Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-55696 |
7.8 (3.1)
|
NtQueryInformation Token function (ntifs.h) Elevation … |
Microsoft |
Windows 10 Version 1809 |
2025-10-14T17:01:12.774Z | 2026-02-22T17:25:26.379Z |
| CVE-2025-55683 |
5.5 (3.1)
|
Windows Kernel Information Disclosure Vulnerability |
Microsoft |
Windows Server 2016 |
2025-10-14T17:01:07.360Z | 2026-02-22T17:25:19.754Z |
| CVE-2025-55682 |
6.1 (3.1)
|
Windows BitLocker Security Feature Bypass Vulnerability |
Microsoft |
Windows 11 Version 24H2 |
2025-10-14T17:01:06.857Z | 2026-02-22T17:25:18.943Z |
| CVE-2025-55679 |
5.1 (3.1)
|
Windows Kernel Information Disclosure Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2025-10-14T17:01:05.597Z | 2026-02-22T17:25:17.335Z |
| CVE-2025-55337 |
6.1 (3.1)
|
Windows BitLocker Security Feature Bypass Vulnerability |
Microsoft |
Windows 11 Version 24H2 |
2025-10-14T17:01:04.426Z | 2026-02-22T17:25:15.679Z |
| CVE-2025-55334 |
6.2 (3.1)
|
Windows Kernel Security Feature Bypass Vulnerability |
Microsoft |
Windows 11 version 22H2 |
2025-10-14T17:01:03.852Z | 2026-02-22T17:25:14.928Z |
| CVE-2025-55332 |
6.1 (3.1)
|
Windows BitLocker Security Feature Bypass Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2025-10-14T17:01:02.669Z | 2026-02-22T17:25:14.266Z |
| CVE-2025-55330 |
6.1 (3.1)
|
Windows BitLocker Security Feature Bypass Vulnerability |
Microsoft |
Windows 11 version 22H2 |
2025-10-14T17:01:00.988Z | 2026-02-22T17:25:12.712Z |
| CVE-2025-55248 |
4.8 (3.1)
|
.NET, .NET Framework, and Visual Studio Information Di… |
Microsoft |
.NET 8.0 |
2025-10-14T17:00:59.059Z | 2026-02-22T17:25:10.409Z |
| CVE-2025-53768 |
7.8 (3.1)
|
Xbox IStorageService Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:00:57.742Z | 2026-02-22T17:25:09.032Z |
| CVE-2025-59502 |
7.5 (3.1)
|
Remote Procedure Call Denial of Service Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2025-10-14T17:00:53.100Z | 2026-02-22T17:25:03.131Z |
| CVE-2025-59294 |
2.1 (3.1)
|
Windows Taskbar Live Preview Information Disclosure Vu… |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:00:51.334Z | 2026-02-22T17:25:00.541Z |
| CVE-2025-59292 |
8.2 (3.1)
|
Azure Compute Gallery Elevation of Privilege Vulnerability |
Microsoft |
Azure Compute Gallery |
2025-10-14T17:00:50.776Z | 2026-02-22T17:24:59.937Z |
| CVE-2025-59291 |
8.2 (3.1)
|
Confidential Azure Container Instances Elevation of Pr… |
Microsoft |
Azure Compute Gallery |
2025-10-14T17:00:50.205Z | 2026-02-22T17:24:59.276Z |
| CVE-2025-59290 |
7.8 (3.1)
|
Windows Bluetooth Service Elevation of Privilege Vulne… |
Microsoft |
Windows 10 Version 21H2 |
2025-10-14T17:00:49.650Z | 2026-02-22T17:24:58.670Z |
| CVE-2025-59288 |
5.3 (3.1)
|
Playwright Spoofing Vulnerability |
Microsoft |
microsoft/playwright |
2025-10-14T17:00:49.154Z | 2026-02-22T17:24:58.049Z |
| CVE-2025-59284 |
3.3 (3.1)
|
Windows NTLM Spoofing Vulnerability |
Microsoft |
Windows 11 version 22H2 |
2025-10-14T17:00:48.588Z | 2026-02-22T17:24:57.501Z |
| CVE-2025-59281 |
7.8 (3.1)
|
Xbox Gaming Services Elevation of Privilege Vulnerability |
Microsoft |
Xbox Gaming Services |
2025-10-14T17:00:47.438Z | 2026-02-22T17:24:56.271Z |
| CVE-2025-47979 |
5.5 (3.1)
|
Microsoft Failover Cluster Information Disclosure Vuln… |
Microsoft |
Windows Server 2022, 23H2 Edition (Server Core installation) |
2025-10-14T17:00:46.877Z | 2026-02-22T17:24:55.793Z |
| CVE-2025-59280 |
3.1 (3.1)
|
Windows SMB Client Tampering Vulnerability |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:00:46.316Z | 2026-02-22T17:24:55.104Z |
| CVE-2025-59277 |
7.8 (3.1)
|
Windows Authentication Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:00:45.811Z | 2026-02-22T17:24:54.511Z |
| CVE-2025-59259 |
6.5 (3.1)
|
Windows Local Session Manager (LSM) Denial of Service … |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:00:45.293Z | 2026-02-22T17:24:53.675Z |
| CVE-2025-59258 |
6.2 (3.1)
|
Windows Active Directory Federation Services (ADFS) In… |
Microsoft |
Windows Server 2012 |
2025-10-14T17:00:44.802Z | 2026-02-22T17:24:52.847Z |
| CVE-2025-59257 |
6.5 (3.1)
|
Windows Local Session Manager (LSM) Denial of Service … |
Microsoft |
Windows 11 Version 24H2 |
2025-10-14T17:00:44.246Z | 2026-02-22T17:24:52.363Z |
| CVE-2025-59254 |
7.8 (3.1)
|
Microsoft DWM Core Library Elevation of Privilege Vuln… |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:00:43.183Z | 2026-02-22T17:24:51.106Z |
| CVE-2025-59235 |
7.1 (3.1)
|
Microsoft Excel Information Disclosure Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-10-14T17:00:38.382Z | 2026-02-22T17:24:45.919Z |
| CVE-2025-59211 |
5.5 (3.1)
|
Windows Push Notification Information Disclosure Vulne… |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:00:35.497Z | 2026-02-22T17:24:42.817Z |
| CVE-2025-59204 |
5.5 (3.1)
|
Windows Management Services Information Disclosure Vul… |
Microsoft |
Windows 10 Version 1809 |
2025-10-14T17:00:33.266Z | 2026-02-22T17:24:40.808Z |
| CVE-2025-59200 |
7.7 (3.1)
|
Data Sharing Service Spoofing Vulnerability |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:00:31.341Z | 2026-02-22T17:24:38.804Z |
| CVE-2025-59195 |
7 (3.1)
|
Windows Graphics Component Denial of Service Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2025-10-14T17:00:29.561Z | 2026-02-22T17:24:37.069Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-1529 |
8.1 (3.1)
|
Org.keycloak.services.resources.organizations: keycloa… |
Red Hat |
Red Hat build of Keycloak 26.2 |
2026-02-09T18:36:15.077Z | 2026-02-16T21:45:35.169Z |
| CVE-2026-1486 |
8.8 (3.1)
|
Org.keycloak.protocol.oidc.grants: disabled identity p… |
Red Hat |
Red Hat build of Keycloak 26.4 |
2026-02-09T18:36:10.268Z | 2026-02-10T01:00:47.265Z |
| CVE-2025-14778 |
5.4 (3.1)
|
Keycloak: incorrect ownership checks in /uma-policy/ |
Red Hat |
Red Hat build of Keycloak 26.2 |
2026-02-09T18:58:29.065Z | 2026-02-10T01:04:37.407Z |
| CVE-2025-14559 |
6.5 (3.1)
|
Org.keycloak/keycloak-services: keycloak keycloak-serv… |
Red Hat |
Red Hat build of Keycloak 26.4 |
2026-01-21T06:13:31.263Z | 2026-02-10T01:04:33.642Z |
| CVE-2025-13881 |
2.7 (3.1)
|
Org.keycloak.services.resources.admin: keycloak: limit… |
Red Hat |
Red Hat build of Keycloak 26.4 |
2026-02-02T05:43:22.720Z | 2026-02-10T01:11:39.397Z |
| CVE-2026-0918 |
7.1 (4.0)
|
Null Pointer Dereference in Tapo SmartCam HTTP Service… |
TP-Link Systems Inc. |
Tapo C220 v1 |
2026-01-27T17:52:04.348Z | 2026-02-09T23:45:04.943Z |
| CVE-2020-37103 |
5.1 (4.0)
6.4 (3.1)
|
DotNetNuke 9.5 - Persistent Cross-Site Scripting |
Dnnsoftware |
DotNetNuke |
2026-02-03T16:52:42.523Z | 2026-02-06T20:12:36.575Z |
| CVE-2020-37137 |
8.6 (4.0)
6.1 (3.1)
|
PHP-Fusion 9.03.50 - 'panels.php' Eval Injection |
PHP Fusion |
PHP Fusion |
2026-02-05T16:13:37.832Z | 2026-02-05T20:37:15.390Z |
| CVE-2020-37152 |
5.1 (4.0)
|
PHP-Fusion 9.03.50 panels.php - Cross-Site Scripting (XSS) |
PHP-Fusion |
PHP-Fusion |
2026-02-05T16:13:42.999Z | 2026-02-05T16:34:35.394Z |
| CVE-2020-37133 |
6.7 (4.0)
7.5 (3.1)
|
UltraVNC Launcher 1.2.4.0 - 'RepeaterHost' Denial of Service |
UltraVNC Team |
UltraVNC Launcher |
