Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-47997 |
6.5 (3.1)
|
Microsoft SQL Server Information Disclosure Vulnerability |
Microsoft |
Microsoft SQL Server 2016 Service Pack 3 (GDR) |
2025-09-09T17:01:09.074Z | 2026-02-20T16:00:40.021Z |
| CVE-2025-32720 |
5.5 (3.1)
|
Windows Storage Management Provider Information Disclo… |
Microsoft |
Windows 10 Version 1507 |
2025-06-10T17:02:14.043Z | 2026-02-20T16:00:39.187Z |
| CVE-2025-32719 |
5.5 (3.1)
|
Windows Storage Management Provider Information Disclo… |
Microsoft |
Windows 10 Version 1507 |
2025-06-10T17:02:13.413Z | 2026-02-20T16:00:38.562Z |
| CVE-2025-49728 |
4 (3.1)
|
Microsoft PC Manager Security Feature Bypass Vulnerability |
Microsoft |
Microsoft PC Manager |
2025-09-16T18:13:11.150Z | 2026-02-20T16:00:38.124Z |
| CVE-2025-47967 |
4.7 (3.1)
|
Microsoft Edge (Chromium-based) for Android Spoofing V… |
Microsoft |
Microsoft Edge (Chromium-based) |
2025-09-16T18:13:10.558Z | 2026-02-20T16:00:37.257Z |
| CVE-2025-32716 |
7.8 (3.1)
|
Windows Media Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1507 |
2025-06-10T17:02:11.920Z | 2026-02-20T16:00:37.062Z |
| CVE-2025-32715 |
6.5 (3.1)
|
Remote Desktop Protocol Client Information Disclosure … |
Microsoft |
Remote Desktop client for Windows Desktop |
2025-06-10T17:02:11.223Z | 2026-02-20T16:00:36.317Z |
| CVE-2025-32714 |
7.8 (3.1)
|
Windows Installer Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1507 |
2025-06-10T17:02:10.510Z | 2026-02-20T16:00:35.556Z |
| CVE-2025-55243 |
7.5 (3.1)
|
Microsoft OfficePlus Spoofing Vulnerability |
Microsoft |
Microsoft OfficePLUS |
2025-09-09T17:01:06.531Z | 2026-02-20T16:00:35.402Z |
| CVE-2025-55236 |
7.3 (3.1)
|
Graphics Kernel Remote Code Execution Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2025-09-09T17:01:05.384Z | 2026-02-20T16:00:33.720Z |
| CVE-2025-32710 |
8.1 (3.1)
|
Windows Remote Desktop Services Remote Code Execution … |
Microsoft |
Windows Server 2008 R2 Service Pack 1 |
2025-06-10T17:02:08.524Z | 2026-02-20T16:00:33.143Z |
| CVE-2025-55232 |
9.8 (3.1)
|
Microsoft High Performance Compute (HPC) Pack Remote C… |
Microsoft |
Microsoft HPC Pack 2019 |
2025-09-09T17:01:04.860Z | 2026-02-20T16:00:33.073Z |
| CVE-2025-30399 |
7.5 (3.1)
|
.NET and Visual Studio Remote Code Execution Vulnerability |
Microsoft |
.NET 8.0 |
2025-06-13T01:08:00.208Z | 2026-02-20T16:00:32.339Z |
| CVE-2025-55226 |
6.7 (3.1)
|
Graphics Kernel Remote Code Execution Vulnerability |
Microsoft |
Windows 10 Version 1507 |
2025-09-09T17:01:03.660Z | 2026-02-20T16:00:31.543Z |
| CVE-2025-55225 |
6.5 (3.1)
|
Windows Routing and Remote Access Service (RRAS) Infor… |
Microsoft |
Windows Server 2008 R2 Service Pack 1 |
2025-09-09T17:01:03.108Z | 2026-02-20T16:00:30.789Z |
| CVE-2025-54918 |
8.8 (3.1)
|
Windows NTLM Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1507 |
2025-09-09T17:01:00.822Z | 2026-02-20T16:00:28.449Z |
| CVE-2025-54916 |
7.8 (3.1)
|
Windows NTFS Remote Code Execution Vulnerability |
Microsoft |
Windows 10 Version 1507 |
2025-09-09T17:01:00.277Z | 2026-02-20T16:00:27.426Z |
| CVE-2025-54913 |
7.8 (3.1)
|
Windows UI XAML Maps MapControlSettings Elevation of P… |
Microsoft |
Windows 10 Version 1507 |
2025-09-09T17:00:59.724Z | 2026-02-20T16:00:26.821Z |
| CVE-2025-54907 |
7.8 (3.1)
|
Microsoft Office Visio Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-09-09T17:00:58.387Z | 2026-02-20T16:00:25.193Z |
| CVE-2025-54905 |
7.1 (3.1)
|
Microsoft Word Information Disclosure Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-09-09T17:00:57.268Z | 2026-02-20T16:00:23.697Z |
| CVE-2025-54903 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-09-09T17:00:55.968Z | 2026-02-20T16:00:22.055Z |
| CVE-2025-54895 |
7.8 (3.1)
|
SPNEGO Extended Negotiation (NEGOEX) Security Mechanis… |
Microsoft |
Windows 10 Version 1507 |
2025-09-09T17:00:52.371Z | 2026-02-20T16:00:18.435Z |
| CVE-2025-54894 |
7.8 (3.1)
|
Local Security Authority Subsystem Service Elevation o… |
Microsoft |
Windows 10 Version 1507 |
2025-09-09T17:00:51.652Z | 2026-02-20T16:00:17.688Z |
| CVE-2025-54111 |
7.8 (3.1)
|
Windows UI XAML Phone DatePickerFlyout Elevation of Pr… |
Microsoft |
Windows 10 Version 1507 |
2025-09-09T17:00:51.074Z | 2026-02-20T16:00:16.973Z |
| CVE-2025-54110 |
8.8 (3.1)
|
Windows Kernel Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1507 |
2025-09-09T17:00:50.413Z | 2026-02-20T16:00:16.405Z |
| CVE-2025-54101 |
4.8 (3.1)
|
Windows SMB Client Remote Code Execution Vulnerability |
Microsoft |
Windows 10 Version 1507 |
2025-09-09T17:00:48.406Z | 2026-02-20T16:00:14.342Z |
| CVE-2025-54099 |
7 (3.1)
|
Windows Ancillary Function Driver for WinSock Elevatio… |
Microsoft |
Windows 10 Version 1507 |
2025-09-09T17:00:47.771Z | 2026-02-20T16:00:13.718Z |
| CVE-2025-54097 |
6.5 (3.1)
|
Windows Routing and Remote Access Service (RRAS) Infor… |
Microsoft |
Windows Server 2008 R2 Service Pack 1 |
2025-09-09T17:00:47.200Z | 2026-02-20T16:00:13.164Z |
| CVE-2025-54096 |
6.5 (3.1)
|
Windows Routing and Remote Access Service (RRAS) Infor… |
Microsoft |
Windows Server 2008 R2 Service Pack 1 |
2025-09-09T17:00:46.460Z | 2026-02-20T16:00:12.335Z |
| CVE-2025-54095 |
6.5 (3.1)
|
Windows Routing and Remote Access Service (RRAS) Infor… |
Microsoft |
Windows Server 2008 R2 Service Pack 1 |
2025-09-09T17:00:45.132Z | 2026-02-20T16:00:11.347Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-1160 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
PHPGurukul Directory Management System Search index.ph… |
PHPGurukul |
Directory Management System |
2026-01-19T15:32:07.423Z | 2026-02-23T08:47:15.683Z |
| CVE-2026-1162 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
UTT HiPER 810 setSysAdm strcpy buffer overflow |
UTT |
HiPER 810 |
2026-01-19T16:32:06.149Z | 2026-02-23T08:47:39.436Z |
| CVE-2026-25505 |
9.8 (3.1)
|
Bambuddy Uses Hardcoded Secret Key + Many API Endpoint… |
maziggy |
bambuddy |
2026-02-04T20:06:30.538Z | 2026-02-06T18:41:07.205Z |
| CVE-2025-47283 |
9.9 (3.0)
|
Bypassing project secret validation can lead to privil… |
gardener |
gardener |
2025-05-19T18:46:11.863Z | 2026-02-06T18:56:18.344Z |
| CVE-2025-14472 |
8.1 (3.1)
|
Acquia Content Hub - Moderately critical - Cross-Site … |
Drupal |
Acquia Content Hub |
2026-01-28T20:03:09.029Z | 2026-01-29T18:22:18.916Z |
| CVE-2025-13984 |
6.1 (3.1)
|
Next.js - Critical - Access bypass - SA-CONTRIB-2025-122 |
Drupal |
Next.js |
2026-01-28T20:02:22.486Z | 2026-01-29T18:24:28.956Z |
| CVE-2025-13986 |
4.2 (3.1)
|
Disable Login Page - Critical - Access bypass - SA-CON… |
Drupal |
Disable Login Page |
2026-01-28T20:02:53.919Z | 2026-02-02T17:59:32.672Z |
| CVE-2025-13985 |
5.3 (3.1)
|
Entity Share - Moderately critical - Access bypass, In… |
Drupal |
Entity Share |
2026-01-28T20:02:40.252Z | 2026-01-29T17:53:36.778Z |
| CVE-2025-14840 |
7.5 (3.1)
|
HTTP Client Manager - Less critical - Information disc… |
Drupal |
HTTP Client Manager |
2026-01-28T20:03:21.686Z | 2026-01-29T16:30:13.234Z |
| CVE-2025-61726 |
7.5 (3.1)
|
Memory exhaustion in query parameter parsing in net/url |
Go standard library |
net/url |
2026-01-28T19:30:31.215Z | 2026-01-29T18:31:59.685Z |
| CVE-2025-61728 |
6.5 (3.1)
|
Excessive CPU consumption when building archive index … |
Go standard library |
archive/zip |
2026-01-28T19:30:31.354Z | 2026-01-29T18:30:24.487Z |
| CVE-2025-61731 |
