Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-60245 |
9.8 (3.1)
|
WordPress WP User Manager plugin <= 2.9.12 - PHP Objec… |
WP User Manager |
WP User Manager |
2025-11-06T15:55:19.859Z | 2026-01-20T14:28:13.047Z |
| CVE-2025-62029 |
8.1 (3.1)
|
WordPress Grevo theme <= 2.4 - Local File Inclusion vu… |
themesion |
Grevo |
2025-10-22T14:32:51.220Z | 2026-01-20T14:28:13.045Z |
| CVE-2025-62016 |
9.9 (3.1)
|
WordPress Kallyas theme <= 4.22.0 - Arbitrary File Upl… |
hogash |
Kallyas |
2025-11-06T15:55:24.586Z | 2026-01-20T14:28:13.045Z |
| CVE-2025-62008 |
8.8 (3.1)
|
WordPress Product Table For WooCommerce plugin <= 1.2.… |
acowebs |
Product Table For WooCommerce |
2025-10-22T14:32:48.273Z | 2026-01-20T14:28:13.044Z |
| CVE-2025-62033 |
6.5 (3.1)
|
WordPress Togo theme < 1.0.4 - Broken Access Control v… |
uxper |
Togo |
2025-11-06T15:55:29.843Z | 2026-01-20T14:28:13.043Z |
| CVE-2025-62032 |
6.5 (3.1)
|
WordPress tagDiv Cloud Library plugin < 3.9.2 - Cross … |
tagDiv |
tagDiv Cloud Library |
2025-11-06T15:55:29.230Z | 2026-01-20T14:28:13.043Z |
| CVE-2025-62024 |
6.5 (3.1)
|
WordPress Pie Calendar plugin <= 1.2.9 - Cross Site Sc… |
Jonathan Jernigan |
Pie Calendar |
2025-10-22T14:32:50.360Z | 2026-01-20T14:28:13.043Z |
| CVE-2025-62028 |
4.3 (3.1)
|
WordPress Salient theme < 17.4.0 - Broken Access Contr… |
ThemeNectar |
Salient |
2025-11-06T15:55:27.077Z | 2026-01-20T14:28:13.042Z |
| CVE-2025-62027 |
5.4 (3.1)
|
WordPress Event Tickets plugin <= 5.26.3 - Broken Acce… |
StellarWP |
Event Tickets |
2025-10-22T14:32:51.014Z | 2026-01-20T14:28:13.042Z |
| CVE-2025-62017 |
5.4 (3.1)
|
WordPress Kallyas theme <= 4.22.0 - Broken Access Cont… |
hogash |
Kallyas |
2025-11-06T15:55:25.294Z | 2026-01-20T14:28:13.042Z |
| CVE-2025-62011 |
6.5 (3.1)
|
WordPress TheGem theme <= 5.10.5 - Cross Site Scriptin… |
CodexThemes |
TheGem |
2025-11-06T15:55:22.593Z | 2026-01-20T14:28:13.042Z |
| CVE-2025-62023 |
9.8 (3.1)
|
WordPress s2Member plugin <= 250905 - Remote Code Exec… |
Cristián Lávaque |
s2Member |
2025-10-22T14:32:50.026Z | 2026-01-20T14:28:13.041Z |
| CVE-2025-62021 |
4.3 (3.1)
|
WordPress Acknowledgify plugin <= 1.1.3 - Broken Acces… |
Made Neat |
Acknowledgify |
2025-10-22T14:32:49.606Z | 2026-01-20T14:28:13.041Z |
| CVE-2025-62025 |
9.8 (3.1)
|
WordPress JobSearch plugin < 3.0.8 - PHP Object Inject… |
eyecix |
JobSearch |
2025-10-22T14:32:50.582Z | 2026-01-20T14:28:13.040Z |
| CVE-2025-62013 |
4.3 (3.1)
|
WordPress UiChemy plugin <= 4.0.0 - Broken Access Cont… |
POSIMYTH |
UiChemy |
2025-10-22T14:32:48.799Z | 2026-01-20T14:28:13.040Z |
| CVE-2025-62010 |
8.1 (3.1)
|
WordPress Famita theme <= 1.54 - Local File Inclusion … |
ApusTheme |
Famita |
2025-11-06T15:55:21.866Z | 2026-01-20T14:28:13.040Z |
| CVE-2025-62006 |
5.4 (3.1)
|
WordPress WP SMS plugin <= 7.0.1 - Broken Access Contr… |
VeronaLabs |
WP SMS |
2025-10-22T14:32:47.684Z | 2026-01-20T14:28:13.040Z |
| CVE-2025-62030 |
6.5 (3.1)
|
WordPress tagDiv Composer plugin <= 5.4.1 - Cross Site… |
tagDiv |
tagDiv Composer |
2025-11-06T15:55:27.866Z | 2026-01-20T14:28:13.039Z |
| CVE-2025-62020 |
7.1 (3.1)
|
WordPress VOD Infomaniak plugin <= 1.5.11 - Cross Site… |
Infomaniak Network |
VOD Infomaniak |
2025-10-22T14:32:49.407Z | 2026-01-20T14:28:13.039Z |
| CVE-2025-62005 |
7.1 (3.1)
|
WordPress SUMO Memberships for WooCommerce plugin < 7.… |
FantasticPlugins |
SUMO Memberships for WooCommerce |
2025-10-22T14:32:47.453Z | 2026-01-20T14:28:13.038Z |
| CVE-2025-62026 |
4.3 (3.1)
|
WordPress Blockspare plugin <= 3.2.13.2 - Sensitive Da… |
Blockspare |
Blockspare |
2025-10-22T14:32:50.799Z | 2026-01-20T14:28:13.037Z |
| CVE-2025-62022 |
7.5 (3.1)
|
WordPress BuddyPress plugin <= 14.3.4 - Broken Access … |
BuddyPress |
BuddyPress |
2025-10-22T14:32:49.815Z | 2026-01-20T14:28:13.037Z |
| CVE-2025-62012 |
6.5 (3.1)
|
WordPress TheGem (Elementor) theme <= 5.10.5 - Cross S… |
CodexThemes |
TheGem (Elementor) |
2025-11-06T15:55:23.261Z | 2026-01-20T14:28:13.036Z |
| CVE-2025-60248 |
7.5 (3.1)
|
WordPress WPC Product Options for WooCommerce plugin <… |
WPClever |
WPC Product Options for WooCommerce |
2025-11-06T15:55:21.142Z | 2026-01-20T14:28:13.000Z |
| CVE-2025-60246 |
7.1 (3.1)
|
WordPress Simple Finance Calculator plugin <= 1.0 - Re… |
weissmike |
Simple Finance Calculator |
2025-10-22T14:32:47.237Z | 2026-01-20T14:28:12.981Z |
| CVE-2025-60239 |
8.5 (3.1)
|
WordPress CoSchool LMS plugin <= 1.4.3 - SQL Injection… |
Codexpert, Inc |
CoSchool LMS |
2025-11-06T15:55:09.493Z | 2026-01-20T14:28:12.963Z |
| CVE-2025-60241 |
7.5 (3.1)
|
WordPress Premmerce plugin <= 1.3.19 - Local File Incl… |
Premmerce |
Premmerce |
2025-11-06T15:55:13.362Z | 2026-01-20T14:28:12.936Z |
| CVE-2025-60247 |
6.5 (3.1)
|
WordPress Bux Woocommerce plugin <= 1.2.3 - Broken Acc… |
Bux |
Bux Woocommerce |
2025-11-06T15:55:20.539Z | 2026-01-20T14:28:12.911Z |
| CVE-2025-60243 |
9.8 (3.1)
|
WordPress Selling Commander for WooCommerce plugin <= … |
Holest Engineering |
Selling Commander for WooCommerce |
2025-11-06T15:55:15.782Z | 2026-01-20T14:28:12.895Z |
| CVE-2025-62007 |
8.8 (3.1)
|
WordPress Voice Feedback plugin <= 1.0.3 - Privilege E… |
bPlugins |
Voice Feedback |
2025-10-22T14:32:47.880Z | 2026-01-20T14:28:12.873Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-31963 |
2.9 (3.1)
|
HCL BigFix IVR is impacted by improper authentication … |
HCLSoftware |
BigFix IVR |
2026-01-07T07:05:40.098Z | 2026-01-07T16:13:25.789Z |
| CVE-2024-4392 |
6.4 (3.1)
|
Jetpack – WP Security, Backup, Speed, & Growth <= 13.3… |
automattic |
Jetpack – WP Security, Backup, Speed, & Growth |
2024-05-14T08:32:31.906Z | 2024-08-01T20:40:47.361Z |
| CVE-2023-47774 |
5.4 (3.1)
|
WordPress Jetpack plugin < 12.7 - Auth. Iframe Injecti… |
Automattic |
Jetpack |
2024-04-24T15:58:40.432Z | 2024-08-02T21:16:43.660Z |
| CVE-2025-39482 |
4.3 (3.1)
|
WordPress Eventer - WordPress Event & Booking Manager … |
imithemes |
Eventer |
2025-05-16T15:45:26.697Z | 2026-01-22T12:07:27.271Z |
| CVE-2025-39481 |
9.3 (3.1)
|
WordPress Eventer - WordPress Event & Booking Manager … |
imithemes |
Eventer |
2025-05-16T15:45:27.223Z | 2026-01-22T12:05:03.823Z |
| CVE-2025-39483 |
6.5 (3.1)
|
WordPress Eventer plugin < 3.9.9.1 - Shortcode Injecti… |
imithemes |
Eventer |
2025-08-14T10:34:26.628Z | 2026-01-22T09:41:27.096Z |
| CVE-2024-53252 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:40:06.360Z | |
| CVE-2024-53251 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:40:04.870Z | |
| CVE-2024-53250 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:40:03.200Z | |
| CVE-2024-53249 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:40:00.720Z | |
| CVE-2024-53248 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:59.446Z | |
| CVE-2024-45743 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:58.180Z | |
| CVE-2024-45742 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:56.832Z | |
| CVE-2024-45730 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:55.570Z | |
| CVE-2024-45729 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:54.322Z | |
| CVE-2024-45728 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:53.063Z | |
| CVE-2024-45727 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:51.817Z | |