2026-02-05T16:13:36.480Z | 2026-02-05T18:44:22.255Z |
| CVE-2020-37132 |
6.7 (4.0)
6.2 (3.1)
|
UltraVNC Launcher 1.2.4.0 - 'Password' Denial of Service |
UltraVNC Team |
UltraVNC Launcher |
2026-02-05T16:13:35.873Z | 2026-02-05T18:44:00.778Z |
| CVE-2020-37130 |
6.7 (4.0)
7.5 (3.1)
|
Nsauditor 3.2.0.0 - 'Name' Denial of Service |
Nsauditor |
Nsauditor |
2026-02-05T16:13:35.003Z | 2026-02-05T21:16:05.007Z |
| CVE-2020-37119 |
8.4 (4.0)
9.8 (3.1)
|
Nsauditor 3.2.1.0 - Buffer Overflow (SEH+ASLR bypass (… |
Nsasoft |
Nsauditor |
2026-02-05T16:13:30.470Z | 2026-02-06T20:33:12.458Z |
| CVE-2023-53533 |
N/A
|
Input: raspberrypi-ts - fix refcount leak in rpi_ts_probe |
Linux |
Linux |
2025-10-04T15:16:45.207Z | 2025-10-04T15:16:45.207Z |
| CVE-2023-53534 |
N/A
|
drm/mediatek: mtk_drm_crtc: Add checks for devm_kcalloc |
Linux |
Linux |
2025-10-04T15:16:45.909Z | 2025-10-04T15:16:45.909Z |
| CVE-2023-53535 |
N/A
|
net: bcmgenet: Add a check for oversized packets |
Linux |
Linux |
2025-10-04T15:16:46.583Z | 2026-01-05T10:21:12.644Z |
| CVE-2023-53536 |
N/A
|
blk-crypto: make blk_crypto_evict_key() more robust |
Linux |
Linux |
2025-10-04T15:16:47.304Z | 2025-10-04T15:16:47.304Z |
| CVE-2023-53537 |
N/A
|
f2fs: fix to avoid use-after-free for cached IPU bio |
Linux |
Linux |
2025-10-04T15:16:48.006Z | 2025-10-04T15:16:48.006Z |
| CVE-2023-53538 |
N/A
|
btrfs: insert tree mod log move in push_node_left |
Linux |
Linux |
2025-10-04T15:16:48.694Z | 2026-01-05T10:21:14.006Z |
| CVE-2023-53539 |
N/A
|
RDMA/rxe: Fix incomplete state save in rxe_requester |
Linux |
Linux |
2025-10-04T15:16:49.379Z | 2025-10-04T15:16:49.379Z |
| CVE-2023-53540 |
N/A
|
wifi: cfg80211: reject auth/assoc to AP with our address |
Linux |
Linux |
2025-10-04T15:16:50.079Z | 2026-01-05T10:21:15.251Z |
| CVE-2023-53541 |
N/A
|
mtd: rawnand: brcmnand: Fix potential out-of-bounds ac… |
Linux |
Linux |
2025-10-04T15:16:50.765Z | 2025-10-04T15:16:50.765Z |
| CVE-2023-53542 |
N/A
|
ARM: dts: exynos: Use Exynos5420 compatible for the MI… |
Linux |
Linux |
2025-10-04T15:16:51.440Z | 2026-01-05T10:21:16.678Z |
| CVE-2023-53588 |
N/A
|
wifi: mac80211: check for station first in client probe |
Linux |
Linux |
2025-10-04T15:44:03.354Z | 2026-01-05T10:21:25.575Z |
| CVE-2023-53589 |
N/A
|
wifi: iwlwifi: mvm: don't trust firmware n_channels |
Linux |
Linux |
2025-10-04T15:44:04.047Z | 2025-10-04T15:44:04.047Z |
| CVE-2023-53590 |
N/A
|
sctp: add a refcnt in sctp_stream_priorities to avoid … |
Linux |
Linux |
2025-10-04T15:44:04.733Z | 2025-10-04T15:44:04.733Z |
| CVE-2023-53591 |
N/A
|
net/mlx5e: Fix deadlock in tc route query code |
Linux |
Linux |
2025-10-04T15:44:05.430Z | 2025-10-04T15:44:05.430Z |
| CVE-2023-53592 |
N/A
|
gpio: sifive: Fix refcount leak in sifive_gpio_probe |
Linux |
Linux |
2025-10-04T15:44:06.162Z | 2025-10-04T15:44:06.162Z |
| CVE-2023-53593 |
N/A
|
cifs: Release folio lock on fscache read hit. |
Linux |
Linux |
2025-10-04T15:44:06.853Z | 2026-01-05T10:21:27.106Z |
| CVE-2026-25878 |
6.9 (4.0)
|
FroshAdminer Adminer UI is accessible without admin session |
FriendsOfShopware |
FroshPlatformAdminer |
2026-02-09T20:53:23.818Z | 2026-02-10T15:58:56.777Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2023-53541 | In the Linux kernel, the following vulnerability has been resolved: mtd: rawnand: brcmnand: Fix po… | 2025-10-04T16:15:49.160 | 2026-02-09T22:05:42.180 |
| fkie_cve-2023-53542 | In the Linux kernel, the following vulnerability has been resolved: ARM: dts: exynos: Use Exynos54… | 2025-10-04T16:15:49.290 | 2026-02-09T22:05:32.527 |
| fkie_cve-2023-53588 | In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: check for stat… | 2025-10-04T16:15:55.200 | 2026-02-09T22:02:41.927 |
| fkie_cve-2023-53589 | In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: don't trus… | 2025-10-04T16:15:55.313 | 2026-02-09T22:02:34.470 |
| fkie_cve-2023-53590 | In the Linux kernel, the following vulnerability has been resolved: sctp: add a refcnt in sctp_str… | 2025-10-04T16:15:55.437 | 2026-02-09T22:02:27.947 |
| fkie_cve-2023-53591 | In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix deadlock in tc … | 2025-10-04T16:15:55.550 | 2026-02-09T22:02:20.910 |
| fkie_cve-2023-53592 | In the Linux kernel, the following vulnerability has been resolved: gpio: sifive: Fix refcount lea… | 2025-10-04T16:15:55.670 | 2026-02-09T22:02:14.563 |
| fkie_cve-2023-53593 | In the Linux kernel, the following vulnerability has been resolved: cifs: Release folio lock on fs… | 2025-10-04T16:15:55.790 | 2026-02-09T22:02:02.030 |
| fkie_cve-2026-25878 | FroshAdminer is the Adminer plugin for Shopware Platform. Prior to 2.2.1, the Adminer route (/admin… | 2026-02-09T21:15:50.380 | 2026-02-09T21:55:30.093 |
| fkie_cve-2026-25761 | Super-linter is a combination of multiple linters to run as a GitHub Action or standalone. From 6.0… | 2026-02-09T21:15:49.323 | 2026-02-09T21:55:30.093 |
| fkie_cve-2026-25740 | captive browser, a dedicated Chrome instance to log into captive portals without messing with DNS s… | 2026-02-09T21:15:49.163 | 2026-02-09T21:55:30.093 |
| fkie_cve-2026-25598 | Harden-Runner is a CI/CD security agent that works like an EDR for GitHub Actions runners. Prior to… | 2026-02-09T20:15:58.653 | 2026-02-09T21:55:30.093 |
| fkie_cve-2026-25528 | LangSmith Client SDKs provide SDK's for interacting with the LangSmith platform. The LangSmith SDK'… | 2026-02-09T21:15:48.857 | 2026-02-09T21:55:30.093 |
| fkie_cve-2026-24095 | Improper permission enforcement in Checkmk versions 2.4.0 before 2.4.0p21, 2.3.0 before 2.3.0p43, a… | 2026-02-09T16:16:00.767 | 2026-02-09T21:55:30.093 |
| fkie_cve-2026-2246 | A security vulnerability has been detected in AprilRobotics apriltag up to 3.4.5. Affected by this … | 2026-02-09T20:15:59.467 | 2026-02-09T21:55:30.093 |
| fkie_cve-2026-2245 | A vulnerability was identified in CCExtractor up to 183. This affects the function parse_PAT/parse_… | 2026-02-09T20:15:59.270 | 2026-02-09T21:55:30.093 |
| fkie_cve-2026-21419 | Dell Display and Peripheral Manager (Windows) versions prior to 2.2 contain an Improper Link Resolu… | 2026-02-09T18:16:05.893 | 2026-02-09T21:55:30.093 |
| fkie_cve-2025-7432 | DPA countermeasures in Silicon Labs' Series 2 devices are not reseeded under certain conditions. … | 2026-02-09T18:16:05.427 | 2026-02-09T21:55:30.093 |
| fkie_cve-2025-66630 | Fiber is an Express inspired web framework written in Go. Before 2.52.11, on Go versions prior to 1… | 2026-02-09T18:16:04.680 | 2026-02-09T21:55:30.093 |
| fkie_cve-2026-24419 | OpenSTAManager is an open source management software for technical assistance and invoicing. OpenST… | 2026-02-06T18:15:58.333 | 2026-02-09T21:55:03.027 |
| fkie_cve-2025-69212 | OpenSTAManager is an open source management software for technical assistance and invoicing. In 2.9… | 2026-02-06T19:16:07.373 | 2026-02-09T21:54:21.847 |
| fkie_cve-2023-53594 | In the Linux kernel, the following vulnerability has been resolved: driver core: fix resource leak… | 2025-10-04T16:15:55.910 | 2026-02-09T21:53:49.403 |
