Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-62040 |
7.1 (3.1)
|
WordPress YOP Poll plugin <= 6.5.37 - Cross Site Scrip… |
YOP |
YOP Poll |
2025-11-06T15:55:38.092Z | 2026-01-20T14:28:13.427Z |
| CVE-2025-62041 |
7.1 (3.1)
|
WordPress TheGem (Elementor) theme <= 5.10.5.1 - Cross… |
CodexThemes |
TheGem (Elementor) |
2025-11-06T15:55:38.770Z | 2026-01-20T14:28:13.398Z |
| CVE-2025-62038 |
6.5 (3.1)
|
WordPress MeetingHub plugin <= 1.23.9 - Sensitive Data… |
Sovlix |
MeetingHub |
2025-11-06T15:55:36.094Z | 2026-01-20T14:28:13.390Z |
| CVE-2025-62036 |
7.1 (3.1)
|
WordPress Togo theme < 1.0.4 - Cross Site Scripting (X… |
uxper |
Togo |
2025-11-06T15:55:32.766Z | 2026-01-20T14:28:13.319Z |
| CVE-2025-62039 |
7.5 (3.1)
|
WordPress AI ChatBot with ChatGPT and Content Generato… |
Ays Pro |
AI ChatBot with ChatGPT and Content Generator by AYS |
2025-11-06T15:55:37.380Z | 2026-01-20T14:28:13.293Z |
| CVE-2025-62037 |
6.5 (3.1)
|
WordPress Togo theme < 1.0.4 - Broken Access Control v… |
uxper |
Togo |
2025-11-06T15:55:34.720Z | 2026-01-20T14:28:13.293Z |
| CVE-2025-62035 |
8.8 (3.1)
|
WordPress Togo theme < 1.0.4 - PHP Object Injection vu… |
uxper |
Togo |
2025-11-06T15:55:31.398Z | 2026-01-20T14:28:13.288Z |
| CVE-2025-62014 |
8.1 (3.1)
|
WordPress ITok theme <= 1.1.42 - Local File Inclusion … |
ApusTheme |
ITok |
2025-11-06T15:55:23.874Z | 2026-01-20T14:28:13.268Z |
| CVE-2025-62034 |
8.8 (3.1)
|
WordPress Togo theme < 1.0.4 - Privilege Escalation vu… |
uxper |
Togo |
2025-11-06T15:55:30.572Z | 2026-01-20T14:28:13.109Z |
| CVE-2025-62018 |
5.3 (3.1)
|
WordPress Kallyas theme <= 4.22.0 - Broken Access Cont… |
hogash |
Kallyas |
2025-11-06T15:55:26.361Z | 2026-01-20T14:28:13.058Z |
| CVE-2025-62019 |
6.5 (3.1)
|
WordPress Recipe Card Blocks for Gutenberg & Elementor… |
WPZOOM |
Recipe Card Blocks for Gutenberg & Elementor |
2025-10-22T14:32:49.208Z | 2026-01-20T14:28:13.056Z |
| CVE-2025-62009 |
4.3 (3.1)
|
WordPress UPC/EAN/GTIN Code Generator plugin <= 2.0.2 … |
Dmitry V. (CEO of "UKR Solution") |
UPC/EAN/GTIN Code Generator |
2025-10-22T14:32:48.527Z | 2026-01-20T14:28:13.052Z |
| CVE-2025-62031 |
7.1 (3.1)
|
WordPress tagDiv Composer plugin <= 5.4.1 - Cross Site… |
tagDiv |
tagDiv Composer |
2025-11-06T15:55:28.516Z | 2026-01-20T14:28:13.050Z |
| CVE-2025-60245 |
9.8 (3.1)
|
WordPress WP User Manager plugin <= 2.9.12 - PHP Objec… |
WP User Manager |
WP User Manager |
2025-11-06T15:55:19.859Z | 2026-01-20T14:28:13.047Z |
| CVE-2025-62029 |
8.1 (3.1)
|
WordPress Grevo theme <= 2.4 - Local File Inclusion vu… |
themesion |
Grevo |
2025-10-22T14:32:51.220Z | 2026-01-20T14:28:13.045Z |
| CVE-2025-62016 |
9.9 (3.1)
|
WordPress Kallyas theme <= 4.22.0 - Arbitrary File Upl… |
hogash |
Kallyas |
2025-11-06T15:55:24.586Z | 2026-01-20T14:28:13.045Z |
| CVE-2025-62008 |
8.8 (3.1)
|
WordPress Product Table For WooCommerce plugin <= 1.2.… |
acowebs |
Product Table For WooCommerce |
2025-10-22T14:32:48.273Z | 2026-01-20T14:28:13.044Z |
| CVE-2025-62033 |
6.5 (3.1)
|
WordPress Togo theme < 1.0.4 - Broken Access Control v… |
uxper |
Togo |
2025-11-06T15:55:29.843Z | 2026-01-20T14:28:13.043Z |
| CVE-2025-62032 |
6.5 (3.1)
|
WordPress tagDiv Cloud Library plugin < 3.9.2 - Cross … |
tagDiv |
tagDiv Cloud Library |
2025-11-06T15:55:29.230Z | 2026-01-20T14:28:13.043Z |
| CVE-2025-62024 |
6.5 (3.1)
|
WordPress Pie Calendar plugin <= 1.2.9 - Cross Site Sc… |
Jonathan Jernigan |
Pie Calendar |
2025-10-22T14:32:50.360Z | 2026-01-20T14:28:13.043Z |
| CVE-2025-62028 |
4.3 (3.1)
|
WordPress Salient theme < 17.4.0 - Broken Access Contr… |
ThemeNectar |
Salient |
2025-11-06T15:55:27.077Z | 2026-01-20T14:28:13.042Z |
| CVE-2025-62027 |
5.4 (3.1)
|
WordPress Event Tickets plugin <= 5.26.3 - Broken Acce… |
StellarWP |
Event Tickets |
2025-10-22T14:32:51.014Z | 2026-01-20T14:28:13.042Z |
| CVE-2025-62017 |
5.4 (3.1)
|
WordPress Kallyas theme <= 4.22.0 - Broken Access Cont… |
hogash |
Kallyas |
2025-11-06T15:55:25.294Z | 2026-01-20T14:28:13.042Z |
| CVE-2025-62011 |
6.5 (3.1)
|
WordPress TheGem theme <= 5.10.5 - Cross Site Scriptin… |
CodexThemes |
TheGem |
2025-11-06T15:55:22.593Z | 2026-01-20T14:28:13.042Z |
| CVE-2025-62023 |
9.8 (3.1)
|
WordPress s2Member plugin <= 250905 - Remote Code Exec… |
Cristián Lávaque |
s2Member |
2025-10-22T14:32:50.026Z | 2026-01-20T14:28:13.041Z |
| CVE-2025-62021 |
4.3 (3.1)
|
WordPress Acknowledgify plugin <= 1.1.3 - Broken Acces… |
Made Neat |
Acknowledgify |
2025-10-22T14:32:49.606Z | 2026-01-20T14:28:13.041Z |
| CVE-2025-62025 |
9.8 (3.1)
|
WordPress JobSearch plugin < 3.0.8 - PHP Object Inject… |
eyecix |
JobSearch |
2025-10-22T14:32:50.582Z | 2026-01-20T14:28:13.040Z |
| CVE-2025-62013 |
4.3 (3.1)
|
WordPress UiChemy plugin <= 4.0.0 - Broken Access Cont… |
POSIMYTH |
UiChemy |
2025-10-22T14:32:48.799Z | 2026-01-20T14:28:13.040Z |
| CVE-2025-62010 |
8.1 (3.1)
|
WordPress Famita theme <= 1.54 - Local File Inclusion … |
ApusTheme |
Famita |
2025-11-06T15:55:21.866Z | 2026-01-20T14:28:13.040Z |
| CVE-2025-62006 |
5.4 (3.1)
|
WordPress WP SMS plugin <= 7.0.1 - Broken Access Contr… |
VeronaLabs |
WP SMS |
2025-10-22T14:32:47.684Z | 2026-01-20T14:28:13.040Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2019-25277 |
5.1 (4.0)
6.1 (3.1)
|
FaceSentry Access Control System 6.4.8 Reflected Cross… |
iWT Ltd. |
FaceSentry Access Control System |
2026-01-07T23:11:06.730Z | 2026-01-08T18:16:47.762Z |
| CVE-2025-68151 |
6.6 (4.0)
|
CoreDNS gRPC/HTTPS/HTTP3 servers lack resource limits,… |
coredns |
coredns |
2026-01-08T15:33:12.711Z | 2026-01-08T15:50:35.397Z |
| CVE-2026-22589 |
7.5 (3.1)
|
Spree API has Unauthenticated IDOR - Guest Address |
spree |
spree |
2026-01-10T03:17:58.494Z | 2026-01-12T17:32:46.777Z |
| CVE-2025-31963 |
2.9 (3.1)
|
HCL BigFix IVR is impacted by improper authentication … |
HCLSoftware |
BigFix IVR |
2026-01-07T07:05:40.098Z | 2026-01-07T16:13:25.789Z |
| CVE-2024-4392 |
6.4 (3.1)
|
Jetpack – WP Security, Backup, Speed, & Growth <= 13.3… |
automattic |
Jetpack – WP Security, Backup, Speed, & Growth |
2024-05-14T08:32:31.906Z | 2024-08-01T20:40:47.361Z |
| CVE-2023-47774 |
5.4 (3.1)
|
WordPress Jetpack plugin < 12.7 - Auth. Iframe Injecti… |
Automattic |
Jetpack |
2024-04-24T15:58:40.432Z | 2024-08-02T21:16:43.660Z |
| CVE-2025-39482 |
4.3 (3.1)
|
WordPress Eventer - WordPress Event & Booking Manager … |
imithemes |
Eventer |
2025-05-16T15:45:26.697Z | 2026-01-22T12:07:27.271Z |
| CVE-2025-39481 |
9.3 (3.1)
|
WordPress Eventer - WordPress Event & Booking Manager … |
imithemes |
Eventer |
2025-05-16T15:45:27.223Z | 2026-01-22T12:05:03.823Z |
| CVE-2025-39483 |
6.5 (3.1)
|
WordPress Eventer plugin < 3.9.9.1 - Shortcode Injecti… |
imithemes |
Eventer |
2025-08-14T10:34:26.628Z | 2026-01-22T09:41:27.096Z |
| CVE-2024-53252 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:40:06.360Z | |
| CVE-2024-53251 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:40:04.870Z | |
| CVE-2024-53250 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:40:03.200Z | |
| CVE-2024-53249 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:40:00.720Z | |
