Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-62006 |
5.4 (3.1)
|
WordPress WP SMS plugin <= 7.0.1 - Broken Access Contr… |
VeronaLabs |
WP SMS |
2025-10-22T14:32:47.684Z | 2026-01-20T14:28:13.040Z |
| CVE-2025-62030 |
6.5 (3.1)
|
WordPress tagDiv Composer plugin <= 5.4.1 - Cross Site… |
tagDiv |
tagDiv Composer |
2025-11-06T15:55:27.866Z | 2026-01-20T14:28:13.039Z |
| CVE-2025-62020 |
7.1 (3.1)
|
WordPress VOD Infomaniak plugin <= 1.5.11 - Cross Site… |
Infomaniak Network |
VOD Infomaniak |
2025-10-22T14:32:49.407Z | 2026-01-20T14:28:13.039Z |
| CVE-2025-62005 |
7.1 (3.1)
|
WordPress SUMO Memberships for WooCommerce plugin < 7.… |
FantasticPlugins |
SUMO Memberships for WooCommerce |
2025-10-22T14:32:47.453Z | 2026-01-20T14:28:13.038Z |
| CVE-2025-62026 |
4.3 (3.1)
|
WordPress Blockspare plugin <= 3.2.13.2 - Sensitive Da… |
Blockspare |
Blockspare |
2025-10-22T14:32:50.799Z | 2026-01-20T14:28:13.037Z |
| CVE-2025-62022 |
7.5 (3.1)
|
WordPress BuddyPress plugin <= 14.3.4 - Broken Access … |
BuddyPress |
BuddyPress |
2025-10-22T14:32:49.815Z | 2026-01-20T14:28:13.037Z |
| CVE-2025-62012 |
6.5 (3.1)
|
WordPress TheGem (Elementor) theme <= 5.10.5 - Cross S… |
CodexThemes |
TheGem (Elementor) |
2025-11-06T15:55:23.261Z | 2026-01-20T14:28:13.036Z |
| CVE-2025-60248 |
7.5 (3.1)
|
WordPress WPC Product Options for WooCommerce plugin <… |
WPClever |
WPC Product Options for WooCommerce |
2025-11-06T15:55:21.142Z | 2026-01-20T14:28:13.000Z |
| CVE-2025-60246 |
7.1 (3.1)
|
WordPress Simple Finance Calculator plugin <= 1.0 - Re… |
weissmike |
Simple Finance Calculator |
2025-10-22T14:32:47.237Z | 2026-01-20T14:28:12.981Z |
| CVE-2025-60239 |
8.5 (3.1)
|
WordPress CoSchool LMS plugin <= 1.4.3 - SQL Injection… |
Codexpert, Inc |
CoSchool LMS |
2025-11-06T15:55:09.493Z | 2026-01-20T14:28:12.963Z |
| CVE-2025-60241 |
7.5 (3.1)
|
WordPress Premmerce plugin <= 1.3.19 - Local File Incl… |
Premmerce |
Premmerce |
2025-11-06T15:55:13.362Z | 2026-01-20T14:28:12.936Z |
| CVE-2025-60247 |
6.5 (3.1)
|
WordPress Bux Woocommerce plugin <= 1.2.3 - Broken Acc… |
Bux |
Bux Woocommerce |
2025-11-06T15:55:20.539Z | 2026-01-20T14:28:12.911Z |
| CVE-2025-60243 |
9.8 (3.1)
|
WordPress Selling Commander for WooCommerce plugin <= … |
Holest Engineering |
Selling Commander for WooCommerce |
2025-11-06T15:55:15.782Z | 2026-01-20T14:28:12.895Z |
| CVE-2025-62007 |
8.8 (3.1)
|
WordPress Voice Feedback plugin <= 1.0.3 - Privilege E… |
bPlugins |
Voice Feedback |
2025-10-22T14:32:47.880Z | 2026-01-20T14:28:12.873Z |
| CVE-2025-60240 |
7.5 (3.1)
|
WordPress AnyComment plugin <= 0.3.6 - Local File Incl… |
Alexander |
AnyComment |
2025-11-06T15:55:10.324Z | 2026-01-20T14:28:12.866Z |
| CVE-2025-62015 |
7.6 (3.1)
|
WordPress Advanced Coupons for WooCommerce Coupons plu… |
Josh Kohlbach |
Advanced Coupons for WooCommerce Coupons |
2025-10-22T14:32:49.014Z | 2026-01-20T14:28:12.860Z |
| CVE-2025-60244 |
7.1 (3.1)
|
WordPress TableOn plugin <= 1.0.4.2 - Content Injectio… |
RealMag777 |
TableOn |
2025-11-06T15:55:18.193Z | 2026-01-20T14:28:12.860Z |
| CVE-2025-60242 |
7.5 (3.1)
|
WordPress Download Counter plugin <= 1.4 - Arbitrary F… |
Anatoly |
Download Counter |
2025-11-06T15:55:14.917Z | 2026-01-20T14:28:12.776Z |
| CVE-2025-60232 |
9.8 (3.1)
|
WordPress KBx Pro Ultimate plugin <= 8.0.5 - PHP Objec… |
quantumcloud |
KBx Pro Ultimate |
2025-10-22T14:32:46.670Z | 2026-01-20T14:28:12.559Z |
| CVE-2025-60238 |
9.8 (3.1)
|
WordPress UNIVERSAM plugin <= 8.72.34 - PHP Object Inj… |
universam |
UNIVERSAM |
2025-10-22T14:32:47.058Z | 2026-01-20T14:28:12.553Z |
| CVE-2025-60234 |
8.8 (3.1)
|
WordPress Single Property theme <= 2.8 - PHP Object In… |
designthemes |
Single Property |
2025-10-22T14:32:46.860Z | 2026-01-20T14:28:12.552Z |
| CVE-2025-60235 |
10 (3.1)
|
WordPress Helpdesk Support Ticket System for WooCommer… |
Plugify |
Helpdesk Support Ticket System for WooCommerce |
2025-11-06T15:55:07.928Z | 2026-01-20T14:28:12.539Z |
| CVE-2025-60209 |
9.8 (3.1)
|
WordPress Connector for Gravity Forms and Google Sheet… |
CRM Perks |
Connector for Gravity Forms and Google Sheets |
2025-10-22T14:32:42.951Z | 2026-01-20T14:28:12.514Z |
| CVE-2025-60217 |
7.7 (3.1)
|
WordPress PT Luxa Addons Plugin <= 1.2.2 - Arbitrary F… |
ypromo |
PT Luxa Addons |
2025-10-22T14:32:44.691Z | 2026-01-20T14:28:12.511Z |
| CVE-2025-60211 |
8.8 (3.1)
|
WordPress WooCommerce Registration Fields Plugin - Cus… |
extendons |
WooCommerce Registration Fields Plugin - Custom Signup Fields |
2025-10-22T14:32:43.390Z | 2026-01-20T14:28:12.510Z |
| CVE-2025-60206 |
10 (3.1)
|
WordPress Alone theme <= 7.8.3 - Remote Code Execution… |
Bearsthemes |
Alone |
2025-10-22T14:32:42.404Z | 2026-01-20T14:28:12.509Z |
| CVE-2025-60225 |
9.8 (3.1)
|
WordPress BugsPatrol theme <= 1.5.0 - PHP Object Injec… |
AncoraThemes |
BugsPatrol |
2025-10-22T14:32:45.876Z | 2026-01-20T14:28:12.508Z |
| CVE-2025-60208 |
8.8 (3.1)
|
WordPress Advanced Custom Fields : CPT Options Pages p… |
Tusko Trush |
Advanced Custom Fields : CPT Options Pages |
2025-10-22T14:32:42.742Z | 2026-01-20T14:28:12.505Z |
| CVE-2025-60221 |
9.8 (3.1)
|
WordPress Captivate Sync Plugin <= 3.0.3 - PHP Object … |
captivateaudio |
Captivate Sync |
2025-10-22T14:32:45.187Z | 2026-01-20T14:28:12.492Z |
| CVE-2025-60224 |
9.8 (3.1)
|
WordPress Subscribe to Download plugin <= 2.0.9 - PHP … |
wpshuffle |
Subscribe to Download |
2025-10-22T14:32:45.675Z | 2026-01-20T14:28:12.485Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-39482 |
4.3 (3.1)
|
WordPress Eventer - WordPress Event & Booking Manager … |
imithemes |
Eventer |
2025-05-16T15:45:26.697Z | 2026-01-22T12:07:27.271Z |
| CVE-2025-39481 |
9.3 (3.1)
|
WordPress Eventer - WordPress Event & Booking Manager … |
imithemes |
Eventer |
2025-05-16T15:45:27.223Z | 2026-01-22T12:05:03.823Z |
| CVE-2025-39483 |
6.5 (3.1)
|
WordPress Eventer plugin < 3.9.9.1 - Shortcode Injecti… |
imithemes |
Eventer |
2025-08-14T10:34:26.628Z | 2026-01-22T09:41:27.096Z |
| CVE-2024-53252 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:40:06.360Z | |
| CVE-2024-53251 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:40:04.870Z | |
| CVE-2024-53250 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:40:03.200Z | |
| CVE-2024-53249 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:40:00.720Z | |
| CVE-2024-53248 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:59.446Z | |
| CVE-2024-45743 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:58.180Z | |
| CVE-2024-45742 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:56.832Z | |
| CVE-2024-45730 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:55.570Z | |
