Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-58413 |
6.9 (3.1)
|
A stack-based buffer overflow vulnerability in Fo… |
Fortinet |
FortiOS |
2025-11-18T17:01:22.032Z | 2026-01-15T14:36:06.527Z |
| CVE-2026-22646 |
4.3 (3.1)
|
Certain error messages returned by the applicatio… |
SICK AG |
Incoming Goods Suite |
2026-01-15T13:15:01.194Z | 2026-01-15T14:35:40.263Z |
| CVE-2026-22919 |
3.8 (3.1)
|
An attacker with administrative access may inject… |
SICK AG |
TDC-X401GL |
2026-01-15T13:08:31.700Z | 2026-01-15T14:34:02.134Z |
| CVE-2026-22920 |
3.7 (3.1)
|
The device's passwords have not been adequately s… |
SICK AG |
TDC-X401GL |
2026-01-15T13:09:04.276Z | 2026-01-15T14:32:47.107Z |
| CVE-2026-22184 |
4.6 (4.0)
|
zlib <= 1.3.1.2 untgz Global Buffer Overflow in TGZfname() |
zlib software |
zlib |
2026-01-07T20:25:19.892Z | 2026-01-15T14:12:13.493Z |
| CVE-2024-27778 |
8.3 (3.1)
|
An improper neutralization of special elements us… |
Fortinet |
FortiSandbox |
2025-01-14T14:09:34.439Z | 2026-01-15T13:53:21.675Z |
| CVE-2025-13154 |
6.8 (4.0)
5.5 (3.1)
|
An improper link following vulnerability was repo… |
Lenovo |
Vantage |
2026-01-14T22:16:13.569Z | 2026-01-15T13:44:54.451Z |
| CVE-2025-13454 |
5.7 (4.0)
4.7 (3.1)
|
A potential vulnerability was reported in ThinkPl… |
Lenovo |
ThinkPlus FU100 |
2026-01-14T22:18:18.306Z | 2026-01-15T13:37:01.823Z |
| CVE-2025-13453 |
7 (4.0)
6.8 (3.1)
|
A potential vulnerability was reported in some Th… |
Lenovo |
ThinkPlus FU100 |
2026-01-14T22:18:13.439Z | 2026-01-15T13:36:22.092Z |
| CVE-2025-32756 |
9.6 (3.1)
|
A stack-based buffer overflow vulnerability [CWE-… |
Fortinet |
FortiNDR |
2025-05-13T14:46:44.208Z | 2026-01-15T12:54:22.845Z |
| CVE-2025-4953 |
7.4 (3.1)
|
Podman: build context bind mount |
|
|
2025-09-16T14:54:50.045Z | 2026-01-15T10:02:59.511Z |
| CVE-2025-14327 |
7.5 (3.1)
|
Spoofing issue in the Downloads Panel component |
Mozilla |
Firefox |
2025-12-09T13:38:02.260Z | 2026-01-15T09:31:17.854Z |
| CVE-2026-0892 |
9.8 (3.1)
|
Memory safety bugs fixed in Firefox 147 and Thunderbird 147 |
Mozilla |
Firefox |
2026-01-13T13:30:59.874Z | 2026-01-15T09:31:17.329Z |
| CVE-2026-0891 |
8.1 (3.1)
|
Memory safety bugs fixed in Firefox ESR 140.7, Thunder… |
Mozilla |
Firefox |
2026-01-13T13:30:59.454Z | 2026-01-15T09:31:16.819Z |
| CVE-2026-0889 |
7.5 (3.1)
|
Denial-of-service in the DOM: Service Workers component |
Mozilla |
Firefox |
2026-01-13T13:30:58.675Z | 2026-01-15T09:31:15.710Z |
| CVE-2026-0888 |
5.3 (3.1)
|
Information disclosure in the XML component |
Mozilla |
Firefox |
2026-01-13T13:30:58.296Z | 2026-01-15T09:31:15.094Z |
| CVE-2026-0885 |
6.5 (3.1)
|
Use-after-free in the JavaScript: GC component |
Mozilla |
Firefox |
2026-01-13T13:30:56.939Z | 2026-01-15T09:31:13.413Z |
| CVE-2026-0884 |
9.8 (3.1)
|
Use-after-free in the JavaScript Engine component |
Mozilla |
Firefox |
2026-01-13T13:30:56.543Z | 2026-01-15T09:31:12.864Z |
| CVE-2026-0883 |
5.3 (3.1)
|
Information disclosure in the Networking component |
Mozilla |
Firefox |
2026-01-13T13:30:56.043Z | 2026-01-15T09:31:12.339Z |
| CVE-2026-0882 |
8.8 (3.1)
|
Use-after-free in the IPC component |
Mozilla |
Firefox |
2026-01-13T13:30:55.562Z | 2026-01-15T09:31:11.810Z |
| CVE-2026-0881 |
10 (3.1)
|
Sandbox escape in the Messaging System component |
Mozilla |
Firefox |
2026-01-13T13:30:55.122Z | 2026-01-15T09:31:11.249Z |
| CVE-2026-0880 |
8.8 (3.1)
|
Sandbox escape due to integer overflow in the Graphics… |
Mozilla |
Firefox |
2026-01-13T13:30:54.679Z | 2026-01-15T09:31:10.655Z |
| CVE-2026-0879 |
9.8 (3.1)
|
Sandbox escape due to incorrect boundary conditions in… |
Mozilla |
Firefox |
2026-01-13T13:30:54.207Z | 2026-01-15T09:31:10.036Z |
| CVE-2026-0878 |
8 (3.1)
|
Sandbox escape due to incorrect boundary conditions in… |
Mozilla |
Firefox |
2026-01-13T13:30:53.697Z | 2026-01-15T09:31:09.491Z |
| CVE-2026-0877 |
8.1 (3.1)
|
Mitigation bypass in the DOM: Security component |
Mozilla |
Firefox |
2026-01-13T13:30:52.979Z | 2026-01-15T09:31:08.828Z |
| CVE-2025-66370 |
5 (3.1)
|
Kivitendo before 3.9.2 allows XXE injection. By u… |
kivitendo |
kivitendo |
2025-11-28T00:00:00.000Z | 2026-01-15T06:46:24.375Z |
| CVE-2025-11224 |
7.7 (3.1)
|
Improper Neutralization of Input During Web Page Gener… |
GitLab |
GitLab |
2026-01-14T18:58:03.982Z | 2026-01-15T04:56:06.696Z |
| CVE-2025-33206 |
7.8 (3.1)
|
NVIDIA NSIGHT Graphics for Linux contains a vulne… |
NVIDIA |
NSIGHT Graphics |
2026-01-14T18:30:41.061Z | 2026-01-15T04:56:05.628Z |
| CVE-2025-66516 |
8.4 (3.1)
|
Apache Tika core, Apache Tika parsers, Apache Tika PDF… |
Apache Software Foundation |
Apache Tika core |
2025-12-04T16:17:24.980Z | 2026-01-15T04:56:01.082Z |
| CVE-2026-21287 |
7.8 (3.1)
|
Substance3D - Stager | Use After Free (CWE-416) |
Adobe |
Substance3D - Stager |
2026-01-13T19:44:45.957Z | 2026-01-15T04:55:59.459Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-49376 |
7.5 (3.1)
|
WordPress DELUCKS SEO plugin <= 2.5.9 - Broken Access … |
DELUCKS |
DELUCKS SEO |
2025-10-22T14:32:08.837Z | 2026-01-20T14:28:07.149Z |
| CVE-2025-49374 |
5.3 (3.1)
|
WordPress Captcha.eu plugin <= 1.0.61 - Server Side Re… |
captcha.eu |
Captcha.eu |
2025-10-22T14:32:08.617Z | 2026-01-20T14:28:07.159Z |
| CVE-2025-49373 |
4.3 (3.1)
|
WordPress Evergreen Content Poster plugin <= 1.4.5 - C… |
Evergreen Content Poster |
Evergreen Content Poster |
2025-10-22T14:32:08.403Z | 2026-01-20T14:28:07.162Z |
| CVE-2025-49372 |
10 (3.1)
|
WordPress HAPPY plugin <= 1.0.7 - Remote Code Executio… |
VillaTheme |
HAPPY |
2025-11-06T15:53:50.181Z | 2026-01-20T14:28:07.159Z |
| CVE-2025-49371 |
8.1 (3.1)
|
