Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-21932 |
7.4 (3.1)
|
Vulnerability in the Oracle Java SE, Oracle Graal… |
Oracle Corporation |
Oracle Java SE |
2026-01-20T21:56:23.742Z | 2026-01-21T20:55:54.335Z |
| CVE-2026-21931 |
5.4 (3.1)
|
Vulnerability in the Oracle APEX Sample Applicati… |
Oracle Corporation |
Oracle APEX Sample Applications |
2026-01-20T21:56:23.267Z | 2026-01-21T20:55:14.477Z |
| CVE-2026-21929 |
5.3 (3.1)
|
Vulnerability in the MySQL Server product of Orac… |
Oracle Corporation |
MySQL Server |
2026-01-20T21:56:22.578Z | 2026-01-21T20:54:43.658Z |
| CVE-2026-21930 |
2.3 (3.1)
|
Vulnerability in the Oracle ZFS Storage Appliance… |
Oracle Corporation |
Oracle ZFS Storage Appliance Kit |
2026-01-20T21:56:22.940Z | 2026-01-21T20:54:21.244Z |
| CVE-2026-21928 |
5.3 (3.1)
|
Vulnerability in the Oracle Solaris product of Or… |
Oracle Corporation |
Oracle Solaris |
2026-01-20T21:56:22.236Z | 2026-01-21T20:52:42.304Z |
| CVE-2026-21926 |
7.5 (3.1)
|
Vulnerability in the Siebel CRM Deployment produc… |
Oracle Corporation |
Siebel CRM Deployment |
2026-01-20T21:56:21.443Z | 2026-01-21T20:51:46.300Z |
| CVE-2026-21925 |
4.8 (3.1)
|
Vulnerability in the Oracle Java SE, Oracle Graal… |
Oracle Corporation |
Oracle Java SE |
2026-01-20T21:56:21.058Z | 2026-01-21T20:51:07.046Z |
| CVE-2026-21924 |
5.4 (3.1)
|
Vulnerability in the Oracle Utilities Application… |
Oracle Corporation |
Oracle Utilities Application Framework |
2026-01-20T21:56:20.732Z | 2026-01-21T20:50:06.753Z |
| CVE-2026-21923 |
6.5 (3.1)
|
Vulnerability in the Oracle Life Sciences Central… |
Oracle Corporation |
Oracle Life Sciences Central Designer |
2026-01-20T21:56:20.389Z | 2026-01-21T20:49:28.694Z |
| CVE-2026-21922 |
4.2 (3.1)
|
Vulnerability in the Oracle Planning and Budgetin… |
Oracle Corporation |
Oracle Planning and Budgeting Cloud Service |
2026-01-20T21:56:19.994Z | 2026-01-21T20:48:53.795Z |
| CVE-2026-21642 |
6.1 (3.0)
|
HackerOne community member Patrick Lang (7yr) has… |
Revive |
Revive Adserver |
2026-01-20T20:48:48.079Z | 2026-01-21T20:47:21.691Z |
| CVE-2026-23886 |
5.3 (3.1)
|
Swift W3C TraceContext has malformed HTTP header that … |
swift-otel |
swift-w3c-trace-context |
2026-01-19T21:01:52.694Z | 2026-01-21T20:47:10.139Z |
| CVE-2026-21664 |
6.1 (3.0)
|
HackerOne community member Huynh Pham Thanh Luc (… |
Revive |
Revive Adserver |
2026-01-20T20:48:47.976Z | 2026-01-21T20:45:35.234Z |
| CVE-2026-21663 |
6.1 (3.0)
|
HackerOne community member Patrick Lang (7yr) has… |
Revive |
Revive Adserver |
2026-01-20T20:48:47.974Z | 2026-01-21T20:42:21.072Z |
| CVE-2025-59464 |
6.5 (3.0)
|
A memory leak in Node.js’s OpenSSL integration oc… |
nodejs |
node |
2026-01-20T20:41:55.599Z | 2026-01-21T20:41:09.437Z |
| CVE-2026-21637 |
5.9 (3.0)
|
A flaw in Node.js TLS error handling allows remot… |
nodejs |
node |
2026-01-20T20:41:55.352Z | 2026-01-21T20:22:51.033Z |
| CVE-2026-23950 |
8.8 (3.1)
|
node-tar has Race Condition in Path Reservations via U… |
isaacs |
node-tar |
2026-01-20T00:40:48.510Z | 2026-01-21T20:15:57.278Z |
| CVE-2025-59465 |
7.5 (3.0)
|
A malformed `HTTP/2 HEADERS` frame with oversized… |
nodejs |
node |
2026-01-20T20:41:55.317Z | 2026-01-21T20:11:28.986Z |
| CVE-2026-22770 |
6.5 (3.1)
|
ImageMagick vulnerable to Release of Invalid Pointer i… |
ImageMagick |