| CVE-2024-53248 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:59.446Z | |
| CVE-2024-45743 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:58.180Z | |
| CVE-2024-45742 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:56.832Z | |
| CVE-2024-45730 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:55.570Z | |
| CVE-2024-45729 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:54.322Z | |
| CVE-2024-45728 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:53.063Z | |
| CVE-2024-45727 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:51.817Z | |
| CVE-2024-45726 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:50.428Z | |
| CVE-2024-45725 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:49.125Z | |
| CVE-2024-45724 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:47.866Z | |
| CVE-2024-36998 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:46.585Z | |
| CVE-2024-36988 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:45.176Z | |
| CVE-2024-22166 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:43.826Z | |
| CVE-2023-32720 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:42.486Z | |
| CVE-2023-32719 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:41.161Z | |
| CVE-2023-32718 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:39.735Z | |
| CVE-2023-22944 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:38.404Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2024-53250 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:06.290 | 2026-01-22T10:16:06.290 |
| fkie_cve-2024-53249 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:06.223 | 2026-01-22T10:16:06.223 |
| fkie_cve-2024-53248 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:06.160 | 2026-01-22T10:16:06.160 |
| fkie_cve-2024-45743 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:06.097 | 2026-01-22T10:16:06.097 |
| fkie_cve-2024-45742 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:06.033 | 2026-01-22T10:16:06.033 |
| fkie_cve-2024-45730 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:05.973 | 2026-01-22T10:16:05.973 |
| fkie_cve-2024-45729 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:05.907 | 2026-01-22T10:16:05.907 |
| fkie_cve-2024-45728 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:05.847 | 2026-01-22T10:16:05.847 |
| fkie_cve-2024-45727 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:05.787 | 2026-01-22T10:16:05.787 |
| fkie_cve-2024-45726 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:05.723 | 2026-01-22T10:16:05.723 |
| fkie_cve-2024-45725 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:05.660 | 2026-01-22T10:16:05.660 |
| fkie_cve-2024-45724 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:05.593 | 2026-01-22T10:16:05.593 |
| fkie_cve-2024-36998 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:05.520 | 2026-01-22T10:16:05.520 |
| fkie_cve-2024-36988 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:05.450 | 2026-01-22T10:16:05.450 |
| fkie_cve-2024-22166 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:05.360 | 2026-01-22T10:16:05.360 |
| fkie_cve-2023-32720 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:05.293 | 2026-01-22T10:16:05.293 |
| fkie_cve-2023-32719 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:05.230 | 2026-01-22T10:16:05.230 |
| fkie_cve-2023-32718 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:05.160 | 2026-01-22T10:16:05.160 |
| fkie_cve-2023-22944 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:05.083 | 2026-01-22T10:16:05.083 |
| fkie_cve-2023-22930 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:05.020 | 2026-01-22T10:16:05.020 |
| fkie_cve-2023-22929 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.953 | 2026-01-22T10:16:04.953 |
| fkie_cve-2023-22928 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.890 | 2026-01-22T10:16:04.890 |
| fkie_cve-2023-22927 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.823 | 2026-01-22T10:16:04.823 |
| fkie_cve-2023-22926 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.760 | 2026-01-22T10:16:04.760 |
| fkie_cve-2023-22925 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.687 | 2026-01-22T10:16:04.687 |
| fkie_cve-2022-43560 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.620 | 2026-01-22T10:16:04.620 |
| fkie_cve-2022-43559 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.560 | 2026-01-22T10:16:04.560 |
| fkie_cve-2022-43558 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.483 | 2026-01-22T10:16:04.483 |
| fkie_cve-2022-34214 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.403 | 2026-01-22T10:16:04.403 |
| fkie_cve-2022-32150 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.337 | 2026-01-22T10:16:04.337 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-24c6-4vcc-gq5v |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ocfs2: prevent release journal… | 2025-09-22T21:30:17Z | 2026-01-20T15:31:21Z |
| ghsa-cwh4-qcmj-2594 |
7.5 (3.1)
4.8 (4.0)
|
HP Universal Print Driver is potentially vulnerable to denial of service due to buffer overflow in … | 2025-07-02T21:32:00Z | 2026-01-20T15:31:20Z |
| ghsa-8fqh-pm2q-8h5v |
7.8 (3.1)
5.8 (4.0)
|
A potential security vulnerability has been identified in the HP Support Assistant, which allows a … | 2025-07-08T18:31:43Z | 2026-01-20T15:31:20Z |
| ghsa-q748-mcwg-xmqv |
5.3 (4.0)
|
OpenStack Image Service (Glance) allows remote authenticated users to bypass access restrictions | 2022-05-17T04:04:02Z | 2026-01-20T13:05:45Z |
| ghsa-jm76-5g2j-p4hp |
9.8 (3.1)
|
The Advanced Custom Fields: Extended plugin for WordPress is vulnerable to Privilege Escalation in … | 2026-01-20T12:31:17Z | 2026-01-20T12:31:17Z |
| ghsa-hmmg-cjmw-gj6g |
5.1 (4.0)
|
HTML Injection vulnerability in Isshue by Bdtask, consisting os an HTML injection due to a lack … | 2026-01-20T12:31:17Z | 2026-01-20T12:31:17Z |
| ghsa-ffgq-vm8w-4m65 |
5.1 (4.0)
|
Stored Cross-Site Scripting (XSS) vulnerability in Sesame web application, due to the fact that upl… | 2026-01-20T12:31:17Z | 2026-01-20T12:31:17Z |
| ghsa-5pph-737h-487p |
5.1 (4.0)
|
Reflected Cross-Site Scripting (XSS) vulnerability in Riftzilla's QRGen. This vulnerability allows … | 2026-01-20T12:31:17Z | 2026-01-20T12:31:17Z |
| ghsa-wm49-2vmh-chv3 |
9.8 (3.1)
9.3 (4.0)
|
PrismX MX100 AP controller developed by BROWAN COMMUNICATIONS has a Use of Hard-coded Credentials … | 2026-01-20T09:30:20Z | 2026-01-20T09:30:20Z |
| ghsa-w9fp-wg9v-cr6h |
4.9 (3.1)
6.9 (4.0)
|
PrismX MX100 AP controller developed by BROWAN COMMUNICATIONS has an Insufficiently Protected Crede… | 2026-01-20T09:30:20Z | 2026-01-20T09:30:20Z |
| ghsa-jv72-wxjv-h5q2 |
6.1 (3.1)
|
URL parameters are directly embedded into JavaScript code or HTML attributes without proper encodin… | 2026-01-20T09:30:20Z | 2026-01-20T09:30:20Z |
| ghsa-hrmx-9vmm-xj23 |
5.5 (3.1)
|
On an instance of TwinCAT 3 HMI Server running on a device an authenticated administrator can injec… | 2026-01-20T09:30:20Z | 2026-01-20T09:30:20Z |
| ghsa-fjj6-9j9h-gwcp |
7.2 (3.1)
8.6 (4.0)
|
