Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-0882 |
8.8 (3.1)
|
Use-after-free in the IPC component |
Mozilla |
Firefox |
2026-01-13T13:30:55.562Z | 2026-01-15T09:31:11.810Z |
| CVE-2026-0881 |
10 (3.1)
|
Sandbox escape in the Messaging System component |
Mozilla |
Firefox |
2026-01-13T13:30:55.122Z | 2026-01-15T09:31:11.249Z |
| CVE-2026-0880 |
8.8 (3.1)
|
Sandbox escape due to integer overflow in the Graphics… |
Mozilla |
Firefox |
2026-01-13T13:30:54.679Z | 2026-01-15T09:31:10.655Z |
| CVE-2026-0879 |
9.8 (3.1)
|
Sandbox escape due to incorrect boundary conditions in… |
Mozilla |
Firefox |
2026-01-13T13:30:54.207Z | 2026-01-15T09:31:10.036Z |
| CVE-2026-0878 |
8 (3.1)
|
Sandbox escape due to incorrect boundary conditions in… |
Mozilla |
Firefox |
2026-01-13T13:30:53.697Z | 2026-01-15T09:31:09.491Z |
| CVE-2026-0877 |
8.1 (3.1)
|
Mitigation bypass in the DOM: Security component |
Mozilla |
Firefox |
2026-01-13T13:30:52.979Z | 2026-01-15T09:31:08.828Z |
| CVE-2025-66370 |
5 (3.1)
|
Kivitendo before 3.9.2 allows XXE injection. By u… |
kivitendo |
kivitendo |
2025-11-28T00:00:00.000Z | 2026-01-15T06:46:24.375Z |
| CVE-2025-11224 |
7.7 (3.1)
|
Improper Neutralization of Input During Web Page Gener… |
GitLab |
GitLab |
2026-01-14T18:58:03.982Z | 2026-01-15T04:56:06.696Z |
| CVE-2025-33206 |
7.8 (3.1)
|
NVIDIA NSIGHT Graphics for Linux contains a vulne… |
NVIDIA |
NSIGHT Graphics |
2026-01-14T18:30:41.061Z | 2026-01-15T04:56:05.628Z |
| CVE-2025-66516 |
8.4 (3.1)
|
Apache Tika core, Apache Tika parsers, Apache Tika PDF… |
Apache Software Foundation |
Apache Tika core |
2025-12-04T16:17:24.980Z | 2026-01-15T04:56:01.082Z |
| CVE-2026-21287 |
7.8 (3.1)
|
Substance3D - Stager | Use After Free (CWE-416) |
Adobe |
Substance3D - Stager |
2026-01-13T19:44:45.957Z | 2026-01-15T04:55:59.459Z |
| CVE-2026-23574 |
N/A
|
Not used | N/A | N/A | 2026-01-15T03:55:08.745Z | |
| CVE-2026-23575 |
N/A
|
Not used | N/A | N/A | 2026-01-15T03:55:08.303Z | |
| CVE-2026-23576 |
N/A
|
Not used | N/A | N/A | 2026-01-15T03:55:07.854Z | |
| CVE-2026-23577 |
N/A
|
Not used | N/A | N/A | 2026-01-15T03:55:07.411Z | |
| CVE-2026-23578 |
N/A
|
Not used | N/A | N/A | 2026-01-15T03:55:06.967Z | |
| CVE-2026-23579 |
N/A
|
Not used | N/A | N/A | 2026-01-15T03:55:06.514Z | |
| CVE-2026-23580 |
N/A
|
Not used | N/A | N/A | 2026-01-15T03:55:06.047Z | |
| CVE-2026-23581 |
N/A
|
Not used | N/A | N/A | 2026-01-15T03:55:05.587Z | |
| CVE-2026-23582 |
N/A
|
Not used | N/A | N/A | 2026-01-15T03:55:05.073Z | |
| CVE-2025-58318 |
5.8 (4.0)
|
DIAView - Authentication Bypass Vulnerability |
Delta Electronics |
DIAView |
2025-09-01T07:23:20.880Z | 2026-01-15T02:23:12.087Z |
| CVE-2025-66176 |
8.8 (3.1)
|
There is a Stack overflow Vulnerability in the de… |
Hikvision |
DS-K1T331 |
2026-01-13T01:47:27.191Z | 2026-01-15T01:56:32.572Z |
| CVE-2025-68963 |
5.7 (3.1)
|
Man-in-the-middle attack vulnerability in the Clo… |
Huawei |
HarmonyOS |
2026-01-14T02:31:32.979Z | 2026-01-14T23:35:36.785Z |
| CVE-2025-68967 |
5.7 (3.1)
|
Vulnerability of improper permission control in t… |
Huawei |
HarmonyOS |
2026-01-14T02:16:57.372Z | 2026-01-14T23:35:23.930Z |
| CVE-2025-68956 |
8 (3.1)
|
Multi-thread race condition vulnerability in the … |
Huawei |
HarmonyOS |
2026-01-14T01:56:39.093Z | 2026-01-14T23:35:11.781Z |
| CVE-2025-68955 |
8 (3.1)
|
Multi-thread race condition vulnerability in the … |
Huawei |
HarmonyOS |
2026-01-14T01:51:42.163Z | 2026-01-14T23:34:57.517Z |
| CVE-2025-12053 |
7.8 (3.1)
|
egwindrvx64.sys is potentially vulnerable to a buffer … |
Insyde Software |
InsydeH2O tools |
2026-01-14T01:27:11.791Z | 2026-01-14T23:34:48.257Z |
| CVE-2025-12052 |
7.8 (3.1)
|
egwindrv.sys is potentially vulnerable to a buffer overflow. |
Insyde Software |
InsydeH2O tools |
2026-01-14T01:23:54.933Z | 2026-01-14T23:27:53.305Z |
| CVE-2025-12051 |
7.8 (3.1)
|
H2OFFT64.sys is potentially vulnerable to a buffer overflow. |
Insyde Software |
InsydeH2O tools |
2026-01-14T01:17:54.753Z | 2026-01-14T23:27:15.424Z |
| CVE-2025-12050 |
7.8 (3.1)
|
In H2OFFT32.sys is potentially vulnerable to a buffer … |
Insyde Software |
InsydeH2O tools |
2026-01-14T01:13:33.407Z | 2026-01-14T23:26:28.947Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-15224 |
3.1 (3.1)
|
libssh key passphrase bypass without agent set |
curl |
curl |
2026-01-08T10:08:27.516Z | 2026-01-08T14:39:55.278Z |
| CVE-2025-62595 |
4.3 (3.1)
|
Koa Vulnerable to Open Redirect via Trailing Double-Sl… |
koajs |
koa |
2025-10-21T16:20:43.809Z | 2025-10-21T16:35:48.461Z |
| CVE-2025-25200 |
9.2 (4.0)
|
Koa has Inefficient Regular Expression Complexity |
koajs |
koa |
2025-02-12T17:59:04.615Z | 2025-02-12T19:29:10.232Z |
| CVE-2025-20998 |
5.5 (3.1)
|
Improper access control in SamsungAccount for Gal… |
Samsung Mobile |
Samsung Mobile Devices |
2025-07-08T10:34:27.871Z | 2025-07-11T13:30:37.481Z |
| CVE-2025-21004 |
6.2 (3.1)
|
Improper verification of intent by broadcast rece… |
Samsung Mobile |
Samsung Mobile Devices |
2025-07-08T10:34:34.247Z | 2025-07-08T18:13:09.259Z |
| CVE-2025-43019 |
5.8 (4.0)
|
HP Support Assistant – Potential Escalation of Privilege |
HP Inc. |
HP Support Assistant |
2025-07-08T15:25:34.337Z | 2025-07-08T15:35:59.639Z |
| CVE-2025-59429 |
8.5 (4.0)
|
FreePBX core module vulnerable to reflected cross-site… |
FreePBX |
core |
2025-10-14T19:26:02.072Z | 2026-02-13T22:02:12.825Z |
| CVE-2025-8110 |
8.7 (4.0)
|
File overwrite in file update API in Gogs |
Gogs |
Gogs |
2025-12-10T13:23:46.777Z | 2026-01-18T03:33:12.743Z |
| CVE-2026-23917 |
N/A
|
Not used | N/A | N/A | 2026-01-20T03:55:05.288Z | |
| CVE-2026-23916 |
N/A
|
Not used | N/A | N/A | 2026-01-20T03:55:05.817Z | |
| CVE-2026-23915 |
N/A
|
Not used | N/A | N/A | 2026-01-20T03:55:06.297Z | |
| CVE-2026-23914 |
N/A
|
Not used | N/A | N/A | 2026-01-20T03:55:06.762Z | |