ImageMagick |
2026-01-20T00:48:19.241Z | 2026-01-21T20:10:46.858Z |
| CVE-2026-21964 |
4.9 (3.1)
|
Vulnerability in the MySQL Server product of Orac… |
Oracle Corporation |
MySQL Server |
2026-01-20T21:56:33.276Z | 2026-01-21T20:04:13.585Z |
| CVE-2026-21965 |
2.7 (3.1)
|
Vulnerability in the MySQL Server product of Orac… |
Oracle Corporation |
MySQL Server |
2026-01-20T21:56:33.583Z | 2026-01-21T19:57:30.139Z |
| CVE-2026-21966 |
6.1 (3.1)
|
Vulnerability in the Oracle Hospitality OPERA 5 P… |
Oracle Corporation |
Oracle Hospitality OPERA 5 Property Services |
2026-01-20T21:56:33.912Z | 2026-01-21T19:54:47.033Z |
| CVE-2026-23955 |
4.2 (3.1)
|
EVerest vulnerable to concatenation of strings literal… |
EVerest |
everest-core |
2026-01-21T19:25:12.104Z | 2026-01-21T19:53:57.098Z |
| CVE-2025-68137 |
8.4 (3.1)
|
EVerest's Integer Overflow and Signed to Unsigned conv… |
EVerest |
everest-core |
2026-01-21T19:20:09.059Z | 2026-01-21T19:51:26.058Z |
| CVE-2025-68136 |
7.4 (3.1)
|
EVerest's inadequate session handling can lead to memo… |
EVerest |
everest-core |
2026-01-21T19:18:21.068Z | 2026-01-21T19:47:04.055Z |
| CVE-2025-13465 |
6.9 (4.0)
|
Prototype Pollution Vulnerability in Lodash _.unset an… |
Lodash |
Lodash |
2026-01-21T19:05:28.846Z | 2026-01-21T19:43:38.268Z |
| CVE-2026-22218 |
7.1 (4.0)
|
Chainlit < 2.9.4 Arbitrary File Read via /project/element |
Chainlit |
Chainlit |
2026-01-19T23:14:52.969Z | 2026-01-21T19:42:24.327Z |
| CVE-2026-21967 |
8.6 (3.1)
|
Vulnerability in the Oracle Hospitality OPERA 5 p… |
Oracle Corporation |
Oracle Hospitality OPERA 5 |
2026-01-20T21:56:34.237Z | 2026-01-21T19:32:12.949Z |
| CVE-2026-21968 |
6.5 (3.1)
|
Vulnerability in the MySQL Server product of Orac… |
Oracle Corporation |
MySQL Server |
2026-01-20T21:56:34.542Z | 2026-01-21T19:21:31.349Z |
| CVE-2025-68135 |
6.5 (3.1)
|
EVerest's inadequate exception handling leads to denia… |
EVerest |
everest-core |
2026-01-21T18:56:05.970Z | 2026-01-21T19:17:21.915Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-47566 |
7.1 (3.1)
|
WordPress ZoomSounds plugin <= 6.91 - Reflected Cross … |
ZoomSounds |
ZoomSounds |
2025-12-31T20:07:56.919Z | 2026-01-20T14:28:05.562Z |
| CVE-2025-46255 |
7.5 (3.1)
|
WordPress LoginWP - Pro Plugin <= 4.0.8.5 - Settings C… |
Marketing Fire LLC |
LoginWP - Pro |
2026-01-05T16:44:34.478Z | 2026-01-20T14:28:05.508Z |
| CVE-2025-39561 |
6.5 (3.1)
|
WordPress LoginWP - Pro Plugin <= 4.0.8.5 - Broken Acc… |
Marketing Fire, LLC |
LoginWP - Pro |
2026-01-05T16:50:25.554Z | 2026-01-20T14:28:05.437Z |
| CVE-2025-39534 |
7.1 (3.1)
|
WordPress Terms Dictionary Plugin <= 1.5.1 - Reflected… |
Somonator |
Terms Dictionary |
2025-10-22T14:32:05.744Z | 2026-01-20T14:28:05.517Z |
| CVE-2025-39497 |
6.5 (3.1)
|
WordPress Dokan Pro plugin <= 3.14.5 - Cross Site Scri… |
Dokan |
Dokan Pro |
2026-01-05T16:51:39.889Z | 2026-01-20T14:28:05.472Z |
| CVE-2025-39484 |
9.3 (3.1)
|
WordPress Entrada Theme <= 5.7.7 - SQL Injection vulne… |
Waituk |
Entrada |
2026-01-05T16:53:28.100Z | 2026-01-20T14:28:05.385Z |
| CVE-2025-39468 |
9.8 (3.1)
|
WordPress Modal Survey plugin <= 2.0.2.0.1 - Local Fil… |
pantherius |
Modal Survey |
2025-11-06T15:53:34.539Z | 2026-01-20T14:28:05.416Z |
| CVE-2025-39465 |
8.1 (3.1)
|
WordPress Advanced Google Maps plugin <= 5.8.4 - Broke… |
flippercode |
