Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2024-21917 |
9.8 (3.1)
|
Rockwell Automation FactoryTalk® Service Platform Serv… |
Rockwell Automation |
FactoryTalk® Service Platform |
2024-01-31T18:16:27.949Z | 2026-01-15T15:34:26.092Z |
| CVE-2025-13859 |
6.4 (3.1)
|
AffiliateX 1.0.0 - 1.3.9.3 - Authenticated (Subscriber… |
wpcenter |
AffiliateX – Amazon Affiliate Plugin |
2026-01-15T13:23:25.118Z | 2026-01-15T15:33:05.125Z |
| CVE-2026-0887 |
4.3 (3.1)
|
Clickjacking issue, information disclosure in the PDF … |
Mozilla |
Firefox |
2026-01-13T13:30:57.847Z | 2026-01-15T15:32:44.439Z |
| CVE-2026-0890 |
5.4 (3.1)
|
Spoofing issue in the DOM: Copy & Paste and Drag & Dro… |
Mozilla |
Firefox |
2026-01-13T13:30:59.089Z | 2026-01-15T15:30:48.870Z |
| CVE-2026-22818 |
8.2 (3.1)
|
JWT algorithm confusion in Hono JWK Auth Middleware wh… |
honojs |
hono |
2026-01-13T19:49:52.042Z | 2026-01-15T15:29:39.849Z |
| CVE-2025-67078 |
N/A
|
Cross site scripting (XSS) vulnerability in Omnis… |
n/a |
n/a |
2026-01-15T00:00:00.000Z | 2026-01-15T15:16:33.707Z |
| CVE-2025-70744 |
7.5 (3.1)
|
Tenda AX-1806 v1.0.0.1 was discovered to contain … |
n/a |
n/a |
2026-01-15T00:00:00.000Z | 2026-01-15T15:08:20.236Z |
| CVE-2024-50566 |
7.2 (3.1)
|
A improper neutralization of special elements use… |
Fortinet |
FortiManager |
2025-01-14T14:08:35.384Z | 2026-01-15T15:05:48.819Z |
| CVE-2025-71019 |
7.5 (3.1)
|
Tenda AX-1806 v1.0.0.1 was discovered to contain … |
n/a |
n/a |
2026-01-15T00:00:00.000Z | 2026-01-15T15:04:49.969Z |
| CVE-2025-53843 |
6.9 (3.1)
|
A stack-based buffer overflow vulnerability in Fo… |
Fortinet |
FortiOS |
2025-11-18T17:01:28.239Z | 2026-01-15T14:53:16.203Z |
| CVE-2026-22032 |
4.3 (3.1)
|
Directus has open redirect in SAML |
directus |
directus |
2026-01-08T14:32:06.619Z | 2026-01-15T14:53:09.871Z |
| CVE-2026-22644 |
5.3 (3.1)
|
Certain requests pass the authentication token in… |
SICK AG |
Incoming Goods Suite |
2026-01-15T13:14:13.694Z | 2026-01-15T14:52:44.218Z |
| CVE-2026-0600 |
6.2 (4.0)
|
Nexus Repository 3 - Server-Side Request Forgery in Pr… |
Sonatype |
Nexus Repository |
2026-01-14T22:29:09.256Z | 2026-01-15T14:51:42.898Z |
| CVE-2025-13455 |
7.3 (4.0)
7.8 (3.1)
|
A vulnerability was reported in ThinkPlus configu… |
Lenovo |
ThinkPlus FU100 |
2026-01-14T22:18:24.196Z | 2026-01-15T14:49:46.172Z |
| CVE-2025-14457 |
3.7 (3.1)
|
Drag and Drop Multiple File Upload for Contact Form 7 … |
glenwpcoder |
Drag and Drop Multiple File Upload for Contact Form 7 |
2026-01-15T06:45:04.078Z | 2026-01-15T14:47:51.069Z |
| CVE-2025-14448 |
5.4 (3.1)
|
WP-Members Membership Plugin <= 3.5.4.3 - Authenticate… |
cbutlerjr |
WP-Members Membership Plugin |
2026-01-15T05:24:19.163Z | 2026-01-15T14:47:50.023Z |
| CVE-2026-0976 |
3.7 (3.1)
|
Org.keycloak/keycloak-quarkus-server: keycloak: proxy … |
Red Hat |
Red Hat Build of Keycloak |
2026-01-15T12:06:21.251Z | 2026-01-15T14:45:41.540Z |
| CVE-2026-0601 |
5.1 (4.0)
|
Nexus Repository 3 - Cross-Site Scripting |
Sonatype |
Nexus Repository |
2026-01-14T22:05:17.135Z | 2026-01-15T14:43:42.991Z |
| CVE-2026-22907 |
9.9 (3.1)
|
An attacker may gain unauthorized access to the h… |
SICK AG |
TDC-X401GL |
2026-01-15T12:59:51.574Z | 2026-01-15T14:43:22.684Z |
| CVE-2026-22908 |
9.1 (3.1)
|
Uploading unvalidated container images may allow … |
SICK AG |
TDC-X401GL |
2026-01-15T13:00:53.558Z | 2026-01-15T14:42:28.069Z |
| CVE-2026-22645 |
5.3 (3.1)
|
The application discloses all used components, ve… |
SICK AG |
Incoming Goods Suite |
2026-01-15T13:14:38.264Z | 2026-01-15T14:42:15.554Z |
| CVE-2026-22909 |
7.5 (3.1)
|
Certain system functions may be accessed without … |
SICK AG |
TDC-X401GL |
2026-01-15T13:01:27.582Z | 2026-01-15T14:41:39.360Z |
| CVE-2026-22910 |
7.5 (3.1)
|
The device is deployed with weak and publicly kno… |
SICK AG |
TDC-X401GL |
2026-01-15T13:02:02.021Z | 2026-01-15T14:40:17.107Z |
| CVE-2026-22911 |
5.3 (3.1)
|
Firmware update files may expose password hashes … |
SICK AG |
TDC-X401GL |
2026-01-15T13:02:29.453Z | 2026-01-15T14:39:02.055Z |
| CVE-2026-22917 |
4.3 (3.1)
|
Improper input handling in a system endpoint may … |
SICK AG |
TDC-X401GL |
2026-01-15T13:07:41.205Z | 2026-01-15T14:38:02.024Z |
| CVE-2025-47890 |
2.5 (3.1)
|
An URL Redirection to Untrusted Site vulnerabilit… |
Fortinet |
FortiSASE |
2025-10-14T15:22:50.356Z | 2026-01-15T14:37:59.566Z |
| CVE-2025-31366 |
4.5 (3.1)
|
An Improper Neutralization of Input During Web Pa… |
Fortinet |
FortiProxy |
2025-10-14T15:22:57.657Z | 2026-01-15T14:37:59.504Z |
| CVE-2025-12166 |
7.5 (3.1)
|
Simply Schedule Appointments <= 1.6.9.9 - Unauthentica… |
croixhaug |
Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin |
2026-01-14T22:23:50.629Z | 2026-01-15T14:37:41.267Z |
| CVE-2026-22918 |
4.3 (3.1)
|
An attacker may exploit missing protection agains… |
SICK AG |
TDC-X401GL |
2026-01-15T13:08:02.039Z | 2026-01-15T14:36:41.215Z |
| CVE-2025-58413 |
6.9 (3.1)
|
A stack-based buffer overflow vulnerability in Fo… |
Fortinet |
FortiOS |
2025-11-18T17:01:22.032Z | 2026-01-15T14:36:06.527Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-49915 |
9.3 (3.1)
|
WordPress SMS Alert Order Notifications plugin <= 3.8.… |
Cozy Vision |
SMS Alert Order Notifications |
2025-10-22T14:32:12.221Z | 2026-01-20T14:28:07.416Z |
| CVE-2025-49914 |
6.5 (3.1)
|
WordPress Restaurant Menu by MotoPress plugin <= 2.4.7… |
jetmonsters |
Restaurant Menu by MotoPress |
2025-12-18T07:21:43.896Z | 2026-01-20T14:28:07.321Z |
| CVE-2025-49913 |
5.3 (3.1)
|
WordPress CoSchedule plugin <= 3.4.0 - Broken Access C… |
CoSchedule |
CoSchedule |
2025-10-22T14:32:11.977Z | 2026-01-20T14:28:07.305Z |
| CVE-2025-49912 |
5.9 (3.1)