| CVE-2026-23913 |
N/A
|
Not used | N/A | N/A | 2026-01-20T03:55:07.342Z | |
| CVE-2026-23912 |
N/A
|
Not used | N/A | N/A | 2026-01-20T03:55:07.819Z | |
| CVE-2026-23911 |
N/A
|
Not used | N/A | N/A | 2026-01-20T03:55:08.281Z | |
| CVE-2026-23910 |
N/A
|
Not used | N/A | N/A | 2026-01-20T03:55:08.723Z | |
| CVE-2026-23909 |
N/A
|
Not used | N/A | N/A | 2026-01-20T03:55:09.182Z | |
| CVE-2025-68161 |
6.3 (4.0)
|
Apache Log4j Core: Missing TLS hostname verification i… |
Apache Software Foundation |
Apache Log4j Core |
2025-12-18T20:47:49.123Z | 2026-01-20T00:13:44.911Z |
| CVE-2025-71137 |
N/A
|
octeontx2-pf: fix "UBSAN: shift-out-of-bounds error" |
Linux |
Linux |
2026-01-14T15:07:51.264Z | 2026-02-09T08:35:34.357Z |
| CVE-2025-71136 |
N/A
|
media: adv7842: Avoid possible out-of-bounds array acc… |
Linux |
Linux |
2026-01-14T15:07:50.568Z | 2026-02-09T08:35:32.724Z |
| CVE-2025-71133 |
N/A
|
RDMA/irdma: avoid invalid read in irdma_net_event |
Linux |
Linux |
2026-01-14T15:07:48.524Z | 2026-02-09T08:35:29.446Z |
| CVE-2025-71132 |
N/A
|
smc91x: fix broken irq-context in PREEMPT_RT |
Linux |
Linux |
2026-01-14T15:07:47.860Z | 2026-02-09T08:35:28.371Z |
| CVE-2025-71131 |
N/A
|
crypto: seqiv - Do not use req->iv after crypto_aead_encrypt |
Linux |
Linux |
2026-01-14T15:07:47.194Z | 2026-02-09T08:35:27.322Z |
| CVE-2025-71127 |
N/A
|
wifi: mac80211: Discard Beacon frames to non-broadcast… |
Linux |
Linux |
2026-01-14T15:07:44.218Z | 2026-02-09T08:35:22.963Z |
| CVE-2025-71125 |
N/A
|
tracing: Do not register unsupported perf events |
Linux |
Linux |
2026-01-14T15:06:10.662Z | 2026-02-09T08:35:20.806Z |
| CVE-2025-71123 |
N/A
|
ext4: fix string copying in parse_apply_sb_mount_options() |
Linux |
Linux |
2026-01-14T15:06:09.246Z | 2026-02-09T08:35:18.369Z |
| CVE-2025-71121 |
N/A
|
parisc: Do not reprogram affinitiy on ASP chip |
Linux |
Linux |
2026-01-14T15:06:07.871Z | 2026-02-09T08:35:16.277Z |
| CVE-2025-71120 |
N/A
|
SUNRPC: svcauth_gss: avoid NULL deref on zero length g… |
Linux |
Linux |
2026-01-14T15:06:07.194Z | 2026-02-09T08:35:15.157Z |
| CVE-2025-71118 |
N/A
|
ACPICA: Avoid walking the Namespace if start_node is NULL |
Linux |
Linux |
2026-01-14T15:06:05.861Z | 2026-02-09T08:35:13.020Z |
| CVE-2025-71116 |
N/A
|
libceph: make decode_pool() more resilient against cor… |
Linux |
Linux |
2026-01-14T15:06:04.476Z | 2026-02-09T08:35:10.946Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-59429 | FreePBX is an open source GUI for managing Asterisk. In versions prior to 16.0.68.39 for FreePBX 16… | 2025-10-14T20:15:50.233 | 2026-01-20T13:59:00.880 |
| fkie_cve-2025-8110 | Improper Symbolic link handling in the PutContents API in Gogs allows Local Execution of Code. | 2025-12-10T14:16:19.847 | 2026-01-20T13:47:34.450 |
| fkie_cve-2026-23917 | Rejected reason: Not used | 2026-01-20T05:16:17.093 | 2026-01-20T05:16:17.093 |
| fkie_cve-2026-23916 | Rejected reason: Not used | 2026-01-20T05:16:17.030 | 2026-01-20T05:16:17.030 |
| fkie_cve-2026-23915 | Rejected reason: Not used | 2026-01-20T05:16:16.953 | 2026-01-20T05:16:16.953 |
| fkie_cve-2026-23914 | Rejected reason: Not used | 2026-01-20T05:16:16.883 | 2026-01-20T05:16:16.883 |
| fkie_cve-2026-23913 | Rejected reason: Not used | 2026-01-20T05:16:16.817 | 2026-01-20T05:16:16.817 |
| fkie_cve-2026-23912 | Rejected reason: Not used | 2026-01-20T05:16:16.743 | 2026-01-20T05:16:16.743 |
| fkie_cve-2026-23911 | Rejected reason: Not used | 2026-01-20T05:16:16.673 | 2026-01-20T05:16:16.673 |
| fkie_cve-2026-23910 | Rejected reason: Not used | 2026-01-20T05:16:16.600 | 2026-01-20T05:16:16.600 |
| fkie_cve-2026-23909 | Rejected reason: Not used | 2026-01-20T05:16:16.467 | 2026-01-20T05:16:16.467 |
| fkie_cve-2025-68161 | The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does not perform TLS hos… | 2025-12-18T21:15:57.960 | 2026-01-20T01:15:55.067 |
| fkie_cve-2025-71137 | In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: fix "UBSAN: shif… | 2026-01-14T15:16:03.487 | 2026-01-19T13:16:19.683 |
| fkie_cve-2025-71136 | In the Linux kernel, the following vulnerability has been resolved: media: adv7842: Avoid possible… | 2026-01-14T15:16:03.383 | 2026-01-19T13:16:19.583 |
| fkie_cve-2025-71133 | In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: avoid invalid read… | 2026-01-14T15:16:03.053 | 2026-01-19T13:16:19.490 |
| fkie_cve-2025-71132 | In the Linux kernel, the following vulnerability has been resolved: smc91x: fix broken irq-context… | 2026-01-14T15:16:02.947 | 2026-01-19T13:16:19.400 |
| fkie_cve-2025-71131 | In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Do not use req… | 2026-01-14T15:16:02.843 | 2026-01-19T13:16:19.303 |
| fkie_cve-2025-71127 | In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: Discard Beacon… | 2026-01-14T15:16:02.430 | 2026-01-19T13:16:19.210 |
| fkie_cve-2025-71125 | In the Linux kernel, the following vulnerability has been resolved: tracing: Do not register unsup… | 2026-01-14T15:16:02.213 | 2026-01-19T13:16:19.113 |
| fkie_cve-2025-71123 | In the Linux kernel, the following vulnerability has been resolved: ext4: fix string copying in pa… | 2026-01-14T15:16:02.000 | 2026-01-19T13:16:19.013 |
| fkie_cve-2025-71121 | In the Linux kernel, the following vulnerability has been resolved: parisc: Do not reprogram affin… | 2026-01-14T15:16:01.800 | 2026-01-19T13:16:18.920 |
| fkie_cve-2025-71120 | In the Linux kernel, the following vulnerability has been resolved: SUNRPC: svcauth_gss: avoid NUL… | 2026-01-14T15:16:01.690 | 2026-01-19T13:16:18.823 |
| fkie_cve-2025-71118 | In the Linux kernel, the following vulnerability has been resolved: ACPICA: Avoid walking the Name… | 2026-01-14T15:16:01.483 | 2026-01-19T13:16:18.733 |
| fkie_cve-2025-71116 | In the Linux kernel, the following vulnerability has been resolved: libceph: make decode_pool() mo… | 2026-01-14T15:16:01.277 | 2026-01-19T13:16:18.640 |
