Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-1964 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
WeKan REST Endpoint boards.js BoardTitleRESTBleed acce… |
n/a |
WeKan |
2026-02-05T21:32:07.791Z | 2026-02-23T09:18:36.178Z |
| CVE-2026-1963 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
WeKan Attachment Storage attachments.js MoveStorageBle… |
n/a |
WeKan |
2026-02-05T21:02:07.761Z | 2026-02-23T09:18:23.272Z |
| CVE-2026-1962 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
WeKan Attachment Migration attachmentMigration.js Atta… |
n/a |
WeKan |
2026-02-05T20:32:08.752Z | 2026-02-23T09:18:09.782Z |
| CVE-2026-1898 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
WeKan LDAP User Sync syncUser.js SyncLDAPBleed access … |
n/a |
WeKan |
2026-02-05T00:32:09.720Z | 2026-02-23T09:17:56.116Z |
| CVE-2026-1897 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
WeKan Position-History Tracking positionHistory.js Pos… |
n/a |
WeKan |
2026-02-05T00:02:07.858Z | 2026-02-23T09:17:43.503Z |
| CVE-2026-1896 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
WeKan Migration Operation comprehensiveBoardMigration.… |
n/a |
WeKan |
2026-02-04T23:32:08.549Z | 2026-02-23T09:17:30.908Z |
| CVE-2026-1895 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
WeKan Attachment Storage lists.js applyWipLimit ListWI… |
n/a |
WeKan |
2026-02-04T23:02:08.574Z | 2026-02-23T09:17:19.148Z |
| CVE-2026-1894 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
WeKan REST API checklistItems.js Checklist REST Bleed … |
n/a |
WeKan |
2026-02-04T22:32:08.834Z | 2026-02-23T09:17:07.401Z |
| CVE-2026-1892 |
2.3 (4.0)
5 (3.1)
5 (3.0)
|
WeKan REST API boards.js setBoardOrgs improper authorization |
n/a |
WeKan |
2026-02-04T22:02:10.073Z | 2026-02-23T09:16:53.549Z |
| CVE-2026-1884 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
ZenTao Webhook model.php fetchHook server-side request… |
n/a |
ZenTao |
2026-02-04T21:32:08.978Z | 2026-02-23T09:16:38.821Z |
| CVE-2026-1835 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
lcg0124 BootDo cross-site request forgery |
lcg0124 |
BootDo |
2026-02-04T00:02:08.877Z | 2026-02-23T09:16:25.074Z |
| CVE-2026-1813 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
bolo-blog bolo-solo FreeMarker Template PicUploadProce… |
bolo-blog |
bolo-solo |
2026-02-03T23:32:08.090Z | 2026-02-23T09:16:12.459Z |
| CVE-2026-1812 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
bolo-blog bolo-solo Filename BackupService.java import… |
bolo-blog |
bolo-solo |
2026-02-03T22:32:08.158Z | 2026-02-23T09:15:58.665Z |
| CVE-2026-1811 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
bolo-blog bolo-solo Filename BackupService.java import… |
bolo-blog |
bolo-solo |
2026-02-03T21:32:07.628Z | 2026-02-23T09:15:44.878Z |
| CVE-2026-1810 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
bolo-blog bolo-solo ZIP File BackupService.java unpack… |
bolo-blog |
bolo-solo |
2026-02-03T20:32:07.343Z | 2026-02-23T09:15:31.194Z |
| CVE-2026-1803 |
9.2 (4.0)
8.1 (3.1)
8.1 (3.0)
|
Ziroom ZHOME A0101 Dropbear SSH Service default credentials |
Ziroom |
ZHOME A0101 |
2026-02-03T20:02:05.815Z | 2026-02-23T09:15:17.008Z |
| CVE-2026-1802 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Ziroom ZHOME A0101 zrMacClone.lua macAddrClone command… |
Ziroom |
ZHOME A0101 |
2026-02-03T19:02:06.964Z | 2026-02-23T09:15:04.936Z |
| CVE-2025-15555 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Open5GS VoLTE Cx-Test hss-cx-path.c hss_ogs_diam_cx_ma… |
n/a |
Open5GS |
2026-02-04T20:32:07.223Z | 2026-02-23T09:14:52.222Z |
| CVE-2026-1746 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
JeecgBoot Online Report API loadDictItemByKeyword sql … |
n/a |
JeecgBoot |
2026-02-02T05:32:10.887Z | 2026-02-23T09:14:39.304Z |
| CVE-2026-1745 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
SourceCodester Medical Certificate Generator App cross… |
SourceCodester |
Medical Certificate Generator App |
2026-02-02T05:02:07.076Z | 2026-02-23T09:14:17.741Z |
| CVE-2026-1744 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
D-Link DSL-6641K sp_pppoe_user.js doSubmitPPP cross si… |
D-Link |
DSL-6641K |
2026-02-02T04:32:08.247Z | 2026-02-23T09:14:03.054Z |
| CVE-2026-1743 |
2.3 (4.0)
3.1 (3.1)
3.1 (3.0)
|
DJI Mavic Mini/Air/Spark/Mini SE Enhanced Wi-Fi Pairin… |
DJI |
Mavic Mini |
2026-02-02T04:02:07.053Z | 2026-02-23T09:13:47.578Z |
| CVE-2026-1742 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
EFM ipTIME A8004T VPN Service timepro.cgi commit_vpncl… |
EFM |
ipTIME A8004T |
2026-02-02T03:32:06.852Z | 2026-02-23T09:13:33.607Z |
| CVE-2026-1741 |
7.5 (4.0)
6.6 (3.1)
6.6 (3.0)
|
EFM ipTIME A8004T Debug d.cgi httpcon_check_session_ur… |
EFM |
ipTIME A8004T |
2026-02-02T03:02:06.833Z | 2026-02-23T09:13:22.116Z |
| CVE-2026-1740 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
EFM ipTIME A8004T Hidden Hiddenloginsetup timepro.cgi … |
EFM |
ipTIME A8004T |
2026-02-02T02:32:06.592Z | 2026-02-23T09:13:08.582Z |
| CVE-2026-1739 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Free5GC pcf smpolicy.go HandleCreateSmPolicyRequest nu… |
Free5GC |
pcf |
2026-02-02T02:02:10.383Z | 2026-02-23T09:12:55.936Z |
| CVE-2026-1738 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Open5GS SGWC context.c sgwc_tunnel_add assertion |
n/a |
Open5GS |
2026-02-02T01:32:07.067Z | 2026-02-23T09:12:42.490Z |
| CVE-2026-1737 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Open5GS CreateBearerRequest s5c-handler.c sgwc_s5c_han… |
n/a |
Open5GS |
2026-02-02T01:02:07.274Z | 2026-02-23T09:12:28.991Z |
| CVE-2026-1736 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Open5GS SGWC s11-handler.c assertion |
n/a |
Open5GS |
2026-02-02T00:32:06.984Z | 2026-02-23T09:12:17.476Z |
| CVE-2026-1735 |
2.4 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Yealink MeetingBar A30 Diagnostic command injection |
Yealink |
MeetingBar A30 |
2026-02-02T00:02:07.695Z | 2026-02-23T09:12:03.131Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-26009 |
10 (3.1)
|
Catalyst Affected by Remote Code Execution as Root via… |
karutoil |
catalyst |
2026-02-10T18:58:02.732Z | 2026-02-10T19:10:21.719Z |
| CVE-2026-25612 |
7.1 (4.0)
6.5 (3.1)
|
Internal ResourceId collision may affect unrelated col… |
MongoDB Inc |
MongoDB Server |
2026-02-10T18:05:23.851Z | 2026-02-10T18:59:27.442Z |
| CVE-2026-25611 |
8.7 (4.0)
7.5 (3.1)
|
Pre-Authentication Memory Exhaustion Denial of Service… |
MongoDB Inc |
MongoDB Server |
2026-02-10T17:52:47.181Z | 2026-02-11T15:21:16.207Z |
| CVE-2026-2303 |
6.9 (4.0)
6.5 (3.1)
|
Heap Out-of-Bounds Read in Go Driver GSSAPI C Wrappers… |
MongoDB Inc |
MongoDB Go Driver |
2026-02-10T19:03:06.737Z | 2026-02-11T15:16:15.789Z |
| CVE-2026-1762 |
2.9 (3.1)
|
Enervista UR Setup Directory Traversal Vulnerability |
GE Vernova |
Enervista |
2026-02-10T20:06:00.213Z | 2026-02-10T20:37:25.289Z |
| CVE-2026-1507 |
7.5 (3.1)
8.7 (4.0)
|
Uncaught Exception vulnerability in AVEVA PI Data Archive |
AVEVA |
PI Data Archive PI Server |
2026-02-10T20:19:18.886Z | 2026-02-12T18:47:05.938Z |
| CVE-2026-1495 |
6.5 (3.1)
5.7 (4.0)
|
Insertion of Sensitive Information into Log File vulne… |
AVEVA |
PI to CONNECT Agent |
2026-02-10T20:18:10.844Z | 2026-02-12T18:46:41.102Z |
| CVE-2025-54514 |
4.8 (4.0)
|
Improper isolation of shared resources on a syste… |
AMD |
AMD EPYC™ 9005 Series Processors |
2026-02-10T19:13:52.680Z | 2026-02-11T15:05:51.951Z |
| CVE-2025-52536 |
6.7 (4.0)
|