|
WordPress Email Subscription Popup plugin <= 1.2.26 - … |
Nks |
Email Subscription Popup |
2025-10-22T14:32:11.545Z | 2026-01-20T14:28:07.305Z |
| CVE-2025-49911 |
7.1 (3.1)
|
WordPress WooCommerce Vehicle Parts Finder plugin <= 3… |
wpinstinct |
WooCommerce Vehicle Parts Finder |
2025-10-22T14:32:11.293Z | 2026-01-20T14:28:07.298Z |
| CVE-2025-49910 |
8.2 (3.1)
|
WordPress WPGuppy plugin <= 1.1.4 - Broken Access Cont… |
AmentoTech Private Limited |
WPGuppy |
2025-10-22T14:32:11.095Z | 2026-01-20T14:28:07.272Z |
| CVE-2025-49909 |
6.1 (3.1)
|
WordPress Penci Bookmark & Follow plugin < 2.4 - Cross… |
PenciDesign |
Penci Bookmark & Follow |
2025-11-06T15:53:56.279Z | 2026-01-20T14:28:07.191Z |
| CVE-2025-49907 |
4.3 (3.1)
|
WordPress MDTF plugin <= 1.3.3.9 - Broken Access Contr… |
RealMag777 |
MDTF |
2025-10-22T14:32:10.614Z | 2026-01-20T14:28:07.207Z |
| CVE-2025-49906 |
5.3 (3.1)
|
WordPress WPComplete plugin <= 2.9.5.3 - Broken Access… |
StellarWP |
WPComplete |
2025-10-22T14:32:10.402Z | 2026-01-20T14:28:07.214Z |
| CVE-2025-49905 |
6.1 (3.1)
|
WordPress Range Slider Addon for Gravity Forms plugin … |
PluginsCafe |
Range Slider Addon for Gravity Forms |
2025-11-06T15:53:55.700Z | 2026-01-20T14:28:07.161Z |
| CVE-2025-49904 |
6.1 (3.1)
|
WordPress Booking and Rental Manager plugin <= 2.5.3 -… |
magepeopleteam |
Booking and Rental Manager |
2025-11-06T15:53:55.162Z | 2026-01-20T14:28:07.157Z |
| CVE-2025-49903 |
5.3 (3.1)
|
WordPress ZoloBlocks plugin <= 2.3.11 - Broken Access … |
bdthemes |
ZoloBlocks |
2025-10-22T14:32:10.215Z | 2026-01-20T14:28:07.088Z |
| CVE-2025-49902 |
6.5 (3.1)
|
WordPress Login Page Customizer – Customizer Login Pag… |
A WP Life |
Login Page Customizer – Customizer Login Page, Admin Page, Custom Design |
2025-12-18T07:21:43.721Z | 2026-01-20T14:28:07.158Z |
| CVE-2025-49901 |
9.8 (3.1)
|
WordPress Simple Link Directory plugin < 14.8.1 - Brok… |
quantumcloud |
Simple Link Directory |
2025-10-22T14:32:10.033Z | 2026-01-20T14:28:07.087Z |
| CVE-2025-49900 |
8.8 (3.1)
|
WordPress Advanced scrollbar plugin <= 1.1.8 - Privile… |
bPlugins |
Advanced scrollbar |
2025-11-06T15:53:54.586Z | 2026-01-20T14:28:07.207Z |
| CVE-2025-49899 |
5.3 (3.1)
|
WordPress Whydonate plugin <= 4.0.15 - Broken Access C… |
jjlemstra |
Whydonate |
2025-10-22T14:32:09.852Z | 2026-01-20T14:28:07.136Z |
| CVE-2025-49398 |
6.1 (3.1)
|
WordPress Easy Appointments plugin <= 3.12.14 - Conten… |
Easy Appointments |
Easy Appointments |
2025-11-06T15:53:53.979Z | 2026-01-20T14:28:07.235Z |
| CVE-2025-49394 |
8.8 (3.1)
|
WordPress Image Gallery block – Create and display pho… |
bPlugins |
Image Gallery block – Create and display photo gallery/photo album. |
2025-11-06T15:53:53.230Z | 2026-01-20T14:28:07.162Z |
| CVE-2025-49393 |
9.8 (3.1)
|
WordPress Sign-up Sheets Plugin <= 2.3.2 - PHP Object … |
Fetch Designs |
Sign-up Sheets |
2025-11-06T15:53:52.480Z | 2026-01-20T14:28:07.151Z |
| CVE-2025-49390 |
5.4 (3.1)
|
WordPress Cookie Notice & Consent plugin <= 1.6.4 - Cr… |
christophrado |
Cookie Notice & Consent |
2025-11-06T15:53:51.739Z | 2026-01-20T14:28:07.140Z |
| CVE-2025-49386 |
9.8 (3.1)
|
WordPress Preserve Code Formatting Plugin <= 4.0.1 - P… |
Scott Reilly |
Preserve Code Formatting |
2025-11-06T15:53:50.934Z | 2026-01-20T14:28:07.161Z |
| CVE-2025-49380 |
5.3 (3.1)
|
WordPress WooCommerce Vehicle Parts Finder plugin <= 3… |
wpinstinct |
WooCommerce Vehicle Parts Finder |
2025-10-22T14:32:09.626Z | 2026-01-20T14:28:07.252Z |
| CVE-2025-49379 |
7.2 (3.1)
|
WordPress Custom Fields Account Registration For Wooco… |
silverplugins217 |
Custom Fields Account Registration For Woocommerce |
2025-12-18T07:21:43.532Z | 2026-01-20T14:28:07.231Z |
| CVE-2025-49378 |
8.5 (3.1)
|
WordPress Hydra Booking plugin <= 1.1.10 - SQL Injecti… |
Themefic |
Hydra Booking |
2025-10-22T14:32:09.452Z | 2026-01-20T14:28:07.184Z |
| CVE-2025-49377 |
7.5 (3.1)
|
WordPress Hydra Booking plugin <= 1.1.9 - Broken Acces… |
Themefic |
Hydra Booking |
2025-10-22T14:32:09.195Z | 2026-01-20T14:28:07.238Z |
| CVE-2025-49376 |
7.5 (3.1)
|
WordPress DELUCKS SEO plugin <= 2.5.9 - Broken Access … |
DELUCKS |
DELUCKS SEO |
2025-10-22T14:32:08.837Z | 2026-01-20T14:28:07.149Z |
| CVE-2025-49374 |
5.3 (3.1)
|
WordPress Captcha.eu plugin <= 1.0.61 - Server Side Re… |
captcha.eu |
Captcha.eu |
2025-10-22T14:32:08.617Z | 2026-01-20T14:28:07.159Z |
| CVE-2025-49373 |
4.3 (3.1)
|
WordPress Evergreen Content Poster plugin <= 1.4.5 - C… |
Evergreen Content Poster |
Evergreen Content Poster |
2025-10-22T14:32:08.403Z | 2026-01-20T14:28:07.162Z |
| CVE-2025-49372 |
10 (3.1)
|
WordPress HAPPY plugin <= 1.0.7 - Remote Code Executio… |
VillaTheme |
HAPPY |
2025-11-06T15:53:50.181Z | 2026-01-20T14:28:07.159Z |
| CVE-2025-49371 |
8.1 (3.1)
|
WordPress Strux theme <= 1.9 - Local File Inclusion vu… |
AncoraThemes |
Strux |
2025-12-18T07:21:43.355Z | 2026-01-20T14:28:07.119Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-49915 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2025-10-22T15:15:37.440 | 2026-01-20T15:16:40.510 |
| fkie_cve-2025-49914 | Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in jetmons… | 2025-12-18T08:15:51.957 | 2026-01-20T15:16:40.387 |
| fkie_cve-2025-49913 | Missing Authorization vulnerability in CoSchedule CoSchedule coschedule-by-todaymade allows Exploit… | 2025-10-22T15:15:37.317 | 2026-01-20T15:16:40.257 |
| fkie_cve-2025-49912 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-10-22T15:15:37.183 | 2026-01-20T15:16:40.117 |
| fkie_cve-2025-49911 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-10-22T15:15:37.043 | 2026-01-20T15:16:39.980 |