| fkie_cve-2025-71114 | In the Linux kernel, the following vulnerability has been resolved: via_wdt: fix critical boot han… | 2026-01-14T15:16:01.063 | 2026-01-19T13:16:18.543 |
| fkie_cve-2025-71113 | In the Linux kernel, the following vulnerability has been resolved: crypto: af_alg - zero initiali… | 2026-01-14T15:16:00.433 | 2026-01-19T13:16:18.450 |
| fkie_cve-2025-71112 | In the Linux kernel, the following vulnerability has been resolved: net: hns3: add VLAN id validat… | 2026-01-14T15:16:00.313 | 2026-01-19T13:16:18.353 |
| fkie_cve-2025-71111 | In the Linux kernel, the following vulnerability has been resolved: hwmon: (w83791d) Convert macro… | 2026-01-14T15:16:00.193 | 2026-01-19T13:16:18.260 |
| fkie_cve-2025-71108 | In the Linux kernel, the following vulnerability has been resolved: usb: typec: ucsi: Handle incor… | 2026-01-14T15:15:59.867 | 2026-01-19T13:16:18.163 |
| fkie_cve-2025-71105 | In the Linux kernel, the following vulnerability has been resolved: f2fs: use global inline_xattr_… | 2026-01-14T15:15:59.533 | 2026-01-19T13:16:18.053 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-jvgx-vgv6-vgp9 |
5.3 (3.1)
|
The Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder plugin f… | 2026-01-07T12:31:20Z | 2026-01-07T12:31:20Z |
| ghsa-gc57-jf4p-c7fv |
4.3 (3.1)
|
The HelpDesk contact form plugin for WordPress is vulnerable to Cross-Site Request Forgery in all v… | 2026-01-07T12:31:20Z | 2026-01-07T12:31:20Z |
| ghsa-f993-f86j-2hw6 |
5.3 (3.1)
|
The Unify plugin for WordPress is vulnerable to unauthorized modification of data due to a missing … | 2026-01-07T12:31:20Z | 2026-01-07T12:31:20Z |
| ghsa-c494-7f9x-6wf4 |
4.3 (3.1)
|
The MTCaptcha WordPress Plugin for WordPress is vulnerable to Cross-Site Request Forgery in all ver… | 2026-01-07T12:31:20Z | 2026-01-07T12:31:20Z |
| ghsa-9m68-hxf3-3w7w |
6.1 (3.1)
|
The Premmerce WooCommerce Customers Manager plugin for WordPress is vulnerable to Reflected Cross-S… | 2026-01-07T12:31:20Z | 2026-01-07T12:31:20Z |
| ghsa-9559-p8wg-q54v |
5.3 (3.1)
|
The Moosend Landing Pages plugin for WordPress is vulnerable to unauthorized modification of data d… | 2026-01-07T12:31:20Z | 2026-01-07T12:31:20Z |
| ghsa-943g-jpq4-jf4f |
5.4 (3.1)
|
The aBlocks – WordPress Gutenberg Blocks plugin for WordPress is vulnerable to unauthorized modific… | 2026-01-07T12:31:19Z | 2026-01-07T12:31:20Z |
| ghsa-8jxh-xpcf-824x |
5.3 (3.1)
|
The Guest posting / Frontend Posting / Front Editor – WP Front User Submit plugin for WordPress is … | 2026-01-07T12:31:20Z | 2026-01-07T12:31:20Z |
| ghsa-7q6w-ggv8-84g7 |
7.5 (3.1)
|
The Latest Registered Users plugin for WordPress is vulnerable to unauthorized user data export in … | 2026-01-07T12:31:20Z | 2026-01-07T12:31:20Z |
| ghsa-6xwp-836r-mc2g |
4.3 (3.1)
|
The xShare plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, … | 2026-01-07T12:31:20Z | 2026-01-07T12:31:20Z |
| ghsa-6qvx-xqgf-3cvh |
6.4 (3.1)
|
The Responsive Pricing Table plugin for WordPress is vulnerable to Stored Cross-Site Scripting via … | 2026-01-07T12:31:20Z | 2026-01-07T12:31:20Z |
| ghsa-6g5m-f5c9-9v5f |
6.1 (3.1)
|
The SVG Map Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions… | 2026-01-07T12:31:20Z | 2026-01-07T12:31:20Z |
| ghsa-5mj2-hrcv-mv45 |
4.7 (3.1)
|
The ShareThis Dashboard for Google Analytics plugin for WordPress is vulnerable to Sensitive Inform… | 2026-01-07T12:31:20Z | 2026-01-07T12:31:20Z |
| ghsa-5cxq-3v7p-39j8 |
5.3 (3.1)
|
The WP-Members Membership Plugin for WordPress is vulnerable to unauthorized file access in version… | 2026-01-07T12:31:20Z | 2026-01-07T12:31:20Z |
| ghsa-5c4x-99c2-fwpv |
6.4 (3.1)
|
The Recras WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'rec… | 2026-01-07T12:31:20Z | 2026-01-07T12:31:20Z |
| ghsa-3jqj-jp4r-6xwm |
5.3 (3.1)
|
The AA Block Country plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, a… | 2026-01-07T12:31:20Z | 2026-01-07T12:31:20Z |
| ghsa-226c-v4c5-7xv2 |
6.4 (3.1)
|
The WP Recipe Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Sk… | 2026-01-07T12:31:20Z | 2026-01-07T12:31:20Z |
| ghsa-g9gc-23hp-3qj2 |
4.3 (3.1)
|
The ACF to REST API plugin for WordPress is vulnerable to Insecure Direct Object Reference in all v… | 2026-01-07T12:31:19Z | 2026-01-07T12:31:19Z |
| ghsa-738g-29rj-2mjw |
3.7 (3.1)
|
Unverified Password Change vulnerability in Progress MOVEit Transfer on Windows (REST API modules).… | 2026-01-07T12:31:19Z | 2026-01-07T12:31:19Z |
| ghsa-69mj-pc6r-5cgv |
7.5 (3.1)
|
The User Activity Log plugin is vulnerable to a limited options update in versions up to, and inclu… | 2026-01-07T12:31:19Z | 2026-01-07T12:31:19Z |
| ghsa-m5m3-wp89-4x7q |
7.1 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-01-07T03:30:26Z | 2026-01-07T03:30:26Z |
| ghsa-gg9r-qr35-cfrw |
6.7 (3.1)
5.4 (4.0)
|
Insecure Temporary File vulnerability in Altera Quartus Prime Pro Installer (SFX) on Windows al… | 2026-01-07T03:30:26Z | 2026-01-07T03:30:26Z |
| ghsa-f659-j5v8-73v6 |
5.3 (3.1)
|
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in EngoThe… | 2026-01-07T03:30:26Z | 2026-01-07T03:30:26Z |
| ghsa-8pp7-gcvr-f245 |
9.8 (3.1)
8.9 (4.0)
|
A vulnerability was detected in TRENDnet TEW-713RE 1.02. The impacted element is an unknown functio… | 2026-01-07T03:30:26Z | 2026-01-07T03:30:26Z |
| ghsa-5f84-6463-h54p |
6.7 (3.1)
5.4 (4.0)
|
Uncontrolled Search Path Element vulnerability in Altera Quartus Prime Pro Installer (SFX) on W… | 2026-01-07T03:30:26Z | 2026-01-07T03:30:26Z |
| ghsa-58fv-5j68-xf6p |
6.7 (3.1)
5.4 (4.0)
|
Uncontrolled Search Path Element vulnerability in Altera Quartus Prime Standard Installer (SFX) … | 2026-01-07T03:30:26Z | 2026-01-07T03:30:26Z |
| ghsa-3hxf-g9w5-rj6x |
6.7 (3.1)
5.4 (4.0)
|