| CVE-2024-45729 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:54.322Z | |
| CVE-2024-45728 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:53.063Z | |
| CVE-2024-45727 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:51.817Z | |
| CVE-2024-45726 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:50.428Z | |
| CVE-2024-45725 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:49.125Z | |
| CVE-2024-45724 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:47.866Z | |
| CVE-2024-36998 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:46.585Z | |
| CVE-2024-36988 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:45.176Z | |
| CVE-2024-22166 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:43.826Z | |
| CVE-2023-32720 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:42.486Z | |
| CVE-2023-32719 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:41.161Z | |
| CVE-2023-32718 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:39.735Z | |
| CVE-2023-22944 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:38.404Z | |
| CVE-2023-22930 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:37.110Z | |
| CVE-2023-22929 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:35.843Z | |
| CVE-2023-22928 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:34.507Z | |
| CVE-2023-22927 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:33.188Z | |
| CVE-2023-22926 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:31.838Z | |
| CVE-2023-22925 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | N/A | N/A | 2026-01-22T09:39:30.552Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2023-22927 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.823 | 2026-01-22T10:16:04.823 |
| fkie_cve-2023-22926 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.760 | 2026-01-22T10:16:04.760 |
| fkie_cve-2023-22925 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.687 | 2026-01-22T10:16:04.687 |
| fkie_cve-2022-43560 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.620 | 2026-01-22T10:16:04.620 |
| fkie_cve-2022-43559 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.560 | 2026-01-22T10:16:04.560 |
| fkie_cve-2022-43558 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.483 | 2026-01-22T10:16:04.483 |
| fkie_cve-2022-34214 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.403 | 2026-01-22T10:16:04.403 |
| fkie_cve-2022-32150 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.337 | 2026-01-22T10:16:04.337 |
| fkie_cve-2022-24911 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.263 | 2026-01-22T10:16:04.263 |
| fkie_cve-2022-24380 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.200 | 2026-01-22T10:16:04.200 |
| fkie_cve-2022-22147 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.130 | 2026-01-22T10:16:04.130 |
| fkie_cve-2022-21130 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:04.057 | 2026-01-22T10:16:04.057 |
| fkie_cve-2021-3926 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:03.980 | 2026-01-22T10:16:03.980 |
| fkie_cve-2020-8460 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:03.910 | 2026-01-22T10:16:03.910 |
| fkie_cve-2020-8459 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:03.840 | 2026-01-22T10:16:03.840 |
| fkie_cve-2020-8458 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:03.780 | 2026-01-22T10:16:03.780 |
| fkie_cve-2020-8457 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:03.703 | 2026-01-22T10:16:03.703 |
| fkie_cve-2020-8456 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:03.633 | 2026-01-22T10:16:03.633 |
| fkie_cve-2020-8455 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:03.570 | 2026-01-22T10:16:03.570 |
| fkie_cve-2020-8454 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:03.500 | 2026-01-22T10:16:03.500 |
| fkie_cve-2020-8453 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:03.433 | 2026-01-22T10:16:03.433 |
| fkie_cve-2020-8452 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. The CVE was never used. | 2026-01-22T10:16:02.930 | 2026-01-22T10:16:02.930 |
| fkie_cve-2020-8451 | Rejected reason: The reserved CVE was never used. | 2026-01-22T08:16:00.447 | 2026-01-22T08:16:00.447 |
| fkie_cve-2025-7425 | A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corru… | 2025-07-10T14:15:27.877 | 2026-01-22T05:16:19.960 |
| fkie_cve-2025-6020 | A flaw was found in linux-pam. The module pam_namespace may use access user-controlled paths withou… | 2025-06-17T13:15:21.660 | 2026-01-22T05:16:17.213 |
| fkie_cve-2025-49796 | A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file … | 2025-06-16T16:15:19.370 | 2026-01-22T05:16:11.380 |
| fkie_cve-2025-49794 | A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements … | 2025-06-16T16:15:18.997 | 2026-01-22T05:16:11.147 |
| fkie_cve-2025-13439 | The Fancy Product Designer plugin for WordPress is vulnerable to Information Disclosure and PHAR De… | 2025-12-16T08:15:51.753 | 2026-01-22T02:15:50.087 |
| fkie_cve-2023-53894 | phpfm 1.7.9 contains an authentication bypass vulnerability that allows attackers to log in by expl… | 2025-12-16T17:16:01.550 | 2026-01-21T22:26:08.933 |
| fkie_cve-2021-47780 | Macro Expert 4.7 contains an unquoted service path vulnerability that allows local users to potenti… | 2026-01-16T00:16:21.130 | 2026-01-21T22:24:18.603 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-c3vr-f75j-w78g |
6.5 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-10-17T15:31:02Z | 2026-01-20T15:31:21Z |
| ghsa-9f6g-j2jq-6w3f |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ppp: fix memory leak in pad_co… | 2025-09-22T21:30:17Z | 2026-01-20T15:31:21Z |
| ghsa-7jhx-j65p-qc96 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: pcmcia: Fix a NULL pointer der… | 2025-09-22T21:30:17Z | 2026-01-20T15:31:21Z |
| ghsa-7fp7-xjmp-444h |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: i40e: Fix potential invalid ac… | 2025-09-22T21:30:18Z | 2026-01-20T15:31:21Z |
| ghsa-3r4w-f43v-9fpg |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: x86/mm/64: define ARCH_PAGE_TA… | 2025-09-22T21:30:17Z | 2026-01-20T15:31:21Z |
| ghsa-2j47-jhvw-fgmm |
7.1 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: batman-adv: fix OOB read/write… | 2025-09-22T21:30:17Z | 2026-01-20T15:31:21Z |
| ghsa-24c6-4vcc-gq5v |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ocfs2: prevent release journal… | 2025-09-22T21:30:17Z | 2026-01-20T15:31:21Z |
| ghsa-cwh4-qcmj-2594 |
7.5 (3.1)
4.8 (4.0)
|
HP Universal Print Driver is potentially vulnerable to denial of service due to buffer overflow in … | 2025-07-02T21:32:00Z | 2026-01-20T15:31:20Z |
| ghsa-8fqh-pm2q-8h5v |
7.8 (3.1)
5.8 (4.0)