WordPress Strux theme <= 1.9 - Local File Inclusion vu… |
AncoraThemes |
Strux |
2025-12-18T07:21:43.355Z | 2026-01-20T14:28:07.119Z |
| CVE-2025-49370 |
8.1 (3.1)
|
WordPress Lymcoin theme <= 1.3.12 - Local File Inclusi… |
AncoraThemes |
Lymcoin |
2025-12-18T07:21:43.156Z | 2026-01-20T14:28:07.131Z |
| CVE-2025-49369 |
8.1 (3.1)
|
WordPress Lettuce theme <= 1.1.7 - Local File Inclusio… |
AncoraThemes |
Lettuce |
2025-12-18T07:21:42.972Z | 2026-01-20T14:28:07.204Z |
| CVE-2025-49368 |
8.1 (3.1)
|
WordPress Palladio theme <= 1.1.10 - Local File Inclus… |
AncoraThemes |
Palladio |
2025-12-18T07:21:42.791Z | 2026-01-20T14:28:07.126Z |
| CVE-2025-49367 |
8.1 (3.1)
|
WordPress Monyxi theme <= 1.1.8 - Local File Inclusion… |
AncoraThemes |
Monyxi |
2025-12-18T07:21:42.595Z | 2026-01-20T14:28:07.160Z |
| CVE-2025-49366 |
8.1 (3.1)
|
WordPress Hanani theme <= 1.2.11 - Local File Inclusio… |
AncoraThemes |
Hanani |
2025-12-18T07:21:42.421Z | 2026-01-20T14:28:07.207Z |
| CVE-2025-49365 |
8.1 (3.1)
|
WordPress Jack Well theme <= 1.0.14 - Local File Inclu… |
AncoraThemes |
Jack Well |
2025-12-18T07:21:42.245Z | 2026-01-20T14:28:07.108Z |
| CVE-2025-49364 |
8.1 (3.1)
|
WordPress Ludos Paradise theme <= 2.1.3 - Local File I… |
AncoraThemes |
Ludos Paradise |
2025-12-18T07:21:42.060Z | 2026-01-20T14:28:06.997Z |
| CVE-2025-49363 |
8.1 (3.1)
|
WordPress Kings & Queens theme <= 1.1.16 - Local File … |
AncoraThemes |
Kings & Queens |
2025-12-18T07:21:41.871Z | 2026-01-20T14:28:07.185Z |
| CVE-2025-49362 |
8.1 (3.1)
|
WordPress Gracioza theme <= 1.0.15 - Local File Inclus… |
AncoraThemes |
Gracioza |
2025-12-18T07:21:41.688Z | 2026-01-20T14:28:06.996Z |
| CVE-2025-49361 |
8.1 (3.1)
|
WordPress Mamita theme <= 1.0.9 - Local File Inclusion… |
AncoraThemes |
Mamita |
2025-12-18T07:21:41.475Z | 2026-01-20T14:28:06.975Z |
| CVE-2025-49360 |
8.1 (3.1)
|
WordPress Militarology theme <= 1.0.15 - Local File In… |
AncoraThemes |
Militarology |
2025-12-18T07:21:41.272Z | 2026-01-20T14:28:07.077Z |
| CVE-2025-49359 |
8.1 (3.1)
|
WordPress ShieldGroup theme <= 2.13 - Local File Inclu… |
AncoraThemes |
ShieldGroup |
2025-12-18T07:21:41.066Z | 2026-01-20T14:28:07.156Z |
| CVE-2025-49358 |
6.5 (3.1)
|
WordPress Content Fetcher plugin <= 1.1 - Cross Site S… |
Ruhul Amin |
Content Fetcher |
2025-12-31T12:01:15.789Z | 2026-01-20T14:28:06.987Z |
| CVE-2025-49357 |
6.5 (3.1)
|
WordPress Audiomack plugin <= 1.4.8 - Cross Site Scrip… |
Audiomack |
Audiomack |
2025-12-31T13:04:24.047Z | 2026-01-20T14:28:07.026Z |
| CVE-2025-49356 |
4.3 (3.1)
|
WordPress Orders Chat for WooCommerce plugin <= 1.2.0 … |
Mykola Lukin |
Orders Chat for WooCommerce |
2025-12-31T16:07:40.281Z | 2026-01-20T14:28:06.970Z |
| CVE-2025-49355 |
5.9 (3.1)
|
WordPress Accessibility Press plugin <= 1.0.2 - Cross … |
ikaes |
Accessibility Press |
2025-12-31T17:21:50.962Z | 2026-01-20T14:28:06.856Z |
| CVE-2025-49354 |
7.1 (3.1)
|
WordPress Recent Posts From Each Category plugin <= 1.… |
Mindstien Technologies |
Recent Posts From Each Category |
2025-12-31T05:30:25.381Z | 2026-01-20T14:28:06.822Z |
| CVE-2025-49353 |
7.1 (3.1)
|
WordPress Noindex by Path plugin <= 1.0 - Cross Site R… |
Marcin Kijak |
Noindex by Path |
2025-12-31T05:36:42.895Z | 2026-01-20T14:28:06.786Z |
| CVE-2025-49352 |
4.3 (3.1)
|
WordPress Order Cancellation & Returns for WooCommerce… |
YoOhw Studio |
Order Cancellation & Returns for WooCommerce |
2025-12-31T16:25:44.989Z | 2026-01-20T14:28:06.781Z |
| CVE-2025-49351 |
7.1 (3.1)
|
WordPress Create Posts & Terms plugin <= 1.3.1 - Cross… |
Valentin Agachi |
Create Posts & Terms |
2025-12-09T14:52:18.391Z | 2026-01-20T14:28:06.640Z |
| CVE-2025-49350 |
4.3 (3.1)
|
WordPress Actionwear products sync plugin <= 2.3.3 - B… |
marcoingraiti |
Actionwear products sync |
2025-12-09T14:52:18.182Z | 2026-01-20T14:28:06.748Z |
| CVE-2025-49349 |
5.3 (3.1)
|
WordPress Reuters Direct plugin <= 3.0.0 - Broken Acce… |
Reuters News Agency |
Reuters Direct |
2025-12-31T14:48:34.082Z | 2026-01-20T14:28:06.662Z |
| CVE-2025-49348 |
5.3 (3.1)
|
WordPress Hype plugin <= 1.0.5 - Broken Access Control… |
Hype |
Hype |
2025-12-09T14:52:17.974Z | 2026-01-20T14:28:06.689Z |
| CVE-2025-49347 |
7.1 (3.1)
|
WordPress WP sIFR plugin <= 0.6.8.1 - Cross Site Reque… |
Jupitercow |
WP sIFR |
2025-12-09T14:52:17.791Z | 2026-01-20T14:28:06.607Z |
| CVE-2025-49346 |
7.1 (3.1)
|
WordPress Simple Archive Generator plugin <= 5.2 - Cro… |
Peter Sterling |
Simple Archive Generator |
2025-12-31T04:37:01.172Z | 2026-01-20T14:28:06.500Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-49370 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T08:15:51.427 | 2026-01-20T15:16:36.347 |
| fkie_cve-2025-49369 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T08:15:51.297 | 2026-01-20T15:16:36.220 |
| fkie_cve-2025-49368 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T08:15:51.170 | 2026-01-20T15:16:36.093 |
| fkie_cve-2025-49367 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T08:15:51.037 | 2026-01-20T15:16:35.963 |
| fkie_cve-2025-49366 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T08:15:50.907 | 2026-01-20T15:16:35.833 |
| fkie_cve-2025-49365 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T08:15:50.773 | 2026-01-20T15:16:35.707 |
| fkie_cve-2025-49364 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T08:15:50.643 | 2026-01-20T15:16:35.577 |
| fkie_cve-2025-49363 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T08:15:50.510 | 2026-01-20T15:16:35.450 |
| fkie_cve-2025-49362 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T08:15:50.380 | 2026-01-20T15:16:35.320 |