Uncontrolled Search Path Element vulnerability in Altera Quartus Prime Pro on Windows (System Conso… | 2026-01-07T03:30:26Z | 2026-01-07T03:30:26Z |
| ghsa-wwrj-3hvj-prpm |
6.5 (3.1)
6.9 (4.0)
|
Misskey has a login rate limit bypass via spoofed X-Forwarded-For header | 2025-12-15T20:59:59Z | 2026-01-06T22:41:27Z |
| ghsa-496g-mmpw-j9x3 |
6.5 (3.1)
7.1 (4.0)
|
misskey.js's export data contains private post data | 2025-12-15T20:55:27Z | 2026-01-06T22:41:20Z |
| ghsa-xchh-23fv-6m64 |
5.3 (3.1)
8.5 (4.0)
|
All-Dynamics Software enlogic:show 2.0.2 contains a session fixation vulnerability that allows atta… | 2026-01-06T18:31:34Z | 2026-01-06T21:30:34Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-26648 | In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix… | 2024-02-20T06:02:29.285829Z |
| gsd-2024-26363 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-20T06:02:29.285318Z |
| gsd-2024-26710 | In the Linux kernel, the following vulnerability has been resolved: powerpc/kasan: Limit… | 2024-02-20T06:02:29.284827Z |
| gsd-2024-26845 | In the Linux kernel, the following vulnerability has been resolved: scsi: target: core: … | 2024-02-20T06:02:29.284595Z |
| gsd-2024-26970 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-20T06:02:29.284129Z |
| gsd-2024-26527 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-20T06:02:29.283899Z |
| gsd-2024-26991 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-20T06:02:29.283395Z |
| gsd-2024-26954 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-20T06:02:29.283120Z |
| gsd-2024-26990 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-20T06:02:29.282887Z |
| gsd-2024-26530 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-20T06:02:29.282638Z |
| gsd-2024-26754 | In the Linux kernel, the following vulnerability has been resolved: gtp: fix use-after-f… | 2024-02-20T06:02:29.282399Z |
| gsd-2024-26709 | In the Linux kernel, the following vulnerability has been resolved: powerpc/iommu: Fix t… | 2024-02-20T06:02:29.281629Z |
| gsd-2024-26656 | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix use-… | 2024-02-20T06:02:29.280552Z |
| gsd-2024-26365 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-20T06:02:29.279996Z |
| gsd-2024-26357 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-20T06:02:29.279304Z |
| gsd-2024-26660 | In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Imp… | 2024-02-20T06:02:29.278669Z |
| gsd-2024-26633 | In the Linux kernel, the following vulnerability has been resolved: ip6_tunnel: fix NEXT… | 2024-02-20T06:02:29.278113Z |
| gsd-2024-26472 | A reflected cross-site scripting (XSS) vulnerability in SocialMediaWebsite v1.0.1 allows … | 2024-02-20T06:02:29.277820Z |
| gsd-2024-26488 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-20T06:02:29.277298Z |
| gsd-2024-26618 | In the Linux kernel, the following vulnerability has been resolved: arm64/sme: Always ex… | 2024-02-20T06:02:29.276833Z |
| gsd-2024-26762 | In the Linux kernel, the following vulnerability has been resolved: cxl/pci: Skip to han… | 2024-02-20T06:02:29.276615Z |
| gsd-2024-26600 | In the Linux kernel, the following vulnerability has been resolved: phy: ti: phy-omap-us… | 2024-02-20T06:02:29.276401Z |
| gsd-2024-26610 | In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: fix a… | 2024-02-20T06:02:29.276182Z |
| gsd-2024-26458 | Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c. | 2024-02-20T06:02:29.275956Z |
| gsd-2024-26437 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-20T06:02:29.274890Z |
| gsd-2024-26523 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-20T06:02:29.273837Z |
| gsd-2024-26422 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-20T06:02:29.273621Z |
| gsd-2024-26504 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-20T06:02:29.273132Z |
| gsd-2024-26775 | In the Linux kernel, the following vulnerability has been resolved: aoe: avoid potential… | 2024-02-20T06:02:29.272286Z |
| gsd-2024-26694 | In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: fix d… | 2024-02-20T06:02:29.271682Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-185284 | Malicious code in tunis-kjt-gabisy (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-185283 | Malicious code in tunis-kjt-gabisayynufsgf (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-185282 | Malicious code in tunis-kjt-gabisayyngf (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-185281 | Malicious code in tunis-kjt-gabisayynfsgf (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-185280 | Malicious code in tunis-kjt-gabisayygf (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-185279 | Malicious code in tunis-kjt-gabis (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-185278 | Malicious code in tunis-kit-gai (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-185277 | Malicious code in tunis-kit-gahuvfaduuvufafadi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-185276 | Malicious code in tunis-kit-gahuvfadduuvufafadi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-185275 | Malicious code in tunis-kit-gahufaudi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-185274 | Malicious code in tunis-kit-gahufaduuvufafadi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-185273 | Malicious code in tunis-kit-gahufaduuvufadi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-185272 | Malicious code in tunis-kit-gahufaduuvfadi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-185271 | Malicious code in tunis-kit-gahufaduufdi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-185270 | Malicious code in tunis-kit-gahufaduudi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-185269 | Malicious code in tunis-kit-gahufadudi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-185268 | Malicious code in tunis-kit-gahufadi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-185267 | Malicious