Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-70744 |
7.5 (3.1)
|
Tenda AX-1806 v1.0.0.1 was discovered to contain … |
n/a |
n/a |
2026-01-15T00:00:00.000Z | 2026-01-15T15:08:20.236Z |
| CVE-2024-50566 |
7.2 (3.1)
|
A improper neutralization of special elements use… |
Fortinet |
FortiManager |
2025-01-14T14:08:35.384Z | 2026-01-15T15:05:48.819Z |
| CVE-2025-71019 |
7.5 (3.1)
|
Tenda AX-1806 v1.0.0.1 was discovered to contain … |
n/a |
n/a |
2026-01-15T00:00:00.000Z | 2026-01-15T15:04:49.969Z |
| CVE-2025-53843 |
6.9 (3.1)
|
A stack-based buffer overflow vulnerability in Fo… |
Fortinet |
FortiOS |
2025-11-18T17:01:28.239Z | 2026-01-15T14:53:16.203Z |
| CVE-2026-22032 |
4.3 (3.1)
|
Directus has open redirect in SAML |
directus |
directus |
2026-01-08T14:32:06.619Z | 2026-01-15T14:53:09.871Z |
| CVE-2026-22644 |
5.3 (3.1)
|
Certain requests pass the authentication token in… |
SICK AG |
Incoming Goods Suite |
2026-01-15T13:14:13.694Z | 2026-01-15T14:52:44.218Z |
| CVE-2026-0600 |
6.2 (4.0)
|
Nexus Repository 3 - Server-Side Request Forgery in Pr… |
Sonatype |
Nexus Repository |
2026-01-14T22:29:09.256Z | 2026-01-15T14:51:42.898Z |
| CVE-2025-13455 |
7.3 (4.0)
7.8 (3.1)
|
A vulnerability was reported in ThinkPlus configu… |
Lenovo |
ThinkPlus FU100 |
2026-01-14T22:18:24.196Z | 2026-01-15T14:49:46.172Z |
| CVE-2025-14457 |
3.7 (3.1)
|
Drag and Drop Multiple File Upload for Contact Form 7 … |
glenwpcoder |
Drag and Drop Multiple File Upload for Contact Form 7 |
2026-01-15T06:45:04.078Z | 2026-01-15T14:47:51.069Z |
| CVE-2025-14448 |
5.4 (3.1)
|
WP-Members Membership Plugin <= 3.5.4.3 - Authenticate… |
cbutlerjr |
WP-Members Membership Plugin |
2026-01-15T05:24:19.163Z | 2026-01-15T14:47:50.023Z |
| CVE-2026-0976 |
3.7 (3.1)
|
Org.keycloak/keycloak-quarkus-server: keycloak: proxy … |
Red Hat |
Red Hat Build of Keycloak |
2026-01-15T12:06:21.251Z | 2026-01-15T14:45:41.540Z |
| CVE-2026-0601 |
5.1 (4.0)
|
Nexus Repository 3 - Cross-Site Scripting |
Sonatype |
Nexus Repository |
2026-01-14T22:05:17.135Z | 2026-01-15T14:43:42.991Z |
| CVE-2026-22907 |
9.9 (3.1)
|
An attacker may gain unauthorized access to the h… |
SICK AG |
TDC-X401GL |
2026-01-15T12:59:51.574Z | 2026-01-15T14:43:22.684Z |
| CVE-2026-22908 |
9.1 (3.1)
|
Uploading unvalidated container images may allow … |
SICK AG |
TDC-X401GL |
2026-01-15T13:00:53.558Z | 2026-01-15T14:42:28.069Z |
| CVE-2026-22645 |
5.3 (3.1)
|
The application discloses all used components, ve… |
SICK AG |
Incoming Goods Suite |
2026-01-15T13:14:38.264Z | 2026-01-15T14:42:15.554Z |
| CVE-2026-22909 |
7.5 (3.1)
|
Certain system functions may be accessed without … |
SICK AG |
TDC-X401GL |
2026-01-15T13:01:27.582Z | 2026-01-15T14:41:39.360Z |
| CVE-2026-22910 |
7.5 (3.1)
|
The device is deployed with weak and publicly kno… |
SICK AG |
TDC-X401GL |
2026-01-15T13:02:02.021Z | 2026-01-15T14:40:17.107Z |
| CVE-2026-22911 |
5.3 (3.1)
|
Firmware update files may expose password hashes … |
SICK AG |
TDC-X401GL |
2026-01-15T13:02:29.453Z | 2026-01-15T14:39:02.055Z |
| CVE-2026-22917 |
4.3 (3.1)
|
Improper input handling in a system endpoint may … |
SICK AG |
TDC-X401GL |
2026-01-15T13:07:41.205Z | 2026-01-15T14:38:02.024Z |
| CVE-2025-47890 |
2.5 (3.1)
|
An URL Redirection to Untrusted Site vulnerabilit… |
Fortinet |
FortiSASE |
2025-10-14T15:22:50.356Z | 2026-01-15T14:37:59.566Z |
| CVE-2025-31366 |
4.5 (3.1)
|
An Improper Neutralization of Input During Web Pa… |
Fortinet |
FortiProxy |
2025-10-14T15:22:57.657Z | 2026-01-15T14:37:59.504Z |
| CVE-2025-12166 |
7.5 (3.1)
|
Simply Schedule Appointments <= 1.6.9.9 - Unauthentica… |
croixhaug |
Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin |
2026-01-14T22:23:50.629Z | 2026-01-15T14:37:41.267Z |
| CVE-2026-22918 |
4.3 (3.1)
|
An attacker may exploit missing protection agains… |
SICK AG |
TDC-X401GL |
2026-01-15T13:08:02.039Z | 2026-01-15T14:36:41.215Z |
| CVE-2025-58413 |
6.9 (3.1)
|
A stack-based buffer overflow vulnerability in Fo… |
Fortinet |
FortiOS |
2025-11-18T17:01:22.032Z | 2026-01-15T14:36:06.527Z |
| CVE-2026-22646 |
4.3 (3.1)
|
Certain error messages returned by the applicatio… |
SICK AG |
Incoming Goods Suite |
2026-01-15T13:15:01.194Z | 2026-01-15T14:35:40.263Z |
| CVE-2026-22919 |
3.8 (3.1)
|
An attacker with administrative access may inject… |
SICK AG |
TDC-X401GL |
2026-01-15T13:08:31.700Z | 2026-01-15T14:34:02.134Z |
| CVE-2026-22920 |
3.7 (3.1)
|
The device's passwords have not been adequately s… |
SICK AG |
TDC-X401GL |
2026-01-15T13:09:04.276Z | 2026-01-15T14:32:47.107Z |
| CVE-2026-22184 |
4.6 (4.0)
|
zlib <= 1.3.1.2 untgz Global Buffer Overflow in TGZfname() |
zlib software |
zlib |
2026-01-07T20:25:19.892Z | 2026-01-15T14:12:13.493Z |
| CVE-2024-27778 |
8.3 (3.1)
|
An improper neutralization of special elements us… |
Fortinet |
FortiSandbox |
2025-01-14T14:09:34.439Z | 2026-01-15T13:53:21.675Z |
| CVE-2025-13154 |
6.8 (4.0)
5.5 (3.1)
|
An improper link following vulnerability was repo… |
Lenovo |
Vantage |
2026-01-14T22:16:13.569Z | 2026-01-15T13:44:54.451Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-49386 |
9.8 (3.1)
|
WordPress Preserve Code Formatting Plugin <= 4.0.1 - P… |
Scott Reilly |
Preserve Code Formatting |
2025-11-06T15:53:50.934Z | 2026-01-20T14:28:07.161Z |
| CVE-2025-49380 |
5.3 (3.1)
|
WordPress WooCommerce Vehicle Parts Finder plugin <= 3… |
wpinstinct |
WooCommerce Vehicle Parts Finder |
2025-10-22T14:32:09.626Z | 2026-01-20T14:28:07.252Z |
| CVE-2025-49379 |
7.2 (3.1)
|
WordPress Custom Fields Account Registration For Wooco… |
silverplugins217 |
Custom Fields Account Registration For Woocommerce |
