Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-1595 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
itsourcecode Society Management System edit_student_qu… |
itsourcecode |
Society Management System |
2026-01-29T15:32:08.118Z | 2026-02-23T09:05:13.258Z |
| CVE-2026-1594 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
itsourcecode Society Management System add_expenses.ph… |
itsourcecode |
Society Management System |
2026-01-29T14:32:08.929Z | 2026-02-23T09:05:00.713Z |
| CVE-2026-1593 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
itsourcecode Society Management System edit_expenses_q… |
itsourcecode |
Society Management System |
2026-01-29T14:32:06.560Z | 2026-02-23T09:04:46.191Z |
| CVE-2026-1590 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
itsourcecode School Management System index.php sql in… |
itsourcecode |
School Management System |
2026-01-29T14:02:09.246Z | 2026-02-23T09:04:32.379Z |
| CVE-2026-1589 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
itsourcecode School Management System index.php sql in… |
itsourcecode |
School Management System |
2026-01-29T14:02:07.250Z | 2026-02-23T09:04:20.529Z |
| CVE-2026-1588 |
5.1 (4.0)
2.7 (3.1)
2.7 (3.0)
|
jishenghua jshERP installByPath install path traversal |
jishenghua |
jshERP |
2026-01-29T13:32:06.240Z | 2026-02-23T09:04:07.647Z |
| CVE-2026-1587 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Open5GS SGWC s11-handler.c sgwc_s11_handle_modify_bear… |
n/a |
Open5GS |
2026-01-29T12:32:08.109Z | 2026-02-23T09:03:54.723Z |
| CVE-2026-1586 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Open5GS SGWC s11-handler.c ogs_gtp2_f_teid_to_ip denia… |
n/a |
Open5GS |
2026-01-29T12:32:06.331Z | 2026-02-23T09:03:40.681Z |
| CVE-2026-1552 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
SEMCMS SEMCMS_Info.php sql injection |
n/a |
SEMCMS |
2026-01-29T00:02:06.546Z | 2026-02-23T09:03:26.616Z |
| CVE-2026-1551 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
itsourcecode School Management System controller.php s… |
itsourcecode |
School Management System |
2026-01-28T23:32:15.865Z | 2026-02-23T09:03:14.332Z |
| CVE-2026-1550 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
PHPGurukul Hospital Management System Admin Dashboard … |
PHPGurukul |
Hospital Management System |
2026-01-28T23:02:10.342Z | 2026-02-23T09:03:01.284Z |
| CVE-2026-1549 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
jishenghua jshERP PluginController uploadPluginConfigF… |
jishenghua |
jshERP |
2026-01-28T23:02:07.452Z | 2026-02-23T09:02:48.663Z |
| CVE-2026-1548 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Totolink A7000R cstecgi.cgi CloudACMunualUpdateUserdat… |
Totolink |
A7000R |
2026-01-28T22:32:08.747Z | 2026-02-23T09:02:35.766Z |
| CVE-2026-1547 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Totolink A7000R cstecgi.cgi setUnloadUserData command … |
Totolink |
A7000R |
2026-01-28T22:02:10.788Z | 2026-02-23T09:02:20.499Z |
| CVE-2026-1546 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
jishenghua jshERP com.jsh.erp.datasource.mappers.Depot… |
jishenghua |
jshERP |
2026-01-28T22:02:06.131Z | 2026-02-23T09:02:07.418Z |
| CVE-2026-1545 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
itsourcecode School Management System index.php sql in… |
itsourcecode |
School Management System |
2026-01-28T21:32:12.268Z | 2026-02-23T09:01:53.581Z |
| CVE-2026-1544 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
D-Link DIR-823X set_mode sub_41E2A0 os command injection |
D-Link |
DIR-823X |
2026-01-28T21:32:09.912Z | 2026-02-23T09:01:40.400Z |
| CVE-2026-1535 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Online Music Site AdminReply.php sql injection |
code-projects |
Online Music Site |
2026-01-28T21:02:09.430Z | 2026-02-23T09:01:24.768Z |
| CVE-2026-1534 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Online Music Site AdminEditUser.php sql … |
code-projects |
Online Music Site |
2026-01-28T21:02:07.552Z | 2026-02-23T09:01:11.732Z |
| CVE-2026-1533 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
code-projects Online Music Site AdminAddCategory.php s… |
code-projects |
Online Music Site |
2026-01-28T20:32:10.974Z | 2026-02-23T09:00:58.745Z |
| CVE-2026-1532 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
D-Link DCS-700L Music File Upload Service setUploadMus… |
D-Link |
DCS-700L |
2026-01-28T20:32:09.118Z | 2026-02-23T09:00:44.948Z |
| CVE-2026-1522 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Open5GS SGWC s5c-handler.c sgwc_s5c_handle_modify_bear… |
n/a |
Open5GS |
2026-01-28T16:32:07.267Z | 2026-02-23T09:00:29.743Z |
| CVE-2026-1521 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Open5GS SGWC s5c-handler.c denial of service |
n/a |
Open5GS |
2026-01-28T14:32:10.348Z | 2026-02-23T09:00:17.635Z |
| CVE-2023-6910 |
6.5 (3.1)
|
Uncontrolled Resource Consumption in M-Files Server |
M-Files Corporation |
M-Files Server |
2023-12-20T09:36:39.118Z | 2026-02-23T09:00:05.026Z |
| CVE-2026-1520 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
rethinkdb Secondary Index cross site scripting |
n/a |
rethinkdb |
2026-01-28T14:32:06.745Z | 2026-02-23T09:00:04.097Z |
| CVE-2026-1506 |
8.6 (4.0)
7.2 (3.1)
7.2 (3.0)
|
D-Link DIR-615 MAC Filter Configuration adv_mac_filter… |
D-Link |
DIR-615 |
2026-01-28T02:32:09.027Z | 2026-02-23T08:59:48.767Z |
| CVE-2026-1505 |
8.6 (4.0)
7.2 (3.1)
7.2 (3.0)
|
D-Link DIR-615 URL Filter set_temp_nodes.php os comman… |
D-Link |
DIR-615 |
2026-01-28T01:32:08.889Z | 2026-02-23T08:59:34.094Z |
| CVE-2026-1449 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Hisense TransTech Smart Bus Management System TireMng.… |
Hisense TransTech |
Smart Bus Management System |
2026-01-26T23:32:10.536Z | 2026-02-23T08:59:17.016Z |
| CVE-2026-1448 |
8.6 (4.0)
7.2 (3.1)
7.2 (3.0)
|
D-Link DIR-615 Web Management wiz_policy_3_machine.php… |
D-Link |
DIR-615 |
2026-01-26T23:32:08.743Z | 2026-02-23T08:59:03.345Z |
| CVE-2026-1445 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
iJason-Liu Books_Manager upload_bookCover.php unrestri… |
iJason-Liu |
Books_Manager |
2026-01-26T22:02:05.762Z | 2026-02-23T08:58:47.511Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-52536 |
6.7 (4.0)
|
Improper Prevention of Lock Bit Modification in S… |
AMD |
AMD EPYC™ 9004 Series Processors |
2026-02-10T19:09:04.084Z | 2026-02-10T21:12:03.165Z |
| CVE-2025-52534 |
5.3 (4.0)
|
Improper bound check within AMD CPU microcode can… |
AMD |
AMD EPYC™ 9005 Series Processors |
2026-02-10T19:12:52.004Z | 2026-02-11T15:07:49.044Z |
| CVE-2025-48517 |
4.6 (4.0)
|
Insufficient Granularity of Access Control in SEV… |
AMD |
AMD EPYC™ 9005 Series Processors |
2026-02-10T19:08:21.524Z | 2026-02-10T21:17:00.925Z |
| CVE-2025-48515 |
5.4 (4.0)
|
Insufficient parameter sanitization in AMD Secure… |
AMD |
AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics |
2026-02-10T19:49:14.504Z | 2026-02-10T20:44:44.557Z |
| CVE-2025-48514 |
4 (4.0)
|
Insufficient Granularity of Access Control in SEV… |
AMD |
AMD EPYC™ 9004 Series Processors |
2026-02-10T19:14:22.874Z | 2026-02-11T14:54:00.307Z |
| CVE-2025-48509 |
1.8 (4.0)
|
Missing Checks in certain functions related to RM… |
AMD |
AMD EPYC™ 9004 Series Processors |
2026-02-10T19:13:21.993Z | 2026-02-11T15:06:51.268Z |
| CVE-2025-36522 |
6.7 (3.1)
|
Incorrect default permissions for some Intel(R) C… |
n/a |
Intel(R) Chipset Software |
2026-02-10T16:26:06.496Z | 2026-02-10T17:27:56.920Z |
| CVE-2025-36511 |
6.7 (3.1)
|
Incorrect default permissions for some Intel(R) M… |
n/a |
Intel(R) Memory and Storage Tool |