|
A potential security vulnerability has been identified in the HP Support Assistant, which allows a … | 2025-07-08T18:31:43Z | 2026-01-20T15:31:20Z |
| ghsa-q748-mcwg-xmqv |
5.3 (4.0)
|
OpenStack Image Service (Glance) allows remote authenticated users to bypass access restrictions | 2022-05-17T04:04:02Z | 2026-01-20T13:05:45Z |
| ghsa-jm76-5g2j-p4hp |
9.8 (3.1)
|
The Advanced Custom Fields: Extended plugin for WordPress is vulnerable to Privilege Escalation in … | 2026-01-20T12:31:17Z | 2026-01-20T12:31:17Z |
| ghsa-hmmg-cjmw-gj6g |
5.1 (4.0)
|
HTML Injection vulnerability in Isshue by Bdtask, consisting os an HTML injection due to a lack … | 2026-01-20T12:31:17Z | 2026-01-20T12:31:17Z |
| ghsa-ffgq-vm8w-4m65 |
5.1 (4.0)
|
Stored Cross-Site Scripting (XSS) vulnerability in Sesame web application, due to the fact that upl… | 2026-01-20T12:31:17Z | 2026-01-20T12:31:17Z |
| ghsa-5pph-737h-487p |
5.1 (4.0)
|
Reflected Cross-Site Scripting (XSS) vulnerability in Riftzilla's QRGen. This vulnerability allows … | 2026-01-20T12:31:17Z | 2026-01-20T12:31:17Z |
| ghsa-wm49-2vmh-chv3 |
9.8 (3.1)
9.3 (4.0)
|
PrismX MX100 AP controller developed by BROWAN COMMUNICATIONS has a Use of Hard-coded Credentials … | 2026-01-20T09:30:20Z | 2026-01-20T09:30:20Z |
| ghsa-w9fp-wg9v-cr6h |
4.9 (3.1)
6.9 (4.0)
|
PrismX MX100 AP controller developed by BROWAN COMMUNICATIONS has an Insufficiently Protected Crede… | 2026-01-20T09:30:20Z | 2026-01-20T09:30:20Z |
| ghsa-jv72-wxjv-h5q2 |
6.1 (3.1)
|
URL parameters are directly embedded into JavaScript code or HTML attributes without proper encodin… | 2026-01-20T09:30:20Z | 2026-01-20T09:30:20Z |
| ghsa-hrmx-9vmm-xj23 |
5.5 (3.1)
|
On an instance of TwinCAT 3 HMI Server running on a device an authenticated administrator can injec… | 2026-01-20T09:30:20Z | 2026-01-20T09:30:20Z |
| ghsa-fjj6-9j9h-gwcp |
7.2 (3.1)
8.6 (4.0)
|
PrismX MX100 AP controller developed by BROWAN COMMUNICATIONS has an Arbitrary File Upload vulnerab… | 2026-01-20T09:30:20Z | 2026-01-20T09:30:20Z |
| ghsa-f49w-r2gf-jprx |
4.4 (3.1)
|
The Viet contact plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settin… | 2026-01-20T06:30:26Z | 2026-01-20T06:30:27Z |
| ghsa-4hcf-mq88-ff2w |
4.4 (3.1)
|
The WP Hello Bar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'digit_o… | 2026-01-20T06:30:26Z | 2026-01-20T06:30:27Z |
| ghsa-2gpj-j2rf-2376 |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was detected in Bjskzy Zhiyou ERP up to 11.0. Impacted is the function initRCForm o… | 2026-01-20T06:30:27Z | 2026-01-20T06:30:27Z |
| ghsa-w3mw-5fhx-xjwj |
|
Rejected reason: Not used | 2026-01-20T06:30:26Z | 2026-01-20T06:30:26Z |
| ghsa-r7w6-x8x9-6vv4 |
|
Rejected reason: Not used | 2026-01-20T06:30:26Z | 2026-01-20T06:30:26Z |
| ghsa-qwqp-43xx-xx7m |
|
Rejected reason: Not used | 2026-01-20T06:30:26Z | 2026-01-20T06:30:26Z |
| ghsa-p97c-vpmj-ch6j |
|
Rejected reason: Not used | 2026-01-20T06:30:26Z | 2026-01-20T06:30:26Z |
| ghsa-p6c7-27wx-qc74 |
|
Rejected reason: Not used | 2026-01-20T06:30:26Z | 2026-01-20T06:30:26Z |
| ghsa-p2wf-vpf4-vwf9 |
|
Rejected reason: Not used | 2026-01-20T06:30:26Z | 2026-01-20T06:30:26Z |
| ghsa-g47g-rq9g-qhgm |
|
Rejected reason: Not used | 2026-01-20T06:30:26Z | 2026-01-20T06:30:26Z |
| ghsa-6h3q-wcw2-gjg9 |
|
Rejected reason: Not used | 2026-01-20T06:30:26Z | 2026-01-20T06:30:26Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-29013 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.450570Z |
| gsd-2024-29498 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.450285Z |
| gsd-2024-29239 | Improper neutralization of special elements used in an SQL command ('SQL Injection') vuln… | 2024-04-02T05:02:57.449830Z |
| gsd-2024-29202 | JumpServer is an open source bastion host and an operation and maintenance security audit… | 2024-04-02T05:02:57.449040Z |
| gsd-2024-29814 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-02T05:02:57.448522Z |
| gsd-2024-29809 | The image_url parameter of the AJAX call to the editimage_bwg action of admin-ajax.php is… | 2024-04-02T05:02:57.447884Z |
| gsd-2024-29292 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.447331Z |
| gsd-2024-29710 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.447057Z |
| gsd-2024-29179 | phpMyFAQ is an open source FAQ web application for PHP 8.1+ and MySQL, PostgreSQL and oth… | 2024-04-02T05:02:57.446553Z |
| gsd-2024-29580 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.446099Z |
| gsd-2024-29219 | Out-of-bounds read vulnerability exists in KV STUDIO Ver.11.64 and earlier and KV REPLAY … | 2024-04-02T05:02:57.445834Z |
| gsd-2024-29700 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.445568Z |
| gsd-2024-29628 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.445305Z |
| gsd-2024-29236 | Improper neutralization of special elements used in an SQL command ('SQL Injection') vuln… | 2024-04-02T05:02:57.444785Z |
| gsd-2024-29205 | An Improper Check for Unusual or Exceptional Conditions vulnerability in the web componen… | 2024-04-02T05:02:57.444251Z |
| gsd-2024-29770 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-02T05:02:57.443798Z |
| gsd-2024-29445 | An issue was discovered in ROS2 (Robot Operating System 2) Humble Hawksbill in ROS_VERSIO… | 2024-04-02T05:02:57.443436Z |
| gsd-2024-29311 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.443179Z |
| gsd-2024-29020 | JumpServer is an open source bastion host and an operation and maintenance security audit… | 2024-04-02T05:02:57.442719Z |
| gsd-2024-29767 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-04-02T05:02:57.442173Z |
| gsd-2024-29149 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.441822Z |
| gsd-2024-29731 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.441573Z |
| gsd-2024-29294 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.441320Z |
| gsd-2024-29591 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.441006Z |
| gsd-2024-29609 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.440739Z |
| gsd-2024-29463 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.440483Z |
| gsd-2024-29523 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.440222Z |
| gsd-2024-29070 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.439973Z |
| gsd-2024-29785 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.439710Z |