| fkie_cve-2025-69214 | OpenSTAManager is an open source management software for technical assistance and invoicing. In 2.9… | 2026-02-06T19:16:07.793 | 2026-02-09T21:53:03.017 |
| fkie_cve-2025-69216 | OpenSTAManager is an open source management software for technical assistance and invoicing. In 2.9… | 2026-02-06T19:16:07.930 | 2026-02-09T21:50:16.900 |
| fkie_cve-2026-24416 | OpenSTAManager is an open source management software for technical assistance and invoicing. OpenST… | 2026-02-06T19:16:08.837 | 2026-02-09T21:44:51.847 |
| fkie_cve-2026-24417 | OpenSTAManager is an open source management software for technical assistance and invoicing. OpenST… | 2026-02-06T19:16:08.973 | 2026-02-09T21:43:49.913 |
| fkie_cve-2026-24418 | OpenSTAManager is an open source management software for technical assistance and invoicing. OpenST… | 2026-02-06T19:16:09.120 | 2026-02-09T21:42:38.140 |
| fkie_cve-2025-2848 | A vulnerability in Synology Mail Server allows remote authenticated attackers to read and write non… | 2025-12-04T15:15:57.077 | 2026-02-09T21:38:15.597 |
| fkie_cve-2026-22782 | RustFS is a distributed object storage system built in Rust. From >= 1.0.0-alpha.1 to 1.0.0-alpha.7… | 2026-01-16T17:15:54.343 | 2026-02-09T20:47:26.030 |
| fkie_cve-2026-23523 | Dive is an open-source MCP Host Desktop Application that enables integration with function-calling … | 2026-01-16T17:15:54.480 | 2026-02-09T20:45:56.863 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-24v5-4jhh-vxrv |
6.4 (3.1)
|
The Passster – Password Protect Pages and Content plugin for WordPress is vulnerable to Stored Cros… | 2026-01-28T15:31:30Z | 2026-01-28T15:31:30Z |
| ghsa-wwvm-vmw2-56q8 |
3.7 (3.1)
7.0 (4.0)
|
When a user configures the NAS to retrieve UPS status or control the UPS, a non-enforced TLS certif… | 2025-12-12T03:30:20Z | 2026-01-28T15:31:29Z |
| ghsa-qf35-p6j5-89hp |
7.8 (3.1)
8.5 (4.0)
|
An uncontrolled DLL loading path vulnerability exists in AsusSoftwareManagerAgent. A local attacker… | 2026-01-06T03:31:36Z | 2026-01-28T15:31:29Z |
| ghsa-9cx6-52c2-phg6 |
5.9 (3.1)
7.0 (4.0)
|
When the user set the Notification's sender to send emails to the SMTP server via msmtp, an imprope… | 2025-12-12T03:30:19Z | 2026-01-28T15:31:28Z |
| ghsa-x94j-wr94-g6g7 |
4.3 (3.1)
|
The imwptip plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to,… | 2026-01-28T12:30:29Z | 2026-01-28T12:30:29Z |
| ghsa-q3j5-7jc9-jvf7 |
5.3 (3.1)
|
The Vzaar Media Management plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in … | 2026-01-28T12:30:29Z | 2026-01-28T12:30:29Z |
| ghsa-ppq6-cj3p-4xhv |
8.8 (3.1)
|
The Simple User Registration plugin for WordPress is vulnerable to privilege escalation in versions… | 2026-01-28T12:30:29Z | 2026-01-28T12:30:29Z |
| ghsa-p7w4-x87r-m2xc |
4.3 (3.1)
|
The Bitcoin Donate Button plugin for WordPress is vulnerable to Cross-Site Request Forgery in all v… | 2026-01-28T12:30:29Z | 2026-01-28T12:30:29Z |
| ghsa-m9wm-cxxw-876h |
8.5 (4.0)
|
Disk Pulse Enterprise v10.4.18 has an authenticated reflected XSS vulnerability in the '/monitor_di… | 2026-01-28T12:30:29Z | 2026-01-28T12:30:29Z |
| ghsa-gmxm-wmfm-4gvg |
4.4 (3.1)
|
The WP Google Ad Manager Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting v… | 2026-01-28T12:30:29Z | 2026-01-28T12:30:29Z |
| ghsa-g2xg-qw63-fpx3 |
6.9 (4.0)
|
Stored Cross-Site Scripting (XSS) vulnerability in the PDF file upload functionality of Live Helper… | 2026-01-28T12:30:29Z | 2026-01-28T12:30:29Z |
| ghsa-95g8-rf6q-22v9 |
7.5 (3.1)
|
The Frontend File Manager Plugin for WordPress is vulnerable to unauthorized file sharing due to a … | 2026-01-28T12:30:29Z | 2026-01-28T12:30:29Z |
| ghsa-4qh4-93x2-h5wr |
4.3 (3.1)
|
The Change WP URL plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions … | 2026-01-28T12:30:29Z | 2026-01-28T12:30:29Z |
| ghsa-v47p-p4r6-wcwj |
5.3 (3.1)
|
The Rupantorpay plugin for WordPress is vulnerable to unauthorized modification of data due to a mi… | 2026-01-28T12:30:28Z | 2026-01-28T12:30:28Z |
| ghsa-rc9r-w4h6-4hqv |
6.4 (3.1)
|
The BlockArt Blocks – Gutenberg Blocks, Page Builder Blocks ,WordPress Block Plugin, Sections & Tem… | 2026-01-28T12:30:28Z | 2026-01-28T12:30:28Z |
| ghsa-pgp3-jrf2-crj2 |
6.0 (4.0)
|
Vulnerability that allows a Padding Oracle Attack to be performed on the Funambol v30.0.0.20 cloud … | 2026-01-28T12:30:28Z | 2026-01-28T12:30:28Z |
| ghsa-mf42-3pgf-r88c |
8.8 (3.1)
|
The Search Atlas SEO – Premier SEO Plugin for One-Click WP Publishing & Integrated AI Optimization … | 2026-01-28T12:30:28Z | 2026-01-28T12:30:28Z |
| ghsa-cqpf-3v3x-x2f7 |
6.1 (3.1)
|
The SEO Links Interlinking plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via… | 2026-01-28T12:30:28Z | 2026-01-28T12:30:28Z |
| ghsa-chvq-5q36-924f |
7.1 (4.0)
|
Johnson Controls iSTAR Configuration Utility (ICU) has Stack-based Buffer Overflow vulnerability. T… | 2026-01-28T12:30:28Z | 2026-01-28T12:30:28Z |
| ghsa-7c75-f958-6j3m |
4.3 (3.1)
|
The Recooty – Job Widget (Old Dashboard) plugin for WordPress is vulnerable to Cross-Site Request F… | 2026-01-28T12:30:28Z | 2026-01-28T12:30:28Z |
| ghsa-vqj8-m42g-mv79 |
7.5 (3.1)
|
The VidShop – Shoppable Videos for WooCommerce plugin for WordPress is vulnerable to time-based SQL… | 2026-01-28T09:30:31Z | 2026-01-28T09:30:31Z |
| ghsa-r5hj-w659-pg8p |
7.5 (3.1)
|
SolarWinds Web Help Desk was found to be susceptible to a hardcoded credentials vulnerability that,… | 2026-01-28T09:30:30Z | 2026-01-28T09:30:31Z |
| ghsa-jm7r-g967-8pch |
9.8 (3.1)
|
SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that… | 2026-01-28T09:30:31Z | 2026-01-28T09:30:31Z |
| ghsa-h8c7-c2x8-j8gf |
7.2 (3.1)
|
The AI Engine – The Chatbot and AI Framework for WordPress plugin for WordPress is vulnerable to ar… | 2026-01-28T09:30:31Z | 2026-01-28T09:30:31Z |
| ghsa-h376-x6h9-h5f3 |
5.3 (3.1)
|
The Document Embedder – Embed PDFs, Word, Excel, and Other Files plugin for WordPress is vulnerable… | 2026-01-28T09:30:31Z | 2026-01-28T09:30:31Z |
| ghsa-cvjc-vrqh-j59p |
4.4 (3.1)
|
The Order Minimum/Maximum Amount Limits for WooCommerce plugin for WordPress is vulnerable to Store… | 2026-01-28T09:30:31Z | 2026-01-28T09:30:31Z |
| ghsa-cgx8-hg5r-9pwr |
8.8 (4.0)
|
Default credentials vulnerability exists in SuprOS product. If exploited, this could allow an authe… | 2026-01-28T09:30:31Z | 2026-01-28T09:30:31Z |
| ghsa-6x3m-wxmv-rww9 |
6.1 (3.1)
|
Jirafeau normally prevents browser preview for text files due to the possibility that for example S… | 2026-01-28T09:30:30Z | 2026-01-28T09:30:31Z |
| ghsa-585q-rrjr-7f52 |
4.4 (3.1)
|
The Ivory Search – WordPress Search Plugin plugin for WordPress is vulnerable to Stored Cross-Site … | 2026-01-28T09:30:31Z | 2026-01-28T09:30:31Z |
| ghsa-2wcq-5jhh-r94q |
5.3 (3.1)
|
The RegistrationMagic plugin for WordPress is vulnerable to Missing Authorization in versions up to… | 2026-01-28T09:30:31Z | 2026-01-28T09:30:31Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-29041 | Express.js minimalist web framework for node. Versions of Express.js prior to 4.19.0 and … | 2024-04-02T05:02:57.579467Z |
| gsd-2024-29281 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.579039Z |