2025-12-18T07:21:43.532Z | 2026-01-20T14:28:07.231Z |
| CVE-2025-49378 |
8.5 (3.1)
|
WordPress Hydra Booking plugin <= 1.1.10 - SQL Injecti… |
Themefic |
Hydra Booking |
2025-10-22T14:32:09.452Z | 2026-01-20T14:28:07.184Z |
| CVE-2025-49377 |
7.5 (3.1)
|
WordPress Hydra Booking plugin <= 1.1.9 - Broken Acces… |
Themefic |
Hydra Booking |
2025-10-22T14:32:09.195Z | 2026-01-20T14:28:07.238Z |
| CVE-2025-49376 |
7.5 (3.1)
|
WordPress DELUCKS SEO plugin <= 2.5.9 - Broken Access … |
DELUCKS |
DELUCKS SEO |
2025-10-22T14:32:08.837Z | 2026-01-20T14:28:07.149Z |
| CVE-2025-49374 |
5.3 (3.1)
|
WordPress Captcha.eu plugin <= 1.0.61 - Server Side Re… |
captcha.eu |
Captcha.eu |
2025-10-22T14:32:08.617Z | 2026-01-20T14:28:07.159Z |
| CVE-2025-49373 |
4.3 (3.1)
|
WordPress Evergreen Content Poster plugin <= 1.4.5 - C… |
Evergreen Content Poster |
Evergreen Content Poster |
2025-10-22T14:32:08.403Z | 2026-01-20T14:28:07.162Z |
| CVE-2025-49372 |
10 (3.1)
|
WordPress HAPPY plugin <= 1.0.7 - Remote Code Executio… |
VillaTheme |
HAPPY |
2025-11-06T15:53:50.181Z | 2026-01-20T14:28:07.159Z |
| CVE-2025-49371 |
8.1 (3.1)
|
WordPress Strux theme <= 1.9 - Local File Inclusion vu… |
AncoraThemes |
Strux |
2025-12-18T07:21:43.355Z | 2026-01-20T14:28:07.119Z |
| CVE-2025-49370 |
8.1 (3.1)
|
WordPress Lymcoin theme <= 1.3.12 - Local File Inclusi… |
AncoraThemes |
Lymcoin |
2025-12-18T07:21:43.156Z | 2026-01-20T14:28:07.131Z |
| CVE-2025-49369 |
8.1 (3.1)
|
WordPress Lettuce theme <= 1.1.7 - Local File Inclusio… |
AncoraThemes |
Lettuce |
2025-12-18T07:21:42.972Z | 2026-01-20T14:28:07.204Z |
| CVE-2025-49368 |
8.1 (3.1)
|
WordPress Palladio theme <= 1.1.10 - Local File Inclus… |
AncoraThemes |
Palladio |
2025-12-18T07:21:42.791Z | 2026-01-20T14:28:07.126Z |
| CVE-2025-49367 |
8.1 (3.1)
|
WordPress Monyxi theme <= 1.1.8 - Local File Inclusion… |
AncoraThemes |
Monyxi |
2025-12-18T07:21:42.595Z | 2026-01-20T14:28:07.160Z |
| CVE-2025-49366 |
8.1 (3.1)
|
WordPress Hanani theme <= 1.2.11 - Local File Inclusio… |
AncoraThemes |
Hanani |
2025-12-18T07:21:42.421Z | 2026-01-20T14:28:07.207Z |
| CVE-2025-49365 |
8.1 (3.1)
|
WordPress Jack Well theme <= 1.0.14 - Local File Inclu… |
AncoraThemes |
Jack Well |
2025-12-18T07:21:42.245Z | 2026-01-20T14:28:07.108Z |
| CVE-2025-49364 |
8.1 (3.1)
|
WordPress Ludos Paradise theme <= 2.1.3 - Local File I… |
AncoraThemes |
Ludos Paradise |
2025-12-18T07:21:42.060Z | 2026-01-20T14:28:06.997Z |
| CVE-2025-49363 |
8.1 (3.1)
|
WordPress Kings & Queens theme <= 1.1.16 - Local File … |
AncoraThemes |
Kings & Queens |
2025-12-18T07:21:41.871Z | 2026-01-20T14:28:07.185Z |
| CVE-2025-49362 |
8.1 (3.1)
|
WordPress Gracioza theme <= 1.0.15 - Local File Inclus… |
AncoraThemes |
Gracioza |
2025-12-18T07:21:41.688Z | 2026-01-20T14:28:06.996Z |
| CVE-2025-49361 |
8.1 (3.1)
|
WordPress Mamita theme <= 1.0.9 - Local File Inclusion… |
AncoraThemes |
Mamita |
2025-12-18T07:21:41.475Z | 2026-01-20T14:28:06.975Z |
| CVE-2025-49360 |
8.1 (3.1)
|
WordPress Militarology theme <= 1.0.15 - Local File In… |
AncoraThemes |
Militarology |
2025-12-18T07:21:41.272Z | 2026-01-20T14:28:07.077Z |
| CVE-2025-49359 |
8.1 (3.1)
|
WordPress ShieldGroup theme <= 2.13 - Local File Inclu… |
AncoraThemes |
ShieldGroup |
2025-12-18T07:21:41.066Z | 2026-01-20T14:28:07.156Z |
| CVE-2025-49358 |
6.5 (3.1)
|
WordPress Content Fetcher plugin <= 1.1 - Cross Site S… |
Ruhul Amin |
Content Fetcher |
2025-12-31T12:01:15.789Z | 2026-01-20T14:28:06.987Z |
| CVE-2025-49357 |
6.5 (3.1)
|
WordPress Audiomack plugin <= 1.4.8 - Cross Site Scrip… |
Audiomack |
Audiomack |
2025-12-31T13:04:24.047Z | 2026-01-20T14:28:07.026Z |
| CVE-2025-49356 |
4.3 (3.1)
|
WordPress Orders Chat for WooCommerce plugin <= 1.2.0 … |
Mykola Lukin |
Orders Chat for WooCommerce |
2025-12-31T16:07:40.281Z | 2026-01-20T14:28:06.970Z |
| CVE-2025-49355 |
5.9 (3.1)
|
WordPress Accessibility Press plugin <= 1.0.2 - Cross … |
ikaes |
Accessibility Press |
2025-12-31T17:21:50.962Z | 2026-01-20T14:28:06.856Z |
| CVE-2025-49354 |
7.1 (3.1)
|
WordPress Recent Posts From Each Category plugin <= 1.… |
Mindstien Technologies |
Recent Posts From Each Category |
2025-12-31T05:30:25.381Z | 2026-01-20T14:28:06.822Z |
| CVE-2025-49353 |
7.1 (3.1)
|
WordPress Noindex by Path plugin <= 1.0 - Cross Site R… |
Marcin Kijak |
Noindex by Path |
2025-12-31T05:36:42.895Z | 2026-01-20T14:28:06.786Z |
| CVE-2025-49352 |
4.3 (3.1)
|
WordPress Order Cancellation & Returns for WooCommerce… |
YoOhw Studio |
Order Cancellation & Returns for WooCommerce |
2025-12-31T16:25:44.989Z | 2026-01-20T14:28:06.781Z |
| CVE-2025-49351 |
7.1 (3.1)
|
WordPress Create Posts & Terms plugin <= 1.3.1 - Cross… |
Valentin Agachi |
Create Posts & Terms |
2025-12-09T14:52:18.391Z | 2026-01-20T14:28:06.640Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-49380 | Deserialization of Untrusted Data vulnerability in wpinstinct WooCommerce Vehicle Parts Finder woo-… | 2025-10-22T15:15:35.967 | 2026-01-20T15:16:37.560 |
| fkie_cve-2025-49379 | Incorrect Privilege Assignment vulnerability in silverplugins217 Custom Fields Account Registration… | 2025-12-18T08:15:51.683 | 2026-01-20T15:16:37.433 |
| fkie_cve-2025-49378 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2025-10-22T15:15:35.840 | 2026-01-20T15:16:37.303 |
| fkie_cve-2025-49377 | Missing Authorization vulnerability in Themefic Hydra Booking hydra-booking allows Exploiting Incor… | 2025-10-22T15:15:35.720 | 2026-01-20T15:16:37.163 |
| fkie_cve-2025-49376 | Missing Authorization vulnerability in DELUCKS DELUCKS SEO delucks-seo allows Accessing Functionali… | 2025-10-22T15:15:35.597 | 2026-01-20T15:16:37.027 |