Advanced Google Maps |
2025-11-06T15:53:29.145Z | 2026-01-20T14:28:05.359Z |
| CVE-2025-39463 |
9.8 (3.1)
|
WordPress Dessau theme < 1.9 - Local File Inclusion vu… |
Select-Themes |
Dessau |
2025-11-06T15:53:23.424Z | 2026-01-20T14:28:05.344Z |
| CVE-2025-32657 |
7.5 (3.1)
|
WordPress Testimonial Slider and Showcase Pro plugin <… |
RadiusTheme |
Testimonial Slider And Showcase Pro |
2025-10-22T14:32:05.506Z | 2026-01-20T14:28:05.445Z |
| CVE-2025-32283 |
8.8 (3.1)
|
WordPress Solar Energy theme <= 3.5 - PHP Object Injec… |
designthemes |
Solar Energy |
2025-10-22T14:32:05.260Z | 2026-01-20T14:28:05.397Z |
| CVE-2025-32222 |
9.8 (3.1)
|
WordPress Widget Logic <= 6.0.5 - Remote Code Executio… |
Widgetlogic.org |
Widget Logic |
2025-11-06T15:53:22.717Z | 2026-01-20T14:28:05.039Z |
| CVE-2025-31634 |
8.8 (3.1)
|
WordPress Insurance theme <= 3.5 - PHP Object Injectio… |
designthemes |
Insurance |
2025-10-22T14:32:05.043Z | 2026-01-20T14:28:05.105Z |
| CVE-2025-31054 |
7.1 (3.1)
|
WordPress Bloggie theme <= 2.0.8 - Cross Site Scriptin… |
Themefy |
Bloggie |
2025-12-31T20:05:20.832Z | 2026-01-20T14:28:04.874Z |
| CVE-2025-31048 |
9.9 (3.1)
|
WordPress Shopo <= 1.1.4 - Arbitrary File Upload Vulne… |
Themify |
Shopo |
2026-01-05T10:27:01.221Z | 2026-01-20T14:28:05.731Z |
| CVE-2025-31047 |
8.8 (3.1)
|
WordPress Themify Edmin theme <= 2.0.0 - PHP Object In… |
Themify |
Themify Edmin |
2026-01-05T10:26:04.107Z | 2026-01-20T14:28:04.925Z |
| CVE-2025-31046 |
4.3 (3.1)
|
WordPress AnyWhere Elementor Pro plugin <= 2.29 - Brok… |
WPvibes |
AnyWhere Elementor Pro |
2026-01-05T10:24:56.305Z | 2026-01-20T14:28:04.908Z |
| CVE-2025-31044 |
8.5 (3.1)
|
WordPress Premium SEO Pack <= 3.3.2 - SQL Injection Vu… |
AA-Team |
Premium SEO Pack |
2026-01-05T10:23:17.529Z | 2026-01-20T14:28:04.811Z |
| CVE-2025-31029 |
5.4 (3.1)
|
WordPress replyMail plugin <= 1.2.0 - Cross Site Reque… |
bingu |
replyMail |
2025-11-06T15:53:19.694Z | 2026-01-20T14:28:04.716Z |
| CVE-2025-30944 |
7.5 (3.1)
|
WordPress Tablesome Table Premium <= 1.1.23 - Broken A… |
Essekia |
Tablesome Table Premium |
2025-10-22T14:32:04.793Z | 2026-01-20T14:28:05.029Z |
| CVE-2025-30633 |
9.3 (3.1)
|
WordPress Amazon Native Shopping Recommendations Plugi… |
AA-Team |
Amazon Native Shopping Recommendations |
2026-01-05T10:21:09.369Z | 2026-01-20T14:28:04.771Z |
| CVE-2025-30628 |
8.5 (3.1)
|
WordPress Amazon Affiliates Addon for WPBakery Page Bu… |
AA-Team |
Amazon Affiliates Addon for WPBakery Page Builder (formerly Visual Composer) |
2025-12-31T20:03:50.402Z | 2026-01-20T14:28:05.322Z |
| CVE-2025-28973 |
6.5 (3.1)
|
WordPress Pro Bulk Watermark Plugin for WordPress <= 2… |
AA-Team |
Pro Bulk Watermark Plugin for WordPress |
2025-12-31T20:02:10.769Z | 2026-01-20T14:28:04.509Z |
| CVE-2025-28949 |
8.5 (3.1)
|
WordPress Mediabay - WordPress Media Library Folders <… |
Codedraft |
Mediabay - WordPress Media Library Folders |
2025-12-31T20:00:22.463Z | 2026-01-20T14:28:05.245Z |
| CVE-2025-27004 |
6.1 (3.1)
|
WordPress Famous - Responsive Image And Video Grid Gal… |
LambertGroup |
Famous - Responsive Image And Video Grid Gallery WordPress Plugin |
2026-01-08T09:17:41.802Z | 2026-01-20T14:28:05.101Z |
| CVE-2025-27002 |
6.1 (3.1)
|
WordPress CountDown With Image or Video Background plu… |
LambertGroup |
CountDown With Image or Video Background |