7.8 (3.1)
|
Arbitrary file write using cgo pkg-config directive in… |
Go toolchain |
cmd/go |
2026-01-28T19:30:30.844Z | 2026-02-26T15:04:45.375Z |
| CVE-2025-68119 |
7 (3.1)
|
Unexpected code execution when invoking toolchain in cmd/go |
Go toolchain |
cmd/go |
2026-01-28T19:30:30.704Z | 2026-02-26T15:04:45.665Z |
| CVE-2026-0630 |
8.5 (4.0)
|
Command Injection Vulnerability on TP-Link Archer BE230 v1.2 |
TP-Link Systems Inc. |
Archer BE230 v1.2 |
2026-02-02T17:48:05.697Z | 2026-02-26T15:04:33.534Z |
| CVE-2026-1533 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
code-projects Online Music Site AdminAddCategory.php s… |
code-projects |
Online Music Site |
2026-01-28T20:32:10.974Z | 2026-02-23T09:00:58.745Z |
| CVE-2026-0631 |
8.5 (4.0)
|
Command Injection Vulnerability on TP-Link Archer BE230 v1.2 |
TP-Link Systems Inc. |
Archer BE230 v1.2 |
2026-02-02T17:48:21.791Z | 2026-02-26T15:04:33.234Z |
| CVE-2026-22221 |
8.5 (4.0)
|
Command Injection Vulnerability on TP-Link Archer BE230 v1.2 |
TP-Link Systems Inc. |
Archer BE230 v1.2 |
2026-02-02T17:43:24.983Z | 2026-02-26T15:04:33.784Z |
| CVE-2026-22222 |
8.5 (4.0)
|
Command Injection Vulnerability on TP-Link Archer BE230 v1.2 |
TP-Link Systems Inc. |
Archer BE230 v1.2 |
2026-02-02T17:49:22.166Z | 2026-02-26T15:04:32.952Z |
| CVE-2026-22223 |
8.5 (4.0)
|
Command Injection Vulnerability on TP-Link Archer BE230 v1.2 |
TP-Link System Inc. |
Archer BE230 v1.2 |
2026-02-02T17:49:58.951Z | 2026-02-26T15:04:32.609Z |
| CVE-2026-22224 |
8.5 (4.0)
|
Command Injection Vulnerability on TP-Link Archer BE230 v1.2 |
TP-Link Systems Inc. |
Archer BE230 v1.2 |
2026-02-02T17:52:04.728Z | 2026-02-26T15:04:32.327Z |
| CVE-2026-22225 |
8.5 (4.0)
|
Command Injection Vulnerability on TP-Link Archer BE230 v1.2 |
TP-Link Systems Inc. |
Archer BE230 v1.2 |
2026-02-02T17:53:42.203Z | 2026-02-26T15:04:32.008Z |
| CVE-2026-22227 |
8.5 (4.0)
|
Command Injection Vulnerability on TP-Link Archer BE230 v1.2 |
TP-Link Systems Inc. |
Archer BE230 v1.2 |
2026-02-02T17:56:25.111Z | 2026-02-26T15:04:31.418Z |
| CVE-2026-22229 |
8.6 (4.0)
|
Command Injection Vulnerability on TP-Link Archer BE230 v1.2 |
TP-Link Systems Inc. |
Archer BE230 v1.2 |
2026-02-02T17:58:32.205Z | 2026-02-26T15:04:31.085Z |
| CVE-2026-22226 |
8.5 (4.0)
|
Command Injection Vulnerability on TP-Link Archer BE230 v1.2 |
TP-Link Systems Inc. |
Archer BE230 v1.2 |
2026-02-02T17:55:30.434Z | 2026-02-26T15:04:31.731Z |
| CVE-2025-12810 |
5.3 (4.0)
|
Failure in Password Rotation and Check-in Mechanism in… |
Delinea Inc. |
Secret Server On-Prem |
2026-01-27T19:46:04.677Z | 2026-01-27T20:51:42.590Z |
| CVE-2025-5553 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
PHPGurukul Rail Pass Management System download-pass.p… |
PHPGurukul |
Rail Pass Management System |
2025-06-04T02:00:22.090Z | 2026-02-06T17:21:36.762Z |
| CVE-2023-6425 |
6.3 (3.1)
|
Cross-site Scripting vulnerability in BigProf products |
BigProf |
Online Clinic Management System |
2023-11-30T13:49:37.332Z | 2026-02-06T17:16:22.258Z |
| CVE-2022-40924 |
7.2 (3.1)
|
Zoo Management System v1.0 has an arbitrary file … |
n/a |
n/a |
2022-09-26T12:03:15.000Z | 2026-02-06T17:28:06.523Z |
| CVE-2026-24883 |
3.7 (3.1)
|
In GnuPG before 2.5.17, a long signature packet l… |
GnuPG |
GnuPG |
2026-01-27T18:43:18.883Z | 2026-01-28T15:52:11.076Z |
| CVE-2026-24882 |
8.4 (3.1)
|
In GnuPG before 2.5.17, a stack-based buffer over… |
GnuPG |
GnuPG |
2026-01-27T18:40:18.166Z | 2026-01-28T15:45:56.231Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-22227 | A command injection vulnerability may be exploited after the admin's authentication via the configu… | 2026-02-02T18:16:15.540 | 2026-02-06T18:30:59.340 |
| fkie_cve-2026-22229 | A command injection vulnerability may be exploited after the admin's authentication via the import … | 2026-02-02T18:16:15.673 | 2026-02-06T18:29:56.750 |
| fkie_cve-2026-22226 | A command injection vulnerability may be exploited after the admin's authentication in the VPN serv… | 2026-02-02T18:16:15.407 | 2026-02-06T18:27:15.303 |
| fkie_cve-2025-12810 | Improper Authentication vulnerability in Delinea Inc. Secret Server On-Prem (RPC Password Rotation … | 2026-01-27T20:16:14.320 | 2026-02-06T18:26:20.253 |
| fkie_cve-2025-5553 | A vulnerability classified as critical was found in PHPGurukul Rail Pass Management System 1.0. Aff… | 2025-06-04T03:15:27.517 | 2026-02-06T18:15:54.987 |
| fkie_cve-2023-6425 | A vulnerability has been discovered in BigProf Online Clinic Management System 2.2, which does not … | 2023-11-30T14:15:20.317 | 2026-02-06T18:15:54.640 |
| fkie_cve-2022-40924 | Zoo Management System v1.0 has an arbitrary file upload vulnerability in the picture upload point o… | 2022-09-26T13:15:11.643 | 2026-02-06T18:15:54.353 |
| fkie_cve-2026-24883 | In GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success wit… | 2026-01-27T19:16:16.823 | 2026-02-06T18:06:07.760 |
| fkie_cve-2026-24882 | In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the P… | 2026-01-27T19:16:16.670 | 2026-02-06T17:50:53.153 |
| fkie_cve-2026-0537 | A maliciously crafted RGB file, when parsed through Autodesk 3ds Max, can force a Memory Corruption… | 2026-02-04T17:16:12.237 | 2026-02-06T17:49:40.607 |
| fkie_cve-2026-0538 | A maliciously crafted GIF file, when parsed through Autodesk 3ds Max, can force an Out-of-Bounds Wr… | 2026-02-04T17:16:12.403 | 2026-02-06T17:49:06.210 |
| fkie_cve-2024-37385 | Roundcube Webmail before 1.5.7 and 1.6.x before 1.6.7 on Windows allows command injection via im_co… | 2024-06-07T04:15:30.720 | 2026-02-06T17:48:55.880 |
| fkie_cve-2026-0660 | A maliciously crafted GIF file, when parsed through Autodesk 3ds Max, can cause a Stack-Based Buffe… | 2026-02-04T17:16:12.790 | 2026-02-06T17:48:33.337 |
| fkie_cve-2026-1504 | Inappropriate implementation in Background Fetch API in Google Chrome prior to 144.0.7559.110 allow… | 2026-01-27T21:16:00.480 | 2026-02-06T17:45:56.510 |
| fkie_cve-2026-0227 | A vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to cause … | 2026-01-15T19:16:05.087 | 2026-02-06T17:37:28.723 |
| fkie_cve-2025-14512 | A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (D… | 2025-12-11T07:16:00.463 | 2026-02-06T17:20:29.617 |
| fkie_cve-2025-14087 | A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap cor… | 2025-12-10T09:15:47.053 | 2026-02-06T17:19:39.453 |
| fkie_cve-2026-23110 | In the Linux kernel, the following vulnerability has been resolved: scsi: core: Wake up the error … | 2026-02-04T17:16:21.880 | 2026-02-06T17:16:25.900 |
| fkie_cve-2026-23108 | In the Linux kernel, the following vulnerability has been resolved: can: usb_8dev: usb_8dev_read_b… | 2026-02-04T17:16:21.673 | 2026-02-06T17:16:25.810 |
| fkie_cve-2026-23107 | In the Linux kernel, the following vulnerability has been resolved: arm64/fpsimd: signal: Allocate… | 2026-02-04T17:16:21.570 | 2026-02-06T17:16:25.717 |
| fkie_cve-2026-23105 | In the Linux kernel, the following vulnerability has been resolved: net/sched: qfq: Use cl_is_acti… | 2026-02-04T17:16:21.370 | 2026-02-06T17:16:25.617 |
| fkie_cve-2026-23103 | In the Linux kernel, the following vulnerability has been resolved: ipvlan: Make the addrs_lock be… | 2026-02-04T17:16:21.177 | 2026-02-06T17:16:25.527 |
| fkie_cve-2026-23102 | In the Linux kernel, the following vulnerability has been resolved: arm64/fpsimd: signal: Fix rest… | 2026-02-04T17:16:21.077 | 2026-02-06T17:16:25.430 |