| fkie_cve-2025-49910 | Missing Authorization vulnerability in AmentoTech Private Limited WPGuppy wpguppy-lite allows Acces… | 2025-10-22T15:15:36.913 | 2026-01-20T15:16:39.847 |
| fkie_cve-2025-49909 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-11-06T16:15:54.583 | 2026-01-20T15:16:39.717 |
| fkie_cve-2025-49907 | Missing Authorization vulnerability in RealMag777 MDTF wp-meta-data-filter-and-taxonomy-filter allo… | 2025-10-22T15:15:36.643 | 2026-01-20T15:16:39.447 |
| fkie_cve-2025-49906 | Missing Authorization vulnerability in StellarWP WPComplete wpcomplete allows Accessing Functionali… | 2025-10-22T15:15:36.503 | 2026-01-20T15:16:39.313 |
| fkie_cve-2025-49905 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-11-06T16:15:54.430 | 2026-01-20T15:16:39.180 |
| fkie_cve-2025-49904 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-11-06T16:15:54.243 | 2026-01-20T15:16:39.050 |
| fkie_cve-2025-49903 | Missing Authorization vulnerability in bdthemes ZoloBlocks zoloblocks allows Exploiting Incorrectly… | 2025-10-22T15:15:36.377 | 2026-01-20T15:16:38.917 |
| fkie_cve-2025-49902 | Missing Authorization vulnerability in A WP Life Login Page Customizer – Customizer Login Pag… | 2025-12-18T08:15:51.817 | 2026-01-20T15:16:38.783 |
| fkie_cve-2025-49901 | Authentication Bypass Using an Alternate Path or Channel vulnerability in quantumcloud Simple Link … | 2025-10-22T15:15:36.243 | 2026-01-20T15:16:38.650 |
| fkie_cve-2025-49900 | Incorrect Privilege Assignment vulnerability in bPlugins Advanced scrollbar advanced-scrollbar allo… | 2025-11-06T16:15:54.070 | 2026-01-20T15:16:38.510 |
| fkie_cve-2025-49899 | Missing Authorization vulnerability in jjlemstra Whydonate wp-whydonate allows Accessing Functional… | 2025-10-22T15:15:36.110 | 2026-01-20T15:16:38.370 |
| fkie_cve-2025-49398 | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Easy… | 2025-11-06T16:15:53.890 | 2026-01-20T15:16:38.237 |
| fkie_cve-2025-49394 | Missing Authorization vulnerability in bPlugins Image Gallery block – Create and display photo gall… | 2025-11-06T16:15:53.720 | 2026-01-20T15:16:38.103 |
| fkie_cve-2025-49393 | Deserialization of Untrusted Data vulnerability in Fetch Designs Sign-up Sheets sign-up-sheets allo… | 2025-11-06T16:15:53.413 | 2026-01-20T15:16:37.970 |
| fkie_cve-2025-49390 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-11-06T16:15:53.260 | 2026-01-20T15:16:37.833 |
| fkie_cve-2025-49386 | Deserialization of Untrusted Data vulnerability in Scott Reilly Preserve Code Formatting preserve-c… | 2025-11-06T16:15:53.103 | 2026-01-20T15:16:37.700 |
| fkie_cve-2025-49380 | Deserialization of Untrusted Data vulnerability in wpinstinct WooCommerce Vehicle Parts Finder woo-… | 2025-10-22T15:15:35.967 | 2026-01-20T15:16:37.560 |
| fkie_cve-2025-49379 | Incorrect Privilege Assignment vulnerability in silverplugins217 Custom Fields Account Registration… | 2025-12-18T08:15:51.683 | 2026-01-20T15:16:37.433 |
| fkie_cve-2025-49378 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2025-10-22T15:15:35.840 | 2026-01-20T15:16:37.303 |
| fkie_cve-2025-49377 | Missing Authorization vulnerability in Themefic Hydra Booking hydra-booking allows Exploiting Incor… | 2025-10-22T15:15:35.720 | 2026-01-20T15:16:37.163 |
| fkie_cve-2025-49376 | Missing Authorization vulnerability in DELUCKS DELUCKS SEO delucks-seo allows Accessing Functionali… | 2025-10-22T15:15:35.597 | 2026-01-20T15:16:37.027 |
| fkie_cve-2025-49374 | Server-Side Request Forgery (SSRF) vulnerability in captcha.eu Captcha.eu captcha-eu allows Server … | 2025-10-22T15:15:35.447 | 2026-01-20T15:16:36.883 |
| fkie_cve-2025-49373 | Cross-Site Request Forgery (CSRF) vulnerability in Evergreen Content Poster Evergreen Content Poste… | 2025-10-22T15:15:35.297 | 2026-01-20T15:16:36.750 |
| fkie_cve-2025-49372 | Improper Control of Generation of Code ('Code Injection') vulnerability in VillaTheme HAPPY happy-h… | 2025-11-06T16:15:52.940 | 2026-01-20T15:16:36.610 |
| fkie_cve-2025-49371 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T08:15:51.553 | 2026-01-20T15:16:36.480 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-3prx-3whg-2g43 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:50Z | 2026-01-02T18:30:50Z |
| ghsa-24mv-4mpc-v2fw |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:50Z | 2026-01-02T18:30:50Z |
| ghsa-qwr6-gwcg-v357 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:49Z | 2026-01-02T18:30:49Z |
| ghsa-qq89-xfpm-wjmh |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:49Z | 2026-01-02T18:30:49Z |
| ghsa-qgx7-v6f2-ccqp |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:48Z | 2026-01-02T18:30:49Z |
| ghsa-p9q3-wcm4-54jj |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:49Z | 2026-01-02T18:30:49Z |
| ghsa-p99q-r5g9-5xr2 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:49Z | 2026-01-02T18:30:49Z |
| ghsa-p2rc-98rg-wm73 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:48Z | 2026-01-02T18:30:49Z |
| ghsa-mv7r-xr4m-w3fq |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:49Z | 2026-01-02T18:30:49Z |
| ghsa-mcm7-6qhq-22c7 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:49Z | 2026-01-02T18:30:49Z |
| ghsa-jmwh-cvgw-qmgm |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:49Z | 2026-01-02T18:30:49Z |
| ghsa-jmf5-g73j-jj5x |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:49Z | 2026-01-02T18:30:49Z |
| ghsa-j927-rxfc-j668 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:49Z | 2026-01-02T18:30:49Z |
| ghsa-hwx9-r4mp-6gjr |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:49Z | 2026-01-02T18:30:49Z |
| ghsa-hqwq-3cjv-c8pw |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:49Z | 2026-01-02T18:30:49Z |
