Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-2622 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
Blossom Article Title ArticleController.java content c… |
n/a |
Blossom |
2026-02-17T20:32:40.131Z | 2026-02-23T10:15:12.991Z |
| CVE-2026-2621 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Sciyon Koyuan Thermoelectricity Heat Network Managemen… |
Sciyon |
Koyuan Thermoelectricity Heat Network Management System |
2026-02-17T20:02:06.743Z | 2026-02-23T10:14:28.207Z |
| CVE-2026-2620 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Huace Monitoring and Early Warning System ProjectRole.… |
Huace |
Monitoring and Early Warning System |
2026-02-17T19:02:06.425Z | 2026-02-23T10:14:14.435Z |
| CVE-2026-2618 |
6.3 (4.0)
3.7 (3.1)
3.7 (3.0)
|
Beetel 777VR1 SSH Service risky encryption |
Beetel |
777VR1 |
2026-02-17T16:32:06.477Z | 2026-02-23T10:14:00.459Z |
| CVE-2026-2617 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Beetel 777VR1 Telnet Service/SSH Service insecure defa… |
Beetel |
777VR1 |
2026-02-17T15:32:06.089Z | 2026-02-23T10:13:48.851Z |
| CVE-2026-2616 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Beetel 777VR1 Web Management hard-coded credentials |
Beetel |
777VR1 |
2026-02-17T15:02:07.133Z | 2026-02-23T10:13:35.134Z |
| CVE-2026-2615 |
8.6 (4.0)
7.2 (3.1)
7.2 (3.0)
|
Wavlink WL-NU516U1 firewall.cgi singlePortForwardDelet… |
Wavlink |
WL-NU516U1 |
2026-02-17T13:02:06.390Z | 2026-02-23T10:13:22.556Z |
| CVE-2026-2567 |
8.6 (4.0)
7.2 (3.1)
7.2 (3.0)
|
Wavlink WL-NU516U1 nas.cgi sub_401218 stack-based overflow |
Wavlink |
WL-NU516U1 |
2026-02-16T17:32:05.929Z | 2026-02-23T10:13:10.511Z |
| CVE-2026-2566 |
8.6 (4.0)
7.2 (3.1)
7.2 (3.0)
|
Wavlink WL-NU516U1 adm.cgi sub_406194 stack-based overflow |
Wavlink |
WL-NU516U1 |
2026-02-16T17:02:06.381Z | 2026-02-23T10:12:56.936Z |
| CVE-2026-2565 |
7.5 (4.0)
6.6 (3.1)
6.6 (3.0)
|
Wavlink WL-NU516U1 adm.cgi sub_40785C stack-based overflow |
Wavlink |
WL-NU516U1 |
2026-02-16T16:32:06.693Z | 2026-02-23T10:12:45.283Z |
| CVE-2026-2564 |
9.2 (4.0)
8.1 (3.1)
8.1 (3.0)
|
Intelbras VIP 3260 Z IA OutsideCmd password recovery |
Intelbras |
VIP 3260 Z IA |
2026-02-16T16:02:06.547Z | 2026-02-23T10:12:32.594Z |
| CVE-2026-2563 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
JingDong JD Cloud Box AX6600 jdcapp_rpc controlDevice … |
JingDong |
JD Cloud Box AX6600 |
2026-02-16T15:32:45.758Z | 2026-02-23T10:12:19.399Z |
| CVE-2024-6124 |
8.5 (4.0)
|
Reflected XSS in Hubshare via Open Redirect |
M-Files Corporation |
Hubshare |
2024-07-29T13:00:33.825Z | 2026-02-23T10:12:11.711Z |
| CVE-2026-2562 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
JingDong JD Cloud Box AX6600 jdcweb_rpc jdcapi cast_st… |
JingDong |
JD Cloud Box AX6600 |
2026-02-16T15:02:49.628Z | 2026-02-23T10:11:59.788Z |
| CVE-2026-2561 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
JingDong JD Cloud Box AX6600 jdcweb_rpc jdcapi web_get… |
JingDong |
JD Cloud Box AX6600 |
2026-02-16T14:32:53.736Z | 2026-02-23T10:11:39.162Z |
| CVE-2024-5142 |
7 (4.0)
|
XSS in Hubshare's social module |
M-Files Corporation |
Hubshare |
2024-05-24T05:58:41.316Z | 2026-02-23T10:11:26.951Z |
| CVE-2026-2560 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
kalcaddle kodbox Media File Preview Plugin VideoResize… |
kalcaddle |
kodbox |
2026-02-16T14:02:06.156Z | 2026-02-23T10:11:14.696Z |
| CVE-2026-2558 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
GeekAI net_handler.go Download server-side request forgery |
n/a |
GeekAI |
2026-02-16T13:32:05.695Z | 2026-02-23T10:11:02.075Z |
| CVE-2024-4056 |
7.5 (3.1)
|
Denial of service condition in M-Files Server |
M-Files Corporation |
M-Files Server |
2024-04-26T06:02:21.917Z | 2026-02-23T10:10:50.553Z |
| CVE-2026-2557 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
cskefu File Upload MediaController.java upload cross s… |
n/a |
cskefu |
2026-02-16T13:02:39.281Z | 2026-02-23T10:10:48.494Z |
| CVE-2026-2556 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
cskefu Endpoint MediaController.java server-side reque… |
n/a |
cskefu |
2026-02-16T12:32:39.941Z | 2026-02-23T10:10:03.992Z |
| CVE-2024-0563 |
4.3 (3.1)
|
Denial of service condition in M-Files Server |
M-Files Corporation |
M-Files Server |
2024-02-23T08:52:38.347Z | 2026-02-23T10:09:57.761Z |
| CVE-2026-2555 |
2.3 (4.0)
5 (3.1)
5 (3.0)
|
JeecgBoot Retrieval-Augmented Generation AiragKnowledg… |
n/a |
JeecgBoot |
2026-02-16T12:02:07.302Z | 2026-02-23T10:09:16.352Z |
| CVE-2026-2553 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
tushar-2223 Hotel-Management-System HTTP POST Request … |
tushar-2223 |
Hotel-Management-System |
2026-02-16T11:32:06.780Z | 2026-02-23T10:09:02.428Z |
| CVE-2026-2552 |
5.1 (4.0)
5.5 (3.1)
5.5 (3.0)
|
ZenTao Editor control.php delete path traversal |
n/a |
ZenTao |
2026-02-16T11:02:05.938Z | 2026-02-23T10:08:48.186Z |
| CVE-2026-2551 |
5.3 (4.0)
5.4 (3.1)
5.4 (3.0)
|
ZenTao Backup control.php delete path traversal |
n/a |
ZenTao |
2026-02-16T10:32:07.030Z | 2026-02-23T10:08:34.751Z |
| CVE-2026-2550 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
EFM iptime A6004MX timepro.cgi commit_vpncli_file_uplo… |
EFM |
iptime A6004MX |
2026-02-16T10:02:07.745Z | 2026-02-23T10:08:20.919Z |
| CVE-2026-2549 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
zhanghuanhao LibrarySystem 图书馆管理系统 BookController.java… |
zhanghuanhao |
LibrarySystem 图书馆管理系统 |
2026-02-16T09:32:06.062Z | 2026-02-23T10:08:08.223Z |
| CVE-2026-2548 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
WAYOS FBM-220G rc sub_40F820 command injection |
WAYOS |
FBM-220G |
2026-02-16T09:02:05.796Z | 2026-02-23T10:07:54.559Z |
| CVE-2023-6912 |
7.5 (3.1)
|
Brute force vulnerability in M-Files user authentication |
M-Files Corporation |
M-Files Server |
2023-12-20T09:35:46.232Z | 2026-02-23T10:07:53.064Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-47366 |
7.1 (3.1)
|
Exposed Dangerous Method or Function in HLOS |
Qualcomm, Inc. |
Snapdragon |
2026-02-02T15:20:42.495Z | 2026-02-26T15:04:35.430Z |
| CVE-2025-70983 |
9.9 (3.1)
|
Incorrect access control in the authRoutes functi… |
n/a |
n/a |
2026-01-23T00:00:00.000Z | 2026-01-23T19:46:37.743Z |
| CVE-2026-21253 |
7 (3.1)
|
Mailslot File System Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:39.411Z | 2026-02-27T20:55:15.376Z |
| CVE-2025-67264 |
7.8 (3.1)
|
An OS command injection vulnerability in the com.… |
n/a |
n/a |
2026-01-23T00:00:00.000Z | 2026-01-26T15:56:07.316Z |
| CVE-2025-61506 |
9.8 (3.1)
|
An issue was discovered in MediaCrush thru 1.0.1 … |
n/a |
n/a |
2026-02-03T00:00:00.000Z | 2026-02-04T16:10:51.725Z |
| CVE-2025-63372 |
4.3 (3.1)
|
Articentgroup Zip Rar Extractor Tool 1.345.93.0 i… |
n/a |
n/a |
2026-02-03T00:00:00.000Z | 2026-02-09T15:47:54.253Z |
| CVE-2025-63624 |
9.8 (3.1)
|
SQL Injection vulnerability in Shandong Kede Elec… |
n/a |
n/a |
2026-02-03T00:00:00.000Z | 2026-02-04T16:14:21.445Z |
| CVE-2026-23565 |
6.5 (3.1)
|
Denial-of-Service in Content Distribution Service |
TeamViewer |
DEX |
2026-01-29T08:44:58.041Z | 2026-01-29T16:52:56.446Z |
| CVE-2025-52022 |
5.3 (3.1)
|
A vulnerability in the PHP backend of gemsloyalty… |
n/a |
n/a |
2026-01-23T00:00:00.000Z | 2026-01-26T16:57:07.721Z |
| CVE-2025-52023 |
5.3 (3.1)
|
A vulnerability in the PHP backend of gemscms.apt… |
n/a |