| fkie_cve-2026-23101 | In the Linux kernel, the following vulnerability has been resolved: leds: led-class: Only Add LED … | 2026-02-04T17:16:20.977 | 2026-02-06T17:16:25.317 |
| fkie_cve-2026-23099 | In the Linux kernel, the following vulnerability has been resolved: bonding: limit BOND_MODE_8023A… | 2026-02-04T17:16:20.777 | 2026-02-06T17:16:25.223 |
| fkie_cve-2026-23098 | In the Linux kernel, the following vulnerability has been resolved: netrom: fix double-free in nr_… | 2026-02-04T17:16:20.680 | 2026-02-06T17:16:25.133 |
| fkie_cve-2026-23097 | In the Linux kernel, the following vulnerability has been resolved: migrate: correct lock ordering… | 2026-02-04T17:16:20.570 | 2026-02-06T17:16:25.040 |
| fkie_cve-2026-23096 | In the Linux kernel, the following vulnerability has been resolved: uacce: fix cdev handling in th… | 2026-02-04T17:16:20.473 | 2026-02-06T17:16:24.940 |
| fkie_cve-2026-23095 | In the Linux kernel, the following vulnerability has been resolved: gue: Fix skb memleak with inne… | 2026-02-04T17:16:20.370 | 2026-02-06T17:16:24.843 |
| fkie_cve-2026-23093 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: smbd: fix dma_unmap_sg(… | 2026-02-04T17:16:20.177 | 2026-02-06T17:16:24.743 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-f6mf-xjgg-34j8 |
7.8 (3.1)
|
A local low privileged attacker can bypass the authentication of the Device Manager user interface,… | 2026-01-27T12:31:18Z | 2026-01-27T12:31:18Z |
| ghsa-9x3w-xc3m-rx49 |
10.0 (4.0)
|
Out-of-bounds Write, Divide By Zero, NULL Pointer Dereference, Use of Uninitialized Resource, Out-o… | 2026-01-27T12:31:18Z | 2026-01-27T12:31:18Z |
| ghsa-8283-g649-xjrh |
8.8 (3.1)
|
A low privileged remote attacker can execute arbitrary code by sending specially crafted calls to t… | 2026-01-27T12:31:18Z | 2026-01-27T12:31:18Z |
| ghsa-4hm5-jmp9-7g72 |
6.9 (4.0)
|
Pix-Link LV-WR21Q does not enforce any form of authentication for endpoint /goform/getHomePageInfo.… | 2026-01-27T12:31:18Z | 2026-01-27T12:31:18Z |
| ghsa-3gh2-3c3q-2933 |
5.3 (3.1)
|
A low privileged remote attacker may be able to disclose confidential information from the memory o… | 2026-01-27T12:31:18Z | 2026-01-27T12:31:18Z |
| ghsa-382v-76mx-pqx3 |
6.5 (3.1)
|
Out-of-bounds Write, Heap-based Buffer Overflow vulnerability in Is-Daouda is-Engine.This issue aff… | 2026-01-27T12:31:18Z | 2026-01-27T12:31:18Z |
| ghsa-292q-v67v-f66g |
6.9 (4.0)
|
A vulnerability in the Pix-Link LV-WR21Q router's language module allows remote attackers to trigge… | 2026-01-27T12:31:18Z | 2026-01-27T12:31:18Z |
| ghsa-pqh8-v6gf-267q |
7.0 (3.1)
|
Dell CloudBoost Virtual Appliance, versions prior to 19.14.0.0, contains a Plaintext Storage of Pas… | 2026-01-27T12:31:17Z | 2026-01-27T12:31:17Z |
| ghsa-8pm5-xr39-vfv3 |
6.1 (3.1)
|
A flaw was found in libsoup, an HTTP client library. This vulnerability, known as CRLF (Carriage Re… | 2026-01-27T12:31:17Z | 2026-01-27T12:31:17Z |
| ghsa-xg4q-g85w-x6x5 |
6.9 (4.0)
|
Missing Release of Memory after Effective Lifetime vulnerability in ydb-platform ydb (contrib/libs/… | 2026-01-27T09:30:31Z | 2026-01-27T09:30:31Z |
| ghsa-mvcg-wp8g-8fcv |
10.0 (4.0)
|
Out-of-bounds Write, Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnera… | 2026-01-27T09:30:31Z | 2026-01-27T09:30:31Z |
| ghsa-49v6-p72m-p687 |
6.9 (4.0)
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-01-27T09:30:31Z | 2026-01-27T09:30:31Z |
| ghsa-3vcc-ghcj-6f52 |
10.0 (4.0)
|
Out-of-bounds Write, Heap-based Buffer Overflow vulnerability in ttttupup wxhelper (src modules). T… | 2026-01-27T09:30:31Z | 2026-01-27T09:30:31Z |
| ghsa-w586-qrfw-4qhv |
8.7 (4.0)
|
Out-of-bounds Write vulnerability in praydog UEVR (dependencies/lua/src modules). This vulnerabilit… | 2026-01-27T09:30:30Z | 2026-01-27T09:30:30Z |
| ghsa-vx2x-xf93-9fw9 |
9.2 (4.0)
|
Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in coolsnowwolf lede (package/… | 2026-01-27T09:30:30Z | 2026-01-27T09:30:30Z |
| ghsa-v546-jrfg-ph8q |
8.3 (4.0)
|
Integer Overflow or Wraparound vulnerability in RawTherapee (rtengine modules). This vulnerability … | 2026-01-27T09:30:30Z | 2026-01-27T09:30:30Z |
| ghsa-mvr7-j94c-mhvx |
10.0 (4.0)
|
Out-of-bounds Write, Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnera… | 2026-01-27T09:30:30Z | 2026-01-27T09:30:30Z |
| ghsa-mjw4-g269-g6rc |
6.9 (4.0)
|
Vulnerability in Ralim IronOS (source/Core/BSP/Pinecilv2/bl_mcu_sdk/components/ble/ble_stack/common… | 2026-01-27T09:30:30Z | 2026-01-27T09:30:30Z |
| ghsa-mhvc-rf83-29wq |
10.0 (4.0)
|
Unrestricted Upload of File with Dangerous Type, Deserialization of Untrusted Data vulnerability in… | 2026-01-27T09:30:30Z | 2026-01-27T09:30:30Z |
| ghsa-mfmq-rvc6-qmj6 |
9.3 (4.0)
|
Out-of-bounds Read vulnerability in turanszkij WickedEngine (WickedEngine/LUA modules). This vulner… | 2026-01-27T09:30:30Z | 2026-01-27T09:30:30Z |
| ghsa-f5w7-wwr4-x5v8 |
6.9 (4.0)
|
Out-of-bounds Read vulnerability in praydog UEVR (dependencies/lua/src modules). This vulnerability… | 2026-01-27T09:30:30Z | 2026-01-27T09:30:30Z |
| ghsa-f54x-35h3-w53w |
6.7 (4.0)
|
NULL Pointer Dereference vulnerability in visualfc liteide (liteidex/src/3rdparty/libvterm/src modu… | 2026-01-27T09:30:30Z | 2026-01-27T09:30:30Z |
| ghsa-9549-fwq2-p6hg |
5.2 (4.0)
|
Out-of-bounds Write, Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnera… | 2026-01-27T09:30:30Z | 2026-01-27T09:30:30Z |
| ghsa-6x36-5hv7-6j2r |
10.0 (4.0)
|
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in rethinkdb (… | 2026-01-27T09:30:30Z | 2026-01-27T09:30:30Z |
| ghsa-43mh-3pgg-2xjc |
9.2 (4.0)
|
Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in coolsnowwolf lede (package/… | 2026-01-27T09:30:30Z | 2026-01-27T09:30:30Z |
| ghsa-3jw7-fx6j-pr6g |
8.7 (4.0)
|
NULL Pointer Dereference vulnerability in abcz316 SKRoot-linuxKernelRoot (testRoot/jni/utils module… | 2026-01-27T09:30:30Z | 2026-01-27T09:30:30Z |
| ghsa-2xjq-x834-qrr3 |
6.9 (4.0)
|
An issue from the component luaG_runerror in dependencies/lua/src/ldebug.c in praydog/REFramework v… | 2026-01-27T09:30:30Z | 2026-01-27T09:30:30Z |
| ghsa-2rr6-9w84-3v7p |
10.0 (4.0)
|
Integer Overflow or Wraparound vulnerability in swoole swoole-src (thirdparty/hiredis modules). Thi… | 2026-01-27T09:30:30Z | 2026-01-27T09:30:30Z |
| ghsa-2f52-79rv-444c |
5.1 (4.0)
|
Out-of-bounds Read vulnerability in turanszkij WickedEngine (WickedEngine/LUA modules). This vulner… | 2026-01-27T09:30:30Z | 2026-01-27T09:30:30Z |
| ghsa-23fx-gfqr-cvpx |
9.3 (4.0)
|
Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in GaijinEnte… | 2026-01-27T09:30:30Z | 2026-01-27T09:30:30Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-29201 | JumpServer is an open source bastion host and an operation and maintenance security audit… | 2024-04-02T05:02:57.473158Z |
| gsd-2024-29306 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.472817Z |
| gsd-2024-29093 | Cross-Site Request Forgery (CSRF) vulnerability in Tobias Conrad Builder for WooCommerce … | 2024-04-02T05:02:57.472328Z |
| gsd-2024-29378 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.471995Z |
| gsd-2024-29151 | Rocket.Chat.Audit through 5ad78e8 depends on filecachetools, which does not exist in PyPI. | 2024-04-02T05:02:57.471551Z |
| gsd-2024-29247 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.471124Z |