| ghsa-gv4m-hfv3-j6xv |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:49Z | 2026-01-02T18:30:49Z |
| ghsa-ghph-qrpr-2jv7 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:49Z | 2026-01-02T18:30:49Z |
| ghsa-fp5p-66g8-7h6m |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:49Z | 2026-01-02T18:30:49Z |
| ghsa-fcmc-rm9m-4w7p |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:49Z | 2026-01-02T18:30:49Z |
| ghsa-f6r8-r972-5c37 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:48Z | 2026-01-02T18:30:49Z |
| ghsa-9p43-v934-3mv6 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:49Z | 2026-01-02T18:30:49Z |
| ghsa-95wp-wf45-4vv5 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:49Z | 2026-01-02T18:30:49Z |
| ghsa-8cm5-gj29-hmcp |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:49Z | 2026-01-02T18:30:49Z |
| ghsa-7646-5479-c6pm |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:49Z | 2026-01-02T18:30:49Z |
| ghsa-54r8-2f2m-hq5r |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:49Z | 2026-01-02T18:30:49Z |
| ghsa-4h9w-7999-rxfm |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:49Z | 2026-01-02T18:30:49Z |
| ghsa-2xj5-8m5r-vjh5 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:49Z | 2026-01-02T18:30:49Z |
| ghsa-2q89-57vc-xfxv |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:48Z | 2026-01-02T18:30:49Z |
| ghsa-2p6j-qj7g-xj7q |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:49Z | 2026-01-02T18:30:49Z |
| ghsa-244h-ff82-7fpw |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:49Z | 2026-01-02T18:30:49Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-26205 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 2024-02-15T06:02:25.100783Z |
| gsd-2024-26218 | Windows Kernel Elevation of Privilege Vulnerability | 2024-02-15T06:02:25.100472Z |
| gsd-2024-26178 | Windows Kernel Elevation of Privilege Vulnerability | 2024-02-15T06:02:25.100122Z |
| gsd-2024-26221 | Windows DNS Server Remote Code Execution Vulnerability | 2024-02-15T06:02:25.099767Z |
| gsd-2024-26192 | Microsoft Edge (Chromium-based) Information Disclosure Vulnerability | 2024-02-15T06:02:25.099464Z |
| gsd-2024-26179 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 2024-02-15T06:02:25.099101Z |
| gsd-2024-26089 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-15T06:02:25.098732Z |
| gsd-2024-26237 | Windows Defender Credential Guard Elevation of Privilege Vulnerability | 2024-02-15T06:02:25.098433Z |
| gsd-2024-26116 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-15T06:02:25.098123Z |
| gsd-2024-26262 | EBM Technologies Uniweb/SoliPACS WebServer's query functionality lacks proper restriction… | 2024-02-15T06:02:25.097380Z |
| gsd-2024-26102 | Adobe Experience Manager versions 6.5.19 and earlier are affected by a reflected Cross-Si… | 2024-02-15T06:02:25.097005Z |
| gsd-2024-26114 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-15T06:02:25.096703Z |
| gsd-2024-26182 | Windows Kernel Elevation of Privilege Vulnerability | 2024-02-15T06:02:25.096417Z |
| gsd-2024-26095 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-15T06:02:25.096054Z |
| gsd-2024-26145 | Discourse Calendar adds the ability to create a dynamic calendar in the first post of a t… | 2024-02-15T06:02:25.095700Z |
| gsd-2024-26173 | Windows Kernel Elevation of Privilege Vulnerability | 2024-02-15T06:02:25.095340Z |
| gsd-2024-26142 | Rails is a web-application framework. Starting in version 7.1.0, there is a possible ReDo… | 2024-02-15T06:02:25.094983Z |
| gsd-2024-26166 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | 2024-02-15T06:02:25.094597Z |
| gsd-2024-26152 | ### Summary On all Label Studio versions prior to 1.11.0, data imported via file upload f… | 2024-02-15T06:02:25.094237Z |
| gsd-2024-26094 | Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site … | 2024-02-15T06:02:25.093864Z |
| gsd-2024-26083 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-15T06:02:25.093536Z |
| gsd-2024-26195 | DHCP Server Service Remote Code Execution Vulnerability | 2024-02-15T06:02:25.093239Z |
| gsd-2024-26121 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-15T06:02:25.092820Z |
| gsd-2024-23910 | Cross-site request forgery (CSRF) vulnerability in ELECOM wireless LAN routers allows a r… | 2024-02-15T06:02:24.915562Z |
| gsd-2024-1521 | The Elementor Website Builder Pro plugin for WordPress is vulnerable to Stored Cross-Site… | 2024-02-15T06:02:24.154449Z |
| gsd-2024-1492 | The WPify Woo Czech plugin for WordPress is vulnerable to unauthorized access of data due… | 2024-02-15T06:02:24.149593Z |
| gsd-2024-1512 | The MasterStudy LMS WordPress Plugin – for Online Courses and Education plugin for WordPr… | 2024-02-15T06:02:24.131382Z |
| gsd-2024-1507 | The Prime Slider – Addons For Elementor plugin for WordPress is vulnerable to Stored Cros… | 2024-02-15T06:02:24.106529Z |
| gsd-2024-1523 | EC-WEB FS-EZViewer(Web)'s query functionality lacks proper restrictions of user input, al… | 2024-02-15T06:02:24.103060Z |
