Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-1544 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
D-Link DIR-823X set_mode sub_41E2A0 os command injection |
D-Link |
DIR-823X |
2026-01-28T21:32:09.912Z | 2026-02-23T09:01:40.400Z |
| CVE-2026-1535 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Online Music Site AdminReply.php sql injection |
code-projects |
Online Music Site |
2026-01-28T21:02:09.430Z | 2026-02-23T09:01:24.768Z |
| CVE-2026-1534 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Online Music Site AdminEditUser.php sql … |
code-projects |
Online Music Site |
2026-01-28T21:02:07.552Z | 2026-02-23T09:01:11.732Z |
| CVE-2026-1533 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
code-projects Online Music Site AdminAddCategory.php s… |
code-projects |
Online Music Site |
2026-01-28T20:32:10.974Z | 2026-02-23T09:00:58.745Z |
| CVE-2026-1532 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
D-Link DCS-700L Music File Upload Service setUploadMus… |
D-Link |
DCS-700L |
2026-01-28T20:32:09.118Z | 2026-02-23T09:00:44.948Z |
| CVE-2026-1522 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Open5GS SGWC s5c-handler.c sgwc_s5c_handle_modify_bear… |
n/a |
Open5GS |
2026-01-28T16:32:07.267Z | 2026-02-23T09:00:29.743Z |
| CVE-2026-1521 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Open5GS SGWC s5c-handler.c denial of service |
n/a |
Open5GS |
2026-01-28T14:32:10.348Z | 2026-02-23T09:00:17.635Z |
| CVE-2023-6910 |
6.5 (3.1)
|
Uncontrolled Resource Consumption in M-Files Server |
M-Files Corporation |
M-Files Server |
2023-12-20T09:36:39.118Z | 2026-02-23T09:00:05.026Z |
| CVE-2026-1520 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
rethinkdb Secondary Index cross site scripting |
n/a |
rethinkdb |
2026-01-28T14:32:06.745Z | 2026-02-23T09:00:04.097Z |
| CVE-2026-1506 |
8.6 (4.0)
7.2 (3.1)
7.2 (3.0)
|
D-Link DIR-615 MAC Filter Configuration adv_mac_filter… |
D-Link |
DIR-615 |
2026-01-28T02:32:09.027Z | 2026-02-23T08:59:48.767Z |
| CVE-2026-1505 |
8.6 (4.0)
7.2 (3.1)
7.2 (3.0)
|
D-Link DIR-615 URL Filter set_temp_nodes.php os comman… |
D-Link |
DIR-615 |
2026-01-28T01:32:08.889Z | 2026-02-23T08:59:34.094Z |
| CVE-2026-1449 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Hisense TransTech Smart Bus Management System TireMng.… |
Hisense TransTech |
Smart Bus Management System |
2026-01-26T23:32:10.536Z | 2026-02-23T08:59:17.016Z |
| CVE-2026-1448 |
8.6 (4.0)
7.2 (3.1)
7.2 (3.0)
|
D-Link DIR-615 Web Management wiz_policy_3_machine.php… |
D-Link |
DIR-615 |
2026-01-26T23:32:08.743Z | 2026-02-23T08:59:03.345Z |
| CVE-2026-1445 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
iJason-Liu Books_Manager upload_bookCover.php unrestri… |
iJason-Liu |
Books_Manager |
2026-01-26T22:02:05.762Z | 2026-02-23T08:58:47.511Z |
| CVE-2023-6239 |
5.4 (3.1)
|
Incorrect calculation of effective permissions |
M-Files |
M-Files Server |
2023-11-28T14:07:20.877Z | 2026-02-23T08:58:36.807Z |
| CVE-2026-1444 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
iJason-Liu Books_Manager add_book_check.php cross site… |
iJason-Liu |
Books_Manager |
2026-01-26T21:32:05.930Z | 2026-02-23T08:58:35.112Z |
| CVE-2026-1443 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Online Music Site AdminDeleteUser.php sq… |
code-projects |
Online Music Site |
2026-01-26T20:02:06.014Z | 2026-02-23T08:58:20.373Z |
| CVE-2026-1425 |
6.3 (4.0)
5.6 (3.1)
5.6 (3.0)
|
pymumu SmartDNS SVBC Record dns.c _dns_decode_SVCB_HTT… |
pymumu |
SmartDNS |
2026-01-26T07:32:06.516Z | 2026-02-23T08:58:07.493Z |
| CVE-2026-1424 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
PHPGurukul News Portal Profile Pic unrestricted upload |
PHPGurukul |
News Portal |
2026-01-26T07:02:07.123Z | 2026-02-23T08:57:53.045Z |
| CVE-2026-1423 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
code-projects Online Examination System admin_pic.php … |
code-projects |
Online Examination System |
2026-01-26T06:32:07.017Z | 2026-02-23T08:57:38.085Z |
| CVE-2026-1422 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Online Examination System Login Page ind… |
code-projects |
Online Examination System |
2026-01-26T06:02:06.635Z | 2026-02-23T08:57:24.562Z |
| CVE-2026-1421 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
code-projects Online Examination System Add Pages cros… |
code-projects |
Online Examination System |
2026-01-26T05:32:06.400Z | 2026-02-23T08:57:11.045Z |
| CVE-2026-1420 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda AC23 WifiExtraSet buffer overflow |
Tenda |
AC23 |
2026-01-26T05:02:07.727Z | 2026-02-23T08:56:57.929Z |
| CVE-2026-1419 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
D-Link DCS700l Web Form setDayNightMode command injection |
D-Link |
DCS700l |
2026-01-26T04:32:08.759Z | 2026-02-23T08:56:42.817Z |
| CVE-2023-6189 |
4.3 (3.1)
|
Improper Permission Handling in M-Files Server |
M-Files |
M-Files Server |
2023-11-22T09:56:44.563Z | 2026-02-23T08:56:33.921Z |
| CVE-2026-1418 |
4.8 (4.0)
5.3 (3.1)
5.3 (3.0)
|
GPAC SRT Subtitle Import text_to_bifs.c gf_text_import… |
n/a |
GPAC |
2026-01-26T04:02:06.877Z | 2026-02-23T08:56:25.925Z |
| CVE-2026-1417 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
GPAC filedump.c dump_isom_rtp null pointer dereference |
n/a |
GPAC |
2026-01-26T03:32:07.165Z | 2026-02-23T08:56:11.664Z |
| CVE-2026-1416 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
GPAC filedump.c DumpMovieInfo null pointer dereference |
n/a |
GPAC |
2026-01-26T03:02:07.336Z | 2026-02-23T08:55:57.311Z |
| CVE-2026-1415 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
GPAC media_export.c gf_media_export_webvtt_metadata nu… |
n/a |
GPAC |
2026-01-26T02:32:08.374Z | 2026-02-23T08:55:44.829Z |
| CVE-2023-6117 |
5.7 (3.1)
|
M-Files REST API allows Denial of Service |
M-Files |
M-Files Server |
2023-11-22T09:56:32.749Z | 2026-02-23T08:55:34.657Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-35999 |
6.7 (3.1)
|
Incorrect permission assignment for critical reso… |
n/a |
System Firmware Update Utility (SysFwUpdt) for Intel(R) Server Boards and Intel(R) Server Systems Based |
2026-02-10T16:26:02.912Z | 2026-02-26T15:04:08.161Z |
| CVE-2025-35998 |
7.9 (3.1)
|
Missing protection mechanism for alternate hardwa… |
n/a |
Intel(R) Platforms |
2026-02-10T16:26:00.829Z | 2026-02-26T15:04:08.464Z |
| CVE-2025-35992 |
4.7 (3.1)
|
Improper conditions check in some firmware for so… |
n/a |
Intel(R) NPU Drivers |
2026-02-10T16:25:58.837Z | 2026-02-10T17:31:21.016Z |
| CVE-2025-33030 |
3.3 (3.1)
|
Improper conditions check in some firmware for so… |
n/a |
Intel(R) NPU Drivers |
2026-02-10T16:25:57.278Z | 2026-02-26T15:04:08.747Z |
| CVE-2025-32739 |
2.8 (3.1)
|
Improper conditions check in some firmware for so… |
n/a |
Intel(R) Graphics Drivers and Intel LTS kernels |
2026-02-10T16:25:55.444Z | 2026-02-10T17:31:52.116Z |
| CVE-2025-32735 |
5.5 (3.1)
|
Improper conditions check in some firmware for so… |
n/a |
Intel(R) NPU Drivers |
2026-02-10T16:25:53.478Z | 2026-02-10T17:32:07.026Z |
| CVE-2025-32467 |
4.1 (3.1)
|
Use of uninitialized variable for some TDX Module… |
n/a |
TDX Module |
2026-02-10T16:25:51.854Z | 2026-02-10T17:32:20.724Z |
| CVE-2025-32453 |
6.7 (3.1)
|
Incorrect default permissions for some Intel(R) G… |
n/a |
Intel(R) Graphics Driver software |