Improper Prevention of Lock Bit Modification in S… |
AMD |
AMD EPYC™ 9004 Series Processors |
2026-02-10T19:09:04.084Z | 2026-02-10T21:12:03.165Z |
| CVE-2025-52534 |
5.3 (4.0)
|
Improper bound check within AMD CPU microcode can… |
AMD |
AMD EPYC™ 9005 Series Processors |
2026-02-10T19:12:52.004Z | 2026-02-11T15:07:49.044Z |
| CVE-2025-48517 |
4.6 (4.0)
|
Insufficient Granularity of Access Control in SEV… |
AMD |
AMD EPYC™ 9005 Series Processors |
2026-02-10T19:08:21.524Z | 2026-02-10T21:17:00.925Z |
| CVE-2025-48515 |
5.4 (4.0)
|
Insufficient parameter sanitization in AMD Secure… |
AMD |
AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics |
2026-02-10T19:49:14.504Z | 2026-02-10T20:44:44.557Z |
| CVE-2025-48514 |
4 (4.0)
|
Insufficient Granularity of Access Control in SEV… |
AMD |
AMD EPYC™ 9004 Series Processors |
2026-02-10T19:14:22.874Z | 2026-02-11T14:54:00.307Z |
| CVE-2025-48509 |
1.8 (4.0)
|
Missing Checks in certain functions related to RM… |
AMD |
AMD EPYC™ 9004 Series Processors |
2026-02-10T19:13:21.993Z | 2026-02-11T15:06:51.268Z |
| CVE-2025-36522 |
6.7 (3.1)
|
Incorrect default permissions for some Intel(R) C… |
n/a |
Intel(R) Chipset Software |
2026-02-10T16:26:06.496Z | 2026-02-10T17:27:56.920Z |
| CVE-2025-36511 |
6.7 (3.1)
|
Incorrect default permissions for some Intel(R) M… |
n/a |
Intel(R) Memory and Storage Tool |
2026-02-10T16:26:04.601Z | 2026-02-26T15:04:07.792Z |
| CVE-2025-35999 |
6.7 (3.1)
|
Incorrect permission assignment for critical reso… |
n/a |
System Firmware Update Utility (SysFwUpdt) for Intel(R) Server Boards and Intel(R) Server Systems Based |
2026-02-10T16:26:02.912Z | 2026-02-26T15:04:08.161Z |
| CVE-2025-35998 |
7.9 (3.1)
|
Missing protection mechanism for alternate hardwa… |
n/a |
Intel(R) Platforms |
2026-02-10T16:26:00.829Z | 2026-02-26T15:04:08.464Z |
| CVE-2025-35992 |
4.7 (3.1)
|
Improper conditions check in some firmware for so… |
n/a |
Intel(R) NPU Drivers |
2026-02-10T16:25:58.837Z | 2026-02-10T17:31:21.016Z |
| CVE-2025-33030 |
3.3 (3.1)
|
Improper conditions check in some firmware for so… |
n/a |
Intel(R) NPU Drivers |
2026-02-10T16:25:57.278Z | 2026-02-26T15:04:08.747Z |
| CVE-2025-32739 |
2.8 (3.1)
|
Improper conditions check in some firmware for so… |
n/a |
Intel(R) Graphics Drivers and Intel LTS kernels |
2026-02-10T16:25:55.444Z | 2026-02-10T17:31:52.116Z |
| CVE-2025-32735 |
5.5 (3.1)
|
Improper conditions check in some firmware for so… |
n/a |
Intel(R) NPU Drivers |
2026-02-10T16:25:53.478Z | 2026-02-10T17:32:07.026Z |
| CVE-2025-32467 |
4.1 (3.1)
|
Use of uninitialized variable for some TDX Module… |
n/a |
TDX Module |
2026-02-10T16:25:51.854Z | 2026-02-10T17:32:20.724Z |
| CVE-2025-32453 |
6.7 (3.1)
|
Incorrect default permissions for some Intel(R) G… |
n/a |
Intel(R) Graphics Driver software |
2026-02-10T16:25:50.100Z | 2026-02-26T15:04:09.059Z |
| CVE-2025-32452 |
6.7 (3.1)
|
Uncontrolled search path for some AI Playground b… |
n/a |
AI Playground |
2026-02-10T16:25:48.428Z | 2026-02-10T18:50:32.720Z |
| CVE-2025-32092 |
6.7 (3.1)
|
Insecure inherited permissions for some Intel(R) … |
n/a |
Intel(R) Graphics Software |
2026-02-10T16:25:46.732Z | 2026-02-26T15:04:09.346Z |
| CVE-2025-32008 |
8.6 (3.1)
|
Out-of-bounds write in the firmware for the Intel… |
n/a |
Intel(R) AMT and Intel(R) Standard Manageability |
2026-02-10T16:25:44.946Z | 2026-02-10T18:46:48.862Z |
| CVE-2025-32007 |
4.4 (3.1)
|
Out-of-bounds read for some TDX before version td… |
n/a |
TDX |
2026-02-10T16:25:43.166Z | 2026-02-10T18:39:01.377Z |
| CVE-2025-32003 |
6.5 (3.1)
|
Out-of-bounds read in the firmware for some 100Gb… |
n/a |
100GbE Intel(R) Ethernet Network Adapter E810 |
2026-02-10T16:25:41.432Z | 2026-02-10T18:37:59.640Z |
| CVE-2025-31944 |
5.3 (3.1)
|
Race condition for some TDX Module before version… |
n/a |
TDX Module |
2026-02-10T16:25:39.802Z | 2026-02-10T18:33:57.653Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-32735 | Improper conditions check in some firmware for some Intel(R) NPU Drivers within Ring 1: Device Driv… | 2026-02-10T17:16:17.200 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-32467 | Use of uninitialized variable for some TDX Module before version tdx1.5 within Ring 0: Hypervisor m… | 2026-02-10T17:16:17.040 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-32453 | Incorrect default permissions for some Intel(R) Graphics Driver software within Ring 2: Privileged … | 2026-02-10T17:16:16.877 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-32452 | Uncontrolled search path for some AI Playground before version 2.6.1 beta within Ring 3: User Appli… | 2026-02-10T17:16:16.717 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-32092 | Insecure inherited permissions for some Intel(R) Graphics Software before version 25.30.1702.0 with… | 2026-02-10T17:16:16.553 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-32008 | Out-of-bounds write in the firmware for the Intel(R) AMT and Intel(R) Standard Manageability within… | 2026-02-10T17:16:16.393 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-32007 | Out-of-bounds read for some TDX before version tdx module 1.5.24 within Ring 0: Hypervisor may allo… | 2026-02-10T17:16:16.233 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-32003 | Out-of-bounds read in the firmware for some 100GbE Intel(R) Ethernet Network Adapter E810 before ve… | 2026-02-10T17:16:16.073 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-31944 | Race condition for some TDX Module before version tdx1.5 within Ring 0: Hypervisor may allow a deni… | 2026-02-10T17:16:15.890 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-31655 | Incorrect default permissions for some Intel(R) Battery Life Diagnostic Tool within Ring 3: User Ap… | 2026-02-10T17:16:15.723 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-31648 | Improper handling of values in the microcode flow for some Intel(R) Processor Family may allow an e… | 2026-02-10T17:16:15.550 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-30513 | Race condition for some TDX Module within Ring 0: Hypervisor may allow an escalation of privilege. … | 2026-02-10T17:16:15.390 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-30508 | Improper authorization in the Intel(R) Quick Assist Technology for some Intel(R) Platforms within R… | 2026-02-10T17:16:15.233 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-29952 | Improper Initialization within the AMD Secure Encrypted Virtualization (SEV) firmware can allow an … | 2026-02-10T20:16:44.767 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-29951 | A buffer overflow in the AMD Secure Processor (ASP) bootloader could allow an attacker to overwrite… | 2026-02-10T20:16:44.630 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-29950 | Improper input validation in system management mode (SMM) could allow a privileged attacker to over… | 2026-02-10T20:16:44.493 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-29949 | Insufficient input parameter sanitization in AMD Secure Processor (ASP) Boot Loader (legacy recover… | 2026-02-10T20:16:44.337 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-29948 | Improper access control in AMD Secure Encrypted Virtualization (SEV) firmware could allow a malicio… | 2026-02-10T20:16:44.197 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-29946 | Insufficient or Incomplete Data Removal in Hardware Component in SEV firmware doesn't fully flush I… | 2026-02-10T20:16:44.057 