PrismX MX100 AP controller developed by BROWAN COMMUNICATIONS has an Arbitrary File Upload vulnerab… | 2026-01-20T09:30:20Z | 2026-01-20T09:30:20Z |
| ghsa-f49w-r2gf-jprx |
4.4 (3.1)
|
The Viet contact plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settin… | 2026-01-20T06:30:26Z | 2026-01-20T06:30:27Z |
| ghsa-4hcf-mq88-ff2w |
4.4 (3.1)
|
The WP Hello Bar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'digit_o… | 2026-01-20T06:30:26Z | 2026-01-20T06:30:27Z |
| ghsa-2gpj-j2rf-2376 |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was detected in Bjskzy Zhiyou ERP up to 11.0. Impacted is the function initRCForm o… | 2026-01-20T06:30:27Z | 2026-01-20T06:30:27Z |
| ghsa-w3mw-5fhx-xjwj |
|
Rejected reason: Not used | 2026-01-20T06:30:26Z | 2026-01-20T06:30:26Z |
| ghsa-r7w6-x8x9-6vv4 |
|
Rejected reason: Not used | 2026-01-20T06:30:26Z | 2026-01-20T06:30:26Z |
| ghsa-qwqp-43xx-xx7m |
|
Rejected reason: Not used | 2026-01-20T06:30:26Z | 2026-01-20T06:30:26Z |
| ghsa-p97c-vpmj-ch6j |
|
Rejected reason: Not used | 2026-01-20T06:30:26Z | 2026-01-20T06:30:26Z |
| ghsa-p6c7-27wx-qc74 |
|
Rejected reason: Not used | 2026-01-20T06:30:26Z | 2026-01-20T06:30:26Z |
| ghsa-p2wf-vpf4-vwf9 |
|
Rejected reason: Not used | 2026-01-20T06:30:26Z | 2026-01-20T06:30:26Z |
| ghsa-g47g-rq9g-qhgm |
|
Rejected reason: Not used | 2026-01-20T06:30:26Z | 2026-01-20T06:30:26Z |
| ghsa-6h3q-wcw2-gjg9 |
|
Rejected reason: Not used | 2026-01-20T06:30:26Z | 2026-01-20T06:30:26Z |
| ghsa-5hmm-9q32-cjhm |
|
Rejected reason: Not used | 2026-01-20T06:30:26Z | 2026-01-20T06:30:26Z |
| ghsa-xfv3-pv72-95q6 |
5.3 (3.1)
|
The LearnPress – WordPress LMS Plugin for WordPress is vulnerable to Sensitive Information Exposure… | 2026-01-20T06:30:25Z | 2026-01-20T06:30:25Z |
| ghsa-q34g-wx65-85fq |
5.3 (3.1)
|
The Custom Fonts – Host Your Fonts Locally plugin for WordPress is vulnerable to unauthorized loss … | 2026-01-20T06:30:25Z | 2026-01-20T06:30:25Z |
| ghsa-hxqm-jx76-mpgf |
5.3 (3.1)
|
The weMail - Email Marketing, Lead Generation, Optin Forms, Email Newsletters, A/B Testing, and Aut… | 2026-01-20T06:30:25Z | 2026-01-20T06:30:25Z |
| ghsa-9fx4-284h-m253 |
8.1 (3.1)
|
The Dokan: AI Powered WooCommerce Multivendor Marketplace Solution – Build Your Own Amazon, eBay, E… | 2026-01-20T06:30:25Z | 2026-01-20T06:30:25Z |
| ghsa-x64m-wg95-494x |
7.3 (3.1)
5.5 (4.0)
|
A security flaw has been discovered in CRMEB up to 5.6.3. The affected element is the function appl… | 2026-01-20T03:30:28Z | 2026-01-20T03:30:28Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-29201 | JumpServer is an open source bastion host and an operation and maintenance security audit… | 2024-04-02T05:02:57.473158Z |
| gsd-2024-29306 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.472817Z |
| gsd-2024-29093 | Cross-Site Request Forgery (CSRF) vulnerability in Tobias Conrad Builder for WooCommerce … | 2024-04-02T05:02:57.472328Z |
| gsd-2024-29378 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.471995Z |
| gsd-2024-29151 | Rocket.Chat.Audit through 5ad78e8 depends on filecachetools, which does not exist in PyPI. | 2024-04-02T05:02:57.471551Z |
| gsd-2024-29247 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.471124Z |
| gsd-2024-29813 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-02T05:02:57.470461Z |
| gsd-2024-29361 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.470030Z |
| gsd-2024-29544 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.469766Z |
| gsd-2024-29701 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.469502Z |
| gsd-2024-29218 | Out-of-bounds write vulnerability exists in KV STUDIO Ver.11.64 and earlier and KV REPLAY… | 2024-04-02T05:02:57.469165Z |
| gsd-2024-29741 | In pblS2mpuResume of s2mpu.c, there is a possible mitigation bypass due to a logic error … | 2024-04-02T05:02:57.468877Z |
| gsd-2024-29559 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.468658Z |
| gsd-2024-29106 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-02T05:02:57.468127Z |
| gsd-2024-29713 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.467568Z |
| gsd-2024-29691 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.467308Z |
| gsd-2024-29669 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.467052Z |
| gsd-2024-29371 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.466792Z |
| gsd-2024-29774 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-02T05:02:57.466300Z |
| gsd-2024-29357 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.465925Z |
| gsd-2024-29377 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.465660Z |
| gsd-2024-29115 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-02T05:02:57.465151Z |
| gsd-2024-29799 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-02T05:02:57.464399Z |
| gsd-2024-29289 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.463967Z |
| gsd-2024-29129 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-02T05:02:57.463509Z |
| gsd-2024-29086 | in OpenHarmony v3.2.4 and prior versions allow a local attacker cause DOS through stack o… | 2024-04-02T05:02:57.463179Z |
| gsd-2024-29406 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.462910Z |
| gsd-2024-29658 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.462634Z |
| gsd-2024-29348 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.462352Z |
| gsd-2024-29109 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-02T05:02:57.461890Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-189267 | Malicious code in rollup-nova-wavefunction-rimraf (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189266 | Malicious code in rollup-neptune-webdriver-manager-eslint-plugin (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189265 | Malicious code in rocket-vortex-nebula-barnard (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189264 | Malicious code in rocket-polaris-prettier-schema (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189263 | Malicious code in rocket-planetology-mira-convict (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189262 | Malicious code in rocket-package-sass-loader-avior (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189261 | Malicious code in rocket-jest-astrophysics-speleology (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189260 | Malicious code in rocket-graviton-aurora-blueshift (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189259 | Malicious code in rocket-got-heka-json (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189258 | Malicious code in rocket-fomalhaut-sirius-kronos (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189257 | Malicious code in rocket-eleventy-alphard-changelog (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189256 | Malicious code in rocket-dynamo-supervisor-winston (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189255 | Malicious code in robotics-proxima-thuban-comet (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189254 | Malicious code in robotics-polaris-antares-cluster (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189253 | Malicious