| gsd-2024-1513 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-15T06:02:24.098314Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-184324 | Malicious code in modiov-kifni-ufbaa (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184323 | Malicious code in modiov-kifni-ufba (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184322 | Malicious code in modiov-kifni-ufb (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184321 | Malicious code in modiov-kifni-ufavuban (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184320 | Malicious code in modiov-kifni-ufavcuban (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184319 | Malicious code in modiov-kifni-ufavcsuban (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184318 | Malicious code in modiov-kifni-ufavcseuban (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184317 | Malicious code in modiov-kifni-ufavcsequban (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184316 | Malicious code in modiov-kifni-ufavcseqiuban (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184315 | Malicious code in modiov-kifni-ufavcseqinuban (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184314 | Malicious code in modiov-kifni-ufavcseqinsuban (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184313 | Malicious code in modiov-kifni-ufavcseqinsdxuban (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184312 | Malicious code in modiov-kifni-ufavcseqinsdxauban (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184311 | Malicious code in modiov-kifni-ufavcseqinsdxaoyuban (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184310 | Malicious code in modiov-kifni-ufavcseqinsdxaoycuuban (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184309 | Malicious code in modiov-kifni-ufavcseqinsdxaoycuruban (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184308 | Malicious code in modiov-kifni-ufavcseqinsdxaoycurpuban (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184307 | Malicious code in modiov-kifni-ufavcseqinsdxaoycurptvuban (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184306 | Malicious code in modiov-kifni-ufavcseqinsdxaoycurptvmuban (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184305 | Malicious code in modiov-kifni-ufavcseqinsdxaoycurptvmauban (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184304 | Malicious code in modiov-kifni-ufavcseqinsdxaoycurptvmaduuban (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184303 | Malicious code in modiov-kifni-ufavcseqinsdxaoycurptvmaduban (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184302 | Malicious code in modiov-kifni-ufavcseqinsdxaoycurptv-auban (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184301 | Malicious code in modiov-kifni-ufavcseqinsdxaoycurptuban (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184300 | Malicious code in modiov-kifni-ufavcseqinsdxaoycuban (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184299 | Malicious code in modiov-kifni-ufavcseqinsdxaouban (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184298 | Malicious code in modiov-kifni-ufavcseqinsduban (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184297 | Malicious code in modiov-kifni-ufauban (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184296 | Malicious code in modiov-kian-avumangib (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184295 | Malicious code in modiov-kian-avumangiab (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2024:1481 | Red Hat Security Advisory: java-1.8.0-ibm security update | 2024-03-25T18:14:38+00:00 | 2025-11-21T18:57:45+00:00 |
| rhsa-2024:1480 | Red Hat Security Advisory: libreoffice security update | 2024-03-25T17:45:48+00:00 | 2025-11-21T18:57:45+00:00 |
| rhsa-2024:1479 | Red Hat Security Advisory: squid:4 security update | 2024-03-25T17:08:34+00:00 | 2025-11-21T18:57:44+00:00 |
| rhsa-2024:1477 | Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 8.1.2 security update | 2024-03-25T00:33:15+00:00 | 2025-11-21T18:57:44+00:00 |
| rhsa-2024:1473 | Red Hat Security Advisory: libreoffice security update | 2024-03-21T16:29:08+00:00 | 2025-11-21T18:57:43+00:00 |
| rhsa-2024:1437 | Red Hat Security Advisory: postgresql security update | 2024-03-20T09:41:25+00:00 | 2025-11-21T18:57:39+00:00 |
| rhsa-2024:1431 | Red Hat Security Advisory: ruby:3.1 security, bug fix, and enhancement update | 2024-03-19T18:46:43+00:00 | 2025-11-21T18:57:35+00:00 |
| rhsa-2024:1429 | Red Hat Security Advisory: postgresql security update | 2024-03-19T18:09:57+00:00 | 2025-11-21T18:57:35+00:00 |
| rhsa-2024:1428 | Red Hat Security Advisory: postgresql security update | 2024-03-19T18:21:27+00:00 | 2025-11-21T18:57:34+00:00 |
| rhsa-2024:1427 | Red Hat Security Advisory: libreoffice security update | 2024-03-19T18:08:08+00:00 | 2025-11-21T18:57:34+00:00 |
| rhsa-2024:1426 | Red Hat Security Advisory: postgresql security update | 2024-03-19T18:12:02+00:00 | 2025-11-21T18:57:33+00:00 |
| rhsa-2024:1425 | Red Hat Security Advisory: libreoffice security update | 2024-03-19T17:57:12+00:00 | 2025-11-21T18:57:33+00:00 |
| rhsa-2024:1423 | Red Hat Security Advisory: libreoffice security update | 2024-03-19T17:46:32+00:00 | 2025-11-21T18:57:33+00:00 |
| rhsa-2024:1422 | Red Hat Security Advisory: postgresql security update | 2024-03-19T18:05:28+00:00 | 2025-11-21T18:57:33+00:00 |
| rhsa-2024:1417 | Red Hat Security Advisory: libX11 security update | 2024-03-19T17:32:28+00:00 | 2025-11-21T18:57:32+00:00 |
| rhsa-2024:1415 | Red Hat Security Advisory: edk2 security update | 2024-03-19T17:30:47+00:00 | 2025-11-21T18:57:31+00:00 |
| rhsa-2024:1412 | Red Hat Security Advisory: gmp update | 2024-03-19T17:34:51+00:00 | 2025-11-21T18:57:31+00:00 |
| rhsa-2024:1411 | Red Hat Security Advisory: opencryptoki security update | 2024-03-19T17:35:28+00:00 | 2025-11-21T18:57:30+00:00 |
| rhsa-2024:1409 | Red Hat Security Advisory: cups security update | 2024-03-19T17:38:02+00:00 | 2025-11-21T18:57:30+00:00 |
| rhsa-2024:1408 | Red Hat Security Advisory: emacs security update | 2024-03-19T18:23:38+00:00 | 2025-11-21T18:57:30+00:00 |
| rhsa-2024:1406 | Red Hat Security Advisory: bind security update | 2024-03-19T17:41:32+00:00 | 2025-11-21T18:57:29+00:00 |
| rhsa-2024:1403 | Red Hat Security Advisory: fwupd security update | 2024-03-19T17:41:07+00:00 | 2025-11-21T18:57:29+00:00 |