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-29939 | Improper access control in secure encrypted virtualization (SEV) could allow a privileged attacker … | 2026-02-10T20:16:43.910 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-27940 | Out-of-bounds read for some TDX Module before version tdx1.5 within Ring 0: Hypervisor may allow an… | 2026-02-10T17:16:15.063 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-27708 | Out-of-bounds read in the firmware for some Intel(R) Converged Security and Management Engine (CSME… | 2026-02-10T17:16:14.900 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-27572 | Exposure of sensitive information during transient execution for some TDX within Ring 0: Hypervisor… | 2026-02-10T17:16:14.763 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-27560 | Loop with unreachable exit condition ('infinite loop') for some Intel(R) Platform within Ring 0: Ke… | 2026-02-10T17:16:14.600 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-27535 | Exposed ioctl with insufficient access control in the firmware for some Intel(R) Ethernet Connectio… | 2026-02-10T17:16:14.427 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-27243 | Out-of-bounds write in the firmware for some Intel(R) Ethernet Controller E810 before version cvl f… | 2026-02-10T17:16:14.183 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-25210 | Improper input validation for some Server Firmware Update Utility(SysFwUpdt) before version 16.0.12… | 2026-02-10T17:16:13.697 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-25058 | Improper initialization for some ESXi kernel mode driver for the Intel(R) Ethernet 800-Series befor… | 2026-02-10T17:16:13.490 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-24851 | Uncaught exception in the firmware for some 100GbE Intel(R) Ethernet Controller E810 before version… | 2026-02-10T17:16:12.890 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-22885 | Improper buffer restrictions in the firmware for the TDX Module may allow an escalation of privileg… | 2026-02-10T17:16:12.680 | 2026-02-10T21:51:48.077 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-h376-wgw6-6272 |
8.8 (3.1)
7.4 (4.0)
|
A vulnerability was identified in Tenda AC21 16.03.08.16. The affected element is the function from… | 2026-01-30T00:31:23Z | 2026-01-30T00:31:23Z |
| ghsa-4p55-phcx-2vg2 |
6.3 (3.1)
2.1 (4.0)
|
A security vulnerability has been detected in D-Link DWR-M961 1.1.47. The affected element is an un… | 2026-01-30T00:31:23Z | 2026-01-30T00:31:23Z |
| ghsa-2wx5-jfx2-287m |
6.3 (3.1)
2.1 (4.0)
|
A security flaw has been discovered in Tenda AC21 1.1.1.1/1.dmzip/16.03.08.16. The impacted element… | 2026-01-30T00:31:23Z | 2026-01-30T00:31:23Z |
| ghsa-wv3p-w5rj-f5p6 |
9.8 (3.1)
|
A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated re… | 2026-01-30T00:31:22Z | 2026-01-30T00:31:22Z |
| ghsa-9rxj-wrx5-6463 |
6.5 (3.1)
|
A floating point exception (FPE) in the oneflow.reshape component of OneFlow v0.9.0 allows attacker… | 2026-01-28T21:31:24Z | 2026-01-30T00:31:22Z |
| ghsa-8g9w-79w6-cw84 |
8.8 (3.1)
|
A Server-Side Template Injection (SSTI) vulnerability in the /reporting/templates/preview/ endpoint… | 2026-01-29T21:30:31Z | 2026-01-30T00:31:22Z |
| ghsa-r277-3xc5-c79v |
8.6 (4.0)
|
AutoGPT is Vulnerable to RCE via Disabled Block Execution | 2026-01-29T15:04:03Z | 2026-01-30T00:04:18Z |
| ghsa-73jg-4qh6-3f4g |
6.0 (3.1)
|
Beam Exposes sensitive information via joinCleanPath function | 2026-01-22T18:30:31Z | 2026-01-29T22:58:34Z |
| ghsa-2733-6c58-pf27 |
9.4 (4.0)
|
deepHas vulnerable to Prototype Pollution via constructor.prototype | 2026-01-29T22:21:32Z | 2026-01-29T22:21:32Z |
| ghsa-rjqr-3rwj-fv3p |
6.3 (3.1)
2.1 (4.0)
|
A weakness has been identified in Totolink A7000R 4.1cu.4154. Impacted is the function setUpgradeFW… | 2026-01-29T21:30:31Z | 2026-01-29T21:30:31Z |
| ghsa-pf6w-rq37-393c |
3.1 (3.1)
|
Tanium addressed an improper access controls vulnerability in Interact. | 2026-01-29T21:30:31Z | 2026-01-29T21:30:31Z |
| ghsa-xqc5-rp7m-624q |
7.5 (3.1)
|
Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal Disable Login Page… | 2026-01-28T21:31:23Z | 2026-01-29T21:30:30Z |
| ghsa-x5qw-m467-vgq3 |
9.8 (3.1)
9.3 (4.0)
|
A missing authentication for critical function vulnerability in KiloView Encoder Series could allow… | 2026-01-29T21:30:30Z | 2026-01-29T21:30:30Z |
| ghsa-wpgv-345q-6vm7 |
6.3 (3.1)
2.1 (4.0)
|
A weakness has been identified in Totolink A7000R 4.1cu.4154. The impacted element is the function … | 2026-01-29T21:30:30Z | 2026-01-29T21:30:30Z |
| ghsa-vrpj-mcpc-4663 |
8.1 (3.1)
|
Cross-Site Request Forgery (CSRF) vulnerability in Drupal Acquia Content Hub allows Cross Site Requ… | 2026-01-28T21:31:23Z | 2026-01-29T21:30:30Z |
| ghsa-vmpg-m2mf-cwrv |
7.5 (3.1)
|
An input validation vulnerability in the oneflow.index_add component of OneFlow v0.9.0 allows attac… | 2026-01-28T21:31:24Z | 2026-01-29T21:30:30Z |
| ghsa-v4f8-5p2q-h868 |
5.3 (3.1)
5.1 (4.0)
|
birkir prime <= 0.4.0.beta.0 contains a cross-site request forgery vulnerability in its GraphQL end… | 2026-01-29T21:30:30Z | 2026-01-29T21:30:30Z |
| ghsa-pvgm-mg5q-xc76 |
4.8 (3.1)
4.8 (4.0)
|
FluentCMS 2026 contains a stored cross-site scripting vulnerability that allows authenticated admin… | 2026-01-29T21:30:30Z | 2026-01-29T21:30:30Z |
| ghsa-mcfx-6pwv-q5v8 |
6.3 (4.0)
|
Improper handling of exceptional conditions in VX800v v1.0 in SIP processing allows an attacker to … | 2026-01-29T21:30:30Z | 2026-01-29T21:30:30Z |
| ghsa-jcw2-rfj6-8rx8 |
8.1 (3.1)
|
Cross-Site Request Forgery (CSRF) vulnerability in Drupal Login Time Restriction allows Cross Site … | 2026-01-28T21:31:23Z | 2026-01-29T21:30:30Z |
| ghsa-j5cc-hmp5-4pfq |
8.5 (4.0)
|
An authenticated buffer handling flaw in TP-Link VIGI C385 V1 Web API lacking input sanitization, m… | 2026-01-29T21:30:30Z | 2026-01-29T21:30:30Z |
| ghsa-hx96-pcc2-pxx9 |
6.9 (4.0)
|
Improper link resolution in the VX800v v1.0 SFTP service allows authenticated adjacent attackers to… | 2026-01-29T21:30:30Z | 2026-01-29T21:30:30Z |
| ghsa-hpvm-w4r5-3g24 |
8.1 (3.1)
8.2 (4.0)
|
A vulnerability was found in Tenda AX12 Pro V2 16.03.49.24_cn. Affected by this issue is some unkno… | 2026-01-29T21:30:30Z | 2026-01-29T21:30:30Z |
| ghsa-hf2w-7552-3w3c |
6.5 (3.1)
|
A floating-point exception (FPE) in the flow.column_stack component of OneFlow v0.9.0 allows attack… | 2026-01-28T21:31:24Z | 2026-01-29T21:30:30Z |
| ghsa-gr56-3gp6-6gmj |
6.2 (3.1)
|
During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level bo… | 2026-01-28T21:31:23Z | 2026-01-29T21:30:30Z |
| ghsa-gm9r-q53w-2gh4 |
7.5 (3.1)
|
The net/url package does not set a limit on the number of query parameters in a query. While the ma… | 2026-01-28T21:31:23Z | 2026-01-29T21:30:30Z |
| ghsa-g9q4-qjx4-2v7q |
6.5 (3.1)
|
archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file … | 2026-01-28T21:31:23Z | 2026-01-29T21:30:30Z |
| ghsa-fpp6-jcgp-935r |
6.1 (3.1)
|
Cross Site Scripting vulnerability in tale v.2.0.5 allows an attacker to execute arbitrary code. | 2026-01-29T21:30:30Z | 2026-01-29T21:30:30Z |
| ghsa-f66g-7648-527r |
5.3 (4.0)
|
Some VX800v v1.0 web interface endpoints transmit sensitive information over unencrypted HTTP due t… | 2026-01-29T21:30:30Z | 2026-01-29T21:30:30Z |
| ghsa-8cjc-9g75-5fr7 |
7.7 (4.0)
|