| gsd-2024-29813 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-02T05:02:57.470461Z |
| gsd-2024-29361 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.470030Z |
| gsd-2024-29544 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.469766Z |
| gsd-2024-29701 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.469502Z |
| gsd-2024-29218 | Out-of-bounds write vulnerability exists in KV STUDIO Ver.11.64 and earlier and KV REPLAY… | 2024-04-02T05:02:57.469165Z |
| gsd-2024-29741 | In pblS2mpuResume of s2mpu.c, there is a possible mitigation bypass due to a logic error … | 2024-04-02T05:02:57.468877Z |
| gsd-2024-29559 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.468658Z |
| gsd-2024-29106 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-02T05:02:57.468127Z |
| gsd-2024-29713 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.467568Z |
| gsd-2024-29691 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.467308Z |
| gsd-2024-29669 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.467052Z |
| gsd-2024-29371 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.466792Z |
| gsd-2024-29774 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-02T05:02:57.466300Z |
| gsd-2024-29357 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.465925Z |
| gsd-2024-29377 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.465660Z |
| gsd-2024-29115 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-02T05:02:57.465151Z |
| gsd-2024-29799 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-02T05:02:57.464399Z |
| gsd-2024-29289 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.463967Z |
| gsd-2024-29129 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-02T05:02:57.463509Z |
| gsd-2024-29086 | in OpenHarmony v3.2.4 and prior versions allow a local attacker cause DOS through stack o… | 2024-04-02T05:02:57.463179Z |
| gsd-2024-29406 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.462910Z |
| gsd-2024-29658 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.462634Z |
| gsd-2024-29348 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.462352Z |
| gsd-2024-29109 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-02T05:02:57.461890Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-189479 | Malicious code in short-easy-epsilon-beta-container (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189478 | Malicious code in short-easy-cat-mock-daemon (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189477 | Malicious code in shelljs-zephyr-ariel-brane (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189476 | Malicious code in shelljs-test-mira-neptune (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189475 | Malicious code in shelljs-package-writable-jabbah (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189474 | Malicious code in shelljs-fermiparadox-bootes-xml (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189473 | Malicious code in shelljs-biotechnology-leda-europa (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189472 | Malicious code in shell-process-eta-star-omicron (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189471 | Malicious code in shell-omicron-dog-bash-simple (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189470 | Malicious code in shell-integer-optimize-log-promise (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189469 | Malicious code in shell-double-gamma-shell-kappa (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189468 | Malicious code in shell-class-encrypt-info-zeta (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189467 | Malicious code in server-weywot-ablation-ablation (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189466 | Malicious code in server-redis-umbra-fornax (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189465 | Malicious code in server-publish-ultra-ultra (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189464 | Malicious code in server-nestjs-selenium-cassini (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189463 | Malicious code in server-nebula-cosmiconfig-umbra (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189462 | Malicious code in server-filament-framework-css-minimizer-webpack-plugin (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189461 | Malicious code in server-child-process-cosmicray-extremophile (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189460 | Malicious code in server-carpo-carpo-cosmicray (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189459 | Malicious code in server-callback-css-loader-archaeoastronomy (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189458 | Malicious code in server-astrometry-ceres-aether (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189457 | Malicious code in server-asteroid-foundation-native (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189456 | Malicious code in serialize-stack-omega-node-authorize (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189455 | Malicious code in serialize-short-grep-async-float (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189454 | Malicious code in serialize-quick-alpha-book-resolve (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189453 | Malicious code in serialize-minify-decompress-mu-cron (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189452 | Malicious code in serialize-final-beta-deserialize-await (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189451 | Malicious code in serialize-eta-authenticate-authorize-sigma (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189450 | Malicious code in serialize-cloud-key-array-secure (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2023-2523 | wpa_supplicant: Schwachstelle ermöglicht Manipulation von Dateien | 2021-04-06T22:00:00.000+00:00 | 2024-06-26T22:00:00.000+00:00 |
| wid-sec-w-2023-2012 | Intel Firmware: Mehrere Schwachstellen | 2023-08-08T22:00:00.000+00:00 | 2024-06-26T22:00:00.000+00:00 |
| wid-sec-w-2023-2003 | Intel BIOS: Mehrere Schwachstellen | 2023-08-08T22:00:00.000+00:00 | 2024-06-26T22:00:00.000+00:00 |
| wid-sec-w-2023-1886 | Sophos Unified Threat Management (UTM) Software: Mehrere Schwachstellen | 2023-07-25T22:00:00.000+00:00 | 2024-06-26T22:00:00.000+00:00 |
| wid-sec-w-2023-0374 | Intel BIOS: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2023-02-14T23:00:00.000+00:00 | 2024-06-26T22:00:00.000+00:00 |
| wid-sec-w-2022-1999 | Intel Chipset: Mehrere Schwachstellen | 2022-11-08T23:00:00.000+00:00 | 2024-06-26T22:00:00.000+00:00 |
| wid-sec-w-2022-1984 | Intel BIOS: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2022-11-08T23:00:00.000+00:00 | 2024-06-26T22:00:00.000+00:00 |
| wid-sec-w-2022-0994 | Intel BIOS-Firmware für Intel Prozessoren: Schwachstelle ermöglicht Privilegieneskalation | 2022-08-09T22:00:00.000+00:00 | 2024-06-26T22:00:00.000+00:00 |
| wid-sec-w-2022-0991 | Intel Chipset Firmware: Schwachstelle ermöglicht Denial of Service | 2022-08-09T22:00:00.000+00:00 | 2024-06-26T22:00:00.000+00:00 |
| wid-sec-w-2022-0986 | Intel Prozessoren: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2022-08-09T22:00:00.000+00:00 | 2024-06-26T22:00:00.000+00:00 |
| wid-sec-w-2024-1462 | IBM Security Verify Access: Mehrere Schwachstellen | 2024-06-25T22:00:00.000+00:00 | 2024-06-25T22:00:00.000+00:00 |