2026-02-10T16:26:04.601Z | 2026-02-26T15:04:07.792Z |
| CVE-2025-35999 |
6.7 (3.1)
|
Incorrect permission assignment for critical reso… |
n/a |
System Firmware Update Utility (SysFwUpdt) for Intel(R) Server Boards and Intel(R) Server Systems Based |
2026-02-10T16:26:02.912Z | 2026-02-26T15:04:08.161Z |
| CVE-2025-35998 |
7.9 (3.1)
|
Missing protection mechanism for alternate hardwa… |
n/a |
Intel(R) Platforms |
2026-02-10T16:26:00.829Z | 2026-02-26T15:04:08.464Z |
| CVE-2025-35992 |
4.7 (3.1)
|
Improper conditions check in some firmware for so… |
n/a |
Intel(R) NPU Drivers |
2026-02-10T16:25:58.837Z | 2026-02-10T17:31:21.016Z |
| CVE-2025-33030 |
3.3 (3.1)
|
Improper conditions check in some firmware for so… |
n/a |
Intel(R) NPU Drivers |
2026-02-10T16:25:57.278Z | 2026-02-26T15:04:08.747Z |
| CVE-2025-32739 |
2.8 (3.1)
|
Improper conditions check in some firmware for so… |
n/a |
Intel(R) Graphics Drivers and Intel LTS kernels |
2026-02-10T16:25:55.444Z | 2026-02-10T17:31:52.116Z |
| CVE-2025-32735 |
5.5 (3.1)
|
Improper conditions check in some firmware for so… |
n/a |
Intel(R) NPU Drivers |
2026-02-10T16:25:53.478Z | 2026-02-10T17:32:07.026Z |
| CVE-2025-32467 |
4.1 (3.1)
|
Use of uninitialized variable for some TDX Module… |
n/a |
TDX Module |
2026-02-10T16:25:51.854Z | 2026-02-10T17:32:20.724Z |
| CVE-2025-32453 |
6.7 (3.1)
|
Incorrect default permissions for some Intel(R) G… |
n/a |
Intel(R) Graphics Driver software |
2026-02-10T16:25:50.100Z | 2026-02-26T15:04:09.059Z |
| CVE-2025-32452 |
6.7 (3.1)
|
Uncontrolled search path for some AI Playground b… |
n/a |
AI Playground |
2026-02-10T16:25:48.428Z | 2026-02-10T18:50:32.720Z |
| CVE-2025-32092 |
6.7 (3.1)
|
Insecure inherited permissions for some Intel(R) … |
n/a |
Intel(R) Graphics Software |
2026-02-10T16:25:46.732Z | 2026-02-26T15:04:09.346Z |
| CVE-2025-32008 |
8.6 (3.1)
|
Out-of-bounds write in the firmware for the Intel… |
n/a |
Intel(R) AMT and Intel(R) Standard Manageability |
2026-02-10T16:25:44.946Z | 2026-02-10T18:46:48.862Z |
| CVE-2025-32007 |
4.4 (3.1)
|
Out-of-bounds read for some TDX before version td… |
n/a |
TDX |
2026-02-10T16:25:43.166Z | 2026-02-10T18:39:01.377Z |
| CVE-2025-32003 |
6.5 (3.1)
|
Out-of-bounds read in the firmware for some 100Gb… |
n/a |
100GbE Intel(R) Ethernet Network Adapter E810 |
2026-02-10T16:25:41.432Z | 2026-02-10T18:37:59.640Z |
| CVE-2025-31944 |
5.3 (3.1)
|
Race condition for some TDX Module before version… |
n/a |
TDX Module |
2026-02-10T16:25:39.802Z | 2026-02-10T18:33:57.653Z |
| CVE-2025-31655 |
6.7 (3.1)
|
Incorrect default permissions for some Intel(R) B… |
n/a |
Intel(R) Battery Life Diagnostic Tool |
2026-02-10T16:25:37.949Z | 2026-02-10T17:33:31.501Z |
| CVE-2025-31648 |
3.9 (3.1)
|
Improper handling of values in the microcode flow… |
n/a |
Intel(R) Processor Family may allow an escalation of privilege. Startup code and smm adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present with special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (low), integrity (low) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (low), integrity (low) and availability (none) impacts. |
2026-02-10T16:25:36.350Z | 2026-02-26T15:04:09.683Z |
| CVE-2025-30513 |
7.9 (3.1)
|
Race condition for some TDX Module within Ring 0:… |
n/a |
TDX Module |
2026-02-10T16:25:34.696Z | 2026-02-26T15:04:09.951Z |
| CVE-2025-30508 |
6.5 (3.1)
|
Improper authorization in the Intel(R) Quick Assi… |
n/a |
Intel(R) Platforms |
2026-02-10T16:25:33.137Z | 2026-02-10T17:34:22.439Z |
| CVE-2025-29952 |
5.9 (4.0)
|
Improper Initialization within the AMD Secure Enc… |
AMD |
AMD EPYC™ 9005 Series Processors |
2026-02-10T19:09:37.854Z | 2026-02-10T21:06:53.932Z |
| CVE-2025-29951 |
7.3 (4.0)
|
A buffer overflow in the AMD Secure Processor (AS… |
AMD |
AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics |
2026-02-10T19:50:51.594Z | 2026-02-26T14:44:28.386Z |
| CVE-2025-29950 |
7.1 (4.0)
|
Improper input validation in system management mo… |
AMD |
AMD EPYC™ 9004 Series Processors |
2026-02-10T19:10:28.112Z | 2026-02-26T14:44:29.765Z |
| CVE-2025-29949 |
4.8 (4.0)
|
Insufficient input parameter sanitization in AMD … |
AMD |
AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics |
2026-02-10T19:46:42.763Z | 2026-02-10T20:40:37.898Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-32739 | Improper conditions check in some firmware for some Intel(R) Graphics Drivers and Intel LTS kernels… | 2026-02-10T17:16:17.360 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-32735 | Improper conditions check in some firmware for some Intel(R) NPU Drivers within Ring 1: Device Driv… | 2026-02-10T17:16:17.200 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-32467 | Use of uninitialized variable for some TDX Module before version tdx1.5 within Ring 0: Hypervisor m… | 2026-02-10T17:16:17.040 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-32453 | Incorrect default permissions for some Intel(R) Graphics Driver software within Ring 2: Privileged … | 2026-02-10T17:16:16.877 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-32452 | Uncontrolled search path for some AI Playground before version 2.6.1 beta within Ring 3: User Appli… | 2026-02-10T17:16:16.717 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-32092 | Insecure inherited permissions for some Intel(R) Graphics Software before version 25.30.1702.0 with… | 2026-02-10T17:16:16.553 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-32008 | Out-of-bounds write in the firmware for the Intel(R) AMT and Intel(R) Standard Manageability within… | 2026-02-10T17:16:16.393 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-32007 | Out-of-bounds read for some TDX before version tdx module 1.5.24 within Ring 0: Hypervisor may allo… | 2026-02-10T17:16:16.233 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-32003 | Out-of-bounds read in the firmware for some 100GbE Intel(R) Ethernet Network Adapter E810 before ve… | 2026-02-10T17:16:16.073 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-31944 | Race condition for some TDX Module before version tdx1.5 within Ring 0: Hypervisor may allow a deni… | 2026-02-10T17:16:15.890 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-31655 | Incorrect default permissions for some Intel(R) Battery Life Diagnostic Tool within Ring 3: User Ap… | 2026-02-10T17:16:15.723 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-31648 | Improper handling of values in the microcode flow for some Intel(R) Processor Family may allow an e… | 2026-02-10T17:16:15.550 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-30513 | Race condition for some TDX Module within Ring 0: Hypervisor may allow an escalation of privilege. … | 2026-02-10T17:16:15.390 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-30508 | Improper authorization in the Intel(R) Quick Assist Technology for some Intel(R) Platforms within R… | 2026-02-10T17:16:15.233 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-29952 | Improper Initialization within the AMD Secure Encrypted Virtualization (SEV) firmware can allow an … | 2026-02-10T20:16:44.767 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-29951 | A buffer overflow in the AMD Secure Processor (ASP) bootloader could allow an attacker to overwrite… | 2026-02-10T20:16:44.630 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-29950 | Improper input validation in system management mode (SMM) could allow a privileged attacker to over… | 2026-02-10T20:16:44.493 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-29949 | Insufficient input parameter sanitization in AMD Secure Processor (ASP) Boot