| rhsa-2024:1394 | Red Hat Security Advisory: ovn23.03 security update | 2024-03-19T15:46:57+00:00 | 2025-11-21T18:57:28+00:00 |
| rhsa-2024:1393 | Red Hat Security Advisory: ovn22.03 security update | 2024-03-19T15:47:23+00:00 | 2025-11-21T18:57:28+00:00 |
| rhsa-2024:1392 | Red Hat Security Advisory: ovn22.12 security update | 2024-03-19T15:46:20+00:00 | 2025-11-21T18:57:28+00:00 |
| rhsa-2024:1391 | Red Hat Security Advisory: ovn23.06 security update | 2024-03-19T15:46:15+00:00 | 2025-11-21T18:57:28+00:00 |
| rhsa-2024:1390 | Red Hat Security Advisory: ovn23.09 security update | 2024-03-19T15:46:14+00:00 | 2025-11-21T18:57:26+00:00 |
| rhsa-2024:1388 | Red Hat Security Advisory: ovn23.03 security update | 2024-03-19T15:42:17+00:00 | 2025-11-21T18:57:26+00:00 |
| rhsa-2024:1387 | Red Hat Security Advisory: ovn22.03 security update | 2024-03-19T15:39:52+00:00 | 2025-11-21T18:57:26+00:00 |
| rhsa-2024:1386 | Red Hat Security Advisory: ovn22.12 security update | 2024-03-19T15:40:13+00:00 | 2025-11-21T18:57:26+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2022-21363 | Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 6.6 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21362 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21358 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21357 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21356 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21355 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21352 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.9 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21351 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21348 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21344 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21342 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21339 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21337 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21336 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21335 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21334 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21333 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21332 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21331 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21330 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21329 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21328 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21327 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21326 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21325 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21324 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21323 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21321 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21320 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21319 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-201609-0488 | Huawei Unified Maintenance Audit (UMA) before V200R001C00SPC200 SPH206 allows remote auth… | 2025-04-13T23:09:29.314000Z |
| var-201610-0270 | SQL injection vulnerability in Cisco Firepower Management Center 4.10.3 through 5.4.0 all… | 2025-04-13T23:09:29Z |
| var-201610-0291 | A vulnerability in the Cisco Prime Infrastructure and Evolved Programmable Network Manage… | 2025-04-13T23:09:28.969000Z |
| var-201610-0375 | Ruckus Wireless H500 web management interface authentication bypass. The Ruckus Wireless … | 2025-04-13T23:09:28.939000Z |
| var-201612-0408 | Lack of appropriate exception handling in some receivers of the Telecom application on Sa… | 2025-04-13T23:09:27.718000Z |
| var-201612-0406 | Lack of appropriate exception handling in some receivers of the Telecom application on Sa… | 2025-04-13T23:09:27.687000Z |
| var-201612-0407 | Lack of appropriate exception handling in some receivers of the Telecom application on Sa… | 2025-04-13T23:09:27.653000Z |
| var-201501-0425 | The Windows Error Reporting (WER) component in Microsoft Windows 8, Windows 8.1, Windows … | 2025-04-13T23:09:26.263000Z |
| var-201601-0503 | The Microsoft (1) VBScript 5.7 and 5.8 and (2) JScript 5.7 and 5.8 engines, as used in In… | 2025-04-13T23:09:26.166000Z |
| var-201504-0446 | The communication module on the Hospira LifeCare PCA Infusion System before 7.0 does not … | 2025-04-13T23:09:18.868000Z |
| var-201507-0390 | Hospira LifeCare PCA Infusion System before 7.0 stores private keys and certificates, whi… | 2025-04-13T23:09:18.838000Z |
| var-201507-0391 | Hospira LifeCare PCA Infusion System 5.0 and earlier, and possibly other versions, allows… | 2025-04-13T23:09:18.777000Z |
| var-201507-0389 | Stack-based buffer overflow in Hospira LifeCare PCA Infusion System 5.0 and earlier, and … | 2025-04-13T23:09:18.747000Z |
| var-201509-0226 | Buffer overflow in form2ping.cgi on Philippine Long Distance Telephone (PLDT) SpeedSurf 5… | 2025-04-13T23:05:16.520000Z |
| var-201403-0054 | Directory traversal vulnerability in MayGion IP Cameras with firmware before 2013.04.22 (… | 2025-04-13T23:05:15.761000Z |
| var-201403-0055 | Buffer overflow in MayGion IP Cameras with firmware before 2013.04.22 (05.53) allows remo… | 2025-04-13T23:05:15.726000Z |
| var-201403-0243 | The administrative interface in Allied Telesis AT-RG634A ADSL Broadband router 3.3+, iMG6… | 2025-04-13T23:05:15.238000Z |
| var-201403-0306 | web_shell_cmd.gch on ZTE F460 and F660 cable modems allows remote attackers to obtain adm… | 2025-04-13T23:05:15.192000Z |
| var-201403-0474 | Multiple cross-site scripting (XSS) vulnerabilities in the Business Voice Services Manage… | 2025-04-13T23:05:11.284000Z |