| wid-sec-w-2024-1461 | Apache XML-Security for C++: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-06-25T22:00:00.000+00:00 | 2024-06-25T22:00:00.000+00:00 |
| wid-sec-w-2024-1459 | Arista WiFi Access Point: Schwachstelle ermöglicht Privilegieneskalation | 2024-06-25T22:00:00.000+00:00 | 2024-06-25T22:00:00.000+00:00 |
| wid-sec-w-2024-1458 | Dell BIOS: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-06-25T22:00:00.000+00:00 | 2024-06-25T22:00:00.000+00:00 |
| wid-sec-w-2024-1457 | Progress Software MOVEit: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-06-25T22:00:00.000+00:00 | 2024-06-25T22:00:00.000+00:00 |
| wid-sec-w-2024-1455 | Strapi: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-06-25T22:00:00.000+00:00 | 2024-06-25T22:00:00.000+00:00 |
| wid-sec-w-2024-1449 | SaltStack Salt: Mehrere Schwachstellen ermöglichen Erlangen von Administratorrechten | 2020-05-04T22:00:00.000+00:00 | 2024-06-25T22:00:00.000+00:00 |
| wid-sec-w-2023-2657 | Roundcube: Schwachstelle ermöglicht Cross-Site Scripting | 2023-10-16T22:00:00.000+00:00 | 2024-06-25T22:00:00.000+00:00 |
| wid-sec-w-2023-1455 | Apache Struts: Mehrere Schwachstellen ermöglichen Denial of Service | 2023-06-13T22:00:00.000+00:00 | 2024-06-25T22:00:00.000+00:00 |
| wid-sec-w-2023-0984 | Linux Kernel: Schwachstelle ermöglicht Codeausführung | 2023-04-16T22:00:00.000+00:00 | 2024-06-25T22:00:00.000+00:00 |
| wid-sec-w-2022-2358 | HP BIOS: Schwachstelle ermöglicht Codeausführung, Denial of Service und Informationsoffenlegung | 2022-12-18T23:00:00.000+00:00 | 2024-06-25T22:00:00.000+00:00 |
| wid-sec-w-2024-1442 | xwiki: Schwachstelle ermöglicht Codeausführung | 2024-06-24T22:00:00.000+00:00 | 2024-06-24T22:00:00.000+00:00 |
| wid-sec-w-2024-1441 | Python-crypto: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode | 2017-02-19T23:00:00.000+00:00 | 2024-06-24T22:00:00.000+00:00 |
| wid-sec-w-2024-1440 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2019-05-13T22:00:00.000+00:00 | 2024-06-24T22:00:00.000+00:00 |
| wid-sec-w-2024-1439 | Linux Kernel: Schwachstelle ermöglicht Offenlegung von Informationen | 2021-07-20T22:00:00.000+00:00 | 2024-06-24T22:00:00.000+00:00 |
| wid-sec-w-2024-1438 | Dell BIOS: Schwachstelle ermöglicht Manipulation von Dateien | 2024-06-24T22:00:00.000+00:00 | 2024-06-24T22:00:00.000+00:00 |
| wid-sec-w-2024-1404 | Autodesk AutoCAD: Mehrere Schwachstellen ermöglichen Codeausführung | 2024-06-18T22:00:00.000+00:00 | 2024-06-24T22:00:00.000+00:00 |
| wid-sec-w-2024-1317 | dnsmasq: Schwachstelle ermöglicht Denial of Service | 2024-06-06T22:00:00.000+00:00 | 2024-06-24T22:00:00.000+00:00 |
| wid-sec-w-2024-0721 | Grafana: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-03-26T23:00:00.000+00:00 | 2024-06-24T22:00:00.000+00:00 |
| wid-sec-w-2023-0911 | Linux Kernel KVM: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2023-04-10T22:00:00.000+00:00 | 2024-06-24T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:14008 | Red Hat Security Advisory: Red Hat build of Quarkus 3.20.2.SP1 security update | 2025-08-19T13:50:46+00:00 | 2026-01-21T22:58:44+00:00 |
| rhsa-2025:14004 | Red Hat Security Advisory: Red Hat build of Quarkus 3.15.6.SP1 security update | 2025-08-19T13:50:26+00:00 | 2026-01-21T22:58:43+00:00 |
| rhsa-2025:13012 | Red Hat Security Advisory: Red Hat build of Quarkus 3.15.6 release and security update | 2025-08-07T10:51:36+00:00 | 2026-01-21T22:58:31+00:00 |
| rhsa-2025:13010 | Red Hat Security Advisory: Red Hat build of Quarkus 3.20.2 release and security update | 2025-08-07T10:54:22+00:00 | 2026-01-21T22:58:30+00:00 |
| rhsa-2025:11742 | Red Hat Security Advisory: Red Hat JBoss Web Server 6.1.1 release and security update | 2025-07-30T15:55:40+00:00 | 2026-01-21T22:58:10+00:00 |
| rhsa-2025:11741 | Red Hat Security Advisory: Red Hat JBoss Web Server 6.1.1 release and security update | 2025-07-30T15:51:38+00:00 | 2026-01-21T22:58:10+00:00 |
| rhsa-2025:11696 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.8.5 release and security update | 2025-07-28T13:56:27+00:00 | 2026-01-21T22:58:09+00:00 |
| rhsa-2025:11695 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.8.5 release and security update | 2025-07-28T13:54:01+00:00 | 2026-01-21T22:58:04+00:00 |
| rhsa-2025:10738 | Red Hat Security Advisory: Kiali 2.4.7 for Red Hat OpenShift Service Mesh 3.0 | 2025-07-09T15:20:25+00:00 | 2026-01-21T22:57:26+00:00 |
| rhba-2025:20993 | Red Hat Bug Fix Advisory: .NET 10.0 bug fix and enhancement update | 2025-11-11T19:19:40+00:00 | 2026-01-21T22:57:10+00:00 |
| rhba-2025:20916 | Red Hat Bug Fix Advisory: .NET 10.0 bug fix and enhancement update | 2025-11-11T14:10:19+00:00 | 2026-01-21T22:57:10+00:00 |
| rhsa-2024:1072 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Container Release Security and Bug Fix Update | 2024-03-04T20:48:04+00:00 | 2026-01-21T22:49:21+00:00 |
| rhsa-2022:8431 | Red Hat Security Advisory: podman security, bug fix, and enhancement update | 2022-11-15T16:03:32+00:00 | 2026-01-21T22:48:15+00:00 |
| rhsa-2022:7822 | Red Hat Security Advisory: container-tools:rhel8 security, bug fix, and enhancement update | 2022-11-08T11:35:50+00:00 | 2026-01-21T22:48:13+00:00 |
| rhsa-2024:3810 | Red Hat Security Advisory: kernel security and bug fix update | 2024-06-11T17:33:12+00:00 | 2026-01-21T22:48:12+00:00 |
| rhsa-2023:3711 | Red Hat Security Advisory: libtiff security update | 2023-06-21T14:50:56+00:00 | 2026-01-21T22:48:04+00:00 |
| rhsa-2023:3609 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.12.4 security and Bug Fix update | 2023-06-14T21:20:34+00:00 | 2026-01-21T22:48:03+00:00 |
| rhsa-2023:1655 | Red Hat Security Advisory: OpenShift Container Platform 4.10.56 security update | 2023-04-12T12:02:17+00:00 | 2026-01-21T22:48:02+00:00 |
| rhba-2022:7200 | Red Hat Bug Fix Advisory: OpenShift Container Platform 4.11.12 packages update | 2022-11-02T12:27:09+00:00 | 2026-01-21T22:48:01+00:00 |
| rhsa-2022:6262 | Red Hat Security Advisory: OpenShift Container Platform 4.6.61 bug fix and security update | 2022-09-09T05:14:15+00:00 | 2026-01-21T22:47:54+00:00 |
| rhsa-2022:6053 | Red Hat Security Advisory: OpenShift Container Platform 4.7.56 security and bug fix update | 2022-08-22T21:14:41+00:00 | 2026-01-21T22:47:53+00:00 |
| rhsa-2022:6560 | Red Hat Security Advisory: Openshift Logging Bug Fix Release and Security Update (5.3.12) | 2022-09-26T09:39:08+00:00 | 2026-01-21T22:47:40+00:00 |
| rhsa-2024:6915 | Red Hat Security Advisory: python39:3.9 security update | 2024-09-23T01:53:16+00:00 | 2026-01-21T22:47:13+00:00 |
| rhsa-2024:4421 | Red Hat Security Advisory: python39:3.9 and python39-devel:3.9 security update | 2024-07-09T10:50:23+00:00 | 2026-01-21T22:47:08+00:00 |
| rhsa-2024:2987 | Red Hat Security Advisory: python27:2.7 security update | 2024-05-22T10:20:05+00:00 | 2026-01-21T22:46:56+00:00 |
| rhsa-2024:2985 | Red Hat Security Advisory: python39:3.9 and python39-devel:3.9 security update | 2024-05-22T09:51:55+00:00 | 2026-01-21T22:46:56+00:00 |
| rhsa-2024:10761 | Red Hat Security Advisory: rhc-worker-playbook security update | 2024-12-03T16:21:41+00:00 | 2026-01-21T22:46:45+00:00 |
| rhsa-2024:0776 | Red Hat Security Advisory: jenkins and jenkins-2-plugins security update | 2024-02-12T10:26:48+00:00 | 2026-01-21T22:46:33+00:00 |
