36Z |
| suse-su-2024:1532-1 | Security update for SUSE Manager Server 4.3 | 2024-05-06T09:55:29Z | 2024-05-06T09:55:29Z |
| suse-su-2024:1530-1 | Security update for grafana and mybatis | 2024-05-06T09:52:35Z | 2024-05-06T09:52:35Z |
| suse-su-2024:1525-1 | Security update for SUSE Manager Salt Bundle | 2024-05-06T09:50:25Z | 2024-05-06T09:50:25Z |
| suse-su-2024:1518-1 | Security update for SUSE Manager Salt Bundle | 2024-05-06T09:49:26Z | 2024-05-06T09:49:26Z |
| suse-su-2024:1517-1 | Security update for SUSE Manager Salt Bundle | 2024-05-06T09:49:02Z | 2024-05-06T09:49:02Z |
| suse-su-2024:1509-1 | Security update for SUSE Manager Client Tools | 2024-05-06T09:47:44Z | 2024-05-06T09:47:44Z |
| suse-su-2024:1508-1 | Security update for SUSE Manager Client Tools | 2024-05-06T09:46:36Z | 2024-05-06T09:46:36Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:11026-1 | log4j12-1.2.17-3.9 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11025-1 | log4j-2.13.2-1.9 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11024-1 | liblldpctl4-1.0.12-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11023-1 | libBasicUsageEnvironment1-2021.08.23-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11022-1 | links-2.24-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11021-1 | lilypond-2.23.3-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11020-1 | liferea-1.13.6-2.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11019-1 | libzypp-17.28.4-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11018-1 | libzip-devel-1.8.0-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11017-1 | libxslt-devel-1.1.34-3.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11016-1 | libxml2-2-2.9.12-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11015-1 | libxls-devel-1.6.2-2.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11014-1 | libxkbcommon-devel-1.3.1-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11013-1 | libwpd-0_10-10-0.10.3-2.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11012-1 | libwmf-0_2-7-0.2.12-2.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11011-1 | libwebp-devel-1.2.0-1.4 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11010-1 | libvpx-devel-1.10.0-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11009-1 | libvorbis-devel-1.3.7-1.6 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11008-1 | libvirt-7.7.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11007-1 | libuv-devel-1.42.0-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11006-1 | libixml11-1.14.10-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11005-1 | libunbound8-1.13.2-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11004-1 | libtpms-devel-0.8.4-2.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11003-1 | libtomcrypt-devel-1.18.2-2.10 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11002-1 | libtirpc-devel-1.3.2-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11001-1 | libtasn1-6-32bit-4.17.0-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11000-1 | libstaroffice-0_0-0-0.0.7-2.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10999-1 | libssh2-1-1.9.0-3.6 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10998-1 | libssh-config-0.9.6-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10997-1 | libsrtp2-1-2.4.1-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-19766 | Adobe InDesign Desktop释放后重用漏洞(CNVD-2025-19766) | 2025-08-15 | 2025-08-28 |