| fkie_cve-2025-49361 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T08:15:50.247 | 2026-01-20T15:16:35.193 |
| fkie_cve-2025-49360 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T08:15:50.113 | 2026-01-20T15:16:35.060 |
| fkie_cve-2025-49359 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T08:15:49.980 | 2026-01-20T15:16:34.913 |
| fkie_cve-2025-49358 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-12-31T12:16:16.977 | 2026-01-20T15:16:34.813 |
| fkie_cve-2025-49357 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-12-31T13:15:40.377 | 2026-01-20T15:16:34.710 |
| fkie_cve-2025-49356 | Missing Authorization vulnerability in Mykola Lukin Orders Chat for WooCommerce allows Exploiting I… | 2025-12-31T16:15:43.240 | 2026-01-20T15:16:34.607 |
| fkie_cve-2025-49355 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-12-31T18:15:44.760 | 2026-01-20T15:16:34.500 |
| fkie_cve-2025-49354 | Cross-Site Request Forgery (CSRF) vulnerability in Mindstien Technologies Recent Posts From Each Ca… | 2025-12-31T06:15:41.223 | 2026-01-20T15:16:34.393 |
| fkie_cve-2025-49353 | Cross-Site Request Forgery (CSRF) vulnerability in Marcin Kijak Noindex by Path allows Stored XSS.T… | 2025-12-31T06:15:41.083 | 2026-01-20T15:16:34.293 |
| fkie_cve-2025-49352 | Authorization Bypass Through User-Controlled Key vulnerability in YoOhw Studio Order Cancellation &… | 2025-12-31T17:15:44.267 | 2026-01-20T15:16:34.193 |
| fkie_cve-2025-49351 | Cross-Site Request Forgery (CSRF) vulnerability in Valentin Agachi Create Posts & Terms create-… | 2025-12-09T16:17:58.670 | 2026-01-20T15:16:34.070 |
| fkie_cve-2025-49350 | Missing Authorization vulnerability in marcoingraiti Actionwear products sync actionwear-products-s… | 2025-12-09T16:17:58.530 | 2026-01-20T15:16:33.940 |
| fkie_cve-2025-49349 | Missing Authorization vulnerability in Reuters News Agency Reuters Direct allows Exploiting Incorre… | 2025-12-31T15:15:51.920 | 2026-01-20T15:16:33.847 |
| fkie_cve-2025-49348 | Missing Authorization vulnerability in Hype Hype pico allows Exploiting Incorrectly Configured Acce… | 2025-12-09T16:17:58.387 | 2026-01-20T15:16:33.710 |
| fkie_cve-2025-49347 | Cross-Site Request Forgery (CSRF) vulnerability in Jupitercow WP sIFR wp-sifr allows Stored XSS.Thi… | 2025-12-09T16:17:58.253 | 2026-01-20T15:16:33.580 |
| fkie_cve-2025-49346 | Cross-Site Request Forgery (CSRF) vulnerability in Peter Sterling Simple Archive Generator allows S… | 2025-12-31T05:16:06.637 | 2026-01-20T15:16:33.477 |
| fkie_cve-2025-49345 | Cross-Site Request Forgery (CSRF) vulnerability in mg12 WP-EasyArchives allows Stored XSS.This issu… | 2025-12-31T06:15:40.957 | 2026-01-20T15:16:33.380 |
| fkie_cve-2025-49344 | Cross-Site Request Forgery (CSRF) vulnerability in Rene Ade SensitiveTagCloud allows Stored XSS.Thi… | 2025-12-31T06:15:40.813 | 2026-01-20T15:16:33.273 |
| fkie_cve-2025-49343 | Cross-Site Request Forgery (CSRF) vulnerability in Socialprofilr Social Profilr allows Stored XSS.T… | 2025-12-31T06:15:40.677 | 2026-01-20T15:16:33.170 |
| fkie_cve-2025-49342 | Cross-Site Request Forgery (CSRF) vulnerability in Wolfgang Häfelinger Custom Style allows Stored X… | 2025-12-31T06:15:40.517 | 2026-01-20T15:16:33.070 |
| fkie_cve-2025-49341 | Cross-Site Request Forgery (CSRF) vulnerability in Alex Furr PDF Creator Lite pdf-creator-lite allo… | 2025-12-09T16:17:58.107 | 2026-01-20T15:16:32.890 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-22jw-fp6w-588h |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:49Z | 2026-01-02T18:30:49Z |
| ghsa-xmwh-wvgc-w526 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:48Z | 2026-01-02T18:30:48Z |
| ghsa-wj72-c27f-xwfc |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:48Z | 2026-01-02T18:30:48Z |
| ghsa-wf4j-xrvp-fj7g |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:48Z | 2026-01-02T18:30:48Z |
| ghsa-v2hv-rj6f-mmq5 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:48Z | 2026-01-02T18:30:48Z |
| ghsa-r6f7-gmgc-q6r9 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:48Z | 2026-01-02T18:30:48Z |
| ghsa-q8hw-q93m-vgjw |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:48Z | 2026-01-02T18:30:48Z |
| ghsa-q73h-4jcj-36mp |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:48Z | 2026-01-02T18:30:48Z |
| ghsa-ppwg-6fxv-g3qr |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:48Z | 2026-01-02T18:30:48Z |
| ghsa-mg98-c94p-6jc6 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:48Z | 2026-01-02T18:30:48Z |
| ghsa-mfqg-62q2-g4rr |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:48Z | 2026-01-02T18:30:48Z |
| ghsa-j728-h694-4c82 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:48Z | 2026-01-02T18:30:48Z |
| ghsa-j246-w3p6-4w8m |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:48Z | 2026-01-02T18:30:48Z |
| ghsa-hrm5-7r58-6wvq |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:48Z | 2026-01-02T18:30:48Z |
| ghsa-h4cf-2prw-539q |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:48Z | 2026-01-02T18:30:48Z |
| ghsa-g726-q4m2-5cgv |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:48Z | 2026-01-02T18:30:48Z |
| ghsa-9qwh-3mc6-gx3g |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:48Z | 2026-01-02T18:30:48Z |
| ghsa-9mmf-92vg-583x |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:48Z | 2026-01-02T18:30:48Z |
| ghsa-93j5-mj8c-fxr6 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:48Z | 2026-01-02T18:30:48Z |
| ghsa-745g-96hg-492r |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:48Z | 2026-01-02T18:30:48Z |
| ghsa-72h7-7mh6-7ff4 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:48Z | 2026-01-02T18:30:48Z |