Loader (legacy recover… | 2026-02-10T20:16:44.337 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-29948 | Improper access control in AMD Secure Encrypted Virtualization (SEV) firmware could allow a malicio… | 2026-02-10T20:16:44.197 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-29946 | Insufficient or Incomplete Data Removal in Hardware Component in SEV firmware doesn't fully flush I… | 2026-02-10T20:16:44.057 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-29939 | Improper access control in secure encrypted virtualization (SEV) could allow a privileged attacker … | 2026-02-10T20:16:43.910 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-27940 | Out-of-bounds read for some TDX Module before version tdx1.5 within Ring 0: Hypervisor may allow an… | 2026-02-10T17:16:15.063 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-27708 | Out-of-bounds read in the firmware for some Intel(R) Converged Security and Management Engine (CSME… | 2026-02-10T17:16:14.900 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-27572 | Exposure of sensitive information during transient execution for some TDX within Ring 0: Hypervisor… | 2026-02-10T17:16:14.763 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-27560 | Loop with unreachable exit condition ('infinite loop') for some Intel(R) Platform within Ring 0: Ke… | 2026-02-10T17:16:14.600 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-27535 | Exposed ioctl with insufficient access control in the firmware for some Intel(R) Ethernet Connectio… | 2026-02-10T17:16:14.427 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-27243 | Out-of-bounds write in the firmware for some Intel(R) Ethernet Controller E810 before version cvl f… | 2026-02-10T17:16:14.183 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-25210 | Improper input validation for some Server Firmware Update Utility(SysFwUpdt) before version 16.0.12… | 2026-02-10T17:16:13.697 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-25058 | Improper initialization for some ESXi kernel mode driver for the Intel(R) Ethernet 800-Series befor… | 2026-02-10T17:16:13.490 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-24851 | Uncaught exception in the firmware for some 100GbE Intel(R) Ethernet Controller E810 before version… | 2026-02-10T17:16:12.890 | 2026-02-10T21:51:48.077 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-4vv9-gf8x-3292 |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability has been found in Bdtask SalesERP up to 20260116. This issue affects some unknown p… | 2026-01-29T18:31:48Z | 2026-01-29T18:31:48Z |
| ghsa-gjh3-v3wc-8746 |
6.3 (3.1)
2.1 (4.0)
|
A flaw has been found in D-Link DWR-M961 1.1.47. This vulnerability affects the function sub_419920… | 2026-01-29T18:31:47Z | 2026-01-29T18:31:47Z |
| ghsa-fxgp-4f5f-c9fc |
5.4 (3.1)
|
A HTML injection vulnerability exists in the file upload functionality of Cacti <= 1.2.29. When a f… | 2026-01-29T18:31:47Z | 2026-01-29T18:31:47Z |
| ghsa-7jr3-v4fw-wpwc |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was detected in itsourcecode Society Management System 1.0. This affects an unknown… | 2026-01-29T18:31:47Z | 2026-01-29T18:31:47Z |
| ghsa-42vv-v8mp-5939 |
6.2 (3.1)
|
An input validation vulnerability in the flow.Tensor.new_empty/flow.Tensor.new_ones/flow.Tensor.new… | 2026-01-29T18:31:47Z | 2026-01-29T18:31:47Z |
| ghsa-24gc-rw47-8xrm |
5.0 (3.1)
5.1 (4.0)
|
An Insertion of Sensitive Information into Log File vulnerability in B&R PVI client versions prior … | 2026-01-29T18:31:47Z | 2026-01-29T18:31:47Z |
| ghsa-v4cc-rfxv-6q34 |
6.2 (3.1)
|
A segmentation violation in the oneflow._oneflow_internal.autograd.Function.FunctionCtx.mark_non_di… | 2026-01-29T15:30:28Z | 2026-01-29T18:31:46Z |
| ghsa-qq36-hr32-5hm8 |
6.2 (3.1)
|
An input validation vulnerability in the flow.scatter/flow.scatter_add component of OneFlow v0.9.0 … | 2026-01-29T15:30:28Z | 2026-01-29T18:31:46Z |
| ghsa-pfjm-7gj6-rrrx |
7.0 (4.0)
|
CWE-276: Incorrect Default Permissions vulnerability exists that could cause privilege escalation … | 2026-01-29T18:31:46Z | 2026-01-29T18:31:46Z |
| ghsa-q9c9-gpm6-qqq6 |
8.1 (3.1)
|
The Custom Login Page Customizer WordPress plugin before 2.5.4 does not have a proper password rese… | 2026-01-29T06:30:17Z | 2026-01-29T18:31:43Z |
| ghsa-xvqr-69v8-f3gv |
7.8 (3.1)
|
Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file wi… | 2026-01-28T21:31:24Z | 2026-01-29T18:31:42Z |
| ghsa-r8pw-f6w2-wjph |
7.5 (3.1)
|
An issue in the flow.cuda.BoolTensor component of OneFlow v0.9.0 allows attackers to cause a Denial… | 2026-01-28T18:30:49Z | 2026-01-29T18:31:42Z |
| ghsa-pp3q-3fph-xpqh |
6.5 (3.1)
|
A division-by-zero vulnerability in the flow.floor_divide() component of OneFlow v0.9.0 allows atta… | 2026-01-28T18:30:47Z | 2026-01-29T18:31:42Z |
| ghsa-p4fc-fvwp-2m9p |
7.5 (3.1)
|
A dimension validation flaw in the flow.empty() component of OneFlow 0.9.0 allows attackers to caus… | 2026-01-28T18:30:47Z | 2026-01-29T18:31:42Z |
| ghsa-mwgm-j9q4-3cm5 |
5.4 (3.1)
|
Privilege Defined With Unsafe Actions vulnerability in Drupal Mini site allows Stored XSS.This issu… | 2026-01-28T21:31:23Z | 2026-01-29T18:31:42Z |
| ghsa-m9p8-wvpp-vmmm |
7.5 (3.1)
|
A GPU device-ID validation flaw in the flow.cuda.get_device_capability() component of OneFlow v0.9.… | 2026-01-28T18:30:49Z | 2026-01-29T18:31:42Z |
| ghsa-m5gw-75m6-rgcf |
7.5 (3.1)
|
A GPU device-ID validation flaw in OneFlow v0.9.0 allows attackers to trigger a Denial of Dervice (… | 2026-01-28T18:30:49Z | 2026-01-29T18:31:42Z |
| ghsa-hf64-2g6g-cxvv |
9.8 (3.1)
|
An issue in Amidaware Inc Tactical RMM v1.3.1 and before allows a remote attacker to execute arbitr… | 2026-01-28T18:30:47Z | 2026-01-29T18:31:42Z |
| ghsa-gxh3-vmjw-7f4q |
7.5 (3.1)
|
A type validation flaw in the flow.dstack() component of OneFlow v0.9.0 allows attackers to cause a… | 2026-01-28T18:30:47Z | 2026-01-29T18:31:42Z |
| ghsa-gm99-g636-34fh |
7.5 (3.1)
|
A device-ID validation flaw in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) b… | 2026-01-28T18:30:47Z | 2026-01-29T18:31:42Z |
| ghsa-fq99-2537-xjq6 |
7.5 (3.1)
|
A shape mismatch vulnerability in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS… | 2026-01-28T18:30:47Z | 2026-01-29T18:31:42Z |
| ghsa-cv55-w56v-m87q |
5.5 (3.1)
|
The issue was addressed with improved bounds checks. This issue is fixed in macOS Tahoe 26, Keynote… | 2026-01-28T18:30:49Z | 2026-01-29T18:31:42Z |
| ghsa-cm6p-qc7v-m3jw |
7.0 (3.1)
|
Downloading and building modules with malicious version strings can cause local code execution. On … | 2026-01-28T21:31:24Z | 2026-01-29T18:31:42Z |
| ghsa-878f-h9gj-457w |
6.5 (3.1)
|
A segmentation violation in the flow.column_stack component of OneFlow v0.9.0 allows attackers to c… | 2026-01-28T21:31:23Z | 2026-01-29T18:31:42Z |
| ghsa-8479-rrmq-2rhw |
5.3 (3.1)
|
Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal CKEditor 5 Premium… | 2026-01-28T21:31:23Z | 2026-01-29T18:31:42Z |
| ghsa-x77r-97gw-wh89 |
7.4 (3.1)
|
Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file wit… | 2026-01-27T18:32:16Z | 2026-01-29T18:31:37Z |
| ghsa-g78j-46j5-97cr |
4.7 (3.1)
|
Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter wh… | 2026-01-27T18:32:15Z | 2026-01-29T18:31:37Z |
| ghsa-78qr-24v5-7q73 |
4.0 (3.1)
|
Issue summary: When using the low-level OCB API directly with AES-NI or<br>other hardware-accelerat… | 2026-01-27T18:32:15Z | 2026-01-29T18:31:37Z |
| ghsa-5888-36j9-c92p |
5.9 (3.1)
|
Issue summary: A TLS 1.3 connection using certificate compression can be forced to allocate a large… | 2026-01-27T18:32:15Z | 2026-01-29T18:31:37Z |