| gsd-2024-29613 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.578776Z |
| gsd-2024-29456 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.578484Z |
| gsd-2024-29800 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.578237Z |
| gsd-2024-29611 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.578016Z |
| gsd-2024-29262 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.577815Z |
| gsd-2024-29368 | An issue discovered in moziloCMS v2.0 allows attackers to bypass file upload restrictions… | 2024-04-02T05:02:57.577625Z |
| gsd-2024-29162 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.577368Z |
| gsd-2024-29259 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.577117Z |
| gsd-2024-29395 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.576921Z |
| gsd-2024-29155 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.576674Z |
| gsd-2024-29651 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.576410Z |
| gsd-2024-29697 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.576212Z |
| gsd-2024-29595 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.576011Z |
| gsd-2024-29497 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.575754Z |
| gsd-2024-29534 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.575506Z |
| gsd-2024-29730 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.575254Z |
| gsd-2024-29594 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.574989Z |
| gsd-2024-29772 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-02T05:02:57.574496Z |
| gsd-2024-29670 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.573960Z |
| gsd-2024-29441 | An issue was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSIO… | 2024-04-02T05:02:57.573729Z |
| gsd-2024-29379 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.573521Z |
| gsd-2024-29066 | Windows Distributed File System (DFS) Remote Code Execution Vulnerability | 2024-04-02T05:02:57.573123Z |
| gsd-2024-29507 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.572846Z |
| gsd-2024-29501 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.572573Z |
| gsd-2024-29391 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.572320Z |
| gsd-2024-29783 | In tmu_get_tr_thresholds, there is a possible out of bounds read due to a missing bounds … | 2024-04-02T05:02:57.572122Z |
| gsd-2024-29374 | A Cross-Site Scripting (XSS) vulnerability exists in the way MOODLE 3.10.9 handles user i… | 2024-04-02T05:02:57.571806Z |
| gsd-2024-29540 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.571264Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-189779 | Malicious code in supervisor-cosmicsilence-kardashevscale-ophiuchus (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189778 | Malicious code in supervisor-config-hapi-relay (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189777 | Malicious code in supervisor-adonis-epimetheus-rimraf (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189776 | Malicious code in superposition-unuk-spectroscopy-borealis (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189775 | Malicious code in superposition-quasar-iota-mysql (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189774 | Malicious code in superposition-nucleosynthesis-mui-rigel (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189773 | Malicious code in superposition-enif-genomics-australis (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189772 | Malicious code in superposition-elara-blazar-webdriverio (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189771 | Malicious code in superposition-brane-gravity-altair (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189770 | Malicious code in supernova-webdriver-mocha-centauri-vega (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189769 | Malicious code in supernova-saturnology-asteroid-halley (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189768 | Malicious code in supernova-phylogenetics-terser-abiogenesis (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189767 | Malicious code in supernova-miranda-ophiuchus-resonance (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189766 | Malicious code in supernova-hyperion-tailwindcss-optimize-css-assets-webpack-plugin (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189765 | Malicious code in supernova-eridanus-radiant-yakutsk (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189764 | Malicious code in supernova-equinox-singularity-robotics (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189763 | Malicious code in supernova-dysonswarm-arcturus-solis (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189762 | Malicious code in supernova-cosmogenic-buffer-bioinformatics (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189761 | Malicious code in supernova-astrophysics-jekyll-webdriver-manager (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189760 | Malicious code in supernova-astrochemistry-webpack-supervisor (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189759 | Malicious code in supernova-apex-brane-callback (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189758 | Malicious code in superflare-xenon-semantic-ui-fermiparadox (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189757 | Malicious code in superflare-tectonophysics-less-deimos (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189756 | Malicious code in superflare-paleoclimatology-pavo-lacerta (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189755 | Malicious code in superflare-on-nestjs-xanthus (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189754 | Malicious code in superflare-aldebaran-phenomic-quantumfoam (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189753 | Malicious code in supercluster-webdriver-manager-pipe-alphard (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189752 | Malicious code in supercluster-vortex-blackhole-ultra (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189751 | Malicious code in supercluster-vega-ceres-meissa (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189750 | Malicious code in supercluster-neptune-juno-quantum-computing (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2022-2163 | ImageMagick: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2021-09-13T22:00:00.000+00:00 | 2024-08-05T22:00:00.000+00:00 |
| wid-sec-w-2022-1574 | ImageMagick: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2021-04-06T22:00:00.000+00:00 | 2024-08-05T22:00:00.000+00:00 |
| wid-sec-w-2022-1209 | ImageMagick: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-08-29T22:00:00.000+00:00 | 2024-08-05T22:00:00.000+00:00 |
| wid-sec-w-2022-0381 | ImageMagick: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-06-16T22:00:00.000+00:00 | 2024-08-05T22:00:00.000+00:00 |
| wid-sec-w-2022-0009 | ImageMagick: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2022-05-08T22:00:00.000+00:00 | 2024-08-05T22:00:00.000+00:00 |
| wid-sec-w-2024-1757 | Checkmk: Schwachstelle ermöglicht Privilegieneskalation | 2024-08-04T22:00:00.000+00:00 | 2024-08-04T22:00:00.000+00:00 |