| CVE-2024-45726 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:50.428Z | |
| CVE-2024-45725 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:49.125Z | |
| CVE-2024-45724 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:47.866Z | |
| CVE-2024-36998 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:46.585Z | |
| CVE-2024-36988 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:45.176Z | |
| CVE-2024-22166 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:43.826Z | |
| CVE-2023-32720 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:42.486Z | |
| CVE-2023-32719 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:41.161Z | |
| CVE-2023-32718 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:39.735Z | |
| CVE-2023-22944 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:38.404Z | |
| CVE-2023-22930 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:37.110Z | |
| CVE-2023-22929 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:35.843Z | |
| CVE-2023-22928 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:34.507Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2023-22930 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:05.020 | 2026-01-22T10:16:05.020 |
| fkie_cve-2023-22929 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.953 | 2026-01-22T10:16:04.953 |
| fkie_cve-2023-22928 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.890 | 2026-01-22T10:16:04.890 |
| fkie_cve-2023-22927 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.823 | 2026-01-22T10:16:04.823 |
| fkie_cve-2023-22926 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.760 | 2026-01-22T10:16:04.760 |
| fkie_cve-2023-22925 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.687 | 2026-01-22T10:16:04.687 |
| fkie_cve-2022-43560 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.620 | 2026-01-22T10:16:04.620 |
| fkie_cve-2022-43559 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.560 | 2026-01-22T10:16:04.560 |
| fkie_cve-2022-43558 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.483 | 2026-01-22T10:16:04.483 |
| fkie_cve-2022-34214 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.403 | 2026-01-22T10:16:04.403 |
| fkie_cve-2022-32150 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.337 | 2026-01-22T10:16:04.337 |
| fkie_cve-2022-24911 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.263 | 2026-01-22T10:16:04.263 |
| fkie_cve-2022-24380 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.200 | 2026-01-22T10:16:04.200 |
| fkie_cve-2022-22147 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.130 | 2026-01-22T10:16:04.130 |
| fkie_cve-2022-21130 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.057 | 2026-01-22T10:16:04.057 |
| fkie_cve-2021-3926 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:03.980 | 2026-01-22T10:16:03.980 |
| fkie_cve-2020-8460 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:03.910 | 2026-01-22T10:16:03.910 |
| fkie_cve-2020-8459 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:03.840 | 2026-01-22T10:16:03.840 |
| fkie_cve-2020-8458 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:03.780 | 2026-01-22T10:16:03.780 |
| fkie_cve-2020-8457 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:03.703 | 2026-01-22T10:16:03.703 |
| fkie_cve-2020-8456 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:03.633 | 2026-01-22T10:16:03.633 |
| fkie_cve-2020-8455 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:03.570 | 2026-01-22T10:16:03.570 |
| fkie_cve-2020-8454 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:03.500 | 2026-01-22T10:16:03.500 |
| fkie_cve-2020-8453 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:03.433 | 2026-01-22T10:16:03.433 |
| fkie_cve-2020-8452 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:02.930 | 2026-01-22T10:16:02.930 |
| fkie_cve-2020-8451 | Rejected reason: The reserved CVE was never used. | 2026-01-22T08:16:00.447 | 2026-01-22T08:16:00.447 |
| fkie_cve-2025-7425 | A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corru… | 2025-07-10T14:15:27.877 | 2026-01-22T05:16:19.960 |
| fkie_cve-2025-6020 | A flaw was found in linux-pam. The module pam_namespace may use access user-controlled paths withou… | 2025-06-17T13:15:21.660 | 2026-01-22T05:16:17.213 |
| fkie_cve-2025-49796 | A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file … | 2025-06-16T16:15:19.370 | 2026-01-22T05:16:11.380 |
| fkie_cve-2025-49794 | A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements … | 2025-06-16T16:15:18.997 | 2026-01-22T05:16:11.147 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-ffgq-vm8w-4m65 |
5.1 (4.0)
|
Stored Cross-Site Scripting (XSS) vulnerability in Sesame web application, due to the fact that upl… | 2026-01-20T12:31:17Z | 2026-01-20T12:31:17Z |
| ghsa-5pph-737h-487p |
5.1 (4.0)
|
Reflected Cross-Site Scripting (XSS) vulnerability in Riftzilla's QRGen. This vulnerability allows … | 2026-01-20T12:31:17Z | 2026-01-20T12:31:17Z |
| ghsa-wm49-2vmh-chv3 |
9.8 (3.1)
9.3 (4.0)
|
PrismX MX100 AP controller developed by BROWAN COMMUNICATIONS has a Use of Hard-coded Credentials … | 2026-01-20T09:30:20Z | 2026-01-20T09:30:20Z |
| ghsa-w9fp-wg9v-cr6h |
4.9 (3.1)
6.9 (4.0)
|
PrismX MX100 AP controller developed by BROWAN COMMUNICATIONS has an Insufficiently Protected Crede… | 2026-01-20T09:30:20Z | 2026-01-20T09:30:20Z |
| ghsa-jv72-wxjv-h5q2 |
6.1 (3.1)
|
URL parameters are directly embedded into JavaScript code or HTML attributes without proper encodin… | 2026-01-20T09:30:20Z | 2026-01-20T09:30:20Z |
| ghsa-hrmx-9vmm-xj23 |
5.5 (3.1)
|
On an instance of TwinCAT 3 HMI Server running on a device an authenticated administrator can injec… | 2026-01-20T09:30:20Z | 2026-01-20T09:30:20Z |
| ghsa-fjj6-9j9h-gwcp |
7.2 (3.1)
8.6 (4.0)
|
PrismX MX100 AP controller developed by BROWAN COMMUNICATIONS has an Arbitrary File Upload vulnerab… | 2026-01-20T09:30:20Z | 2026-01-20T09:30:20Z |
| ghsa-f49w-r2gf-jprx |
4.4 (3.1)
|
The Viet contact plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settin… | 2026-01-20T06:30:26Z | 2026-01-20T06:30:27Z |
| ghsa-4hcf-mq88-ff2w |
4.4 (3.1)
|
The WP Hello Bar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'digit_o… | 2026-01-20T06:30:26Z | 2026-01-20T06:30:27Z |
| ghsa-2gpj-j2rf-2376 |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was detected in Bjskzy Zhiyou ERP up to 11.0. Impacted is the function initRCForm o… | 2026-01-20T06:30:27Z | 2026-01-20T06:30:27Z |
| ghsa-w3mw-5fhx-xjwj |
|
Rejected reason: Not used | 2026-01-20T06:30:26Z | 2026-01-20T06:30:26Z |
| ghsa-r7w6-x8x9-6vv4 |
|
Rejected reason: Not used | 2026-01-20T06:30:26Z | 2026-01-20T06:30:26Z |
| ghsa-qwqp-43xx-xx7m |
|
Rejected reason: Not used | 2026-01-20T06:30:26Z | 2026-01-20T06:30:26Z |
| ghsa-p97c-vpmj-ch6j |
|
Rejected reason: Not used | 2026-01-20T06:30:26Z | 2026-01-20T06:30:26Z |
| ghsa-p6c7-27wx-qc74 |
|
Rejected reason: Not used | 2026-01-20T06:30:26Z | 2026-01-20T06:30:26Z |
| ghsa-p2wf-vpf4-vwf9 |
|
Rejected reason: Not used | 2026-01-20T06:30:26Z | 2026-01-20T06:30:26Z |
| ghsa-g47g-rq9g-qhgm |
|
Rejected reason: Not used | 2026-01-20T06:30:26Z | 2026-01-20T06:30:26Z |
| ghsa-6h3q-wcw2-gjg9 |