| ghsa-gfwv-5762-mwrm |
9.4 (4.0)
|
An Authorization Bypass Through User-Controlled Key vulnerability in Hubitat Elevation home automat… | 2026-01-23T00:31:16Z | 2026-01-29T18:31:32Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-31316 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.464317Z |
| gsd-2024-31370 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vuln… | 2024-04-03T05:02:25.464083Z |
| gsd-2024-31139 | In JetBrains TeamCity before 2024.03 xXE was possible in the Maven build steps detector | 2024-04-03T05:02:25.463458Z |
| gsd-2024-31247 | Insertion of Sensitive Information into Log File vulnerability in Frédéric GILLES FG Drup… | 2024-04-03T05:02:25.462904Z |
| gsd-2024-31140 | In JetBrains TeamCity before 2024.03 server administrators could remove arbitrary files f… | 2024-04-03T05:02:25.462180Z |
| gsd-2024-31141 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:25.461619Z |
| gsd-2024-21855 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:24.628464Z |
| gsd-2024-21859 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:02:24.088468Z |
| gsd-2016-15038 | A vulnerability, which was classified as critical, was found in NUUO NVRmini 2 up to 3.0.… | 2024-04-03T05:02:03.603423Z |
| gsd-2017-20190 | ** DISPUTED ** Some Microsoft technologies as used in Windows 8 through 11 allow a tempor… | 2024-04-03T05:01:52.865858Z |
| gsd-2017-20191 | A vulnerability was found in Zimbra zm-admin-ajax up to 8.8.1. It has been classified as … | 2024-04-03T05:01:52.846867Z |
| gsd-2023-52711 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:01:43.829815Z |
| gsd-2023-52713 | Vulnerability of improper permission control in the window management module. Impact: Suc… | 2024-04-03T05:01:43.810601Z |
| gsd-2023-52716 | Vulnerability of starting activities in the background in the ActivityManagerService (AMS… | 2024-04-03T05:01:43.773749Z |
| gsd-2023-52710 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:01:43.721343Z |
| gsd-2023-52714 | Vulnerability of defects introduced in the design process in the hwnff module. Impact: Su… | 2024-04-03T05:01:43.660847Z |
| gsd-2023-52712 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:01:43.618454Z |
| gsd-2023-52715 | The SystemUI module has a vulnerability in permission management. Impact: Successful expl… | 2024-04-03T05:01:43.585977Z |
| gsd-2023-52717 | Permission verification vulnerability in the lock screen module. Impact: Successful explo… | 2024-04-03T05:01:43.575227Z |
| gsd-2023-7252 | The Tickera WordPress plugin before 3.5.2.5 does not prevent users from leaking other us… | 2024-04-03T05:01:25.067211Z |
| gsd-2023-7251 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-03T05:01:24.874688Z |
| gsd-2023-7253 | The Import WP WordPress plugin before 2.13.1 does not prevent users with the administrat… | 2024-04-03T05:01:24.867495Z |
| gsd-2015-10131 | A vulnerability was found in chrisy TFO Graphviz Plugin up to 1.9 on WordPress and classi… | 2024-04-03T05:01:04.134046Z |
| gsd-2022-48681 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-03T05:00:31.497969Z |
| gsd-2022-4965 | The Invitation Code Content Restriction Plugin from CreativeMinds plugin for WordPress is… | 2024-04-03T05:00:22.939980Z |
| gsd-2022-4966 | A vulnerability was found in sequentech admin-console up to 6.1.7 and classified as probl… | 2024-04-03T05:00:22.377987Z |
| gsd-2021-47156 | The Net::IPAddress::Util module before 5.000 for Perl does not properly consider extraneo… | 2024-04-02T05:04:22.786152Z |
| gsd-2021-47154 | The Net::CIDR::Lite module before 0.22 for Perl does not properly consider extraneous zer… | 2024-04-02T05:04:22.775557Z |
| gsd-2021-47157 | The Kossy module before 0.60 for Perl allows JSON hijacking because of X-Requested-With m… | 2024-04-02T05:04:22.762103Z |
| gsd-2021-47155 | The Net::IPV4Addr module 0.10 for Perl does not properly consider extraneous zero charact… | 2024-04-02T05:04:22.758105Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-190111 | Malicious code in ursa-mui-rest-xerxes (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190110 | Malicious code in ursa-lynx-baryon-ophiuchus (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190109 | Malicious code in ursa-jest-antd-helmet (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190108 | Malicious code in ursa-inflation-atlas-taphonomy (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190107 | Malicious code in ursa-hawkingradiation-pulsar-superagent (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190106 | Malicious code in ursa-eslint-gemini-vortex (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190105 | Malicious code in ursa-eslint-config-draco-kronos (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190104 | Malicious code in ursa-comet-cosmogenic-virgo (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190103 | Malicious code in ursa-auth0-delphinus-nodejs (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190102 | Malicious code in uranology-version-flare-hydra (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190101 | Malicious code in uranology-sagitta-cors-cluster (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190100 | Malicious code in uranology-less-markdown-pdf-eclipse (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190099 | Malicious code in uranology-development-nucleosynthesis-rimraf (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190098 | Malicious code in uranology-blueshift-kuiperbelt-aether (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190097 | Malicious code in upsilon-socket-cluster-static-eta (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190096 | Malicious code in upsilon-sed-authenticate-await-tau (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190095 | Malicious code in upsilon-sandbox-static-module-validate (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190094 | Malicious code in upsilon-parse-module-virtualize-sandbox (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190093 | Malicious code in upsilon-fork-pi-index-emulate (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190092 | Malicious code in upsilon-fast-epsilon-optimize-interface (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190091 | Malicious code in upsilon-decode-long-socket-final (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190090 | Malicious code in upsilon-decode-catch-log-function (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190089 | Malicious code in upsilon-catch-new-epsilon-unix (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190088 | Malicious code in upgrade-quantum-computing-eslint-plugin-areology (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190087 | Malicious code in upgrade-ophiuchus-nightwatch-lyra (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190086 | Malicious code in upgrade-mysql-biomimicry-async (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190085 | Malicious code in upgrade-mesosphere-slides-sirius (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190084 | Malicious code in upgrade-hexo-gulp-cosmogenic (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190083 | Malicious code in upgrade-dysonswarm-node-config-got (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190082 | Malicious code in upgrade-async-forever-nextjs (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2022-0869 | libxml2: Schwachstelle ermöglicht Cross-Site Scripting | 2022-07-31T22:00:00.000+00:00 | 2024-09-05T22:00:00.000+00:00 |