n/a |
2026-01-23T00:00:00.000Z | 2026-01-26T16:51:05.996Z |
| CVE-2026-23564 |
6.5 (3.1)
|
Transmission of Unencrypted Data in Content Distributi… |
TeamViewer |
DEX |
2026-01-29T08:43:43.799Z | 2026-01-29T16:53:10.746Z |
| CVE-2025-65875 |
8.8 (3.1)
|
An arbitrary file upload vulnerability in the Add… |
n/a |
n/a |
2026-02-03T00:00:00.000Z | 2026-02-04T16:15:45.145Z |
| CVE-2025-52025 |
9.4 (3.1)
|
An SQL Injection vulnerability exists in the GetS… |
n/a |
n/a |
2026-01-23T00:00:00.000Z | 2026-01-26T16:42:27.780Z |
| CVE-2025-52024 |
9.4 (3.1)
|
A vulnerability exists in the Aptsys POS Platform… |
n/a |
n/a |
2026-01-23T00:00:00.000Z | 2026-01-26T16:46:43.930Z |
| CVE-2025-58077 |
7.3 (4.0)
|
Heap-based Buffer Overflow Vulnerability in TP-Link Ar… |
TP-Link Systems Inc. |
Archer AX53 v1.0 |
2026-02-03T18:46:19.766Z | 2026-02-26T15:04:27.558Z |
| CVE-2025-58455 |
7.3 (4.0)
|
Heap-based Buffer Overflow Vulnerability in TP-Link Ar… |
TP-Link Systems Inc. |
Archer AX53 v1.0 |
2026-02-03T18:46:44.305Z | 2026-02-26T15:04:27.223Z |
| CVE-2025-59482 |
7.3 (4.0)
|
Heap-based Buffer Overflow Vulnerability in TP-Link Ar… |
TP-Link Systems Inc. |
Archer AX53 v1.0 |
2026-02-03T18:47:13.189Z | 2026-02-26T15:04:26.864Z |
| CVE-2025-59487 |
7.3 (4.0)
|
Heap-based Buffer Overflow Vulnerability in TP-Link Ar… |
TP-Link Systems Inc. |
Archer AX53 v1.0 |
2026-02-03T18:47:38.341Z | 2026-02-26T15:04:26.587Z |
| CVE-2025-61944 |
7.3 (4.0)
|
Heap-based Buffer Overflow Vulnerability in TP-Link Ar… |
TP-Link Systems Inc. |
Archer AX53 v1.0 |
2026-02-03T18:50:01.436Z | 2026-02-26T15:04:26.314Z |
| CVE-2025-61983 |
7.3 (4.0)
|
Heap-based Buffer Overflow Vulnerability in TP-Link Ar… |
TP-Link Systems Inc. |
Archer AX53 v1.0 |
2026-02-03T18:51:19.382Z | 2026-02-26T15:04:25.989Z |
| CVE-2025-62404 |
7.3 (4.0)
|
Heap-based Buffer Overflow Vulnerability in TP-Link Ar… |
TP-Link Systems Inc. |
Archer AX53 v1.0 |
2026-02-03T18:51:53.339Z | 2026-02-26T15:04:25.688Z |
| CVE-2025-62405 |
7.3 (4.0)
|
Heap-based Buffer Overflow Vulnerability in TP-Link Ar… |
TP-Link Systems Inc. |
Archer AX53 v1.0 |
2026-02-03T18:52:21.772Z | 2026-02-26T15:04:25.401Z |
| CVE-2025-62673 |
8.6 (4.0)
|
Heap-based Buffer Overflow Vulnerability in TP-Link Ar… |
TP-Link Systems Inc. |
Archer AX53 v1.0 |
2026-02-03T18:53:32.813Z | 2026-02-26T15:04:24.789Z |
| CVE-2025-62501 |
7 (4.0)
|
SSH Hostkey Misconfiguration Vulnerability in TP-Link … |
TP-Link Systems Inc. |
Archer AX53 v1.0 |
2026-02-03T18:52:54.216Z | 2026-02-26T15:04:25.063Z |
| CVE-2026-23563 |
5.7 (3.1)
|
Privilege escalation in TeamViewer DEX via DeleteFileB… |
TeamViewer |
DEX |
2026-01-29T08:39:56.105Z | 2026-01-29T16:53:26.845Z |
| CVE-2025-15555 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Open5GS VoLTE Cx-Test hss-cx-path.c hss_ogs_diam_cx_ma… |
n/a |
Open5GS |
2026-02-04T20:32:07.223Z | 2026-02-23T09:14:52.222Z |
| CVE-2026-0944 |
5.3 (3.1)
|
Group invite - Moderately critical - Access bypass - S… |
Drupal |
Group invite |
2026-02-04T20:25:17.113Z | 2026-02-04T20:40:47.035Z |
| CVE-2026-0946 |
6.1 (3.1)
|
AT Internet SmartTag - Moderately critical - Cross-sit… |
Drupal |
AT Internet SmartTag |
2026-02-04T20:25:39.200Z | 2026-02-06T20:35:38.434Z |
| CVE-2026-0947 |
4.8 (3.1)
|
AT Internet Piano Analytics - Moderately critical - Cr… |
Drupal |
AT Internet Piano Analytics |
2026-02-04T20:25:50.871Z | 2026-02-04T21:24:09.075Z |
| CVE-2026-0948 |
6.5 (3.1)
|
Microsoft Entra ID SSO Login - Critical - Access bypas… |
Drupal |
Microsoft Entra ID SSO Login |
2026-02-04T20:26:02.605Z | 2026-02-04T21:23:18.337Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-52025 | An SQL Injection vulnerability exists in the GetServiceByRestaurantID endpoint of the Aptsys gemscm… | 2026-01-23T21:15:50.710 | 2026-02-11T19:24:10.350 |
| fkie_cve-2025-52024 | A vulnerability exists in the Aptsys POS Platform Web Services module thru 2025-05-28, which expose… | 2026-01-23T21:15:50.610 | 2026-02-11T19:23:51.853 |
| fkie_cve-2025-58077 | Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows aut… | 2026-02-03T19:16:12.973 | 2026-02-11T19:22:50.927 |
| fkie_cve-2025-58455 | Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows aut… | 2026-02-03T19:16:13.110 | 2026-02-11T19:22:40.730 |
| fkie_cve-2025-59482 | Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows aut… | 2026-02-03T19:16:13.237 | 2026-02-11T19:22:33.363 |
| fkie_cve-2025-59487 | Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows aut… | 2026-02-03T19:16:13.367 | 2026-02-11T19:22:25.627 |
| fkie_cve-2025-61944 | Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows aut… | 2026-02-03T19:16:13.497 | 2026-02-11T19:22:16.303 |
| fkie_cve-2025-61983 | Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows aut… | 2026-02-03T19:16:13.630 | 2026-02-11T19:22:08.823 |
| fkie_cve-2025-62404 | Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows aut… | 2026-02-03T19:16:13.760 | 2026-02-11T19:22:01.890 |
| fkie_cve-2025-62405 | Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows aut… | 2026-02-03T19:16:13.890 | 2026-02-11T19:21:46.727 |
| fkie_cve-2025-62673 | Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tdpserver modules) allows adj… | 2026-02-03T19:16:14.317 | 2026-02-11T19:21:33.427 |
| fkie_cve-2025-62501 | SSH Hostkey misconfiguration vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows a… | 2026-02-03T19:16:14.027 | 2026-02-11T19:21:23.680 |
| fkie_cve-2026-23563 | Improper Link Resolution Before File Access (invoked by 1E‑Explorer‑TachyonCore‑DeleteFileByPath in… | 2026-01-29T09:16:03.793 | 2026-02-11T19:20:41.057 |
| fkie_cve-2025-15555 | A security flaw has been discovered in Open5GS up to 2.7.6. Affected by this vulnerability is the f… | 2026-02-04T21:15:57.380 | 2026-02-11T19:20:02.980 |
| fkie_cve-2026-0944 | Improper Check for Unusual or Exceptional Conditions vulnerability in Drupal Group invite allows Fo… | 2026-02-04T21:15:58.603 | 2026-02-11T19:19:44.440 |
| fkie_cve-2026-0946 | Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") vulnerability … | 2026-02-04T21:15:58.907 | 2026-02-11T19:19:34.760 |
| fkie_cve-2026-0947 | Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") vulnerability … | 2026-02-04T21:15:59.030 | 2026-02-11T19:19:26.493 |
| fkie_cve-2026-0948 | Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal Microsoft Entra ID… | 2026-02-04T21:15:59.143 | 2026-02-11T19:19:14.273 |
| fkie_cve-2026-1553 | Incorrect Authorization vulnerability in Drupal Drupal Canvas allows Forceful Browsing.This issue a… | 2026-02-04T21:15:59.267 | 2026-02-11T19:19:03.170 |
| fkie_cve-2026-1554 | XML Injection (aka Blind XPath Injection) vulnerability in Drupal Central Authentication System (CA… | 2026-02-04T21:15:59.427 | 2026-02-11T19:18:19.747 |
| fkie_cve-2026-25499 | Terraform / OpenTofu Provider adds support for Proxmox Virtual Environment. Prior to version 0.93.1… | 2026-02-04T21:16:01.043 | 2026-02-11T19:17:14.537 |
| fkie_cve-2026-25511 | Group-Office is an enterprise customer relationship management and groupware tool. Prior to version… | 2026-02-04T21:16:02.243 | 2026-02-11T19:16:29.217 |
| fkie_cve-2026-25512 | Group-Office is an enterprise customer relationship management and groupware tool. Prior to version… | 2026-02-04T21:16:02.390 | 2026-02-11T19:15:49.477 |