|
Rejected reason: Not used | 2026-01-20T06:30:26Z | 2026-01-20T06:30:26Z |
| ghsa-5hmm-9q32-cjhm |
|
Rejected reason: Not used | 2026-01-20T06:30:26Z | 2026-01-20T06:30:26Z |
| ghsa-xfv3-pv72-95q6 |
5.3 (3.1)
|
The LearnPress – WordPress LMS Plugin for WordPress is vulnerable to Sensitive Information Exposure… | 2026-01-20T06:30:25Z | 2026-01-20T06:30:25Z |
| ghsa-q34g-wx65-85fq |
5.3 (3.1)
|
The Custom Fonts – Host Your Fonts Locally plugin for WordPress is vulnerable to unauthorized loss … | 2026-01-20T06:30:25Z | 2026-01-20T06:30:25Z |
| ghsa-hxqm-jx76-mpgf |
5.3 (3.1)
|
The weMail - Email Marketing, Lead Generation, Optin Forms, Email Newsletters, A/B Testing, and Aut… | 2026-01-20T06:30:25Z | 2026-01-20T06:30:25Z |
| ghsa-9fx4-284h-m253 |
8.1 (3.1)
|
The Dokan: AI Powered WooCommerce Multivendor Marketplace Solution – Build Your Own Amazon, eBay, E… | 2026-01-20T06:30:25Z | 2026-01-20T06:30:25Z |
| ghsa-x64m-wg95-494x |
7.3 (3.1)
5.5 (4.0)
|
A security flaw has been discovered in CRMEB up to 5.6.3. The affected element is the function appl… | 2026-01-20T03:30:28Z | 2026-01-20T03:30:28Z |
| ghsa-rj2q-p862-w9r3 |
5.6 (3.1)
2.9 (4.0)
|
A weakness has been identified in CRMEB up to 5.6.3. The impacted element is the function remoteReg… | 2026-01-20T03:30:28Z | 2026-01-20T03:30:28Z |
| ghsa-mcww-77h6-2wxm |
5.3 (3.1)
|
The PeachPay — Payments & Express Checkout for WooCommerce (supports Stripe, PayPal, Square, Author… | 2026-01-20T03:30:28Z | 2026-01-20T03:30:28Z |
| ghsa-57xj-86j2-jqm5 |
3.1 (3.1)
1.3 (4.0)
|
A vulnerability was detected in MineAdmin 1.x/2.x. Affected by this vulnerability is an unknown fun… | 2026-01-20T03:30:28Z | 2026-01-20T03:30:28Z |
| ghsa-2wh9-wm58-w79r |
4.3 (3.1)
|
The Newsletter – Send awesome emails from WordPress plugin for WordPress is vulnerable to Cross-Sit… | 2026-01-20T03:30:28Z | 2026-01-20T03:30:28Z |
| ghsa-xc2j-7277-whgq |
5.4 (3.1)
|
The Image Photo Gallery Final Tiles Grid plugin for WordPress is vulnerable to unauthorized access … | 2026-01-20T00:30:27Z | 2026-01-20T00:30:27Z |
| ghsa-8f3h-gvwr-46vx |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was determined in Tosei Online Store Management System ネット店舗管理システム 1.01. The affect… | 2026-01-20T00:30:27Z | 2026-01-20T00:30:27Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-29693 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.461332Z |
| gsd-2024-29114 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-02T05:02:57.460810Z |
| gsd-2024-29000 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.460256Z |
| gsd-2024-29338 | Anchor CMS v0.12.7 was discovered to contain a Cross-Site Request Forgery (CSRF) via /anc… | 2024-04-02T05:02:57.459884Z |
| gsd-2024-29007 | The CloudStack management server and secondary storage VM could be tricked into making re… | 2024-04-02T05:02:57.459553Z |
| gsd-2024-29180 | Prior to versions 7.1.0, 6.1.2, and 5.3.4, the webpack-dev-middleware development middlew… | 2024-04-02T05:02:57.458989Z |
| gsd-2024-29038 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.458245Z |
| gsd-2024-29307 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.457985Z |
| gsd-2024-29249 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.457725Z |
| gsd-2024-29642 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.457460Z |
| gsd-2024-29421 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.457261Z |
| gsd-2024-29650 | An issue in @thi.ng/paths v.5.1.62 and before allows a remote attacker to execute arbitra… | 2024-04-02T05:02:57.456806Z |
| gsd-2024-29138 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-02T05:02:57.456322Z |
| gsd-2024-29425 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.455771Z |
| gsd-2024-29387 | projeqtor up to 11.2.0 was discovered to contain a remote code execution (RCE) vulnerabil… | 2024-04-02T05:02:57.455508Z |
| gsd-2024-29263 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.455156Z |
| gsd-2024-29413 | Cross Site Scripting vulnerability in Webasyst v.2.9.9 allows a remote attacker to run ar… | 2024-04-02T05:02:57.454903Z |
| gsd-2024-29606 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.454631Z |
| gsd-2024-29330 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.454352Z |
| gsd-2024-29444 | An OS command injection vulnerability has been discovered in ROS2 (Robot Operating System… | 2024-04-02T05:02:57.454090Z |
| gsd-2024-29199 | Nautobot is a Network Source of Truth and Network Automation Platform. A number of Nautob… | 2024-04-02T05:02:57.453566Z |
| gsd-2024-29385 | DIR-845L router <= v1.01KRb03 has an Unauthenticated remote code execution vulnerability … | 2024-04-02T05:02:57.453130Z |
| gsd-2024-29365 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.452691Z |
| gsd-2024-29317 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.452434Z |
| gsd-2024-29167 | ** UNSUPPPORTED WHEN ASSIGNED ** SVR-116 firmware version 1.6.0.30028871 allows a remote … | 2024-04-02T05:02:57.452172Z |
| gsd-2024-29332 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.451911Z |
| gsd-2024-29030 | memos is a privacy-first, lightweight note-taking service. In memos 0.13.2, an SSRF vulne… | 2024-04-02T05:02:57.451654Z |
| gsd-2024-29512 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.451388Z |
| gsd-2024-29755 | In tmu_get_pi of tmu.c, there is a possible out of bounds read due to improper input vali… | 2024-04-02T05:02:57.451126Z |
| gsd-2024-29250 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.450853Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-189237 | Malicious code in rigel-markdown-pdf-jsonp-restart (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189236 | Malicious code in rigel-levels-taurus-sagitta (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189235 | Malicious code in rigel-helios-phoebe-fermion (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189234 | Malicious code in rho-water-load-info-mu (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189233 | Malicious code in rho-object-test-char-shell (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189232 | Malicious code in rho-mu-catch-double-cloud (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189231 | Malicious code in rho-log-cluster-decode-pi (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189230 | Malicious code in rho-enum-secure-short-proxy (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189229 | Malicious code in rho-alpha-phi-cluster-water (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189228 | Malicious code in reveal-md-sirius-sequelize-nebula (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189227 | Malicious code in reveal-md-process-ichnology-local (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189226 | Malicious code in reveal-md-neptune-run-script-ignite (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189225 | Malicious code in reveal-md-electron-builder-chalk-steganography (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189224 | Malicious code in reveal-md-cosmos-apex-bootstrap (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189223 | Malicious code in reveal-md-cladistics-brane-blazar (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189222 | Malicious code in restart-warp-webdriver-mocha-sync (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189221 | Malicious code in restart-virtualreality-cli-spectron (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189220 | Malicious code in restart-jabbah-module-quantum-computing (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189219 | Malicious code in restart-apex-loopback-cors (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189218 | Malicious code in restart-andromeda-levels-geckodriver (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189217 | Malicious code in rest-version-library-hadron (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189216 | Malicious code in rest-rocket-lint-staged-triton (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189215 | Malicious code in rest-paleomagnetism-eris-got (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189214 | Malicious code in rest-oortcloud-interstellarmedium-yaml (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189213 | Malicious code in rest-nova-nightwatch-commitlint-config-angular (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189212 | Malicious code in rest-neptune-style-loader-nconf (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189211 | Malicious code in rest-lightyear-mensa-quasarjet (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189210 | Malicious code in rest-auriga-bellatrix-wezen (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189209 | Malicious code in resonance-phylogenetics-config-aquarius (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189208 | Malicious code in resonance-middleware-octans-graviton (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-1199 | Ivanti Endpoint Manager: Mehrere Schwachstellen ermöglichen Codeausführung | 2024-05-21T22:00:00.000+00:00 | 2024-06-16T22:00:00.000+00:00 |
| wid-sec-w-2024-1194 | Mattermost: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-05-20T22:00:00.000+00:00 | 2024-06-16T22:00:00.000+00:00 |
| wid-sec-w-2023-3097 | LibreOffice: Mehrere Schwachstellen | 2023-12-11T23:00:00.000+00:00 | 2024-06-16T22:00:00.000+00:00 |
| wid-sec-w-2023-2197 | QEMU: Mehrere Schwachstellen | 2023-08-28T22:00:00.000+00:00 | 2024-06-16T22:00:00.000+00:00 |
| wid-sec-w-2024-1380 | Rockwell Automation FactoryTalk View SE: Mehrere Schwachstellen | 2024-06-13T22:00:00.000+00:00 | 2024-06-13T22:00:00.000+00:00 |
| wid-sec-w-2024-1379 | Checkmk: Schwachstelle ermöglicht Cross-Site Scripting | 2024-06-13T22:00:00.000+00:00 | 2024-06-13T22:00:00.000+00:00 |
| wid-sec-w-2024-1378 | Mozilla Firefox for iOS: Mehrere Schwachstellen | 2024-06-13T22:00:00.000+00:00 | 2024-06-13T22:00:00.000+00:00 |
| wid-sec-w-2024-1377 | Microsoft Edge: Mehrere Schwachstellen | 2024-06-13T22:00:00.000+00:00 | 2024-06-13T22:00:00.000+00:00 |
| wid-sec-w-2024-1376 | Kibana: Schwachstelle ermöglicht Denial of Service | 2024-06-13T22:00:00.000+00:00 | 2024-06-13T22:00:00.000+00:00 |
| wid-sec-w-2024-1373 | Irfan Skiljan IrfanView: Mehrere Schwachstellen ermöglichen Codeausführung | 2024-06-12T22:00:00.000+00:00 | 2024-06-13T22:00:00.000+00:00 |
| wid-sec-w-2024-1359 | Pixel Patchday Juni 2024: Mehrere Schwachstellen | 2024-06-11T22:00:00.000+00:00 | 2024-06-13T22:00:00.000+00:00 |
| wid-sec-w-2024-1242 | Red Hat Enterprise Linux (rpm-ostree): Schwachstelle ermöglicht Offenlegung von Informationen | 2024-05-28T22:00:00.000+00:00 | 2024-06-13T22:00:00.000+00:00 |
| wid-sec-w-2023-3177 | Dell BIOS: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2023-12-19T23:00:00.000+00:00 | 2024-06-13T22:00:00.000+00:00 |
| wid-sec-w-2023-2420 | AMD Prozessoren: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2023-09-20T22:00:00.000+00:00 | 2024-06-13T22:00:00.000+00:00 |
| wid-sec-w-2023-2084 | Dell BIOS: Mehrere Schwachstellen | 2023-08-16T22:00:00.000+00:00 | 2024-06-13T22:00:00.000+00:00 |
| wid-sec-w-2022-1835 | Red Hat Enterprise Linux (python-pillow): Mehrere Schwachstellen | 2021-11-09T23:00:00.000+00:00 | 2024-06-13T22:00:00.000+00:00 |
| wid-sec-w-2022-0102 | H2: Schwachstelle ermöglicht Codeausführung | 2022-01-19T23:00:00.000+00:00 | 2024-06-13T22:00:00.000+00:00 |
| wid-sec-w-2022-0098 | H2: Schwachstelle ermöglicht Codeausführung | 2022-01-06T23:00:00.000+00:00 | 2024-06-13T22:00:00.000+00:00 |
| wid-sec-w-2024-1375 | Dell BIOS: Mehrere Schwachstellen | 2024-06-12T22:00:00.000+00:00 | 2024-06-12T22:00:00.000+00:00 |
| wid-sec-w-2024-1374 | Avast Antivirus: Schwachstelle ermöglicht Privilegieneskalation | 2024-06-12T22:00:00.000+00:00 | 2024-06-12T22:00:00.000+00:00 |
| wid-sec-w-2024-1371 | Camunda: Schwachstelle ermöglicht Denial of Service | 2024-06-12T22:00:00.000+00:00 | 2024-06-12T22:00:00.000+00:00 |
| wid-sec-w-2024-1370 | Red Hat Quay: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-06-12T22:00:00.000+00:00 | 2024-06-12T22:00:00.000+00:00 |
| wid-sec-w-2024-1368 | IBM Maximo Asset Management: Mehrere Schwachstellen | 2024-06-12T22:00:00.000+00:00 | 2024-06-12T22:00:00.000+00:00 |
| wid-sec-w-2024-1367 | GitLab: Mehrere Schwachstellen ermöglichen Denial of Service und Cross-Site Scripting | 2024-06-12T22:00:00.000+00:00 | 2024-06-12T22:00:00.000+00:00 |
| wid-sec-w-2024-1366 | PaloAlto Networks GlobalProtect: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-06-12T22:00:00.000+00:00 | 2024-06-12T22:00:00.000+00:00 |
| wid-sec-w-2024-1365 | Hashicorp Vault: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-06-12T22:00:00.000+00:00 | 2024-06-12T22:00:00.000+00:00 |
| wid-sec-w-2024-1329 | PyTorch: Schwachstelle ermöglicht Codeausführung | 2024-06-10T22:00:00.000+00:00 | 2024-06-12T22:00:00.000+00:00 |
| wid-sec-w-2024-1315 | HCL Domino: Schwachstelle ermöglicht Cross-Site Scripting | 2024-06-06T22:00:00.000+00:00 | 2024-06-12T22:00:00.000+00:00 |
| wid-sec-w-2023-1307 | LibreOffice: Mehrere Schwachstellen | 2023-05-25T22:00:00.000+00:00 | 2024-06-12T22:00:00.000+00:00 |
| wid-sec-w-2023-0760 | Apache OpenOffice und LibreOffice: Mehrere Schwachstellen ermöglichen Codeausführung | 2023-03-26T22:00:00.000+00:00 | 2024-06-12T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2023:6812 | Red Hat Security Advisory: fence-agents bug fix, enhancement, and security update | 2023-11-08T11:03:18+00:00 | 2026-01-13T22:51:46+00:00 |
| rhsa-2023:6158 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update | 2023-10-30T01:22:34+00:00 | 2026-01-13T22:51:46+00:00 |
| rhsa-2023:3326 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6.6 security fixes and container updates | 2023-05-26T07:54:54+00:00 | 2026-01-13T22:51:44+00:00 |
| rhsa-2024:4107 | Red Hat Security Advisory: kernel security and bug fix update | 2024-06-26T00:24:02+00:00 | 2026-01-13T22:48:25+00:00 |
| rhsa-2021:5038 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.2.10 security updates and bug fixes | 2021-12-09T00:46:25+00:00 | 2026-01-13T22:46:35+00:00 |
| rhsa-2021:3873 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.2.9 security, bug, and container updates | 2021-10-14T22:38:09+00:00 | 2026-01-13T22:46:33+00:00 |
| rhsa-2025:13806 | Red Hat Security Advisory: libxml2 security update | 2025-08-13T16:02:36+00:00 | 2026-01-13T22:44:41+00:00 |