| wid-sec-w-2022-0864 | lxml: Schwachstelle ermöglicht Denial of Service | 2022-07-31T22:00:00.000+00:00 | 2024-09-05T22:00:00.000+00:00 |
| wid-sec-w-2024-2063 | Cisco Meraki: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes | 2024-09-04T22:00:00.000+00:00 | 2024-09-04T22:00:00.000+00:00 |
| wid-sec-w-2024-2062 | Cisco Expressway: Schwachstelle ermöglicht Darstellen falscher Informationen | 2024-09-04T22:00:00.000+00:00 | 2024-09-04T22:00:00.000+00:00 |
| wid-sec-w-2024-2061 | Webmin: Schwachstelle ermöglicht Denial of Service | 2024-09-04T22:00:00.000+00:00 | 2024-09-04T22:00:00.000+00:00 |
| wid-sec-w-2024-2060 | Red Hat Satellite: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2024-09-04T22:00:00.000+00:00 | 2024-09-04T22:00:00.000+00:00 |
| wid-sec-w-2024-2054 | Zoho ManageEngine Endpoint Central: Schwachstelle ermöglicht Umgehung von Sicherheitsvorkehrungen und Offenlegung von Informationen | 2024-09-04T22:00:00.000+00:00 | 2024-09-04T22:00:00.000+00:00 |
| wid-sec-w-2024-2053 | Veeam ONE: Mehrere Schwachstellen | 2024-09-04T22:00:00.000+00:00 | 2024-09-04T22:00:00.000+00:00 |
| wid-sec-w-2024-2052 | Cisco Identity Services Engine (ISE): Schwachstelle ermöglicht Privilegieneskalation | 2024-09-04T22:00:00.000+00:00 | 2024-09-04T22:00:00.000+00:00 |
| wid-sec-w-2024-1511 | Red Hat OpenStack: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode | 2024-07-02T22:00:00.000+00:00 | 2024-09-04T22:00:00.000+00:00 |
| wid-sec-w-2023-2143 | ImageMagick: Schwachstellen ermöglichen Denial of Service | 2019-03-31T22:00:00.000+00:00 | 2024-09-04T22:00:00.000+00:00 |
| wid-sec-w-2023-2142 | ImageMagick: Mehrere Schwachstellen ermöglichen Denial of Service | 2019-04-24T22:00:00.000+00:00 | 2024-09-04T22:00:00.000+00:00 |
| wid-sec-w-2023-2141 | ImageMagick: Mehrere Schwachstellen ermöglichen Denial of Service | 2019-04-29T22:00:00.000+00:00 | 2024-09-04T22:00:00.000+00:00 |
| wid-sec-w-2023-2140 | ImageMagick: Schwachstelle ermöglicht Denial of Service | 2019-05-02T22:00:00.000+00:00 | 2024-09-04T22:00:00.000+00:00 |
| wid-sec-w-2023-2138 | ImageMagick: Mehrere Schwachstellen | 2019-06-26T22:00:00.000+00:00 | 2024-09-04T22:00:00.000+00:00 |
| wid-sec-w-2024-2049 | Samsung Android: Mehrere Schwachstellen | 2024-09-03T22:00:00.000+00:00 | 2024-09-03T22:00:00.000+00:00 |
| wid-sec-w-2024-2045 | Android Patchday September: Mehrere Schwachstellen | 2024-09-03T22:00:00.000+00:00 | 2024-09-03T22:00:00.000+00:00 |
| wid-sec-w-2024-2042 | Pixel Patchday September 2024: Mehrere Schwachstellen | 2024-09-03T22:00:00.000+00:00 | 2024-09-03T22:00:00.000+00:00 |
| wid-sec-w-2024-2039 | Ubiquiti UniFi: Schwachstelle ermöglicht Privilegieneskalation | 2024-09-03T22:00:00.000+00:00 | 2024-09-03T22:00:00.000+00:00 |
| wid-sec-w-2024-1938 | Drupal: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes | 2020-11-18T23:00:00.000+00:00 | 2024-09-03T22:00:00.000+00:00 |
| wid-sec-w-2024-1709 | Podman: Schwachstelle ermöglicht Denial of Service | 2024-07-24T22:00:00.000+00:00 | 2024-09-03T22:00:00.000+00:00 |
| wid-sec-w-2024-0158 | Red Hat Advanced Cluster Management for Kubernetes: Mehrere Schwachstellen | 2024-01-18T23:00:00.000+00:00 | 2024-09-03T22:00:00.000+00:00 |
| wid-sec-w-2023-2183 | 7-Zip: Mehrere Schwachstellen | 2023-08-27T22:00:00.000+00:00 | 2024-09-03T22:00:00.000+00:00 |
| wid-sec-w-2022-1443 | Drupal: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes | 2020-11-25T23:00:00.000+00:00 | 2024-09-03T22:00:00.000+00:00 |
| wid-sec-w-2022-0216 | ffmpeg: Schwachstelle ermöglicht Denial of Service | 2021-08-12T22:00:00.000+00:00 | 2024-09-03T22:00:00.000+00:00 |
| wid-sec-w-2022-0211 | ffmpeg: Mehrere Schwachstellen ermöglichen Denial of Service | 2021-05-27T22:00:00.000+00:00 | 2024-09-03T22:00:00.000+00:00 |
| wid-sec-w-2024-2034 | VMware Fusion: Schwachstelle ermöglicht Codeausführung | 2024-09-02T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-2030 | QEMU: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes oder Denial of Service | 2017-02-07T23:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-2029 | QEMU: Mehrere Schwachstellen | 2017-02-15T23:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-2028 | QEMU: Schwachstelle ermöglicht Denial of Service | 2017-02-19T23:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2022:0847 | Red Hat Security Advisory: thunderbird security update | 2022-03-14T10:09:51+00:00 | 2026-01-27T09:13:56+00:00 |
| rhsa-2022:0818 | Red Hat Security Advisory: firefox security update | 2022-03-10T15:22:06+00:00 | 2026-01-27T09:13:55+00:00 |
| rhsa-2022:0816 | Red Hat Security Advisory: firefox security update | 2022-03-10T15:18:36+00:00 | 2026-01-27T09:13:55+00:00 |
| rhsa-2022:0817 | Red Hat Security Advisory: firefox security update | 2022-03-10T15:29:30+00:00 | 2026-01-27T09:13:53+00:00 |
| rhsa-2022:0815 | Red Hat Security Advisory: firefox security update | 2022-03-10T15:09:22+00:00 | 2026-01-27T09:13:53+00:00 |
| rhsa-2022:0824 | Red Hat Security Advisory: firefox security and bug fix update | 2022-03-10T16:37:02+00:00 | 2026-01-27T09:13:52+00:00 |
| rhsa-2022:1110 | Red Hat Security Advisory: Red Hat Decision Manager 7.12.1 security update | 2022-03-29T13:16:15+00:00 | 2026-01-27T09:13:51+00:00 |
| rhsa-2022:1108 | Red Hat Security Advisory: Red Hat Process Automation Manager 7.12.1 security update | 2022-03-29T13:00:24+00:00 | 2026-01-27T09:13:51+00:00 |
| rhsa-2022:0634 | Red Hat Security Advisory: rpm security update | 2022-02-22T15:59:23+00:00 | 2026-01-27T09:13:50+00:00 |
| rhsa-2022:0589 | Red Hat Security Advisory: Red Hat build of Quarkus 2.2.5 release and security update | 2022-02-21T18:22:15+00:00 | 2026-01-27T09:13:50+00:00 |
| rhsa-2022:0368 | Red Hat Security Advisory: rpm security update | 2022-02-01T21:04:42+00:00 | 2026-01-27T09:13:48+00:00 |
| rhsa-2022:0254 | Red Hat Security Advisory: rpm security update | 2022-01-25T09:30:34+00:00 | 2026-01-27T09:13:48+00:00 |
| rhsa-2021:3700 | Red Hat Security Advisory: Red Hat AMQ Broker 7.9.0 release and security update | 2021-09-30T09:57:35+00:00 | 2026-01-27T09:13:35+00:00 |
| rhsa-2022:1029 | Red Hat Security Advisory: Red Hat Integration Camel-K 1.6.4 release and security update | 2022-03-23T08:22:19+00:00 | 2026-01-27T09:13:32+00:00 |
| rhsa-2021:4100 | Red Hat Security Advisory: Red Hat Integration - Service Registry release and security update [2.0.2.GA] | 2021-11-02T12:42:32+00:00 | 2026-01-27T09:13:31+00:00 |
| rhsa-2021:1796 | Red Hat Security Advisory: container-tools:rhel8 security, bug fix, and enhancement update | 2021-05-18T14:16:32+00:00 | 2026-01-27T09:13:27+00:00 |
| rhsa-2021:3516 | Red Hat Security Advisory: EAP XP 2 security update to CVE fixes in the EAP 7.3.x base | 2021-09-13T17:34:00+00:00 | 2026-01-27T09:13:24+00:00 |
| rhsa-2021:3225 | Red Hat Security Advisory: Red Hat AMQ Streams 1.8.0 release and security update | 2021-08-19T07:17:54+00:00 | 2026-01-27T09:13:24+00:00 |
| rhsa-2021:3207 | Red Hat Security Advisory: Red Hat Integration Camel Quarkus Tech-Preview 2 security update | 2021-08-18T09:54:27+00:00 | 2026-01-27T09:13:22+00:00 |
| rhsa-2021:3205 | Red Hat Security Advisory: Red Hat Integration Camel-K 1.4 release and security update | 2021-08-18T09:13:12+00:00 | 2026-01-27T09:13:22+00:00 |
| rhsa-2022:0728 | Red Hat Security Advisory: OpenShift Logging bug fix and security update (5.2.8) | 2022-03-02T12:49:18+00:00 | 2026-01-27T09:13:19+00:00 |
| rhsa-2022:0727 | Red Hat Security Advisory: OpenShift Logging bug fix and security update (5.1.9) | 2022-03-01T18:15:33+00:00 | 2026-01-27T09:13:19+00:00 |