| wid-sec-w-2024-1752 | Samsung Exynos: Mehrere Schwachstellen | 2024-08-04T22:00:00.000+00:00 | 2024-08-04T22:00:00.000+00:00 |
| wid-sec-w-2024-1751 | IBM Business Automation Workflow: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-08-04T22:00:00.000+00:00 | 2024-08-04T22:00:00.000+00:00 |
| wid-sec-w-2024-0293 | IBM Business Automation Workflow: Schwachstelle ermöglicht Denial of Service | 2024-02-04T23:00:00.000+00:00 | 2024-08-04T22:00:00.000+00:00 |
| wid-sec-w-2024-1749 | OpenBSD: Schwachstelle ermöglicht Denial of Service | 2024-08-01T22:00:00.000+00:00 | 2024-08-01T22:00:00.000+00:00 |
| wid-sec-w-2024-1748 | Microsoft Dynamics 365: Schwachstelle ermöglicht Privilegieneskalation | 2024-08-01T22:00:00.000+00:00 | 2024-08-01T22:00:00.000+00:00 |
| wid-sec-w-2024-1747 | Rockwell Automation ControlLogix: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-08-01T22:00:00.000+00:00 | 2024-08-01T22:00:00.000+00:00 |
| wid-sec-w-2024-1745 | IBM App Connect Enterprise: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-08-01T22:00:00.000+00:00 | 2024-08-01T22:00:00.000+00:00 |
| wid-sec-w-2024-1718 | Red Hat OpenShift (GitOps): Schwachstelle ermöglicht Denial of Service | 2024-07-28T22:00:00.000+00:00 | 2024-08-01T22:00:00.000+00:00 |
| wid-sec-w-2024-1715 | Mattermost: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-07-25T22:00:00.000+00:00 | 2024-08-01T22:00:00.000+00:00 |
| wid-sec-w-2024-1567 | Adobe Creative Cloud Produkte: Mehrere Schwachstellen | 2024-07-09T22:00:00.000+00:00 | 2024-08-01T22:00:00.000+00:00 |
| wid-sec-w-2024-0673 | Apache Tomcat: Schwachstelle ermöglicht Denial of Service | 2021-09-15T22:00:00.000+00:00 | 2024-08-01T22:00:00.000+00:00 |
| wid-sec-w-2023-2540 | ImageMagick: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2023-10-03T22:00:00.000+00:00 | 2024-08-01T22:00:00.000+00:00 |
| wid-sec-w-2022-1870 | Apache Tomcat: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes | 2020-05-21T22:00:00.000+00:00 | 2024-08-01T22:00:00.000+00:00 |
| wid-sec-w-2022-1868 | Apache Tomcat: Schwachstelle ermöglicht Privilegieneskalation | 2022-01-25T23:00:00.000+00:00 | 2024-08-01T22:00:00.000+00:00 |
| wid-sec-w-2022-1099 | Apache Tomcat: Mehrere Schwachstellen | 2021-03-01T23:00:00.000+00:00 | 2024-08-01T22:00:00.000+00:00 |
| wid-sec-w-2022-0467 | Apache Tomcat: Schwachstelle ermöglicht Denial of Service | 2022-05-11T22:00:00.000+00:00 | 2024-08-01T22:00:00.000+00:00 |
| wid-sec-w-2024-1742 | Dell BSAFE: Schwachstelle ermöglicht Denial of Service | 2024-07-31T22:00:00.000+00:00 | 2024-07-31T22:00:00.000+00:00 |
| wid-sec-w-2024-1741 | Dell integrated Dell Remote Access Controller: Mehrere Schwachstellen ermöglichen Codeausführung und DOS | 2024-07-31T22:00:00.000+00:00 | 2024-07-31T22:00:00.000+00:00 |
| wid-sec-w-2024-1739 | Elasticsearch: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-07-31T22:00:00.000+00:00 | 2024-07-31T22:00:00.000+00:00 |
| wid-sec-w-2024-1738 | xwiki: Mehrere Schwachstellen | 2024-07-31T22:00:00.000+00:00 | 2024-07-31T22:00:00.000+00:00 |
| wid-sec-w-2024-1730 | Broadcom Brocade Switch: Mehrere Schwachstellen | 2024-07-30T22:00:00.000+00:00 | 2024-07-31T22:00:00.000+00:00 |
| wid-sec-w-2024-1527 | Exim: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-07-04T22:00:00.000+00:00 | 2024-07-31T22:00:00.000+00:00 |
| wid-sec-w-2024-1434 | Red Hat Enterprise Linux (pki and Libreswan): Mehrere Schwachstellen | 2024-06-23T22:00:00.000+00:00 | 2024-07-31T22:00:00.000+00:00 |
| wid-sec-w-2023-3059 | Golang Go: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-12-05T23:00:00.000+00:00 | 2024-07-31T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:4447 | Red Hat Security Advisory: xmlrpc-c security update | 2025-05-05T01:27:28+00:00 | 2026-01-22T22:10:47+00:00 |
| rhsa-2025:4449 | Red Hat Security Advisory: xmlrpc-c security update | 2025-05-05T01:57:18+00:00 | 2026-01-22T22:10:45+00:00 |
| rhsa-2025:4048 | Red Hat Security Advisory: xmlrpc-c security update | 2025-04-23T11:47:20+00:00 | 2026-01-22T22:10:44+00:00 |
| rhsa-2025:7512 | Red Hat Security Advisory: expat security update | 2025-05-13T17:19:47+00:00 | 2026-01-22T22:10:41+00:00 |
| rhsa-2025:3531 | Red Hat Security Advisory: expat security update | 2025-04-02T14:55:22+00:00 | 2026-01-22T22:10:39+00:00 |
| rhsa-2025:3913 | Red Hat Security Advisory: expat security update | 2025-04-15T16:28:28+00:00 | 2026-01-22T22:10:37+00:00 |
| rhsa-2025:7444 | Red Hat Security Advisory: expat security update | 2025-05-13T14:13:46+00:00 | 2026-01-22T22:10:36+00:00 |
| rhsa-2024:7427 | Red Hat Security Advisory: kpatch-patch-4_18_0-305_120_1 and kpatch-patch-4_18_0-305_138_1 security update | 2024-10-01T00:36:08+00:00 | 2026-01-22T21:30:18+00:00 |
| rhsa-2024:7003 | Red Hat Security Advisory: kernel-rt security update | 2024-09-24T00:40:57+00:00 | 2026-01-22T21:30:15+00:00 |
| rhsa-2024:7002 | Red Hat Security Advisory: kernel security update | 2024-09-24T01:11:01+00:00 | 2026-01-22T21:30:12+00:00 |
| rhsa-2024:5858 | Red Hat Security Advisory: kpatch-patch-5_14_0-70_85_1 security update | 2024-08-26T11:25:15+00:00 | 2026-01-22T21:30:10+00:00 |
| rhsa-2024:5522 | Red Hat Security Advisory: kpatch-patch-4_18_0-553 security update | 2024-08-20T09:09:52+00:00 | 2026-01-22T21:30:07+00:00 |
| rhsa-2024:5520 | Red Hat Security Advisory: kpatch-patch-4_18_0-477_43_1 security update | 2024-08-19T01:48:43+00:00 | 2026-01-22T21:30:07+00:00 |
| rhsa-2024:4831 | Red Hat Security Advisory: kernel-rt security update | 2024-07-24T14:03:57+00:00 | 2026-01-22T21:30:01+00:00 |
| rhsa-2024:4823 | Red Hat Security Advisory: kernel security update | 2024-07-24T13:20:26+00:00 | 2026-01-22T21:30:00+00:00 |
| rhsa-2024:4713 | Red Hat Security Advisory: kpatch-patch security update | 2024-07-23T00:22:56+00:00 | 2026-01-22T21:30:00+00:00 |
| rhsa-2024:4548 | Red Hat Security Advisory: kpatch-patch-5_14_0-284_48_1 security update | 2024-07-15T16:06:36+00:00 | 2026-01-22T21:29:59+00:00 |
| rhsa-2024:4547 | Red Hat Security Advisory: kpatch-patch-4_18_0-372_91_1 security update | 2024-07-15T16:08:31+00:00 | 2026-01-22T21:29:58+00:00 |
| rhsa-2024:4447 | Red Hat Security Advisory: kernel security update | 2024-07-10T00:18:34+00:00 | 2026-01-22T21:29:55+00:00 |
| rhsa-2024:11486 | Red Hat Security Advisory: kernel security update | 2024-12-19T00:58:56+00:00 | 2026-01-22T21:29:54+00:00 |
| rhsa-2025:9750 | Red Hat Security Advisory: OpenShift Container Platform 4.19.2 bug fix and security update | 2025-07-01T02:35:49+00:00 | 2026-01-22T21:11:36+00:00 |
| rhsa-2025:9725 | Red Hat Security Advisory: OpenShift Container Platform 4.18.19 bug fix and security update | 2025-07-02T03:57:02+00:00 | 2026-01-22T21:11:36+00:00 |
| rhsa-2025:9336 | Red Hat Security Advisory: glibc security update | 2025-06-23T03:45:47+00:00 | 2026-01-22T21:11:35+00:00 |
| rhsa-2025:9028 | Red Hat Security Advisory: A Subscription Management tool for finding and reporting Red Hat product usage | 2025-06-12T15:31:37+00:00 | 2026-01-22T21:11:35+00:00 |
| rhsa-2025:8796 | Red Hat Security Advisory: kernel security update | 2025-06-11T01:01:42+00:00 | 2026-01-22T21:11:35+00:00 |