| rhsa-2025:13789 | Red Hat Security Advisory: libxml2 security update | 2025-08-13T10:46:22+00:00 | 2026-01-13T22:44:40+00:00 |
| rhsa-2025:13788 | Red Hat Security Advisory: libxml2 security update | 2025-08-13T10:38:41+00:00 | 2026-01-13T22:44:40+00:00 |
| rhsa-2025:13689 | Red Hat Security Advisory: libxml2 security update | 2025-08-12T12:44:33+00:00 | 2026-01-13T22:44:39+00:00 |
| rhsa-2025:13688 | Red Hat Security Advisory: libxml2 security update | 2025-08-12T13:01:38+00:00 | 2026-01-13T22:44:39+00:00 |
| rhsa-2025:13203 | Red Hat Security Advisory: libxml2 security update | 2025-08-06T11:45:18+00:00 | 2026-01-13T22:44:30+00:00 |
| rhsa-2024:8495 | Red Hat Security Advisory: postgresql security update | 2024-10-28T01:26:08+00:00 | 2026-01-13T22:43:54+00:00 |
| rhsa-2024:6559 | Red Hat Security Advisory: postgresql:12 security update | 2024-09-10T18:33:03+00:00 | 2026-01-13T22:43:53+00:00 |
| rhsa-2024:6558 | Red Hat Security Advisory: postgresql:13 security update | 2024-09-10T18:28:43+00:00 | 2026-01-13T22:43:53+00:00 |
| rhsa-2024:6557 | Red Hat Security Advisory: postgresql:13 security update | 2024-09-10T18:25:53+00:00 | 2026-01-13T22:43:52+00:00 |
| rhsa-2024:6145 | Red Hat Security Advisory: postgresql security update | 2024-09-03T01:57:01+00:00 | 2026-01-13T22:43:52+00:00 |
| rhsa-2024:6144 | Red Hat Security Advisory: postgresql security update | 2024-09-03T01:34:41+00:00 | 2026-01-13T22:43:51+00:00 |
| rhsa-2024:6142 | Red Hat Security Advisory: postgresql:15 security update | 2024-09-03T02:26:26+00:00 | 2026-01-13T22:43:51+00:00 |
| rhsa-2024:6141 | Red Hat Security Advisory: postgresql:13 security update | 2024-09-03T02:26:27+00:00 | 2026-01-13T22:43:51+00:00 |
| rhsa-2024:6140 | Red Hat Security Advisory: postgresql:15 security update | 2024-09-03T02:21:06+00:00 | 2026-01-13T22:43:50+00:00 |
| rhsa-2024:6139 | Red Hat Security Advisory: postgresql:12 security update | 2024-09-03T01:43:36+00:00 | 2026-01-13T22:43:50+00:00 |
| rhsa-2024:6138 | Red Hat Security Advisory: postgresql:12 security update | 2024-09-03T01:35:51+00:00 | 2026-01-13T22:43:49+00:00 |
| rhsa-2024:6137 | Red Hat Security Advisory: postgresql:12 security update | 2024-09-03T02:00:26+00:00 | 2026-01-13T22:43:48+00:00 |
| rhsa-2024:6020 | Red Hat Security Advisory: postgresql:15 security update | 2024-08-29T11:00:24+00:00 | 2026-01-13T22:43:48+00:00 |
| rhsa-2024:6018 | Red Hat Security Advisory: postgresql:13 security update | 2024-08-29T10:58:09+00:00 | 2026-01-13T22:43:47+00:00 |
| rhsa-2024:6001 | Red Hat Security Advisory: postgresql:15 security update | 2024-08-29T08:58:09+00:00 | 2026-01-13T22:43:47+00:00 |
| rhsa-2024:6000 | Red Hat Security Advisory: postgresql:12 security update | 2024-08-29T08:25:54+00:00 | 2026-01-13T22:43:46+00:00 |
| rhsa-2024:5999 | Red Hat Security Advisory: postgresql security update | 2024-08-29T07:54:29+00:00 | 2026-01-13T22:43:46+00:00 |
| rhsa-2024:5929 | Red Hat Security Advisory: postgresql:16 security update | 2024-08-28T11:46:41+00:00 | 2026-01-13T22:43:45+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2021-44758 | Heimdal before 7.7.1 allows attackers to cause a NULL pointer dereference in a SPNEGO acceptor via a preferred_mech_type of GSS_C_NO_OID and a nonzero initial_response value to send_accept. | 2022-12-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2021-44142 | The Samba vfs_fruit module uses extended file attributes (EA xattr) to provide "...enhanced compatibility with Apple SMB clients and interoperability with a Netatalk 3 AFP fileserver." Samba versions prior to 4.13.17 4.14.12 and 4.15.5 with vfs_fruit configured allow out-of-bounds heap read and write via specially crafted extended file attributes. A remote attacker with write access to extended file attributes can execute arbitrary code with the privileges of smbd typically root. | 2022-02-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2021-44141 | All versions of Samba prior to 4.15.5 are vulnerable to a malicious client using a server symlink to determine if a file or directory exists in an area of the server file system not exported under the share definition. SMB1 with unix extensions has to be enabled in order for this attack to succeed. | 2022-02-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2021-43566 | All versions of Samba prior to 4.13.16 are vulnerable to a malicious client using an SMB1 or NFS race to allow a directory to be created in an area of the server file system not exported under the share definition. Note that SMB1 has to be enabled or the share also available via NFS in order for this attack to succeed. | 2022-01-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2021-3738 | In DCE/RPC it is possible to share the handles (cookies for resource state) between multiple connections via a mechanism called 'association groups'. These handles can reference connections to our sam.ldb database. However while the database was correctly shared the user credentials state was only pointed at and when one connection within that association group ended the database would be left pointing at an invalid 'struct session_info'. The most likely outcome here is a crash but it is possible that the use-after-free could instead allow different user state to be pointed at and this might allow more privileged access. | 2022-03-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2021-3671 | A null pointer de-reference was found in the way samba kerberos server handled missing sname in TGS-REQ (Ticket Granting Server - Request). An authenticated user could use this flaw to crash the samba server. | 2021-10-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2021-23192 | A flaw was found in the way samba implemented DCE/RPC. If a client to a Samba server sent a very large DCE/RPC request and chose to fragment it an attacker could replace later fragments with their own data bypassing the signature requirements. | 2022-03-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2021-20316 | A flaw was found in the way Samba handled file/directory metadata. This flaw allows an authenticated attacker with permissions to read or modify share metadata to perform this operation outside of the share. | 2022-08-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2021-20254 | A flaw was found in samba. The Samba smbd file server must map Windows group identities (SIDs) into unix group ids (gids). The code that performs this had a flaw that could allow it to read data beyond the end of the array in the case where a negative cache entry had been added to the mapping cache. This could cause the calling code to return those values into the process token that stores the group membership for a user. The highest threat from this vulnerability is to data confidentiality and integrity. | 2021-05-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2021-20251 | A flaw was found in samba. A race condition in the password lockout code may lead to the risk of brute force attacks being successful if special conditions are met. | 2023-03-10T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2020-25722 | Multiple flaws were found in the way samba AD DC implemented