A weakness in the web interface’s application layer encryption in VX800v v1.0 allows an adjacent at… | 2026-01-29T21:30:30Z | 2026-01-29T21:30:30Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-31186 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.491402Z |
| gsd-2024-31134 | In JetBrains TeamCity before 2024.03 authenticated users without administrative permissio… | 2024-04-03T05:02:25.490843Z |
| gsd-2024-31122 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:25.490105Z |
| gsd-2024-31212 | InstantCMS is a free and open source content management system. A SQL injection vulnerabi… | 2024-04-03T05:02:25.489698Z |
| gsd-2024-31278 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Leap13 Premiu… | 2024-04-03T05:02:25.489473Z |
| gsd-2024-31291 | Authorization Bypass Through User-Controlled Key vulnerability in Metagauss ProfileGrid.T… | 2024-04-03T05:02:25.489255Z |
| gsd-2024-31371 | Cross-Site Request Forgery (CSRF) vulnerability in Xylus Themes WP Event Aggregator.This … | 2024-04-03T05:02:25.489035Z |
| gsd-2024-31043 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.488814Z |
| gsd-2024-31388 | Cross-Site Request Forgery (CSRF) vulnerability in Pauple Table & Contact Form 7 Database… | 2024-04-03T05:02:25.488593Z |
| gsd-2024-31040 | Buffer Overflow vulnerability in the get_var_integer function in mqtt_parser.c in NanoMQ … | 2024-04-03T05:02:25.488372Z |
| gsd-2024-31363 | Cross-Site Request Forgery (CSRF) vulnerability in LifterLMS.This issue affects LifterLMS… | 2024-04-03T05:02:25.488152Z |
| gsd-2024-31175 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.487933Z |
| gsd-2024-31133 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.487710Z |
| gsd-2024-31268 | Cross-Site Request Forgery (CSRF) vulnerability in AppPresser Team AppPresser.This issue … | 2024-04-03T05:02:25.487489Z |
| gsd-2024-31334 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.487220Z |
| gsd-2024-31210 | WordPress is an open publishing platform for the Web. It's possible for a file of a type … | 2024-04-03T05:02:25.486996Z |
| gsd-2024-31226 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.486768Z |
| gsd-2024-31124 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.486539Z |
| gsd-2024-31111 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.486310Z |
| gsd-2024-31108 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:25.485709Z |
| gsd-2024-31265 | Cross-Site Request Forgery (CSRF) vulnerability in SumoMe Sumo.This issue affects Sumo: f… | 2024-04-03T05:02:25.485317Z |
| gsd-2024-31351 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.485094Z |
| gsd-2024-31257 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:25.484873Z |
| gsd-2024-31349 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:25.484649Z |
| gsd-2024-31294 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.484429Z |
| gsd-2024-31394 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.484157Z |
| gsd-2024-31179 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.483929Z |
| gsd-2024-31090 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:02:25.483353Z |
| gsd-2024-31274 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.483038Z |
| gsd-2024-31023 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.482804Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-190200 | Malicious code in vuetify-solis-ariel-helios (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190199 | Malicious code in vuetify-ophiuchus-request-kaus (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190198 | Malicious code in vuetify-greatfilter-terser-dysonswarm (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190197 | Malicious code in vuetify-firebase-darkmatter-mineralogy (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190196 | Malicious code in vuepress-winston-deneb-vulcan (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190195 | Malicious code in vuepress-update-canopus-zooarchaeology (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190194 | Malicious code in vuepress-toml-magellan-rimraf (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190193 | Malicious code in vuepress-process-sagitta-postgres (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190192 | Malicious code in vuepress-parallax-socketio-juno (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190191 | Malicious code in vuepress-mineralogy-aldebaran-taphonomy (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190190 | Malicious code in vuepress-centauri-transhumanism-astrobiology (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190189 | Malicious code in vuepress-auth0-meteor-duplex (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190188 | Malicious code in vuepress-apollo-kuiperbelt-hercules (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190187 | Malicious code in vortex-husky-sqlite-exobiology (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190186 | Malicious code in vortex-enceladus-slides-xanthus (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190185 | Malicious code in vortex-auth0-string-holography (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190184 | Malicious code in volcanology-yakutsk-phenomic-xo (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190183 | Malicious code in void-uglify-warn-export-zero (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190182 | Malicious code in void-oberon-supernova-package (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190181 | Malicious code in void-kernel-integer-visualize-string (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190180 | Malicious code in void-grus-superagent-planckscale (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190179 | Malicious code in void-fork-zero-log-code (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190178 | Malicious code in void-exoplanet-ganymede-geodynamo (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190177 | Malicious code in void-cassini-thermosphere-cosmicsilence (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190175 | Malicious code in visualize-visualize-test-assert-monitor (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190174 | Malicious code in visualize-validate-array-hot-analyze (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190173 | Malicious code in visualize-object-xml-long-sigma (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190172 | Malicious code in visualize-interface-byte-char-chi (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190171 | Malicious code in visualize-decompress-finally-abstract-final (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190170 | Malicious code in visualize-cache-web-float-slow (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-1039 | Apache HttpComponents: Schwachstelle ermöglicht Denial of Service | 2015-10-05T22:00:00.000+00:00 | 2024-09-17T22:00:00.000+00:00 |
| wid-sec-w-2023-2881 | GStreamer: Mehrere Schwachstellen | 2023-11-13T23:00:00.000+00:00 | 2024-09-17T22:00:00.000+00:00 |
| wid-sec-w-2023-1315 | Dell PowerEdge: Schwachstelle ermöglicht Erlangen von Administratorrechten | 2023-05-29T22:00:00.000+00:00 | 2024-09-17T22:00:00.000+00:00 |
| wid-sec-w-2023-0306 | Apache HttpComponents: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2014-08-18T22:00:00.000+00:00 | 2024-09-17T22:00:00.000+00:00 |
| wid-sec-w-2024-2159 | IBM License Metric Tool: Mehrere Schwachstellen | 2024-09-16T22:00:00.000+00:00 | 2024-09-16T22:00:00.000+00:00 |
| wid-sec-w-2024-2157 | Dell BIOS: Mehrere Schwachstellen | 2024-09-16T22:00:00.000+00:00 | 2024-09-16T22:00:00.000+00:00 |