| fkie_cve-2025-49374 | Server-Side Request Forgery (SSRF) vulnerability in captcha.eu Captcha.eu captcha-eu allows Server … | 2025-10-22T15:15:35.447 | 2026-01-20T15:16:36.883 |
| fkie_cve-2025-49373 | Cross-Site Request Forgery (CSRF) vulnerability in Evergreen Content Poster Evergreen Content Poste… | 2025-10-22T15:15:35.297 | 2026-01-20T15:16:36.750 |
| fkie_cve-2025-49372 | Improper Control of Generation of Code ('Code Injection') vulnerability in VillaTheme HAPPY happy-h… | 2025-11-06T16:15:52.940 | 2026-01-20T15:16:36.610 |
| fkie_cve-2025-49371 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T08:15:51.553 | 2026-01-20T15:16:36.480 |
| fkie_cve-2025-49370 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T08:15:51.427 | 2026-01-20T15:16:36.347 |
| fkie_cve-2025-49369 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T08:15:51.297 | 2026-01-20T15:16:36.220 |
| fkie_cve-2025-49368 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T08:15:51.170 | 2026-01-20T15:16:36.093 |
| fkie_cve-2025-49367 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T08:15:51.037 | 2026-01-20T15:16:35.963 |
| fkie_cve-2025-49366 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T08:15:50.907 | 2026-01-20T15:16:35.833 |
| fkie_cve-2025-49365 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T08:15:50.773 | 2026-01-20T15:16:35.707 |
| fkie_cve-2025-49364 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T08:15:50.643 | 2026-01-20T15:16:35.577 |
| fkie_cve-2025-49363 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T08:15:50.510 | 2026-01-20T15:16:35.450 |
| fkie_cve-2025-49362 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T08:15:50.380 | 2026-01-20T15:16:35.320 |
| fkie_cve-2025-49361 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T08:15:50.247 | 2026-01-20T15:16:35.193 |
| fkie_cve-2025-49360 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T08:15:50.113 | 2026-01-20T15:16:35.060 |
| fkie_cve-2025-49359 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-12-18T08:15:49.980 | 2026-01-20T15:16:34.913 |
| fkie_cve-2025-49358 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-12-31T12:16:16.977 | 2026-01-20T15:16:34.813 |
| fkie_cve-2025-49357 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-12-31T13:15:40.377 | 2026-01-20T15:16:34.710 |
| fkie_cve-2025-49356 | Missing Authorization vulnerability in Mykola Lukin Orders Chat for WooCommerce allows Exploiting I… | 2025-12-31T16:15:43.240 | 2026-01-20T15:16:34.607 |
| fkie_cve-2025-49355 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-12-31T18:15:44.760 | 2026-01-20T15:16:34.500 |
| fkie_cve-2025-49354 | Cross-Site Request Forgery (CSRF) vulnerability in Mindstien Technologies Recent Posts From Each Ca… | 2025-12-31T06:15:41.223 | 2026-01-20T15:16:34.393 |
| fkie_cve-2025-49353 | Cross-Site Request Forgery (CSRF) vulnerability in Marcin Kijak Noindex by Path allows Stored XSS.T… | 2025-12-31T06:15:41.083 | 2026-01-20T15:16:34.293 |
| fkie_cve-2025-49352 | Authorization Bypass Through User-Controlled Key vulnerability in YoOhw Studio Order Cancellation &… | 2025-12-31T17:15:44.267 | 2026-01-20T15:16:34.193 |
| fkie_cve-2025-49351 | Cross-Site Request Forgery (CSRF) vulnerability in Valentin Agachi Create Posts & Terms create-… | 2025-12-09T16:17:58.670 | 2026-01-20T15:16:34.070 |
| fkie_cve-2025-49350 | Missing Authorization vulnerability in marcoingraiti Actionwear products sync actionwear-products-s… | 2025-12-09T16:17:58.530 | 2026-01-20T15:16:33.940 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-jw78-5hg4-mvfw |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:42Z | 2026-01-02T18:30:42Z |
| ghsa-j73h-9rh5-49pm |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:42Z | 2026-01-02T18:30:42Z |
| ghsa-g9q6-8rm4-pw52 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:42Z | 2026-01-02T18:30:42Z |
| ghsa-cm36-rqqr-jjhw |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:42Z | 2026-01-02T18:30:42Z |
| ghsa-c2jw-7wcv-jwpj |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:42Z | 2026-01-02T18:30:42Z |
| ghsa-c24m-j43x-wj7w |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:42Z | 2026-01-02T18:30:42Z |
| ghsa-9v44-pc88-6j3v |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:42Z | 2026-01-02T18:30:42Z |
| ghsa-9q94-jjfq-9fm8 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:42Z | 2026-01-02T18:30:42Z |
| ghsa-8pmh-32h9-3vg2 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:42Z | 2026-01-02T18:30:42Z |
| ghsa-856w-4q39-7pg3 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:42Z | 2026-01-02T18:30:42Z |
| ghsa-7vh3-8p23-mg56 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:41Z | 2026-01-02T18:30:42Z |
| ghsa-7q3m-8xgh-v38r |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:42Z | 2026-01-02T18:30:42Z |
| ghsa-4j56-485v-j6c3 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:42Z | 2026-01-02T18:30:42Z |
| ghsa-xppj-mp47-h9fj |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:41Z | 2026-01-02T18:30:41Z |
| ghsa-xmxj-pp68-34rr |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:41Z | 2026-01-02T18:30:41Z |
| ghsa-xmg7-84hx-957x |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:41Z | 2026-01-02T18:30:41Z |
| ghsa-x9fx-77pf-pw4r |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:41Z | 2026-01-02T18:30:41Z |
| ghsa-w9wq-v7qg-jhrc |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:41Z | 2026-01-02T18:30:41Z |
| ghsa-v6r7-fpv7-7gw9 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:41Z | 2026-01-02T18:30:41Z |
| ghsa-rj35-536v-6vcv |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:41Z | 2026-01-02T18:30:41Z |