access and conformance checking of stored data. An attacker could use this flaw to cause total domain compromise. | 2022-02-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2020-25719 | A flaw was found in the way Samba as an Active Directory Domain Controller implemented Kerberos name-based authentication. The Samba AD DC could become confused about the user a ticket represents if it did not strictly require a Kerberos PAC and always use the SIDs found within. The result could include total domain compromise. | 2022-02-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2020-25718 | A flaw was found in the way samba as an Active Directory Domain Controller is able to support an RODC (read-only domain controller). This would allow an RODC to print administrator tickets. | 2022-02-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2020-25717 | A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation. | 2022-02-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2020-14383 | A flaw was found in samba's DNS server. An authenticated user could use this flaw to the RPC server to crash. This RPC server which also serves protocols other than dnsserver will be restarted after a short delay but it is easy for an authenticated non administrative attacker to crash it again as soon as it returns. The Samba DNS server itself will continue to operate but many RPC services will not. | 2020-12-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2020-14323 | A null pointer dereference flaw was found in samba's Winbind service in versions before 4.11.15 before 4.12.9 and before 4.13.1. A local user could use this flaw to crash the winbind service causing denial of service. | 2020-10-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2020-14318 | A flaw was found in the way samba handled file and directory permissions. An authenticated user could use this flaw to gain access to certain file and directory information which otherwise would be unavailable to the attacker. | 2020-12-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2019-3870 | A vulnerability was found in Samba from version (including) 4.9 to versions before 4.9.6 and 4.10.2. During the creation of a new Samba AD DC files are created in a private subdirectory of the install location. This directory is typically mode 0700 that is owner (root) only access. However in some upgraded installations it will have other permissions such as 0755 because this was the default before Samba 4.8. Within this directory files are created with mode 0666 which is world-writable including a sample krb5.conf and the list of DNS names and servicePrincipalName values to update. | 2019-04-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2017-15275 | Samba before 4.7.3 might allow remote attackers to obtain sensitive information by leveraging failure of the server to clear allocated heap memory. | 2017-11-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2017-12150 | It was found that samba before 4.4.16 4.5.x before 4.5.14 and 4.6.x before 4.6.8 did not enforce "SMB signing" when certain configuration options were enabled. A remote attacker could launch a man-in-the-middle attack and retrieve information in plain-text. | 2018-07-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2016-2124 | A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required. | 2022-02-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2024-35266 | Azure DevOps Server Spoofing Vulnerability | 2024-07-09T07:00:00.000Z | 2024-10-14T07:00:00.000Z |
| msrc_cve-2024-44966 | binfmt_flat: Fix corruption when not offsetting data start | 2024-09-01T07:00:00.000Z | 2024-10-14T00:00:00.000Z |
| msrc_cve-2024-44965 | x86/mm: Fix pti_clone_pgtable() alignment assumption | 2024-09-01T07:00:00.000Z | 2024-10-14T00:00:00.000Z |
| msrc_cve-2024-44960 | usb: gadget: core: Check for unset descriptor | 2024-09-01T07:00:00.000Z | 2024-10-14T00:00:00.000Z |
| msrc_cve-2024-44958 | sched/smt: Fix unbalance sched_smt_present dec/inc | 2024-09-01T07:00:00.000Z | 2024-10-14T00:00:00.000Z |
| msrc_cve-2024-44954 | ALSA: line6: Fix racy access to midibuf | 2024-09-01T07:00:00.000Z | 2024-10-14T00:00:00.000Z |
| msrc_cve-2024-44971 | net: dsa: bcm_sf2: Fix a possible memory leak in bcm_sf2_mdio_register() | 2024-09-01T07:00:00.000Z | 2024-10-12T00:00:00.000Z |
| msrc_cve-2024-44969 | s390/sclp: Prevent release of buffer in I/O | 2024-09-01T07:00:00.000Z | 2024-10-12T00:00:00.000Z |
| msrc_cve-2024-44944 | netfilter: ctnetlink: use helper function to calculate expect ID | 2024-08-02T00:00:00.000Z | 2024-10-12T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202211-0468 | Transient DOS due to buffer over-read in WLAN firmware while processing PPE threshold. in… | 2025-04-22T21:35:18.183000Z |
| var-202212-1144 | A vulnerability has been identified in SCALANCE X204RNA (HSR) (All versions < V3.2.7), SC… | 2025-04-22T21:32:12.167000Z |
| var-202212-1141 | A vulnerability has been identified in SCALANCE X204RNA (HSR) (All versions < V3.2.7), SC… | 2025-04-22T21:29:57.609000Z |
| var-202210-1632 | A race condition was addressed with improved locking. This issue is fixed in iOS 16.1 and… | 2025-04-22T21:29:49.721000Z |
| var-202210-1629 | The issue was addressed with improved memory handling. This issue is fixed in iOS 16.1 an… | 2025-04-22T21:24:25.165000Z |
| var-202212-1143 | A vulnerability has been identified in SCALANCE X204RNA (HSR) (All versions < V3.2.7), SC… | 2025-04-22T21:18:53.146000Z |
| var-202212-1142 | A vulnerability has been identified in SCALANCE X204RNA (HSR) (All versions < V3.2.7), SC… | 2025-04-22T21:16:08.945000Z |
| var-202212-0543 | Information disclosure due to buffer over-read in WLAN firmware while parsing security co… | 2025-04-22T21:12:38.227000Z |
| var-202210-1475 | A logic issue was addressed with improved checks. This issue is fixed in macOS Ventura 13… | 2025-04-22T21:03:00.608000Z |
| var-202212-1324 | The issue was addressed with improved memory handling. This issue is fixed in macOS Monte… | 2025-04-22T21:00:09.280000Z |
| var-202212-1159 | A vulnerability has been identified in SICAM PAS/PQS (All versions < V7.0). Affected soft… | 2025-04-22T20:50:02.713000Z |
| var-202211-1832 | A parsing issue similar to CVE-2022-3171, but with textformat in protobuf-java core and l… | 2025-04-22T20:35:41.244000Z |
| var-202212-0443 | Information disclosure due to buffer over-read in Bluetooth HOST while pairing and connec… | 2025-04-22T20:12:48.881000Z |
| var-202212-1213 | An issue existed in the parsing of URLs. This issue was addressed with improved input val… | 2025-04-22T20:10:20.376000Z |
| var-202212-1547 | Memory corruption in camera due to buffer copy without checking size of input in Snapdrag… | 2025-04-22T20:10:18.523000Z |
| var-202212-1268 | A type confusion issue was addressed with improved checks. This issue is fixed in macOS M… | 2025-04-22T20:10:12.765000Z |
| var-202210-1900 | A logic issue was addressed with improved state management. This issue is fixed in iOS 15… | 2025-04-22T20:07:50.799000Z |
| var-202210-1481 | This issue was addressed with improved data protection. This issue is fixed in macOS Vent… | 2025-04-22T20:07:05.815000Z |