code in robotics-cosmiconfig-repository-metabolomics (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189252 | Malicious code in robotics-callback-vulcan-html-webpack-plugin (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189251 | Malicious code in robotics-auriga-eclipse-parcel (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189250 | Malicious code in robotics-abiogenesis-command-react-bootstrap (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189249 | Malicious code in rimraf-webdriver-manager-impulse-dione (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189248 | Malicious code in rimraf-quantum-csv-javascript (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189247 | Malicious code in rimraf-playwright-morgan-norma (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189246 | Malicious code in rimraf-middleware-mysql-pavo (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189245 | Malicious code in rimraf-markdown-markdown-pdf-biomimicry (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189244 | Malicious code in rimraf-jupiter-carpo-phylogenetics (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189243 | Malicious code in rimraf-isostasy-algol-paleoanthropology (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189242 | Malicious code in rimraf-centauri-loop-nightwatch (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189241 | Malicious code in rimraf-betelgeuse-baryon-selenium (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189240 | Malicious code in rigel-toml-meteor-version (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189239 | Malicious code in rigel-photon-interferometry-yaml (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189238 | Malicious code in rigel-miranda-cache-cz-conventional-changelog (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-0664 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Denial of Service | 2024-03-19T23:00:00.000+00:00 | 2024-06-20T22:00:00.000+00:00 |
| wid-sec-w-2024-1420 | binutils: Mehrere Schwachstellen ermöglichen Denial of Service | 2020-12-10T23:00:00.000+00:00 | 2024-06-19T22:00:00.000+00:00 |
| wid-sec-w-2024-1419 | Checkmk: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-06-19T22:00:00.000+00:00 | 2024-06-19T22:00:00.000+00:00 |
| wid-sec-w-2024-1415 | IGEL OS: Mehrere Schwachstellen ermöglichen Codeausführung | 2024-06-19T22:00:00.000+00:00 | 2024-06-19T22:00:00.000+00:00 |
| wid-sec-w-2024-1414 | Checkmk: Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2024-06-19T22:00:00.000+00:00 | 2024-06-19T22:00:00.000+00:00 |
| wid-sec-w-2024-1413 | SonicWall SonicOS: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-06-19T22:00:00.000+00:00 | 2024-06-19T22:00:00.000+00:00 |
| wid-sec-w-2024-1411 | Progress Software MOVEit: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2024-06-19T22:00:00.000+00:00 | 2024-06-19T22:00:00.000+00:00 |
| wid-sec-w-2024-1410 | Dell Computer: Schwachstelle ermöglicht Privilegieneskalation | 2024-06-19T22:00:00.000+00:00 | 2024-06-19T22:00:00.000+00:00 |
| wid-sec-w-2024-1409 | VMware Tanzu Spring Cloud: Schwachstelle ermöglicht Denial of Service | 2024-06-19T22:00:00.000+00:00 | 2024-06-19T22:00:00.000+00:00 |
| wid-sec-w-2024-1387 | MELDUNG ZURÜCKGEZOGEN | 2024-06-16T22:00:00.000+00:00 | 2024-06-19T22:00:00.000+00:00 |
| wid-sec-w-2024-1006 | Red Hat OpenShift: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-05-01T22:00:00.000+00:00 | 2024-06-19T22:00:00.000+00:00 |
| wid-sec-w-2022-2228 | binutils: Schwachstelle ermöglicht Denial of Service | 2022-12-05T23:00:00.000+00:00 | 2024-06-19T22:00:00.000+00:00 |
| wid-sec-w-2024-1407 | Moodle: Mehrere Schwachstellen | 2024-06-18T22:00:00.000+00:00 | 2024-06-18T22:00:00.000+00:00 |
| wid-sec-w-2024-1405 | Atlassian Jira Software: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-06-18T22:00:00.000+00:00 | 2024-06-18T22:00:00.000+00:00 |
| wid-sec-w-2024-1401 | Atlassian Fisheye/Crucible: Schwachstelle ermöglicht Denial of Service | 2024-06-18T22:00:00.000+00:00 | 2024-06-18T22:00:00.000+00:00 |
| wid-sec-w-2024-1400 | Huawei Home-Router: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen | 2024-06-18T22:00:00.000+00:00 | 2024-06-18T22:00:00.000+00:00 |
| wid-sec-w-2024-1382 | Progress Software Sitefinity: Schwachstelle ermöglicht Cross-Site Scripting | 2024-06-16T22:00:00.000+00:00 | 2024-06-18T22:00:00.000+00:00 |
| wid-sec-w-2022-1750 | GNU libc: Schwachstelle ermöglicht Denial of Service | 2021-02-24T23:00:00.000+00:00 | 2024-06-18T22:00:00.000+00:00 |
| wid-sec-w-2024-1397 | Rancher: Mehrere Schwachstellen | 2024-06-17T22:00:00.000+00:00 | 2024-06-17T22:00:00.000+00:00 |
| wid-sec-w-2024-1395 | VMware vCenter Server: Mehrere Schwachstellen | 2024-06-17T22:00:00.000+00:00 | 2024-06-17T22:00:00.000+00:00 |
| wid-sec-w-2024-1393 | Rückruf: 7-Zip: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode | 2022-04-18T22:00:00.000+00:00 | 2024-06-17T22:00:00.000+00:00 |
| wid-sec-w-2024-1231 | Google Chrome und Microsoft Edge: Schwachstelle ermöglicht Codeausführung | 2024-05-23T22:00:00.000+00:00 | 2024-06-17T22:00:00.000+00:00 |
| wid-sec-w-2024-1198 | Google Chrome und Microsoft Edge: Mehrere Schwachstellen | 2024-05-21T22:00:00.000+00:00 | 2024-06-17T22:00:00.000+00:00 |
| wid-sec-w-2024-1391 | D-LINK Wireless Router: Mehrere Schwachstellen | 2024-06-16T22:00:00.000+00:00 | 2024-06-16T22:00:00.000+00:00 |
| wid-sec-w-2024-1390 | NetApp StorageGRID: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-06-16T22:00:00.000+00:00 | 2024-06-16T22:00:00.000+00:00 |
| wid-sec-w-2024-1389 | Nextcloud: Mehrere Schwachstellen | 2024-06-16T22:00:00.000+00:00 | 2024-06-16T22:00:00.000+00:00 |
| wid-sec-w-2024-1388 | Linux Kernel: Mehrere Schwachstellen | 2024-06-16T22:00:00.000+00:00 | 2024-06-16T22:00:00.000+00:00 |
| wid-sec-w-2024-1385 | SonarSource SonarQube: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-06-16T22:00:00.000+00:00 | 2024-06-16T22:00:00.000+00:00 |
| wid-sec-w-2024-1383 | Kibana: Schwachstelle ermöglicht Darstellen falscher Informationen | 2024-06-16T22:00:00.000+00:00 | 2024-06-16T22:00:00.000+00:00 |
| wid-sec-w-2024-1381 | libarchive: Schwachstelle ermöglicht Codeausführung | 2024-06-16T22:00:00.000+00:00 | 2024-06-16T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:0408 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Container Release Update | 2026-01-08T19:38:23+00:00 | 2026-01-14T02:27:20+00:00 |
| rhsa-2026:0406 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Container Release Update | 2026-01-08T19:34:46+00:00 | 2026-01-14T02:27:19+00:00 |
| rhsa-2024:8788 | Red Hat Security Advisory: krb5 security update | 2024-11-04T01:44:02+00:00 | 2026-01-13T23:07:16+00:00 |
| rhsa-2025:4187 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (python-django) security update | 2025-04-24T13:23:07+00:00 | 2026-01-13T23:04:44+00:00 |
| rhsa-2024:9481 | Red Hat Security Advisory: Red Hat OpenStack Platform 18.0.3 (python-django) security update | 2024-11-13T13:16:47+00:00 | 2026-01-13T23:04:30+00:00 |