| fkie_cve-2026-1884 | A weakness has been identified in ZenTao up to 21.7.6-85642. The impacted element is the function f… | 2026-02-04T22:15:57.933 | 2026-02-11T19:15:12.930 |
| fkie_cve-2026-25537 | jsonwebtoken is a JWT lib in rust. Prior to version 10.3.0, there is a Type Confusion vulnerability… | 2026-02-04T22:15:59.807 | 2026-02-11T19:13:47.607 |
| fkie_cve-2026-21258 | Improper input validation in Microsoft Office Excel allows an unauthorized attacker to disclose inf… | 2026-02-10T18:16:27.637 | 2026-02-11T19:12:56.623 |
| fkie_cve-2026-21259 | Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to elevate pri… | 2026-02-10T18:16:27.790 | 2026-02-11T19:12:00.613 |
| fkie_cve-2026-25538 | Devtron is an open source tool integration platform for Kubernetes. In version 2.0.0 and prior, a v… | 2026-02-04T22:15:59.943 | 2026-02-11T19:10:54.880 |
| fkie_cve-2026-25539 | SiYuan is a personal knowledge management system. Prior to version 3.5.5, the /api/file/copyFile en… | 2026-02-04T22:16:00.083 | 2026-02-11T19:10:21.850 |
| fkie_cve-2026-21260 | Exposure of sensitive information to an unauthorized actor in Microsoft Office Outlook allows an un… | 2026-02-10T18:16:27.947 | 2026-02-11T19:10:20.090 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-rmhg-9566-pvgq |
4.9 (3.1)
6.9 (4.0)
|
Improper input verification issue exists in Cybozu Garoon 5.0.0 to 6.0.3, which may lead to unautho… | 2026-02-02T09:30:30Z | 2026-02-02T09:30:30Z |
| ghsa-f85m-j9w8-5g7x |
7.8 (3.1)
|
Dell PremierColor Panel Driver, versions prior to 1.0.0.1 A01, contains an Improper Access Control … | 2026-01-28T21:31:23Z | 2026-02-02T09:30:30Z |
| ghsa-r7m4-j4r7-jgj3 |
4.3 (3.1)
2.1 (4.0)
|
A vulnerability was determined in SourceCodester Medical Certificate Generator App 1.0. This affect… | 2026-02-02T06:30:53Z | 2026-02-02T06:30:53Z |
| ghsa-mwg7-x34r-qwqc |
9.8 (3.1)
|
The database account and password are hardcoded, allowing login with the account to manipulate the … | 2026-02-02T06:30:53Z | 2026-02-02T06:30:53Z |
| ghsa-c95p-xp25-6cpp |
8.8 (3.1)
|
An unauthenticated user can upload arbitrary files to execute remote code, leading to privilege esc… | 2026-02-02T06:30:53Z | 2026-02-02T06:30:53Z |
| ghsa-8v8f-2mvq-m2gx |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was identified in JeecgBoot 3.9.0. This vulnerability affects unknown code of the f… | 2026-02-02T06:30:53Z | 2026-02-02T06:30:53Z |
| ghsa-p784-4wwh-rmh6 |
4.7 (3.1)
2.0 (4.0)
|
A vulnerability was identified in EFM ipTIME A8004T 14.18.2. Affected by this vulnerability is the … | 2026-02-02T06:30:52Z | 2026-02-02T06:30:52Z |
| ghsa-p6m8-4rxr-8v7p |
6.6 (3.1)
6.6 (4.0)
|
A vulnerability was determined in EFM ipTIME A8004T 14.18.2. Affected is the function httpcon_check… | 2026-02-02T06:30:52Z | 2026-02-02T06:30:52Z |
| ghsa-gm6w-4mw8-hx49 |
2.4 (3.1)
1.9 (4.0)
|
A vulnerability was found in D-Link DSL-6641K N8.TR069.20131126. Affected by this issue is the func… | 2026-02-02T06:30:52Z | 2026-02-02T06:30:52Z |
| ghsa-f56m-qc2w-j8v5 |
3.1 (3.1)
1.3 (4.0)
|
A vulnerability has been found in DJI Mavic Mini, Spark and Mini SE up to 01.00.0500. Affected by t… | 2026-02-02T06:30:52Z | 2026-02-02T06:30:52Z |
| ghsa-3x3j-v5j3-f2p6 |
9.8 (3.1)
|
A vulnerability in MagicInfo9 Server allows authorized users to upload HTML files without authentic… | 2026-02-02T06:30:52Z | 2026-02-02T06:30:52Z |
| ghsa-33w6-9gm9-5rj4 |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was found in EFM ipTIME A8004T 14.18.2. This impacts the function httpcon_check_ses… | 2026-02-02T06:30:51Z | 2026-02-02T06:30:51Z |
| ghsa-pvrq-5hv2-jx7r |
5.3 (3.1)
5.5 (4.0)
|
A vulnerability was detected in Open5GS up to 2.7.6. The affected element is the function sgwc_s5c_… | 2026-02-02T03:31:18Z | 2026-02-02T03:31:18Z |
| ghsa-78fj-x79r-wh5j |
4.3 (3.1)
0.9 (4.0)
|
A weakness has been identified in Yealink MeetingBar A30 133.321.0.3. This issue affects some unkno… | 2026-02-02T03:31:18Z | 2026-02-02T03:31:18Z |
| ghsa-77wj-4hgf-q3gq |
5.3 (3.1)
5.5 (4.0)
|
A security vulnerability has been detected in Open5GS up to 2.7.6. Impacted is the function sgwc_s1… | 2026-02-02T03:31:18Z | 2026-02-02T03:31:18Z |
| ghsa-659g-9v9q-gq45 |
5.3 (3.1)
5.5 (4.0)
|
A vulnerability has been found in Free5GC pcf up to 1.4.1. This affects the function HandleCreateSm… | 2026-02-02T03:31:18Z | 2026-02-02T03:31:18Z |
| ghsa-3xh7-fq5x-f9qj |
8.5 (4.0)
|
An improper access control vulnerability exists in ASUS Secure Delete Driver of ASUS Business Manag… | 2026-02-02T03:31:18Z | 2026-02-02T03:31:18Z |
| ghsa-3242-rqgf-8x5v |
5.3 (3.1)
5.5 (4.0)
|
A flaw has been found in Open5GS up to 2.7.6. The impacted element is the function sgwc_tunnel_add … | 2026-02-02T03:31:18Z | 2026-02-02T03:31:18Z |
| ghsa-qxq4-hr62-m2rg |
5.3 (3.1)
5.5 (4.0)
|
A security flaw has been discovered in Zhong Bang CRMEB up to 5.6.3. This vulnerability affects unk… | 2026-02-02T00:30:23Z | 2026-02-02T00:30:23Z |
| ghsa-fh73-r4jx-8p6f |
4.3 (3.1)
2.1 (4.0)
|
A vulnerability was identified in Zhong Bang CRMEB up to 5.6.3. This affects the function detail/ti… | 2026-02-02T00:30:22Z | 2026-02-02T00:30:23Z |
| ghsa-63vm-454h-vhhq |
7.5 (3.1)
|
pyasn1 has a DoS vulnerability in decoder | 2026-01-16T19:19:25Z | 2026-02-01T18:30:16Z |
| ghsa-vcf3-26xf-fw4m |
6.2 (3.1)
7.5 (4.0)
|
Salt Authentication Protocol Version Downgrade Allows Minion Impersonation | 2026-01-30T21:30:22Z | 2026-02-01T18:09:41Z |
| ghsa-6497-prx7-gpmq |
8.6 (3.1)
|
geopandas SQL Injection Vulnerability in to_postgis() Allows Information Disclosure | 2026-01-30T21:30:22Z | 2026-02-01T18:09:10Z |
| ghsa-77w2-v593-vxvv |
7.8 (3.1)
7.3 (4.0)
|
Salt junos Module Vulnerable to Code Injection via Specially Crafted YAML Payload | 2026-01-30T21:30:22Z | 2026-02-01T18:07:48Z |
| ghsa-wrrr-8jcv-wjf5 |
5.7 (4.0)
|
LobeHub Vulnerable to Improper Authorization in Presigned Upload | 2026-02-01T17:39:40Z | 2026-02-01T17:39:40Z |
| ghsa-x82w-84rw-p4qf |
5.4 (3.1)
4.8 (4.0)
|
Inciga Web 2.8.2 contains a client-side cross-site scripting vulnerability that allows remote attac… | 2026-02-01T15:32:31Z | 2026-02-01T15:32:31Z |
| ghsa-v8hc-4qrr-7fch |
6.4 (3.1)
5.1 (4.0)
|
BootCommerce 3.2.1 contains persistent input validation vulnerabilities that allow remote attackers… | 2026-02-01T15:32:31Z | 2026-02-01T15:32:31Z |
| ghsa-pgc8-g7q5-fq5m |
6.4 (3.1)
5.1 (4.0)
|
Simple CMS 2.1 contains a persistent cross-site scripting vulnerability in user input parameters th… | 2026-02-01T15:32:30Z | 2026-02-01T15:32:31Z |
| ghsa-pf2v-q93p-8954 |
7.8 (3.1)
8.5 (4.0)
|
Veritas NetBackup 7.0 contains an unquoted service path vulnerability in the NetBackup INET Daemon … | 2026-02-01T15:32:31Z | 2026-02-01T15:32:31Z |
| ghsa-p3gm-qv6r-wh7x |
6.4 (3.1)
5.1 (4.0)
|
Simple CMS 2.1 contains a non-persistent cross-site scripting vulnerability in the preview.php file… | 2026-02-01T15:32:31Z | 2026-02-01T15:32:31Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-31270 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.552358Z |
| gsd-2024-31250 | Cross-Site Request Forgery (CSRF) vulnerability in Saumya Majumder WP Server Health Stats… | 2024-04-03T05:02:25.552138Z |
| gsd-2024-31216 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.551922Z |
| gsd-2024-31320 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.551705Z |