| cnvd-2025-19765 | Adobe InDesign Desktop释放后重用漏洞 | 2025-08-15 | 2025-08-28 |
| cnvd-2025-19764 | Adobe InDesign Desktop越界读取漏洞(CNVD-2025-19764) | 2025-08-15 | 2025-08-28 |
| cnvd-2025-19763 | Adobe InDesign Desktop未初始化指针漏洞 | 2025-08-15 | 2025-08-28 |
| cnvd-2025-19762 | Adobe InDesign Desktop越界读取漏洞 | 2025-08-15 | 2025-08-28 |
| cnvd-2025-19629 | Adobe Framemaker缓冲区溢出漏洞 | 2024-12-13 | 2025-08-28 |
| cnvd-2025-19628 | Adobe InDesign Desktop越界写入漏洞(CNVD-2025-19628) | 2025-08-15 | 2025-08-28 |
| cnvd-2025-19627 | Adobe InDesign Desktop越界写入漏洞 | 2025-08-15 | 2025-08-28 |
| cnvd-2025-19626 | Adobe Framemaker释放后重用漏洞(CNVD-2025-19626) | 2025-08-18 | 2025-08-28 |
| cnvd-2025-19625 | Adobe Framemaker释放后重用漏洞(CNVD-2025-19625) | 2025-08-18 | 2025-08-28 |
| cnvd-2025-19624 | Adobe Framemaker释放后重用漏洞(CNVD-2025-19624) | 2025-08-18 | 2025-08-28 |
| cnvd-2025-19623 | Adobe Framemaker释放后重用漏洞 | 2025-08-18 | 2025-08-28 |
| cnvd-2025-19622 | Adobe Framemaker越界读取漏洞 | 2025-08-20 | 2025-08-28 |
| cnvd-2025-19601 | Emby MediaBrowser存在未明漏洞(CNVD-2025-19601) | 2025-08-18 | 2025-08-28 |
| cnvd-2025-19600 | Emby MediaBrowser访问控制错误漏洞 | 2025-08-18 | 2025-08-28 |
| cnvd-2025-19599 | Emby MediaBrowser存在未明漏洞(CNVD-2025-19599) | 2025-08-18 | 2025-08-28 |
| cnvd-2025-19598 | Emby MediaBrowser存在未明漏洞(CNVD-2025-19598) | 2025-08-18 | 2025-08-28 |
| cnvd-2025-19597 | Emby MediaBrowser存在未明漏洞(CNVD-2025-19597) | 2025-08-18 | 2025-08-28 |
| cnvd-2025-19595 | Bottinelli Informatical Vedo Suite信息泄露漏洞 | 2025-08-18 | 2025-08-28 |
| cnvd-2025-19594 | Bottinelli Informatical Vedo Suite文件上传漏洞 | 2025-08-18 | 2025-08-28 |
| cnvd-2025-19593 | Bottinelli Informatical Vedo Suite文件包含漏洞 | 2025-08-18 | 2025-08-28 |
| cnvd-2025-19592 | Bottinelli Informatical Vedo Suite跨站脚本漏洞 | 2025-08-18 | 2025-08-28 |
| cnvd-2025-19591 | Bottinelli Informatical Vedo Suite服务端请求伪造漏洞 | 2025-08-18 | 2025-08-28 |
| cnvd-2025-19590 | Bottinelli Informatical Vedo Suite访问控制错误漏洞 | 2025-08-18 | 2025-08-28 |
| cnvd-2025-19589 | WellChoose Organization Portal System路径遍历漏洞(CNVD-2025-19589) | 2025-08-20 | 2025-08-28 |
| cnvd-2025-19588 | WellChoose Organization Portal System跨站脚本漏洞(CNVD-2025-19588) | 2025-08-20 | 2025-08-28 |
| cnvd-2025-19587 | WellChoose Organization Portal System跨站脚本漏洞 | 2025-08-20 | 2025-08-28 |
| cnvd-2025-19586 | WellChoose Organization Portal System路径遍历漏洞 | 2025-08-20 | 2025-08-28 |
| cnvd-2025-19585 | WellChoose Organization Portal System文件包含漏洞 | 2025-08-20 | 2025-08-28 |
| cnvd-2025-19584 | WellChoose Organization Portal System SQL注入漏洞 | 2025-08-20 | 2025-08-28 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2021-avi-313 | Multiples vulnérabilités dans Stormshield Management Center | 2021-04-26T00:00:00.000000 | 2021-04-27T00:00:00.000000 |
| certfr-2021-avi-312 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2021-04-26T00:00:00.000000 | 2021-04-26T00:00:00.000000 |
| certfr-2021-avi-311 | Multiples vulnérabilités dans Microsoft Edge | 2021-04-23T00:00:00.000000 | 2021-04-23T00:00:00.000000 |
| certfr-2021-avi-310 | Multiples vulnérabilités dans IBM Db2 | 2021-04-23T00:00:00.000000 | 2021-04-23T00:00:00.000000 |