code in tunis-kit-gahudi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-185266 | Malicious code in tunis-kit-gahuadi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-185265 | Malicious code in tunis-kit-gahi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-185264 | Malicious code in tunis-kit-bogavowi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-185263 | Malicious code in tunis-kit-bogavotaawfi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-185262 | Malicious code in tunis-kit-bogavoawi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-185261 | Malicious code in tunis-kit-bogavoaawi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-185260 | Malicious code in tunis-kit-bogavoaawfi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-185259 | Malicious code in tunis-kit-bogavi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-185258 | Malicious code in tunis-kit-bogai (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-185257 | Malicious code in tunis-kit-bgai (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-185256 | Malicious code in tuis-kjt-garfuafafawkvdyfimas (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-185255 | Malicious code in tuis-kjt-garfuafaawkvdyfimas (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:0277 | Red Hat Security Advisory: webkit2gtk3 security update | 2025-01-13T11:31:54+00:00 | 2025-11-21T19:17:49+00:00 |
| rhsa-2025:0276 | Red Hat Security Advisory: webkit2gtk3 security update | 2025-01-13T10:22:46+00:00 | 2025-11-21T19:17:49+00:00 |
| rhsa-2025:0275 | Red Hat Security Advisory: thunderbird security update | 2025-01-13T10:52:22+00:00 | 2025-11-21T19:17:49+00:00 |
| rhsa-2025:0226 | Red Hat Security Advisory: webkit2gtk3 security update | 2025-01-09T19:18:28+00:00 | 2025-11-21T19:17:48+00:00 |
| rhsa-2025:0222 | Red Hat Security Advisory: dpdk security update | 2025-01-09T17:03:02+00:00 | 2025-11-21T19:17:48+00:00 |
| rhsa-2025:0221 | Red Hat Security Advisory: dpdk security update | 2025-01-09T16:56:12+00:00 | 2025-11-21T19:17:48+00:00 |
| rhsa-2025:0220 | Red Hat Security Advisory: dpdk security update | 2025-01-09T17:01:12+00:00 | 2025-11-21T19:17:47+00:00 |
| rhsa-2025:0211 | Red Hat Security Advisory: dpdk security update | 2025-01-09T15:21:02+00:00 | 2025-11-21T19:17:47+00:00 |
| rhsa-2025:0210 | Red Hat Security Advisory: dpdk security update | 2025-01-09T15:29:57+00:00 | 2025-11-21T19:17:47+00:00 |
| rhsa-2025:0166 | Red Hat Security Advisory: thunderbird security update | 2025-01-09T12:13:48+00:00 | 2025-11-21T19:17:47+00:00 |
| rhsa-2025:0165 | Red Hat Security Advisory: thunderbird security update | 2025-01-09T11:55:58+00:00 | 2025-11-21T19:17:47+00:00 |
| rhsa-2025:0209 | Red Hat Security Advisory: dpdk security update | 2025-01-09T15:33:02+00:00 | 2025-11-21T19:17:46+00:00 |
| rhsa-2025:0208 | Red Hat Security Advisory: dpdk security update | 2025-01-09T15:32:17+00:00 | 2025-11-21T19:17:46+00:00 |
| rhsa-2025:0204 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (openstack-ironic) security update | 2025-01-09T14:58:39+00:00 | 2025-11-21T19:17:46+00:00 |
| rhsa-2025:0201 | Red Hat Security Advisory: Red Hat OpenStack Platform 16.2 (python-waitress) security update | 2025-01-09T14:57:59+00:00 | 2025-11-21T19:17:46+00:00 |
| rhsa-2025:0168 | Red Hat Security Advisory: iperf3 security update | 2025-01-09T13:29:04+00:00 | 2025-11-21T19:17:44+00:00 |
| rhsa-2025:0167 | Red Hat Security Advisory: thunderbird security update | 2025-01-09T12:29:06+00:00 | 2025-11-21T19:17:44+00:00 |
| rhsa-2025:0162 | Red Hat Security Advisory: firefox security update | 2025-01-09T11:10:23+00:00 | 2025-11-21T19:17:43+00:00 |
| rhsa-2025:0161 | Red Hat Security Advisory: iperf3 security update | 2025-01-09T10:11:18+00:00 | 2025-11-21T19:17:43+00:00 |
| rhsa-2025:0147 | Red Hat Security Advisory: thunderbird security update | 2025-01-09T07:31:31+00:00 | 2025-11-21T19:17:43+00:00 |
| rhsa-2025:0146 | Red Hat Security Advisory: webkit2gtk3 security update | 2025-01-09T07:31:53+00:00 | 2025-11-21T19:17:42+00:00 |
| rhsa-2025:0145 | Red Hat Security Advisory: webkit2gtk3 security update | 2025-01-09T07:48:01+00:00 | 2025-11-21T19:17:42+00:00 |
| rhsa-2025:0144 | Red Hat Security Advisory: firefox security update | 2025-01-09T07:37:01+00:00 | 2025-11-21T19:17:42+00:00 |
| rhsa-2025:0138 | Red Hat Security Advisory: firefox security update | 2025-01-09T06:49:31+00:00 | 2025-11-21T19:17:41+00:00 |
| rhsa-2025:0137 | Red Hat Security Advisory: firefox security update | 2025-01-09T06:50:11+00:00 | 2025-11-21T19:17:41+00:00 |
| rhsa-2025:0136 | Red Hat Security Advisory: firefox security update | 2025-01-09T06:36:11+00:00 | 2025-11-21T19:17:41+00:00 |
| rhsa-2025:0135 | Red Hat Security Advisory: firefox security update | 2025-01-09T06:33:56+00:00 | 2025-11-21T19:17:40+00:00 |
| rhsa-2025:0134 | Red Hat Security Advisory: firefox security update | 2025-01-09T06:32:56+00:00 | 2025-11-21T19:17:40+00:00 |
| rhsa-2025:0133 | Red Hat Security Advisory: firefox security update | 2025-01-09T06:26:41+00:00 | 2025-11-21T19:17:40+00:00 |
| rhsa-2025:0132 | Red Hat Security Advisory: firefox security update | 2025-01-09T06:34:41+00:00 | 2025-11-21T19:17:40+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2022-35824 | Azure Site Recovery Remote Code Execution Vulnerability | 2022-08-09T07:00:00.000Z | 2022-08-09T07:00:00.000Z |
| msrc_cve-2022-35821 | Azure Sphere Information Disclosure Vulnerability | 2022-08-09T07:00:00.000Z | 2022-08-09T07:00:00.000Z |
| msrc_cve-2022-35819 | Azure Site Recovery Elevation of Privilege Vulnerability | 2022-08-09T07:00:00.000Z | 2022-08-09T07:00:00.000Z |
| msrc_cve-2022-35818 | Azure Site Recovery Elevation of Privilege Vulnerability | 2022-08-09T07:00:00.000Z | 2022-08-09T07:00:00.000Z |