| rhsa-2024:2731 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (python-django) security update | 2024-05-22T20:35:57+00:00 | 2026-01-13T23:04:07+00:00 |
| rhba-2024:6429 | Red Hat Bug Fix Advisory: Red Hat Ansible Automation Platform 2.4 Container Release Update | 2024-09-05T15:38:39+00:00 | 2026-01-13T23:03:48+00:00 |
| rhsa-2024:6464 | Red Hat Security Advisory: glib2 security update | 2024-09-09T02:30:17+00:00 | 2026-01-13T22:56:54+00:00 |
| rhsa-2025:10780 | Red Hat Security Advisory: glib2 security update | 2025-07-10T10:00:05+00:00 | 2026-01-13T22:56:53+00:00 |
| rhsa-2024:9442 | Red Hat Security Advisory: mingw-glib2 security update | 2024-11-12T08:59:14+00:00 | 2026-01-13T22:56:53+00:00 |
| rhsa-2024:2986 | Red Hat Security Advisory: python3.11-urllib3 security update | 2024-05-22T09:59:45+00:00 | 2026-01-13T22:52:05+00:00 |
| rhsa-2024:2159 | Red Hat Security Advisory: python3.11-urllib3 security update | 2024-04-30T10:30:15+00:00 | 2026-01-13T22:52:02+00:00 |
| rhsa-2024:0733 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update | 2024-02-07T20:46:32+00:00 | 2026-01-13T22:51:57+00:00 |
| rhsa-2024:0588 | Red Hat Security Advisory: python-urllib3 security update | 2024-01-30T13:27:51+00:00 | 2026-01-13T22:51:56+00:00 |
| rhsa-2024:0464 | Red Hat Security Advisory: python-urllib3 security update | 2024-01-25T11:05:15+00:00 | 2026-01-13T22:51:56+00:00 |
| rhsa-2024:0322 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update | 2024-01-22T14:22:42+00:00 | 2026-01-13T22:51:55+00:00 |
| rhsa-2024:0300 | Red Hat Security Advisory: python-urllib3 security update | 2024-01-18T16:31:24+00:00 | 2026-01-13T22:51:55+00:00 |
| rhsa-2024:0215 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (GitPython) security update | 2024-01-16T14:33:02+00:00 | 2026-01-13T22:51:54+00:00 |
| rhsa-2024:0190 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (GitPython) security update | 2024-01-16T14:36:37+00:00 | 2026-01-13T22:51:54+00:00 |
| rhsa-2024:0187 | Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (python-urllib3) security update | 2024-01-16T14:36:17+00:00 | 2026-01-13T22:51:53+00:00 |
| rhsa-2024:0133 | Red Hat Security Advisory: fence-agents security update | 2024-01-10T12:07:58+00:00 | 2026-01-13T22:51:53+00:00 |
| rhsa-2024:0116 | Red Hat Security Advisory: python-urllib3 security update | 2024-01-10T10:50:46+00:00 | 2026-01-13T22:51:52+00:00 |
| rhsa-2023:7851 | Red Hat Security Advisory: Satellite 6.14.1 Async Security Update | 2023-12-14T16:30:08+00:00 | 2026-01-13T22:51:52+00:00 |
| rhsa-2023:7528 | Red Hat Security Advisory: fence-agents security update | 2023-11-28T15:39:44+00:00 | 2026-01-13T22:51:52+00:00 |
| rhsa-2023:7753 | Red Hat Security Advisory: fence-agents security update | 2023-12-12T17:25:56+00:00 | 2026-01-13T22:51:49+00:00 |
| rhsa-2023:7523 | Red Hat Security Advisory: fence-agents security update | 2023-11-28T15:32:41+00:00 | 2026-01-13T22:51:49+00:00 |
| rhsa-2023:7435 | Red Hat Security Advisory: fence-agents security update | 2023-11-21T15:34:29+00:00 | 2026-01-13T22:51:48+00:00 |
| rhsa-2023:7407 | Red Hat Security Advisory: fence-agents security update | 2023-11-21T11:39:13+00:00 | 2026-01-13T22:51:48+00:00 |
| rhsa-2023:7385 | Red Hat Security Advisory: fence-agents security update | 2023-11-21T11:31:02+00:00 | 2026-01-13T22:51:47+00:00 |
| rhsa-2023:7378 | Red Hat Security Advisory: fence-agents security update | 2023-11-21T11:23:51+00:00 | 2026-01-13T22:51:47+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2024-44995 | net: hns3: fix a deadlock problem when config TC during resetting | 2024-09-01T07:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2024-44990 | bonding: fix null pointer deref in bond_ipsec_offload_ok | 2024-09-01T07:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2024-44989 | bonding: fix xfrm real_dev null pointer dereference | 2024-09-01T07:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2024-44987 | ipv6: prevent UAF in ip6_send_skb() | 2024-09-01T07:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2024-44986 | ipv6: fix possible UAF in ip6_finish_output2() | 2024-09-01T07:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2024-44985 | ipv6: prevent possible UAF in ip6_xmit() | 2024-09-01T07:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2024-44983 | netfilter: flowtable: validate vlan header | 2024-09-01T07:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2024-44947 | fuse: Initialize beyond-EOF page contents before setting uptodate | 2024-09-01T07:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2024-43891 | tracing: Have format file honor EVENT_FILE_FL_FREED | 2024-08-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2024-43796 | express vulnerable to XSS via response.redirect() | 2024-09-01T07:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2024-43788 | DOM Clobbering Gadget found in Webpack's AutoPublicPathRuntimeModule that leads to Cross-site Scripting (XSS) | 2024-08-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2024-41946 | REXML DoS vulnerability | 2024-08-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2024-41184 | In the vrrp_ipsets_handler handler (fglobal_parser.c) of keepalived through 2.3.1 an integer overflow can occur. NOTE: this CVE Record might not be worthwhile because an empty ipset name must be configured by the user. | 2024-07-01T07:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2024-33655 | The DNS protocol in RFC 1035 and updates allows remote attackers to cause a denial of service (resource consumption) by arranging for DNS queries to be accumulated for seconds such that responses are later sent in a pulsing burst (which can be considered traffic amplification in some cases) aka the "DNSBomb" issue. | 2024-06-02T07:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2024-28085 | wall in util-linux through 2.40 often installed with setgid tty permissions allows escape sequences to be sent to other users' terminals through argv. (Specifically escape sequences received from stdin are blocked but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover. | 2024-03-02T08:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2023-0922 | The Samba AD DC administration tool when operating against a remote LDAP server will by default send new or reset passwords over a signed-only connection. | 2023-04-01T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2023-0614 | The fix in 4.6.16 4.7.9 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure vi LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC. | 2023-04-01T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2023-0225 | A flaw was found in Samba. An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory. | 2023-04-01T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2022-48622 | In GNOME GdkPixbuf (aka gdk-pixbuf) through 2.42.10 the ANI (Windows animated cursor) decoder encounters heap memory corruption (in ani_load_chunk in io-ani.c) when parsing chunks in a crafted .ani file. A crafted file could allow an attacker to overwrite heap metadata leading