2026-02-10T16:25:50.100Z | 2026-02-26T15:04:09.059Z |
| CVE-2025-32452 |
6.7 (3.1)
|
Uncontrolled search path for some AI Playground b… |
n/a |
AI Playground |
2026-02-10T16:25:48.428Z | 2026-02-10T18:50:32.720Z |
| CVE-2025-32092 |
6.7 (3.1)
|
Insecure inherited permissions for some Intel(R) … |
n/a |
Intel(R) Graphics Software |
2026-02-10T16:25:46.732Z | 2026-02-26T15:04:09.346Z |
| CVE-2025-32008 |
8.6 (3.1)
|
Out-of-bounds write in the firmware for the Intel… |
n/a |
Intel(R) AMT and Intel(R) Standard Manageability |
2026-02-10T16:25:44.946Z | 2026-02-10T18:46:48.862Z |
| CVE-2025-32007 |
4.4 (3.1)
|
Out-of-bounds read for some TDX before version td… |
n/a |
TDX |
2026-02-10T16:25:43.166Z | 2026-02-10T18:39:01.377Z |
| CVE-2025-32003 |
6.5 (3.1)
|
Out-of-bounds read in the firmware for some 100Gb… |
n/a |
100GbE Intel(R) Ethernet Network Adapter E810 |
2026-02-10T16:25:41.432Z | 2026-02-10T18:37:59.640Z |
| CVE-2025-31944 |
5.3 (3.1)
|
Race condition for some TDX Module before version… |
n/a |
TDX Module |
2026-02-10T16:25:39.802Z | 2026-02-10T18:33:57.653Z |
| CVE-2025-31655 |
6.7 (3.1)
|
Incorrect default permissions for some Intel(R) B… |
n/a |
Intel(R) Battery Life Diagnostic Tool |
2026-02-10T16:25:37.949Z | 2026-02-10T17:33:31.501Z |
| CVE-2025-31648 |
3.9 (3.1)
|
Improper handling of values in the microcode flow… |
n/a |
Intel(R) Processor Family may allow an escalation of privilege. Startup code and smm adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present with special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (low), integrity (low) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (low), integrity (low) and availability (none) impacts. |
2026-02-10T16:25:36.350Z | 2026-02-26T15:04:09.683Z |
| CVE-2025-30513 |
7.9 (3.1)
|
Race condition for some TDX Module within Ring 0:… |
n/a |
TDX Module |
2026-02-10T16:25:34.696Z | 2026-02-26T15:04:09.951Z |
| CVE-2025-30508 |
6.5 (3.1)
|
Improper authorization in the Intel(R) Quick Assi… |
n/a |
Intel(R) Platforms |
2026-02-10T16:25:33.137Z | 2026-02-10T17:34:22.439Z |
| CVE-2025-29952 |
5.9 (4.0)
|
Improper Initialization within the AMD Secure Enc… |
AMD |
AMD EPYC™ 9005 Series Processors |
2026-02-10T19:09:37.854Z | 2026-02-10T21:06:53.932Z |
| CVE-2025-29951 |
7.3 (4.0)
|
A buffer overflow in the AMD Secure Processor (AS… |
AMD |
AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics |
2026-02-10T19:50:51.594Z | 2026-02-26T14:44:28.386Z |
| CVE-2025-29950 |
7.1 (4.0)
|
Improper input validation in system management mo… |
AMD |
AMD EPYC™ 9004 Series Processors |
2026-02-10T19:10:28.112Z | 2026-02-26T14:44:29.765Z |
| CVE-2025-29949 |
4.8 (4.0)
|
Insufficient input parameter sanitization in AMD … |
AMD |
AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics |
2026-02-10T19:46:42.763Z | 2026-02-10T20:40:37.898Z |
| CVE-2025-29948 |
5.9 (4.0)
|
Improper access control in AMD Secure Encrypted V… |
AMD |
AMD EPYC™ 9005 Series Processors |
2026-02-10T19:07:53.130Z | 2026-02-11T15:08:46.377Z |
| CVE-2025-29946 |
4.5 (4.0)
|
Insufficient or Incomplete Data Removal in Hardwa… |
AMD |
AMD EPYC™ 9005 Series Processors |
2026-02-10T19:15:57.179Z | 2026-02-10T21:42:14.335Z |
| CVE-2025-29939 |
6.9 (4.0)
|
Improper access control in secure encrypted virtu… |
AMD |
AMD EPYC™ 9004 Series Processors |
2026-02-10T19:11:59.059Z | 2026-02-10T20:59:47.124Z |
| CVE-2025-27940 |
4.1 (3.1)
|
Out-of-bounds read for some TDX Module before ver… |
n/a |
TDX Module |
2026-02-10T16:25:31.294Z | 2026-02-10T17:34:39.346Z |
| CVE-2025-27708 |
4.1 (3.1)
|
Out-of-bounds read in the firmware for some Intel… |
n/a |
Intel(R) Converged Security and Management Engine (CSME) Firmware (FW) |
2026-02-10T16:25:29.434Z | 2026-02-10T17:32:52.392Z |
| CVE-2025-27572 |
4.1 (3.1)
|
Exposure of sensitive information during transien… |
n/a |
TDX |
2026-02-10T16:25:27.673Z | 2026-02-10T17:33:10.536Z |
| CVE-2025-27560 |
6 (3.1)
|
Loop with unreachable exit condition ('infinite l… |
n/a |
Intel(R) Platform |
2026-02-10T16:25:26.032Z | 2026-02-10T17:34:55.538Z |
| CVE-2025-27535 |
5.3 (3.1)
|
Exposed ioctl with insufficient access control in… |
n/a |
Intel(R) Ethernet Connection E825-C. |
2026-02-10T16:25:24.509Z | 2026-02-10T17:35:13.129Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-35999 | Incorrect permission assignment for critical resource for some System Firmware Update Utility (SysF… | 2026-02-10T17:16:18.057 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-35998 | Missing protection mechanism for alternate hardware interface in the Intel(R) Quick Assist Technolo… | 2026-02-10T17:16:17.880 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-35992 | Improper conditions check in some firmware for some Intel(R) NPU Drivers within Ring 1: Device Driv… | 2026-02-10T17:16:17.703 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-33030 | Improper conditions check in some firmware for some Intel(R) NPU Drivers within Ring 3: User Applic… | 2026-02-10T17:16:17.537 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-32739 | Improper conditions check in some firmware for some Intel(R) Graphics Drivers and Intel LTS kernels… | 2026-02-10T17:16:17.360 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-32735 | Improper conditions check in some firmware for some Intel(R) NPU Drivers within Ring 1: Device Driv… | 2026-02-10T17:16:17.200 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-32467 | Use of uninitialized variable for some TDX Module before version tdx1.5 within Ring 0: Hypervisor m… | 2026-02-10T17:16:17.040 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-32453 | Incorrect default permissions for some Intel(R) Graphics Driver software within Ring 2: Privileged … | 2026-02-10T17:16:16.877 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-32452 | Uncontrolled search path for some AI Playground before version 2.6.1 beta within Ring 3: User Appli… | 2026-02-10T17:16:16.717 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-32092 | Insecure inherited permissions for some Intel(R) Graphics Software before version 25.30.1702.0 with… | 2026-02-10T17:16:16.553 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-32008 | Out-of-bounds write in the firmware for the Intel(R) AMT and Intel(R) Standard Manageability within… | 2026-02-10T17:16:16.393 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-32007 | Out-of-bounds read for some TDX before version tdx module 1.5.24 within Ring 0: Hypervisor may allo… | 2026-02-10T17:16:16.233 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-32003 | Out-of-bounds read in the firmware for some 100GbE Intel(R) Ethernet Network Adapter E810 before ve… | 2026-02-10T17:16:16.073 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-31944 | Race condition for some TDX Module before version tdx1.5 within Ring 0: Hypervisor may allow a deni… | 2026-02-10T17:16:15.890 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-31655 | Incorrect default permissions for some Intel(R) Battery Life Diagnostic Tool within Ring 3: User Ap… | 2026-02-10T17:16:15.723 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-31648 | Improper handling of values in the microcode flow for some Intel(R) Processor Family may allow an e… | 2026-02-10T17:16:15.550 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-30513 | Race condition for some TDX Module within Ring 0: Hypervisor may allow an escalation of privilege. … | 2026-02-10T17:16:15.390 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-30508 | Improper authorization in the Intel(R) Quick Assist Technology for some Intel(R) Platforms within R… | 2026-02-10T17:16:15.233 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-29952 | Improper Initialization within the AMD Secure Encrypted Virtualization (SEV) firmware can allow an … | 2026-02-10T20:16:44.767 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-29951 | A buffer overflow in the AMD Secure Processor (ASP) bootloader could allow an attacker to overwrite… | 2026-02-10T20:16:44.630 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-29950 | Improper input validation in system management mode (SMM) could allow a privileged attacker to over… | 2026-02-10T20:16:44.493 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-29949 | Insufficient input parameter sanitization in AMD Secure Processor (ASP) Boot Loader (legacy recover… | 2026-02-10T20:16:44.337 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-29948 | Improper access control in AMD Secure Encrypted Virtualization (SEV) firmware could allow a malicio… | 2026-02-10T20:16:44.197 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-29946 | Insufficient or Incomplete Data Removal in Hardware Component in SEV firmware doesn't fully flush I… | 2026-02-10T20:16:44.057 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-29939 | Improper access control in secure encrypted virtualization (SEV) could allow a privileged attacker … | 2026-02-10T20:16:43.910 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-27940 | Out-of-bounds read for some TDX Module before version tdx1.5 within Ring 0: Hypervisor may allow an… | 2026-02-10T17:16:15.063 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-27708 | Out-of-bounds read in the firmware for some Intel(R) Converged Security and Management Engine (CSME… | 2026-02-10T17:16:14.900 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-27572 | Exposure of sensitive information during transient execution for some TDX within Ring 0: Hypervisor… | 2026-02-10T17:16:14.763 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-27560 | Loop with unreachable exit condition ('infinite loop') for some Intel(R) Platform within Ring 0: Ke… | 2026-02-10T17:16:14.600 | 2026-02-10T21:51:48.077 |
| fkie_cve-2025-27535 | Exposed ioctl with insufficient access control in the firmware for some Intel(R) Ethernet Connectio… | 2026-02-10T17:16:14.427 | 2026-02-10T21:51:48.077 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-pfjm-7gj6-rrrx |
7.0 (4.0)
|
CWE-276: Incorrect Default Permissions vulnerability exists that could cause privilege escalation … | 2026-01-29T18:31:46Z | 2026-01-29T18:31:46Z |
| ghsa-q9c9-gpm6-qqq6 |
8.1 (3.1)
|
The Custom Login Page Customizer WordPress plugin before 2.5.4 does not have a proper password rese… | 2026-01-29T06:30:17Z | 2026-01-29T18:31:43Z |
| ghsa-xvqr-69v8-f3gv |
7.8 (3.1)
|
Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file wi… | 2026-01-28T21:31:24Z | 2026-01-29T18:31:42Z |
| ghsa-r8pw-f6w2-wjph |
7.5 (3.1)
|
An issue in the flow.cuda.BoolTensor component of OneFlow v0.9.0 allows attackers to cause a Denial… | 2026-01-28T18:30:49Z | 2026-01-29T18:31:42Z |
| ghsa-pp3q-3fph-xpqh |
6.5 (3.1)
|
A division-by-zero vulnerability in the flow.floor_divide() component of OneFlow v0.9.0 allows atta… | 2026-01-28T18:30:47Z | 2026-01-29T18:31:42Z |
| ghsa-p4fc-fvwp-2m9p |
7.5 (3.1)
|
A dimension validation flaw in the flow.empty() component of OneFlow 0.9.0 allows attackers to caus… | 2026-01-28T18:30:47Z | 2026-01-29T18:31:42Z |
| ghsa-mwgm-j9q4-3cm5 |
5.4 (3.1)
|
Privilege Defined With Unsafe Actions vulnerability in Drupal Mini site allows Stored XSS.This issu… | 2026-01-28T21:31:23Z | 2026-01-29T18:31:42Z |
| ghsa-m9p8-wvpp-vmmm |
7.5 (3.1)
|
A GPU device-ID validation flaw in the flow.cuda.get_device_capability() component of OneFlow v0.9.… | 2026-01-28T18:30:49Z | 2026-01-29T18:31:42Z |
| ghsa-m5gw-75m6-rgcf |
7.5 (3.1)
|
A GPU device-ID validation flaw in OneFlow v0.9.0 allows attackers to trigger a Denial of Dervice (… | 2026-01-28T18:30:49Z | 2026-01-29T18:31:42Z |
| ghsa-hf64-2g6g-cxvv |
9.8 (3.1)
|
An issue in Amidaware Inc Tactical RMM v1.3.1 and before allows a remote attacker to execute arbitr… | 2026-01-28T18:30:47Z | 2026-01-29T18:31:42Z |
| ghsa-gxh3-vmjw-7f4q |
7.5 (3.1)
|
A type validation flaw in the flow.dstack() component of OneFlow v0.9.0 allows attackers to cause a… | 2026-01-28T18:30:47Z | 2026-01-29T18:31:42Z |
| ghsa-gm99-g636-34fh |
7.5 (3.1)
|
A device-ID validation flaw in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) b… | 2026-01-28T18:30:47Z | 2026-01-29T18:31:42Z |
| ghsa-fq99-2537-xjq6 |
7.5 (3.1)
|
A shape mismatch vulnerability in OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS… | 2026-01-28T18:30:47Z | 2026-01-29T18:31:42Z |
| ghsa-cv55-w56v-m87q |
5.5 (3.1)
|
The issue was addressed with improved bounds checks. This issue is fixed in macOS Tahoe 26, Keynote… | 2026-01-28T18:30:49Z | 2026-01-29T18:31:42Z |
| ghsa-cm6p-qc7v-m3jw |
7.0 (3.1)
|
Downloading and building modules with malicious version strings can cause local code execution. On … | 2026-01-28T21:31:24Z | 2026-01-29T18:31:42Z |
| ghsa-878f-h9gj-457w |
6.5 (3.1)
|
A segmentation violation in the flow.column_stack component of OneFlow v0.9.0 allows attackers to c… | 2026-01-28T21:31:23Z | 2026-01-29T18:31:42Z |
| ghsa-8479-rrmq-2rhw |
5.3 (3.1)
|
Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal CKEditor 5 Premium… | 2026-01-28T21:31:23Z | 2026-01-29T18:31:42Z |
| ghsa-x77r-97gw-wh89 |
7.4 (3.1)
|
Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file wit… | 2026-01-27T18:32:16Z | 2026-01-29T18:31:37Z |
| ghsa-g78j-46j5-97cr |
4.7 (3.1)
|
Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter wh… | 2026-01-27T18:32:15Z | 2026-01-29T18:31:37Z |
| ghsa-78qr-24v5-7q73 |
4.0 (3.1)
|
Issue summary: When using the low-level OCB API directly with AES-NI or<br>other hardware-accelerat… | 2026-01-27T18:32:15Z | 2026-01-29T18:31:37Z |
| ghsa-5888-36j9-c92p |
5.9 (3.1)
|
Issue summary: A TLS 1.3 connection using certificate compression can be forced to allocate a large… | 2026-01-27T18:32:15Z | 2026-01-29T18:31:37Z |
| ghsa-gfwv-5762-mwrm |
9.4 (4.0)
|
An Authorization Bypass Through User-Controlled Key vulnerability in Hubitat Elevation home automat… | 2026-01-23T00:31:16Z | 2026-01-29T18:31:32Z |
| ghsa-pjcq-qf93-gjgv |
7.5 (3.1)
5.7 (4.0)
|
Improper authentication vulnerability in TP-Link WA850RE (httpd modules) allows unauthenticated att… | 2025-12-18T18:30:31Z | 2026-01-29T18:31:31Z |
| ghsa-f5cx-j2cw-pgfg |
9.8 (3.1)
|
Default credentials in Dify thru 1.5.1. PostgreSQL username and password specified in the docker-co… | 2025-12-18T21:31:42Z | 2026-01-29T18:31:31Z |
| ghsa-4qpp-gxm3-h9vw |
8.2 (3.1)
|
A flaw in libsoup’s HTTP header handling allows multiple Host: headers in a request and returns the… | 2025-12-11T15:30:32Z | 2026-01-29T18:31:31Z |
| ghsa-4973-8mgr-386v |
8.8 (3.1)
8.7 (4.0)
|
Gargoyle router management utility versions 1.5.x contain an authenticated OS command execution vul… | 2025-12-31T21:30:59Z | 2026-01-29T18:31:31Z |
| ghsa-m5cv-rq77-5q44 |