| certfr-2021-avi-309 | Vulnérabilité dans Wireshark | 2021-04-23T00:00:00.000000 | 2021-04-23T00:00:00.000000 |
| certfr-2021-avi-308 | Vulnérabilité dans F5 BIG-IP | 2021-04-23T00:00:00.000000 | 2021-04-23T00:00:00.000000 |
| certfr-2021-avi-307 | Vulnérabilité dans QNAP HBS 3 Hybrid Backup Sync | 2021-04-22T00:00:00.000000 | 2021-04-22T00:00:00.000000 |
| certfr-2021-avi-306 | Vulnérabilité dans IBM WebSphere Application Server | 2021-04-22T00:00:00.000000 | 2021-04-22T00:00:00.000000 |
| certfr-2021-avi-305 | Multiples vulnérabilités dans Google Chrome OS | 2021-04-22T00:00:00.000000 | 2021-04-22T00:00:00.000000 |
| certfr-2021-avi-304 | Vulnérabilité dans Drupal | 2021-04-22T00:00:00.000000 | 2021-04-22T00:00:00.000000 |
| certfr-2021-avi-303 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2021-04-22T00:00:00.000000 | 2021-04-22T00:00:00.000000 |
| certfr-2021-avi-302 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2021-04-22T00:00:00.000000 | 2021-04-22T00:00:00.000000 |
| certfr-2021-avi-301 | Multiples vulnérabilités dans Google Chrome | 2021-04-21T00:00:00.000000 | 2021-04-21T00:00:00.000000 |
| certfr-2021-avi-300 | Multiples vulnérabilités dans Oracle WebLogic | 2021-04-21T00:00:00.000000 | 2021-04-21T00:00:00.000000 |
| certfr-2021-avi-299 | Multiples vulnérabilités dans Oracle Systems | 2021-04-21T00:00:00.000000 | 2021-04-21T00:00:00.000000 |
| certfr-2021-avi-298 | Multiples vulnérabilités dans Oracle Virtualization | 2021-04-21T00:00:00.000000 | 2021-04-21T00:00:00.000000 |
| certfr-2021-avi-297 | Multiples vulnérabilités dans Oracle Java SE | 2021-04-21T00:00:00.000000 | 2021-04-21T00:00:00.000000 |
| certfr-2021-avi-296 | Multiples vulnérabilités dans Oracle MySQL | 2021-04-21T00:00:00.000000 | 2021-04-21T00:00:00.000000 |
| certfr-2021-avi-295 | Multiples vulnérabilités dans Oracle Database | 2021-04-21T00:00:00.000000 | 2021-04-21T00:00:00.000000 |
| certfr-2021-avi-294 | Vulnérabilité dans Symantec Security Analytics | 2021-04-21T00:00:00.000000 | 2021-04-21T00:00:00.000000 |
| certfr-2021-avi-293 | Vulnérabilité dans IBM WebSphere Application Server | 2021-04-21T00:00:00.000000 | 2021-04-21T00:00:00.000000 |
| certfr-2021-avi-292 | Multiples vulnérabilités dans les produits Aruba | 2021-04-21T00:00:00.000000 | 2021-04-21T00:00:00.000000 |
| certfr-2021-avi-291 | Vulnérabilité dans Sonicwall Email Security | 2021-04-21T00:00:00.000000 | 2021-04-21T00:00:00.000000 |
| certfr-2021-avi-290 | Multiples vulnérabilités dans les produits Juniper | 2021-04-20T00:00:00.000000 | 2021-04-20T00:00:00.000000 |
| certfr-2021-avi-289 | Vulnérabilité dans IBM WebSphere | 2021-04-20T00:00:00.000000 | 2021-04-20T00:00:00.000000 |
| certfr-2021-avi-288 | Multiples vulnérabilités dans F5 BIG-IP | 2021-04-20T00:00:00.000000 | 2021-04-20T00:00:00.000000 |
| certfr-2021-avi-287 | Multiples vulnérabilités dans Mozilla Firefox | 2021-04-20T00:00:00.000000 | 2021-04-20T00:00:00.000000 |
| certfr-2021-avi-286 | Multiples vulnérabilités dans Mozilla Thunderbird | 2021-04-20T00:00:00.000000 | 2021-04-20T00:00:00.000000 |
| certfr-2021-avi-285 | Vulnérabilité dans VMware NSX-T | 2021-04-19T00:00:00.000000 | 2021-04-19T00:00:00.000000 |
| certfr-2021-avi-284 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2021-04-19T00:00:00.000000 | 2021-04-19T00:00:00.000000 |