| ghsa-6g2g-8v27-qpcq |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:48Z | 2026-01-02T18:30:48Z |
| ghsa-4cjr-2p75-j7rm |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:48Z | 2026-01-02T18:30:48Z |
| ghsa-4752-x6jq-9x6m |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:48Z | 2026-01-02T18:30:48Z |
| ghsa-3g3r-wp4r-f2gp |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:48Z | 2026-01-02T18:30:48Z |
| ghsa-3636-p8mw-vf54 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:48Z | 2026-01-02T18:30:48Z |
| ghsa-29xh-3xpf-jrmh |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:48Z | 2026-01-02T18:30:48Z |
| ghsa-27c3-cfxx-cgfh |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:48Z | 2026-01-02T18:30:48Z |
| ghsa-xxv6-pjw8-v27v |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:47Z | 2026-01-02T18:30:47Z |
| ghsa-wqxw-vjj4-7g6q |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:47Z | 2026-01-02T18:30:47Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-1509 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-15T06:02:24.088282Z |
| gsd-2024-1514 | The WP eCommerce plugin for WordPress is vulnerable to time-based blind SQL Injection via… | 2024-02-15T06:02:24.081623Z |
| gsd-2024-1489 | The SMS Alert Order Notifications – WooCommerce plugin for WordPress is vulnerable to Cro… | 2024-02-15T06:02:24.076072Z |
| gsd-2024-1499 | The Orbit Fox by ThemeIsle plugin for WordPress is vulnerable to Stored Cross-Site Script… | 2024-02-15T06:02:24.070606Z |
| gsd-2024-1500 | The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cro… | 2024-02-15T06:02:24.050133Z |
| gsd-2024-1503 | The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable t… | 2024-02-15T06:02:24.049886Z |
| gsd-2024-1502 | The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable t… | 2024-02-15T06:02:24.042630Z |
| gsd-2024-1490 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-15T06:02:24.024101Z |
| gsd-2024-1522 | The parisneo/lollms-webui does not have CSRF protections. As a result, an attacker is abl… | 2024-02-15T06:02:24.009806Z |
| gsd-2024-1511 | The parisneo/lollms-webui repository is susceptible to a path traversal vulnerability due… | 2024-02-15T06:02:24.008388Z |
| gsd-2024-1495 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-15T06:02:23.995757Z |
| gsd-2024-1501 | The Database Reset plugin for WordPress is vulnerable to Cross-Site Request Forgery in al… | 2024-02-15T06:02:23.986976Z |
| gsd-2024-1494 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-15T06:02:23.979924Z |
| gsd-2024-1519 | The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile &… | 2024-02-15T06:02:23.958120Z |
| gsd-2024-1516 | The WP eCommerce plugin for WordPress is vulnerable to unauthorized arbitrary post creati… | 2024-02-15T06:02:23.956973Z |
| gsd-2024-1506 | The Prime Slider – Addons For Elementor plugin for WordPress is vulnerable to Stored Cros… | 2024-02-15T06:02:23.941993Z |
| gsd-2024-1508 | The Prime Slider – Addons For Elementor plugin for WordPress is vulnerable to Stored Cros… | 2024-02-15T06:02:23.937158Z |
| gsd-2024-1497 | The Orbit Fox by ThemeIsle plugin for WordPress is vulnerable to Stored Cross-Site Script… | 2024-02-15T06:02:23.933990Z |
| gsd-2024-1517 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-15T06:02:23.928679Z |
| gsd-2024-1518 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-15T06:02:23.927661Z |
| gsd-2024-1520 | An OS Command Injection vulnerability exists in the '/open_code_folder' endpoint of the p… | 2024-02-15T06:02:23.922771Z |
| gsd-2024-1498 | The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Sc… | 2024-02-15T06:02:23.922523Z |
| gsd-2024-1504 | The SecuPress Free — WordPress Security plugin for WordPress is vulnerable to Cross-Site … | 2024-02-15T06:02:23.919275Z |
| gsd-2024-1491 | The devices allow access to an unprotected endpoint that allows MPFS file system binary… | 2024-02-15T06:02:23.909341Z |
| gsd-2024-1488 | A vulnerability was found in Unbound due to incorrect default permissions, allowing any p… | 2024-02-15T06:02:23.908852Z |
| gsd-2024-1496 | The Featured Image from URL (FIFU) plugin for WordPress is vulnerable to Stored Cross-Sit… | 2024-02-15T06:02:23.908305Z |
| gsd-2024-1515 | ** REJECT ** Erroneous assignement | 2024-02-15T06:02:23.906818Z |
| gsd-2024-1510 | The WP Shortcodes Plugin — Shortcodes Ultimate plugin for WordPress is vulnerable to Stor… | 2024-02-15T06:02:23.905199Z |
| gsd-2024-1493 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-15T06:02:23.883199Z |
| gsd-2024-1505 | The Academy LMS – eLearning and online course solution for WordPress plugin for WordPress… | 2024-02-15T06:02:23.881404Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-184294 | Malicious code in modiov-kian-avumangb (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184293 | Malicious code in modiov-kian-avumangaiab (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184292 | Malicious code in modiov-kian-avumangafiab (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184291 | Malicious code in modiov-kian-avumangaffiab (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184290 | Malicious code in modiov-kian-avumangaffgiab (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184289 | Malicious code in modiov-kian-avumangaffgaiab (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184288 | Malicious code in modiov-kian-avumanb (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184287 | Malicious code in modiov-kian-avumab (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184286 | Malicious code in modiov-kian-avuab (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184285 | Malicious code in modiov-kian-avua (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184284 | Malicious code in modiov-kian-avu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184283 | Malicious code in modiov-kian-avcafiaacd (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184282 | Malicious code in modiov-kian-avcafiaa (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184281 | Malicious code in modiov-kian-avcafia (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184280 | Malicious code in modiov-kian-avcafi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184279 | Malicious code in modiov-kian-avcaf (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184278 | Malicious code in modiov-kian-avca (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184277 | Malicious code in modiov-kian-avc (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184276 | Malicious code in modiov-kian-av (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184275 | Malicious code in modiov-khan-avd (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184274 | Malicious code in modiov-khan-avcd (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184273 | Malicious code in modiov-khan-avcafivd (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184272 | Malicious code in modiov-khan-avcafivaivuviagfavacd (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184271 | Malicious code in modiov-khan-avcafivaivuvcd (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184270 | Malicious code in modiov-khan-avcafivaivuvagfavacd (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184269 | Malicious code in modiov-khan-avcafivaivuvagcd (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184268 | Malicious code in modiov-khan-avcafivaivuvagavcd (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184267 | Malicious code in modiov-khan-avcafivaivuvagavacd (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184266 | Malicious code in modiov-khan-avcafivaivuvagacd (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184265 | Malicious code in modiov-khan-avcafivaivuvacd (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2024:1385 | Red Hat Security Advisory: ovn23.06 security update | 2024-03-19T15:40:19+00:00 | 2025-11-21T18:57:26+00:00 |
| rhsa-2024:1376 | Red Hat Security Advisory: squid security update | 2024-03-19T14:06:57+00:00 | 2025-11-21T18:57:24+00:00 |
| rhsa-2024:1345 | Red Hat Security Advisory: Red Hat OpenShift GitOps security update | 2024-03-15T17:29:47+00:00 | 2025-11-21T18:57:24+00:00 |
| rhsa-2024:1375 | Red Hat Security Advisory: squid:4 security update | 2024-03-19T14:13:07+00:00 | 2025-11-21T18:57:23+00:00 |
| rhsa-2024:1372 | Red Hat Security Advisory: redhat-ds:11 security, bug fix, and enhancement update | 2024-03-19T11:30:21+00:00 | 2025-11-21T18:57:23+00:00 |
| rhsa-2024:1368 | Red Hat Security Advisory: kpatch-patch security update | 2024-03-19T00:29:44+00:00 | 2025-11-21T18:57:23+00:00 |
| rhsa-2024:1348 | Red Hat Security Advisory: postgresql:10 security update | 2024-03-18T01:47:54+00:00 | 2025-11-21T18:57:20+00:00 |
| rhsa-2024:1346 | Red Hat Security Advisory: Red Hat OpenShift GitOps security update | 2024-03-16T00:33:34+00:00 | 2025-11-21T18:57:19+00:00 |
| rhsa-2024:1327 | Red Hat Security Advisory: gimp:2.8 security update | 2024-03-14T11:16:42+00:00 | 2025-11-21T18:57:17+00:00 |
| rhsa-2024:1315 | Red Hat Security Advisory: postgresql:13 security update | 2024-03-13T13:54:03+00:00 | 2025-11-21T18:57:14+00:00 |
| rhsa-2024:1314 | Red Hat Security Advisory: postgresql:15 security update | 2024-03-13T13:47:29+00:00 | 2025-11-21T18:57:14+00:00 |
| rhsa-2024:1311 | Red Hat Security Advisory: .NET 8.0 security update | 2024-03-13T12:26:53+00:00 | 2025-11-21T18:57:12+00:00 |
| rhsa-2024:1310 | Red Hat Security Advisory: .NET 8.0 security update | 2024-03-13T12:21:23+00:00 | 2025-11-21T18:57:12+00:00 |
| rhsa-2024:1305 | Red Hat Security Advisory: edk2 security update | 2024-03-13T07:42:22+00:00 | 2025-11-21T18:57:12+00:00 |
| rhsa-2024:1309 | Red Hat Security Advisory: .NET 7.0 security update | 2024-03-13T12:21:24+00:00 | 2025-11-21T18:57:11+00:00 |
| rhsa-2024:1308 | Red Hat Security Advisory: .NET 7.0 security update | 2024-03-13T12:26:45+00:00 | 2025-11-21T18:57:11+00:00 |
| rhsa-2024:1304 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | 2024-03-13T00:29:46+00:00 | 2025-11-21T18:57:10+00:00 |
| rhsa-2024:1303 | Red Hat Security Advisory: kernel-rt security and bug fix update | 2024-03-13T00:17:16+00:00 | 2025-11-21T18:57:10+00:00 |
| rhsa-2024:1267 | Red Hat Security Advisory: OpenShift Container Platform 4.12.53 packages and security update | 2024-03-20T01:54:44+00:00 | 2025-11-21T18:57:07+00:00 |
| rhsa-2024:1251 | Red Hat Security Advisory: kpatch-patch security update | 2024-03-12T00:46:02+00:00 | 2025-11-21T18:57:05+00:00 |
| rhsa-2024:1248 | Red Hat Security Advisory: kernel security update | 2024-03-12T00:51:07+00:00 | 2025-11-21T18:57:04+00:00 |
| rhsa-2024:1241 | Red Hat Security Advisory: postgresql security update | 2024-03-11T01:15:06+00:00 | 2025-11-21T18:57:04+00:00 |
| rhsa-2024:1240 | Red Hat Security Advisory: postgresql security update | 2024-03-11T01:12:06+00:00 | 2025-11-21T18:57:03+00:00 |
| rhsa-2024:1239 | Red Hat Security Advisory: opencryptoki security update | 2024-03-07T20:44:00+00:00 | 2025-11-21T18:57:03+00:00 |
| rhsa-2024:1203 | Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 9.0.1 security update | 2024-03-07T06:39:16+00:00 | 2025-11-21T18:57:01+00:00 |