| rhsa-2024:0775 | Red Hat Security Advisory: jenkins and jenkins-2-plugins security update | 2024-02-12T10:46:38+00:00 | 2026-01-21T22:46:33+00:00 |
| rhsa-2024:0325 | Red Hat Security Advisory: Updated RHEL-7-based Middleware container images | 2024-01-22T18:08:33+00:00 | 2026-01-21T22:46:28+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-27743 | Microsoft System Center Elevation of Privilege Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-08T07:00:00.000Z |
| msrc_cve-2025-27739 | Windows Kernel Elevation of Privilege Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-08T07:00:00.000Z |
| msrc_cve-2025-27736 | Windows Power Dependency Coordinator Information Disclosure Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-08T07:00:00.000Z |
| msrc_cve-2025-27731 | Microsoft OpenSSH for Windows Elevation of Privilege Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-08T07:00:00.000Z |
| msrc_cve-2025-27728 | Windows Kernel-Mode Driver Elevation of Privilege Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-08T07:00:00.000Z |
| msrc_cve-2025-27492 | Windows Secure Channel Elevation of Privilege Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-08T07:00:00.000Z |
| msrc_cve-2025-27490 | Windows Bluetooth Service Elevation of Privilege Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-08T07:00:00.000Z |
| msrc_cve-2025-27486 | Windows Standards-Based Storage Management Service Denial of Service Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-08T07:00:00.000Z |
| msrc_cve-2025-27485 | Windows Standards-Based Storage Management Service Denial of Service Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-08T07:00:00.000Z |
| msrc_cve-2025-27482 | Windows Remote Desktop Services Remote Code Execution Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-08T07:00:00.000Z |
| msrc_cve-2025-27480 | Windows Remote Desktop Services Remote Code Execution Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-08T07:00:00.000Z |
| msrc_cve-2025-27479 | Kerberos Key Distribution Proxy Service Denial of Service Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-08T07:00:00.000Z |
| msrc_cve-2025-27475 | Windows Update Stack Elevation of Privilege Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-08T07:00:00.000Z |
| msrc_cve-2025-27474 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-08T07:00:00.000Z |
| msrc_cve-2025-27470 | Windows Standards-Based Storage Management Service Denial of Service Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-08T07:00:00.000Z |
| msrc_cve-2025-26682 | ASP.NET Core and Visual Studio Denial of Service Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-08T07:00:00.000Z |
| msrc_cve-2025-26681 | Win32k Elevation of Privilege Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-08T07:00:00.000Z |
| msrc_cve-2025-26680 | Windows Standards-Based Storage Management Service Denial of Service Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-08T07:00:00.000Z |
| msrc_cve-2025-26678 | Windows Defender Application Control Security Feature Bypass Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-08T07:00:00.000Z |
| msrc_cve-2025-26676 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-08T07:00:00.000Z |
| msrc_cve-2025-26675 | Windows Subsystem for Linux Elevation of Privilege Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-08T07:00:00.000Z |
| msrc_cve-2025-26674 | Windows Media Remote Code Execution Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-08T07:00:00.000Z |
| msrc_cve-2025-26671 | Windows Remote Desktop Services Remote Code Execution Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-08T07:00:00.000Z |
| msrc_cve-2025-26667 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-08T07:00:00.000Z |
| msrc_cve-2025-26666 | Windows Media Remote Code Execution Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-08T07:00:00.000Z |
| msrc_cve-2025-26664 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-08T07:00:00.000Z |
| msrc_cve-2025-26652 | Windows Standards-Based Storage Management Service Denial of Service Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-08T07:00:00.000Z |
| msrc_cve-2025-26651 | Windows Local Session Manager (LSM) Denial of Service Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-08T07:00:00.000Z |
| msrc_cve-2025-26649 | Windows Secure Channel Elevation of Privilege Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-08T07:00:00.000Z |
| msrc_cve-2025-26644 | Windows Hello Spoofing Vulnerability | 2025-04-08T07:00:00.000Z | 2025-04-08T07:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202501-2564 | TOTOLINK A6000R V1.0.1-B20201211.2000 was discovered to contain a command injection vulne… | 2025-04-22T23:20:26.131000Z |
| var-202212-1527 | An issue existed with the file paths used to store website data. The issue was resolved b… | 2025-04-22T23:19:42.738000Z |
| var-202212-0726 | Transient DOS due to loop with unreachable exit condition in WLAN while processing an inc… | 2025-04-22T23:18:56.007000Z |
| var-202211-0414 | Memory corruption in graphics due to use-after-free while importing graphics buffer in Sn… | 2025-04-22T23:18:55.233000Z |
| var-202501-2365 | Linksys E7350 1.1.00.032 was discovered to contain a command injection vulnerability via … | 2025-04-22T23:17:53.043000Z |
| var-202212-0797 | Memory corruption in diag due to use after free while processing dci packet in Snapdragon… | 2025-04-22T23:14:34.750000Z |
| var-202210-0329 | Memory corruption in WLAN due to integer overflow to buffer overflow while parsing GTK fr… | 2025-04-22T23:12:51.927000Z |
| var-202212-1619 | The issue was addressed with improved memory handling. This issue is fixed in iOS 16.2 an… | 2025-04-22T23:07:34.481000Z |
| var-202211-1006 | Denial of service due to null pointer dereference when GATT is disconnected in Snapdragon… | 2025-04-22T23:03:09.792000Z |
| var-202212-0441 | Memory corruption in MODEM UIM due to usage of out of range pointer offset while decoding… | 2025-04-22T23:03:09.670000Z |
| var-202212-0798 | Denial of service in Modem module due to improper authorization while error handling in S… | 2025-04-22T23:03:09.624000Z |
| var-202406-0247 | CWE-125: Out-of-bounds Read vulnerability exists that could cause denial of service of th… | 2025-04-22T23:02:55.052000Z |
| var-202210-1623 | A memory corruption issue was addressed with improved state management. This issue is fix… | 2025-04-22T22:58:49.955000Z |
| var-202212-1299 | Memory corruption in camera due to improper validation of array index in Snapdragon Auto,… | 2025-04-22T22:51:24.336000Z |
| var-202212-1145 | A vulnerability has been identified in SCALANCE X204RNA (HSR) (All versions < V3.2.7), SC… | 2025-04-22T22:50:50.367000Z |
| var-202210-1527 | An access issue was addressed with additional sandbox restrictions. This issue is fixed i… | 2025-04-22T22:49:10.841000Z |
| var-202210-1968 | This issue was addressed with improved checks. This issue is fixed in iOS 15.7.1 and iPad… | 2025-04-22T22:48:29.531000Z |
| var-202212-1146 | A vulnerability has been identified in SCALANCE X204RNA (HSR) (All versions < V3.2.7), SC… | 2025-04-22T22:46:37.758000Z |
| var-202210-1482 | A memory consumption issue was addressed with improved memory handling. This issue is fix… | 2025-04-22T22:45:35.605000Z |
| var-202212-1290 | A logic issue was addressed with improved checks. This issue is fixed in macOS Monterey 1… | 2025-04-22T22:45:33.942000Z |