| wid-sec-w-2024-2152 | Contao: Mehrere Schwachstellen | 2024-09-16T22:00:00.000+00:00 | 2024-09-16T22:00:00.000+00:00 |
| wid-sec-w-2024-2150 | JetBrains IntelliJ IDEA: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-09-15T22:00:00.000+00:00 | 2024-09-16T22:00:00.000+00:00 |
| wid-sec-w-2024-2144 | Nextcloud Desktop Client: Schwachstelle ermöglicht Manipulation von Dateien | 2024-09-15T22:00:00.000+00:00 | 2024-09-16T22:00:00.000+00:00 |
| wid-sec-w-2024-2109 | Ivanti Endpoint Manager: Mehrere Schwachstellen | 2024-09-10T22:00:00.000+00:00 | 2024-09-16T22:00:00.000+00:00 |
| wid-sec-w-2024-2065 | IBM MQ: Mehrere Schwachstellen | 2024-09-05T22:00:00.000+00:00 | 2024-09-16T22:00:00.000+00:00 |
| wid-sec-w-2024-1904 | Mattermost Mobile und Desktop: Mehrere Schwachstellen ermöglichen nicht spezifizierte Angriffe | 2024-08-21T22:00:00.000+00:00 | 2024-09-16T22:00:00.000+00:00 |
| wid-sec-w-2023-2736 | IBM WebSphere Application Server: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-10-24T22:00:00.000+00:00 | 2024-09-16T22:00:00.000+00:00 |
| wid-sec-w-2022-1846 | Apple macOS: Mehrere Schwachstellen | 2022-10-24T22:00:00.000+00:00 | 2024-09-16T22:00:00.000+00:00 |
| wid-sec-w-2024-2149 | Checkmk: Schwachstelle ermöglicht Cross-Site Scripting | 2024-09-15T22:00:00.000+00:00 | 2024-09-15T22:00:00.000+00:00 |
| wid-sec-w-2024-2147 | Vaultwarden: Mehrere Schwachstellen ermöglichen | 2024-09-15T22:00:00.000+00:00 | 2024-09-15T22:00:00.000+00:00 |
| wid-sec-w-2024-2146 | D-LINK Router: Mehrere Schwachstellen ermöglichen Codeausführung | 2024-09-15T22:00:00.000+00:00 | 2024-09-15T22:00:00.000+00:00 |
| wid-sec-w-2024-2145 | Mattermost Mobile Apps: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-09-15T22:00:00.000+00:00 | 2024-09-15T22:00:00.000+00:00 |
| wid-sec-w-2024-2143 | MISP: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-09-15T22:00:00.000+00:00 | 2024-09-15T22:00:00.000+00:00 |
| wid-sec-w-2024-2142 | Mattermost Desktop App: Schwachstelle ermöglicht Codeausführung | 2024-09-15T22:00:00.000+00:00 | 2024-09-15T22:00:00.000+00:00 |
| wid-sec-w-2024-2141 | AVG Anti-Virus: Schwachstelle ermöglicht Privilegieneskalation | 2024-09-15T22:00:00.000+00:00 | 2024-09-15T22:00:00.000+00:00 |
| wid-sec-w-2024-2140 | Trend Micro Deep Discovery Email Inspector: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2024-09-15T22:00:00.000+00:00 | 2024-09-15T22:00:00.000+00:00 |
| wid-sec-w-2024-2139 | HP Samsung Universal Print Driver: Schwachstelle ermöglicht Privilegieneskalation | 2024-09-15T22:00:00.000+00:00 | 2024-09-15T22:00:00.000+00:00 |
| wid-sec-w-2024-2130 | GitLab CE/EE: Mehrere Schwachstellen | 2024-09-11T22:00:00.000+00:00 | 2024-09-15T22:00:00.000+00:00 |
| wid-sec-w-2023-1523 | Node.js: Mehrere Schwachstellen | 2023-06-20T22:00:00.000+00:00 | 2024-09-15T22:00:00.000+00:00 |
| wid-sec-w-2024-2138 | Rockwell Automation ControlLogix: Schwachstelle ermöglicht Denial of Service | 2024-09-12T22:00:00.000+00:00 | 2024-09-12T22:00:00.000+00:00 |
| wid-sec-w-2024-2137 | Kemp LoadMaster: Schwachstelle ermöglicht Codeausführung | 2024-09-12T22:00:00.000+00:00 | 2024-09-12T22:00:00.000+00:00 |
| wid-sec-w-2024-2136 | Mehrere NetApp Produkte: Schwachstelle ermöglicht Denial of Service, Offenlegung von Informationen und Manipulation von Daten | 2024-09-12T22:00:00.000+00:00 | 2024-09-12T22:00:00.000+00:00 |
| wid-sec-w-2024-2134 | docker: Mehrere Schwachstellen ermöglichen Codeausführung | 2024-09-12T22:00:00.000+00:00 | 2024-09-12T22:00:00.000+00:00 |
| wid-sec-w-2024-2132 | Rockwell Automation FactoryTalk: Mehrere Schwachstellen | 2024-09-12T22:00:00.000+00:00 | 2024-09-12T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2023:2340 | Red Hat Security Advisory: libtiff security update | 2023-05-09T10:02:52+00:00 | 2026-01-27T15:28:49+00:00 |
| rhsa-2022:8974 | Red Hat Security Advisory: kernel-rt security and bug fix update | 2022-12-13T16:08:56+00:00 | 2026-01-27T15:28:45+00:00 |
| rhsa-2023:1514 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.10 on RHEL 9 security update | 2023-03-29T11:43:38+00:00 | 2026-01-27T15:28:44+00:00 |
| rhsa-2023:1513 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.10 on RHEL 8 security update | 2023-03-29T11:44:32+00:00 | 2026-01-27T15:28:44+00:00 |
| rhsa-2023:1512 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.10 on RHEL 7 security update | 2023-03-29T11:44:44+00:00 | 2026-01-27T15:28:43+00:00 |
| rhsa-2023:1516 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.10 security update | 2023-03-29T11:45:38+00:00 | 2026-01-27T15:28:40+00:00 |
| rhsa-2022:7279 | Red Hat Security Advisory: kernel security and bug fix update | 2022-11-01T14:20:57+00:00 | 2026-01-27T15:28:39+00:00 |
| rhsa-2022:7280 | Red Hat Security Advisory: kernel-rt security and bug fix update | 2022-11-01T14:19:54+00:00 | 2026-01-27T15:28:36+00:00 |
| rhsa-2022:6872 | Red Hat Security Advisory: kernel security update | 2022-10-11T12:35:26+00:00 | 2026-01-27T15:28:35+00:00 |
| rhsa-2022:6991 | Red Hat Security Advisory: kernel-rt security and bug fix update | 2022-10-18T08:06:52+00:00 | 2026-01-27T15:28:31+00:00 |
| rhsa-2024:10207 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.11 Security update | 2024-11-25T00:12:17+00:00 | 2026-01-27T15:28:23+00:00 |
| rhsa-2022:6983 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | 2022-10-18T08:15:53+00:00 | 2026-01-27T15:28:15+00:00 |
| rhsa-2022:6460 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | 2022-09-13T09:49:59+00:00 | 2026-01-27T15:28:07+00:00 |
| rhsa-2022:5937 | Red Hat Security Advisory: kernel security and bug fix update | 2022-08-09T11:59:41+00:00 | 2026-01-27T15:27:56+00:00 |
| rhsa-2022:6437 | Red Hat Security Advisory: kernel-rt security and bug fix update | 2022-09-13T09:53:20+00:00 | 2026-01-27T15:27:51+00:00 |
| rhsa-2022:5939 | Red Hat Security Advisory: kernel-rt security and bug fix update | 2022-08-09T11:52:06+00:00 | 2026-01-27T15:27:42+00:00 |
| rhsa-2020:4670 | Red Hat Security Advisory: idm:DL1 and idm:client security, bug fix, and enhancement update | 2020-11-04T01:31:18+00:00 | 2026-01-27T14:26:51+00:00 |
| rhsa-2020:3936 | Red Hat Security Advisory: ipa security, bug fix, and enhancement update | 2020-09-29T21:12:26+00:00 | 2026-01-27T14:26:49+00:00 |
| rhsa-2020:2362 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh security update | 2020-06-02T15:34:01+00:00 | 2026-01-27T14:26:46+00:00 |
| rhsa-2020:2217 | Red Hat Security Advisory: OpenShift Container Platform 3.11 security update | 2020-05-28T14:58:14+00:00 | 2026-01-27T14:26:44+00:00 |
| rhsa-2025:1242 | Red Hat Security Advisory: OpenShift Container Platform 4.12.73 bug fix and security update | 2025-02-13T02:10:52+00:00 | 2026-01-27T11:12:26+00:00 |
| rhsa-2025:1225 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 5.8.17 | 2025-02-12T17:51:11+00:00 | 2026-01-27T11:12:25+00:00 |
| rhsa-2025:0885 | Red Hat Security Advisory: rsync security update | 2025-02-03T01:10:39+00:00 | 2026-01-27T11:12:25+00:00 |
| rhsa-2025:0884 | Red Hat Security Advisory: rsync security update | 2025-02-03T01:05:44+00:00 | 2026-01-27T11:12:25+00:00 |
| rhsa-2025:0849 | Red Hat Security Advisory: rsync security update | 2025-01-30T17:00:56+00:00 | 2026-01-27T11:12:25+00:00 |
| rhsa-2025:0790 | Red Hat Security Advisory: rsync security update | 2025-01-29T11:00:43+00:00 | 2026-01-27T11:12:24+00:00 |