| var-202210-1626 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2025-04-22T20:06:15.042000Z |
| var-202210-1531 | A certificate validation issue existed in the handling of WKWebView. This issue was addre… | 2025-04-22T20:00:38.454000Z |
| var-202210-1492 | The issue was addressed with improved memory handling. This issue is fixed in macOS Ventu… | 2025-04-22T20:00:30.614000Z |
| var-202210-1483 | An access issue was addressed with improved access restrictions. This issue is fixed in m… | 2025-04-22T19:51:45.865000Z |
| var-202210-1930 | The issue was addressed with improved memory handling. This issue is fixed in iOS 15.7.1 … | 2025-04-22T19:50:04.198000Z |
| var-202212-1160 | A vulnerability has been identified in SICAM PAS/PQS (All versions < V7.0). Affected soft… | 2025-04-22T19:47:02.239000Z |
| var-202503-3517 | In Netgear WNR854T 1.5.2 (North America), the UPNP service is vulnerable to command injec… | 2025-04-22T19:33:10.954000Z |
| var-202503-3790 | Netgear WNR854T 1.5.2 (North America) is vulnerable to Command Injection. An attacker can… | 2025-04-22T19:33:10.921000Z |
| var-202212-1309 | A spoofing issue existed in the handling of URLs. This issue was addressed with improved … | 2025-04-21T23:41:07.681000Z |
| var-202212-1477 | An access issue was addressed with additional sandbox restrictions on third-party apps. T… | 2025-04-21T23:41:07.645000Z |
| var-201702-0676 | An issue was discovered in Schneider Electric Wonderware Historian 2014 R2 SP1 P01 and ea… | 2025-04-21T23:39:59.427000Z |
| var-201702-0802 | A vulnerability in the sponsor portal of Cisco Identity Services Engine (ISE) could allow… | 2025-04-21T23:39:59.394000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2023:4117-1 | Security update for slurm | 2023-10-18T13:15:06Z | 2023-10-18T13:15:06Z |
| suse-su-2023:4116-1 | Security update for slurm | 2023-10-18T13:14:41Z | 2023-10-18T13:14:41Z |
| suse-su-2023:4115-1 | Security update for slurm | 2023-10-18T13:13:40Z | 2023-10-18T13:13:40Z |
| suse-su-2023:4114-1 | Security update for slurm | 2023-10-18T11:41:50Z | 2023-10-18T11:41:50Z |
| suse-su-2023:4113-1 | Security update for slurm | 2023-10-18T11:41:10Z | 2023-10-18T11:41:10Z |
| suse-su-2023:4110-1 | Security update for glibc | 2023-10-18T10:47:00Z | 2023-10-18T10:47:00Z |
| suse-su-2023:4109-1 | Security update for erlang | 2023-10-18T10:18:52Z | 2023-10-18T10:18:52Z |
| suse-su-2023:4108-1 | Security update for python-urllib3 | 2023-10-18T09:52:17Z | 2023-10-18T09:52:17Z |
| suse-su-2023:4104-1 | Security update for opensc | 2023-10-17T15:36:49Z | 2023-10-17T15:36:49Z |
| suse-su-2023:4103-1 | Security update for buildah | 2023-10-17T14:46:06Z | 2023-10-17T14:46:06Z |
| suse-su-2023:4102-1 | Security update for nghttp2 | 2023-10-17T13:14:36Z | 2023-10-17T13:14:36Z |
| suse-su-2023:4101-1 | Security update for conmon | 2023-10-17T13:13:59Z | 2023-10-17T13:13:59Z |
| suse-su-2023:4099-1 | Security update for buildah | 2023-10-17T13:13:03Z | 2023-10-17T13:13:03Z |
| suse-su-2023:4098-1 | Security update for buildah | 2023-10-17T13:12:12Z | 2023-10-17T13:12:12Z |
| suse-su-2023:4097-1 | Security update for suse-module-tools | 2023-10-17T13:04:59Z | 2023-10-17T13:04:59Z |
| suse-su-2023:4096-1 | Security update for samba | 2023-10-17T13:04:24Z | 2023-10-17T13:04:24Z |
| suse-su-2023:4095-1 | Security update for the Linux Kernel | 2023-10-17T13:03:35Z | 2023-10-17T13:03:35Z |
| suse-su-2023:4093-1 | Security update for the Linux Kernel | 2023-10-17T07:50:36Z | 2023-10-17T07:50:36Z |
| suse-su-2023:4091-1 | Security update for python-gevent | 2023-10-17T06:39:00Z | 2023-10-17T06:39:00Z |
| suse-su-2023:4090-1 | Security update for libcue | 2023-10-17T06:21:30Z | 2023-10-17T06:21:30Z |
| suse-su-2023:3666-2 | Security update for libxml2 | 2023-10-16T19:13:24Z | 2023-10-16T19:13:24Z |
| suse-su-2023:4089-1 | Security update for opensc | 2023-10-16T11:17:46Z | 2023-10-16T11:17:46Z |
| suse-su-2023:4085-1 | Security update for grub2 | 2023-10-16T09:32:02Z | 2023-10-16T09:32:02Z |
| suse-su-2023:4084-1 | Security update for netatalk | 2023-10-16T09:31:51Z | 2023-10-16T09:31:51Z |
| suse-su-2023:4083-1 | Security update for wireshark | 2023-10-16T09:16:11Z | 2023-10-16T09:16:11Z |
| suse-su-2023:4076-1 | Security update for cni | 2023-10-13T12:02:53Z | 2023-10-13T12:02:53Z |
| suse-su-2023:4075-1 | Security update for cni-plugins | 2023-10-13T12:02:34Z | 2023-10-13T12:02:34Z |
| suse-su-2023:4072-1 | Security update for the Linux Kernel | 2023-10-13T08:47:39Z | 2023-10-13T08:47:39Z |
| suse-su-2023:4070-1 | Security update for exiv2 | 2023-10-13T08:13:03Z | 2023-10-13T08:13:03Z |
| suse-su-2023:4069-1 | Security update for go1.21 | 2023-10-13T08:10:28Z | 2023-10-13T08:10:28Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2023:0307-1 | Security update for bluetuith | 2023-10-20T10:01:51Z | 2023-10-20T10:01:51Z |
| opensuse-su-2023:0306-1 | Security update for rxvt-unicode | 2023-10-20T10:01:47Z | 2023-10-20T10:01:47Z |
| opensuse-su-2023:0304-1 | Security update for exim | 2023-10-18T12:24:07Z | 2023-10-18T12:24:07Z |
| opensuse-su-2023:0303-1 | Security update for exim | 2023-10-18T12:24:03Z | 2023-10-18T12:24:03Z |
| opensuse-su-2023:0300-1 | Security update for chromium | 2023-10-13T08:14:00Z | 2023-10-13T08:14:00Z |
| opensuse-su-2023:0298-1 | Security update for opera | 2023-10-11T07:10:39Z | 2023-10-11T07:10:39Z |
| opensuse-su-2023:0297-1 | Security update for opera | 2023-10-11T07:10:18Z | 2023-10-11T07:10:18Z |
| opensuse-su-2023:0293-1 | Security update for exim | 2023-10-05T09:26:19Z | 2023-10-05T09:26:19Z |
| opensuse-su-2023:0292-1 | Security update for chromium | 2023-10-05T07:44:24Z | 2023-10-05T07:44:24Z |
| opensuse-su-2023:0285-1 | Security update for roundcubemail | 2023-10-02T10:01:50Z | 2023-10-02T10:01:50Z |
| opensuse-su-2023:0279-1 | Security update for python-bugzilla | 2023-10-02T09:08:01Z | 2023-10-02T09:08:01Z |
| opensuse-su-2023:0278-1 | Security update for seamonkey | 2023-10-02T09:07:31Z | 2023-10-02T09:07:31Z |
| opensuse-su-2023:0277-1 | Security update for chromium | 2023-09-29T07:34:25Z | 2023-09-29T07:34:25Z |
| opensuse-su-2023:0275-1 | Security update for cacti, cacti-spine | 2023-09-26T13:31:33Z | 2023-09-26T13:31:33Z |
| opensuse-su-2023:0272-1 | Security update for python-CairoSVG | 2023-09-25T22:02:13Z | 2023-09-25T22:02:13Z |
| opensuse-su-2023:0271-1 | Security update for python-GitPython | 2023-09-25T22:02:02Z | 2023-09-25T22:02:02Z |
| opensuse-su-2023:0270-1 | Security update for Cadence | 2023-09-25T22:01:59Z | 2023-09-25T22:01:59Z |
| opensuse-su-2023:0269-1 | Security update for modsecurity | 2023-09-25T22:01:56Z | 2023-09-25T22:01:56Z |
| opensuse-su-2023:0267-1 | Security update for tcpreplay | 2023-09-25T22:01:50Z | 2023-09-25T22:01:50Z |
| opensuse-su-2023:0260-1 | Security update for python-CairoSVG | 2023-09-25T12:02:25Z | 2023-09-25T12:02:25Z |
| opensuse-su-2023:0259-1 | Security update for python-GitPython | 2023-09-25T12:02:14Z | 2023-09-25T12:02:14Z |
| opensuse-su-2023:0257-1 | Security update for modsecurity | 2023-09-25T12:02:08Z | 2023-09-25T12:02:08Z |
| opensuse-su-2023:0253-1 | Security update for renderdoc | 2023-09-25T10:02:37Z | 2023-09-25T10:02:37Z |