7.8 (3.1)
7.0 (4.0)
|
DLL search path hijacking vulnerability in the UPDF.exe executable for Windows version 1.8.5.0 allo… | 2025-09-10T12:30:20Z | 2026-01-29T18:31:30Z |
| ghsa-fh7c-x2jh-rc4w |
8.1 (3.1)
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-05-23T15:31:10Z | 2026-01-29T18:31:29Z |
| ghsa-9rg3-9pvr-6p27 |
5.3 (3.1)
|
MONAI has Path Traversal (Zip Slip) in NGC Private Bundle Download | 2026-01-06T17:32:52Z | 2026-01-29T18:23:14Z |
| ghsa-vg9h-jx4v-cwx2 |
9.3 (4.0)
|
Unfurl's debug mode cannot be disabled due to string config parsing (Werkzeug debugger exposure) | 2026-01-29T15:32:33Z | 2026-01-29T15:32:33Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2018-25099 | In the CryptX module before 0.062 for Perl, gcm_decrypt_verify() and chacha20poly1305_dec… | 2024-04-02T05:03:40.087778Z |
| gsd-2024-24987 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:58.152392Z |
| gsd-2024-24975 | Uncontrolled Resource Consumption in Mattermost Mobile versions before 2.13.0 fails to li… | 2024-04-02T05:02:58.080364Z |
| gsd-2024-24967 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:58.079768Z |
| gsd-2024-24581 | in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution … | 2024-04-02T05:02:57.926140Z |
| gsd-2024-24979 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.898638Z |
| gsd-2024-24977 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.867817Z |
| gsd-2024-24974 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.852936Z |
| gsd-2024-24973 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.823151Z |
| gsd-2024-29235 | Improper neutralization of special elements used in an SQL command ('SQL Injection') vuln… | 2024-04-02T05:02:57.674722Z |
| gsd-2024-29161 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.674222Z |
| gsd-2024-29027 | Parse Server is an open source backend that can be deployed to any infrastructure that ca… | 2024-04-02T05:02:57.673730Z |
| gsd-2024-29415 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.673402Z |
| gsd-2024-29198 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.673202Z |
| gsd-2024-29792 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-02T05:02:57.672797Z |
| gsd-2024-29665 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.672361Z |
| gsd-2024-29818 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-02T05:02:57.671949Z |
| gsd-2024-29171 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.671478Z |
| gsd-2024-29335 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.671286Z |
| gsd-2024-29661 | A File Upload vulnerability in DedeCMS v5.7 allows a local attacker to execute arbitrary … | 2024-04-02T05:02:57.671083Z |
| gsd-2024-29610 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.670877Z |
| gsd-2024-29536 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.670615Z |
| gsd-2024-29464 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.670388Z |
| gsd-2024-29288 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.670141Z |
| gsd-2024-29216 | Exposed IOCTL with insufficient access control issue exists in cg6kwin2k.sys prior to 2.1… | 2024-04-02T05:02:57.669816Z |
| gsd-2024-29213 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.669524Z |
| gsd-2024-29356 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.669309Z |
| gsd-2024-29664 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.669102Z |
| gsd-2024-29269 | An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arb… | 2024-04-02T05:02:57.668837Z |
| gsd-2024-29820 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-02T05:02:57.668411Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-190088 | Malicious code in upgrade-quantum-computing-eslint-plugin-areology (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190087 | Malicious code in upgrade-ophiuchus-nightwatch-lyra (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190086 | Malicious code in upgrade-mysql-biomimicry-async (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190085 | Malicious code in upgrade-mesosphere-slides-sirius (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190084 | Malicious code in upgrade-hexo-gulp-cosmogenic (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190083 | Malicious code in upgrade-dysonswarm-node-config-got (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190082 | Malicious code in upgrade-async-forever-nextjs (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190081 | Malicious code in update-tethys-query-mensa (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190080 | Malicious code in update-proxima-xenobiology-sqlite (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190079 | Malicious code in update-proxima-isostasy-archaeometry (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190078 | Malicious code in update-meteor-jupiter-kaus (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190077 | Malicious code in update-leda-ora-bootes (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190076 | Malicious code in update-hadron-rehype-phoenix (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190075 | Malicious code in update-dorado-farout-draco (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190074 | Malicious code in update-barnard-rigel-readable (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190073 | Malicious code in update-astroinformatics-technosignature-bellatrix (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190072 | Malicious code in unuk-uglify-js-astrochemistry-comet (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190071 | Malicious code in unuk-tethys-blueshift-cosmicsilence (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190070 | Malicious code in unuk-nightmare-antares-galaxy (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190069 | Malicious code in unuk-mui-antares-neuromorphic (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190068 | Malicious code in unuk-loop-mdx-mysql (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190067 | Malicious code in unuk-hapi-cross-env-nashira (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190066 | Malicious code in unuk-gatsby-dysonswarm-izar (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190065 | Malicious code in unuk-eris-paleontology-spectron (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190064 | Malicious code in unuk-deneb-pegasus-primatology (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190063 | Malicious code in unuk-cygnus-lyra-buffer (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190062 | Malicious code in unuk-cryonics-gravitationalwave-meteor (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190061 | Malicious code in unuk-chalk-proxima-test (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190060 | Malicious code in unix-zeta-star-execute-uglify (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-190059 | Malicious code in unix-web-export-key-data (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-2027 | QEMU: Schwachstelle ermöglicht Denial of Service | 2017-02-22T23:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-2026 | QEMU: Mehrere Schwachstellen | 2017-04-19T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-2025 | QEMU: Mehrere Schwachstellen ermöglichen Denial of Service | 