| rhsa-2025:8686 | Red Hat Security Advisory: glibc security update | 2025-06-09T14:48:41+00:00 | 2026-01-22T21:11:35+00:00 |
| rhsa-2025:8655 | Red Hat Security Advisory: glibc security update | 2025-06-09T09:11:34+00:00 | 2026-01-22T21:11:34+00:00 |
| rhsa-2025:8514 | Red Hat Security Advisory: nodejs:20 security update | 2025-06-04T13:51:06+00:00 | 2026-01-22T21:11:34+00:00 |
| rhsa-2025:8468 | Red Hat Security Advisory: nodejs:20 security update | 2025-06-03T19:53:49+00:00 | 2026-01-22T21:11:33+00:00 |
| rhsa-2025:10220 | Red Hat Security Advisory: glibc security update | 2025-07-02T12:26:46+00:00 | 2026-01-22T21:11:19+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-47174 | Microsoft Excel Remote Code Execution Vulnerability | 2025-06-10T00:00:00.000Z | 2025-06-10T00:00:00.000Z |
| msrc_cve-2025-47173 | Microsoft Office Remote Code Execution Vulnerability | 2025-06-10T00:00:00.000Z | 2025-06-10T00:00:00.000Z |
| msrc_cve-2025-47171 | Microsoft Outlook Remote Code Execution Vulnerability | 2025-06-10T00:00:00.000Z | 2025-06-10T00:00:00.000Z |
| msrc_cve-2025-47170 | Microsoft Word Remote Code Execution Vulnerability | 2025-06-10T00:00:00.000Z | 2025-06-10T00:00:00.000Z |
| msrc_cve-2025-47169 | Microsoft Word Remote Code Execution Vulnerability | 2025-06-10T00:00:00.000Z | 2025-06-10T00:00:00.000Z |
| msrc_cve-2025-47168 | Microsoft Word Remote Code Execution Vulnerability | 2025-06-10T00:00:00.000Z | 2025-06-10T00:00:00.000Z |
| msrc_cve-2025-47167 | Microsoft Office Remote Code Execution Vulnerability | 2025-06-10T00:00:00.000Z | 2025-06-10T00:00:00.000Z |
| msrc_cve-2025-47166 | Microsoft SharePoint Server Remote Code Execution Vulnerability | 2025-06-10T00:00:00.000Z | 2025-06-10T00:00:00.000Z |
| msrc_cve-2025-47165 | Microsoft Excel Remote Code Execution Vulnerability | 2025-06-10T00:00:00.000Z | 2025-06-10T00:00:00.000Z |
| msrc_cve-2025-47164 | Microsoft Office Remote Code Execution Vulnerability | 2025-06-10T00:00:00.000Z | 2025-06-10T00:00:00.000Z |
| msrc_cve-2025-47163 | Microsoft SharePoint Server Remote Code Execution Vulnerability | 2025-06-10T00:00:00.000Z | 2025-06-10T00:00:00.000Z |
| msrc_cve-2025-47162 | Microsoft Office Remote Code Execution Vulnerability | 2025-06-10T00:00:00.000Z | 2025-06-10T00:00:00.000Z |
| msrc_cve-2025-47160 | Windows Shortcut Files Security Feature Bypass Vulnerability | 2025-06-10T00:00:00.000Z | 2025-06-10T00:00:00.000Z |
| msrc_cve-2025-33075 | Windows Installer Elevation of Privilege Vulnerability | 2025-06-10T00:00:00.000Z | 2025-06-10T00:00:00.000Z |
| msrc_cve-2025-33071 | Windows KDC Proxy Service (KPSSVC) Remote Code Execution Vulnerability | 2025-06-10T00:00:00.000Z | 2025-06-10T00:00:00.000Z |
| msrc_cve-2025-33070 | Windows Netlogon Elevation of Privilege Vulnerability | 2025-06-10T00:00:00.000Z | 2025-06-10T00:00:00.000Z |
| msrc_cve-2025-33068 | Windows Standards-Based Storage Management Service Denial of Service Vulnerability | 2025-06-10T00:00:00.000Z | 2025-06-10T00:00:00.000Z |
| msrc_cve-2025-33067 | Windows Task Scheduler Elevation of Privilege Vulnerability | 2025-06-10T00:00:00.000Z | 2025-06-10T00:00:00.000Z |
| msrc_cve-2025-33066 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 2025-06-10T00:00:00.000Z | 2025-06-10T00:00:00.000Z |
| msrc_cve-2025-33065 | Windows Storage Management Provider Information Disclosure Vulnerability | 2025-06-10T00:00:00.000Z | 2025-06-10T00:00:00.000Z |
| msrc_cve-2025-33064 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 2025-06-10T00:00:00.000Z | 2025-06-10T00:00:00.000Z |
| msrc_cve-2025-33063 | Windows Storage Management Provider Information Disclosure Vulnerability | 2025-06-10T00:00:00.000Z | 2025-06-10T00:00:00.000Z |
| msrc_cve-2025-33062 | Windows Storage Management Provider Information Disclosure Vulnerability | 2025-06-10T00:00:00.000Z | 2025-06-10T00:00:00.000Z |
| msrc_cve-2025-33061 | Windows Storage Management Provider Information Disclosure Vulnerability | 2025-06-10T00:00:00.000Z | 2025-06-10T00:00:00.000Z |
| msrc_cve-2025-33060 | Windows Storage Management Provider Information Disclosure Vulnerability | 2025-06-10T00:00:00.000Z | 2025-06-10T00:00:00.000Z |
| msrc_cve-2025-33059 | Windows Storage Management Provider Information Disclosure Vulnerability | 2025-06-10T00:00:00.000Z | 2025-06-10T00:00:00.000Z |
| msrc_cve-2025-33058 | Windows Storage Management Provider Information Disclosure Vulnerability | 2025-06-10T00:00:00.000Z | 2025-06-10T00:00:00.000Z |
| msrc_cve-2025-33057 | Windows Local Security Authority (LSA) Denial of Service Vulnerability | 2025-06-10T00:00:00.000Z | 2025-06-10T00:00:00.000Z |
| msrc_cve-2025-33056 | Windows Local Security Authority (LSA) Denial of Service Vulnerability | 2025-06-10T00:00:00.000Z | 2025-06-10T00:00:00.000Z |
| msrc_cve-2025-33055 | Windows Storage Management Provider Information Disclosure Vulnerability | 2025-06-10T00:00:00.000Z | 2025-06-10T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202202-0449 | Out-of-bounds read in the Intel(R) Trace Analyzer and Collector before version 2021.5 may… | 2025-05-07T19:52:26.272000Z |
| var-202210-1476 | A memory corruption issue was addressed with improved state management. This issue is fix… | 2025-05-07T19:50:14.682000Z |
| var-202210-1494 | The issue was addressed with improved memory handling. This issue is fixed in iOS 16, mac… | 2025-05-07T19:49:15.215000Z |
| var-202210-1478 | A logic issue was addressed with improved state management. This issue is fixed in macOS … | 2025-05-07T19:48:55.007000Z |
| var-202210-1965 | The issue was addressed with improved bounds checks. This issue is fixed in tvOS 16.1, iO… | 2025-05-07T19:46:34.314000Z |
| var-202202-0525 | Improper input validation for some Intel(R) PROSet/Wireless WiFi in UEFI may allow an una… | 2025-05-07T19:45:57.708000Z |
| var-202107-1506 | Open vSwitch (aka openvswitch) 2.11.0 through 2.15.0 has a use-after-free in decode_NXAST… | 2025-05-07T19:43:27.945000Z |
| var-202205-0823 | Improper input validation for the Intel(R) Manageability Commander before version 2.2 may… | 2025-05-07T19:41:17.626000Z |
| var-202202-0506 | Improper input validation in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple… | 2025-05-07T19:39:45.348000Z |
| var-202202-0516 | Improper Validation of Specified Index, Position, or Offset in Input in firmware for some… | 2025-05-07T19:38:36.440000Z |
| var-202208-0868 | Improper access control in the firmware for some Intel(R) 700 and 722 Series Ethernet Con… | 2025-05-07T19:33:58.143000Z |
| var-202211-0166 | Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the wpapsk_cryp… | 2025-05-05T23:28:34.325000Z |
| var-202211-0208 | D-Link DIR-823G v1.0.2 was found to contain a command injection vulnerability in the func… | 2025-05-05T23:28:34.299000Z |
| var-202211-0263 | Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the shareSpeed … | 2025-05-05T23:18:34.318000Z |
| var-202211-0230 | Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the timeZone pa… | 2025-05-05T23:15:56.256000Z |
| var-202211-0107 | Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the list parame… | 2025-05-05T23:13:21.781000Z |