to a denial of service or code execution attack. This occurs in gdk_pixbuf_set_option() in gdk-pixbuf.c. | 2024-01-01T08:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2022-45141 | Since the Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability was disclosed by Microsoft on Nov 8 2022 and per RFC8429 it is assumed that rc4-hmac is weak Vulnerable Samba Active Directory DCs will issue rc4-hmac encrypted tickets despite the target server supporting better encryption (eg aes256-cts-hmac-sha1-96). | 2023-03-10T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2022-44640 | Heimdal before 7.7.1 allows remote attackers to execute arbitrary code because of an invalid free in the ASN.1 codec used by the Key Distribution Center (KDC). | 2022-12-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2022-42898 | PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC kadmind or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow) and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has "a similar bug." | 2022-12-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2022-41916 | Read one byte past a buffer when normalizing Unicode | 2022-11-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2022-3437 | A heap-based buffer overflow vulnerability was found in Samba within the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The DES and Triple-DES decryption routines in the Heimdal GSSAPI library allow a length-limited write buffer overflow on malloc() allocated memory when presented with a maliciously small packet. This flaw allows a remote user to send specially crafted malicious data to the application possibly resulting in a denial of service (DoS) attack. | 2023-01-04T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2022-32745 | A flaw was found in Samba. Samba AD users can cause the server to access uninitialized data with an LDAP add or modify the request usually resulting in a segmentation fault. | 2022-08-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2022-32744 | A flaw was found in Samba. The KDC accepts kpasswd requests encrypted with any key known to it. By encrypting forged kpasswd requests with its own key a user can change other users' passwords enabling full domain takeover. | 2022-08-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2022-32742 | A flaw was found in Samba. Some SMB1 write requests were not correctly range-checked to ensure the client had sent enough data to fulfill the write allowing server memory contents to be written into the file (or printer) instead of client-supplied data. The client cannot control the area of the server memory written to the file (or printer). | 2022-08-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2022-3116 | The Heimdal Software Kerberos 5 implementation is vulnerable to a null pointer dereferance. An attacker with network access to an application that depends on the vulnerable code path can cause the application to crash. | 2023-03-10T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2022-2031 | A flaw was found in Samba. The security vulnerability occurs when KDC and the kpasswd service share a single account and set of keys allowing them to decrypt each other's tickets. A user who has been requested to change their password can exploit this flaw to obtain and use tickets to other services. | 2022-08-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2022-0336 | The Samba AD DC includes checks when adding service principals names (SPNs) to an account to ensure that SPNs do not alias with those already in the database. Some of these checks are able to be bypassed if an account modification re-adds an SPN that was previously present on that account such as one added when a computer is joined to a domain. An attacker who has the ability to write to an account can exploit this to perform a denial-of-service attack by adding an SPN that matches an existing service. Additionally an attacker who can intercept traffic can impersonate existing services resulting in a loss of confidentiality and integrity. | 2022-08-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202501-2564 | TOTOLINK A6000R V1.0.1-B20201211.2000 was discovered to contain a command injection vulne… | 2025-04-22T23:20:26.131000Z |
| var-202212-1527 | An issue existed with the file paths used to store website data. The issue was resolved b… | 2025-04-22T23:19:42.738000Z |
| var-202212-0726 | Transient DOS due to loop with unreachable exit condition in WLAN while processing an inc… | 2025-04-22T23:18:56.007000Z |
| var-202211-0414 | Memory corruption in graphics due to use-after-free while importing graphics buffer in Sn… | 2025-04-22T23:18:55.233000Z |
| var-202501-2365 | Linksys E7350 1.1.00.032 was discovered to contain a command injection vulnerability via … | 2025-04-22T23:17:53.043000Z |
| var-202212-0797 | Memory corruption in diag due to use after free while processing dci packet in Snapdragon… | 2025-04-22T23:14:34.750000Z |
| var-202210-0329 | Memory corruption in WLAN due to integer overflow to buffer overflow while parsing GTK fr… | 2025-04-22T23:12:51.927000Z |
| var-202212-1619 | The issue was addressed with improved memory handling. This issue is fixed in iOS 16.2 an… | 2025-04-22T23:07:34.481000Z |
| var-202211-1006 | Denial of service due to null pointer dereference when GATT is disconnected in Snapdragon… | 2025-04-22T23:03:09.792000Z |
| var-202212-0441 | Memory corruption in MODEM UIM due to usage of out of range pointer offset while decoding… | 2025-04-22T23:03:09.670000Z |
| var-202212-0798 | Denial of service in Modem module due to improper authorization while error handling in S… | 2025-04-22T23:03:09.624000Z |
| var-202406-0247 | CWE-125: Out-of-bounds Read vulnerability exists that could cause denial of service of th… | 2025-04-22T23:02:55.052000Z |
| var-202210-1623 | A memory corruption issue was addressed with improved state management. This issue is fix… | 2025-04-22T22:58:49.955000Z |
| var-202212-1299 | Memory corruption in camera due to improper validation of array index in Snapdragon Auto,… | 2025-04-22T22:51:24.336000Z |
| var-202212-1145 | A vulnerability has been identified in SCALANCE X204RNA (HSR) (All versions < V3.2.7), SC… | 2025-04-22T22:50:50.367000Z |
| var-202210-1527 | An access issue was addressed with additional sandbox restrictions. This issue is fixed i… | 2025-04-22T22:49:10.841000Z |
| var-202210-1968 | This issue was addressed with improved checks. This issue is fixed in iOS 15.7.1 and iPad… | 2025-04-22T22:48:29.531000Z |
| var-202212-1146 | A vulnerability has been identified in SCALANCE X204RNA (HSR) (All versions < V3.2.7), SC… | 2025-04-22T22:46:37.758000Z |
| var-202210-1482 | A memory consumption issue was addressed with improved memory handling. This issue is fix… | 2025-04-22T22:45:35.605000Z |
| var-202212-1290 | A logic issue was addressed with improved checks. This issue is fixed in macOS Monterey 1… | 2025-04-22T22:45:33.942000Z |
| var-202210-1473 | This issue was addressed with improved data protection. This issue is fixed in macOS Vent… | 2025-04-22T22:30:29.697000Z |