| rhsa-2024:1195 | Red Hat Security Advisory: postgresql:12 security update | 2024-03-06T16:40:46+00:00 | 2025-11-21T18:57:00+00:00 |
| rhsa-2024:1184 | Red Hat Security Advisory: squid security update | 2024-03-06T01:10:13+00:00 | 2025-11-21T18:56:58+00:00 |
| rhsa-2024:1154 | Red Hat Security Advisory: libfastjson security update | 2024-03-05T18:04:52+00:00 | 2025-11-21T18:56:56+00:00 |
| rhsa-2024:1153 | Red Hat Security Advisory: squid security update | 2024-03-05T18:04:37+00:00 | 2025-11-21T18:56:55+00:00 |
| rhsa-2024:1152 | Red Hat Security Advisory: frr security update | 2024-03-05T18:05:37+00:00 | 2025-11-21T18:56:54+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2022-21318 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21317 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21316 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21315 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21314 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21313 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21312 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21311 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21310 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21309 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21308 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21307 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21303 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21291 | Vulnerability in the Oracle Java SE Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u321 8u311 11.0.13 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of Oracle Java SE Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments typically in clients running sandboxed Java Web Start applications or sandboxed Java applets that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component e.g. through a web service which supplies data to | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21280 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21279 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21278 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-0261 | Heap-based Buffer Overflow in vim/vim | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21256 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication Plugin). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-24T00:00:00.000Z |
| msrc_cve-2022-21253 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-24T00:00:00.000Z |
| msrc_cve-2022-21249 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L). | 2022-01-02T00:00:00.000Z | 2022-01-24T00:00:00.000Z |
| msrc_cve-2022-23222 | kernel/bpf/verifier.c in the Linux kernel through 5.15.14 allows local users to gain privileges because of the availability of pointer arithmetic via certain *_OR_NULL pointer types. | 2022-01-02T00:00:00.000Z | 2022-01-22T00:00:00.000Z |
| msrc_cve-2022-23219 | The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length which may result in a buffer overflow potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution. | 2022-01-02T00:00:00.000Z | 2022-01-22T00:00:00.000Z |
| msrc_cve-2022-21304 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-22T00:00:00.000Z |
| msrc_cve-2022-21302 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-22T00:00:00.000Z |
| msrc_cve-2022-21301 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-22T00:00:00.000Z |
| msrc_cve-2022-21297 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-22T00:00:00.000Z |
| msrc_cve-2022-21290 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-22T00:00:00.000Z |
| msrc_cve-2022-21289 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-22T00:00:00.000Z |
| msrc_cve-2022-21288 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-22T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-201405-0365 | The DHCPv6 implementation in Cisco IOS XR allows remote attackers to cause a denial of se… | 2025-04-13T23:05:07.522000Z |
| var-201405-0477 | Cisco WebEx Recording Format (WRF) player and Advanced Recording Format (ARF) player T27 … | 2025-04-13T23:05:07.212000Z |
| var-201405-0480 | Buffer overflow in Cisco Advanced Recording Format (ARF) player T27 LD before SP32 EP16, … | 2025-04-13T23:05:07.183000Z |
| var-201405-0478 | Buffer overflow in Cisco Advanced Recording Format (ARF) player T27 LD before SP32 EP16, … | 2025-04-13T23:05:07.153000Z |
| var-201405-0479 | Heap-based buffer overflow in Cisco WebEx Recording Format (WRF) player T27 LD before SP3… | 2025-04-13T23:05:07.125000Z |
| var-201405-0481 | Buffer overflow in Cisco Advanced Recording Format (ARF) player T27 LD before SP32 EP16, … | 2025-04-13T23:05:07.096000Z |
| var-201405-0491 | Buffer overflow in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0… | 2025-04-13T23:05:07.066000Z |
| var-201405-0489 | Cisco TelePresence TC Software 4.x and 5.x before 5.1.7 and 6.x before 6.0.1 and TE Softw… | 2025-04-13T23:05:07.037000Z |
| var-201405-0488 | Cisco TelePresence TC Software 4.x through 6.x before 6.2.0 and TE Software 4.x and 6.0 a… | 2025-04-13T23:05:07.007000Z |
| var-201405-0499 | Buffer overflow in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0… | 2025-04-13T23:05:06.977000Z |
| var-201405-0497 | The SIP implementation in Cisco TelePresence TC Software 4.x and TE Software 4.x allows r… | 2025-04-13T23:05:06.948000Z |
| var-201405-0490 | Heap-based buffer overflow in Cisco TelePresence TC Software 4.x through 6.x before 6.0.1… | 2025-04-13T23:05:06.918000Z |
| var-201405-0492 | Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 do not properly re… | 2025-04-13T23:05:06.888000Z |
| var-201405-0498 | The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x … | 2025-04-13T23:05:06.858000Z |