| gsd-2024-31126 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.551489Z |
| gsd-2024-31331 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.551272Z |
| gsd-2024-31036 | A heap-buffer-overflow vulnerability in the read_byte function in NanoMQ v.0.21.7 allows … | 2024-04-03T05:02:25.551049Z |
| gsd-2024-31242 | Missing Authorization vulnerability in Bricksforge.This issue affects Bricksforge: from n… | 2024-04-03T05:02:25.550816Z |
| gsd-2024-31007 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.550578Z |
| gsd-2024-31173 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.550359Z |
| gsd-2024-31042 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.550143Z |
| gsd-2024-31249 | Insertion of Sensitive Information into Log File vulnerability in WPKube Subscribe To Com… | 2024-04-03T05:02:25.549880Z |
| gsd-2024-31034 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.549663Z |
| gsd-2024-31335 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.549447Z |
| gsd-2024-31266 | Improper Control of Generation of Code ('Code Injection') vulnerability in AlgolPlus Adva… | 2024-04-03T05:02:25.549228Z |
| gsd-2024-31189 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.549005Z |
| gsd-2024-31069 | IO-1020 Micro ELD web server uses a default password for authentication. | 2024-04-03T05:02:25.548730Z |
| gsd-2024-31277 | Deserialization of Untrusted Data vulnerability in PickPlugins Product Designer.This issu… | 2024-04-03T05:02:25.548512Z |
| gsd-2024-31178 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.548294Z |
| gsd-2024-31390 | Improper Control of Generation of Code ('Code Injection') vulnerability in Soflyy Breakda… | 2024-04-03T05:02:25.548076Z |
| gsd-2024-31327 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.547849Z |
| gsd-2024-31119 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.547629Z |
| gsd-2024-31000 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.547408Z |
| gsd-2024-31211 | WordPress is an open publishing platform for the Web. Unserialization of instances of the… | 2024-04-03T05:02:25.547142Z |
| gsd-2024-31372 | Cross-Site Request Forgery (CSRF) vulnerability in Arnan de Gans No-Bot Registration.This… | 2024-04-03T05:02:25.546906Z |
| gsd-2024-31299 | Cross-Site Request Forgery (CSRF) vulnerability in Reservation Diary ReDi Restaurant Rese… | 2024-04-03T05:02:25.546609Z |
| gsd-2024-31142 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.546388Z |
| gsd-2024-31309 | HTTP/2 CONTINUATION DoS attack can cause Apache Traffic Server to consume more resources … | 2024-04-03T05:02:25.546171Z |
| gsd-2024-31231 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.545953Z |
| gsd-2024-31196 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.545733Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-190412 | Malicious code in xo-quasarjet-publish-npm (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190411 | Malicious code in xo-phylogenetics-kastra-triton (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190410 | Malicious code in xo-nightmare-magellan-eslint-plugin (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190409 | Malicious code in xo-morgan-css-loader-prompts (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190408 | Malicious code in xo-mini-css-extract-plugin-vega-koa (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190407 | Malicious code in xo-koa-metalsmith-perseus (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190406 | Malicious code in xo-indus-procyon-indus (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190405 | Malicious code in xo-helios-child-process-pm2 (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190404 | Malicious code in xo-halley-less-loader-cache (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190403 | Malicious code in xo-csrf-radiant-halley (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190402 | Malicious code in xo-castor-frontend-indus (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190401 | Malicious code in xml-sigma-meta-daemon-delta (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190400 | Malicious code in xml-sails-cluster-mysql (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190399 | Malicious code in xml-proxima-rest-process (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190398 | Malicious code in xml-procyon-css-minimizer-webpack-plugin-iota (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190397 | Malicious code in xml-phoebe-protoplanetarydisk-magnetar (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190396 | Malicious code in xml-oberon-axios-neuromorphic (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190395 | Malicious code in xml-ganymede-blackhole-chalk (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190394 | Malicious code in xml-eris-lyra-tectonophysics (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190393 | Malicious code in xi-moon-star-fire-await (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190392 | Malicious code in xi-minify-bundle-sigma-query (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190391 | Malicious code in xi-grid-module-sed-warn (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190390 | Malicious code in xi-abstract-user-alert-parse (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190389 | Malicious code in xerxes-perseus-antd-subscription (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190388 | Malicious code in xerxes-paleontology-dorado-pavo (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190387 | Malicious code in xerxes-nuxtjs-enif-superposition (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190386 | Malicious code in xerxes-non-blocking-baryon-solarnebula (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190385 | Malicious code in xerxes-koa-promise-meteor (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190384 | Malicious code in xerxes-coronalmassejection-flare-filament (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190383 | Malicious code in xerxes-auth-jekyll-ionosphere (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-3160 | Checkmk: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2024-10-13T22:00:00.000+00:00 | 2024-10-13T22:00:00.000+00:00 |
| wid-sec-w-2024-3159 | Google Chrome: Schwachstelle ermöglicht Codeausführung | 2024-10-13T22:00:00.000+00:00 | 2024-10-13T22:00:00.000+00:00 |
| wid-sec-w-2024-3158 | Progress Software Telerik Report Server: Mehrere Schwachstellen | 2024-10-13T22:00:00.000+00:00 | 2024-10-13T22:00:00.000+00:00 |
| wid-sec-w-2024-3156 | Irfan Skiljan IrfanView: Mehrere Schwachstellen ermöglichen Codeausführung | 2024-10-13T22:00:00.000+00:00 | 2024-10-13T22:00:00.000+00:00 |
| wid-sec-w-2024-3152 | Microsoft GitHub Enterprise: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-10-13T22:00:00.000+00:00 | 2024-10-13T22:00:00.000+00:00 |
| wid-sec-w-2024-3151 | Kemp LoadMaster: Schwachstelle ermöglicht Befehlsinjektion | 2024-10-10T22:00:00.000+00:00 | 2024-10-10T22:00:00.000+00:00 |
| wid-sec-w-2024-3149 | Hashicorp Vault: Schwachstelle ermöglicht Privilegieneskalation | 2024-10-10T22:00:00.000+00:00 | 2024-10-10T22:00:00.000+00:00 |
| wid-sec-w-2024-3145 | IBM Storage Scale: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-10-10T22:00:00.000+00:00 | 2024-10-10T22:00:00.000+00:00 |