| gsd-2024-29570 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-02T05:02:57.439451Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-189209 | Malicious code in resonance-phylogenetics-config-aquarius (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189208 | Malicious code in resonance-middleware-octans-graviton (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189207 | Malicious code in resonance-frontend-gatsby-accretion (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189206 | Malicious code in resonance-centaurus-luna-interstellarmedium (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189205 | Malicious code in resolvers-typeorm-dependencies-development (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189204 | Malicious code in resolvers-superflare-chalk-ini (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189203 | Malicious code in resolvers-solis-native-rest (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189202 | Malicious code in resolvers-semantic-ui-cosmochemistry-andromeda (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189201 | Malicious code in resolvers-query-comet-radiant (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189200 | Malicious code in resolvers-kinetic-eventhoriz-webpack (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189199 | Malicious code in resolvers-heliophysics-apollo-cli (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189198 | Malicious code in resolvers-gemini-abiogenesis-quantum (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189197 | Malicious code in resolvers-foundation-library-kastra (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189196 | Malicious code in resolvers-forever-mongoose-multiverse (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189195 | Malicious code in resolvers-chakra-ui-bootstrap-ursa (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189194 | Malicious code in resolvers-auth0-version-charon (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189193 | Malicious code in resolvers-auth-materialize-ionosphere (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189192 | Malicious code in resolve-code-sun-sanitize-fast (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189191 | Malicious code in request-slidev-jest-repository (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189190 | Malicious code in request-planetology-lynx-taphonomy (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189189 | Malicious code in request-gemini-prettier-plugin-markdown-hercules (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189188 | Malicious code in repository-reveal-md-multiverse-quasar (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189187 | Malicious code in repository-repository-nconf-barnard (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189186 | Malicious code in repository-heka-nestjs-mesosphere (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189185 | Malicious code in report-water-view-cluster-socket (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189184 | Malicious code in report-thread-benchmark-good-fork (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189183 | Malicious code in report-serialize-rho-public-file (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189182 | Malicious code in report-new-runtime-sun-user (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189181 | Malicious code in report-good-error-user-parse (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-189180 | Malicious code in report-epsilon-socket-beta-sudo (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-1364 | Adobe Creative Cloud Produkte: Mehrere Schwachstellen | 2024-06-11T22:00:00.000+00:00 | 2024-06-11T22:00:00.000+00:00 |
| wid-sec-w-2024-1358 | Fortinet FortiOS: Mehrere Schwachstellen ermöglichen Codeausführung | 2024-06-11T22:00:00.000+00:00 | 2024-06-11T22:00:00.000+00:00 |
| wid-sec-w-2024-1357 | Fortinet FortiOS und FortiProxy: Mehrere Schwachstellen | 2024-06-11T22:00:00.000+00:00 | 2024-06-11T22:00:00.000+00:00 |
| wid-sec-w-2024-1356 | Fortinet Produkte: Schwachstelle ermöglicht Codeausführung | 2024-06-11T22:00:00.000+00:00 | 2024-06-11T22:00:00.000+00:00 |
| wid-sec-w-2024-1355 | Adobe ColdFusion: Mehrere Schwachstellen | 2024-06-11T22:00:00.000+00:00 | 2024-06-11T22:00:00.000+00:00 |
| wid-sec-w-2024-1354 | Adobe Acrobat Android: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2024-06-11T22:00:00.000+00:00 | 2024-06-11T22:00:00.000+00:00 |
| wid-sec-w-2024-1352 | Adobe FrameMaker: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2024-06-11T22:00:00.000+00:00 | 2024-06-11T22:00:00.000+00:00 |
| wid-sec-w-2024-1349 | Rockwell Automation ControlLogix: Schwachstelle ermöglicht Denial of Service | 2024-06-11T22:00:00.000+00:00 | 2024-06-11T22:00:00.000+00:00 |
| wid-sec-w-2024-1348 | Samsung Exynos: Mehrere Schwachstellen ermöglichen Codeausführung | 2024-06-11T22:00:00.000+00:00 | 2024-06-11T22:00:00.000+00:00 |
| wid-sec-w-2024-1345 | Dell BIOS: Mehrere Schwachstellen | 2024-06-11T22:00:00.000+00:00 | 2024-06-11T22:00:00.000+00:00 |
| wid-sec-w-2024-1344 | Citrix Systems Hypervisor: Schwachstelle ermöglicht Denial of Service | 2024-06-11T22:00:00.000+00:00 | 2024-06-11T22:00:00.000+00:00 |
| wid-sec-w-2024-1343 | AMD Prozessoren: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-06-11T22:00:00.000+00:00 | 2024-06-11T22:00:00.000+00:00 |
| wid-sec-w-2024-1342 | Adobe Photoshop: Schwachstelle ermöglicht Codeausführung | 2024-06-11T22:00:00.000+00:00 | 2024-06-11T22:00:00.000+00:00 |
| wid-sec-w-2024-1341 | Microsoft Dynamics 365: Mehrere Schwachstellen | 2024-06-11T22:00:00.000+00:00 | 2024-06-11T22:00:00.000+00:00 |
| wid-sec-w-2024-1340 | Microsoft Office: Mehrere Schwachstellen | 2024-06-11T22:00:00.000+00:00 | 2024-06-11T22:00:00.000+00:00 |
| wid-sec-w-2024-1338 | Microsoft Visual Studio: Mehrere Schwachstellen | 2024-06-11T22:00:00.000+00:00 | 2024-06-11T22:00:00.000+00:00 |
| wid-sec-w-2024-1331 | VLC: Schwachstelle ermöglicht Denial of Service | 2024-06-10T22:00:00.000+00:00 | 2024-06-11T22:00:00.000+00:00 |
| wid-sec-w-2024-1305 | Red Hat Enterprise Linux (cockpit): Schwachstelle ermöglicht Privilegieneskalation | 2024-06-05T22:00:00.000+00:00 | 2024-06-11T22:00:00.000+00:00 |
| wid-sec-w-2023-0543 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation und Denial of Service | 2023-03-01T23:00:00.000+00:00 | 2024-06-11T22:00:00.000+00:00 |
| wid-sec-w-2023-0481 | Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2023-02-26T23:00:00.000+00:00 | 2024-06-11T22:00:00.000+00:00 |
| wid-sec-w-2024-1336 | Zoom Video Communications Rooms: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-06-10T22:00:00.000+00:00 | 2024-06-10T22:00:00.000+00:00 |
| wid-sec-w-2024-1335 | JetBrains Produkte: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-06-10T22:00:00.000+00:00 | 2024-06-10T22:00:00.000+00:00 |
| wid-sec-w-2024-1334 | Siemens SIMATIC S7: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen | 2024-06-10T22:00:00.000+00:00 | 2024-06-10T22:00:00.000+00:00 |