| var-202211-0256 | Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the firewallEn … | 2025-05-05T23:11:49.497000Z |
| var-202302-0479 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2025-05-05T22:55:16.472000Z |
| var-201903-0122 | A flaw was found in the way civetweb frontend was handling requests for ceph RGW server w… | 2025-05-05T22:10:42.165000Z |
| var-202210-1489 | An out-of-bounds write issue was addressed with improved bounds checking. This issue is f… | 2025-05-05T20:57:28.884000Z |
| var-202211-0106 | Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the devName par… | 2025-05-03T23:34:56.560000Z |
| var-202211-0360 | ELAN Miniport touchpad Windows driver before 24.21.51.2, as used in PC hardware from mult… | 2025-05-03T23:31:30.059000Z |
| var-202211-0207 | Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the time parame… | 2025-05-03T23:29:00.768000Z |
| var-202211-0164 | Tenda AC23 V16.03.07.45_cn was discovered to contain a stack overflow via the schedStartT… | 2025-05-03T23:27:49.735000Z |
| var-202411-1064 | Netgear R8500 v1.0.2.160 and R7000P v1.3.3.154 were discovered to multiple stack overflow… | 2025-05-02T23:07:52.612000Z |
| var-200610-0509 | Cross-site request forgery (CSRF) vulnerability in the administrative interface for the T… | 2025-05-02T23:07:16.162000Z |
| var-202211-0490 | In Modem 4G RRC, there is a possible system crash due to improper input validation. This … | 2025-05-02T23:05:44.994000Z |
| var-202310-0004 | An information disclosure in Milesight UR5X, UR32L, UR32, UR35, UR41 before v35.3.0.7 all… | 2025-05-02T23:05:43.584000Z |
| var-202402-2928 | A Null pointer dereference in usr/sbin/httpd in ASUS AC68U 3.0.0.4.384.82230 allows remot… | 2025-05-02T23:01:35.398000Z |
| var-202211-0452 | The DRM module has a vulnerability in verifying the secure memory attributes. Successful … | 2025-05-02T22:59:55.628000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2023:4905-1 | Security update for openssh | 2023-12-19T12:32:34Z | 2023-12-19T12:32:34Z |
| suse-su-2023:4904-1 | Security update for openssh | 2023-12-19T12:28:51Z | 2023-12-19T12:28:51Z |
| suse-su-2023:4903-1 | Security update for openssh | 2023-12-19T12:25:02Z | 2023-12-19T12:25:02Z |
| suse-su-2023:4902-1 | Security update for openssh | 2023-12-19T12:10:16Z | 2023-12-19T12:10:16Z |
| suse-su-2023:4901-1 | Security update for avahi | 2023-12-19T10:26:59Z | 2023-12-19T10:26:59Z |
| suse-su-2023:4895-1 | Security update for libsass | 2023-12-18T17:04:19Z | 2023-12-18T17:04:19Z |
| suse-su-2023:4893-1 | Security update for freerdp | 2023-12-18T15:34:34Z | 2023-12-18T15:34:34Z |
| suse-su-2023:4892-1 | Security update for ncurses | 2023-12-18T15:33:34Z | 2023-12-18T15:33:34Z |
| suse-su-2023:4891-1 | Security update for ncurses | 2023-12-18T15:32:17Z | 2023-12-18T15:32:17Z |
| suse-su-2023:4883-1 | Security update for the Linux Kernel | 2023-12-15T10:41:00Z | 2023-12-15T10:41:00Z |
| suse-su-2023:4882-1 | Security update for the Linux Kernel | 2023-12-15T10:40:45Z | 2023-12-15T10:40:45Z |
| suse-su-2023:4875-1 | Security update for gstreamer-plugins-bad | 2023-12-14T19:05:55Z | 2023-12-14T19:05:55Z |
| suse-su-2023:4874-1 | Security update for gstreamer-plugins-bad | 2023-12-14T19:04:28Z | 2023-12-14T19:04:28Z |
| suse-su-2023:4873-1 | Security update for xrdp | 2023-12-14T18:52:09Z | 2023-12-14T18:52:09Z |
| suse-su-2023:4872-1 | Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP4) | 2023-12-14T18:33:33Z | 2023-12-14T18:33:33Z |
| suse-su-2023:4871-1 | Security update for the Linux Kernel (Live Patch 27 for SLE 15 SP3) | 2023-12-14T16:33:42Z | 2023-12-14T16:33:42Z |
| suse-su-2023:4870-1 | Security update for cosign | 2023-12-14T15:28:47Z | 2023-12-14T15:28:47Z |
| suse-su-2023:4869-1 | Security update for tiff | 2023-12-14T15:26:46Z | 2023-12-14T15:26:46Z |
| suse-su-2023:4868-1 | Security update for tracker-miners | 2023-12-14T15:24:04Z | 2023-12-14T15:24:04Z |
| suse-su-2023:4866-1 | Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP2) | 2023-12-14T15:03:37Z | 2023-12-14T15:03:37Z |
| suse-su-2023:4867-1 | Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP5) | 2023-12-14T14:04:15Z | 2023-12-14T14:04:15Z |
| suse-su-2023:4863-1 | Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP5) | 2023-12-14T14:04:05Z | 2023-12-14T14:04:05Z |
| suse-su-2023:4862-1 | Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP3) | 2023-12-14T14:03:53Z | 2023-12-14T14:03:53Z |
| suse-su-2023:4848-1 | Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP5) | 2023-12-14T13:06:05Z | 2023-12-14T13:06:05Z |
| suse-su-2023:4849-1 | Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP4) | 2023-12-14T12:04:03Z | 2023-12-14T12:04:03Z |
| suse-su-2023:4847-1 | Security update for the Linux Kernel (Live Patch 39 for SLE 12 SP5) | 2023-12-14T12:03:43Z | 2023-12-14T12:03:43Z |
| suse-su-2023:4844-1 | Security update for python-cryptography | 2023-12-14T11:23:23Z | 2023-12-14T11:23:23Z |
| suse-su-2023:4843-1 | Security update for python3-cryptography | 2023-12-14T11:22:51Z | 2023-12-14T11:22:51Z |
| suse-su-2023:4842-1 | Security update for python-cryptography | 2023-12-14T11:22:17Z | 2023-12-14T11:22:17Z |
| suse-su-2023:4841-1 | Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP5) | 2023-12-14T10:35:02Z | 2023-12-14T10:35:02Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:10268-1 | apache2-2.4.23-4.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10267-1 | audiofile-0.3.6-9.5 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10266-1 | libsmi-0.4.8-24.8 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10265-1 | libsrtp-devel-1.5.4-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10264-1 | vsftpd-3.0.3-7.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10263-1 | wget-1.18-2.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10262-1 | jakarta-commons-fileupload-1.1.1-125.11 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10261-1 | wesnoth-1.12.6-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10260-1 | apache2-mod_mono-3.12-1.7 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10259-1 | vorbis-tools-1.4.0-22.6 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10258-1 | pidgin-otr-4.0.2-1.5 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10257-1 | librsync-devel-1.0.0-2.8 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10256-1 | postgresql93-9.3.15-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10255-1 | libXvMC-devel-1.0.10-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10254-1 | gcab-0.7-1.5 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10253-1 | dpkg-1.18.10-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10252-1 | audit-devel-2.5-1.82 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10251-1 | tcpreplay-4.1.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10250-1 | libXRes1-1.0.7-5.7 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10249-1 | libgit2-24-0.24.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10248-1 | grep-2.27-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10247-1 | nodejs4-4.7.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10246-1 | libpcsclite1-1.8.18-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10245-1 | kvirc-4.2.0-6.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10244-1 | accountsservice-0.6.43-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10243-1 | ffmpeg-3.2.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10242-1 | graphite2-1.3.9-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10241-1 | libpulse-devel-32bit-9.0-2.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10240-1 | exif-0.6.21-8.7 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10239-1 | perl-LWP-Protocol-https-6.06-1.4 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-17485 | Microsoft Word代码执行漏洞(CNVD-2025-17485) | 2023-04-13 | 2025-08-04 |