| var-202210-1485 | An issue in code signature validation was addressed with improved checks. This issue is f… | 2025-04-22T22:29:44.251000Z |
| var-202212-1325 | The issue was addressed with improved memory handling. This issue is fixed in tvOS 16.2, … | 2025-04-22T22:25:41.865000Z |
| var-202210-1928 | A race condition was addressed with improved locking. This issue is fixed in tvOS 16.1, i… | 2025-04-22T22:17:10.346000Z |
| var-202212-1161 | A vulnerability has been identified in SICAM PAS/PQS (All versions < V7.0), SICAM PAS/PQS… | 2025-04-22T22:12:08.412000Z |
| var-202210-1901 | A logic issue was addressed with improved checks. This issue is fixed in tvOS 16.1, iOS 1… | 2025-04-22T22:11:18.785000Z |
| var-202210-1630 | A race condition was addressed with improved locking. This issue is fixed in iOS 16.1 and… | 2025-04-22T22:11:01.513000Z |
| var-202210-1532 | An out-of-bounds write issue was addressed with improved bounds checking. This issue is f… | 2025-04-22T22:04:41.560000Z |
| var-202210-1496 | This issue was addressed by removing the vulnerable code. This issue is fixed in iOS 15.7… | 2025-04-22T21:52:45.837000Z |
| var-202210-1628 | A race condition was addressed with improved locking. This issue is fixed in iOS 16.1 and… | 2025-04-22T21:50:15.923000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2023:4160-1 | Security update for suse-module-tools | 2023-10-23T07:55:18Z | 2023-10-23T07:55:18Z |
| suse-su-2023:4159-1 | Security update for suse-module-tools | 2023-10-23T07:53:44Z | 2023-10-23T07:53:44Z |
| suse-su-2023:4158-1 | Security update for suse-module-tools | 2023-10-23T07:53:09Z | 2023-10-23T07:53:09Z |
| suse-su-2023:4157-1 | Security update for python-urllib3 | 2023-10-23T07:46:00Z | 2023-10-23T07:46:00Z |
| suse-su-2023:4155-1 | Security update for nodejs18 | 2023-10-23T07:18:54Z | 2023-10-23T07:18:54Z |
| suse-su-2023:4152-1 | Security update for java-11-openjdk | 2023-10-20T15:40:50Z | 2023-10-20T15:40:50Z |
| suse-su-2023:4150-1 | Security update for nodejs18 | 2023-10-20T14:45:56Z | 2023-10-20T14:45:56Z |
| suse-su-2023:4142-1 | Security update for the Linux Kernel | 2023-10-20T09:35:16Z | 2023-10-20T09:35:16Z |
| suse-su-2023:4141-1 | Security update for grub2 | 2023-10-20T09:34:54Z | 2023-10-20T09:34:54Z |
| suse-su-2023:4140-1 | Security update for grub2 | 2023-10-20T09:34:14Z | 2023-10-20T09:34:14Z |
| suse-su-2023:4136-1 | Security update for suse-module-tools | 2023-10-19T12:15:09Z | 2023-10-19T12:15:09Z |
| suse-su-2023:4135-1 | Security update for suse-module-tools | 2023-10-19T12:14:27Z | 2023-10-19T12:14:27Z |
| suse-su-2023:4133-1 | Security update for nodejs18 | 2023-10-19T10:03:29Z | 2023-10-19T10:03:29Z |
| suse-su-2023:4132-1 | Security update for nodejs18 | 2023-10-19T10:02:49Z | 2023-10-19T10:02:49Z |
| suse-su-2023:3828-2 | Security update for python3 | 2023-10-19T09:54:32Z | 2023-10-19T09:54:32Z |
| suse-su-2023:4130-1 | Security update for grub2 | 2023-10-19T07:54:10Z | 2023-10-19T07:54:10Z |
| suse-su-2023:4129-1 | Security update for tomcat | 2023-10-19T07:52:28Z | 2023-10-19T07:52:28Z |
| suse-su-2023:4127-1 | Security update for cni-plugins | 2023-10-19T07:44:14Z | 2023-10-19T07:44:14Z |
| suse-su-2023:4126-1 | Security update for cni | 2023-10-19T07:39:08Z | 2023-10-19T07:39:08Z |
| suse-su-2023:4125-1 | Security update for container-suseconnect | 2023-10-19T07:36:16Z | 2023-10-19T07:36:16Z |
| suse-su-2023:4124-1 | Security update for helm | 2023-10-19T07:33:52Z | 2023-10-19T07:33:52Z |
| suse-su-2023:3707-2 | Security update for cups | 2023-10-18T19:33:41Z | 2023-10-18T19:33:41Z |
| suse-su-2023:3954-2 | Security update for libeconf | 2023-10-18T19:05:55Z | 2023-10-18T19:05:55Z |
| suse-su-2023:3822-2 | Security update for supportutils | 2023-10-18T19:05:42Z | 2023-10-18T19:05:42Z |
| suse-su-2023:3952-2 | Security update for runc | 2023-10-18T19:05:15Z | 2023-10-18T19:05:15Z |
| suse-su-2023:3817-2 | Security update for containerd | 2023-10-18T19:04:59Z | 2023-10-18T19:04:59Z |
| suse-su-2023:4121-1 | Security update for slurm | 2023-10-18T14:48:47Z | 2023-10-18T14:48:47Z |
| suse-su-2023:4120-1 | Security update for slurm | 2023-10-18T13:16:32Z | 2023-10-18T13:16:32Z |
| suse-su-2023:4119-1 | Security update for slurm | 2023-10-18T13:16:18Z | 2023-10-18T13:16:18Z |
| suse-su-2023:4118-1 | Security update for slurm | 2023-10-18T13:16:05Z | 2023-10-18T13:16:05Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2023:0389-1 | Security update for python-Django1 | 2023-12-04T17:01:11Z | 2023-12-04T17:01:11Z |
| opensuse-su-2023:0388-1 | Security update for optipng | 2023-12-02T17:00:59Z | 2023-12-02T17:00:59Z |
| opensuse-su-2023:0387-1 | Security update for chromium | 2023-11-30T12:48:01Z | 2023-11-30T12:48:01Z |
| opensuse-su-2023:0386-1 | Security update for opera | 2023-11-30T10:48:21Z | 2023-11-30T10:48:21Z |
| opensuse-su-2023:0385-1 | Security update for opera | 2023-11-30T10:48:02Z | 2023-11-30T10:48:02Z |
| opensuse-su-2023:0384-1 | Security update for python-django-grappelli | 2023-11-30T10:47:42Z | 2023-11-30T10:47:42Z |
| opensuse-su-2023:0379-1 | Security update for gstreamer-plugins-bad | 2023-11-26T08:58:27Z | 2023-11-26T08:58:27Z |
| opensuse-su-2023:0374-1 | Security update for yt-dlp | 2023-11-18T19:00:58Z | 2023-11-18T19:00:58Z |
| opensuse-su-2023:0372-1 | Security update for chromium | 2023-11-16T07:59:47Z | 2023-11-16T07:59:47Z |
| opensuse-su-2023:0371-1 | Security update for jhead | 2023-11-15T11:25:56Z | 2023-11-15T11:25:56Z |
| opensuse-su-2023:0370-1 | Security update for connman | 2023-11-14T15:14:29Z | 2023-11-14T15:14:29Z |
| opensuse-su-2023:0369-1 | Security update for connman | 2023-11-14T15:14:22Z | 2023-11-14T15:14:22Z |
| opensuse-su-2023:0368-1 | Security update for chromium | 2023-11-14T15:14:02Z | 2023-11-14T15:14:02Z |
| opensuse-su-2023:0363-1 | Security update for mupdf | 2023-11-11T09:01:18Z | 2023-11-11T09:01:18Z |
| opensuse-su-2023:0361-1 | Security update for tor | 2023-11-10T08:36:40Z | 2023-11-10T08:36:40Z |
| opensuse-su-2023:0360-1 | Security update for go1.21 | 2023-11-09T08:51:37Z | 2023-11-09T08:51:37Z |
| opensuse-su-2023:0354-1 | Security update for opera | 2023-11-04T09:00:12Z | 2023-11-04T09:00:12Z |
| opensuse-su-2023:0353-1 | Security update for opera | 2023-11-04T09:00:06Z | 2023-11-04T09:00:06Z |
| opensuse-su-2023:0352-1 | Security update for virtualbox | 2023-11-04T08:59:57Z | 2023-11-04T08:59:57Z |
| opensuse-su-2023:0351-1 | Security update for virtualbox | 2023-11-04T08:59:52Z | 2023-11-04T08:59:52Z |
| opensuse-su-2023:0350-1 | Security update for rubygem-activesupport-5.2 | 2023-11-03T23:01:11Z | 2023-11-03T23:01:11Z |
| opensuse-su-2023:0345-1 | Security update for roundcubemail | 2023-11-02T11:05:52Z | 2023-11-02T11:05:52Z |
| opensuse-su-2023:0338-1 | Security update for opera | 2023-10-29T05:01:23Z | 2023-10-29T05:01:23Z |
| opensuse-su-2023:0337-1 | Security update for opera | 2023-10-29T05:01:20Z | 2023-10-29T05:01:20Z |
| opensuse-su-2023:0334-1 | Security update for python-bugzilla | 2023-10-27T14:02:49Z | 2023-10-27T14:02:49Z |