| rhsa-2025:0787 | Red Hat Security Advisory: rsync security update | 2025-01-29T08:07:33+00:00 | 2026-01-27T11:12:23+00:00 |
| rhsa-2025:0774 | Red Hat Security Advisory: rsync security update | 2025-01-28T18:53:41+00:00 | 2026-01-27T11:12:23+00:00 |
| rhsa-2025:0714 | Red Hat Security Advisory: rsync security update | 2025-01-27T16:43:28+00:00 | 2026-01-27T11:12:23+00:00 |
| rhsa-2025:0688 | Red Hat Security Advisory: rsync security update | 2025-01-27T01:42:59+00:00 | 2026-01-27T11:12:23+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2024-26853 | igc: avoid returning frame twice in XDP_REDIRECT | 2024-04-02T07:00:00.000Z | 2025-09-03T22:19:52.000Z |
| msrc_cve-2024-6604 | Memory safety bugs present in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 128, Firefox ESR < 115.13, Thunderbird < 115.13, and Thunderbird < 128. | 2024-07-01T07:00:00.000Z | 2025-09-03T22:18:21.000Z |
| msrc_cve-2024-26841 | LoongArch: Update cpu_sibling_map when disabling nonboot CPUs | 2024-04-02T07:00:00.000Z | 2025-09-03T22:16:15.000Z |
| msrc_cve-2023-52812 | drm/amd: check num of link levels when update pcie param | 2024-05-02T07:00:00.000Z | 2025-09-03T22:14:59.000Z |
| msrc_cve-2025-6497 | HTACG tidy-html5 parser.c prvTidyParseNamespace assertion | 2025-06-02T00:00:00.000Z | 2025-09-03T22:14:40.000Z |
| msrc_cve-2022-49134 | mlxsw: spectrum: Guard against invalid local ports | 2025-02-02T00:00:00.000Z | 2025-09-03T22:14:37.000Z |
| msrc_cve-2022-48979 | drm/amd/display: fix array index out of bound error in DCN32 DML | 2024-10-01T07:00:00.000Z | 2025-09-03T22:14:34.000Z |
| msrc_cve-2023-29543 | An attacker could have caused memory corruption and a potentially exploitable use-after-free of a pointer in a global object's debugger vector. This vulnerability affects Firefox for Android < 112, Firefox < 112, and Focus for Android < 112. | 2023-06-01T07:00:00.000Z | 2025-09-03T22:12:19.000Z |
| msrc_cve-2024-40977 | wifi: mt76: mt7921s: fix potential hung tasks during chip recovery | 2024-07-01T07:00:00.000Z | 2025-09-03T22:11:37.000Z |
| msrc_cve-2023-52596 | sysctl: Fix out of bounds access for empty sysctl registers | 2024-03-02T08:00:00.000Z | 2025-09-03T22:11:24.000Z |
| msrc_cve-2025-6498 | HTACG tidy-html5 alloc.c defaultAlloc memory leak | 2025-06-02T00:00:00.000Z | 2025-09-03T22:10:38.000Z |
| msrc_cve-2020-10723 | A memory corruption issue was found in DPDK versions 17.05 and above | 2020-05-02T00:00:00.000Z | 2025-09-03T22:10:21.000Z |
| msrc_cve-2021-47432 | lib/generic-radix-tree.c: Don't overflow in peek() | 2024-05-02T07:00:00.000Z | 2025-09-03T22:09:22.000Z |
| msrc_cve-2024-50183 | scsi: lpfc: Ensure DA_ID handling completion before deleting an NPIV instance | 2024-11-02T00:00:00.000Z | 2025-09-03T22:08:49.000Z |
| msrc_cve-2024-38557 | net/mlx5: Reload only IB representors upon lag disable/enable | 2024-06-02T07:00:00.000Z | 2025-09-03T22:08:20.000Z |
| msrc_cve-2025-38396 | fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass | 2025-07-02T00:00:00.000Z | 2025-09-03T22:07:59.000Z |
| msrc_cve-2025-38203 | jfs: Fix null-ptr-deref in jfs_ioc_trim | 2025-07-02T00:00:00.000Z | 2025-09-03T22:07:31.000Z |
| msrc_cve-2024-35862 | smb: client: fix potential UAF in smb2_is_network_name_deleted() | 2024-05-02T07:00:00.000Z | 2025-09-03T22:07:06.000Z |
| msrc_cve-2024-26828 | cifs: fix underflow in parse_server_interfaces() | 2024-04-02T07:00:00.000Z | 2025-09-03T22:06:06.000Z |
| msrc_cve-2025-38653 | proc: use the same treatment to check proc_lseek as ones for proc_read_iter et.al | 2025-08-02T00:00:00.000Z | 2025-09-03T22:05:46.000Z |
| msrc_cve-2025-45582 | GNU Tar through 1.35 allows file overwrite via directory traversal in crafted TAR archives, with a certain two-step process. First, the victim must extract an archive that contains a ../ symlink to a critical directory. Second, the victim must extract an archive that contains a critical file, specified via a relative pathname that begins with the symlink name and ends with that critical file's name. Here, the extraction follows the symlink and overwrites the critical file. This bypasses the protection mechanism of "Member name contains '..'" that would occur for a single TAR archive that attempted to specify the critical file via a ../ approach. For example, the first archive can contain "x -> ../../../../../home/victim/.ssh" and the second archive can contain x/authorized_keys. This can affect server applications that automatically extract any number of user-supplied TAR archives, and were relying on the blocking of traversal. This can also affect software installation processes in wh | 2025-07-02T00:00:00.000Z | 2025-09-03T22:05:01.000Z |
| msrc_cve-2023-25731 | Due to URL previews in the network panel of developer tools improperly storing URLs, query parameters could potentially be used to overwrite global objects in privileged code. This vulnerability affects Firefox < 110. | 2023-06-01T07:00:00.000Z | 2025-09-03T22:04:26.000Z |
| msrc_cve-2024-35863 | smb: client: fix potential UAF in is_valid_oplock_break() | 2024-05-02T07:00:00.000Z | 2025-09-03T22:04:14.000Z |
| msrc_cve-2023-29544 | If multiple instances of resource exhaustion occurred at the incorrect time, the garbage collector could have caused memory corruption and a potentially exploitable crash. This vulnerability affects Firefox for Android < 112, Firefox < 112, and Focus for Android < 112. | 2023-06-01T07:00:00.000Z | 2025-09-03T22:02:48.000Z |
| msrc_cve-2024-36913 | Drivers: hv: vmbus: Leak pages if set_memory_encrypted() fails | 2024-05-02T07:00:00.000Z | 2025-09-03T22:02:45.000Z |
| msrc_cve-2024-36912 | Drivers: hv: vmbus: Track decrypted status in vmbus_gpadl | 2024-05-02T07:00:00.000Z | 2025-09-03T22:00:05.000Z |
| msrc_cve-2025-4674 | Unexpected command execution in untrusted VCS repositories in cmd/go | 2025-07-02T00:00:00.000Z | 2025-09-03T21:59:38.000Z |
| msrc_cve-2024-35861 | smb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect() | 2024-05-02T07:00:00.000Z | 2025-09-03T21:58:47.000Z |
| msrc_cve-2025-9301 | cmake cmForEachCommand.cxx ReplayItems assertion | 2025-08-02T00:00:00.000Z | 2025-09-03T21:58:03.000Z |
| msrc_cve-2025-38456 | ipmi:msghandler: Fix potential memory corruption in ipmi_create_user() | 2025-07-02T00:00:00.000Z | 2025-09-03T21:57:59.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202210-0122 | The HIPP module has a vulnerability of not verifying the data transferred in the kernel s… | 2025-05-17T03:50:01.098000Z |
| var-202210-1088 | Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/fromNatStatic… | 2025-05-17T03:50:00.969000Z |
| var-202210-1256 | Tenda AC1206 US_AC1206V1.0RTL_V15.03.06.23_multi_TD01 is vulnerable to Cross Site Request… | 2025-05-17T03:50:00.886000Z |
| var-202210-0843 | Tenda AC1206 US_AC1206V1.0RTL_V15.03.06.23_multi_TD01 was discovered to contain a heap ov… | 2025-05-17T03:47:47.106000Z |
| var-202504-3436 | TOTOLINK A810R V4.1.2cu.5182_B20201026 was found to contain a buffer overflow vulnerabili… | 2025-05-17T03:47:38.370000Z |
| var-202210-0910 | SonicWall GMS is vulnerable to file path manipulation resulting that an unauthenticated a… | 2025-05-17T03:46:21.152000Z |
| var-202409-0159 | A vulnerability, which was classified as critical, was found in TOTOLINK AC1200 T8 and AC… | 2025-05-17T03:46:16.015000Z |
| var-202504-3327 | TOTOLINK A810R V4.1.2cu.5182_B20201026 was found to contain a buffer overflow vulnerabili… | 2025-05-17T03:46:14.683000Z |