| cnvd-2025-17484 | Microsoft Word安全功能绕过漏洞(CNVD-2025-17484) | 2023-05-14 | 2025-08-04 |
| cnvd-2025-17483 | Microsoft Word信息泄露漏洞(CNVD-2025-17483) | 2023-09-15 | 2025-08-04 |
| cnvd-2025-17482 | Microsoft Word代码执行漏洞(CNVD-2025-17482) | 2023-09-15 | 2025-08-04 |
| cnvd-2025-17481 | Microsoft WordPad信息泄露漏洞 | 2023-10-13 | 2025-08-04 |
| cnvd-2025-17480 | Microsoft Word信息泄露漏洞(CNVD-2025-17480) | 2023-12-14 | 2025-08-04 |
| cnvd-2025-17479 | Microsoft Word代码执行漏洞(CNVD-2025-17479) | 2024-02-23 | 2025-08-04 |
| cnvd-2025-17478 | Microsoft Word安全功能绕过漏洞(CNVD-2025-17478) | 2024-11-15 | 2025-08-04 |
| cnvd-2025-17477 | Microsoft Word代码执行漏洞(CNVD-2025-17477) | 2025-02-14 | 2025-08-04 |
| cnvd-2025-17476 | Microsoft Word代码执行漏洞(CNVD-2025-17476) | 2025-06-17 | 2025-08-04 |
| cnvd-2025-17475 | Microsoft Word代码执行漏洞(CNVD-2025-17475) | 2025-06-17 | 2025-08-04 |
| cnvd-2025-17474 | Microsoft Word代码执行漏洞(CNVD-2025-17474) | 2025-06-17 | 2025-08-04 |
| cnvd-2025-17473 | Microsoft Word代码执行漏洞(CNVD-2025-17473) | 2025-06-17 | 2025-08-04 |
| cnvd-2025-17472 | Microsoft Word代码执行漏洞(CNVD-2025-17472) | 2025-06-17 | 2025-08-04 |
| cnvd-2025-17471 | Microsoft Word代码执行漏洞(CNVD-2025-17471) | 2025-07-21 | 2025-08-04 |
| cnvd-2025-17436 | TOTOLINK A702R缓冲区溢出漏洞 | 2025-07-28 | 2025-08-01 |
| cnvd-2025-17401 | D-Link DIR-619L缓冲区溢出漏洞 | 2023-10-13 | 2025-08-01 |
| cnvd-2025-17400 | D-Link DIR-619L formWPS函数缓冲区溢出漏洞 | 2024-05-22 | 2025-08-01 |
| cnvd-2025-17399 | D-Link DIR-619L formWlanSetup_Wizard函数缓冲区溢出漏洞 | 2024-05-22 | 2025-08-01 |
| cnvd-2025-17398 | D-Link DIR-619L formTcpipSetup函数缓冲区溢出漏洞 | 2024-05-22 | 2025-08-01 |
| cnvd-2025-17397 | DELL NativeEdge信息泄露漏洞 | 2024-12-30 | 2025-08-01 |
| cnvd-2025-17396 | D-Link DIR-619L formEasySetTimezone函数缓冲区溢出漏洞 | 2024-10-13 | 2025-08-01 |
| cnvd-2025-17395 | D-Link DIR-619L formEasySetPassword函数缓冲区溢出漏洞 | 2024-10-13 | 2025-08-01 |
| cnvd-2025-17394 | D-Link DIR-619L formDeviceReboot函数缓冲区溢出漏洞 | 2024-10-13 | 2025-08-01 |
| cnvd-2025-17393 | D-Link DIR-619L formAdvNetwork函数缓冲区溢出漏洞 | 2024-10-13 | 2025-08-01 |
| cnvd-2025-17392 | D-Link DIR-619L formAdvFirewall函数缓冲区溢出漏洞 | 2024-10-13 | 2025-08-01 |
| cnvd-2025-17391 | D-Link DIR-605L缓冲区溢出漏洞 | 2024-10-08 | 2025-08-01 |
| cnvd-2025-17390 | D-Link DIR-605L formWlanSetup函数缓冲区溢出漏洞 | 2024-10-13 | 2025-08-01 |
| cnvd-2025-17389 | D-Link DIR-605L formSetWanPPTP函数缓冲区溢出漏洞 | 2024-10-13 | 2025-08-01 |
| cnvd-2025-17388 | D-Link DIR-605L缓冲区溢出漏洞 | 2024-10-13 | 2025-08-01 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2020-avi-408 | Multiples vulnérabilités dans Mozilla Thunderbird | 2020-07-03T00:00:00.000000 | 2020-07-03T00:00:00.000000 |
| certfr-2020-avi-407 | Vulnérabilité dans Zimbra | 2020-07-03T00:00:00.000000 | 2020-07-03T00:00:00.000000 |
| certfr-2020-avi-404 | Vulnérabilité dans les commutateurs Cisco | 2020-07-02T00:00:00.000000 | 2020-07-03T00:00:00.000000 |
| certfr-2020-avi-400 | Multiples vulnérabilités dans Microsoft Windows | 2020-07-01T00:00:00.000000 | 2020-07-03T00:00:00.000000 |
| certfr-2020-avi-406 | Multiples vulnérabilités dans Samba | 2020-07-02T00:00:00.000000 | 2020-07-02T00:00:00.000000 |
| certfr-2020-avi-405 | Multiples vulnérabilités dans Mozilla Firefox | 2020-07-02T00:00:00.000000 | 2020-07-02T00:00:00.000000 |
| certfr-2020-avi-403 | Vulnérabilité dans Wireshark | 2020-07-02T00:00:00.000000 | 2020-07-02T00:00:00.000000 |
| certfr-2020-avi-402 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2020-07-02T00:00:00.000000 | 2020-07-02T00:00:00.000000 |
| certfr-2020-avi-401 | Multiples vulnérabilités dans GitLab | 2020-07-02T00:00:00.000000 | 2020-07-02T00:00:00.000000 |
| certfr-2020-avi-398 | Vulnérabilité dans Palo Alto PAN-OS | 2020-06-30T00:00:00.000000 | 2020-06-30T00:00:00.000000 |
| certfr-2020-avi-397 | Vulnérabilité dans Apache Tomcat | 2020-06-30T00:00:00.000000 | 2020-06-30T00:00:00.000000 |
| certfr-2020-avi-396 | Vulnérabilité dans le noyau Linux de Red Hat | 2020-06-30T00:00:00.000000 | 2020-06-30T00:00:00.000000 |
| certfr-2020-avi-395 | Multiples vulnérabilités dans les produits Fortinet | 2020-06-30T00:00:00.000000 | 2020-06-30T00:00:00.000000 |
| certfr-2020-avi-394 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2020-06-29T00:00:00.000000 | 2020-06-29T00:00:00.000000 |
| certfr-2020-avi-393 | Vulnérabilité dans Squid | 2020-06-29T00:00:00.000000 | 2020-06-29T00:00:00.000000 |
| certfr-2020-avi-392 | Multiples vulnérabilités dans le noyau linux d'Ubuntu | 2020-06-26T00:00:00.000000 | 2020-06-26T00:00:00.000000 |
| certfr-2020-avi-391 | Vulnérabilité dans Mozilla Firefox pour iOS | 2020-06-26T00:00:00.000000 | 2020-06-26T00:00:00.000000 |
| certfr-2020-avi-390 | Multiples vulnérabilités dans Google Chrome OS | 2020-06-25T00:00:00.000000 | 2020-06-25T00:00:00.000000 |
| certfr-2020-avi-389 | Multiples vulnérabilités dans les produits VMware | 2020-06-24T00:00:00.000000 | 2020-06-24T00:00:00.000000 |
| certfr-2020-avi-388 | Vulnérabilité dans le noyau Linux de Red Hat | 2020-06-23T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| certfr-2020-avi-387 | Multiples vulnérabilités dans Google Chrome | 2020-06-23T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| certfr-2020-avi-386 | Vulnérabilité dans Fortinet FortiAnalyzer | 2020-06-23T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| certfr-2020-avi-385 | Multiples vulnérabilités dans les produits Magento | 2020-06-23T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| certfr-2020-avi-383 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2020-06-22T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| certfr-2020-avi-384 | Multiples vulnérabilités dans les produits Fortinet | 2020-06-22T00:00:00.000000 | 2020-06-22T00:00:00.000000 |
| certfr-2020-avi-382 | Multiples vulnérabilités dans BIND | 2020-06-19T00:00:00.000000 | 2020-06-19T00:00:00.000000 |
| certfr-2020-avi-381 | Multiples vulnérabilités dans Drupal | 2020-06-19T00:00:00.000000 | 2020-06-19T00:00:00.000000 |
| certfr-2020-avi-380 | Vulnérabilité dans Ruby on Rails | 2020-06-19T00:00:00.000000 | 2020-06-19T00:00:00.000000 |
| certfr-2020-avi-379 | Vulnérabilité dans VMware Tools pour macOS | 2020-06-19T00:00:00.000000 | 2020-06-19T00:00:00.000000 |
| certfr-2020-avi-378 | Multiples vulnérabilités dans Google Chrome OS | 2020-06-19T00:00:00.000000 | 2020-06-19T00:00:00.000000 |