2017-04-25T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-2024 | QEMU: Mehrere Schwachstellen ermöglichen Denial of Service | 2017-05-03T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-2023 | QEMU: Schwachstelle ermöglicht Privilegieneskalation | 2017-05-17T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-2022 | QEMU: Schwachstelle ermöglicht Denial of Service | 2017-06-11T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-2021 | QEMU: Schwachstelle ermöglicht Denial of Service | 2017-07-09T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-2020 | QEMU: Schwachstelle ermöglicht Denial of Service | 2017-07-16T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-2019 | QEMU: Schwachstelle ermöglicht Denial of Service | 2017-07-17T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-2018 | QEMU: Schwachstelle ermöglicht Denial of Service | 2017-08-21T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-2017 | QEMU: Schwachstelle ermöglicht Denial of Service | 2017-08-29T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-2016 | QEMU: Mehrere Schwachstellen ermöglichen Denial of Service | 2017-08-30T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-2015 | QEMU: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes | 2017-09-07T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-2014 | QEMU: Schwachstelle ermöglicht Offenlegung von Informationen | 2017-10-08T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-2013 | QEMU: Schwachstelle ermöglicht Denial of Service | 2017-10-11T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-2012 | QEMU: Schwachstelle ermöglicht Denial of Service | 2017-10-12T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-2011 | QEMU: Schwachstelle ermöglicht Offenlegung von Informationen | 2017-11-16T23:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-2010 | QEMU: Schwachstelle ermöglicht Denial of Service | 2017-12-05T23:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-2009 | QEMU: Mehrere Schwachstellen ermöglichen Denial of Service | 2018-01-15T23:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-2008 | Oracle Virtualization: Mehrere Schwachstellen | 2018-01-16T23:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-2007 | QEMU: Schwachstelle ermöglicht Denial of Service | 2018-01-21T23:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-2006 | QEMU: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode | 2018-03-08T23:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-2005 | QEMU: Schwachstelle ermöglicht Denial of Service | 2018-03-11T23:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-2004 | QEMU: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes | 2018-06-06T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-2003 | QEMU: Schwachstelle ermöglicht Denial of Service | 2018-08-28T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-2002 | QEMU: Schwachstelle ermöglicht Denial of Service | 2018-10-03T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-2001 | QEMU: Mehrere Schwachstellen ermöglichen Denial of Service | 2018-10-07T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-2000 | QEMU: Schwachstelle ermöglicht Denial of Service | 2018-10-31T23:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-1999 | Red Hat Enterprise Linux/QEMU: Schwachstelle ermöglicht Denial of Service | 2018-10-31T23:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-1998 | QEMU: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes | 2018-11-01T23:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2021:3527 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.9 security update on RHEL 6 | 2021-09-14T12:37:02+00:00 | 2026-01-27T09:13:12+00:00 |
| rhsa-2021:3125 | Red Hat Security Advisory: Red Hat build of Eclipse Vert.x 4.1.2 security update | 2021-08-18T16:56:28+00:00 | 2026-01-27T09:13:12+00:00 |
| rhsa-2021:2755 | Red Hat Security Advisory: EAP XP 2 security update to CVE fixes in the EAP 7.3.x base | 2021-07-15T15:25:35+00:00 | 2026-01-27T09:13:09+00:00 |
| rhsa-2022:5903 | Red Hat Security Advisory: Red Hat Process Automation Manager 7.13.0 security update | 2022-08-04T04:46:25+00:00 | 2026-01-27T09:13:07+00:00 |
| rhsa-2022:0146 | Red Hat Security Advisory: EAP XP 2 security update to CVE fixes in the EAP 7.3.x base | 2022-01-17T12:02:48+00:00 | 2026-01-27T09:13:05+00:00 |
| rhsa-2021:5170 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.10 security update | 2021-12-15T19:08:11+00:00 | 2026-01-27T09:13:04+00:00 |
| rhsa-2021:5154 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.10 security update | 2021-12-15T14:42:27+00:00 | 2026-01-27T09:13:03+00:00 |
| rhsa-2021:5151 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.10 security update on RHEL 8 | 2021-12-15T14:42:38+00:00 | 2026-01-27T09:13:02+00:00 |
| rhsa-2021:5150 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.10 security update on RHEL 7 | 2021-12-15T14:38:03+00:00 | 2026-01-27T09:13:01+00:00 |
| rhsa-2021:5149 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.10 security update on RHEL 6 | 2021-12-15T14:52:07+00:00 | 2026-01-27T09:12:59+00:00 |
| rhsa-2021:4679 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.2 security update | 2021-11-15T17:05:54+00:00 | 2026-01-27T09:12:56+00:00 |
| rhsa-2021:4677 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.2 security update on RHEL 8 | 2021-11-15T17:18:08+00:00 | 2026-01-27T09:12:55+00:00 |
| rhsa-2021:2465 | Red Hat Security Advisory: Red Hat build of Eclipse Vert.x 4.1.0 security update | 2021-07-07T06:29:29+00:00 | 2026-01-27T09:12:55+00:00 |
| rhsa-2021:4676 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.2 security update on RHEL 7 | 2021-11-15T17:14:55+00:00 | 2026-01-27T09:12:54+00:00 |
| rhsa-2021:3851 | Red Hat Security Advisory: Red Hat 3scale API Management 2.11.0 Release - Container Images | 2021-10-14T07:53:46+00:00 | 2026-01-27T09:12:53+00:00 |
| rhsa-2021:3471 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.9 security update | 2021-09-08T13:05:47+00:00 | 2026-01-27T09:12:51+00:00 |
| rhsa-2021:2965 | Red Hat Security Advisory: Red Hat Single Sign-On 7.4.8 security update | 2021-07-29T19:19:10+00:00 | 2026-01-27T09:12:51+00:00 |
| rhsa-2021:3468 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.9 security update on RHEL 8 | 2021-09-08T14:43:24+00:00 | 2026-01-27T09:12:50+00:00 |
| rhsa-2021:3467 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.9 security update on RHEL 7 | 2021-09-08T13:36:01+00:00 | 2026-01-27T09:12:50+00:00 |
| rhsa-2021:3466 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.9 security update on RHEL 6 | 2021-09-08T13:32:11+00:00 | 2026-01-27T09:12:49+00:00 |
| rhsa-2021:2694 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.8 on RHEL 8 security update | 2021-07-13T13:11:33+00:00 | 2026-01-27T09:12:48+00:00 |
| rhsa-2021:2693 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.8 on RHEL 7 security update | 2021-07-13T13:02:32+00:00 | 2026-01-27T09:12:48+00:00 |
| rhsa-2021:2696 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.8 security update | 2021-07-13T12:59:15+00:00 | 2026-01-27T09:12:46+00:00 |
| rhsa-2021:2692 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.8 on RHEL 6 security update | 2021-07-13T13:10:19+00:00 | 2026-01-27T09:12:45+00:00 |