| wid-sec-w-2024-1333 | Siemens JT2Go: Mehrere Schwachstellen ermöglichen Codeausführung und Denial of Service | 2024-06-10T22:00:00.000+00:00 | 2024-06-10T22:00:00.000+00:00 |
| wid-sec-w-2024-1332 | Dell OpenManage Server Administrator: Schwachstelle ermöglicht Erlangen von Administratorrechten | 2024-06-10T22:00:00.000+00:00 | 2024-06-10T22:00:00.000+00:00 |
| wid-sec-w-2024-1330 | HP BIOS: Schwachstelle ermöglicht Privilegieneskalation und beliebige Codeausführung | 2024-06-10T22:00:00.000+00:00 | 2024-06-10T22:00:00.000+00:00 |
| wid-sec-w-2024-1327 | SAP Software: Mehrere Schwachstellen | 2024-06-10T22:00:00.000+00:00 | 2024-06-10T22:00:00.000+00:00 |
| wid-sec-w-2024-1111 | Siemens SICAM: Mehrere Schwachstellen | 2024-05-13T22:00:00.000+00:00 | 2024-06-10T22:00:00.000+00:00 |
| wid-sec-w-2024-1080 | Google Chrome: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2024-05-09T22:00:00.000+00:00 | 2024-06-10T22:00:00.000+00:00 |
| wid-sec-w-2024-0698 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2021-05-26T22:00:00.000+00:00 | 2024-06-10T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2024:5927 | Red Hat Security Advisory: postgresql:16 security update | 2024-08-28T12:11:42+00:00 | 2026-01-13T22:43:43+00:00 |
| rhsa-2025:12772 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Product Security and Bug Fix Update | 2025-08-04T18:02:56+00:00 | 2026-01-13T22:42:05+00:00 |
| rhsa-2024:4474 | Red Hat Security Advisory: OpenShift Container Platform 4.15.22 security update | 2024-07-18T17:50:11+00:00 | 2026-01-13T22:41:58+00:00 |
| rhsa-2024:4389 | Red Hat Security Advisory: openssh security update | 2024-07-08T21:14:10+00:00 | 2026-01-13T22:41:58+00:00 |
| rhsa-2024:4340 | Red Hat Security Advisory: openssh security update | 2024-07-05T21:39:01+00:00 | 2026-01-13T22:41:57+00:00 |
| rhsa-2024:4312 | Red Hat Security Advisory: openssh security update | 2024-07-03T14:42:20+00:00 | 2026-01-13T22:41:57+00:00 |
| rhsa-2026:0483 | Red Hat Security Advisory: wireshark security update | 2026-01-12T21:46:44+00:00 | 2026-01-13T22:41:55+00:00 |
| rhsa-2026:0472 | Red Hat Security Advisory: git-lfs security update | 2026-01-12T18:02:35+00:00 | 2026-01-13T22:41:51+00:00 |
| rhsa-2026:0465 | Red Hat Security Advisory: git-lfs security update | 2026-01-12T15:07:30+00:00 | 2026-01-13T22:41:49+00:00 |
| rhsa-2026:0460 | Red Hat Security Advisory: git-lfs security update | 2026-01-12T13:07:00+00:00 | 2026-01-13T22:41:49+00:00 |
| rhsa-2026:0459 | Red Hat Security Advisory: git-lfs security update | 2026-01-12T13:15:55+00:00 | 2026-01-13T22:41:48+00:00 |
| rhsa-2026:0454 | Red Hat Security Advisory: wireshark security update | 2026-01-12T10:50:54+00:00 | 2026-01-13T22:41:47+00:00 |
| rhsa-2026:0452 | Red Hat Security Advisory: wireshark security update | 2026-01-12T09:13:04+00:00 | 2026-01-13T22:41:47+00:00 |
| rhsa-2026:0433 | Red Hat Security Advisory: wireshark security update | 2026-01-12T02:00:34+00:00 | 2026-01-13T22:41:44+00:00 |
| rhsa-2026:0432 | Red Hat Security Advisory: wireshark security update | 2026-01-12T03:46:43+00:00 | 2026-01-13T22:41:44+00:00 |
| rhsa-2026:0429 | Red Hat Security Advisory: keylime security update | 2026-01-12T02:05:04+00:00 | 2026-01-13T22:41:43+00:00 |
| rhsa-2026:0361 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Product Security Update | 2026-01-08T14:13:04+00:00 | 2026-01-13T22:41:39+00:00 |
| rhsa-2026:0360 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Product Security Update | 2026-01-08T14:12:09+00:00 | 2026-01-13T22:41:38+00:00 |
| rhsa-2026:0356 | Red Hat Security Advisory: gimp:2.8 security update | 2026-01-08T14:27:05+00:00 | 2026-01-13T22:41:38+00:00 |
| rhsa-2020:4035 | Red Hat Security Advisory: webkitgtk4 security, bug fix, and enhancement update | 2020-09-29T20:16:43+00:00 | 2026-01-13T22:41:13+00:00 |
| rhsa-2007:1017 | Red Hat Security Advisory: samba security update | 2007-11-15T16:29:00+00:00 | 2026-01-13T22:41:12+00:00 |
| rhsa-2019:2285 | Red Hat Security Advisory: keepalived security and bug fix update | 2019-08-06T13:29:06+00:00 | 2026-01-13T22:41:05+00:00 |
| rhsa-2019:3239 | Red Hat Security Advisory: OpenShift Container Platform 3.10 atomic-openshift security update | 2019-10-29T16:22:25+00:00 | 2026-01-13T22:41:04+00:00 |
| rhsa-2019:0472 | Red Hat Security Advisory: java-1.8.0-ibm security update | 2019-03-08T21:21:46+00:00 | 2026-01-13T22:41:04+00:00 |
| rhsa-2019:0001 | Red Hat Security Advisory: rh-perl526-perl security and enhancement update | 2019-01-02T13:30:26+00:00 | 2026-01-13T22:41:03+00:00 |
| rhsa-2007:0542 | Red Hat Security Advisory: mcstrans security and bug fix update | 2007-11-07T09:00:00+00:00 | 2026-01-13T22:41:03+00:00 |
| rhsa-2020:1454 | Red Hat Security Advisory: Satellite 6.7 release. | 2020-04-14T13:24:29+00:00 | 2026-01-13T22:41:00+00:00 |
| rhsa-2019:0474 | Red Hat Security Advisory: java-1.7.1-ibm security update | 2019-03-07T15:59:34+00:00 | 2026-01-13T22:41:00+00:00 |
| rhsa-2007:0845 | Red Hat Security Advisory: libvorbis security update | 2007-09-19T17:26:00+00:00 | 2026-01-13T22:41:00+00:00 |
| rhsa-2020:4464 | Red Hat Security Advisory: libxslt security update | 2020-11-04T01:47:26+00:00 | 2026-01-13T22:40:41+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2024-44935 | sctp: Fix null-ptr-deref in reuseport_add_sock(). | 2024-08-02T00:00:00.000Z | 2024-10-12T00:00:00.000Z |
| msrc_cve-2024-44934 | net: bridge: mcast: wait for previous gc cycles when removing port | 2024-08-02T00:00:00.000Z | 2024-10-12T00:00:00.000Z |
| msrc_cve-2024-43914 | md/raid5: avoid BUG_ON() while continue reshape after reassembling | 2024-08-02T00:00:00.000Z | 2024-10-12T00:00:00.000Z |
| msrc_cve-2024-43909 | drm/amdgpu/pm: Fix the null pointer dereference for smu7 | 2024-08-02T00:00:00.000Z | 2024-10-12T00:00:00.000Z |
| msrc_cve-2024-43908 | drm/amdgpu: Fix the null pointer dereference to ras_manager | 2024-08-02T00:00:00.000Z | 2024-10-12T00:00:00.000Z |
| msrc_cve-2024-43907 | drm/amdgpu/pm: Fix the null pointer dereference in apply_state_adjust_rules | 2024-08-02T00:00:00.000Z | 2024-10-12T00:00:00.000Z |
| msrc_cve-2024-43902 | drm/amd/display: Add null checker before passing variables | 2024-08-02T00:00:00.000Z | 2024-10-12T00:00:00.000Z |
| msrc_cve-2024-43894 | drm/client: fix null pointer dereference in drm_client_modeset_probe | 2024-08-02T00:00:00.000Z | 2024-10-12T00:00:00.000Z |
| msrc_cve-2024-43893 | serial: core: check uartclk for zero to avoid divide by zero | 2024-08-02T00:00:00.000Z | 2024-10-12T00:00:00.000Z |