| opensuse-su-2023:0329-1 | Security update for sox | 2023-10-26T11:49:08Z | 2023-10-26T11:49:08Z |
| opensuse-su-2023:0328-1 | Security update for sox | 2023-10-26T11:49:05Z | 2023-10-26T11:49:05Z |
| opensuse-su-2023:0325-1 | Security update for chromium | 2023-10-26T09:45:27Z | 2023-10-26T09:45:27Z |
| opensuse-su-2023:0310-1 | Security update for python-Django | 2023-10-20T22:01:27Z | 2023-10-20T22:01:27Z |
| opensuse-su-2023:0308-1 | Security update for chromium | 2023-10-20T10:52:45Z | 2023-10-20T10:52:45Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-16396 | Adobe Framemaker堆缓冲区溢出漏洞(CNVD-2025-16396) | 2025-07-21 | 2025-07-21 |
| cnvd-2025-16395 | Adobe Framemaker缓冲区溢出漏洞(CNVD-2025-16395) | 2025-07-21 | 2025-07-21 |
| cnvd-2025-16394 | Adobe Framemaker越界写入漏洞(CNVD-2025-16394) | 2025-07-21 | 2025-07-21 |
| cnvd-2025-16393 | Adobe Framemaker越界写入漏洞(CNVD-2025-16393) | 2025-07-21 | 2025-07-21 |
| cnvd-2025-16392 | Adobe Framemaker越界写入漏洞(CNVD-2025-16392) | 2025-07-21 | 2025-07-21 |
| cnvd-2025-16391 | Adobe Framemaker越界写入漏洞(CNVD-2025-16391) | 2025-07-21 | 2025-07-21 |
| cnvd-2025-16390 | Adobe Framemaker越界写入漏洞(CNVD-2025-16390) | 2025-07-21 | 2025-07-21 |
| cnvd-2025-16389 | Adobe Framemaker空指针解引用漏洞(CNVD-2025-16389) | 2025-07-21 | 2025-07-21 |
| cnvd-2025-16388 | Adobe Experience Manager跨站脚本漏洞(CNVD-2025-16388) | 2025-07-21 | 2025-07-21 |
| cnvd-2025-16387 | Adobe Experience Manager跨站脚本漏洞(CNVD-2025-16387) | 2025-07-21 | 2025-07-21 |
| cnvd-2025-16386 | Adobe Dimension越界写入漏洞(CNVD-2025-16386) | 2025-07-21 | 2025-07-21 |
| cnvd-2025-16385 | Adobe Dimension越界读取漏洞(CNVD-2025-16385) | 2025-07-21 | 2025-07-21 |
| cnvd-2025-16384 | Adobe ColdFusion跨站脚本漏洞(CNVD-2025-16384) | 2025-07-21 | 2025-07-21 |
| cnvd-2025-16383 | Adobe ColdFusion服务端请求伪造漏洞 | 2025-07-21 | 2025-07-21 |
| cnvd-2025-16382 | Adobe ColdFusion访问控制错误漏洞(CNVD-2025-16382) | 2025-07-21 | 2025-07-21 |
| cnvd-2025-16381 | Adobe ColdFusion跨站脚本漏洞(CNVD-2025-16381) | 2025-07-21 | 2025-07-21 |
| cnvd-2025-16380 | Adobe ColdFusion跨站脚本漏洞(CNVD-2025-16380) | 2025-07-21 | 2025-07-21 |
| cnvd-2025-16379 | Adobe ColdFusion跨站脚本漏洞(CNVD-2025-16379) | 2025-07-21 | 2025-07-21 |
| cnvd-2025-16378 | Adobe ColdFusion XXE漏洞 | 2025-07-21 | 2025-07-21 |
| cnvd-2025-16377 | Adobe ColdFusion XML注入漏洞 | 2025-07-21 | 2025-07-21 |
| cnvd-2025-16376 | Adobe ColdFusion操作系统命令注入漏洞 | 2025-07-21 | 2025-07-21 |
| cnvd-2025-16375 | Adobe ColdFusion XML外部实体注入漏洞(CNVD-2025-16375) | 2025-07-21 | 2025-07-21 |
| cnvd-2025-16374 | Adobe Audition存在未明漏洞(CNVD-2025-16374) | 2025-07-21 | 2025-07-21 |
| cnvd-2025-16373 | Adobe After Effects越界读取漏洞(CNVD-2025-16373) | 2025-07-21 | 2025-07-21 |
| cnvd-2025-16372 | Adobe After Effects空指针解引用漏洞(CNVD-2025-16372) | 2025-07-21 | 2025-07-21 |
| cnvd-2025-16518 | 深圳市吉祥腾达科技有限公司Tenda Wireless Router存在信息泄露漏洞 | 2025-06-05 | 2025-07-20 |
| cnvd-2025-16481 | 科华数据股份有限公司监控系统存在弱口令漏洞 | 2025-06-05 | 2025-07-20 |
| cnvd-2025-16466 | 天地伟业技术有限公司Net Video System存在命令执行漏洞 | 2025-06-05 | 2025-07-20 |
| cnvd-2025-16451 | 奇安信科技集团股份有限公司SecFox运维安全管理与审计系统存在命令执行漏洞 | 2025-06-05 | 2025-07-20 |
| cnvd-2025-16442 | 统信软件技术有限公司统信UOS桌面专业版存在二进制漏洞 | 2025-06-05 | 2025-07-20 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2020-avi-030 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2020-01-15T00:00:00.000000 | 2020-01-15T00:00:00.000000 |
| certfr-2020-avi-029 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2020-01-15T00:00:00.000000 | 2020-01-15T00:00:00.000000 |
| certfr-2020-avi-028 | Multiples vulnérabilités dans les produits Microsoft | 2020-01-14T00:00:00.000000 | 2020-01-14T00:00:00.000000 |
| certfr-2020-avi-027 | Multiples vulnérabilités dans Microsoft .Net | 2020-01-14T00:00:00.000000 | 2020-01-14T00:00:00.000000 |
| certfr-2020-avi-026 | Multiples vulnérabilités dans Microsoft Windows | 2020-01-14T00:00:00.000000 | 2020-01-14T00:00:00.000000 |
| certfr-2020-avi-025 | Multiples vulnérabilités dans Microsoft Office | 2020-01-14T00:00:00.000000 | 2020-01-14T00:00:00.000000 |
| certfr-2020-avi-024 | Vulnérabilité dans Microsoft IE | 2020-01-14T00:00:00.000000 | 2020-01-14T00:00:00.000000 |
| certfr-2020-avi-023 | Multiples vulnérabilités dans les produits Siemens | 2020-01-14T00:00:00.000000 | 2020-01-14T00:00:00.000000 |
| certfr-2020-avi-022 | Vulnérabilité dans Schneider Electric MSX Configurator | 2020-01-14T00:00:00.000000 | 2020-01-14T00:00:00.000000 |
| certfr-2020-avi-021 | Vulnérabilité dans GitLab | 2020-01-14T00:00:00.000000 | 2020-01-14T00:00:00.000000 |
| certfr-2020-avi-020 | Vulnérabilité dans Fortinet FortiSIEM | 2020-01-14T00:00:00.000000 | 2020-01-14T00:00:00.000000 |
| certfr-2020-avi-019 | Multiples vulnérabilités dans Mozilla Thunderbird | 2020-01-13T00:00:00.000000 | 2020-01-13T00:00:00.000000 |
| certfr-2020-avi-018 | Vulnérabilité dans Citrix SD-WAN | 2020-01-10T00:00:00.000000 | 2020-01-10T00:00:00.000000 |
| certfr-2020-avi-017 | Vulnérabilité dans Vmware Workspace ONE | 2020-01-10T00:00:00.000000 | 2020-01-10T00:00:00.000000 |
| certfr-2020-avi-016 | Vulnérabilité dans Mozilla Firefox | 2020-01-09T00:00:00.000000 | 2020-01-09T00:00:00.000000 |
| certfr-2020-avi-015 | Multiples vulnérabilités dans les produits Juniper | 2020-01-09T00:00:00.000000 | 2020-01-09T00:00:00.000000 |
| certfr-2020-avi-014 | Multiples vulnérabilités dans les produits Cisco | 2020-01-09T00:00:00.000000 | 2020-01-09T00:00:00.000000 |
| certfr-2020-avi-013 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2020-01-09T00:00:00.000000 | 2020-01-09T00:00:00.000000 |
| certfr-2020-avi-012 | Multiples vulnérabilités dans Mozilla Firefox | 2020-01-08T00:00:00.000000 | 2020-01-08T00:00:00.000000 |
| certfr-2020-avi-011 | Multiples vulnérabilités dans Tenable Tenable.sc | 2020-01-08T00:00:00.000000 | 2020-01-08T00:00:00.000000 |
| certfr-2020-avi-010 | Vulnérabilité dans phpMyAdmin | 2020-01-08T00:00:00.000000 | 2020-01-08T00:00:00.000000 |
| certfr-2020-avi-009 | Multiples vulnérabilités dans Google Chrome | 2020-01-08T00:00:00.000000 | 2020-01-08T00:00:00.000000 |
| certfr-2020-avi-008 | Multiples vulnérabilités dans Google Android | 2020-01-08T00:00:00.000000 | 2020-01-08T00:00:00.000000 |
| certfr-2020-avi-007 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2020-01-08T00:00:00.000000 | 2020-01-08T00:00:00.000000 |
| certfr-2020-avi-006 | Vulnérabilité dans Fortinet FortiAuthenticator | 2020-01-08T00:00:00.000000 | 2020-01-08T00:00:00.000000 |
| certfr-2020-avi-005 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2020-01-07T00:00:00.000000 | 2020-01-07T00:00:00.000000 |
| certfr-2020-avi-004 | Multiples vulnérabilités dans les produits Fortinet | 2020-01-06T00:00:00.000000 | 2020-01-06T00:00:00.000000 |
| certfr-2020-avi-003 | Vulnérabilité dans Moxa MGate 5105-MB-EIP | 2020-01-06T00:00:00.000000 | 2020-01-06T00:00:00.000000 |
| certfr-2020-avi-002 | Multiples vulnérabilités dans GitLab | 2020-01-03T00:00:00.000000 | 2020-01-03T00:00:00.000000 |
| certfr-2020-avi-001 | Multiples vulnérabilités dans Cisco DCNM | 2020-01-02T00:00:00.000000 | 2020-01-02T00:00:00.000000 |