| var-201405-0495 | The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x … | 2025-04-13T23:05:06.829000Z |
| var-201405-0496 | The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x … | 2025-04-13T23:05:06.799000Z |
| var-201405-0465 | Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x and 6.0 allow remote attac… | 2025-04-13T23:05:06.769000Z |
| var-201405-0494 | The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x … | 2025-04-13T23:05:06.739000Z |
| var-201405-0493 | The SIP implementation in Cisco TelePresence TC Software 4.x and 5.x and TE Software 4.x … | 2025-04-13T23:05:06.709000Z |
| var-201406-0153 | Open redirect vulnerability in in la/umTestSSO.jsp in SAP Supplier Relationship Manageme… | 2025-04-13T23:05:05.749000Z |
| var-201406-0214 | The (1) Structures and (2) Project-Oriented Procurement components in SAP Project System … | 2025-04-13T23:05:00.367000Z |
| var-201406-0216 | The SAP Trader's and Scheduler's Workbench (TSW) for SAP Oil & Gas has hardcoded credenti… | 2025-04-13T23:05:00.335000Z |
| var-201406-0221 | SAP Capacity Leveling has hardcoded credentials, which makes it easier for remote attacke… | 2025-04-13T23:05:00.305000Z |
| var-201406-0219 | SAP CCMS Monitoring (BC-CCM-MON) has hardcoded credentials, which makes it easier for rem… | 2025-04-13T23:05:00.270000Z |
| var-201406-0222 | SAP Open Hub Service has hardcoded credentials, which makes it easier for remote attacker… | 2025-04-13T23:05:00.240000Z |
| var-201406-0218 | SAP Web Services Tool (CA-WUI-WST) has hardcoded credentials, which makes it easier for r… | 2025-04-13T23:05:00.209000Z |
| var-201406-0217 | The SAP Upgrade tools for ABAP has hardcoded credentials, which makes it easier for remot… | 2025-04-13T23:05:00.178000Z |
| var-201406-0220 | SAP Transaction Data Pool has hardcoded credentials, which makes it easier for remote att… | 2025-04-13T23:05:00.147000Z |
| var-201406-0215 | SAP Brazil add-on has hardcoded credentials, which makes it easier for remote attackers t… | 2025-04-13T23:05:00.116000Z |
| var-201405-0353 | Open redirect vulnerability in Self-Care Client Portal applications in the web framework … | 2025-04-13T23:04:59.999000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2021:0966-1 | Security update for MozillaFirefox | 2021-03-29T11:06:30Z | 2021-03-29T11:06:30Z |
| suse-su-2021:0956-1 | Security update for libzypp, zypper | 2021-03-25T18:19:23Z | 2021-03-25T18:19:23Z |
| suse-su-2021:0955-1 | Security update for openssl-1_1 | 2021-03-25T15:11:58Z | 2021-03-25T15:11:58Z |
| suse-su-2021:0954-1 | Security update for openssl-1_1 | 2021-03-25T15:11:37Z | 2021-03-25T15:11:37Z |
| suse-su-2021:0949-1 | Security update for evolution-data-server | 2021-03-24T13:32:06Z | 2021-03-24T13:32:06Z |
| suse-su-2021:0948-1 | Security update for zstd | 2021-03-24T13:31:47Z | 2021-03-24T13:31:47Z |
| suse-su-2021:0947-1 | Security update for python3 | 2021-03-24T13:31:16Z | 2021-03-24T13:31:16Z |
| suse-su-2021:0945-1 | Security update for ldb | 2021-03-24T12:43:13Z | 2021-03-24T12:43:13Z |
| suse-su-2021:0944-1 | Security update for ldb | 2021-03-24T12:42:22Z | 2021-03-24T12:42:22Z |
| suse-su-2021:0943-1 | Security update for hawk2 | 2021-03-24T11:26:35Z | 2021-03-24T11:26:35Z |
| suse-su-2021:0942-1 | Security update for hawk2 | 2021-03-24T11:26:26Z | 2021-03-24T11:26:26Z |
| suse-su-2021:0941-1 | Security update for hawk2 | 2021-03-24T11:26:08Z | 2021-03-24T11:26:08Z |
| suse-su-2021:0940-1 | Security update for jetty-minimal | 2021-03-24T11:25:24Z | 2021-03-24T11:25:24Z |
| suse-su-2021:0939-1 | Security update for openssl | 2021-03-24T11:24:51Z | 2021-03-24T11:24:51Z |
| suse-su-2021:0938-1 | Security update for go1.15 | 2021-03-24T11:23:48Z | 2021-03-24T11:23:48Z |
| suse-su-2021:0937-1 | Security update for go1.16 | 2021-03-24T11:22:26Z | 2021-03-24T11:22:26Z |
| suse-su-2021:0936-1 | Security update for libass | 2021-03-24T11:22:02Z | 2021-03-24T11:22:02Z |
| suse-su-2021:0935-1 | Security update for gnutls | 2021-03-24T11:19:19Z | 2021-03-24T11:19:19Z |
| suse-su-2021:0934-1 | Security update for gnutls | 2021-03-24T11:18:49Z | 2021-03-24T11:18:49Z |
| suse-su-2021:0933-1 | Security update for ruby2.5 | 2021-03-24T11:17:12Z | 2021-03-24T11:17:12Z |
| suse-su-2021:0932-1 | Security update for nghttp2 | 2021-03-24T11:13:09Z | 2021-03-24T11:13:09Z |
| suse-su-2021:0931-1 | Security update for nghttp2 | 2021-03-24T11:11:11Z | 2021-03-24T11:11:11Z |
| suse-su-2021:0930-1 | Security update for nghttp2 | 2021-03-24T11:09:32Z | 2021-03-24T11:09:32Z |
| suse-su-2021:0929-1 | Security update for wavpack | 2021-03-24T11:08:30Z | 2021-03-24T11:08:30Z |
| suse-su-2021:0928-1 | Security update for sudo | 2021-03-24T11:06:27Z | 2021-03-24T11:06:27Z |
| suse-su-2021:0906-1 | Security update for SUSE Manager Server 4.1 | 2021-03-19T15:18:39Z | 2021-03-19T15:18:39Z |
| suse-su-2021:0891-1 | Security update for evolution-data-server | 2021-03-19T14:52:37Z | 2021-03-19T14:52:37Z |
| suse-su-2021:0890-1 | Security update for glib2 | 2021-03-19T14:52:12Z | 2021-03-19T14:52:12Z |
| suse-su-2021:14670-1 | Security update for openssl | 2021-03-19T14:50:22Z | 2021-03-19T14:50:22Z |
| suse-su-2021:0887-1 | Security update for python36 | 2021-03-19T14:49:25Z | 2021-03-19T14:49:25Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2024-46248 | Moodle信息泄露漏洞(CNVD-2024-46248) | 2024-11-26 | 2024-11-27 |
| cnvd-2024-46247 | Moodle授权问题漏洞(CNVD-2024-46247) | 2024-11-26 | 2024-11-27 |
| cnvd-2024-46246 | 广州恒企教育科技有限公司HkCms文件上传漏洞 | 2024-11-26 | 2024-11-27 |
| cnvd-2024-45878 | Mozilla多款产品访问控制错误漏洞 | 2024-08-14 | 2024-11-27 |