| var-202504-3455 | TOTOLINK A800R V4.1.2cu.5137_B20200730 was found to contain a buffer overflow vulnerabili… | 2025-05-17T03:46:14.623000Z |
| var-202504-3476 | TOTOLINK A810R V4.1.2cu.5182_B20201026 was found to contain a buffer overflow vulnerabili… | 2025-05-17T03:46:14.602000Z |
| var-202504-3430 | A vulnerability, which was classified as critical, has been found in TOTOLINK N150RT 3.4.… | 2025-05-17T03:44:02.331000Z |
| var-202504-3472 | TOTOLINK A800R V4.1.2cu.5137_B20200730 was found to contain a buffer overflow vulnerabili… | 2025-05-17T03:44:02.309000Z |
| var-202504-3211 | A vulnerability was found in TOTOLINK N150RT 3.4.0-B20190525. It has been classified as p… | 2025-05-17T03:41:27.377000Z |
| var-201408-0079 | Apache Subversion 1.0.0 through 1.7.x before 1.7.17 and 1.8.x before 1.8.10 uses an MD5 h… | 2025-05-16T20:46:20.656000Z |
| var-202210-0285 | The storage maintenance and debugging module has an array out-of-bounds read vulnerabilit… | 2025-05-15T23:21:25.515000Z |
| var-202210-0348 | The fingerprint module has service logic errors.Successful exploitation of this vulnerabi… | 2025-05-15T23:21:25.493000Z |
| var-202210-0453 | The HwAirlink module has a heap overflow vulnerability in processing data packets of the … | 2025-05-15T23:21:25.470000Z |
| var-202210-0915 | Tenda AX1803 US_AX1803v2.0br_v1.0.0.1_2994_CN_ZGYD01_4 is vulnerable to Cross Site Reques… | 2025-05-15T23:21:25.386000Z |
| var-202210-0287 | The HW_KEYMASTER module has a vulnerability of not verifying the data read.Successful exp… | 2025-05-15T23:20:53.753000Z |
| var-202210-0413 | The HW_KEYMASTER module has an out-of-bounds access vulnerability in parameter set verifi… | 2025-05-15T23:20:53.723000Z |
| var-202210-1085 | Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/fromSetIpMacBind. | 2025-05-15T23:20:53.571000Z |
| var-202505-0086 | A vulnerability was found in Tenda AC1206 up to 15.03.06.23. It has been rated as critica… | 2025-05-15T23:20:49.183000Z |
| var-202210-1642 | Memory corruption in automotive multimedia due to use of out-of-range pointer offset whil… | 2025-05-15T23:19:42.357000Z |
| var-202504-3999 | A Server-side request forgery (SSRF) vulnerability has been identified in the SMA1000 App… | 2025-05-15T23:19:38.139000Z |
| var-202210-0367 | The HISP module has a vulnerability of bypassing the check of the data transferred in the… | 2025-05-15T23:18:42.323000Z |
| var-202210-1039 | The HIPP module has a vulnerability of bypassing the check of the data transferred in the… | 2025-05-15T23:18:42.261000Z |
| var-202502-1254 | Tenda AC6 V15.03.05.16 firmware has a buffer overflow vulnerability in the formexeCommand… | 2025-05-15T23:18:38.453000Z |
| var-202210-0123 | The HISP module has a vulnerability of not verifying the data transferred in the kernel s… | 2025-05-15T23:17:34.805000Z |
| var-202210-0249 | The kernel module has an out-of-bounds read vulnerability.Successful exploitation of this… | 2025-05-15T23:17:34.779000Z |
| var-202210-0291 | The facial recognition module has a vulnerability in input validation.Successful exploita… | 2025-05-15T23:17:34.757000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2024:0875-1 | Security update for python-Django | 2024-03-13T13:43:47Z | 2024-03-13T13:43:47Z |
| suse-su-2024:0874-1 | Security update for python-Django1 | 2024-03-13T13:43:40Z | 2024-03-13T13:43:40Z |
| suse-su-2024:0871-1 | Security update for vim | 2024-03-13T12:08:05Z | 2024-03-13T12:08:05Z |
| suse-su-2024:0870-1 | Security update for glibc | 2024-03-13T12:05:43Z | 2024-03-13T12:05:43Z |
| suse-su-2024:0864-1 | Security update for fontforge | 2024-03-13T08:59:23Z | 2024-03-13T08:59:23Z |
| suse-su-2024:0863-1 | Security update for fontforge | 2024-03-13T08:58:13Z | 2024-03-13T08:58:13Z |
| suse-su-2024:0862-1 | Security update for zabbix | 2024-03-13T08:16:03Z | 2024-03-13T08:16:03Z |
| suse-su-2024:0860-1 | Security update for gnutls | 2024-03-13T07:45:37Z | 2024-03-13T07:45:37Z |
| suse-su-2024:0858-1 | Security update for the Linux Kernel | 2024-03-13T00:09:40Z | 2024-03-13T00:09:40Z |
| suse-su-2024:0857-1 | Security update for the Linux Kernel | 2024-03-13T00:08:00Z | 2024-03-13T00:08:00Z |
| suse-su-2024:0856-1 | Security update for the Linux Kernel | 2024-03-13T00:04:28Z | 2024-03-13T00:04:28Z |
| suse-su-2024:0855-1 | Security update for the Linux Kernel | 2024-03-12T19:46:41Z | 2024-03-12T19:46:41Z |
| suse-su-2024:0852-1 | Security update for axis | 2024-03-12T15:18:31Z | 2024-03-12T15:18:31Z |
| suse-su-2024:0851-1 | Security update for axis | 2024-03-12T15:18:20Z | 2024-03-12T15:18:20Z |
| suse-su-2024:0850-1 | Security update for python3 | 2024-03-12T15:18:05Z | 2024-03-12T15:18:05Z |
| suse-su-2024:0847-1 | Security update for java-1_8_0-openjdk | 2024-03-12T13:34:21Z | 2024-03-12T13:34:21Z |
| suse-su-2024:0842-1 | Security update for openssl | 2024-03-12T07:59:38Z | 2024-03-12T07:59:38Z |
| suse-su-2024:0841-1 | Security update for openssl1 | 2024-03-12T07:59:07Z | 2024-03-12T07:59:07Z |
| suse-su-2024:0840-1 | Security update for compat-openssl098 | 2024-03-12T07:58:30Z | 2024-03-12T07:58:30Z |
| suse-su-2024:0834-1 | Security update for sudo | 2024-03-11T13:22:21Z | 2024-03-11T13:22:21Z |
| suse-su-2024:0305-3 | Security update for cpio | 2024-03-11T13:15:50Z | 2024-03-11T13:15:50Z |
| suse-su-2024:0305-1 | Security update for cpio | 2024-03-11T13:15:39Z | 2024-03-11T13:15:39Z |
| suse-su-2024:0825-1 | Security update for cpio | 2024-03-11T13:14:38Z | 2024-03-11T13:14:38Z |
| suse-su-2024:0833-1 | Security update for openssl-1_1 | 2024-03-11T09:31:20Z | 2024-03-11T09:31:20Z |
| suse-su-2024:0832-1 | Security update for openssl-1_1 | 2024-03-11T09:30:48Z | 2024-03-11T09:30:48Z |
| suse-su-2024:0831-1 | Security update for openssl-1_0_0 | 2024-03-11T09:29:38Z | 2024-03-11T09:29:38Z |
| suse-su-2024:0830-1 | Security update for xen | 2024-03-11T08:38:46Z | 2024-03-11T08:38:46Z |
| suse-su-2024:0829-1 | Security update for tomcat | 2024-03-11T07:03:42Z | 2024-03-11T07:03:42Z |
| suse-su-2024:0824-1 | Security update for cpio | 2024-03-08T16:34:54Z | 2024-03-08T16:34:54Z |
| suse-su-2024:0820-1 | Security update for python310 | 2024-03-08T11:06:14Z | 2024-03-08T11:06:14Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:10688-1 | cloud-init-21.2-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10687-1 | clojure-1.10.3.855-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10686-1 | claws-mail-4.0.0-2.5 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10685-1 | clamav-0.103.3-1.4 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10684-1 | cinnamon-5.0.5-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10683-1 | cifs-utils-6.13-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10682-1 | chrony-4.1-5.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10681-1 | chromedriver-93.0.4577.82-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10680-1 | chocolate-doom-3.0.1-2.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10679-1 | cgit-1.2.3-1.10 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10678-1 | cgal-demo-examples-devel-5.3-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10677-1 | cfitsio-4.0.0-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10676-1 | ceph-16.2.6.45+g8fda9838398-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10675-1 | libcdio++0-2.1.0-2.6 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10674-1 | caribou-0.4.21-7.