| ghsa-p89w-jxq9-f7j5 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:41Z | 2026-01-02T18:30:41Z |
| ghsa-mpf8-3pvr-29fx |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:41Z | 2026-01-02T18:30:41Z |
| ghsa-mg5q-m236-hp6j |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:41Z | 2026-01-02T18:30:41Z |
| ghsa-m437-mw4r-9cm2 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:41Z | 2026-01-02T18:30:41Z |
| ghsa-hmpq-hvmv-vvwq |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:41Z | 2026-01-02T18:30:41Z |
| ghsa-frc7-p9w7-f7jr |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:41Z | 2026-01-02T18:30:41Z |
| ghsa-fc5j-7r3c-3c28 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:41Z | 2026-01-02T18:30:41Z |
| ghsa-f5jm-v8m2-pgxw |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:41Z | 2026-01-02T18:30:41Z |
| ghsa-f55f-7hw3-656j |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:41Z | 2026-01-02T18:30:41Z |
| ghsa-cw44-w45m-7j66 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:41Z | 2026-01-02T18:30:41Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-25727 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-12T06:02:22.276282Z |
| gsd-2024-25729 | Arris SBG6580 devices have predictable default WPA2 security passwords that could lead to… | 2024-02-12T06:02:22.263164Z |
| gsd-2024-25731 | The Elink Smart eSmartCam (com.cn.dq.ipc) application 2.1.5 for Android contains hardcode… | 2024-02-12T06:02:22.262068Z |
| gsd-2024-25732 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-12T06:02:22.261037Z |
| gsd-2024-25740 | A memory leak flaw was found in the UBI driver in drivers/mtd/ubi/attach.c in the Linux k… | 2024-02-12T06:02:22.240564Z |
| gsd-2024-25736 | An issue was discovered on WyreStorm Apollo VX20 devices before 1.3.58. Remote attackers … | 2024-02-12T06:02:22.232319Z |
| gsd-2024-25730 | Hitron CODA-4582 and CODA-4589 devices have default PSKs that are generated from 5-digit … | 2024-02-12T06:02:22.215288Z |
| gsd-2024-25726 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-12T06:02:22.198919Z |
| gsd-2024-25734 | An issue was discovered on WyreStorm Apollo VX20 devices before 1.3.58. The TELNET servic… | 2024-02-12T06:02:22.171397Z |
| gsd-2024-25742 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-12T06:02:22.165794Z |
| gsd-2024-25725 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-12T06:02:22.165125Z |
| gsd-2024-25738 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-12T06:02:22.146666Z |
| gsd-2024-25724 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-12T06:02:22.136877Z |
| gsd-2024-25733 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-12T06:02:22.127898Z |
| gsd-2024-25739 | create_empty_lvol in drivers/mtd/ubi/vtbl.c in the Linux kernel through 6.7.4 can attempt… | 2024-02-12T06:02:22.114751Z |
| gsd-2024-25737 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-12T06:02:22.113327Z |
| gsd-2024-25728 | ExpressVPN before 12.73.0 on Windows, when split tunneling is used, sends DNS requests ac… | 2024-02-12T06:02:22.106554Z |
| gsd-2024-25723 | ZenML Server in the ZenML machine learning package before 0.46.7 for Python allows remote… | 2024-02-12T06:02:22.052645Z |
| gsd-2024-25743 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-12T06:02:22.049204Z |
| gsd-2023-52429 | dm_table_create in drivers/md/dm-table.c in the Linux kernel through 6.7.4 can attempt to… | 2024-02-12T06:01:41.567252Z |
| gsd-2024-1432 | ** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was foun… | 2024-02-11T06:03:34.386602Z |
| gsd-2024-1431 | A vulnerability was found in Netgear R7000 1.0.11.136_10.2.120 and classified as problema… | 2024-02-11T06:03:34.367816Z |
| gsd-2024-1430 | A vulnerability has been found in Netgear R7000 1.0.11.136_10.2.120 and classified as pro… | 2024-02-11T06:03:34.332039Z |
| gsd-2024-25715 | Glewlwyd SSO server 2.x through 2.7.6 allows open redirection via redirect_uri. | 2024-02-11T06:03:34.274735Z |
| gsd-2024-25713 | yyjson through 0.8.0 has a double free, leading to remote code execution in some cases, b… | 2024-02-11T06:03:34.262710Z |
| gsd-2024-25721 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-11T06:03:34.249985Z |
| gsd-2024-25720 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-11T06:03:34.236091Z |
| gsd-2024-25717 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-11T06:03:34.230922Z |
| gsd-2024-25710 | Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in Apache Commons Co… | 2024-02-11T06:03:34.220816Z |
| gsd-2024-25712 | http-swagger before 1.2.6 allows XSS via PUT requests, because a file that has been uploa… | 2024-02-11T06:03:34.209778Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-183953 | Malicious code in mitalukaik-don-olikaisima (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183952 | Malicious code in mitaluaik-don-olikaisima (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183951 | Malicious code in mitalik-don-olikaisima (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183950 | Malicious code in mitali-don-olima (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183949 | Malicious code in mitali-don-oliksima (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183948 | Malicious code in mitali-don-olikma (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183947 | Malicious code in mitali-don-olikisima (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183946 | Malicious code in mitali-don-olikima (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183945 | Malicious code in mitali-don-olikiama (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183944 | Malicious code in mitali-don-olikiakma (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183943 | Malicious code in mitali-don-olikiakibuamua (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183942 | Malicious code in mitali-don-olikiakbuamua (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183941 | Malicious code in mitali-don-olikiakbama (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183940 | Malicious code in mitali-don-olikaisima (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183939 | Malicious code in mitali-don-olika (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183938 | Malicious code in mitali-don-olia (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183937 | Malicious code in mitali-dn-uol (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183936 | Malicious code in mitali-dn-ujoul (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183935 | Malicious code in mitali-dn-ujokuluaia (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183934 | Malicious code in mitali-dn-ujokulia (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183933 | Malicious code in mitali-dn-ujokula (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183932 | Malicious code in mitali-dn-ujokul (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183931 | Malicious code in mitali-dn-olikua (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183930 | Malicious code in mitali-dn-olikmua (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183929 | Malicious code in mitali-dn-olikimua (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183928 | Malicious code in mitali-dn-olikiamua (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183927 | Malicious code in mitali-dn-olikiakmua (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183926 | Malicious code in mitali-dn-olikiakimua (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183925 | Malicious code in mitali-dn-olikiakibuamua (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183924 | Malicious code in mitali-dn-olikiakibamua (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2024:0100 | Red Hat Security Advisory: Red Hat build of Keycloak 22.0.8 images enhancement and security update | 2024-01-09T17:36:23+00:00 | 2025-11-21T18:52:36+00:00 |
| rhsa-2024:0098 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.6 security update | 2024-01-09T16:08:48+00:00 | 2025-11-21T18:52:35+00:00 |
| rhsa-2024:0101 | Red Hat Security Advisory: Red Hat build of Keycloak 22.0.8 enhancement and security update | 2024-01-09T16:42:16+00:00 | 2025-11-21T18:52:33+00:00 |
| rhsa-2024:0096 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.6 security update on RHEL 9 | 2024-01-09T16:09:24+00:00 | 2025-11-21T18:52:32+00:00 |
| rhsa-2024:0095 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.6 security update on RHEL 8 | 2024-01-09T16:08:58+00:00 | 2025-11-21T18:52:32+00:00 |
| rhsa-2024:0094 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.6 security update on RHEL 7 | 2024-01-09T16:09:13+00:00 | 2025-11-21T18:52:31+00:00 |
| rhsa-2024:0072 | Red Hat Security Advisory: squid security update | 2024-01-08T08:23:06+00:00 | 2025-11-21T18:52:30+00:00 |
| rhsa-2024:0071 | Red Hat Security Advisory: squid security update | 2024-01-08T08:23:31+00:00 | 2025-11-21T18:52:30+00:00 |
| rhsa-2024:0046 | Red Hat Security Advisory: squid:4 security update | 2024-01-03T21:13:13+00:00 | 2025-11-21T18:52:29+00:00 |
| rhsa-2024:0030 | Red Hat Security Advisory: thunderbird security update | 2024-01-02T09:03:52+00:00 | 2025-11-21T18:52:28+00:00 |
| rhsa-2024:0024 | Red Hat Security Advisory: firefox security update | 2024-01-02T08:30:42+00:00 | 2025-11-21T18:52:28+00:00 |
| rhsa-2024:0029 | Red Hat Security Advisory: thunderbird security update | 2024-01-02T09:04:58+00:00 | 2025-11-21T18:52:27+00:00 |
| rhsa-2024:0028 | Red Hat Security Advisory: thunderbird security update | 2024-01-02T08:58:51+00:00 | 2025-11-21T18:52:27+00:00 |
| rhsa-2024:0027 | Red Hat Security Advisory: thunderbird security update | 2024-01-02T09:06:07+00:00 | 2025-11-21T18:52:27+00:00 |
| rhsa-2024:0026 | Red Hat Security Advisory: firefox security update | 2024-01-02T08:38:22+00:00 | 2025-11-21T18:52:27+00:00 |
| rhsa-2024:0025 | Red Hat Security Advisory: firefox security update | 2024-01-02T08:28:31+00:00 | 2025-11-21T18:52:26+00:00 |
| rhsa-2024:0023 | Red Hat Security Advisory: firefox security update | 2024-01-02T09:04:47+00:00 | 2025-11-21T18:52:26+00:00 |
| rhsa-2024:0022 | Red Hat Security Advisory: firefox security update | 2024-01-02T08:30:07+00:00 | 2025-11-21T18:52:25+00:00 |
| rhsa-2024:0021 | Red Hat Security Advisory: firefox security update | 2024-01-02T08:28:52+00:00 | 2025-11-21T18:52:25+00:00 |
| rhsa-2024:0020 | Red Hat Security Advisory: tigervnc security update | 2024-01-02T08:58:43+00:00 | 2025-11-21T18:52:25+00:00 |
| rhsa-2024:0019 | Red Hat Security Advisory: firefox security update | 2024-01-02T08:26:57+00:00 | 2025-11-21T18:52:25+00:00 |
| rhsa-2024:0018 | Red Hat Security Advisory: tigervnc security update | 2024-01-02T09:05:26+00:00 | 2025-11-21T18:52:24+00:00 |
| rhsa-2024:0017 | Red Hat Security Advisory: tigervnc security update | 2024-01-02T08:46:17+00:00 | 2025-11-21T18:52:24+00:00 |
| rhsa-2024:0009 | Red Hat Security Advisory: xorg-x11-server security update | 2024-01-02T08:37:17+00:00 | 2025-11-21T18:52:24+00:00 |
| rhsa-2024:0016 | Red Hat Security Advisory: tigervnc security update | 2024-01-02T08:59:32+00:00 | 2025-11-21T18:52:23+00:00 |
| rhsa-2024:0015 | Red Hat Security Advisory: tigervnc security update | 2024-01-02T08:59:37+00:00 | 2025-11-21T18:52:23+00:00 |