| wid-sec-w-2024-3144 | Rockwell Automation ControlLogix: Schwachstelle ermöglicht Denial of Service | 2024-10-10T22:00:00.000+00:00 | 2024-10-10T22:00:00.000+00:00 |
| wid-sec-w-2024-3143 | Samsung Exynos: Schwachstelle ermöglicht Denial of Service | 2024-10-10T22:00:00.000+00:00 | 2024-10-10T22:00:00.000+00:00 |
| wid-sec-w-2024-3107 | Ivanti Endpoint Manager Mobile: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-10-08T22:00:00.000+00:00 | 2024-10-10T22:00:00.000+00:00 |
| wid-sec-w-2024-2198 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2024-09-22T22:00:00.000+00:00 | 2024-10-10T22:00:00.000+00:00 |
| wid-sec-w-2024-2123 | Microsoft Windows: Mehrere Schwachstellen | 2024-09-10T22:00:00.000+00:00 | 2024-10-10T22:00:00.000+00:00 |
| wid-sec-w-2024-1958 | Linux Kernel: Schwachstelle ermöglicht DoS | 2024-08-29T22:00:00.000+00:00 | 2024-10-10T22:00:00.000+00:00 |
| wid-sec-w-2023-0597 | Veeam Backup & Replication: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-03-07T23:00:00.000+00:00 | 2024-10-10T22:00:00.000+00:00 |
| wid-sec-w-2024-3139 | Progress Software Telerik Report Server: Mehrere Schwachstellen | 2024-10-09T22:00:00.000+00:00 | 2024-10-09T22:00:00.000+00:00 |
| wid-sec-w-2024-3137 | OWASP ModSecurity: Schwachstelle ermöglicht Denial of Service | 2024-10-09T22:00:00.000+00:00 | 2024-10-09T22:00:00.000+00:00 |
| wid-sec-w-2024-3136 | GitLab: Mehrere Schwachstellen | 2024-10-09T22:00:00.000+00:00 | 2024-10-09T22:00:00.000+00:00 |
| wid-sec-w-2024-3135 | DrayTek Vigor: Schwachstelle ermöglicht Codeausführung | 2024-10-09T22:00:00.000+00:00 | 2024-10-09T22:00:00.000+00:00 |
| wid-sec-w-2024-3132 | VMware NSX und Cloud Foundation: Mehrere Schwachstellen | 2024-10-09T22:00:00.000+00:00 | 2024-10-09T22:00:00.000+00:00 |
| wid-sec-w-2024-3131 | PaloAlto Networks Cortex XSOAR: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-10-09T22:00:00.000+00:00 | 2024-10-09T22:00:00.000+00:00 |
| wid-sec-w-2024-3130 | PaloAlto Networks PAN-OS: Mehrere Schwachstellen ermöglichen Denial of Service und Privilegieneskalation | 2024-10-09T22:00:00.000+00:00 | 2024-10-09T22:00:00.000+00:00 |
| wid-sec-w-2024-3128 | Microsoft Teams: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-10-09T22:00:00.000+00:00 | 2024-10-09T22:00:00.000+00:00 |
| wid-sec-w-2024-1950 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2024-08-28T22:00:00.000+00:00 | 2024-10-09T22:00:00.000+00:00 |
| wid-sec-w-2024-1619 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2024-07-15T22:00:00.000+00:00 | 2024-10-09T22:00:00.000+00:00 |
| wid-sec-w-2024-1446 | LibreOffice: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-06-24T22:00:00.000+00:00 | 2024-10-09T22:00:00.000+00:00 |
| wid-sec-w-2024-1076 | npm: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-01-24T23:00:00.000+00:00 | 2024-10-09T22:00:00.000+00:00 |
| wid-sec-w-2024-0559 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-03-05T23:00:00.000+00:00 | 2024-10-09T22:00:00.000+00:00 |
| wid-sec-w-2024-0474 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2024-02-22T23:00:00.000+00:00 | 2024-10-09T22:00:00.000+00:00 |
| wid-sec-w-2024-0330 | Fortinet FortiOS: Mehrere Schwachstellen ermöglichen Codeausführung | 2024-02-08T23:00:00.000+00:00 | 2024-10-09T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhba-2019:3303 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.2.4 images update | 2019-11-13T18:55:26+00:00 | 2026-01-28T16:02:58+00:00 |
| rhsa-2022:7343 | Red Hat Security Advisory: pcs security update | 2022-11-02T16:34:31+00:00 | 2026-01-28T15:46:33+00:00 |
| rhsa-2021:0851 | Red Hat Security Advisory: pki-core security and bug fix update | 2021-03-16T13:53:30+00:00 | 2026-01-28T15:46:28+00:00 |
| rhba-2025:1600 | Red Hat Bug Fix Advisory: Red Hat Quay v3.10.9 bug fix release | 2025-02-24T04:48:51+00:00 | 2026-01-28T15:46:09+00:00 |
| rhba-2025:1599 | Red Hat Bug Fix Advisory: Red Hat Quay v3.11.9 bug fix release | 2025-02-24T04:06:56+00:00 | 2026-01-28T15:46:09+00:00 |
| rhba-2025:1598 | Red Hat Bug Fix Advisory: Red Hat Quay v3.12.8 bug fix release | 2025-02-24T03:44:11+00:00 | 2026-01-28T15:46:09+00:00 |
| rhba-2025:1597 | Red Hat Bug Fix Advisory: Red Hat Quay v3.9.10 bug fix release | 2025-02-24T06:54:10+00:00 | 2026-01-28T15:46:07+00:00 |
| rhba-2025:1079 | Red Hat Bug Fix Advisory: Red Hat Quay v3.13.4 bug fix release | 2025-02-24T03:42:46+00:00 | 2026-01-28T15:46:07+00:00 |
| rhsa-2025:9448 | Red Hat Security Advisory: emacs security update | 2025-06-24T06:48:50+00:00 | 2026-01-28T15:35:23+00:00 |
| rhsa-2025:7437 | Red Hat Security Advisory: avahi security update | 2025-05-13T14:13:01+00:00 | 2026-01-28T15:35:22+00:00 |
| rhsa-2025:4794 | Red Hat Security Advisory: emacs security update | 2025-05-12T10:04:02+00:00 | 2026-01-28T15:35:22+00:00 |
| rhsa-2025:4793 | Red Hat Security Advisory: emacs security update | 2025-05-12T10:29:22+00:00 | 2026-01-28T15:35:22+00:00 |
| rhsa-2025:4787 | Red Hat Security Advisory: emacs security update | 2025-05-12T01:33:16+00:00 | 2026-01-28T15:35:21+00:00 |
| rhsa-2025:11030 | Red Hat Security Advisory: emacs security update | 2025-07-15T01:37:44+00:00 | 2026-01-28T15:35:11+00:00 |
| rhsa-2025:0064 | Red Hat Security Advisory: kernel-rt security update | 2025-01-08T00:24:16+00:00 | 2026-01-28T15:35:00+00:00 |
| rhsa-2025:0063 | Red Hat Security Advisory: kernel security update | 2025-01-08T02:56:21+00:00 | 2026-01-28T15:35:00+00:00 |
| rhsa-2024:8161 | Red Hat Security Advisory: kernel security update | 2024-10-16T00:36:58+00:00 | 2026-01-28T15:34:57+00:00 |
| rhsa-2024:10941 | Red Hat Security Advisory: kernel security update | 2024-12-11T16:19:38+00:00 | 2026-01-28T15:34:40+00:00 |
| rhsa-2025:1802 | Red Hat Security Advisory: tuned security update | 2025-02-25T11:35:07+00:00 | 2026-01-28T15:17:28+00:00 |
| rhsa-2025:1785 | Red Hat Security Advisory: tuned security update | 2025-02-25T07:26:06+00:00 | 2026-01-28T15:17:27+00:00 |
| rhsa-2025:0881 | Red Hat Security Advisory: tuned security update | 2025-02-03T00:09:45+00:00 | 2026-01-28T15:17:26+00:00 |
| rhsa-2025:0880 | Red Hat Security Advisory: tuned security update | 2025-02-03T00:09:45+00:00 | 2026-01-28T15:17:20+00:00 |
| rhsa-2025:0879 | Red Hat Security Advisory: tuned security update | 2025-02-03T00:09:34+00:00 | 2026-01-28T15:17:19+00:00 |
| rhsa-2025:0327 | Red Hat Security Advisory: tuned security update | 2025-01-15T09:47:02+00:00 | 2026-01-28T15:17:16+00:00 |
| rhsa-2025:0368 | Red Hat Security Advisory: tuned security update | 2025-01-16T11:46:25+00:00 | 2026-01-28T15:17:14+00:00 |
| rhsa-2025:0195 | Red Hat Security Advisory: tuned security update | 2025-01-09T14:56:20+00:00 | 2026-01-28T15:17:12+00:00 |
| rhsa-2024:9605 | Red Hat Security Advisory: kernel security update | 2024-11-14T00:29:34+00:00 | 2026-01-28T15:17:06+00:00 |
| rhsa-2024:9546 | Red Hat Security Advisory: kernel security update | 2024-11-13T15:59:33+00:00 | 2026-01-28T15:17:06+00:00 |
| rhsa-2024:9500 | Red Hat Security Advisory: kernel security update | 2024-11-13T00:31:50+00:00 | 2026-01-28T15:17:04+00:00 |
| rhsa-2024:9498 | Red Hat Security Advisory: kernel-rt security update | 2024-11-13T00:14:10+00:00 | 2026-01-28T15:17:03+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2024-45782 | Grub2: fs/hfs: strcpy() using the volume name (fs/hfs.c:382) | 2025-03-02T00:00:00.000Z | 2025-09-04T07:36:59.000Z |