| var-201404-0034 | The BGP Router process in Cisco IOS before 12.2(50)SY1 allows remote attackers to cause a… | 2025-04-13T23:05:10.907000Z |
| var-201404-0573 | The SIP inspection engine in Cisco Adaptive Security Appliance (ASA) Software 8.2 before … | 2025-04-13T23:05:09.033000Z |
| var-201404-0570 | Cisco Adaptive Security Appliance (ASA) Software 8.2 before 8.2(5.47), 8.4 before 8.4(7.5… | 2025-04-13T23:05:09.001000Z |
| var-201404-0572 | The SSL VPN implementation in Cisco Adaptive Security Appliance (ASA) Software 8.2 before… | 2025-04-13T23:05:08.968000Z |
| var-201404-0571 | Cisco Adaptive Security Appliance (ASA) Software 8.x before 8.2(5.48), 8.3 before 8.3(2.4… | 2025-04-13T23:05:08.938000Z |
| var-201404-0636 | Advanced_System_Content.asp in the ASUS RT series routers with firmware before 3.0.0.4.37… | 2025-04-13T23:05:08.813000Z |
| var-201408-0283 | systest.php on IBM GCM16 and GCM32 Global Console Manager switches with firmware before 1… | 2025-04-13T23:05:08.370000Z |
| var-201408-0280 | prodtest.php on IBM GCM16 and GCM32 Global Console Manager switches with firmware before … | 2025-04-13T23:05:08.333000Z |
| var-201408-0279 | Multiple cross-site scripting (XSS) vulnerabilities on IBM GCM16 and GCM32 Global Console… | 2025-04-13T23:05:08.269000Z |
| var-201405-0215 | Adobe Reader and Acrobat 10.x before 10.1.10 and 11.x before 11.0.07 on Windows and OS X … | 2025-04-13T23:05:08.180000Z |
| var-201405-0364 | The SNMP module in Cisco IOS XE 3.5E allows remote authenticated users to cause a denial … | 2025-04-13T23:05:07.556000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2021:1111-1 | Security update for fwupdate | 2021-04-08T15:14:10Z | 2021-04-08T15:14:10Z |
| suse-su-2021:1108-1 | Security update for ceph | 2021-04-08T09:48:59Z | 2021-04-08T09:48:59Z |
| suse-su-2021:1107-1 | Security update for fwupd | 2021-04-08T09:44:31Z | 2021-04-08T09:44:31Z |
| suse-su-2021:1104-1 | Security update for fwupdate | 2021-04-08T08:32:53Z | 2021-04-08T08:32:53Z |
| suse-su-2021:1103-1 | Security update for fwupdate | 2021-04-08T08:32:15Z | 2021-04-08T08:32:15Z |
| suse-su-2021:1097-1 | Security update for openexr | 2021-04-07T16:06:58Z | 2021-04-07T16:06:58Z |
| suse-su-2021:1094-1 | Security update for flatpak, libostree, xdg-desktop-portal, xdg-desktop-portal-gtk | 2021-04-07T12:11:43Z | 2021-04-07T12:11:43Z |
| suse-su-2021:1074-1 | Security update for the Linux Kernel (Live Patch 38 for SLE 12 SP3) | 2021-04-07T07:11:18Z | 2021-04-07T07:11:18Z |
| suse-su-2021:1075-1 | Security update for the Linux Kernel (Live Patch 37 for SLE 12 SP3) | 2021-04-07T07:11:06Z | 2021-04-07T07:11:06Z |
| suse-su-2021:1046-1 | Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP5) | 2021-04-07T07:07:15Z | 2021-04-07T07:07:15Z |
| suse-su-2021:1030-1 | Security update for gssproxy | 2021-04-06T16:26:37Z | 2021-04-06T16:26:37Z |
| suse-su-2021:1029-1 | Security update for gssproxy | 2021-04-06T16:26:24Z | 2021-04-06T16:26:24Z |
| suse-su-2021:1028-1 | Security update for xen | 2021-04-06T15:54:42Z | 2021-04-06T15:54:42Z |
| suse-su-2021:1023-1 | Security update for xen | 2021-04-06T15:52:02Z | 2021-04-06T15:52:02Z |
| suse-su-2021:1010-1 | Security update for OpenIPMI | 2021-04-01T15:52:14Z | 2021-04-01T15:52:14Z |
| suse-su-2021:1009-1 | Security update for tomcat | 2021-04-01T15:50:14Z | 2021-04-01T15:50:14Z |
| suse-su-2021:1008-1 | Security update for tomcat | 2021-04-01T15:49:15Z | 2021-04-01T15:49:15Z |
| suse-su-2021:1007-1 | Security update for MozillaFirefox | 2021-04-01T15:48:19Z | 2021-04-01T15:48:19Z |
| suse-su-2021:1006-1 | Security update for curl | 2021-04-01T15:45:04Z | 2021-04-01T15:45:04Z |
| suse-su-2021:14684-1 | Security update for MozillaFirefox | 2021-04-01T09:18:18Z | 2021-04-01T09:18:18Z |
| suse-su-2021:0999-1 | Security update for MozillaFirefox | 2021-03-31T14:59:30Z | 2021-03-31T14:59:30Z |
| suse-su-2021:0998-1 | Security update for opensc | 2021-03-31T14:57:12Z | 2021-03-31T14:57:12Z |
| suse-su-2021:0990-1 | Security update for zabbix | 2021-03-30T15:59:13Z | 2021-03-30T15:59:13Z |
| suse-su-2021:0989-1 | Security update for tomcat | 2021-03-30T15:58:52Z | 2021-03-30T15:58:52Z |
| suse-su-2021:0988-1 | Security update for tomcat | 2021-03-30T15:58:09Z | 2021-03-30T15:58:09Z |
| suse-su-2021:0987-1 | Security update for ovmf | 2021-03-30T15:57:39Z | 2021-03-30T15:57:39Z |
| suse-ru-2021:0985-1 | Recommended update for the Azure SDK and CLI | 2021-03-30T12:43:56Z | 2021-03-30T12:43:56Z |
| suse-su-2021:0975-1 | Security update for tar | 2021-03-29T17:31:50Z | 2021-03-29T17:31:50Z |
| suse-su-2021:0974-1 | Security update for tar | 2021-03-29T17:31:36Z | 2021-03-29T17:31:36Z |
| suse-su-2021:0972-1 | Security update for ovmf | 2021-03-29T17:31:05Z | 2021-03-29T17:31:05Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2024-46370 | IrfanView越界写入漏洞(CNVD-2024-46370) | 2024-11-27 | 2024-11-28 |
| cnvd-2024-46369 | IrfanView越界读取漏洞(CNVD-2024-46369) | 2024-11-27 | 2024-11-28 |
| cnvd-2024-46368 | IrfanView越界写入漏洞(CNVD-2024-46368) | 2024-11-27 | 2024-11-28 |
| cnvd-2024-46367 | IrfanView越界写入漏洞(CNVD-2024-46367) | 2024-11-27 | 2024-11-28 |
| cnvd-2024-46366 | IrfanView越界读取漏洞 | 2024-11-27 | 2024-11-28 |
| cnvd-2024-46365 | IrfanView释放后重用漏洞 | 2024-11-27 | 2024-11-28 |
| cnvd-2024-45996 | Siemens Tecnomatix Plant Simulation内存错误引用漏洞 | 2024-11-21 | 2024-11-28 |
| cnvd-2024-45995 | Siemens Tecnomatix Plant Simulation越界写入漏洞(CNVD-2024-45995) | 2024-11-21 | 2024-11-28 |
| cnvd-2024-45994 | Siemens Tecnomatix Plant Simulation越界读取漏洞(CNVD-2024-45994) | 2024-11-21 | 2024-11-28 |
| cnvd-2024-45993 | Siemens Tecnomatix Plant Simulation越界写入漏洞(CNVD-2024-45993) | 2024-11-21 | 2024-11-28 |