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10673-1 | cargo-audit-advisory-db-20210802-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10672-1 | calamares-3.2.36-1.6 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10671-1 | cairo-devel-1.16.0-3.14 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10670-1 | cacti-1.2.18-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10669-1 | c3p0-0.9.5.5-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10668-1 | c-ares-devel-1.17.2-2.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10667-1 | bzip2-1.0.8-3.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10666-1 | buildah-1.23.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10665-1 | build-20210902-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10664-1 | bugzilla-5.0.6-4.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10663-1 | bubblewrap-0.5.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10662-1 | btrfsmaintenance-0.5-2.5 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10661-1 | bouncycastle-1.68-3.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10660-1 | boringssl-devel-20200921-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10659-1 | borgbackup-1.1.17-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-18644 | HDF5堆缓冲区溢出漏洞 | 2025-06-27 | 2025-08-15 |
| cnvd-2025-18643 | HDF5内存泄漏漏洞 | 2025-07-11 | 2025-08-15 |
| cnvd-2025-18642 | OpenBao输入验证错误漏洞 | 2025-07-04 | 2025-08-15 |
| cnvd-2025-18641 | OpenBao日志信息泄露漏洞 | 2025-07-04 | 2025-08-15 |
| cnvd-2025-18607 | OpenBao存在未明漏洞(CNVD-2025-18607) | 2025-08-15 | 2025-08-15 |
| cnvd-2025-18606 | OpenBao存在未明漏洞(CNVD-2025-18606) | 2025-08-15 | 2025-08-15 |
| cnvd-2025-18605 | Tenable Network Security Nessus权限提升漏洞 | 2024-05-22 | 2025-08-15 |
| cnvd-2025-18604 | Tenable Network Security Nessus权限提升漏洞 | 2025-04-30 | 2025-08-15 |
| cnvd-2025-18603 | Tenable Network Security Nessus存在未明漏洞 | 2025-04-30 | 2025-08-15 |
| cnvd-2025-18602 | Tenable Network Monitor权限提升漏洞 | 2025-06-06 | 2025-08-15 |
| cnvd-2025-18601 | Tenable Nessus存在未明漏洞 | 2025-07-04 | 2025-08-15 |
| cnvd-2025-18600 | OpenBao存在未明漏洞(CNVD-2025-18600) | 2025-08-15 | 2025-08-15 |
| cnvd-2025-18599 | OpenBao存在未明漏洞(CNVD-2025-18599) | 2025-08-15 | 2025-08-15 |
| cnvd-2025-18598 | OpenBao存在未明漏洞(CNVD-2025-18598) | 2025-08-15 | 2025-08-15 |
| cnvd-2025-18597 | OpenBao存在未明漏洞(CNVD-2025-18597) | 2025-08-15 | 2025-08-15 |
| cnvd-2025-18596 | Open5Gs缓冲区溢出漏洞(CNVD-2025-18596) | 2021-10-10 | 2025-08-15 |
| cnvd-2025-18595 | Open5Gs输入验证错误漏洞 | 2021-12-23 | 2025-08-15 |
| cnvd-2025-18594 | Open5GS授权问题漏洞 | 2022-02-11 | 2025-08-15 |
| cnvd-2025-18593 | Open5GS拒绝服务漏洞(CNVD-2025-18593) | 2022-09-29 | 2025-08-15 |
| cnvd-2025-18592 | IBM WebSphere Application Server Liberty跨站脚本漏洞(CNVD-2025-18592) | 2025-08-13 | 2025-08-15 |
| cnvd-2025-18590 | IBM WebSphere Application Server Liberty资源管理错误漏洞 | 2025-08-15 | 2025-08-15 |
| cnvd-2025-18589 | Open5GS拒绝服务漏洞(CNVD-2025-18589) | 2022-10-08 | 2025-08-15 |
| cnvd-2025-18588 | Open5GS拒绝服务漏洞(CNVD-2025-18588) | 2023-10-11 | 2025-08-15 |
| cnvd-2025-18587 | Open5GS存在未明漏洞(CNVD-2025-18587) | 2023-10-11 | 2025-08-15 |
| cnvd-2025-18585 | Open5GS拒绝服务漏洞(CNVD-2025-18585) | 2024-01-08 | 2025-08-15 |
| cnvd-2025-18584 | Open5GS存在未明漏洞(CNVD-2025-18584) | 2024-05-14 | 2025-08-15 |
| cnvd-2025-18583 | Open5GS拒绝服务漏洞(CNVD-2025-18583) | 2024-05-14 | 2025-08-15 |
| cnvd-2025-18582 | Open5GS存在未明漏洞(CNVD-2025-18582) | 2025-02-08 | 2025-08-15 |
| cnvd-2025-18581 | Open5GS代码执行漏洞 | 2025-02-08 | 2025-08-15 |
| cnvd-2025-18580 | Open5GS存在未明漏洞(CNVD-2025-18580 | 2025-02-18 | 2025-08-15 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2020-avi-828 | Vulnérabilité dans Zimbra | 2020-12-17T00:00:00.000000 | 2020-12-17T00:00:00.000000 |
| certfr-2020-avi-827 | Multiples vulnérabilités dans Mozilla Thunderbird | 2020-12-16T00:00:00.000000 | 2020-12-16T00:00:00.000000 |
| certfr-2020-avi-826 | Multiples vulnérabilités dans Mozilla Firefox | 2020-12-16T00:00:00.000000 | 2020-12-16T00:00:00.000000 |
| certfr-2020-avi-825 | Vulnérabilité dans Citrix Hypervisor | 2020-12-16T00:00:00.000000 | 2020-12-16T00:00:00.000000 |
| certfr-2020-avi-824 | Multiples vulnérabilités dans Xen | 2020-12-16T00:00:00.000000 | 2020-12-16T00:00:00.000000 |
| certfr-2020-avi-823 | Multiples vulnérabilités dans le noyau Linux de RedHat | 2020-12-16T00:00:00.000000 | 2020-12-16T00:00:00.000000 |
| certfr-2020-avi-822 | Multiples vulnérabilités dans les produits Kaspersky | 2020-12-15T00:00:00.000000 | 2020-12-15T00:00:00.000000 |
| certfr-2020-avi-821 | Multiples vulnérabilités dans les produits Apple | 2020-12-15T00:00:00.000000 | 2020-12-15T00:00:00.000000 |
| certfr-2020-avi-820 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2020-12-14T00:00:00.000000 | 2020-12-14T00:00:00.000000 |
| certfr-2020-avi-819 | Vulnérabilité dans F5 BIG-IP | 2020-12-14T00:00:00.000000 | 2020-12-14T00:00:00.000000 |
| certfr-2020-avi-818 | Multiples vulnérabilités dans Cisco Jabber | 2020-12-11T00:00:00.000000 | 2020-12-11T00:00:00.000000 |
| certfr-2020-avi-817 | Vulnérabilité dans F5 BIG-IP | 2020-12-11T00:00:00.000000 | 2020-12-11T00:00:00.000000 |
| certfr-2020-avi-816 | Vulnérabilité dans IBM Db2 | 2020-12-10T00:00:00.000000 | 2020-12-10T00:00:00.000000 |
| certfr-2020-avi-815 | Multiples vulnérabilités dans Palo Alto Cortex XDR | 2020-12-10T00:00:00.000000 | 2020-12-10T00:00:00.000000 |
| certfr-2020-avi-814 | Vulnérabilité dans Adobe Acrobat et Acrobat Reader | 2020-12-10T00:00:00.000000 | 2020-12-10T00:00:00.000000 |
| certfr-2020-avi-813 | Multiples vulnérabilités dans Foxit Reader et PhantomPDF | 2020-12-10T00:00:00.000000 | 2020-12-10T00:00:00.000000 |
| certfr-2020-avi-812 | Vulnérabilité dans Apache Struts | 2020-12-10T00:00:00.000000 | 2020-12-10T00:00:00.000000 |
| certfr-2020-avi-811 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2020-12-10T00:00:00.000000 | 2020-12-10T00:00:00.000000 |
| certfr-2020-avi-810 | Vulnérabilité dans le noyau Linux de Red Hat | 2020-12-10T00:00:00.000000 | 2020-12-10T00:00:00.000000 |
| certfr-2020-avi-809 | Multiples vulnérabilités dans Citrix Secure Mail pour Android | 2020-12-10T00:00:00.000000 | 2020-12-10T00:00:00.000000 |
| certfr-2020-avi-796 | Multiples vulnérabilités dans GitLab CE et EE | 2020-12-08T00:00:00.000000 | 2020-12-10T00:00:00.000000 |
| certfr-2020-avi-808 | Multiples vulnérabilités dans les produits Microsoft | 2020-12-09T00:00:00.000000 | 2020-12-09T00:00:00.000000 |
| certfr-2020-avi-807 | Multiples vulnérabilités dans Microsoft Windows | 2020-12-09T00:00:00.000000 | 2020-12-09T00:00:00.000000 |
| certfr-2020-avi-806 | Multiples vulnérabilités dans Microsoft Office | 2020-12-09T00:00:00.000000 | 2020-12-09T00:00:00.000000 |
| certfr-2020-avi-805 | Multiples vulnérabilités dans Microsoft Edge | 2020-12-09T00:00:00.000000 | 2020-12-09T00:00:00.000000 |
| certfr-2020-avi-804 | Multiples vulnérabilités dans Symantec Messaging Gateway | 2020-12-09T00:00:00.000000 | 2020-12-09T00:00:00.000000 |
| certfr-2020-avi-803 | Vulnérabilité dans OpenSSL | 2020-12-09T00:00:00.000000 | 2020-12-09T00:00:00.000000 |
| certfr-2020-avi-802 | Multiples vulnérabilités dans les produits Schneider Modicon | 2020-12-09T00:00:00.000000 | 2020-12-09T00:00:00.000000 |
| certfr-2020-avi-801 | Multiples vulnérabilités dans les produits Schneider | 2020-12-08T00:00:00.000000 | 2020-12-08T00:00:00.000000 |
| certfr-2020-avi-800 | Multiples vulnérabilités dans les produits Siemens | 2020-12-08T00:00:00.000000 | 2020-12-08T00:00:00.000000 |