| opensuse-su-2023:0251-1 | Security update for opera | 2023-09-23T12:02:01Z | 2023-09-23T12:02:01Z |
| opensuse-su-2023:0249-1 | Security update for chromium | 2023-09-19T09:25:09Z | 2023-09-19T09:25:09Z |
| opensuse-su-2023:0247-1 | Security update for chromium | 2023-09-15T06:47:49Z | 2023-09-15T06:47:49Z |
| opensuse-su-2023:0246-1 | Security update for chromium | 2023-09-13T11:45:11Z | 2023-09-13T11:45:11Z |
| opensuse-su-2023:0245-1 | Security update for chromium | 2023-09-12T08:35:17Z | 2023-09-12T08:35:17Z |
| opensuse-su-2023:0244-1 | Security update for chromium | 2023-09-06T07:06:29Z | 2023-09-06T07:06:29Z |
| opensuse-su-2023:0237-1 | Security update for chromium | 2023-08-28T15:17:03Z | 2023-08-28T15:17:03Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-16426 | 浙江大华技术股份有限公司DSS数字监控系统存在SQL注入漏洞 | 2025-06-05 | 2025-07-20 |
| cnvd-2025-16468 | 兄弟科技股份有限公司HL-L2360D series存在命令执行漏洞 | 2025-06-04 | 2025-07-19 |
| cnvd-2025-16197 | 广州红海云计算股份有限公司红海云eHr存在信息泄露漏洞 | 2025-06-04 | 2025-07-19 |
| cnvd-2025-16050 | 杭州立方控股股份有限公司立方OCS管理系统存在命令执行漏洞 | 2025-06-04 | 2025-07-19 |
| cnvd-2025-16041 | 北京派网软件有限公司panabit日志审计系统存在命令执行漏洞 | 2025-06-04 | 2025-07-19 |
| cnvd-2025-16526 | Redis存在未明漏洞(CNVD-2025-16526) | 2025-07-11 | 2025-07-18 |
| cnvd-2025-16525 | Redis存在未明漏洞(CNVD-2025-16525) | 2025-07-11 | 2025-07-18 |
| cnvd-2025-16524 | RT-Thread输入验证错误漏洞(CNVD-2025-16524) | 2025-07-15 | 2025-07-18 |
| cnvd-2025-16523 | RT-Thread缓冲区溢出漏洞(CNVD-2025-16523) | 2025-07-15 | 2025-07-18 |
| cnvd-2025-16514 | 珠海新华通软件股份有限公司网上委托系统存在文件上传漏洞 | 2025-06-03 | 2025-07-18 |
| cnvd-2025-16492 | 摩莎科技(上海)有限公司NPort 5410存在未授权访问漏洞 | 2025-06-03 | 2025-07-18 |
| cnvd-2025-16371 | WordPress GB Forms DB plugin代码注入漏洞 | 2025-07-18 | 2025-07-18 |
| cnvd-2025-16370 | WordPress Friends plugin代码问题漏洞 | 2025-07-18 | 2025-07-18 |
| cnvd-2025-16369 | WordPress Contest Gallery plugin跨站脚本漏洞 | 2025-07-18 | 2025-07-18 |
| cnvd-2025-16368 | WordPress Broken Link Notifier plugin代码问题漏洞 | 2025-07-18 | 2025-07-18 |
| cnvd-2025-16367 | WordPress Broken Link Notifier plugin代码执行漏洞 | 2025-07-18 | 2025-07-18 |
| cnvd-2025-16366 | WordPress插件BeeTeam368 Extensions代码问题漏洞 | 2025-07-18 | 2025-07-18 |
| cnvd-2025-16365 | WordPress插件AIT CSV import/export代码问题漏洞 | 2025-07-18 | 2025-07-18 |
| cnvd-2025-16364 | OpenImageIO存在未明漏洞 | 2025-02-06 | 2025-07-18 |
| cnvd-2025-16363 | OpenImageIO堆溢出漏洞 | 2025-02-06 | 2025-07-18 |
| cnvd-2025-16362 | OpenImageIO代码问题漏洞 | 2025-02-06 | 2025-07-18 |
| cnvd-2025-16361 | OpenImageIO缓冲区溢出漏洞 | 2025-02-06 | 2025-07-18 |
| cnvd-2025-16360 | LiteLLM资源管理错误漏洞 | 2025-03-27 | 2025-07-18 |
| cnvd-2025-16359 | Endress+Hauser MEAC300-FNADE4存在未明漏洞(CNVD-2025-16359) | 2025-07-11 | 2025-07-18 |
| cnvd-2025-16358 | Endress+Hauser MEAC300-FNADE4跨站请求伪造漏洞 | 2025-07-11 | 2025-07-18 |
| cnvd-2025-16357 | Endress+Hauser MEAC300-FNADE4跨站脚本漏洞(CNVD-2025-16357) | 2025-07-11 | 2025-07-18 |
| cnvd-2025-16356 | Endress+Hauser MEAC300-FNADE4存在未明漏洞(CNVD-2025-16356) | 2025-07-11 | 2025-07-18 |
| cnvd-2025-16355 | Endress+Hauser MEAC300-FNADE4存在未明漏洞(CNVD-2025-16355) | 2025-07-11 | 2025-07-18 |
| cnvd-2025-16354 | Endress+Hauser MEAC300-FNADE4存在未明漏洞(CNVD-2025-16354) | 2025-07-11 | 2025-07-18 |
| cnvd-2025-16353 | Endress+Hauser MEAC300-FNADE4信息泄露漏洞(CNVD-2025-16353) | 2025-07-11 | 2025-07-18 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2020-avi-007 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2020-01-08T00:00:00.000000 | 2020-01-08T00:00:00.000000 |
| certfr-2020-avi-006 | Vulnérabilité dans Fortinet FortiAuthenticator | 2020-01-08T00:00:00.000000 | 2020-01-08T00:00:00.000000 |
| certfr-2020-avi-005 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2020-01-07T00:00:00.000000 | 2020-01-07T00:00:00.000000 |
| certfr-2020-avi-004 | Multiples vulnérabilités dans les produits Fortinet | 2020-01-06T00:00:00.000000 | 2020-01-06T00:00:00.000000 |
| certfr-2020-avi-003 | Vulnérabilité dans Moxa MGate 5105-MB-EIP | 2020-01-06T00:00:00.000000 | 2020-01-06T00:00:00.000000 |
| certfr-2020-avi-002 | Multiples vulnérabilités dans GitLab | 2020-01-03T00:00:00.000000 | 2020-01-03T00:00:00.000000 |
| certfr-2020-avi-001 | Multiples vulnérabilités dans Cisco DCNM | 2020-01-02T00:00:00.000000 | 2020-01-02T00:00:00.000000 |
| certfr-2019-avi-657 | Multiples vulnérabilités dans Tenable.sc | 2019-12-31T00:00:00.000000 | 2019-12-31T00:00:00.000000 |
| certfr-2019-avi-656 | Vulnérabilité dans F5 BIG-IP | 2019-12-30T00:00:00.000000 | 2019-12-30T00:00:00.000000 |
| certfr-2019-avi-655 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2019-12-30T00:00:00.000000 | 2019-12-30T00:00:00.000000 |
| certfr-2019-avi-654 | Multiples vulnérabilités dans F5 BIG-IP | 2019-12-26T00:00:00.000000 | 2019-12-26T00:00:00.000000 |
| certfr-2019-avi-653 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2019-12-23T00:00:00.000000 | 2019-12-24T00:00:00.000000 |
| certfr-2019-avi-652 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2019-12-20T00:00:00.000000 | 2019-12-20T00:00:00.000000 |
| certfr-2019-avi-651 | Vulnérabilité dans VMware Workstation et Horizon View Agent | 2019-12-20T00:00:00.000000 | 2019-12-20T00:00:00.000000 |
| certfr-2019-avi-649 | Multiples vulnérabilités dans Tenable Nessus Network Monitor | 2019-12-20T00:00:00.000000 | 2019-12-20T00:00:00.000000 |
| certfr-2019-avi-648 | Vulnérabilité dans Palo Alto PAN-OS | 2019-12-20T00:00:00.000000 | 2019-12-20T00:00:00.000000 |
| certfr-2019-avi-647 | Vulnérabilité dans la version DebianEdu/SkoleLinux de Debian | 2019-12-19T00:00:00.000000 | 2019-12-19T00:00:00.000000 |
| certfr-2019-avi-646 | Multiples vulnérabilités dans Google Chrome OS | 2019-12-19T00:00:00.000000 | 2019-12-19T00:00:00.000000 |
| certfr-2019-avi-645 | Multiples vulnérabilités dans Drupal | 2019-12-19T00:00:00.000000 | 2019-12-19T00:00:00.000000 |
| certfr-2019-avi-644 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2019-12-19T00:00:00.000000 | 2019-12-19T00:00:00.000000 |
| certfr-2019-avi-643 | Multiples vulnérabilités dans Apache Tomcat | 2019-12-19T00:00:00.000000 | 2019-12-19T00:00:00.000000 |
| certfr-2019-avi-642 | Vulnérabilité dans Microsoft SharePoint | 2019-12-19T00:00:00.000000 | 2019-12-19T00:00:00.000000 |
| certfr-2019-avi-641 | Multiples vulnérabilités dans PHP | 2019-12-18T00:00:00.000000 | 2019-12-18T00:00:00.000000 |
| certfr-2019-avi-639 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2019-12-18T00:00:00.000000 | 2019-12-18T00:00:00.000000 |
| certfr-2019-avi-638 | Vulnérabilité dans Google Chrome | 2019-12-18T00:00:00.000000 | 2019-12-18T00:00:00.000000 |
| certfr-2019-avi-637 | Multiples vulnérabilités dans Joomla! | 2019-12-18T00:00:00.000000 | 2019-12-18T00:00:00.000000 |
| certfr-2019-avi-636 | Vulnérabilité dans Juniper EX et QFX | 2019-12-18T00:00:00.000000 | 2019-12-18T00:00:00.000000 |
| certfr-2019-avi-635 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2019-12-16T00:00:00.000000 | 2019-12-16T00:00:00.000000 |
| certfr-2019-avi-634 | Multiples vulnérabilités dans F5 BIG-IP | 2019-12-16T00:00:00.000000 | 2019-12-16T00:00:00.000000 |
| certfr-2019-avi-633 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2019-12-13T00:00:00.000000 | 2019-12-13T00:00:00.000000 |