| cnvd-2024-45877 | Mozilla多款产品释放后重用漏洞 | 2024-08-14 | 2024-11-27 |
| cnvd-2024-45876 | Mozilla Firefox和Mozilla Thunderbird缓冲区溢出漏洞 | 2024-10-30 | 2024-11-27 |
| cnvd-2024-45875 | Mozilla Firefox和Mozilla Thunderbird越界读取漏洞 | 2024-10-30 | 2024-11-27 |
| cnvd-2024-45874 | Mozilla Firefox和Mozilla Thunderbird跨站脚本漏洞 | 2024-10-30 | 2024-11-27 |
| cnvd-2024-45873 | Mozilla Firefox和Mozilla Thunderbird释放后重用漏洞 | 2024-10-30 | 2024-11-27 |
| cnvd-2024-45872 | Linux kernel越界读取漏洞(CNVD-2024-45872) | 2024-11-21 | 2024-11-27 |
| cnvd-2024-45871 | Linux kernel非受控资源消耗漏洞 | 2024-11-21 | 2024-11-27 |
| cnvd-2024-45870 | Linux kernel越界读取漏洞(CNVD-2024-45870) | 2024-11-21 | 2024-11-27 |
| cnvd-2024-45869 | Linux Kernel越界读取漏洞(CNVD-2024-45869) | 2024-11-21 | 2024-11-27 |
| cnvd-2024-46578 | 厦门四信通信科技有限公司设备管理平台存在未授权访问漏洞 | 2024-10-12 | 2024-11-26 |
| cnvd-2024-46568 | 统信软件技术有限公司统信UOS20专业版存在本地提权漏洞 | 2024-10-12 | 2024-11-26 |
| cnvd-2024-46012 | PandasAI命令注入漏洞 | 2024-11-26 | 2024-11-26 |
| cnvd-2024-46011 | Polyaxon容器逃逸漏洞(CNVD-2024-46011) | 2024-11-26 | 2024-11-26 |
| cnvd-2024-46010 | Polyaxon容器逃逸漏洞 | 2024-11-26 | 2024-11-26 |
| cnvd-2024-46009 | Open WebUI SSRF漏洞 | 2024-11-26 | 2024-11-26 |
| cnvd-2024-46008 | Horovod远程代码执行漏洞 | 2024-11-26 | 2024-11-26 |
| cnvd-2024-46007 | AnythingLLM信息泄露漏洞 | 2024-11-26 | 2024-11-26 |
| cnvd-2024-46006 | llama.cpp拒绝服务漏洞 | 2024-07-26 | 2024-11-26 |
| cnvd-2024-46005 | llama.cpp全局缓冲区溢出漏洞 | 2024-08-20 | 2024-11-26 |
| cnvd-2024-46004 | llama.cpp远程代码执行漏洞(CNVD-2024-46004) | 2024-08-20 | 2024-11-26 |
| cnvd-2024-46002 | llama.cpp远程代码执行漏洞 | 2024-08-20 | 2024-11-26 |
| cnvd-2024-46001 | Haystack远程代码执行漏洞 | 2024-08-02 | 2024-11-26 |
| cnvd-2024-46000 | H2O远程代码执行漏洞 | 2024-09-11 | 2024-11-26 |
| cnvd-2024-45999 | chainer远程代码执行漏洞 | 2024-10-30 | 2024-11-26 |
| cnvd-2024-45998 | Composio路径遍历漏洞 | 2024-09-18 | 2024-11-26 |
| cnvd-2024-45900 | Mattermost访问控制错误漏洞(CNVD-2024-45900) | 2024-08-29 | 2024-11-26 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2011-avi-430 | Multiples vulnérabilités dans Bugzilla | 2011-08-05T00:00:00.000000 | 2011-08-05T00:00:00.000000 |
| certa-2011-avi-428 | Multiples vulnérabilités dans Google Chrome | 2011-08-03T00:00:00.000000 | 2011-08-03T00:00:00.000000 |
| certa-2011-avi-427 | Multiples vulnérabilités dans HP SiteScope | 2011-08-01T00:00:00.000000 | 2011-08-01T00:00:00.000000 |
| certa-2011-avi-426 | Multiples vulnérabilités dans SAP NetWeaver | 2011-08-01T00:00:00.000000 | 2011-08-01T00:00:00.000000 |
| certa-2011-avi-425 | Vulnérabilités dans HP Network Automation | 2011-08-01T00:00:00.000000 | 2011-08-01T00:00:00.000000 |
| certa-2011-avi-424 | Vulnérabilité dans Citrix XenApp et XenDesktop | 2011-08-01T00:00:00.000000 | 2011-08-01T00:00:00.000000 |
| certa-2011-avi-423 | Multiples vulnérabilités dans VMware ESX | 2011-08-01T00:00:00.000000 | 2011-08-01T00:00:00.000000 |
| certa-2011-avi-422 | Vulnérabilité dans Cisco TelePresence | 2011-08-01T00:00:00.000000 | 2011-08-01T00:00:00.000000 |
| certa-2011-avi-081 | Multiples vulnérabilités dans Apache Tomcat | 2011-02-10T00:00:00.000000 | 2011-08-01T00:00:00.000000 |
| certa-2011-avi-421 | Vulnérabilité dans Drupal | 2011-07-29T00:00:00.000000 | 2011-07-29T00:00:00.000000 |
| certa-2011-avi-420 | Vulnérabilités dans IBM Lotus Symphony | 2011-07-29T00:00:00.000000 | 2011-07-29T00:00:00.000000 |
| certa-2011-avi-419 | Vulnérabilité dans des produits Citrix | 2011-07-29T00:00:00.000000 | 2011-07-29T00:00:00.000000 |
| certa-2011-avi-418 | Multiples vulnérabilités dans EMC Captiva eInput | 2011-07-29T00:00:00.000000 | 2011-07-29T00:00:00.000000 |
| certa-2011-avi-417 | Vulnérabilité dans EMC Data Protection Advisor | 2011-07-29T00:00:00.000000 | 2011-07-29T00:00:00.000000 |
| certa-2011-avi-405 | Vulnérabilité dans Joomla! | 2011-07-21T00:00:00.000000 | 2011-07-29T00:00:00.000000 |
| certa-2011-avi-396 | Vulnérabilités dans Citrix Access Gateway Plug-in | 2011-07-19T00:00:00.000000 | 2011-07-29T00:00:00.000000 |
| certa-2011-avi-415 | Vulnérabilité dans ClamAV | 2011-07-27T00:00:00.000000 | 2011-07-27T00:00:00.000000 |
| certa-2011-avi-414 | Vulnérabilités dans Nagios | 2011-07-27T00:00:00.000000 | 2011-07-27T00:00:00.000000 |
| certa-2011-avi-413 | Vulnérabilités dans iWork | 2011-07-26T00:00:00.000000 | 2011-07-26T00:00:00.000000 |
| certa-2011-avi-412 | Vulnérabilité dans Apple iOS | 2011-07-26T00:00:00.000000 | 2011-07-26T00:00:00.000000 |
| certa-2011-avi-411 | Vulnérabilités dans phpMyAdmin | 2011-07-26T00:00:00.000000 | 2011-07-26T00:00:00.000000 |
| certa-2011-avi-410 | Vulnérabilités dans SquirrelMail | 2011-07-25T00:00:00.000000 | 2011-07-25T00:00:00.000000 |
| certa-2011-avi-409 | Vulnérabilités dans Foxit Reader | 2011-07-22T00:00:00.000000 | 2011-07-22T00:00:00.000000 |
| certa-2011-avi-408 | Vulnérabilité dans Google Picasa | 2011-07-21T00:00:00.000000 | 2011-07-21T00:00:00.000000 |
| certa-2011-avi-406 | Vulnérabilité dans Cisco ASR 9000 Series Routers | 2011-07-21T00:00:00.000000 | 2011-07-21T00:00:00.000000 |
| certa-2011-avi-404 | Vulnérabilités dans les produits Cisco SA 500 Series Security Appliances | 2011-07-21T00:00:00.000000 | 2011-07-21T00:00:00.000000 |
| certa-2011-avi-403 | Multiples vulnérabilités dans Safari | 2011-07-21T00:00:00.000000 | 2011-07-21T00:00:00.000000 |
| certa-2011-avi-402 | Vulnérabilités dans IBM WebSphere | 2011-07-21T00:00:00.000000 | 2011-07-21T00:00:00.000000 |
| certa-2011-avi-407 | Vulnérabilité dans CA Gateway Security and Total Defense | 2011-07-20T00:00:00.000000 | 2011-07-20T00:00:00.000000 |
| certa-2011-avi-401 | Vulnérabilité dans JBoss | 2011-07-20T00:00:00.000000 | 2011-07-20T00:00:00.000000 |