| msrc_cve-2024-43890 | tracing: Fix overflow in get_free_elt() | 2024-08-02T00:00:00.000Z | 2024-10-12T00:00:00.000Z |
| msrc_cve-2024-43889 | padata: Fix possible divide-by-0 panic in padata_mt_helper() | 2024-08-02T00:00:00.000Z | 2024-10-12T00:00:00.000Z |
| msrc_cve-2024-43882 | exec: Fix ToCToU between perm check and set-uid/gid usage | 2024-08-02T00:00:00.000Z | 2024-10-12T00:00:00.000Z |
| msrc_cve-2024-43873 | vhost/vsock: always initialize seqpacket_allow | 2024-08-02T00:00:00.000Z | 2024-10-12T00:00:00.000Z |
| msrc_cve-2024-43871 | devres: Fix memory leakage caused by driver API devm_free_percpu() | 2024-08-02T00:00:00.000Z | 2024-10-12T00:00:00.000Z |
| msrc_cve-2024-43863 | drm/vmwgfx: Fix a deadlock in dma buf fence polling | 2024-08-02T00:00:00.000Z | 2024-10-12T00:00:00.000Z |
| msrc_cve-2024-43861 | net: usb: qmi_wwan: fix memory leak for not ip packets | 2024-08-02T00:00:00.000Z | 2024-10-12T00:00:00.000Z |
| msrc_cve-2024-43860 | remoteproc: imx_rproc: Skip over memory region when node value is NULL | 2024-08-02T00:00:00.000Z | 2024-10-12T00:00:00.000Z |
| msrc_cve-2024-43858 | jfs: Fix array-index-out-of-bounds in diFree | 2024-08-02T00:00:00.000Z | 2024-10-12T00:00:00.000Z |
| msrc_cve-2024-43856 | dma: fix call order in dmam_free_coherent | 2024-08-02T00:00:00.000Z | 2024-10-12T00:00:00.000Z |
| msrc_cve-2024-43855 | md: fix deadlock between mddev_suspend and flush bio | 2024-08-02T00:00:00.000Z | 2024-10-12T00:00:00.000Z |
| msrc_cve-2024-43854 | block: initialize integrity buffer to zero before writing it to media | 2024-08-02T00:00:00.000Z | 2024-10-12T00:00:00.000Z |
| msrc_cve-2024-43828 | ext4: fix infinite loop when replaying fast_commit | 2024-08-02T00:00:00.000Z | 2024-10-12T00:00:00.000Z |
| msrc_cve-2024-43817 | net: missing check virtio | 2024-08-02T00:00:00.000Z | 2024-10-12T00:00:00.000Z |
| msrc_cve-2024-42353 | WebOb's location header normalization during redirect leads to open redirect | 2024-08-02T00:00:00.000Z | 2024-10-12T00:00:00.000Z |
| msrc_cve-2024-42313 | media: venus: fix use after free in vdec_close | 2024-08-02T00:00:00.000Z | 2024-10-12T00:00:00.000Z |
| msrc_cve-2024-42311 | hfs: fix to initialize fields of hfs_inode_info after hfs_alloc_inode() | 2024-08-02T00:00:00.000Z | 2024-10-12T00:00:00.000Z |
| msrc_cve-2024-42310 | drm/gma500: fix null pointer dereference in cdv_intel_lvds_get_modes | 2024-08-02T00:00:00.000Z | 2024-10-12T00:00:00.000Z |
| msrc_cve-2024-42309 | drm/gma500: fix null pointer dereference in psb_intel_lvds_get_modes | 2024-08-02T00:00:00.000Z | 2024-10-12T00:00:00.000Z |
| msrc_cve-2024-42308 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2024-08-02T00:00:00.000Z | 2024-10-12T00:00:00.000Z |
| msrc_cve-2024-42302 | PCI/DPC: Fix use-after-free on concurrent DPC and hot-removal | 2024-08-02T00:00:00.000Z | 2024-10-12T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202212-1308 | This issue was addressed by removing the vulnerable code. This issue is fixed in iOS 16.2… | 2025-04-21T23:37:38.917000Z |
| var-201703-0032 | Buffer overflow in Broadcom ACSD allows remote attackers to execute arbitrary code via a … | 2025-04-21T23:37:22.585000Z |
| var-201703-0263 | A read-only administrator on Fortinet devices with FortiOS 5.2.x before 5.2.10 GA and 5.4… | 2025-04-21T23:37:22.504000Z |
| var-202212-1442 | An out-of-bounds write issue was addressed with improved input validation. This issue is … | 2025-04-21T23:35:59.640000Z |
| var-202212-1685 | An out-of-bounds write issue was addressed with improved input validation. This issue is … | 2025-04-21T23:35:34.996000Z |
| var-202212-1249 | An out-of-bounds access issue was addressed with improved bounds checking. This issue is … | 2025-04-21T23:34:38.131000Z |
| var-201704-0078 | Synology Photo Station before 6.3-2958 allows local users to gain privileges by leveragin… | 2025-04-21T23:34:04.467000Z |
| var-201704-0141 | Sierra Wireless GX 440 devices with ALEOS firmware 4.3.2 store passwords in cleartext. Si… | 2025-04-21T23:34:04.430000Z |
| var-202212-1425 | TOTOlink A7100RU V7.4cu.2313_B20191024 was discovered to contain a command injection vuln… | 2025-04-21T23:31:16.951000Z |
| var-202212-1488 | An out-of-bounds write issue was addressed with improved input validation. This issue is … | 2025-04-21T23:31:16.923000Z |
| var-201701-0721 | A vulnerability in Cisco WebEx Meetings Server could allow an authenticated, remote attac… | 2025-04-21T23:29:56.482000Z |
| var-201703-0893 | A vulnerability in the DHCP client implementation of Cisco IOS (12.2, 12.4, and 15.0 thro… | 2025-04-21T23:29:56.168000Z |
| var-202212-1496 | TOTOlink A7100RU V7.4cu.2313_B20191024 was discovered to contain a command injection vuln… | 2025-04-21T23:23:32.130000Z |
| var-202212-1531 | A logic issue was addressed with improved state management. This issue is fixed in tvOS 1… | 2025-04-21T23:14:02.284000Z |
| var-202212-1533 | A memory corruption issue was addressed with improved input validation. This issue is fix… | 2025-04-21T23:10:29.706000Z |
| var-202212-1440 | The issue was addressed with improved memory handling. This issue is fixed in iOS 16.2 an… | 2025-04-21T22:59:35.309000Z |
| var-202212-1246 | An out-of-bounds write issue was addressed with improved input validation. This issue is … | 2025-04-21T22:56:41.990000Z |
| var-202212-1557 | The issue was addressed with improved memory handling. This issue is fixed in macOS Monte… | 2025-04-21T22:38:24.501000Z |
| var-202212-1441 | The issue was addressed with improved handling of caches. This issue is fixed in iOS 16.2… | 2025-04-21T22:27:46.967000Z |
| var-202212-1387 | The issue was addressed with improved bounds checks. This issue is fixed in iOS 16.2 and … | 2025-04-21T22:27:36.028000Z |
| var-202212-1412 | A memory corruption issue was addressed with improved state management. This issue is fix… | 2025-04-21T22:26:29.461000Z |
| var-202212-1248 | The issue was addressed with improved memory handling. This issue is fixed in iOS 16.2 an… | 2025-04-21T22:19:14.740000Z |
| var-202212-1297 | The issue was addressed with improved memory handling. This issue is fixed in iOS 16.2 an… | 2025-04-21T22:16:52.497000Z |
| var-202212-1411 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2025-04-21T22:05:22.790000Z |
| var-202212-1358 | The issue was addressed with improved memory handling. This issue is fixed in macOS Monte… | 2025-04-21T21:54:36.109000Z |
| var-202212-1331 | This issue was addressed with improved checks. This issue is fixed in iOS 16.2 and iPadOS… | 2025-04-21T21:52:12.142000Z |
| var-202212-1410 | Multiple issues were addressed by removing the vulnerable code. This issue is fixed in iO… | 2025-04-21T21:46:27.020000Z |