| rhsa-2022:0721 | Red Hat Security Advisory: OpenShift Logging bug fix and security update (5.3.5) | 2022-03-01T14:05:10+00:00 | 2026-01-27T09:13:18+00:00 |
| rhsa-2022:0297 | Red Hat Security Advisory: Red Hat Decision Manager 7.12.0 security update | 2022-01-26T16:33:21+00:00 | 2026-01-27T09:13:18+00:00 |
| rhsa-2021:4918 | Red Hat Security Advisory: Red Hat Integration Camel-K 1.6 release and security update | 2021-12-02T16:17:17+00:00 | 2026-01-27T09:13:16+00:00 |
| rhsa-2021:4767 | Red Hat Security Advisory: Red Hat Integration Camel Extensions for Quarkus GA security update | 2021-11-23T10:34:10+00:00 | 2026-01-27T09:13:16+00:00 |
| rhsa-2021:3880 | Red Hat Security Advisory: Red Hat build of Quarkus 2.2.3 release and security update | 2021-10-20T11:29:22+00:00 | 2026-01-27T09:13:15+00:00 |
| rhsa-2021:3534 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.9 security update | 2021-09-14T12:37:26+00:00 | 2026-01-27T09:13:14+00:00 |
| rhsa-2021:3529 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.9 security update on RHEL 8 | 2021-09-14T12:35:03+00:00 | 2026-01-27T09:13:14+00:00 |
| rhsa-2021:3528 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.9 security update on RHEL 7 | 2021-09-14T12:34:38+00:00 | 2026-01-27T09:13:14+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2021-33466 | An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in expand_smacro() in modules/preprocs/nasm/nasm-pp.c. | 2022-07-02T00:00:00.000Z | 2025-09-03T20:29:53.000Z |
| msrc_cve-2021-33465 | An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in expand_mmacro() in modules/preprocs/nasm/nasm-pp.c. | 2022-07-02T00:00:00.000Z | 2025-09-03T20:28:27.000Z |
| msrc_cve-2024-49917 | drm/amd/display: Add NULL check for clk_mgr and clk_mgr->funcs in dcn30_init_hw | 2024-10-01T07:00:00.000Z | 2025-09-03T20:27:18.000Z |
| msrc_cve-2019-20633 | GNU patch through 2.7.6 contains a free(p_line[p_end]) Double Free vulnerability in the function another_hunk in pch.c that can cause a denial of service via a crafted patch file. NOTE: this issue exists because of an incomplete fix for CVE-2018-6952. | 2020-03-02T00:00:00.000Z | 2025-09-03T20:26:16.000Z |
| msrc_cve-2024-50014 | ext4: fix access to uninitialised lock in fc replay path | 2024-10-01T07:00:00.000Z | 2025-09-03T20:23:54.000Z |
| msrc_cve-2021-33462 | An issue was discovered in yasm version 1.3.0. There is a use-after-free in expr_traverse_nodes_post() in libyasm/expr.c. | 2022-07-02T00:00:00.000Z | 2025-09-03T20:23:46.000Z |
| msrc_cve-2021-33461 | An issue was discovered in yasm version 1.3.0. There is a use-after-free in yasm_intnum_destroy() in libyasm/intnum.c. | 2022-07-02T00:00:00.000Z | 2025-09-03T20:22:11.000Z |
| msrc_cve-2021-33460 | An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in if_condition() in modules/preprocs/nasm/nasm-pp.c. | 2022-07-02T00:00:00.000Z | 2025-09-03T20:20:29.000Z |
| msrc_cve-2021-33459 | An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in nasm_parser_directive() in modules/parsers/nasm/nasm-parse.c. | 2022-07-02T00:00:00.000Z | 2025-09-03T20:19:16.000Z |
| msrc_cve-2021-33458 | There is a NULL pointer dereference in yasm version 1.3.0 | 2022-07-02T00:00:00.000Z | 2025-09-03T20:17:40.000Z |
| msrc_cve-2021-33457 | An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in expand_mmac_params() in modules/preprocs/nasm/nasm-pp.c. | 2022-07-02T00:00:00.000Z | 2025-09-03T20:16:18.000Z |
| msrc_cve-2024-50146 | net/mlx5e: Don't call cleanup on profile rollback failure | 2024-11-02T00:00:00.000Z | 2025-09-03T20:15:02.000Z |
| msrc_cve-2021-33456 | There is a NULL pointer dereference in hash() in yasm version 1.3.0 | 2022-07-02T00:00:00.000Z | 2025-09-03T20:14:51.000Z |
| msrc_cve-2021-33455 | An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in do_directive() in modules/preprocs/nasm/nasm-pp.c. | 2022-07-02T00:00:00.000Z | 2025-09-03T20:13:39.000Z |
| msrc_cve-2024-49915 | drm/amd/display: Add NULL check for clk_mgr in dcn32_init_hw | 2024-10-01T07:00:00.000Z | 2025-09-03T20:12:58.000Z |
| msrc_cve-2024-49923 | drm/amd/display: Pass non-null to dcn20_validate_apply_pipe_split_flags | 2024-10-01T07:00:00.000Z | 2025-09-03T20:11:02.000Z |
| msrc_cve-2024-7246 | HPACK table poisoning in gRPC C++, Python & Ruby | 2024-08-02T00:00:00.000Z | 2025-09-03T20:07:14.000Z |
| msrc_cve-2024-50138 | bpf: Use raw_spinlock_t in ringbuf | 2024-11-02T00:00:00.000Z | 2025-09-03T20:04:42.000Z |
| msrc_cve-2024-56761 | x86/fred: Clear WFE in missing-ENDBRANCH #CPs | 2025-01-02T00:00:00.000Z | 2025-09-03T20:01:52.000Z |
| msrc_cve-2024-53205 | phy: realtek: usb: fix NULL deref in rtk_usb2phy_probe | 2024-12-02T00:00:00.000Z | 2025-09-03T19:50:38.000Z |
| msrc_cve-2024-49906 | drm/amd/display: Check null pointer before try to access it | 2024-10-01T07:00:00.000Z | 2025-09-03T19:48:30.000Z |
| msrc_cve-2018-1000217 | Dave Gamble cJSON version 1.7.3 and earlier contains a CWE-416: Use After Free vulnerability | 2018-08-02T00:00:00.000Z | 2025-09-03T19:47:35.000Z |
| msrc_cve-2024-49919 | drm/amd/display: Add null check for head_pipe in dcn201_acquire_free_pipe_for_layer | 2024-10-01T07:00:00.000Z | 2025-09-03T19:44:48.000Z |
| msrc_cve-2024-49898 | drm/amd/display: Check null-initialized variables | 2024-10-01T07:00:00.000Z | 2025-09-03T19:44:24.000Z |
| msrc_cve-2024-49911 | drm/amd/display: Add NULL check for function pointer in dcn20_set_output_transfer_func | 2024-10-01T07:00:00.000Z | 2025-09-03T19:40:44.000Z |
| msrc_cve-2024-49909 | drm/amd/display: Add NULL check for function pointer in dcn32_set_output_transfer_func | 2024-10-01T07:00:00.000Z | 2025-09-03T19:37:07.000Z |
| msrc_cve-2025-55231 | Windows Storage-based Management Service Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-26T07:00:00.000Z |
| msrc_cve-2025-55230 | Windows MBT Transport Driver Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-26T07:00:00.000Z |
| msrc_cve-2025-55229 | Windows Certificate Spoofing Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-26T07:00:00.000Z |
| msrc_cve-2025-53795 | Microsoft PC Manager Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-21T07:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202505-1496 | Advantech WebAccess is an HMI/SCADA monitoring software completely based on IE browser. … | 2025-05-13T23:26:43.037000Z |
| var-202505-1497 | FH451 is a router produced by Tenda Company, with a maximum transmission rate of 450Mbps … | 2025-05-13T23:26:22.158000Z |
| var-202210-1267 | Tenda AC18 V15.03.05.19(6318) was discovered to contain a stack overflow via the time par… | 2025-05-13T23:25:29.825000Z |
| var-202210-1645 | AsusSoftwareManager.exe in ASUS System Control Interface on ASUS personal computers (runn… | 2025-05-13T23:25:29.773000Z |
| var-202504-3805 | D-Link DCS-960L is a network camera product of China's D-Link company. D-Link DCS-960L h… | 2025-05-13T23:25:24.837000Z |
| var-202505-0190 | In Modem, there is a possible information disclosure due to incorrect error handling. Thi… | 2025-05-13T23:25:24.609000Z |
| var-202505-1095 | ACTi Web Configurator is a camera management configuration interface launched by ACTi Cor… | 2025-05-13T23:25:23.978000Z |
| var-202505-1240 | FH451 is a router produced by Tenda Company, with a maximum transmission rate of 450Mbps … | 2025-05-13T23:25:23.919000Z |
| var-202504-3642 | HP LaserJet MFP M132nw is a black and white laser multifunction printer, mainly used for … | 2025-05-13T23:25:02.521000Z |
| var-202504-3810 | MOBOTIX Q22 is a 360-degree panoramic network camera. MOBOTIX Q22 is a 360-degree panor… | 2025-05-13T23:25:02.435000Z |
| var-202504-4020 | Founded in 2016, Netshi Technology Co., Ltd. is a high-tech enterprise focusing on the re… | 2025-05-13T23:25:02.333000Z |