| var-202210-1473 | This issue was addressed with improved data protection. This issue is fixed in macOS Vent… | 2025-04-22T22:30:29.697000Z |
| var-202210-1485 | An issue in code signature validation was addressed with improved checks. This issue is f… | 2025-04-22T22:29:44.251000Z |
| var-202212-1325 | The issue was addressed with improved memory handling. This issue is fixed in tvOS 16.2, … | 2025-04-22T22:25:41.865000Z |
| var-202210-1928 | A race condition was addressed with improved locking. This issue is fixed in tvOS 16.1, i… | 2025-04-22T22:17:10.346000Z |
| var-202212-1161 | A vulnerability has been identified in SICAM PAS/PQS (All versions < V7.0), SICAM PAS/PQS… | 2025-04-22T22:12:08.412000Z |
| var-202210-1901 | A logic issue was addressed with improved checks. This issue is fixed in tvOS 16.1, iOS 1… | 2025-04-22T22:11:18.785000Z |
| var-202210-1630 | A race condition was addressed with improved locking. This issue is fixed in iOS 16.1 and… | 2025-04-22T22:11:01.513000Z |
| var-202210-1532 | An out-of-bounds write issue was addressed with improved bounds checking. This issue is f… | 2025-04-22T22:04:41.560000Z |
| var-202210-1496 | This issue was addressed by removing the vulnerable code. This issue is fixed in iOS 15.7… | 2025-04-22T21:52:45.837000Z |
| var-202210-1628 | A race condition was addressed with improved locking. This issue is fixed in iOS 16.1 and… | 2025-04-22T21:50:15.923000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2023:4326-1 | Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP5) | 2023-10-31T18:03:53Z | 2023-10-31T18:03:53Z |
| suse-su-2023:4325-1 | Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP5) | 2023-10-31T17:33:48Z | 2023-10-31T17:33:48Z |
| suse-su-2023:4322-1 | Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP5) | 2023-10-31T17:03:56Z | 2023-10-31T17:03:56Z |
| suse-su-2023:4321-1 | Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP1) | 2023-10-31T17:03:44Z | 2023-10-31T17:03:44Z |
| suse-su-2023:4319-1 | Security update for the Linux Kernel (Live Patch 49 for SLE 12 SP5) | 2023-10-31T16:03:53Z | 2023-10-31T16:03:53Z |
| suse-su-2023:4313-1 | Security update for the Linux Kernel (Live Patch 45 for SLE 12 SP5) | 2023-10-31T15:33:47Z | 2023-10-31T15:33:47Z |
| suse-su-2023:4309-1 | Security update for container-suseconnect | 2023-10-31T13:09:36Z | 2023-10-31T13:09:36Z |
| suse-su-2023:4308-1 | Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP5) | 2023-10-31T12:33:37Z | 2023-10-31T12:33:37Z |
| suse-su-2023:4306-1 | Security update for xwayland | 2023-10-31T10:37:03Z | 2023-10-31T10:37:03Z |
| suse-su-2023:4300-1 | Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP1) | 2023-10-31T10:03:52Z | 2023-10-31T10:03:52Z |
| suse-su-2023:4302-1 | Security update for MozillaThunderbird | 2023-10-31T09:33:57Z | 2023-10-31T09:33:57Z |
| suse-su-2023:4301-1 | Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP4) | 2023-10-31T08:35:21Z | 2023-10-31T08:35:21Z |
| suse-su-2023:4297-1 | Security update for clamav | 2023-10-31T08:31:47Z | 2023-10-31T08:31:47Z |
| suse-su-2023:4295-1 | Security update for nodejs10 | 2023-10-31T08:28:34Z | 2023-10-31T08:28:34Z |
| suse-su-2023:4294-1 | Security update for webkit2gtk3 | 2023-10-31T08:25:41Z | 2023-10-31T08:25:41Z |
| suse-su-2023:4293-1 | Security update for xwayland | 2023-10-31T08:22:55Z | 2023-10-31T08:22:55Z |
| suse-su-2023:4292-1 | Security update for xorg-x11-server | 2023-10-31T08:21:57Z | 2023-10-31T08:21:57Z |
| suse-su-2023:4291-1 | Security update for poppler | 2023-10-31T08:19:00Z | 2023-10-31T08:19:00Z |
| suse-su-2023:4290-1 | Security update for redis | 2023-10-31T08:17:53Z | 2023-10-31T08:17:53Z |
| suse-su-2023:4289-1 | Security update for java-17-openjdk | 2023-10-31T08:16:04Z | 2023-10-31T08:16:04Z |
| suse-su-2023:4288-1 | Security update for python-Werkzeug | 2023-10-31T08:08:07Z | 2023-10-31T08:08:07Z |
| suse-su-2023:4285-1 | Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP4) | 2023-10-30T22:03:42Z | 2023-10-30T22:03:42Z |
| suse-su-2023:4280-1 | Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP1) | 2023-10-30T21:33:35Z | 2023-10-30T21:33:35Z |
| suse-su-2023:4279-1 | Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP2) | 2023-10-30T21:04:24Z | 2023-10-30T21:04:24Z |
| suse-su-2023:4278-1 | Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP1) | 2023-10-30T21:04:15Z | 2023-10-30T21:04:15Z |
| suse-su-2023:3563-3 | Security update for icu73_2 | 2023-10-30T18:35:33Z | 2023-10-30T18:35:33Z |
| suse-su-2023:4273-1 | Security update for the Linux Kernel (Live Patch 48 for SLE 12 SP5) | 2023-10-30T17:35:00Z | 2023-10-30T17:35:00Z |
| suse-su-2023:4272-1 | Security update for xorg-x11-server | 2023-10-30T17:29:42Z | 2023-10-30T17:29:42Z |
| suse-su-2023:4271-1 | Security update for gstreamer-plugins-bad | 2023-10-30T17:05:23Z | 2023-10-30T17:05:23Z |
| suse-su-2023:4270-1 | Security update for poppler | 2023-10-30T16:50:51Z | 2023-10-30T16:50:51Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:0080-1 | Security update for python-Django1 | 2024-03-11T18:41:01Z | 2024-03-11T18:41:01Z |
| opensuse-su-2024:0064-1 | Security update for zabbix | 2024-03-01T10:15:08Z | 2024-03-01T10:15:08Z |
| opensuse-su-2024:0053-1 | Security update for opera | 2024-02-19T09:01:03Z | 2024-02-19T09:01:03Z |
| opensuse-su-2024:0052-1 | Security update for bitcoin | 2024-02-16T17:36:09Z | 2024-02-16T17:36:09Z |
| opensuse-su-2024:0048-1 | Security update for pdns-recursor | 2024-02-14T13:38:11Z | 2024-02-14T13:38:11Z |
| opensuse-su-2024:0047-1 | Security update for hugin | 2024-02-14T13:37:56Z | 2024-02-14T13:37:56Z |
| opensuse-su-2024:0037-1 | Security update for mbedtls | 2024-01-31T19:32:31Z | 2024-01-31T19:32:31Z |
| opensuse-su-2024:0036-1 | Security update for tinyssh | 2024-01-31T19:32:28Z | 2024-01-31T19:32:28Z |
| opensuse-su-2024:0033-1 | Security update for opera | 2024-01-24T19:01:24Z | 2024-01-24T19:01:24Z |
| opensuse-su-2024:0031-1 | Security update for cacti, cacti-spine | 2024-01-24T12:47:05Z | 2024-01-24T12:47:05Z |
| opensuse-su-2024:0026-1 | Security update for seamonkey | 2024-01-19T15:37:40Z | 2024-01-19T15:37:40Z |
| opensuse-su-2024:0025-1 | Security update for chromium | 2024-01-18T21:51:54Z | 2024-01-18T21:51:54Z |
| opensuse-su-2024:0023-1 | Security update for libuev | 2024-01-18T15:01:18Z | 2024-01-18T15:01:18Z |
| opensuse-su-2024:0021-1 | Security update for perl-Spreadsheet-ParseXLSX | 2024-01-16T07:30:46Z | 2024-01-16T07:30:46Z |
| opensuse-su-2024:0020-1 | Security update for chromium | 2024-01-16T07:30:42Z | 2024-01-16T07:30:42Z |
| opensuse-su-2024:0017-1 | Security update for python-django-grappelli | 2024-01-11T15:01:09Z | 2024-01-11T15:01:09Z |
| opensuse-su-2024:0016-1 | Security update for opera | 2024-01-10T11:01:07Z | 2024-01-10T11:01:07Z |
| opensuse-su-2024:0013-1 | Security update for opusfile | 2024-01-07T21:27:08Z | 2024-01-07T21:27:08Z |
| opensuse-su-2024:0008-1 | Security update for proftpd | 2024-01-03T20:12:53Z | 2024-01-03T20:12:53Z |
| opensuse-su-2024:0007-1 | Security update for exim | 2024-01-03T20:12:49Z | 2024-01-03T20:12:49Z |
| opensuse-su-2024:0002-1 | Security update for opera | 2024-01-01T11:01:07Z | 2024-01-01T11:01:07Z |
| opensuse-su-2024:0001-1 | Security update for opera | 2024-01-01T11:01:03Z | 2024-01-01T11:01:03Z |