| var-202212-1466 | A logic issue was addressed with improved checks. This issue is fixed in Safari 16.2, tvO… | 2025-04-21T21:35:20.743000Z |
| var-202212-1216 | The issue was addressed with improved memory handling. This issue is fixed in tvOS 16.2, … | 2025-04-21T21:14:08.270000Z |
| var-202212-1560 | A race condition was addressed with additional validation. This issue is fixed in tvOS 16… | 2025-04-21T21:04:10.128000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2023:4068-1 | Security update for go1.20 | 2023-10-13T08:07:54Z | 2023-10-13T08:07:54Z |
| suse-ru-2023:4066-1 | Recommended update for libssh2_org | 2023-10-12T12:32:58Z | 2023-10-12T12:32:58Z |
| suse-su-2023:4065-1 | Security update for opensc | 2023-10-12T11:26:06Z | 2023-10-12T11:26:06Z |
| suse-su-2023:4064-1 | Security update for python-urllib3 | 2023-10-12T10:04:59Z | 2023-10-12T10:04:59Z |
| suse-ru-2023:4063-1 | Recommended update for glibc | 2023-10-12T08:41:57Z | 2023-10-12T08:41:57Z |
| suse-su-2023:4060-1 | Security update for rage-encryption | 2023-10-12T08:05:57Z | 2023-10-12T08:05:57Z |
| suse-su-2023:4059-1 | Security update for samba | 2023-10-12T08:03:22Z | 2023-10-12T08:03:22Z |
| suse-su-2023:4058-1 | Security update for the Linux Kernel | 2023-10-12T08:00:01Z | 2023-10-12T08:00:01Z |
| suse-su-2023:4057-1 | Security update for the Linux Kernel | 2023-10-12T07:59:03Z | 2023-10-12T07:59:03Z |
| suse-su-2023:4056-1 | Security update for qemu | 2023-10-12T07:55:01Z | 2023-10-12T07:55:01Z |
| suse-su-2023:4055-1 | Security update for xen | 2023-10-12T07:51:07Z | 2023-10-12T07:51:07Z |
| suse-su-2023:4054-1 | Security update for xen | 2023-10-12T07:49:44Z | 2023-10-12T07:49:44Z |
| suse-su-2023:4051-1 | Security update for gsl | 2023-10-11T12:11:05Z | 2023-10-11T12:11:05Z |
| suse-su-2023:4050-1 | Security update for ImageMagick | 2023-10-11T12:08:01Z | 2023-10-11T12:08:01Z |
| suse-su-2023:4049-1 | Security update for ImageMagick | 2023-10-11T12:05:44Z | 2023-10-11T12:05:44Z |
| suse-su-2023:4048-1 | Security update for python-reportlab | 2023-10-11T09:28:40Z | 2023-10-11T09:28:40Z |
| suse-su-2023:4047-1 | Security update for glibc | 2023-10-11T08:42:59Z | 2023-10-11T08:42:59Z |
| suse-su-2023:4046-1 | Security update for samba | 2023-10-11T07:26:18Z | 2023-10-11T07:26:18Z |
| suse-su-2023:4045-1 | Security update for curl | 2023-10-11T07:11:27Z | 2023-10-11T07:11:27Z |
| suse-su-2023:4044-1 | Security update for curl | 2023-10-11T07:06:10Z | 2023-10-11T07:06:10Z |
| suse-su-2023:4043-1 | Security update for curl | 2023-10-11T07:00:32Z | 2023-10-11T07:00:32Z |
| suse-su-2023:4042-1 | Security update for conmon | 2023-10-10T17:11:20Z | 2023-10-10T17:11:20Z |
| suse-su-2023:4041-1 | Security update for php-composer2 | 2023-10-10T16:29:13Z | 2023-10-10T16:29:13Z |
| suse-su-2023:4040-1 | Security update for samba | 2023-10-10T15:08:10Z | 2023-10-10T15:08:10Z |
| suse-su-2023:4035-1 | Security update for the Linux Kernel | 2023-10-10T14:42:43Z | 2023-10-10T14:42:43Z |
| suse-su-2023:4033-1 | Security update for the Linux Kernel | 2023-10-10T12:21:11Z | 2023-10-10T12:21:11Z |
| suse-su-2023:4032-1 | Security update for the Linux Kernel | 2023-10-10T12:20:18Z | 2023-10-10T12:20:18Z |
| suse-su-2023:4031-1 | Security update for the Linux Kernel | 2023-10-10T12:19:00Z | 2023-10-10T12:19:00Z |
| suse-su-2023:4030-1 | Security update for the Linux Kernel | 2023-10-10T12:14:23Z | 2023-10-10T12:14:23Z |
| suse-su-2023:4028-1 | Security update for the Linux Kernel | 2023-10-10T12:06:24Z | 2023-10-10T12:06:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2023:0234-1 | Security update for chromium | 2023-08-21T09:53:00Z | 2023-08-21T09:53:00Z |
| opensuse-su-2023:0233-1 | Security update for python-mitmproxy | 2023-08-20T10:01:58Z | 2023-08-20T10:01:58Z |
| opensuse-su-2023:0232-1 | Security update for python-mitmproxy | 2023-08-20T10:01:55Z | 2023-08-20T10:01:55Z |
| opensuse-su-2023:0230-1 | Security update for opensuse-welcome | 2023-08-18T10:02:39Z | 2023-08-18T10:02:39Z |
| opensuse-su-2023:0225-1 | Security update for perl-Cpanel-JSON-XS | 2023-08-17T10:02:27Z | 2023-08-17T10:02:27Z |
| opensuse-su-2023:0223-1 | Security update for perl-HTTP-Tiny | 2023-08-15T12:01:51Z | 2023-08-15T12:01:51Z |
| opensuse-su-2023:0222-1 | Security update for perl-HTTP-Tiny | 2023-08-15T12:01:47Z | 2023-08-15T12:01:47Z |
| opensuse-su-2023:0219-1 | Security update for opensuse-welcome | 2023-08-14T13:45:38Z | 2023-08-14T13:45:38Z |
| opensuse-su-2023:0217-1 | Security update for perl-Net-Netmask | 2023-08-07T12:01:29Z | 2023-08-07T12:01:29Z |
| opensuse-su-2023:0216-1 | Security update for chromium | 2023-08-07T10:48:54Z | 2023-08-07T10:48:54Z |
| opensuse-su-2023:0215-1 | Security update for perl-Net-Netmask | 2023-08-07T04:01:39Z | 2023-08-07T04:01:39Z |
| opensuse-su-2023:0213-1 | Security update for virtualbox | 2023-08-06T16:21:12Z | 2023-08-06T16:21:12Z |
| opensuse-su-2023:0209-1 | Security update for trytond | 2023-08-06T14:01:38Z | 2023-08-06T14:01:38Z |
| opensuse-su-2023:0208-1 | Security update for trytond | 2023-08-06T14:01:35Z | 2023-08-06T14:01:35Z |
| opensuse-su-2023:0206-1 | Security update for amanda | 2023-08-04T18:01:52Z | 2023-08-04T18:01:52Z |
| opensuse-su-2023:0205-1 | Security update for amanda | 2023-08-04T18:01:48Z | 2023-08-04T18:01:48Z |
| opensuse-su-2023:0201-1 | Security update for libredwg | 2023-08-02T09:53:16Z | 2023-08-02T09:53:16Z |
| opensuse-su-2023:0193-1 | Security update for chromium | 2023-07-26T14:08:03Z | 2023-07-26T14:08:03Z |
| opensuse-su-2023:0191-1 | Security update for zabbix | 2023-07-24T22:01:47Z | 2023-07-24T22:01:47Z |
| opensuse-su-2023:0183-1 | Security update for iniparser | 2023-07-17T14:01:43Z | 2023-07-17T14:01:43Z |
| opensuse-su-2023:0177-1 | Security update for python-Django1 | 2023-07-12T16:00:56Z | 2023-07-12T16:00:56Z |
| opensuse-su-2023:0176-1 | Security update for python-Django1 | 2023-07-12T16:00:53Z | 2023-07-12T16:00:53Z |
| opensuse-su-2023:0174-1 | Security update for python-Django | 2023-07-11T12:12:14Z | 2023-07-11T12:12:14Z |
| opensuse-su-2023:0171-1 | Security update for nextcloud-desktop | 2023-07-10T11:03:58Z | 2023-07-10T11:03:58Z |
| opensuse-su-2023:0166-1 | Security update for virtualbox | 2023-07-04T12:07:58Z | 2023-07-04T12:07:58Z |
| opensuse-su-2023:0163-1 | Security update for keepass | 2023-06-30T07:32:26Z | 2023-06-30T07:32:26Z |
| opensuse-su-2023:0162-1 | Security update for xonotic | 2023-06-29T18:02:09Z | 2023-06-29T18:02:09Z |
| opensuse-su-2023:0161-1 | Security update for libjxl | 2023-06-29T14:01:28Z | 2023-06-29T14:01:28Z |
| opensuse-su-2023:0160-1 | Security update for gifsicle | 2023-06-29T12:17:58Z | 2023-06-29T12:17:58Z |