| rhsa-2021:3425 | Red Hat Security Advisory: Red Hat support for Spring Boot 2.3.10 security update | 2021-09-09T06:18:55+00:00 | 2026-01-27T09:12:44+00:00 |
| rhsa-2021:2562 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.5.0 security release | 2021-06-29T08:39:41+00:00 | 2026-01-27T09:12:44+00:00 |
| rhsa-2021:2561 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.5.0 Security release | 2021-06-29T08:54:26+00:00 | 2026-01-27T09:12:43+00:00 |
| rhsa-2021:4012 | Red Hat Security Advisory: Red Hat support for Spring Boot 2.4.9 security update | 2021-10-28T07:52:17+00:00 | 2026-01-27T09:12:35+00:00 |
| rhsa-2021:0494 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.4.1 Security Update | 2021-02-11T13:51:48+00:00 | 2026-01-27T09:12:35+00:00 |
| rhsa-2021:0495 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.4.1 Security Update | 2021-02-11T13:51:32+00:00 | 2026-01-27T09:12:34+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2024-50014 | ext4: fix access to uninitialised lock in fc replay path | 2024-10-01T07:00:00.000Z | 2025-09-03T20:23:54.000Z |
| msrc_cve-2021-33462 | An issue was discovered in yasm version 1.3.0. There is a use-after-free in expr_traverse_nodes_post() in libyasm/expr.c. | 2022-07-02T00:00:00.000Z | 2025-09-03T20:23:46.000Z |
| msrc_cve-2021-33461 | An issue was discovered in yasm version 1.3.0. There is a use-after-free in yasm_intnum_destroy() in libyasm/intnum.c. | 2022-07-02T00:00:00.000Z | 2025-09-03T20:22:11.000Z |
| msrc_cve-2021-33460 | An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in if_condition() in modules/preprocs/nasm/nasm-pp.c. | 2022-07-02T00:00:00.000Z | 2025-09-03T20:20:29.000Z |
| msrc_cve-2021-33459 | An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in nasm_parser_directive() in modules/parsers/nasm/nasm-parse.c. | 2022-07-02T00:00:00.000Z | 2025-09-03T20:19:16.000Z |
| msrc_cve-2021-33458 | There is a NULL pointer dereference in yasm version 1.3.0 | 2022-07-02T00:00:00.000Z | 2025-09-03T20:17:40.000Z |
| msrc_cve-2021-33457 | An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in expand_mmac_params() in modules/preprocs/nasm/nasm-pp.c. | 2022-07-02T00:00:00.000Z | 2025-09-03T20:16:18.000Z |
| msrc_cve-2024-50146 | net/mlx5e: Don't call cleanup on profile rollback failure | 2024-11-02T00:00:00.000Z | 2025-09-03T20:15:02.000Z |
| msrc_cve-2021-33456 | There is a NULL pointer dereference in hash() in yasm version 1.3.0 | 2022-07-02T00:00:00.000Z | 2025-09-03T20:14:51.000Z |
| msrc_cve-2021-33455 | An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in do_directive() in modules/preprocs/nasm/nasm-pp.c. | 2022-07-02T00:00:00.000Z | 2025-09-03T20:13:39.000Z |
| msrc_cve-2024-49915 | drm/amd/display: Add NULL check for clk_mgr in dcn32_init_hw | 2024-10-01T07:00:00.000Z | 2025-09-03T20:12:58.000Z |
| msrc_cve-2024-49923 | drm/amd/display: Pass non-null to dcn20_validate_apply_pipe_split_flags | 2024-10-01T07:00:00.000Z | 2025-09-03T20:11:02.000Z |
| msrc_cve-2024-7246 | HPACK table poisoning in gRPC C++, Python & Ruby | 2024-08-02T00:00:00.000Z | 2025-09-03T20:07:14.000Z |
| msrc_cve-2024-50138 | bpf: Use raw_spinlock_t in ringbuf | 2024-11-02T00:00:00.000Z | 2025-09-03T20:04:42.000Z |
| msrc_cve-2024-56761 | x86/fred: Clear WFE in missing-ENDBRANCH #CPs | 2025-01-02T00:00:00.000Z | 2025-09-03T20:01:52.000Z |
| msrc_cve-2024-53205 | phy: realtek: usb: fix NULL deref in rtk_usb2phy_probe | 2024-12-02T00:00:00.000Z | 2025-09-03T19:50:38.000Z |
| msrc_cve-2024-49906 | drm/amd/display: Check null pointer before try to access it | 2024-10-01T07:00:00.000Z | 2025-09-03T19:48:30.000Z |
| msrc_cve-2018-1000217 | Dave Gamble cJSON version 1.7.3 and earlier contains a CWE-416: Use After Free vulnerability | 2018-08-02T00:00:00.000Z | 2025-09-03T19:47:35.000Z |
| msrc_cve-2024-49919 | drm/amd/display: Add null check for head_pipe in dcn201_acquire_free_pipe_for_layer | 2024-10-01T07:00:00.000Z | 2025-09-03T19:44:48.000Z |
| msrc_cve-2024-49898 | drm/amd/display: Check null-initialized variables | 2024-10-01T07:00:00.000Z | 2025-09-03T19:44:24.000Z |
| msrc_cve-2024-49911 | drm/amd/display: Add NULL check for function pointer in dcn20_set_output_transfer_func | 2024-10-01T07:00:00.000Z | 2025-09-03T19:40:44.000Z |
| msrc_cve-2024-49909 | drm/amd/display: Add NULL check for function pointer in dcn32_set_output_transfer_func | 2024-10-01T07:00:00.000Z | 2025-09-03T19:37:07.000Z |
| msrc_cve-2025-55231 | Windows Storage-based Management Service Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-26T07:00:00.000Z |
| msrc_cve-2025-55230 | Windows MBT Transport Driver Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-26T07:00:00.000Z |
| msrc_cve-2025-55229 | Windows Certificate Spoofing Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-26T07:00:00.000Z |
| msrc_cve-2025-53795 | Microsoft PC Manager Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-21T07:00:00.000Z |
| msrc_cve-2025-53763 | Azure Databricks Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-21T07:00:00.000Z |
| msrc_cve-2025-49718 | Microsoft SQL Server Information Disclosure Vulnerability | 2025-07-08T07:00:00.000Z | 2025-08-20T07:00:00.000Z |
| msrc_cve-2025-49717 | Microsoft SQL Server Remote Code Execution Vulnerability | 2025-07-08T07:00:00.000Z | 2025-08-20T07:00:00.000Z |
| msrc_cve-2025-49716 | Windows Netlogon Denial of Service Vulnerability | 2025-07-08T07:00:00.000Z | 2025-08-18T07:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202310-1257 | Tenda W18E V16.01.0.8(1576) has a command injection vulnerability via the hostName parame… | 2025-05-13T23:19:19.547000Z |
| var-202504-3647 | Xerox® VersaLink® B7030 MFP is a multi-function printer with multiple functions and perfo… | 2025-05-13T23:19:12.849000Z |
| var-202504-3731 | Brother MFC-L2713DW is a multifunction laser printer with printing, copying, scanning and… | 2025-05-13T23:19:12.809000Z |
| var-202504-4086 | DocuCentre-IV 2060 is a medium-speed digital multifunction printer with main functions in… | 2025-05-13T23:19:12.646000Z |
| var-202504-4149 | HA Bridge is a gateway product of BWS Systems. BWS Systems HA Bridge has an unauthorized… | 2025-05-13T23:19:12.602000Z |
| var-202505-0387 | M6700DW is a black and white laser multifunction printer. P2500NW is a black and white la… | 2025-05-13T23:19:12.472000Z |
| var-202210-1679 | TP-Link TL-WR841N 8.0 4.17.16 Build 120201 Rel.54750n is vulnerable to Cross Site Scripti… | 2025-05-13T23:18:48.034000Z |
| var-202504-3509 | HP LaserJet Pro MFP 4101 is a multi-function laser printer that integrates printing, copy… | 2025-05-13T23:18:40.195000Z |
| var-202505-0734 | SNC-RX570N is a network camera. Sony SNC-RX570N has a weak password vulnerability, which… | 2025-05-13T23:18:39.557000Z |
| var-202504-3512 | MOBOTIX P25 is a high-performance smart network camera. MOBOTIX P25 has an unauthorized … | 2025-05-13T23:16:35.872000Z |
| var-202504-3806 | Brother MFC-J491DW is a multi-function color inkjet printer suitable for various office a… | 2025-05-13T23:16:35.729000Z |
| var-202505-0989 | DWR-M961 is a router. D-Link DWR-M961 has a stack overflow vulnerability, which can be e… | 2025-05-13T23:16:34.690000Z |
| var-202505-1241 | The M2085FW is a black and white laser multifunction printer with printing, copying, scan… | 2025-05-13T23:16:34.575000Z |