| var-202505-0384 | Brother DCP-L2540DW is a multi-function laser/LED printer. Brother (China) Commercial Co… | 2025-05-13T23:25:01.915000Z |
| var-202504-3812 | MOBOTIX D22 is a camera. MOBOTIX D22 has an unauthorized access vulnerability that can b… | 2025-05-13T23:24:39.420000Z |
| var-202504-3507 | OnCell 3120-LTE-1 is a low-power LTE modem that supports the world's advanced LTE Cat 1 t… | 2025-05-13T23:22:47.275000Z |
| var-202504-3799 | TP-Link Technologies Co., Ltd. is a leading global supplier of network communication equi… | 2025-05-13T23:22:47.142000Z |
| var-202504-4090 | A15 is a dual-band 3G wireless router suitable for fiber-optic homes within 1000M. Shenz… | 2025-05-13T23:22:47.010000Z |
| var-202504-4092 | HP Ink Tank Wireless 410 series is a color inkjet multifunction printer that integrates p… | 2025-05-13T23:22:47Z |
| var-202505-0389 | H3C Technologies Co., Ltd. is a global leader in digital solutions. H3C Magic R3000 Giga… | 2025-05-13T23:22:46.816000Z |
| var-202504-3567 | Emerson Electric (China) Investment Co., Ltd. is a global technology and engineering comp… | 2025-05-13T23:22:23.771000Z |
| var-202504-3735 | Beijing Yakong Technology Development Co., Ltd. is a high-tech enterprise of industrial a… | 2025-05-13T23:22:23.681000Z |
| var-202210-0319 | Rockwell Automation FactoryTalk VantagePoint versions 8.0, 8.10, 8.20, 8.30, 8.31 are vul… | 2025-05-13T23:22:01.450000Z |
| var-202210-1138 | Tenda AC10 V15.03.06.23 contains a Stack overflow vulnerability via /goform/formSetSpeedWan. | 2025-05-13T23:22:01.368000Z |
| var-202504-3877 | MOBOTIX D10 is a high-performance smart network camera. MOBOTIX D10 has an unauthorized … | 2025-05-13T23:21:53.343000Z |
| var-202505-0239 | In Modem, there is a possible system crash due to an uncaught exception. This could lead … | 2025-05-13T23:21:52.852000Z |
| var-202505-0386 | D-Link DI-8100 is a broadband router designed by D-Link for small and medium-sized networ… | 2025-05-13T23:21:52.789000Z |
| var-202505-1096 | NBR800G is a router for Internet behavior management. Beijing Xingwang Ruijie Network Te… | 2025-05-13T23:21:52.454000Z |
| var-202505-1239 | AC6 is an 11ac dual-band wireless router designed for 100M fiber homes. AC6 of Shenzhen … | 2025-05-13T23:21:52.403000Z |
| var-202210-1161 | AsusSwitch.exe on ASUS personal computers (running Windows) sets weak file permissions, l… | 2025-05-13T23:21:00.315000Z |
| var-202504-4091 | AC8 is a dual-band three-gigabit wireless router suitable for fiber-optic homes within 10… | 2025-05-13T23:20:51.942000Z |
| var-202210-1233 | Tenda AC15 V15.03.05.18 was discovered to contain a stack overflow via the timeZone param… | 2025-05-13T23:19:21.354000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2024:0657-1 | Security update for rear27a | 2024-02-28T14:05:12Z | 2024-02-28T14:05:12Z |
| suse-su-2024:0655-1 | Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP5) | 2024-02-28T13:04:28Z | 2024-02-28T13:04:28Z |
| suse-su-2024:0656-1 | Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP5) | 2024-02-28T12:03:32Z | 2024-02-28T12:03:32Z |
| suse-su-2024:0649-1 | Security update for freerdp | 2024-02-28T11:03:29Z | 2024-02-28T11:03:29Z |
| suse-su-2024:0648-1 | Security update for freerdp | 2024-02-28T11:03:19Z | 2024-02-28T11:03:19Z |
| suse-ou-2024:0647-1 | Optional update for icu | 2024-02-28T10:55:49Z | 2024-02-28T10:55:49Z |
| suse-su-2024:0644-1 | Security update for nodejs18 | 2024-02-28T08:43:54Z | 2024-02-28T08:43:54Z |
| suse-su-2024:0643-1 | Security update for nodejs20 | 2024-02-28T08:43:43Z | 2024-02-28T08:43:43Z |
| suse-su-2024:0639-1 | Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP5) | 2024-02-27T13:33:28Z | 2024-02-27T13:33:28Z |
| suse-su-2024:0638-1 | Security update for gnutls | 2024-02-27T09:36:12Z | 2024-02-27T09:36:12Z |
| suse-su-2024:0624-1 | Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP5) | 2024-02-26T19:33:38Z | 2024-02-26T19:33:38Z |
| suse-su-2024:0622-1 | Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP5) | 2024-02-26T19:33:34Z | 2024-02-26T19:33:34Z |
| suse-su-2024:0620-1 | Security update for the Linux Kernel RT (Live Patch 6 for SLE 15 SP5) | 2024-02-26T19:33:21Z | 2024-02-26T19:33:21Z |
| suse-su-2024:0619-1 | Security update for java-1_8_0-ibm | 2024-02-26T11:20:16Z | 2024-02-26T11:20:16Z |
| suse-su-2024:0608-1 | Security update for MozillaThunderbird | 2024-02-23T19:01:43Z | 2024-02-23T19:01:43Z |
| suse-su-2024:0607-1 | Security update for MozillaFirefox | 2024-02-23T19:01:01Z | 2024-02-23T19:01:01Z |
| suse-su-2024:0605-1 | Security update for java-1_8_0-ibm | 2024-02-23T15:31:04Z | 2024-02-23T15:31:04Z |
| suse-su-2024:0604-1 | Security update for openssh | 2024-02-23T08:46:08Z | 2024-02-23T08:46:08Z |
| suse-su-2024:0603-1 | Security update for openssh | 2024-02-23T08:45:47Z | 2024-02-23T08:45:47Z |
| suse-su-2024:0601-1 | Security update for python-pycryptodome | 2024-02-23T08:26:45Z | 2024-02-23T08:26:45Z |
| suse-su-2024:0597-1 | Security update for mozilla-nss | 2024-02-22T19:07:12Z | 2024-02-22T19:07:12Z |
| suse-su-2024:0596-1 | Security update for openssh | 2024-02-22T19:05:39Z | 2024-02-22T19:05:39Z |
| suse-su-2024:0595-1 | Security update for python310 | 2024-02-22T19:03:50Z | 2024-02-22T19:03:50Z |
| suse-su-2024:0594-1 | Security update for tiff | 2024-02-22T14:58:01Z | 2024-02-22T14:58:01Z |
| suse-su-2024:0593-1 | Security update for tiff | 2024-02-22T14:56:50Z | 2024-02-22T14:56:50Z |
| suse-su-2024:0592-1 | Security update for php-composer2 | 2024-02-22T14:08:04Z | 2024-02-22T14:08:04Z |
| suse-su-2024:0591-1 | Security update for python-uamqp | 2024-02-22T13:46:16Z | 2024-02-22T13:46:16Z |
| suse-su-2024:0590-1 | Security update for bind | 2024-02-22T13:38:59Z | 2024-02-22T13:38:59Z |
| suse-su-2024:0589-1 | Security update for qemu | 2024-02-22T09:14:24Z | 2024-02-22T09:14:24Z |
| suse-su-2024:0587-1 | Security update for docker | 2024-02-22T08:55:20Z | 2024-02-22T08:55:20Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:10598-1 | LibVNCServer-devel-0.9.13-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10597-1 | ImageMagick-7.1.0.8-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10596-1 | GraphicsMagick-1.3.36-1.7 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10595-1 | FlightGear-2020.3.11-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10594-1 | Botan-2.18.1-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10593-1 | 389-ds-2.0.10~git0.21dd2802c-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10592-1 | xstream-1.4.18-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10591-1 | libXvnc-devel-1.10.1-17.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10590-1 | seamonkey-2.53.9.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10589-1 | rmt-server-2.6.13-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10588-1 | rawtherapee-5.8-5.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10587-1 | ocaml-4.12.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10586-1 | mercurial-5.9.1-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10585-1 | lighttpd-1.4.59-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10584-1 | icecast-2.4.4-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10583-1 | frr-7.5.1-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10582-1 | curl-7.79.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10581-1 | ruby2.2-rubygem-puppet-3.8.7-2.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10580-1 | httrack-3.48.22-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10579-1 | strongswan-5.3.5-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10578-1 | libpango-1_0-0-1.40.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10577-1 | gromacs-2016.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10576-1 | gv-3.7.4-3.8 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10575-1 | csound-5.18.02-7.10 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10574-1 | ruby2.2-rubygem-activesupport-4_2-4.2.7.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10573-1 | nbd-3.13-3.5 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10572-1 | libjavascriptcoregtk-4_0-18-2.14.2-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10571-1 | clamav-0.99.2-4.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10570-1 | elfutils-0.167-1.5 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10569-1 | libserf-1-1-1.3.9-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-18438 | Apple macOS访问控制错误漏洞(CNVD-2025-18438) | 2025-08-01 | 2025-08-14 |