| opensuse-su-2023:0159-1 | Security update for chromium | 2023-06-29T12:17:46Z | 2023-06-29T12:17:46Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-16352 | Endress+Hauser MEAC300-FNADE4跨站脚本漏洞 | 2025-07-11 | 2025-07-18 |
| cnvd-2025-16351 | Endress+Hauser MEAC300-FNADE4存在未明漏洞(CNVD-2025-16351) | 2025-07-11 | 2025-07-18 |
| cnvd-2025-16350 | Endress+Hauser MEAC300-FNADE4存在未明漏洞(CNVD-2025-16350) | 2025-07-11 | 2025-07-18 |
| cnvd-2025-16349 | Endress+Hauser MEAC300-FNADE4存在未明漏洞(CNVD-2025-16349) | 2025-07-11 | 2025-07-18 |
| cnvd-2025-16348 | Endress+Hauser MEAC300-FNADE4存在未明漏洞(CNVD-2025-16348) | 2025-07-11 | 2025-07-18 |
| cnvd-2025-16347 | Endress+Hauser MEAC300-FNADE4存在未明漏洞(CNVD-2025-16347) | 2025-07-11 | 2025-07-18 |
| cnvd-2025-16346 | Endress+Hauser MEAC300-FNADE4信息泄露漏洞(CNVD-2025-16346) | 2025-07-11 | 2025-07-18 |
| cnvd-2025-16345 | Endress+Hauser MEAC300-FNADE4存在未明漏洞(CNVD-2025-16345) | 2025-07-11 | 2025-07-18 |
| cnvd-2025-16344 | Endress+Hauser MEAC300-FNADE4信息泄露漏洞 | 2025-07-11 | 2025-07-18 |
| cnvd-2025-16343 | Endress+Hauser MEAC300-FNADE4存在未明漏洞(CNVD-2025-16343) | 2025-07-11 | 2025-07-18 |
| cnvd-2025-16342 | Endress+Hauser MEAC300-FNADE4存在未明漏洞 | 2025-07-11 | 2025-07-18 |
| cnvd-2025-16341 | Tenda FH1202命令注入漏洞 | 2024-04-22 | 2025-07-18 |
| cnvd-2025-16340 | Tenda FH1202 fromWizardHandle方法缓冲区溢出漏洞 | 2024-04-22 | 2025-07-18 |
| cnvd-2025-16339 | Tenda FH1202 formWanParameterSetting方法缓冲区溢出漏洞 | 2024-04-22 | 2025-07-18 |
| cnvd-2025-16338 | Tenda F1203 fromWizardHandle方法缓冲区溢出漏洞 | 2024-04-22 | 2025-07-18 |
| cnvd-2025-16337 | Tenda F1203 formWanParameterSetting方法缓冲区溢出漏洞 | 2024-04-22 | 2025-07-18 |
| cnvd-2025-16336 | Tenda AC7缓冲区溢出漏洞 | 2024-04-22 | 2025-07-18 |
| cnvd-2025-16335 | Tenda AC500 fromSetVlanInfo方法缓冲区溢出漏洞 | 2024-04-22 | 2025-07-18 |
| cnvd-2025-16334 | Tenda AC500 fromDhcpListClient方法list1参数缓冲区溢出漏洞 | 2024-04-22 | 2025-07-18 |
| cnvd-2025-16333 | Tenda AC500 formSetVlanInfo方法缓冲区溢出漏洞 | 2024-04-22 | 2025-07-18 |
| cnvd-2025-16332 | Tenda AC500 formSetTimeZone方法缓冲区溢出漏洞 | 2024-04-22 | 2025-07-18 |
| cnvd-2025-16331 | Tenda AC500 formexeCommand方法命令注入漏洞 | 2024-04-22 | 2025-07-18 |
| cnvd-2025-16330 | Tenda O3V2 setAutoReboot栈溢出漏洞 | 2025-07-15 | 2025-07-18 |
| cnvd-2025-16329 | Tenda Ax1803栈缓冲区溢出漏洞 | 2025-07-18 | 2025-07-18 |
| cnvd-2025-16328 | Tenda AX1803缓冲区溢出漏洞 | 2025-07-18 | 2025-07-18 |
| cnvd-2025-16320 | Tenda AC10缓冲区溢出漏洞 | 2024-04-22 | 2025-07-18 |
| cnvd-2025-16319 | Tenda A18缓冲区溢出漏洞 | 2024-04-22 | 2025-07-18 |
| cnvd-2025-16318 | 深圳市吉祥腾达科技有限公司W15E formIPMacBindDel方法缓冲区溢出漏洞 | 2024-04-28 | 2025-07-18 |
| cnvd-2025-16317 | Tenda N300F3存在未明漏洞(CNVD-2025-16317) | 2024-04-30 | 2025-07-18 |
| cnvd-2025-16316 | Endress+Hauser MEAC300-FNADE4 SQL注入漏洞 | 2025-07-11 | 2025-07-18 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2019-avi-632 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2019-12-13T00:00:00.000000 | 2019-12-13T00:00:00.000000 |
| certfr-2019-avi-631 | Multiples vulnérabilités dans WordPress | 2019-12-13T00:00:00.000000 | 2019-12-13T00:00:00.000000 |
| certfr-2019-avi-630 | Multiples vulnérabilités dans Citrix Hypervisor | 2019-12-12T00:00:00.000000 | 2019-12-12T00:00:00.000000 |
| certfr-2019-avi-629 | Multiples vulnérabilités dans les produits Schneider Electric | 2019-12-12T00:00:00.000000 | 2019-12-12T00:00:00.000000 |
| certfr-2019-avi-628 | Multiples vulnérabilités dans Xen | 2019-12-12T00:00:00.000000 | 2019-12-12T00:00:00.000000 |
| certfr-2019-avi-627 | Multiples vulnérabilités dans les produits Microsoft | 2019-12-11T00:00:00.000000 | 2019-12-11T00:00:00.000000 |
| certfr-2019-avi-626 | Multiples vulnérabilités dans Microsoft Windows | 2019-12-11T00:00:00.000000 | 2019-12-11T00:00:00.000000 |
| certfr-2019-avi-625 | Multiples vulnérabilités dans Microsoft Office | 2019-12-11T00:00:00.000000 | 2019-12-11T00:00:00.000000 |
| certfr-2019-avi-624 | Vulnérabilité dans Microsoft IE | 2019-12-11T00:00:00.000000 | 2019-12-11T00:00:00.000000 |
| certfr-2019-avi-623 | Multiples vulnérabilités dans les produits Intel | 2019-12-11T00:00:00.000000 | 2019-12-11T00:00:00.000000 |
| certfr-2019-avi-622 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2019-12-11T00:00:00.000000 | 2019-12-11T00:00:00.000000 |
| certfr-2019-avi-621 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2019-12-11T00:00:00.000000 | 2019-12-11T00:00:00.000000 |
| certfr-2019-avi-620 | Multiples vulnérabilités dans les produits Apple | 2019-12-11T00:00:00.000000 | 2019-12-11T00:00:00.000000 |
| certfr-2019-avi-619 | Multiples vulnérabilités dans Google Chrome | 2019-12-11T00:00:00.000000 | 2019-12-11T00:00:00.000000 |
| certfr-2019-avi-618 | Multiples vulnérabilités dans Gitlab | 2019-12-11T00:00:00.000000 | 2019-12-11T00:00:00.000000 |
| certfr-2019-avi-617 | Multiples vulnérabilités dans Adobe Acrobat et Reader | 2019-12-11T00:00:00.000000 | 2019-12-11T00:00:00.000000 |
| certfr-2019-avi-616 | Vulnérabilité dans Adobe ColdFusion | 2019-12-11T00:00:00.000000 | 2019-12-11T00:00:00.000000 |
| certfr-2019-avi-615 | Multiples vulnérabilités dans les produits Siemens | 2019-12-10T00:00:00.000000 | 2019-12-10T00:00:00.000000 |
| certfr-2019-avi-614 | Multiples vulnérabilités dans Samba | 2019-12-10T00:00:00.000000 | 2019-12-10T00:00:00.000000 |
| certfr-2019-avi-613 | Vulnérabilité dans Symantec Industrial Control System Protection | 2019-12-10T00:00:00.000000 | 2019-12-10T00:00:00.000000 |
| certfr-2019-avi-612 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2019-12-09T00:00:00.000000 | 2019-12-09T00:00:00.000000 |
| certfr-2019-avi-611 | Vulnérabilité dans OpenSSL | 2019-12-09T00:00:00.000000 | 2019-12-09T00:00:00.000000 |
| certfr-2019-avi-610 | Vulnérabilité dans les produits VMware | 2019-12-06T00:00:00.000000 | 2019-12-06T00:00:00.000000 |
| certfr-2019-avi-609 | Multiples vulnérabilités dans Mozilla Thunderbird | 2019-12-05T00:00:00.000000 | 2019-12-05T00:00:00.000000 |
| certfr-2019-avi-608 | Multiples vulnérabilités dans Wireshark | 2019-12-05T00:00:00.000000 | 2019-12-05T00:00:00.000000 |
| certfr-2019-avi-607 | Vulnérabilité dans Palo Alto PAN-OS | 2019-12-05T00:00:00.000000 | 2019-12-05T00:00:00.000000 |
| certfr-2019-avi-606 | Multiples vulnérabilités dans OpenBSD | 2019-12-05T00:00:00.000000 | 2019-12-05T00:00:00.000000 |
| certfr-2019-avi-605 | Multiples vulnérabilités dans Mozilla Firefox | 2019-12-04T00:00:00.000000 | 2019-12-04T00:00:00.000000 |
| certfr-2019-avi-604 | Vulnérabilité dans les produits Kaspersky | 2019-12-03T00:00:00.000000 | 2019-12-03T00:00:00.000000 |
| certfr-2019-avi-603 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2019-12-03T00:00:00.000000 | 2019-12-03T00:00:00.000000 |