| msrc_cve-2024-36921 | wifi: iwlwifi: mvm: guard against invalid STA ID on removal | 2024-05-02T07:00:00.000Z | 2025-09-04T07:03:47.000Z |
| msrc_cve-2025-1125 | Grub2: fs/hfs: integer overflow may lead to heap based out-of-bounds write | 2025-03-02T00:00:00.000Z | 2025-09-04T06:54:25.000Z |
| msrc_cve-2025-0689 | Grub2: udf: heap based buffer overflow in grub_udf_read_block() may lead to arbitrary code execution | 2025-03-02T00:00:00.000Z | 2025-09-04T06:48:57.000Z |
| msrc_cve-2024-45779 | Grub2: fs/bfs: integer overflow leads to heap oob read in the bfs parser | 2025-03-02T00:00:00.000Z | 2025-09-04T06:42:54.000Z |
| msrc_cve-2024-45780 | Grub2: fs/tar: integer overflow causes heap oob write | 2025-03-02T00:00:00.000Z | 2025-09-04T06:35:46.000Z |
| msrc_cve-2024-0584 | Rejected reason: Do not use this CVE as it is duplicate of CVE-2023-6932 | 2024-01-01T08:00:00.000Z | 2025-09-04T05:37:15.000Z |
| msrc_cve-2022-36113 | Extracting malicious crates can corrupt arbitrary files | 2022-09-02T00:00:00.000Z | 2025-09-04T05:16:16.000Z |
| msrc_cve-2025-38376 | usb: chipidea: udc: disconnect/reconnect from host when do suspend/resume | 2025-07-02T00:00:00.000Z | 2025-09-04T05:14:38.000Z |
| msrc_cve-2024-25260 | elfutils v0.189 was discovered to contain a NULL pointer dereference via the handle_verdef() function at readelf.c. | 2024-02-02T08:00:00.000Z | 2025-09-04T04:57:15.000Z |
| msrc_cve-2025-38404 | usb: typec: displayport: Fix potential deadlock | 2025-07-02T00:00:00.000Z | 2025-09-04T04:49:40.000Z |
| msrc_cve-2025-38560 | x86/sev: Evict cache lines during SNP memory validation | 2025-08-02T00:00:00.000Z | 2025-09-04T04:44:06.000Z |
| msrc_cve-2022-36114 | Extracting malicious crates can fill the file system | 2022-09-02T00:00:00.000Z | 2025-09-04T04:34:20.000Z |
| msrc_cve-2025-4878 | Libssh: use of uninitialized variable in privatekey_from_file() | 2025-07-02T00:00:00.000Z | 2025-09-04T04:13:58.000Z |
| msrc_cve-2025-50200 | RabbitMQ Node can log Basic Auth header from an HTTP request | 2025-06-02T00:00:00.000Z | 2025-09-04T04:09:13.000Z |
| msrc_cve-2025-54314 | Thor before 1.4.0 can construct an unsafe shell command from library input. NOTE: this is disputed by the Supplier because "the method that was fixed can only be used with arguments that are controlled by Thor, and there is no way an attacker can take control of those arguments." | 2025-07-02T00:00:00.000Z | 2025-09-04T04:06:48.000Z |
| msrc_cve-2025-6141 | GNU ncurses parse_entry.c postprocess_termcap stack-based overflow | 2025-06-02T00:00:00.000Z | 2025-09-04T03:58:14.000Z |
| msrc_cve-2025-38568 | net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing | 2025-08-02T00:00:00.000Z | 2025-09-04T03:57:06.000Z |
| msrc_cve-2024-1552 | Incorrect code generation could have led to unexpected numeric conversions and potential undefined behavior.*Note:* This issue only affects 32-bit ARM devices. This vulnerability affects Firefox < 123, Firefox ESR < 115.8, and Thunderbird < 115.8. | 2024-02-02T08:00:00.000Z | 2025-09-04T03:56:01.000Z |
| msrc_cve-2024-38628 | usb: gadget: u_audio: Fix race condition use of controls after free during gadget unbind. | 2024-06-02T07:00:00.000Z | 2025-09-04T03:53:18.000Z |
| msrc_cve-2024-57984 | i3c: dw: Fix use-after-free in dw_i3c_master driver due to race condition | 2025-02-02T00:00:00.000Z | 2025-09-04T03:45:33.000Z |
| msrc_cve-2025-49795 | Libxml: null pointer dereference leads to denial of service (dos) | 2025-06-02T00:00:00.000Z | 2025-09-04T03:44:32.000Z |
| msrc_cve-2025-38611 | vmci: Prevent the dispatching of uninitialized payloads | 2025-08-02T00:00:00.000Z | 2025-09-04T03:38:53.000Z |
| msrc_cve-2022-49651 | srcu: Tighten cleanup_srcu_struct() GP checks | 2025-02-02T00:00:00.000Z | 2025-09-04T03:37:05.000Z |
| msrc_cve-2025-38566 | sunrpc: fix handling of server side tls alerts | 2025-08-02T00:00:00.000Z | 2025-09-04T03:32:11.000Z |
| msrc_cve-2025-45768 | pyjwt v2.10.1 was discovered to contain weak encryption. NOTE: this is disputed by the Supplier because the key length is chosen by the application that uses the library (admittedly, library users may benefit from a minimum value and a mechanism for opting in to strict enforcement). | 2025-07-02T00:00:00.000Z | 2025-09-04T03:30:36.000Z |
| msrc_cve-2025-54126 | WebAssembly Micro Runtime's `--addr-pool` option allows all IPv4 addresses when subnet mask is not specified | 2025-07-02T00:00:00.000Z | 2025-09-04T03:22:55.000Z |
| msrc_cve-2025-40777 | A possible assertion failure when 'stale-answer-client-timeout' is set to '0' | 2025-07-02T00:00:00.000Z | 2025-09-04T03:14:11.000Z |
| msrc_cve-2024-21176 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Thread Pooling). Supported versions that are affected are 8.4.0 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2024-07-01T07:00:00.000Z | 2025-09-04T03:09:45.000Z |
| msrc_cve-2025-38349 | eventpoll: don't decrement ep refcount while still holding the ep mutex | 2025-07-02T00:00:00.000Z | 2025-09-04T03:09:39.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202209-1579 | Tenda W20E router V15.11.0.6 contains a stack overflow in the function formSetPortMapping… | 2025-05-23T23:19:57.786000Z |
| var-202209-1829 | Tenda i9 v1.0.0.8(3828) was discovered to contain a command injection vulnerability via t… | 2025-05-23T23:19:57.715000Z |
| var-202209-1828 | Tenda i9 v1.0.0.8(3828) was discovered to contain a buffer overflow via the formwrlSSIDge… | 2025-05-23T23:19:10.194000Z |
| var-202411-0867 | Tenda G3 v3.0 v15.11.0.20 was discovered to contain a stack overflow via the formSetPortM… | 2025-05-23T23:19:06.682000Z |
| var-202111-1781 | The HwNearbyMain module has a Improper Validation of Array Index vulnerability.Successful… | 2025-05-23T23:18:16.358000Z |
| var-202408-2480 | Tenda AX1806 v1.0.0.1 contains a stack overflow via the adv.iptv.stballvlans parameter in… | 2025-05-23T23:18:08.377000Z |
| var-202409-1305 | Stack overflow vulnerability in the Login function in the HNAP service in D-Link DCS-960L… | 2025-05-23T23:18:08.266000Z |
| var-202411-2191 | Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 were… | 2025-05-23T23:18:07.913000Z |
| var-202504-3268 | A vulnerability, which was classified as critical, was found in Netgear JWNR2000v2 1.0.0.… | 2025-05-23T23:18:07.060000Z |
| var-202505-0010 | A vulnerability, which was classified as critical, was found in Netgear EX6200 1.0.3.94. … | 2025-05-23T23:18:07.008000Z |
| var-202505-1585 | A vulnerability has been identified in IEC 1Ph 7.4kW Child socket (8EM1310-2EH04-0GA0) (A… | 2025-05-23T23:18:06.902000Z |
| var-202505-1586 | A vulnerability has been identified in IEC 1Ph 7.4kW Child socket (8EM1310-2EH04-0GA0) (A… | 2025-05-23T23:18:06.886000Z |
| var-201903-0181 | The Conexus telemetry protocol utilized within Medtronic MyCareLink Monitor versions 2495… | 2025-05-23T23:16:00.618000Z |
| var-201903-1617 | The Conexus telemetry protocol utilized within Medtronic MyCareLink Monitor versions 2495… | 2025-05-23T23:16:00.573000Z |
| var-202111-1767 | There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation… | 2025-05-23T23:15:57.508000Z |
| var-202209-1665 | Tenda i9 v1.0.0.8(3828) was discovered to contain a buffer overflow via the formWifiMacFi… | 2025-05-23T23:15:52.777000Z |