| cnvd-2025-18437 | Apple macOS Sequoia和Apple macOS Sonoma存在未明漏洞(CNVD-2025-18437) | 2025-08-01 | 2025-08-14 |
| cnvd-2025-18436 | Apple macOS Sequoia和Apple macOS Sonoma存在未明漏洞(CNVD-2025-18436) | 2025-08-01 | 2025-08-14 |
| cnvd-2025-18435 | Apple macOS Sequoia和Apple macOS Sonoma存在未明漏洞(CNVD-2025-18435) | 2025-08-01 | 2025-08-14 |
| cnvd-2025-18434 | Apple macOS Sequoia和Apple macOS Sonoma存在未明漏洞(CNVD-2025-18434) | 2025-08-01 | 2025-08-14 |
| cnvd-2025-18433 | D-Link DI-8100G命令注入漏洞 | 2024-09-09 | 2025-08-14 |
| cnvd-2025-18432 | D-Link DI-8100G upgrade_filter.asp命令注入漏洞 | 2024-09-09 | 2025-08-14 |
| cnvd-2025-18431 | D-Link DI-8100 /jingx.asp文件缓冲区溢出漏洞 | 2025-07-21 | 2025-08-14 |
| cnvd-2025-18430 | D-Link DI-8100 /arp_sys.asp文件缓冲区溢出漏洞 | 2025-07-21 | 2025-08-14 |
| cnvd-2025-18429 | D-Link DI-8200 yyxz_dlink_asp函数缓冲区溢出漏洞 | 2025-08-10 | 2025-08-14 |
| cnvd-2025-18428 | D-Link DI-8200 ipsec_road_asp函数缓冲区溢出漏洞 | 2025-08-10 | 2025-08-14 |
| cnvd-2025-18427 | D-Link DI-8200 ipsec_net_asp函数缓冲区溢出漏洞 | 2025-08-10 | 2025-08-14 |
| cnvd-2025-18417 | Apple macOS Sequoia和Apple macOS Sonoma存在未明漏洞(CNVD-2025-18417) | 2025-08-01 | 2025-08-14 |
| cnvd-2025-18416 | Apple macOS Sequoia和Apple macOS Sonoma存在未明漏洞(CNVD-2025-18416) | 2025-08-01 | 2025-08-14 |
| cnvd-2025-18415 | Apple macOS Sequoia和Apple macOS Sonoma存在未明漏洞(CNVD-2025-18415) | 2025-08-01 | 2025-08-14 |
| cnvd-2025-18414 | Apple macOS Sequoia和Apple macOS Sonoma存在未明漏洞 | 2025-08-01 | 2025-08-14 |
| cnvd-2025-18413 | Apple macOS Sequoia堆缓冲区溢出漏洞 | 2025-08-01 | 2025-08-14 |
| cnvd-2025-18412 | Apple macOS Sequoia存在未明漏洞(CNVD-2025-18412) | 2025-08-01 | 2025-08-14 |
| cnvd-2025-18411 | Apple macOS Sequoia存在未明漏洞(CNVD-2025-18411) | 2025-08-01 | 2025-08-14 |
| cnvd-2025-18410 | Apple macOS Sequoia存在未明漏洞(CNVD-2025-18410) | 2025-08-01 | 2025-08-14 |
| cnvd-2025-18409 | Apple macOS Sequoia存在未明漏洞(CNVD-2025-18409) | 2025-08-01 | 2025-08-14 |
| cnvd-2025-18408 | Apple macOS Sequoia存在未明漏洞(CNVD-2025-18408) | 2025-08-01 | 2025-08-14 |
| cnvd-2025-18407 | Apple macOS Sequoia越界读取漏洞 | 2025-08-01 | 2025-08-14 |
| cnvd-2025-18406 | Apple macOS Sequoia存在未明漏洞(CNVD-2025-18406) | 2025-08-01 | 2025-08-14 |
| cnvd-2025-18405 | Apple macOS Sequoia越界写入漏洞 | 2025-08-01 | 2025-08-14 |
| cnvd-2025-18404 | Apple macOS Sequoia存在未明漏洞(CNVD-2025-18404) | 2025-08-01 | 2025-08-14 |
| cnvd-2025-18403 | Apple macOS Sequoia存在未明漏洞(CNVD-2025-18403) | 2025-08-01 | 2025-08-14 |
| cnvd-2025-18402 | Apple macOS Sequoia存在未明漏洞(CNVD-2025-18402) | 2025-08-01 | 2025-08-14 |
| cnvd-2025-18401 | Apple macOS Sequoia存在未明漏洞(CNVD-2025-18401) | 2025-08-01 | 2025-08-14 |
| cnvd-2025-18394 | 上海上讯信息技术股份有限公司运维管理审计系统存在逻辑缺陷漏洞 | 2025-06-30 | 2025-08-14 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2020-avi-740 | Multiples vulnérabilités dans Mitel MiCollab | 2020-11-12T00:00:00.000000 | 2020-11-12T00:00:00.000000 |
| certfr-2020-avi-739 | Multiples vulnérabilités dans les produits Microsoft | 2020-11-12T00:00:00.000000 | 2020-11-12T00:00:00.000000 |
| certfr-2020-avi-738 | Multiples vulnérabilités dans Microsoft Windows | 2020-11-12T00:00:00.000000 | 2020-11-12T00:00:00.000000 |
| certfr-2020-avi-737 | Multiples vulnérabilités dans Microsoft Office | 2020-11-12T00:00:00.000000 | 2020-11-12T00:00:00.000000 |
| certfr-2020-avi-736 | Multiples vulnérabilités dans Microsoft Edge | 2020-11-12T00:00:00.000000 | 2020-11-12T00:00:00.000000 |
| certfr-2020-avi-735 | Multiples vulnérabilités dans Microsoft IE | 2020-11-12T00:00:00.000000 | 2020-11-12T00:00:00.000000 |
| certfr-2020-avi-734 | Multiples vulnérabilités dans les produits Intel | 2020-11-12T00:00:00.000000 | 2020-11-12T00:00:00.000000 |
| certfr-2020-avi-733 | Multiples vulnérabilités dans Intel AMT, ISM et Wireless Bluetooth | 2020-11-12T00:00:00.000000 | 2020-11-12T00:00:00.000000 |
| certfr-2020-avi-732 | Multiples vulnérabilités dans Google Chrome | 2020-11-12T00:00:00.000000 | 2020-11-12T00:00:00.000000 |
| certfr-2020-avi-731 | Multiples vulnérabilités dans les produits Citrix | 2020-11-12T00:00:00.000000 | 2020-11-12T00:00:00.000000 |
| certfr-2020-avi-730 | Multiples vulnérabilités dans Palo Alto PAN-OS | 2020-11-12T00:00:00.000000 | 2020-11-12T00:00:00.000000 |
| certfr-2020-avi-729 | Vulnérabilité dans Cisco IOS XR | 2020-11-12T00:00:00.000000 | 2020-11-12T00:00:00.000000 |
| certfr-2020-avi-728 | Vulnérabilité dans Xen | 2020-11-12T00:00:00.000000 | 2020-11-12T00:00:00.000000 |
| certfr-2020-avi-727 | Vulnérabilité dans Apache OpenOffice | 2020-11-12T00:00:00.000000 | 2020-11-12T00:00:00.000000 |
| certfr-2020-avi-726 | Multiples vulnérabilités dans les produits Schneider Electric | 2020-11-12T00:00:00.000000 | 2020-11-12T00:00:00.000000 |
| certfr-2020-avi-725 | Multiples vulnérabilités dans les produits Siemens | 2020-11-10T00:00:00.000000 | 2020-11-10T00:00:00.000000 |
| certfr-2020-avi-724 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2020-11-10T00:00:00.000000 | 2020-11-10T00:00:00.000000 |
| certfr-2020-avi-723 | Vulnérabilité dans Google Chrome | 2020-11-10T00:00:00.000000 | 2020-11-10T00:00:00.000000 |
| certfr-2020-avi-722 | Multiples vulnérabilités dans les produits SAP | 2020-11-10T00:00:00.000000 | 2020-11-10T00:00:00.000000 |
| certfr-2020-avi-721 | Vulnérabilité dans Mozilla Firefox et Thundebird | 2020-11-10T00:00:00.000000 | 2020-11-10T00:00:00.000000 |
| certfr-2020-avi-719 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2020-11-09T00:00:00.000000 | 2020-11-10T00:00:00.000000 |
| certfr-2020-avi-720 | Multiples vulnérabilités dans Asterisk | 2020-11-09T00:00:00.000000 | 2020-11-09T00:00:00.000000 |
| certfr-2020-avi-705 | Multiples vulnérabilités dans les produits Moxa | 2020-11-03T00:00:00.000000 | 2020-11-09T00:00:00.000000 |
| certfr-2020-avi-718 | Vulnérabilité dans Symantec CA Network Flow Analysis | 2020-11-06T00:00:00.000000 | 2020-11-06T00:00:00.000000 |
| certfr-2020-avi-716 | Vulnérabilité dans Tenable Nessus Network Monitor | 2020-11-06T00:00:00.000000 | 2020-11-06T00:00:00.000000 |
| certfr-2020-avi-715 | Multiples vulnérabilités dans le noyaux linux de SUSE | 2020-11-06T00:00:00.000000 | 2020-11-06T00:00:00.000000 |
| certfr-2020-avi-713 | Multiples vulnérabilités dans les produits Cisco | 2020-11-05T00:00:00.000000 | 2020-11-06T00:00:00.000000 |
| certfr-2020-avi-714 | Multiples vulnérabilités dans Microsoft Edge | 2020-11-05T00:00:00.000000 | 2020-11-05T00:00:00.000000 |
| certfr-2020-avi-711 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2020-11-04T00:00:00.000000 | 2020-11-04T00:00:00.000000 |
| certfr-2020-avi-710 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2020-11-04T00:00:00.000000 | 2020-11-04T00:00:00.000000 |