| var-202505-0145 | In Modem, there is a possible permission bypass due to improper certificate validation. T… | 2025-05-13T23:15:59.974000Z |
| var-202505-0502 | Zhejiang Dahua Technology Co., Ltd. is a global leading video-centric smart IoT solution … | 2025-05-13T23:15:59.836000Z |
| var-202505-0733 | C430W is a laser printer. Samsung (China) Investment Co., Ltd. C430W has a command execu… | 2025-05-13T23:15:59.098000Z |
| var-202504-3641 | Sony (China) Co., Ltd. is a company engaged in investment, product marketing, customer af… | 2025-05-13T23:14:16.216000Z |
| var-202505-1246 | H3C Technologies Co., Ltd. is a global leader in digital solutions. H3C Technologies Co.… | 2025-05-13T23:14:14.667000Z |
| var-202502-1335 | A sensitive information disclosure vulnerability in the Tenda W18E V16.01.0.8(1625) web m… | 2025-05-13T23:11:26.312000Z |
| var-202504-3640 | HP OfficeJet Pro 8740 is a multi-function printer with multiple functions such as printin… | 2025-05-13T23:11:25.318000Z |
| var-202504-3808 | Beijing Zhixin Microelectronics Technology Co., Ltd. is a high-tech enterprise focusing o… | 2025-05-13T23:11:25.239000Z |
| var-202504-3955 | MOBOTIX M1 is a camera. MOBOTIX M1 has an unauthorized access vulnerability that can be … | 2025-05-13T23:11:25.169000Z |
| var-202504-3524 | Beijing Yakong Technology Development Co., Ltd. is a high-tech enterprise of industrial a… | 2025-05-13T23:09:35.009000Z |
| var-202504-3650 | Fuhong Technology Co., Ltd. was established in 1991. It has always been committed to the … | 2025-05-13T23:09:34.940000Z |
| var-202504-3734 | MOBOTIX S14 is a camera. MOBOTIX S14 has an unauthorized access vulnerability that can b… | 2025-05-13T23:09:34.898000Z |
| var-202505-0732 | NUUO is a company specializing in the production of Network Video Recorders (NVRs). NUUO… | 2025-05-13T23:09:34.413000Z |
| var-202409-0295 | A vulnerability has been identified in Automation License Manager V5 (All versions), Auto… | 2025-05-13T23:06:43.440000Z |
| var-202502-0765 | A default credentials vulnerability in Tenda W18E V16.01.0.8(1625) allows unauthenticated… | 2025-05-13T23:06:39.253000Z |
| var-202502-1624 | A hardcoded credentials vulnerability in Tenda W18E V16.01.0.8(1625) allows unauthenticat… | 2025-05-13T23:06:39.205000Z |
| var-202505-0385 | AG515 is a high-performance gateway device suitable for small and medium-sized enterprise… | 2025-05-13T23:06:36.866000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2024:0586-1 | Security update for docker | 2024-02-22T08:54:32Z | 2024-02-22T08:54:32Z |
| suse-su-2024:0585-1 | Security update for python-pycryptodome | 2024-02-22T08:38:11Z | 2024-02-22T08:38:11Z |
| suse-su-2024:0581-1 | Security update for python3 | 2024-02-21T13:08:20Z | 2024-02-21T13:08:20Z |
| suse-su-2024:0580-1 | Security update for MozillaFirefox | 2024-02-21T11:57:29Z | 2024-02-21T11:57:29Z |
| suse-su-2024:0579-1 | Security update for mozilla-nss | 2024-02-21T10:44:58Z | 2024-02-21T10:44:58Z |
| suse-su-2024:0578-1 | Security update for mozilla-nss | 2024-02-21T10:44:16Z | 2024-02-21T10:44:16Z |
| suse-su-2024:0577-1 | Security update for python-aiohttp, python-time-machine | 2024-02-21T10:43:49Z | 2024-02-21T10:43:49Z |
| suse-su-2024:0576-1 | Security update for dpdk | 2024-02-21T09:47:39Z | 2024-02-21T09:47:39Z |
| suse-su-2024:0574-1 | Security update for bind | 2024-02-21T09:39:56Z | 2024-02-21T09:39:56Z |
| suse-su-2024:0573-1 | Security update for abseil-cpp, grpc, opencensus-proto, protobuf, python-abseil, python-grpcio, re2 | 2024-02-21T08:37:00Z | 2024-02-21T08:37:00Z |
| suse-ru-2024:0560-1 | Recommended update for Java | 2024-02-21T04:34:23Z | 2024-02-21T04:34:23Z |
| suse-su-2024:0319-1 | Security update for gdb | 2024-02-20T16:52:21Z | 2024-02-20T16:52:21Z |
| suse-su-2024:0558-1 | Security update for libssh2_org | 2024-02-20T16:34:49Z | 2024-02-20T16:34:49Z |
| suse-su-2024:0557-1 | Security update for python-pycryptodomex | 2024-02-20T16:23:03Z | 2024-02-20T16:23:03Z |
| suse-su-2024:0555-1 | Security update for libxml2 | 2024-02-20T16:22:18Z | 2024-02-20T16:22:18Z |
| suse-su-2024:0554-1 | Security update for dpdk | 2024-02-20T16:22:04Z | 2024-02-20T16:22:04Z |
| suse-su-2024:0553-1 | Security update for openvswitch | 2024-02-20T16:12:28Z | 2024-02-20T16:12:28Z |
| suse-su-2024:0552-1 | Security update for postgresql14 | 2024-02-20T16:11:16Z | 2024-02-20T16:11:16Z |
| suse-su-2024:0551-1 | Security update for postgresql15 | 2024-02-20T16:09:35Z | 2024-02-20T16:09:35Z |
| suse-su-2024:0550-1 | Security update for postgresql16 | 2024-02-20T16:07:44Z | 2024-02-20T16:07:44Z |
| suse-su-2024:0549-1 | Security update for openssl-1_1 | 2024-02-20T16:05:56Z | 2024-02-20T16:05:56Z |
| suse-su-2024:0548-1 | Security update for webkit2gtk3 | 2024-02-20T16:05:06Z | 2024-02-20T16:05:06Z |
| suse-su-2024:0546-1 | Security update for postgresql16 | 2024-02-20T15:34:01Z | 2024-02-20T15:34:01Z |
| suse-su-2024:0545-1 | Security update for webkit2gtk3 | 2024-02-20T15:33:45Z | 2024-02-20T15:33:45Z |
| suse-su-2024:0544-1 | Security update for openvswitch | 2024-02-20T15:04:57Z | 2024-02-20T15:04:57Z |
| suse-su-2024:0543-1 | Security update for libssh2_org | 2024-02-20T15:04:50Z | 2024-02-20T15:04:50Z |
| suse-su-2024:0542-1 | Security update for postgresql12 | 2024-02-20T15:04:38Z | 2024-02-20T15:04:38Z |
| suse-su-2024:0541-1 | Security update for postgresql13 | 2024-02-20T15:04:21Z | 2024-02-20T15:04:21Z |
| suse-su-2024:0540-1 | Security update for postgresql14 | 2024-02-20T15:04:09Z | 2024-02-20T15:04:09Z |
| suse-su-2024:0539-1 | Security update for libssh | 2024-02-20T15:03:55Z | 2024-02-20T15:03:55Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:10576-1 | gv-3.7.4-3.8 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10575-1 | csound-5.18.02-7.10 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10574-1 | ruby2.2-rubygem-activesupport-4_2-4.2.7.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10573-1 | nbd-3.13-3.5 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10572-1 | libjavascriptcoregtk-4_0-18-2.14.2-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10571-1 | clamav-0.99.2-4.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10570-1 | elfutils-0.167-1.5 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10569-1 | libserf-1-1-1.3.9-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10568-1 | libapr-util1-1.5.4-4.4 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10567-1 | python-Pillow-3.1.1-4.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10566-1 | libidn-devel-1.33-2.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10565-1 | ruby2.2-rubygem-facter-2.4.6-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10564-1 | apache2-mod_fcgid-2.3.9-7.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10563-1 | openttd-1.6.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10562-1 | squidGuard-1.4-27.7 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10561-1 | mailx-12.5-24.4 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10560-1 | gnome-keyring-3.20.0-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10559-1 | libXext-devel-1.3.3-3.19 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10558-1 | radvd-2.11-1.7 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10557-1 | rtkit-0.11+git.20130926-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10556-1 | ldns-1.6.17-5.7 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10555-1 | coolkey-1.1.0-150.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10554-1 | libtiff-devel-32bit-4.0.7-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10553-1 | openconnect-7.07-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10552-1 | redis-3.2.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10551-1 | sudo-1.8.18p1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10550-1 | opie-2.4-726.12 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10549-1 | ruby2.2-rubygem-nokogiri-1.6.8.1-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10548-1 | rsync-3.1.2-1.5 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10547-1 | gajim-0.16.6-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-18448 | Ubiquiti UniFi Protect Cameras证书验证不当漏洞 | 2025-03-07 | 2025-08-13 |