| opensuse-su-2023:0424-1 | Security update for deepin-compressor | 2023-12-30T14:24:56Z | 2023-12-30T14:24:56Z |
| opensuse-su-2023:0423-1 | Security update for deepin-compressor | 2023-12-30T14:24:53Z | 2023-12-30T14:24:53Z |
| opensuse-su-2023:0421-1 | Security update for proftpd | 2023-12-30T14:24:43Z | 2023-12-30T14:24:43Z |
| opensuse-su-2023:0419-1 | Security update for zabbix | 2023-12-27T21:40:25Z | 2023-12-27T21:40:25Z |
| opensuse-su-2023:0418-1 | Security update for zabbix | 2023-12-27T21:40:21Z | 2023-12-27T21:40:21Z |
| opensuse-su-2023:0413-1 | Security update for cppcheck | 2023-12-24T11:01:00Z | 2023-12-24T11:01:00Z |
| opensuse-su-2023:0411-1 | Security update for putty | 2023-12-20T13:01:52Z | 2023-12-20T13:01:52Z |
| opensuse-su-2023:0409-1 | Security update for gstreamer-plugins-bad | 2023-12-19T16:29:55Z | 2023-12-19T16:29:55Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-16963 | Tenda FH1202 /goform/webExcptypemanFilter文件缓冲区溢出漏洞 | 2025-07-18 | 2025-07-25 |
| cnvd-2025-16962 | Tenda FH1202 /goform/PPTPUserSetting文件缓冲区溢出漏洞 | 2025-07-18 | 2025-07-25 |
| cnvd-2025-16961 | Tenda AC1206缓冲区溢出漏洞 | 2025-07-18 | 2025-07-25 |
| cnvd-2025-16958 | TOTOLINK A3300R命令注入漏洞 | 2025-07-25 | 2025-07-25 |
| cnvd-2025-16957 | Fortinet FortiIsolator访问控制错误漏洞 | 2025-07-25 | 2025-07-25 |
| cnvd-2025-16891 | JetBrains TeamCity跨站脚本漏洞 | 2024-05-30 | 2025-07-25 |
| cnvd-2025-16890 | JetBrains TeamCity存在未明漏洞(CNVD-2025-16890) | 2024-05-30 | 2025-07-25 |
| cnvd-2025-16889 | JetBrains TeamCity路径遍历漏洞 | 2024-05-30 | 2025-07-25 |
| cnvd-2025-16888 | JetBrains TeamCity跨站脚本漏洞 | 2024-05-30 | 2025-07-25 |
| cnvd-2025-16887 | JetBrains TeamCity访问控制不当漏洞 | 2024-05-30 | 2025-07-25 |
| cnvd-2025-16886 | JetBrains TeamCity存在未明漏洞 | 2024-05-30 | 2025-07-25 |
| cnvd-2025-16885 | JetBrains TeamCity构建步骤设置跨站脚本漏洞 | 2024-05-31 | 2025-07-25 |
| cnvd-2025-16884 | JetBrains TeamCity订阅页面跨站脚本漏洞 | 2024-05-31 | 2025-07-25 |
| cnvd-2025-16883 | JetBrains TeamCity跨站脚本漏洞 | 2024-05-31 | 2025-07-25 |
| cnvd-2025-16882 | JetBrains TeamCity存在未明漏洞(CNVD-2025-16882) | 2024-05-31 | 2025-07-25 |
| cnvd-2025-16881 | JetBrains TeamCity权限问题漏洞 | 2024-05-31 | 2025-07-25 |
| cnvd-2025-16880 | JetBrains TeamCity身份验证绕过漏洞 | 2024-05-31 | 2025-07-25 |
| cnvd-2025-16879 | JetBrains YouTrack存在未明漏洞(CNVD-2025-16879) | 2024-06-19 | 2025-07-25 |
| cnvd-2025-16878 | JetBrains YouTrack存在未明漏洞(CNVD-2025-16878) | 2024-06-21 | 2025-07-25 |
| cnvd-2025-16877 | JetBrains YouTrack存在未明漏洞(CNVD-2025-16877) | 2024-06-21 | 2025-07-25 |
| cnvd-2025-16869 | D-Link DIR-816L命令注入漏洞 | 2025-07-25 | 2025-07-25 |
| cnvd-2025-16868 | Netgear RAX30存在未明漏洞(CNVD-2025-16868) | 2025-07-25 | 2025-07-25 |
| cnvd-2025-16867 | NETGEAR RAX30存在未明漏洞(CNVD-2025-16867) | 2025-07-25 | 2025-07-25 |
| cnvd-2025-16866 | Tenda FH1202 /goform/PPTPDClient文件缓冲区溢出漏洞 | 2025-07-18 | 2025-07-25 |
| cnvd-2025-16865 | Tenda FH1202 /goform/Natlimit文件缓冲区溢出漏洞 | 2025-07-18 | 2025-07-25 |
| cnvd-2025-16864 | Tenda FH1202 /goform/GstDhcpSetSer文件缓冲区溢出漏洞 | 2025-07-18 | 2025-07-25 |
| cnvd-2025-16863 | Tenda FH1202 /goform/AdvSetWan文件缓冲区溢出漏洞 | 2025-07-18 | 2025-07-25 |
| cnvd-2025-16862 | Tenda FH1201 /goform/SafeEmailFilter文件缓冲区溢出漏洞 | 2025-07-18 | 2025-07-25 |
| cnvd-2025-16861 | Tenda FH1201 /goform/PPTPDClient文件缓冲区溢出漏洞 | 2025-07-18 | 2025-07-25 |
| cnvd-2025-16860 | Tenda FH1201 /goform/L7Prot文件缓冲区溢出漏洞 | 2025-07-18 | 2025-07-25 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2020-avi-103 | Vulnérabilité dans les produits UCS Cisco | 2020-02-20T00:00:00.000000 | 2020-02-20T00:00:00.000000 |
| certfr-2020-avi-102 | Vulnérabilité dans Cisco Content Security Management Appliance | 2020-02-20T00:00:00.000000 | 2020-02-20T00:00:00.000000 |
| certfr-2020-avi-101 | Multiples vulnérabilités dans Cisco Email Security Appliance (ESA) | 2020-02-20T00:00:00.000000 | 2020-02-20T00:00:00.000000 |
| certfr-2020-avi-100 | Multiples vulnérabilités dans Cisco Data Center Network Manager | 2020-02-20T00:00:00.000000 | 2020-02-20T00:00:00.000000 |
| certfr-2020-avi-099 | Multiples vulnérabilités dans VMware vRealize Operations for Horizon | 2020-02-19T00:00:00.000000 | 2020-02-19T00:00:00.000000 |
| certfr-2020-avi-098 | Multiples vulnérabilités dans IBM Db2 | 2020-02-19T00:00:00.000000 | 2020-02-19T00:00:00.000000 |
| certfr-2020-avi-097 | Vulnérabilité dans Fortinet FortiOS | 2020-02-19T00:00:00.000000 | 2020-02-19T00:00:00.000000 |
| certfr-2020-avi-096 | Multiples vulnérabilités dans le noyau linux d'Ubuntu | 2020-02-19T00:00:00.000000 | 2020-02-19T00:00:00.000000 |
| certfr-2020-avi-095 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2020-02-18T00:00:00.000000 | 2020-02-18T00:00:00.000000 |
| certfr-2020-avi-094 | Vulnérabilité dans GitLab CE et EE | 2020-02-14T00:00:00.000000 | 2020-02-17T00:00:00.000000 |
| certfr-2020-avi-093 | Vulnérabilité dans Fortinet FortiManager | 2020-02-14T00:00:00.000000 | 2020-02-14T00:00:00.000000 |
| certfr-2020-avi-092 | Vulnérabilité dans Juniper Junos OS | 2020-02-14T00:00:00.000000 | 2020-02-14T00:00:00.000000 |
| certfr-2020-avi-091 | Vulnérabilité dans PostgreSQL | 2020-02-14T00:00:00.000000 | 2020-02-14T00:00:00.000000 |
| certfr-2020-avi-090 | Multiples vulnérabilités dans les produits Siemens | 2020-02-13T00:00:00.000000 | 2020-02-13T00:00:00.000000 |
| certfr-2020-avi-089 | Multiples vulnérabilités dans les produits Palo Alto | 2020-02-13T00:00:00.000000 | 2020-02-13T00:00:00.000000 |
| certfr-2020-avi-088 | Multiples vulnérabilités dans Moxa OnCell | 2020-02-13T00:00:00.000000 | 2020-02-13T00:00:00.000000 |
| certfr-2020-avi-087 | Multiples vulnérabilités dans les produits Intel | 2020-02-12T00:00:00.000000 | 2020-02-12T00:00:00.000000 |
| certfr-2020-avi-086 | Vulnérabilité dans Aruba Networks Intelligent Edge Switches | 2020-02-12T00:00:00.000000 | 2020-02-12T00:00:00.000000 |
| certfr-2020-avi-085 | Vulnérabilité dans Schneider ProSoft Configurator | 2020-02-12T00:00:00.000000 | 2020-02-12T00:00:00.000000 |
| certfr-2020-avi-077 | Multiples vulnérabilités dans les produits Siemens de variante SIPLUS | 2020-02-11T00:00:00.000000 | 2020-02-12T00:00:00.000000 |
| certfr-2020-avi-084 | Multiples vulnérabilités dans Mozilla Thunderbird | 2020-02-11T00:00:00.000000 | 2020-02-11T00:00:00.000000 |
| certfr-2020-avi-083 | Multiples vulnérabilités dans Mozilla Firefox | 2020-02-11T00:00:00.000000 | 2020-02-11T00:00:00.000000 |
| certfr-2020-avi-082 | Multiples vulnérabilités dans les produits Microsoft | 2020-02-11T00:00:00.000000 | 2020-02-11T00:00:00.000000 |
| certfr-2020-avi-081 | Multiples vulnérabilités dans Microsoft Windows | 2020-02-11T00:00:00.000000 | 2020-02-11T00:00:00.000000 |
| certfr-2020-avi-080 | Multiples vulnérabilités dans Microsoft Office | 2020-02-11T00:00:00.000000 | 2020-02-11T00:00:00.000000 |
| certfr-2020-avi-079 | Multiples vulnérabilités dans Microsoft Edge | 2020-02-11T00:00:00.000000 | 2020-02-11T00:00:00.000000 |
| certfr-2020-avi-078 | Multiples vulnérabilités dans Microsoft IE | 2020-02-11T00:00:00.000000 | 2020-02-11T00:00:00.000000 |
| certfr-2020-avi-076 | Multiples vulnérabilités dans Adobe Acrobat et Reader | 2020-02-11T00:00:00.000000 | 2020-02-11T00:00:00.000000 |
| certfr-2020-avi-075 | Vulnérabilité dans Adobe Flash Player | 2020-02-11T00:00:00.000000 | 2020-02-11T00:00:00.000000 |
| certfr-2020-avi-074 | Multiples vulnérabilités dans Fortinet FortiAP | 2020-02-11T00:00:00.000000 | 2020-02-11T00:00:00.000000 |