| rhsa-2024:0014 | Red Hat Security Advisory: tigervnc security update | 2024-01-02T08:58:16+00:00 | 2025-11-21T18:52:23+00:00 |
| rhsa-2024:0013 | Red Hat Security Advisory: gstreamer1-plugins-bad-free security update | 2024-01-02T08:35:47+00:00 | 2025-11-21T18:52:23+00:00 |
| rhsa-2024:0004 | Red Hat Security Advisory: thunderbird security update | 2024-01-02T08:14:52+00:00 | 2025-11-21T18:52:23+00:00 |
| rhsa-2024:0012 | Red Hat Security Advisory: firefox security update | 2024-01-02T08:22:42+00:00 | 2025-11-21T18:52:22+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2021-35640 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35638 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35637 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35636 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35635 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35634 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35633 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Logging). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35632 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Data Dictionary). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35631 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: GIS). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35630 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation deletion or modification access to critical data or all MySQL Server accessible data. CVSS 3.1 Base Score 4.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35629 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35628 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35627 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35626 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35625 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35624 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 5.7.35 and prior and 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation deletion or modification access to critical data or all MySQL Server accessible data. CVSS 3.1 Base Score 4.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35623 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Roles). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35622 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35612 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35610 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35608 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication Plugin). Supported versions that are affected are 8.0.26 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35607 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35602 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.0 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35597 | Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35596 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Error Handling). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35591 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35577 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via MySQL Protcol to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35575 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35546 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35537 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-201512-0449 | Adobe Flash Player and Adobe AIR of PrintJob Use of freed memory for object implementatio… | 2025-04-13T23:03:28.053000Z |
| var-201512-0375 | Adobe Flash Player and Adobe AIR Use freed memory (Use-after-free) May allow arbitrary co… | 2025-04-13T23:03:28.003000Z |
| var-201512-0462 | Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and O… | 2025-04-13T23:03:27.954000Z |
| var-201512-0429 | Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and O… | 2025-04-13T23:03:27.906000Z |
| var-201512-0448 | Adobe Flash Player and Adobe AIR Use freed memory (Use-after-free) May allow arbitrary co… | 2025-04-13T23:03:27.850000Z |
| var-201512-0221 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x be… | 2025-04-13T23:03:27.787000Z |
| var-201512-0246 | Adobe Flash Player and Adobe AIR Use freed memory (Use-after-free) May allow arbitrary co… | 2025-04-13T23:03:27.740000Z |
| var-201512-0473 | Adobe Flash Player and Adobe AIR Use freed memory (Use-after-free) May allow arbitrary co… | 2025-04-13T23:03:27.693000Z |
| var-201512-0472 | Adobe Flash Player and Adobe AIR Use freed memory (Use-after-free) May allow arbitrary co… | 2025-04-13T23:03:27.643000Z |
| var-201512-0433 | Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and O… | 2025-04-13T23:03:27.593000Z |
| var-201512-0256 | Adobe Flash Player and Adobe AIR Use freed memory (Use-after-free) May allow arbitrary co… | 2025-04-13T23:03:27.545000Z |
| var-201512-0240 | Adobe Flash Player and Adobe AIR of MovieClip Use of freed memory for object implementati… | 2025-04-13T23:03:27.492000Z |
| var-201512-0239 | Adobe Flash Player and Adobe AIR of TextField Use of freed memory for object implementati… | 2025-04-13T23:03:27.437000Z |
| var-201512-0252 | Adobe Flash Player and Adobe AIR Use freed memory (Use-after-free) May allow arbitrary co… | 2025-04-13T23:03:27.385000Z |
| var-201512-0468 | Adobe Flash Player and Adobe AIR Use freed memory (Use-after-free) May allow arbitrary co… | 2025-04-13T23:03:27.334000Z |
| var-201512-0243 | Adobe Flash Player and Adobe AIR Use freed memory (Use-after-free) May allow arbitrary co… | 2025-04-13T23:03:27.284000Z |
| var-201512-0258 | Adobe Flash Player and Adobe AIR Use freed memory (Use-after-free) May allow arbitrary co… | 2025-04-13T23:03:27.235000Z |