| cnvd-2025-18447 | Ubiquiti UniFi Protect Cameras固件更新验证不足漏洞 | 2025-03-07 | 2025-08-13 |
| cnvd-2025-18446 | Ubiquiti UniFi Protect Application身份认证绕过漏洞 | 2025-03-07 | 2025-08-13 |
| cnvd-2025-18445 | Ubiquiti UniFi Protect Cameras释放后重用漏洞 | 2025-03-07 | 2025-08-13 |
| cnvd-2025-18444 | Ubiquiti UniFi Protect Cameras代码执行漏洞 | 2025-03-13 | 2025-08-13 |
| cnvd-2025-18443 | Ubiquiti UniFi Protect Cameras堆缓冲区溢出漏洞 | 2025-05-22 | 2025-08-13 |
| cnvd-2025-18441 | Ubiquiti UniFi Protect Application存在未明漏洞 | 2025-05-22 | 2025-08-13 |
| cnvd-2025-18387 | Ivanti Endpoint Manager越界读取漏洞 | 2025-01-23 | 2025-08-13 |
| cnvd-2025-18352 | Tenda FH1205 formWifiBasicSet方法security参数缓冲区溢出漏洞 | 2024-04-03 | 2025-08-13 |
| cnvd-2025-18351 | Tenda FH1205 formWifiBasicSet方法security_5g参数缓冲区溢出漏洞 | 2024-04-03 | 2025-08-13 |
| cnvd-2025-18350 | Tenda FH1205 fromWizardHandle函数缓冲区溢出漏洞 | 2024-04-22 | 2025-08-13 |
| cnvd-2025-18349 | Tenda FH1205缓冲区溢出漏洞 | 2024-04-22 | 2025-08-13 |
| cnvd-2025-18345 | WordPress The Plus Addons for Elementor plugin跨站脚本漏洞 | 2025-08-10 | 2025-08-13 |
| cnvd-2025-18344 | WordPress SureForms plugin跨站脚本漏洞 | 2025-08-10 | 2025-08-13 |
| cnvd-2025-18331 | WordPress Image Wall跨站脚本漏洞 | 2025-07-23 | 2025-08-13 |
| cnvd-2025-18330 | WordPress Yogi反序列化漏洞 | 2025-07-23 | 2025-08-13 |
| cnvd-2025-18329 | WordPress Pay with Contact Form 7跨站脚本漏洞 | 2025-07-23 | 2025-08-13 |
| cnvd-2025-18328 | WordPress FG Drupal to WordPress跨站请求伪造漏洞 | 2025-07-23 | 2025-08-13 |
| cnvd-2025-18327 | WordPress The E-Commerce ERP权限提升漏洞 | 2025-07-23 | 2025-08-13 |
| cnvd-2025-18326 | WordPress Ultimate Push Notifications缺少授权漏洞 | 2025-07-23 | 2025-08-13 |
| cnvd-2025-18325 | WordPress Pakke Envíos SQL注入漏洞 | 2025-07-23 | 2025-08-13 |
| cnvd-2025-18324 | WordPress Torod SQL注入漏洞 | 2025-07-23 | 2025-08-13 |
| cnvd-2025-18323 | WordPress JetTricks跨站脚本漏洞 | 2025-07-23 | 2025-08-13 |
| cnvd-2025-18322 | WordPress News Kit Elementor Addons缺少授权漏洞 | 2025-07-23 | 2025-08-13 |
| cnvd-2025-18289 | WordPress Responsive Addons for Elementor跨站脚本漏洞 | 2025-07-23 | 2025-08-13 |
| cnvd-2025-18288 | WordPress Easy Video Player Wordpress&WooCommerce路径遍历漏洞 | 2025-07-23 | 2025-08-13 |
| cnvd-2025-18287 | WordPress WPBakery Page Builder for WordPress跨站脚本漏洞 | 2025-07-30 | 2025-08-13 |
| cnvd-2025-18286 | WordPress Smart Slider plugin SQL注入漏洞 | 2025-08-01 | 2025-08-13 |
| cnvd-2025-18285 | WordPress Stratum plugin跨站脚本漏洞 | 2025-08-10 | 2025-08-13 |
| cnvd-2025-18682 | Mozilla Firefox缓冲区溢出漏洞(CNVD-2025-18682) | 2022-01-16 | 2025-08-12 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2020-avi-709 | Multiples vulnérabilités dans Google Chrome OS | 2020-11-04T00:00:00.000000 | 2020-11-04T00:00:00.000000 |
| certfr-2020-avi-708 | Multiples vulnérabilités dans Adobe Acrobat et Acrobat Reader | 2020-11-04T00:00:00.000000 | 2020-11-04T00:00:00.000000 |
| certfr-2020-avi-707 | Multiples vulnérabilités dans Foxit PhantomPDF | 2020-11-03T00:00:00.000000 | 2020-11-03T00:00:00.000000 |
| certfr-2020-avi-706 | Multiples vulnérabilités dans les produits Fortinet | 2020-11-03T00:00:00.000000 | 2020-11-03T00:00:00.000000 |
| certfr-2020-avi-704 | Multiples vulnérabilités dans les produits F5 | 2020-11-03T00:00:00.000000 | 2020-11-03T00:00:00.000000 |
| certfr-2020-avi-703 | Multiples vulnérabilités dans Google Chrome | 2020-11-03T00:00:00.000000 | 2020-11-03T00:00:00.000000 |
| certfr-2020-avi-702 | Multiples vulnérabilités dans GitLab | 2020-11-03T00:00:00.000000 | 2020-11-03T00:00:00.000000 |
| certfr-2020-avi-701 | Multiples vulnérabilités dans Google Android | 2020-11-03T00:00:00.000000 | 2020-11-03T00:00:00.000000 |
| certfr-2020-avi-700 | Multiples vulnérabilités dans les produits Mitel | 2020-11-02T00:00:00.000000 | 2020-11-02T00:00:00.000000 |
| certfr-2020-avi-699 | Multiples vulnérabilités dans Debian LTS | 2020-11-02T00:00:00.000000 | 2020-11-02T00:00:00.000000 |
| certfr-2020-avi-698 | Vulnérabilité dans Oracle Weblogic | 2020-11-02T00:00:00.000000 | 2020-11-02T00:00:00.000000 |
| certfr-2020-avi-697 | Multiples vulnérabilités dans Wireshark | 2020-10-30T00:00:00.000000 | 2020-10-30T00:00:00.000000 |
| certfr-2020-avi-696 | Multiples vulnérabilités dans les produits Tenable | 2020-10-30T00:00:00.000000 | 2020-10-30T00:00:00.000000 |
| certfr-2020-avi-695 | Multiples vulnérabilités dans QNAP QTS | 2020-10-29T00:00:00.000000 | 2020-10-29T00:00:00.000000 |
| certfr-2020-avi-694 | Multiples vulnérabilités dans Samba | 2020-10-29T00:00:00.000000 | 2020-10-29T00:00:00.000000 |
| certfr-2020-avi-693 | Multiples vulnérabilités dans les produits Citrix | 2020-10-29T00:00:00.000000 | 2020-10-29T00:00:00.000000 |
| certfr-2020-avi-692 | Vulnérabilité dans les produits Moxa | 2020-10-29T00:00:00.000000 | 2020-10-29T00:00:00.000000 |
| certfr-2020-avi-691 | Multiples vulnérabilités dans les produits Juniper | 2020-10-29T00:00:00.000000 | 2020-10-29T00:00:00.000000 |
| certfr-2020-avi-690 | Multiples vulnérabilités dans Juniper Junos | 2020-10-29T00:00:00.000000 | 2020-10-29T00:00:00.000000 |
| certfr-2020-avi-689 | Multiples vulnérabilités dans les produits F5 | 2020-10-29T00:00:00.000000 | 2020-10-29T00:00:00.000000 |
| certfr-2020-avi-688 | Vulnérabilité dans Juniper Junos | 2020-10-28T00:00:00.000000 | 2020-10-28T00:00:00.000000 |
| certfr-2020-avi-687 | Multiples vulnérabilités dans QNAP QTS | 2020-10-28T00:00:00.000000 | 2020-10-28T00:00:00.000000 |
| certfr-2020-avi-686 | Multiples vulnérabilités dans les produits Sonicwall | 2020-10-28T00:00:00.000000 | 2020-10-28T00:00:00.000000 |
| certfr-2020-avi-685 | Multiples vulnérabilités dans ARC Informatique pcVue | 2020-10-28T00:00:00.000000 | 2020-10-28T00:00:00.000000 |
| certfr-2020-avi-684 | Multiples vulnérabilités dans les produits Fortinet | 2020-10-28T00:00:00.000000 | 2020-10-28T00:00:00.000000 |
| certfr-2020-avi-683 | Multiples vulnérabilités dans Microsoft Edge | 2020-10-27T00:00:00.000000 | 2020-10-27T00:00:00.000000 |
| certfr-2020-avi-682 | Vulnérabilité dans Moxa NPort 5100A | 2020-10-27T00:00:00.000000 | 2020-10-27T00:00:00.000000 |
| certfr-2020-avi-681 | Multiples vulnérabilités dans les produits Pulse Secure | 2020-10-27T00:00:00.000000 | 2020-10-27T00:00:00.000000 |
| certfr-2020-avi-680 | Multiples vulnérabilités dans Stormshield Network Security | 2020-10-27T00:00:00.000000 | 2020-10-27T00:00:00.000000 |
| certfr-2020-avi-672 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2020-10-23T00:00:00.000000 | 2020-10-27T00:00:00.000000 |