| msrc_cve-2022-35817 | Azure Site Recovery Elevation of Privilege Vulnerability | 2022-08-09T07:00:00.000Z | 2022-08-09T07:00:00.000Z |
| msrc_cve-2022-35816 | Azure Site Recovery Elevation of Privilege Vulnerability | 2022-08-09T07:00:00.000Z | 2022-08-09T07:00:00.000Z |
| msrc_cve-2022-35815 | Azure Site Recovery Elevation of Privilege Vulnerability | 2022-08-09T07:00:00.000Z | 2022-08-09T07:00:00.000Z |
| msrc_cve-2022-35814 | Azure Site Recovery Elevation of Privilege Vulnerability | 2022-08-09T07:00:00.000Z | 2022-08-09T07:00:00.000Z |
| msrc_cve-2022-35813 | Azure Site Recovery Elevation of Privilege Vulnerability | 2022-08-09T07:00:00.000Z | 2022-08-09T07:00:00.000Z |
| msrc_cve-2022-35812 | Azure Site Recovery Elevation of Privilege Vulnerability | 2022-08-09T07:00:00.000Z | 2022-08-09T07:00:00.000Z |
| msrc_cve-2022-35811 | Azure Site Recovery Elevation of Privilege Vulnerability | 2022-08-09T07:00:00.000Z | 2022-08-09T07:00:00.000Z |
| msrc_cve-2022-35810 | Azure Site Recovery Elevation of Privilege Vulnerability | 2022-08-09T07:00:00.000Z | 2022-08-09T07:00:00.000Z |
| msrc_cve-2022-35809 | Azure Site Recovery Elevation of Privilege Vulnerability | 2022-08-09T07:00:00.000Z | 2022-08-09T07:00:00.000Z |
| msrc_cve-2022-35808 | Azure Site Recovery Elevation of Privilege Vulnerability | 2022-08-09T07:00:00.000Z | 2022-08-09T07:00:00.000Z |
| msrc_cve-2022-35807 | Azure Site Recovery Elevation of Privilege Vulnerability | 2022-08-09T07:00:00.000Z | 2022-08-09T07:00:00.000Z |
| msrc_cve-2022-35806 | Azure RTOS GUIX Studio Remote Code Execution Vulnerability | 2022-08-09T07:00:00.000Z | 2022-08-09T07:00:00.000Z |
| msrc_cve-2022-35804 | SMB Client and Server Remote Code Execution Vulnerability | 2022-08-09T07:00:00.000Z | 2022-08-09T07:00:00.000Z |
| msrc_cve-2022-35802 | Azure Site Recovery Elevation of Privilege Vulnerability | 2022-08-09T07:00:00.000Z | 2022-08-09T07:00:00.000Z |
| msrc_cve-2022-35801 | Azure Site Recovery Elevation of Privilege Vulnerability | 2022-08-09T07:00:00.000Z | 2022-08-09T07:00:00.000Z |
| msrc_cve-2022-35800 | Azure Site Recovery Elevation of Privilege Vulnerability | 2022-08-09T07:00:00.000Z | 2022-08-09T07:00:00.000Z |
| msrc_cve-2022-35799 | Azure Site Recovery Elevation of Privilege Vulnerability | 2022-08-09T07:00:00.000Z | 2022-08-09T07:00:00.000Z |
| msrc_cve-2022-35797 | Windows Hello Security Feature Bypass Vulnerability | 2022-08-09T07:00:00.000Z | 2022-08-09T07:00:00.000Z |
| msrc_cve-2022-35795 | Windows Error Reporting Service Elevation of Privilege Vulnerability | 2022-08-09T07:00:00.000Z | 2022-08-09T07:00:00.000Z |
| msrc_cve-2022-35794 | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability | 2022-08-09T07:00:00.000Z | 2022-08-09T07:00:00.000Z |
| msrc_cve-2022-35793 | Windows Print Spooler Elevation of Privilege Vulnerability | 2022-08-09T07:00:00.000Z | 2022-08-09T07:00:00.000Z |
| msrc_cve-2022-35792 | Storage Spaces Direct Elevation of Privilege Vulnerability | 2022-08-09T07:00:00.000Z | 2022-08-09T07:00:00.000Z |
| msrc_cve-2022-35791 | Azure Site Recovery Elevation of Privilege Vulnerability | 2022-08-09T07:00:00.000Z | 2022-08-09T07:00:00.000Z |
| msrc_cve-2022-35790 | Azure Site Recovery Elevation of Privilege Vulnerability | 2022-08-09T07:00:00.000Z | 2022-08-09T07:00:00.000Z |
| msrc_cve-2022-35789 | Azure Site Recovery Elevation of Privilege Vulnerability | 2022-08-09T07:00:00.000Z | 2022-08-09T07:00:00.000Z |
| msrc_cve-2022-35788 | Azure Site Recovery Elevation of Privilege Vulnerability | 2022-08-09T07:00:00.000Z | 2022-08-09T07:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-201404-0120 | The Network Analysis tab (Main_Analysis_Content.asp) in the ASUS RT-AC68U and other RT se… | 2025-04-13T23:25:28.745000Z |
| var-201404-0433 | Juniper ScreenOS 6.3 and earlier allows remote attackers to cause a denial of service (cr… | 2025-04-13T23:25:28.702000Z |
| var-201405-0219 | Double free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.10 and 11.x before… | 2025-04-13T23:25:24.901000Z |
| var-201405-0302 | Unspecified vulnerability in the Diffie-Hellman key agreement implementation in the manag… | 2025-04-13T23:25:24.786000Z |
| var-201405-0303 | Unspecified vulnerability in the management GUI in Citrix NetScaler Application Delivery … | 2025-04-13T23:25:24.752000Z |
| var-201405-0469 | Cross-site scripting (XSS) vulnerability in Cisco Unified Web and E-mail Interaction Mana… | 2025-04-13T23:25:24.661000Z |
| var-201406-0305 | SQL injection vulnerability in BulkViewFileContentsAction.java in the Java interface in C… | 2025-04-13T23:25:24.256000Z |
| var-201407-0031 | config/userAdmin/login.tdf in Infoblox NetMRI before 6.8.5 allows remote attackers to exe… | 2025-04-13T23:25:24.108000Z |
| var-201407-0032 | Infoblox NetMRI before 6.8.5 has a default password of admin for the "root" MySQL databas… | 2025-04-13T23:25:24.077000Z |
| var-201407-0352 | The ZTE ZXV10 W300 router with firmware W300V1.0.0a_ZRD_LK has a default password of admi… | 2025-04-13T23:25:23.815000Z |
| var-201406-0150 | Cross-site request forgery (CSRF) vulnerability in the ZTE ZXV10 W300 router with firmwar… | 2025-04-13T23:25:23.773000Z |
| var-201407-0242 | ZTE ZXV10 W300 router with firmware W300V1.0.0a_ZRD_LK stores sensitive information under… | 2025-04-13T23:25:23.731000Z |
| var-201407-0373 | The NTP implementation in Cisco IOS and IOS XE does not properly support use of the acces… | 2025-04-13T23:25:23.693000Z |
| var-201407-0375 | Heap-based buffer overflow in the file-sharing feature in WebEx Meetings Client in Cisco … | 2025-04-13T23:25:23.659000Z |
| var-201407-0438 | Cross-site scripting (XSS) vulnerability in the web interface on the Huawei E355 CH1E355S… | 2025-04-13T23:25:23.560000Z |
| var-201407-0480 | Juniper Junos 11.4 before 11.4R12, 12.1 before 12.1R10, 12.1X44 before 12.1X44-D35, 12.1X… | 2025-04-13T23:25:23.500000Z |