| var-201512-0255 | Adobe Flash Player and Adobe AIR Use freed memory (Use-after-free) May allow arbitrary co… | 2025-04-13T23:03:27.186000Z |
| var-201512-0218 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x be… | 2025-04-13T23:03:27.133000Z |
| var-201512-0466 | Adobe Flash Player and Adobe AIR Use freed memory (Use-after-free) May allow arbitrary co… | 2025-04-13T23:03:26.469000Z |
| var-201512-0450 | Adobe Flash Player and Adobe AIR of Selection Use of freed memory for object implementati… | 2025-04-13T23:03:26.416000Z |
| var-201512-0212 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x be… | 2025-04-13T23:03:26.365000Z |
| var-201512-0207 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x be… | 2025-04-13T23:03:26.318000Z |
| var-201512-0245 | Adobe Flash Player and Adobe AIR Use freed memory (Use-after-free) May allow arbitrary co… | 2025-04-13T23:03:26.271000Z |
| var-201512-0455 | Adobe Flash Player and Adobe AIR of MovieClip Use of freed memory for object implementati… | 2025-04-13T23:03:26.212000Z |
| var-201512-0458 | Integer overflow in the Shader filter implementation in Adobe Flash Player before 18.0.0.… | 2025-04-13T23:03:26.158000Z |
| var-201512-0366 | Adobe Flash Player and Adobe AIR Use freed memory (Use-after-free) May allow arbitrary co… | 2025-04-13T23:03:26.108000Z |
| var-201512-0379 | Buffer overflow in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.2… | 2025-04-13T23:03:26.059000Z |
| var-201512-0242 | Adobe Flash Player and Adobe AIR Use freed memory (Use-after-free) May allow arbitrary co… | 2025-04-13T23:03:26.008000Z |
| var-201512-0222 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x be… | 2025-04-13T23:03:25.954000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2021:0015-1 | Security update for gimp | 2021-01-04T10:10:45Z | 2021-01-04T10:10:45Z |
| suse-su-2021:0014-1 | Security update for gimp | 2021-01-04T10:10:23Z | 2021-01-04T10:10:23Z |
| suse-su-2020:14590-1 | Security update for squid3 | 2020-12-30T09:35:42Z | 2020-12-30T09:35:42Z |
| suse-su-2020:3945-1 | Security update for xen | 2020-12-29T12:09:29Z | 2020-12-29T12:09:29Z |
| suse-su-2020:3944-1 | Security update for gimp | 2020-12-29T12:07:51Z | 2020-12-29T12:07:51Z |
| suse-su-2020:3940-1 | Security update for gimp | 2020-12-28T13:58:09Z | 2020-12-28T13:58:09Z |
| suse-su-2020:3939-1 | Security update for cyrus-sasl | 2020-12-28T13:30:19Z | 2020-12-28T13:30:19Z |
| suse-su-2020:3938-1 | Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork | 2020-12-28T13:28:52Z | 2020-12-28T13:28:52Z |
| suse-su-2020:3935-1 | Security update for MozillaThunderbird | 2020-12-25T08:26:55Z | 2020-12-25T08:26:55Z |
| suse-su-2020:3934-1 | Security update for openexr | 2020-12-24T11:37:22Z | 2020-12-24T11:37:22Z |
| suse-su-2020:3933-1 | Security update for flac | 2020-12-24T11:36:42Z | 2020-12-24T11:36:42Z |
| suse-su-2020:3932-1 | Security update for java-1_8_0-ibm | 2020-12-23T17:22:34Z | 2020-12-23T17:22:34Z |
| suse-su-2020:3931-1 | Security update for openexr | 2020-12-23T17:21:05Z | 2020-12-23T17:21:05Z |
| suse-su-2020:3930-1 | Security update for python3 | 2020-12-23T17:20:39Z | 2020-12-23T17:20:39Z |
| suse-su-2020:3760-1 | Security changes in Kubernetes, etcd, and helm; Bugfix in cri-o package | 2020-12-23T08:18:56Z | 2020-12-23T08:18:56Z |
| suse-su-2020:3922-1 | Security update for jetty-minimal | 2020-12-22T14:20:51Z | 2020-12-22T14:20:51Z |
| suse-su-2020:3918-1 | Security update for clamav | 2020-12-22T13:18:28Z | 2020-12-22T13:18:28Z |
| suse-su-2020:3917-1 | Security update for groovy | 2020-12-22T13:16:57Z | 2020-12-22T13:16:57Z |
| suse-su-2020:3916-1 | Security update for xen | 2020-12-22T13:16:42Z | 2020-12-22T13:16:42Z |
| suse-su-2020:3915-1 | Security update for xen | 2020-12-22T13:16:30Z | 2020-12-22T13:16:30Z |
| suse-su-2020:3914-1 | Security update for xen | 2020-12-22T13:16:20Z | 2020-12-22T13:16:20Z |
| suse-su-2020:3913-1 | Security update for xen | 2020-12-22T13:16:01Z | 2020-12-22T13:16:01Z |
| suse-su-2020:3911-1 | Security update for PackageKit | 2020-12-22T09:57:20Z | 2020-12-22T09:57:20Z |
| suse-su-2020:3909-1 | Security update for PackageKit | 2020-12-22T09:56:47Z | 2020-12-22T09:56:47Z |
| suse-su-2020:14588-1 | Security update for java-1_7_1-ibm | 2020-12-22T09:55:56Z | 2020-12-22T09:55:56Z |
| suse-su-2020:14587-1 | Security update for java-1_7_0-ibm | 2020-12-22T09:54:35Z | 2020-12-22T09:54:35Z |
| suse-su-2020:3903-1 | Security update for MozillaFirefox | 2020-12-21T19:11:25Z | 2020-12-21T19:11:25Z |
| suse-su-2020:3902-1 | Security update for MozillaFirefox | 2020-12-21T19:08:46Z | 2020-12-21T19:08:46Z |
| suse-su-2020:3901-1 | Security update for MozillaFirefox | 2020-12-21T19:08:04Z | 2020-12-21T19:08:04Z |
| suse-su-2020:3900-1 | Security update for MozillaThunderbird | 2020-12-21T19:07:14Z | 2020-12-21T19:07:14Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2024-41864 | Google Android权限提升漏洞(CNVD-2024-41864) | 2024-05-11 | 2024-10-29 |
| cnvd-2024-41863 | Google Android拒绝服务漏洞(CNVD-2024-41863) | 2024-05-11 | 2024-10-29 |
| cnvd-2024-41862 | Google Android信息泄露漏洞(CNVD-2024-41862) | 2024-05-11 | 2024-10-29 |
| cnvd-2024-41861 | Google Android权限提升漏洞(CNVD-2024-41861) | 2024-05-11 | 2024-10-29 |
| cnvd-2024-41860 | Google Android NotificationManagerService.java文件输入验证错误漏洞 | 2024-05-11 | 2024-10-29 |
| cnvd-2024-41859 | Google Android SnoozeHelper.java文件拒绝服务漏洞 | 2024-05-11 | 2024-10-29 |
| cnvd-2024-41858 | Google Android拒绝服务漏洞(CNVD-2024-41858) | 2024-05-11 | 2024-10-29 |
| cnvd-2024-41857 | Google Android加密问题漏洞(CNVD-2024-41857) | 2024-05-11 | 2024-10-29 |
| cnvd-2024-41856 | Google Android权限提升漏洞(CNVD-2024-41856) | 2024-05-11 | 2024-10-29 |