| var-202411-2364 | Netgear R8500 v1.0.2.160, XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 were… | 2025-05-23T23:15:48.338000Z |
| var-202411-2742 | Netgear XR300 v1.0.3.78, R7000P v1.3.3.154, and R6400 v2 1.0.4.128 was discovered to cont… | 2025-05-23T23:15:48.308000Z |
| var-202505-0005 | A vulnerability has been found in Netgear EX6200 1.0.3.94 and classified as critical. Aff… | 2025-05-23T23:15:47.448000Z |
| var-202111-1774 | The HwNearbyMain module has a Data Processing Errors vulnerability.Successful exploitatio… | 2025-05-23T23:14:25.836000Z |
| var-202209-1795 | Tenda W20E router V15.11.0.6 (US_W20EV4.0br_V15.11.0.6(1068_1546_841)_CN_TDC) contains a … | 2025-05-23T23:14:24.701000Z |
| var-202404-1971 | An information leak in currentsetting.htm of Netgear R6850 v1.1.0.88 allows attackers to … | 2025-05-23T23:13:54.339000Z |
| var-202111-1782 | The HwNearbyMain module has a NULL Pointer Dereference vulnerability.Successful exploitat… | 2025-05-23T23:13:26.754000Z |
| var-202111-1784 | The screen lock module has a Stack-based Buffer Overflow vulnerability.Successful exploit… | 2025-05-23T23:13:26.723000Z |
| var-202209-1625 | Tenda W20E router V15.11.0.6 (US_W20EV4.0br_V15.11.0.6(1068_1546_841)_CN_TDC) contains a … | 2025-05-23T23:13:25.501000Z |
| var-202209-1792 | Tenda i9 v1.0.0.8(3828) was discovered to contain a buffer overflow via the formWifiMacFi… | 2025-05-23T23:13:25.470000Z |
| var-202404-2497 | D-Link DIR-823G A1V1.0.2B05 was found to contain a Null-pointer dereference in the main f… | 2025-05-23T23:13:22.592000Z |
| var-202408-2398 | A vulnerability has been found in Tenda O1 1.0.0.7(10648) and classified as critical. Aff… | 2025-05-23T23:13:21.919000Z |
| var-202209-1788 | This issue was addressed with improved checks. This issue is fixed in tvOS 15.5, watchOS … | 2025-05-23T23:11:27.479000Z |
| var-202407-0376 | A vulnerability was found in Netgear WN604 up to 20240710. It has been rated as problemat… | 2025-05-23T23:11:24.097000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2024:1317-1 | Security update for emacs | 2024-04-16T15:09:36Z | 2024-04-16T15:09:36Z |
| suse-su-2024:1312-1 | Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP4) | 2024-04-16T12:33:32Z | 2024-04-16T12:33:32Z |
| suse-su-2024:1311-1 | Security update for kubevirt, virt-api-container, virt-controller-container, virt-exportproxy-container, virt-exportserver-container, virt-handler-container, virt-launcher-container, virt-libguestfs-tools-container, virt-operator-container, virt-pr-helper-container | 2024-04-16T11:03:43Z | 2024-04-16T11:03:43Z |
| suse-su-2024:1310-1 | Security update for texlive | 2024-04-16T10:02:49Z | 2024-04-16T10:02:49Z |
| suse-su-2024:1309-1 | Security update for nodejs18 | 2024-04-16T09:32:58Z | 2024-04-16T09:32:58Z |
| suse-su-2024:1308-1 | Security update for nodejs16 | 2024-04-16T09:32:34Z | 2024-04-16T09:32:34Z |
| suse-su-2024:1307-1 | Security update for nodejs18 | 2024-04-16T09:32:01Z | 2024-04-16T09:32:01Z |
| suse-su-2024:1306-1 | Security update for nodejs16 | 2024-04-16T09:31:48Z | 2024-04-16T09:31:48Z |
| suse-su-2024:1305-1 | Security update for nodejs16 | 2024-04-16T09:31:33Z | 2024-04-16T09:31:33Z |
| suse-su-2024:1304-1 | Security update for eclipse, maven-surefire, tycho | 2024-04-16T09:00:06Z | 2024-04-16T09:00:06Z |
| suse-su-2024:1301-1 | Security update for nodejs20 | 2024-04-16T01:33:32Z | 2024-04-16T01:33:32Z |
| suse-su-2024:1299-1 | Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP4) | 2024-04-15T18:03:37Z | 2024-04-15T18:03:37Z |
| suse-su-2024:1298-1 | Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP4) | 2024-04-15T17:03:32Z | 2024-04-15T17:03:32Z |
| suse-su-2024:1296-1 | Security update for texlive | 2024-04-15T16:37:47Z | 2024-04-15T16:37:47Z |
| suse-su-2024:1295-1 | Security update for xen | 2024-04-15T16:37:22Z | 2024-04-15T16:37:22Z |
| suse-su-2024:1294-1 | Security update for emacs | 2024-04-15T16:37:08Z | 2024-04-15T16:37:08Z |
| suse-su-2024:1293-1 | Security update for webkit2gtk3 | 2024-04-15T14:48:15Z | 2024-04-15T14:48:15Z |
| suse-su-2024:1292-1 | Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP4) | 2024-04-15T14:33:45Z | 2024-04-15T14:33:45Z |
| suse-su-2024:1288-1 | Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP4) | 2024-04-15T14:33:39Z | 2024-04-15T14:33:39Z |
| suse-su-2024:1287-1 | Security update for vim | 2024-04-15T13:03:42Z | 2024-04-15T13:03:42Z |
| suse-su-2024:1280-1 | Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP4) | 2024-04-12T21:05:22Z | 2024-04-12T21:05:22Z |
| suse-su-2024:1278-1 | Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP5) | 2024-04-12T16:04:16Z | 2024-04-12T16:04:16Z |
| suse-su-2024:1276-1 | Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP3) | 2024-04-12T16:04:06Z | 2024-04-12T16:04:06Z |
| suse-su-2024:1275-1 | Security update for the Linux Kernel (Live Patch 54 for SLE 12 SP5) | 2024-04-12T16:03:47Z | 2024-04-12T16:03:47Z |
| suse-su-2024:1274-1 | Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP5) | 2024-04-12T15:03:41Z | 2024-04-12T15:03:41Z |
| suse-su-2024:1273-1 | Security update for the Linux Kernel RT (Live Patch 10 for SLE 15 SP5) | 2024-04-12T14:33:32Z | 2024-04-12T14:33:32Z |
| suse-su-2024:1271-3 | Security update for gnutls | 2024-04-12T13:36:09Z | 2024-04-12T13:36:09Z |
| suse-su-2024:1271-1 | Security update for gnutls | 2024-04-12T13:35:57Z | 2024-04-12T13:35:57Z |
| suse-su-2024:1270-1 | Security update for webkit2gtk3 | 2024-04-12T13:35:02Z | 2024-04-12T13:35:02Z |
| suse-su-2024:1269-1 | Security update for webkit2gtk3 | 2024-04-12T13:34:17Z | 2024-04-12T13:34:17Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:10898-1 | konversation-21.08.1-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10897-1 | koan-3.0.1-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10896-1 | kitty-0.21.2-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10895-1 | kismet-2021_08_R1-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10894-1 | kernel-firmware-20210901-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10893-1 | keepalived-2.2.2-4.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10892-1 | kdump-0.9.1-3.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10891-1 | kdenetwork-filesharing-21.08.1-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10890-1 | kdeconnect-kde-21.08.1-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10889-1 | kconf_update5-5.86.0-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10888-1 | kcodecs-devel-5.86.0-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10887-1 | kauth-devel-5.86.0-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10886-1 | kafka-source-2.1.0-3.6 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10885-1 | kaffeine-2.0.18-1.17 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10884-1 | k3s-1.21.3+k3s1-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10883-1 | jsr-305-3.0.2-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10882-1 | jsoup-1.14.2-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10881-1 | jq-1.6-2.9 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10880-1 | jhead-3.06.0.1-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10879-1 | jgraphx-3.9.2-1.9 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10878-1 | jetty-annotations-9.4.43-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10877-1 | jdom2-2.0.6-3.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10876-1 | java-1_8_0-openjdk-1.8.0.302-2.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10875-1 | java-1_8_0-openj9-1.8.0.292-3.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10874-1 | java-16-openjdk-16.0.2.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10873-1 | java-15-openjdk-15.0.4.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10872-1 | java-13-openjdk-13.0.8.0-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10871-1 | java-11-openjdk-11.0.12.0-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10870-1 | java-11-openj9-11.0.11.0-3.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10869-1 | jasper-2.0.33-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-19242 | LibTIFF缓冲区溢出漏洞 | 2025-08-20 | 2025-08-22 |