| var-201408-0155 | The Session Manager component in Packet Data Network Gateway (aka PGW) in Cisco ASR 5000 … | 2025-04-13T23:25:23.186000Z |
| var-201408-0361 | Adobe Flash Player before 13.0.0.241 and 14.x before 14.0.0.176 on Windows and OS X and b… | 2025-04-13T23:25:23.095000Z |
| var-201409-0398 | The SSH module in the Integrated Management Controller (IMC) before 2.3.1 in Cisco Unifie… | 2025-04-13T23:25:22.906000Z |
| var-201409-0547 | Juniper Installer Service (JIS) Client 7.x before 7.4R6 for Windows and Junos Pulse Clien… | 2025-04-13T23:25:22.817000Z |
| var-201410-0062 | The authentication-manager process in the web framework in Cisco Intrusion Prevention Sys… | 2025-04-13T23:25:22.264000Z |
| var-201410-0376 | The Brocade Vyatta 5400 vRouter 6.4R(x), 6.6R(x), and 6.7R1 allows attackers to obtain se… | 2025-04-13T23:25:22.201000Z |
| var-201410-0375 | The management console on the Brocade Vyatta 5400 vRouter 6.4R(x), 6.6R(x), and 6.7R1 all… | 2025-04-13T23:25:22.164000Z |
| var-201410-0377 | /opt/vyatta/bin/sudo-users/vyatta-clear-dhcp-lease.pl on the Brocade Vyatta 5400 vRouter … | 2025-04-13T23:25:22.124000Z |
| var-201410-0931 | Juniper Junos 11.4 before R11, 12.1 before R9, 12.1X44 before D30, 12.1X45 before D20, 12… | 2025-04-13T23:25:21.871000Z |
| var-201411-0383 | The ViewPoint web application in Dell SonicWALL Global Management System (GMS) before 7.2… | 2025-04-13T23:25:21.294000Z |
| var-201412-0289 | Cisco-Meraki MS, MR, and MX devices with firmware before 2014-09-24 allow remote authenti… | 2025-04-13T23:25:20.866000Z |
| var-201412-0499 | Adobe Reader and Acrobat 10.x before 10.1.13 and 11.x before 11.0.10 on Windows and OS X … | 2025-04-13T23:25:20.585000Z |
| var-201412-0520 | DNP Master Driver 3.02 and earlier in Elipse SCADA 2.29 build 141 and earlier, E3 1.0 thr… | 2025-04-13T23:25:20.556000Z |
| var-201412-0564 | Ekahau B4 staff badge tag 5.7 with firmware 1.4.52, Real-Time Location System (RTLS) Cont… | 2025-04-13T23:25:20.526000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2021:3946-1 | Security update for gmp | 2021-12-06T13:58:05Z | 2021-12-06T13:58:05Z |
| suse-su-2021:3945-1 | Security update for python-Babel | 2021-12-06T13:57:29Z | 2021-12-06T13:57:29Z |
| suse-su-2021:3944-1 | Security update for glib-networking | 2021-12-06T13:56:37Z | 2021-12-06T13:56:37Z |
| suse-su-2021:3943-1 | Recommended update for php7 | 2021-12-06T13:47:01Z | 2021-12-06T13:47:01Z |
| suse-su-2021:3942-1 | Security update for brotli | 2021-12-06T13:46:22Z | 2021-12-06T13:46:22Z |
| suse-su-2021:3941-1 | Security update for the Linux Kernel | 2021-12-06T13:46:00Z | 2021-12-06T13:46:00Z |
| suse-su-2021:3940-1 | Security update for nodejs12 | 2021-12-06T13:43:50Z | 2021-12-06T13:43:50Z |
| suse-su-2021:3939-1 | Security update for mozilla-nss | 2021-12-06T13:42:38Z | 2021-12-06T13:42:38Z |
| suse-su-2021:3938-1 | Security update for wireshark | 2021-12-06T13:42:15Z | 2021-12-06T13:42:15Z |
| suse-su-2021:3935-1 | Security update for the Linux Kernel | 2021-12-06T12:28:40Z | 2021-12-06T12:28:40Z |
| suse-su-2021:3934-1 | Security update for mozilla-nss | 2021-12-06T12:23:32Z | 2021-12-06T12:23:32Z |
| suse-su-2021:3933-1 | Security update for the Linux Kernel | 2021-12-06T10:35:54Z | 2021-12-06T10:35:54Z |
| suse-su-2021:3929-1 | Security update for the Linux Kernel | 2021-12-06T09:57:42Z | 2021-12-06T09:57:42Z |
| suse-su-2021:3927-1 | Security update for php74 | 2021-12-06T09:29:16Z | 2021-12-06T09:29:16Z |
| suse-su-2021:3899-1 | Security update for aaa_base | 2021-12-03T10:28:58Z | 2021-12-03T10:28:58Z |
| suse-su-2021:3888-1 | Security update for xen | 2021-12-03T08:47:48Z | 2021-12-03T08:47:48Z |
| suse-su-2021:3887-1 | Security update for openssh | 2021-12-03T08:47:21Z | 2021-12-03T08:47:21Z |
| suse-su-2021:3886-1 | Security update for nodejs14 | 2021-12-02T12:51:24Z | 2021-12-02T12:51:24Z |
| suse-su-2021:3878-1 | Security update for gmp | 2021-12-02T08:14:01Z | 2021-12-02T08:14:01Z |
| suse-su-2021:3877-1 | Security update for the Linux Kernel | 2021-12-02T07:20:11Z | 2021-12-02T07:20:11Z |
| suse-su-2021:3876-1 | Security update for the Linux Kernel | 2021-12-02T07:19:48Z | 2021-12-02T07:19:48Z |
| suse-su-2021:3875-1 | Security update for openssh | 2021-12-02T07:19:04Z | 2021-12-02T07:19:04Z |
| suse-su-2021:3874-1 | Security update for webkit2gtk3 | 2021-12-02T07:18:47Z | 2021-12-02T07:18:47Z |
| suse-su-2021:3873-1 | Security update for netcdf | 2021-12-02T07:18:13Z | 2021-12-02T07:18:13Z |
| suse-su-2021:3861-1 | Security update for webkit2gtk3 | 2021-12-01T17:41:24Z | 2021-12-01T17:41:24Z |
| suse-su-2021:3860-1 | Security update for speex | 2021-12-01T16:05:22Z | 2021-12-01T16:05:22Z |
| suse-su-2021:3859-1 | Security update for clamav | 2021-12-01T16:03:03Z | 2021-12-01T16:03:03Z |
| suse-su-2021:3858-1 | Security update for speex | 2021-12-01T16:02:26Z | 2021-12-01T16:02:26Z |
| suse-su-2021:3857-1 | Security update for python-sqlparse | 2021-12-01T16:02:13Z | 2021-12-01T16:02:13Z |
| suse-su-2021:14850-1 | Security update for clamav | 2021-12-01T16:02:06Z | 2021-12-01T16:02:06Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-02555 | Linux Kernel内存错误引用漏洞(CNVD-2025-02555) | 2025-01-08 | 2025-02-06 |
| cnvd-2025-02554 | Linux kernel使用后释放漏洞 | 2025-01-08 | 2025-02-06 |
| cnvd-2025-02553 | IBM Engineering Lifecycle Optimization Publishing SQL注入漏洞 | 2025-01-10 | 2025-02-06 |
| cnvd-2025-02552 | Apache OpenMeetings代码问题漏洞 | 2025-01-10 | 2025-02-06 |
| cnvd-2025-02551 | Huawei HarmonyOS账号模块权限提升漏洞 | 2025-01-13 | 2025-02-06 |
| cnvd-2025-02550 | Linux kernel缓冲区溢出漏洞(CNVD-2025-02550) | 2025-01-13 | 2025-02-06 |
| cnvd-2025-02549 | IBM Security ReaQta信息泄露漏洞 | 2025-01-16 | 2025-02-06 |
| cnvd-2025-02548 | IBM Concert信息泄露漏洞(CNVD-2025-02548) | 2025-01-16 | 2025-02-06 |