| cnvd-2024-45992 | Siemens Tecnomatix Plant Simulation越界写入漏洞(CNVD-2024-45992) | 2024-11-21 | 2024-11-28 |
| cnvd-2024-45991 | Siemens Tecnomatix Plant Simulation越界读取漏洞(CNVD-2024-45991) | 2024-11-21 | 2024-11-28 |
| cnvd-2024-45990 | Siemens Tecnomatix Plant Simulation越界写入漏洞(CNVD-2024-45990) | 2024-11-21 | 2024-11-28 |
| cnvd-2024-45989 | Siemens Tecnomatix Plant Simulation越界写入漏洞(CNVD-2024-45989) | 2024-11-21 | 2024-11-28 |
| cnvd-2024-45988 | Siemens Tecnomatix Plant Simulation越界写入漏洞(CNVD-2024-45988) | 2024-11-21 | 2024-11-28 |
| cnvd-2024-45987 | Siemens Tecnomatix Plant Simulation堆栈缓冲区溢出漏洞(CNVD-2024-45987) | 2024-11-21 | 2024-11-28 |
| cnvd-2024-45455 | 帆软软件有限公司帆软报表存在文件上传漏洞 | 2024-09-26 | 2024-11-28 |
| cnvd-2024-46401 | IBM Flexible Service Processor信任管理问题漏洞 | 2024-11-22 | 2024-11-27 |
| cnvd-2024-46396 | Wireshark拒绝服务漏洞(CNVD-2024-46396) | 2024-11-22 | 2024-11-27 |
| cnvd-2024-46385 | Linksys E3000 diag_ping_start命令注入漏洞 | 2024-11-25 | 2024-11-27 |
| cnvd-2024-46272 | Apache Traffic Server输入验证错误漏洞(CNVD-2024-46272) | 2024-11-21 | 2024-11-27 |
| cnvd-2024-46271 | Apache OFBiz代码问题漏洞(CNVD-2024-46271) | 2024-11-22 | 2024-11-27 |
| cnvd-2024-46256 | D-LINK DI-8400远程命令执行漏洞 | 2024-11-22 | 2024-11-27 |
| cnvd-2024-46255 | MyBB跨站脚本漏洞(CNVD-2024-46255) | 2024-11-22 | 2024-11-27 |
| cnvd-2024-46254 | TOTOLINK A810R infostat.cgi缓冲区溢出漏洞 | 2024-11-25 | 2024-11-27 |
| cnvd-2024-46253 | TOTOLINK EX200 ssd参数命令注入漏洞 | 2024-11-25 | 2024-11-27 |
| cnvd-2024-46252 | H3C GR-1800AX代码执行漏洞 | 2024-11-26 | 2024-11-27 |
| cnvd-2024-46251 | Zyxel P-6101C授权问题漏洞 | 2024-11-26 | 2024-11-27 |
| cnvd-2024-46250 | Palo Alto Networks PAN-OS操作系统命令注入漏洞(CNVD-2024-46250) | 2024-11-26 | 2024-11-27 |
| cnvd-2024-46249 | Moodle授权问题漏洞(CNVD-2024-46249) | 2024-11-26 | 2024-11-27 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2011-avi-462 | Vulnérabilité dans EMC RSA Adaptive Authentication On-Premise | 2011-08-22T00:00:00.000000 | 2011-08-22T00:00:00.000000 |
| certa-2011-avi-460 | Vulnérabilités dans OTRS | 2011-08-22T00:00:00.000000 | 2011-08-22T00:00:00.000000 |
| certa-2011-avi-458 | Multiples vulnérabilités dans RealPlayer | 2011-08-18T00:00:00.000000 | 2011-08-18T00:00:00.000000 |
| certa-2011-avi-452 | Vulnérabilités dans ISC DHCP | 2011-08-11T00:00:00.000000 | 2011-08-18T00:00:00.000000 |
| certa-2011-avi-429 | Vulnérabilités dans Apple QuickTime | 2011-08-04T00:00:00.000000 | 2011-08-18T00:00:00.000000 |
| certa-2011-avi-456 | Vulnérabilité dans CA ARCserve D2D | 2011-08-17T00:00:00.000000 | 2011-08-17T00:00:00.000000 |
| certa-2011-avi-455 | Vulnérabilités dans Symantec Veritas Enterprise Administrator | 2011-08-16T00:00:00.000000 | 2011-08-16T00:00:00.000000 |
| certa-2011-avi-454 | Vulnérabilités dans Apache Tomcat | 2011-08-16T00:00:00.000000 | 2011-08-16T00:00:00.000000 |
| certa-2011-avi-453 | Vulnérabilités dans McAfee SaaS Endpoint Protection | 2011-08-12T00:00:00.000000 | 2011-08-12T00:00:00.000000 |
| certa-2011-avi-451 | Vulnérabilités dans Symantec Endpoint Protection Manager | 2011-08-11T00:00:00.000000 | 2011-08-11T00:00:00.000000 |
| certa-2011-avi-450 | Multiples vulnérabilités dans BlackBerry Enterprise Server | 2011-08-11T00:00:00.000000 | 2011-08-11T00:00:00.000000 |
| certa-2011-avi-449 | Vulnérabilité dans Adobe Photoshop CS5 | 2011-08-10T00:00:00.000000 | 2011-08-10T00:00:00.000000 |
| certa-2011-avi-448 | Multiples vulnérabilités dans Adobe Flash Player | 2011-08-10T00:00:00.000000 | 2011-08-10T00:00:00.000000 |
| certa-2011-avi-447 | Vulnérabilité dans Adobe Flash Media Server | 2011-08-10T00:00:00.000000 | 2011-08-10T00:00:00.000000 |
| certa-2011-avi-446 | Multiples vulnérabilités dans Adobe Shockwave Player | 2011-08-10T00:00:00.000000 | 2011-08-10T00:00:00.000000 |
| certa-2011-avi-445 | Vulnérabilité dans Microsoft .NET Framework | 2011-08-10T00:00:00.000000 | 2011-08-10T00:00:00.000000 |
| certa-2011-avi-444 | Vulnérabilité dans le noyau Windows | 2011-08-10T00:00:00.000000 | 2011-08-10T00:00:00.000000 |
| certa-2011-avi-443 | Vulnérabilité dans Microsoft Report Viewer | 2011-08-10T00:00:00.000000 | 2011-08-10T00:00:00.000000 |
| certa-2011-avi-442 | Vulnérabilité dans les contrôles Chart ASP.NET de Microsoft | 2011-08-10T00:00:00.000000 | 2011-08-10T00:00:00.000000 |
| certa-2011-avi-441 | Vulnérabilité dans la protocole RDP de Microsoft Windows | 2011-08-10T00:00:00.000000 | 2011-08-10T00:00:00.000000 |
| certa-2011-avi-440 | Vulnérabilités dans la pile TCP/IP de Microsoft Windows | 2011-08-10T00:00:00.000000 | 2011-08-10T00:00:00.000000 |
| certa-2011-avi-439 | Vulnérabilité dans le processus CSRSS de Microsoft Windows | 2011-08-10T00:00:00.000000 | 2011-08-10T00:00:00.000000 |
| certa-2011-avi-438 | Vulnérabilité dans le pilote NDISTAPI du service d'accès à distance de Windows | 2011-08-10T00:00:00.000000 | 2011-08-10T00:00:00.000000 |
| certa-2011-avi-437 | Vulnérabilité dans le service d'accès au bureau à distance Windows par le Web | 2011-08-10T00:00:00.000000 | 2011-08-10T00:00:00.000000 |
| certa-2011-avi-436 | Vulnérabilités dans Microsoft Visio | 2011-08-10T00:00:00.000000 | 2011-08-10T00:00:00.000000 |
| certa-2011-avi-435 | Vulnérabilité dans Data Access Components | 2011-08-10T00:00:00.000000 | 2011-08-10T00:00:00.000000 |
| certa-2011-avi-434 | Vulnérabilités dans le serveur Windows DNS | 2011-08-10T00:00:00.000000 | 2011-08-10T00:00:00.000000 |
| certa-2011-avi-433 | Multiples vulnérabilités dans Internet Explorer | 2011-08-10T00:00:00.000000 | 2011-08-10T00:00:00.000000 |
| certa-2011-avi-432 | Multiples vulnérabilités dans TYPO3 | 2011-08-09T00:00:00.000000 | 2011-08-09T00:00:00.000000 |
| certa-2011-avi-431 | Vulnérabilités dans Moodle | 2011-08-09T00:00:00.000000 | 2011-08-09T00:00:00.000000 |