| cnvd-2024-41199 | 深圳市中科网威科技有限公司anysec第二代防火墙系统存在命令执行漏洞(CNVD-2024-41199) | 2024-09-14 | 2024-10-29 |
| cnvd-2024-41198 | 深圳市中科网威科技有限公司anysec第二代防火墙系统存在命令执行漏洞(CNVD-2024-41198) | 2024-09-14 | 2024-10-29 |
| cnvd-2024-41192 | 深圳市中科网威科技有限公司anysec第二代防火墙系统存在SQL注入漏洞 | 2024-09-14 | 2024-10-29 |
| cnvd-2024-41191 | 深圳市中科网威科技有限公司anysec第二代防火墙系统存在任意文件读取漏洞(CNVD-2024-41191) | 2024-09-14 | 2024-10-29 |
| cnvd-2024-41190 | 上海冰峰计算机网络技术有限公司FW下一代防火墙存在命令执行漏洞 | 2024-09-14 | 2024-10-29 |
| cnvd-2024-41183 | 青岛东胜伟业软件有限公司东胜物流软件存在SQL注入漏洞(CNVD-2024-41183) | 2024-09-14 | 2024-10-29 |
| cnvd-2024-41855 | Google Android权限提升漏洞(CNVD-2024-41855) | 2024-05-11 | 2024-10-28 |
| cnvd-2024-41854 | MOXA ioLogik E1200 Series加密问题漏洞 | 2024-01-02 | 2024-10-28 |
| cnvd-2024-41853 | MOXA ioLogik E1200 Series跨站请求伪造漏洞 | 2024-01-02 | 2024-10-28 |
| cnvd-2024-41852 | MOXA EDS-4000/G4000 Series安全绕过漏洞 | 2024-03-01 | 2024-10-28 |
| cnvd-2024-41851 | MOXA NPort W2150A/W2250A Series缓冲区溢出漏洞 | 2024-03-12 | 2024-10-28 |
| cnvd-2024-41850 | MOXA OnCell G3470A-LTE缓冲区溢出漏洞 | 2024-06-28 | 2024-10-28 |
| cnvd-2024-41849 | MOXA OnCell G3470A-LTE存在未明漏洞 | 2024-06-28 | 2024-10-28 |
| cnvd-2024-41848 | MOXA OnCell G3470A-LTE命令注入漏洞 | 2024-06-28 | 2024-10-28 |
| cnvd-2024-41847 | MOXA OnCell G3470A-LTE命令注入漏洞(CNVD-2024-41847) | 2024-06-28 | 2024-10-28 |
| cnvd-2024-41846 | MOXA Service操作系统命令注入漏洞 | 2024-10-17 | 2024-10-28 |
| cnvd-2024-41609 | 畅捷通信息技术股份有限公司畅捷通T+存在SQL注入漏洞(CNVD-2024-41609) | 2024-09-13 | 2024-10-28 |
| cnvd-2024-41603 | 用友网络科技股份有限公司用友U8CRM存在SQL注入漏洞(CNVD-2024-41603) | 2024-09-13 | 2024-10-28 |
| cnvd-2024-41602 | 用友网络科技股份有限公司用友U8CRM存在SQL注入漏洞(CNVD-2024-41602) | 2024-09-13 | 2024-10-28 |
| cnvd-2024-41328 | 北京北大方正电子有限公司方正移动采编存在文件上传漏洞 | 2024-09-12 | 2024-10-27 |
| cnvd-2024-41305 | 浙江大华技术股份有限公司智慧园区综合管理系统存在SQL注入漏洞(CNVD-2024-41305) | 2024-09-12 | 2024-10-27 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2011-avi-082 | Vulnérabilité dans IBM Lotus Notes | 2011-02-10T00:00:00.000000 | 2011-02-10T00:00:00.000000 |
| certa-2011-avi-080 | Vulnérabilités dans ffmpeg | 2011-02-10T00:00:00.000000 | 2011-02-10T00:00:00.000000 |
| certa-2011-avi-061 | Vulnérabilité dans le moteur de rendu graphique de Windows | 2011-02-09T00:00:00.000000 | 2011-02-10T00:00:00.000000 |
| certa-2011-avi-076 | Multiples vulnérabilités dans Adobe Reader et Adobe Acrobat | 2011-02-09T00:00:00.000000 | 2011-02-09T00:00:00.000000 |
| certa-2011-avi-075 | Multiples vulnérabilités dans Adobe Shockwave Player | 2011-02-09T00:00:00.000000 | 2011-02-09T00:00:00.000000 |
| certa-2011-avi-074 | Vulnérabilités dans Dokeos | 2011-02-09T00:00:00.000000 | 2011-02-09T00:00:00.000000 |
| certa-2011-avi-072 | Vulnérabilité dans MediaWiki | 2011-02-09T00:00:00.000000 | 2011-02-09T00:00:00.000000 |
| certa-2011-avi-071 | Multiples vulnérabilités dans WordPress | 2011-02-09T00:00:00.000000 | 2011-02-09T00:00:00.000000 |
| certa-2011-avi-069 | Vulnérabilité de LSASS dans Microsoft Windows | 2011-02-09T00:00:00.000000 | 2011-02-09T00:00:00.000000 |
| certa-2011-avi-068 | Vulnérabilité de Kerberos dans Microsoft Windows | 2011-02-09T00:00:00.000000 | 2011-02-09T00:00:00.000000 |
| certa-2011-avi-067 | Vulnérabiltés dans les pilotes en mode noyau de Windows | 2011-02-09T00:00:00.000000 | 2011-02-09T00:00:00.000000 |
| certa-2011-avi-066 | Vulnérabilité dans le noyau Windows | 2011-02-09T00:00:00.000000 | 2011-02-09T00:00:00.000000 |
| certa-2011-avi-065 | Vulnérabilité dans le processus CSRSS de Windows | 2011-02-09T00:00:00.000000 | 2011-02-09T00:00:00.000000 |
| certa-2011-avi-064 | Vulnérabilité dans les moteurs de JScript et VBScript | 2011-02-09T00:00:00.000000 | 2011-02-09T00:00:00.000000 |
| certa-2011-avi-063 | Vulnérabilités dans Microsoft Visio | 2011-02-09T00:00:00.000000 | 2011-02-09T00:00:00.000000 |
| certa-2011-avi-062 | Vulnérabilité dans le pilote Compact Font Format (CFF) OpenType | 2011-02-09T00:00:00.000000 | 2011-02-09T00:00:00.000000 |
| certa-2011-avi-060 | Vulnérabilité dans Active Directory | 2011-02-09T00:00:00.000000 | 2011-02-09T00:00:00.000000 |
| certa-2011-avi-059 | Vulnérabilité dans Microsoft Internet Information Server (IIS) | 2011-02-09T00:00:00.000000 | 2011-02-09T00:00:00.000000 |
| certa-2011-avi-058 | Vulnérabilités dans Internet Explorer | 2011-02-09T00:00:00.000000 | 2011-02-09T00:00:00.000000 |
| certa-2011-avi-057 | Vulnérabilité dans Majordomo 2 | 2011-02-09T00:00:00.000000 | 2011-02-09T00:00:00.000000 |
| certa-2010-avi-550 | Vulnérabilités dans IBM HTTP Server et WebSphere | 2010-11-15T00:00:00.000000 | 2011-02-09T00:00:00.000000 |
| certa-2011-avi-056 | Vulnérabilités dans Apache Subversion | 2011-02-04T00:00:00.000000 | 2011-02-04T00:00:00.000000 |
| certa-2011-avi-055 | Vulnérabilité dans IBM Build Forge | 2011-02-04T00:00:00.000000 | 2011-02-04T00:00:00.000000 |
| certa-2011-avi-054 | Vulnérabilité dans les produits TANDBERG | 2011-02-04T00:00:00.000000 | 2011-02-04T00:00:00.000000 |
| certa-2011-avi-053 | Multiples vulnérabilités dans Google Chrome | 2011-02-04T00:00:00.000000 | 2011-02-04T00:00:00.000000 |
| certa-2011-avi-052 | Vulnérabilité dans les produits BlueCoat | 2011-02-04T00:00:00.000000 | 2011-02-04T00:00:00.000000 |
| certa-2011-avi-051 | Vulnérabilité dans HP OpenView Performance Insight | 2011-02-04T00:00:00.000000 | 2011-02-04T00:00:00.000000 |
| certa-2011-avi-050 | Multiples vulnérabilités dans Cisco WebEx Player | 2011-02-03T00:00:00.000000 | 2011-02-03T00:00:00.000000 |
| certa-2011-avi-049 | Vulnérabilité dans PMB | 2011-02-03T00:00:00.000000 | 2011-02-03T00:00:00.000000 |
| certa-2011-avi-048 | Vulnérabilité dans EMC NetWorker | 2011-02-02T00:00:00.000000 | 2011-02-02T00:00:00.000000 |