| cnvd-2025-19241 | Adobe InDesign Desktop缓冲区溢出漏洞(CNVD-2025-19241) | 2025-08-15 | 2025-08-22 |
| cnvd-2025-19240 | Adobe Substance3D Painter越界读取漏洞(CNVD-2025-19240) | 2025-08-18 | 2025-08-22 |
| cnvd-2025-19239 | Adobe Substance3D Painter越界读取漏洞(CNVD-2025-19239) | 2025-08-18 | 2025-08-22 |
| cnvd-2025-19238 | Adobe Substance3D Painter越界读取漏洞(CNVD-2025-19238) | 2025-08-18 | 2025-08-22 |
| cnvd-2025-19237 | Adobe Substance3D Painter越界写入漏洞(CNVD-2025-19237) | 2025-08-18 | 2025-08-22 |
| cnvd-2025-19236 | Adobe Substance3D Painter越界读取漏洞(CNVD-2025-19236) | 2025-08-18 | 2025-08-22 |
| cnvd-2025-19235 | Adobe Substance3D Painter越界读取漏洞(CNVD-2025-19235) | 2025-08-18 | 2025-08-22 |
| cnvd-2025-19230 | Adobe Substance3D Modeler越界读取漏洞(CNVD-2025-19230) | 2025-08-18 | 2025-08-22 |
| cnvd-2025-19229 | Adobe Substance3D Modeler越界写入漏洞(CNVD-2025-19229) | 2025-08-18 | 2025-08-22 |
| cnvd-2025-19228 | Adobe Substance3D Modeler代码执行漏洞(CNVD-2025-19228) | 2025-08-18 | 2025-08-22 |
| cnvd-2025-19227 | Adobe Substance3D Modeler越界读取漏洞(CNVD-2025-19227) | 2025-08-18 | 2025-08-22 |
| cnvd-2025-19226 | Adobe Substance3D Modeler越界读取漏洞(CNVD-2025-19226) | 2025-08-18 | 2025-08-22 |
| cnvd-2025-19225 | Adobe Substance3D Modeler越界读取漏洞(CNVD-2025-19225) | 2025-08-18 | 2025-08-22 |
| cnvd-2025-19224 | Adobe Substance3D Modeler越界读取漏洞(CNVD-2025-19224) | 2025-08-18 | 2025-08-22 |
| cnvd-2025-19223 | Adobe Substance3D Modeler越界读取漏洞(CNVD-2025-19223) | 2025-08-18 | 2025-08-22 |
| cnvd-2025-19222 | Adobe Substance3D Modeler越界写入漏洞 | 2025-08-18 | 2025-08-22 |
| cnvd-2025-19221 | Adobe Substance3D Modeler越界读取漏洞(CNVD-2025-19221) | 2025-08-18 | 2025-08-22 |
| cnvd-2025-19220 | Adobe Substance3D Painter越界读取漏洞(CNVD-2025-19220) | 2025-08-18 | 2025-08-22 |
| cnvd-2025-19219 | Adobe Substance3D Modeler越界读取漏洞 | 2025-08-18 | 2025-08-22 |
| cnvd-2025-19218 | Adobe Substance3D Painter越界读取漏洞(CNVD-2025-19218) | 2025-08-18 | 2025-08-22 |
| cnvd-2025-19217 | Adobe Substance3D Painter越界读取漏洞 | 2025-08-20 | 2025-08-22 |
| cnvd-2025-19127 | coolLabs Coolify跨站脚本漏洞 | 2025-02-06 | 2025-08-22 |
| cnvd-2025-19126 | coolLabs Coolify命令执行漏洞 | 2025-02-06 | 2025-08-22 |
| cnvd-2025-19125 | coolLabs Coolify拒绝服务漏洞 | 2025-02-06 | 2025-08-22 |
| cnvd-2025-19124 | coolLabs Coolify信息泄露漏洞(CNVD-2025-19124) | 2025-02-06 | 2025-08-22 |
| cnvd-2025-19123 | coolLabs Coolify信息泄露漏洞 | 2025-02-06 | 2025-08-22 |
| cnvd-2025-19122 | coolLabs Coolify远程命令执行漏洞 | 2025-02-06 | 2025-08-22 |
| cnvd-2025-19121 | coolLabs Coolify权限提升漏洞 | 2025-02-06 | 2025-08-22 |
| cnvd-2025-19120 | coolLabs Coolify存在未明漏洞 | 2025-02-06 | 2025-08-22 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2021-avi-191 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2021-03-15T00:00:00.000000 | 2021-03-15T00:00:00.000000 |
| certfr-2021-avi-190 | Vulnérabilité dans IBM Db2 | 2021-03-12T00:00:00.000000 | 2021-03-12T00:00:00.000000 |
| certfr-2021-avi-189 | Multiples vulnérabilités dans F5 BIG-IP | 2021-03-11T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2021-avi-188 | Multiples vulnérabilités dans IBM Db2 | 2021-03-11T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2021-avi-187 | Multiples vulnérabilités dans les produits Symantec | 2021-03-11T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2021-avi-186 | Vulnérabilité dans Wireshark | 2021-03-11T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2021-avi-185 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2021-03-11T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2021-avi-184 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2021-03-11T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2021-avi-183 | Multiples vulnérabilités dans les produits Aruba | 2021-03-10T00:00:00.000000 | 2021-03-10T00:00:00.000000 |
| certfr-2021-avi-182 | Multiples vulnérabilités dans les produits Microsoft | 2021-03-10T00:00:00.000000 | 2021-03-10T00:00:00.000000 |
| certfr-2021-avi-181 | Multiples vulnérabilités dans Microsoft Windows | 2021-03-10T00:00:00.000000 | 2021-03-10T00:00:00.000000 |
| certfr-2021-avi-180 | Multiples vulnérabilités dans Microsoft Office | 2021-03-10T00:00:00.000000 | 2021-03-10T00:00:00.000000 |
| certfr-2021-avi-179 | Vulnérabilité dans Microsoft Edge | 2021-03-10T00:00:00.000000 | 2021-03-10T00:00:00.000000 |
| certfr-2021-avi-178 | Multiples vulnérabilités dans Microsoft IE | 2021-03-10T00:00:00.000000 | 2021-03-10T00:00:00.000000 |
| certfr-2021-avi-177 | Vulnérabilité dans F5 BIG-IP | 2021-03-10T00:00:00.000000 | 2021-03-10T00:00:00.000000 |
| certfr-2021-avi-176 | Multiples vulnérabilités dans les produits Siemens | 2021-03-10T00:00:00.000000 | 2021-03-10T00:00:00.000000 |
| certfr-2021-avi-175 | Multiples vulnérabilités dans les produits Schneider | 2021-03-10T00:00:00.000000 | 2021-03-10T00:00:00.000000 |
| certfr-2021-avi-174 | Multiples vulnérabilités dans les produits SAP | 2021-03-09T00:00:00.000000 | 2021-03-09T00:00:00.000000 |
| certfr-2021-avi-173 | Vulnérabilité dans les produits Apple | 2021-03-09T00:00:00.000000 | 2021-03-09T00:00:00.000000 |
| certfr-2021-avi-172 | Multiples vulnérabilités dans GRUB | 2021-03-05T00:00:00.000000 | 2021-03-05T00:00:00.000000 |
| certfr-2021-avi-171 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2021-03-05T00:00:00.000000 | 2021-03-05T00:00:00.000000 |
| certfr-2021-avi-170 | Vulnérabilité dans Asterisk | 2021-03-05T00:00:00.000000 | 2021-03-05T00:00:00.000000 |
| certfr-2021-avi-169 | Multiples vulnérabilités dans GitLab | 2021-03-05T00:00:00.000000 | 2021-03-05T00:00:00.000000 |
| certfr-2021-avi-168 | Vulnérabilité dans Sonicwall Directory Service Connector | 2021-03-05T00:00:00.000000 | 2021-03-05T00:00:00.000000 |
| certfr-2021-avi-167 | Multiples vulnérabilités dans Microsoft Edge | 2021-03-05T00:00:00.000000 | 2021-03-05T00:00:00.000000 |
| certfr-2021-avi-166 | Vulnérabilité dans Cisco UTD Snort IPS Engine | 2021-03-04T00:00:00.000000 | 2021-03-04T00:00:00.000000 |
| certfr-2021-avi-165 | Multiples vulnérabilités dans Fortinet FortiProxy | 2021-03-04T00:00:00.000000 | 2021-03-04T00:00:00.000000 |
| certfr-2021-avi-164 | Multiples vulnérabilités dans Apache Tomcat | 2021-03-04T00:00:00.000000 | 2021-03-04T00:00:00.000000 |
| certfr-2021-avi-163 | Vulnérabilité dans VMware View Planner | 2021-03-04T00:00:00.000000 | 2021-03-04T00:00:00.000000 |
| certfr-2021-avi-162 | Multiples vulnérabilités dans Google Chrome | 2021-03-04T00:00:00.000000 | 2021-03-04T00:00:00.000000 |