| cnvd-2025-02547 | IBM Concert输入验证错误漏洞(CNVD-2025-02547) | 2025-01-16 | 2025-02-06 |
| cnvd-2025-02546 | IBM Concert加密问题漏洞(CNVD-2025-02546) | 2025-01-16 | 2025-02-06 |
| cnvd-2025-02545 | IBM Cognos Controller和IBM Controller信任管理问题漏洞 | 2025-01-16 | 2025-02-06 |
| cnvd-2025-02544 | Linux kernel代码问题漏洞(CNVD-2025-02544) | 2025-01-16 | 2025-02-06 |
| cnvd-2025-02543 | Huawei HarmonyOS权限许可和访问控制问题漏洞(CNVD-2025-02543) | 2025-01-16 | 2025-02-06 |
| cnvd-2025-02542 | Huawei HarmonyOS输入验证错误漏洞(CNVD-2025-02542) | 2025-01-16 | 2025-02-06 |
| cnvd-2025-02541 | WAVLINK AC3000 internet.cgi set_qos函数的cli_mac参数缓冲区溢出漏洞 | 2025-01-17 | 2025-02-06 |
| cnvd-2025-02540 | WAVLINK AC3000 internet.cgi set_add_routing函数缓冲区溢出漏洞 | 2025-01-17 | 2025-02-06 |
| cnvd-2025-02539 | Microsoft Windows资源管理错误漏洞(CNVD-2025-02539) | 2025-01-17 | 2025-02-06 |
| cnvd-2025-02538 | Microsoft Windows Telephony Server存在未明漏洞(CNVD-2025-02538) | 2025-01-17 | 2025-02-06 |
| cnvd-2025-02537 | Microsoft Windows Secure Boot存在未明漏洞(CNVD-2025-02537) | 2025-01-17 | 2025-02-06 |
| cnvd-2025-02536 | Microsoft Windows Kernel日志信息泄露漏洞 | 2025-01-17 | 2025-02-06 |
| cnvd-2025-02535 | Microsoft Windows Kernel日志信息泄露漏洞(CNVD-2025-02535) | 2025-01-17 | 2025-02-06 |
| cnvd-2025-02534 | Microsoft Windows BitLocker信息泄露漏洞(CNVD-2025-02534) | 2025-01-17 | 2025-02-06 |
| cnvd-2025-02533 | Tenda AC10命令注入漏洞 | 2025-01-23 | 2025-02-06 |
| cnvd-2025-02532 | IBM CICS TX Advanced跨站脚本漏洞(CNVD-2025-02532) | 2025-01-23 | 2025-02-06 |
| cnvd-2025-02531 | D-Link DIR-816A2 formDMZ.cgi组件访问控制错误漏洞 | 2025-01-23 | 2025-02-06 |
| cnvd-2025-02530 | IBM Sterling B2B Integrator跨站脚本漏洞(CNVD-2025-02530) | 2025-01-23 | 2025-02-06 |
| cnvd-2025-02529 | Fortinet FortiOS存在未明漏洞(CNVD-2025-02529) | 2025-01-23 | 2025-02-06 |
| cnvd-2025-02528 | Fortinet FortiManager操作系统命令注入漏洞 | 2025-01-23 | 2025-02-06 |
| cnvd-2025-02527 | Fortinet FortiDeceptor访问控制错误漏洞 | 2025-01-23 | 2025-02-06 |
| cnvd-2025-02526 | Fortinet FortiClientEMS输入验证错误漏洞 | 2025-01-23 | 2025-02-06 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2012-avi-708 | Vulnérabilité dans les imprimantes HP LaserJet Pro 400 | 2012-12-07T00:00:00.000000 | 2012-12-07T00:00:00.000000 |
| certa-2012-avi-707 | Vulnérabilité dans ISC BIND | 2012-12-07T00:00:00.000000 | 2012-12-07T00:00:00.000000 |
| certa-2012-avi-706 | Multiples vulnérabilités dans Apache Tomcat | 2012-12-07T00:00:00.000000 | 2012-12-07T00:00:00.000000 |
| certa-2012-avi-705 | Multiples vulnérabilités dans le système SCADA Schneider Electric Ezylog | 2012-12-07T00:00:00.000000 | 2012-12-07T00:00:00.000000 |
| certa-2012-avi-704 | Multiples vulnérabilités dans Citrix XenServer | 2012-12-05T00:00:00.000000 | 2012-12-05T00:00:00.000000 |
| certa-2012-avi-703 | Multiples vulnérabilités dans Xen | 2012-12-05T00:00:00.000000 | 2012-12-05T00:00:00.000000 |
| certa-2012-avi-702 | Vulnérabilité dans F5 FirePass | 2012-12-03T00:00:00.000000 | 2012-12-03T00:00:00.000000 |
| certa-2012-avi-701 | Vulnérabilité dans MariaDB | 2012-12-03T00:00:00.000000 | 2012-12-03T00:00:00.000000 |
| certa-2012-avi-700 | Multiples vulnérabilités dans McAfee Email Gateway | 2012-12-03T00:00:00.000000 | 2012-12-03T00:00:00.000000 |
| certa-2012-avi-699 | Vulnérabilité dans Google Chrome OS | 2012-12-03T00:00:00.000000 | 2012-12-03T00:00:00.000000 |
| certa-2012-avi-698 | Multiples vulnérabilités dans libssh | 2012-12-03T00:00:00.000000 | 2012-12-03T00:00:00.000000 |
| certa-2012-avi-697 | Vulnérabilité dans Dovecot | 2012-12-03T00:00:00.000000 | 2012-12-03T00:00:00.000000 |
| certa-2012-avi-696 | Multiples vulnérabilités dans les produits Hitachi | 2012-12-03T00:00:00.000000 | 2012-12-03T00:00:00.000000 |
| certa-2012-avi-695 | Vulnérabilité dans IBM WebSphere Message Broker | 2012-12-03T00:00:00.000000 | 2012-12-03T00:00:00.000000 |
| certa-2012-avi-694 | Multiples vulnérabilités dans IBM DOORS Web Access | 2012-12-03T00:00:00.000000 | 2012-12-03T00:00:00.000000 |
| certa-2012-avi-693 | Multiples vulnérabilités dans IBM Lotus Symphony | 2012-12-03T00:00:00.000000 | 2012-12-03T00:00:00.000000 |
| certa-2012-avi-692 | Multiples vulnérabilités dans Wireshark | 2012-11-30T00:00:00.000000 | 2012-11-30T00:00:00.000000 |
| certa-2012-avi-691 | Multiples vulnérabilités dans Apple TV | 2012-11-30T00:00:00.000000 | 2012-11-30T00:00:00.000000 |
| certa-2012-avi-690 | Multiples vulnérabilités dans Google Chrome | 2012-11-30T00:00:00.000000 | 2012-11-30T00:00:00.000000 |
| certa-2012-avi-689 | Vulnérabilité dans IBM Rational Developer for System z | 2012-11-29T00:00:00.000000 | 2012-11-29T00:00:00.000000 |
| certa-2012-avi-688 | Vulnérabilité dans IBM Tivoli Management Framework | 2012-11-29T00:00:00.000000 | 2012-11-29T00:00:00.000000 |
| certa-2012-avi-687 | Vulnérabilité dans rssh | 2012-11-29T00:00:00.000000 | 2012-11-29T00:00:00.000000 |
| certa-2012-avi-686 | Multiples vulnérabilités dans Google Chrome | 2012-11-27T00:00:00.000000 | 2012-11-27T00:00:00.000000 |
| certa-2012-avi-685 | Vulnérabilité dans Avaya Call Management System | 2012-11-23T00:00:00.000000 | 2012-11-23T00:00:00.000000 |
| certa-2012-avi-684 | Vulnérabilité dans IBM Tivoli Endpoint Manager | 2012-11-23T00:00:00.000000 | 2012-11-23T00:00:00.000000 |
| certa-2012-avi-683 | Multiples vulnérabilités dans les produits Symantec | 2012-11-22T00:00:00.000000 | 2012-11-22T00:00:00.000000 |
| certa-2012-avi-682 | Multiples vulnérabilités dans Mozilla Firefox et Thunderbird | 2012-11-22T00:00:00.000000 | 2012-11-22T00:00:00.000000 |
| certa-2012-avi-681 | Multiples vulnérabilités dans Mozilla Firefox et Thunderbird édition longue durée | 2012-11-22T00:00:00.000000 | 2012-11-22T00:00:00.000000 |
| certa-2012-avi-680 | Multiples vulnérabilités dans Mozilla SeaMonkey | 2012-11-22T00:00:00.000000 | 2012-11-22T00:00:00.000000 |
| certa-2012-avi-679 | Vulnérabilité dans Oracle Solaris ISC DHCP | 2012-11-22T00:00:00.000000 | 2012-11-22T00:00:00.000000 |