2026-01-08T09:17:41.443Z | 2026-01-20T14:28:04.180Z |
| CVE-2025-23993 |
9.8 (3.1)
|
WordPress Felan Framework plugin <= 1.1.3 - SQL Inject… |
RiceTheme |
Felan Framework |
2026-01-08T09:17:41.179Z | 2026-01-20T14:28:04.367Z |
| CVE-2025-23757 |
7.1 (3.1)
|
WordPress ZD Scribd iPaper plugin <= 1.0 - Reflected C… |
Proloy Chakroborty |
ZD Scribd iPaper |
2025-12-31T19:58:33.725Z | 2026-01-20T14:28:04.227Z |
| CVE-2025-23719 |
7.1 (3.1)
|
WordPress ZhinaTwitterWidget plugin <= 1.0 - Reflected… |
zckevin |
ZhinaTwitterWidget |
2025-12-31T19:57:28.449Z | 2026-01-20T14:28:04.844Z |
| CVE-2025-23707 |
7.1 (3.1)
|
WordPress En Masse plugin <= 1.0 - Reflected Cross Sit… |
Matamko |
En Masse |
2025-12-31T19:56:21.648Z | 2026-01-20T14:28:04.966Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-31044 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2026-01-05T11:17:40.343 | 2026-01-20T15:16:22.547 |
| fkie_cve-2025-31029 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-11-06T16:15:50.067 | 2026-01-20T15:16:22.390 |
| fkie_cve-2025-30944 | Missing Authorization vulnerability in Essekia Tablesome Table Premium tablesome-premium allows Acc… | 2025-10-22T15:15:33.033 | 2026-01-20T15:16:22.233 |
| fkie_cve-2025-30633 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2026-01-05T11:17:40.183 | 2026-01-20T15:16:22.120 |
| fkie_cve-2025-30628 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2025-12-31T20:15:42.353 | 2026-01-20T15:16:22.010 |
| fkie_cve-2025-28973 | Path Traversal: '.../...//' vulnerability in AA-Team Pro Bulk Watermark Plugin for WordPress allows… | 2025-12-31T20:15:42.207 | 2026-01-20T15:16:21.903 |
| fkie_cve-2025-28949 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2025-12-31T20:15:42.060 | 2026-01-20T15:16:21.647 |
| fkie_cve-2025-27004 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-01-08T10:15:48.923 | 2026-01-20T15:16:19.780 |
| fkie_cve-2025-27002 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-01-08T10:15:48.797 | 2026-01-20T15:16:19.533 |
| fkie_cve-2025-23993 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2026-01-08T10:15:48.650 | 2026-01-20T15:16:19.363 |
| fkie_cve-2025-23757 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-12-31T20:15:41.917 | 2026-01-20T15:16:19.250 |
| fkie_cve-2025-23719 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-12-31T20:15:41.770 | 2026-01-20T15:16:19.120 |
| fkie_cve-2025-23707 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-12-31T20:15:41.630 | 2026-01-20T15:16:19.000 |
| fkie_cve-2025-23705 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-12-31T20:15:41.483 | 2026-01-20T15:16:18.867 |
| fkie_cve-2025-23667 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-12-31T20:15:40.550 | 2026-01-20T15:16:18.757 |
| fkie_cve-2025-23608 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-12-31T18:15:44.007 | 2026-01-20T15:16:18.647 |
| fkie_cve-2025-23554 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-12-30T00:15:51.890 | 2026-01-20T15:16:18.550 |
| fkie_cve-2025-23550 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-12-30T00:15:51.747 | 2026-01-20T15:16:18.450 |
| fkie_cve-2025-23504 | Authentication Bypass Using an Alternate Path or Channel vulnerability in RiceTheme Felan Framework… | 2026-01-08T10:15:48.513 | 2026-01-20T15:16:18.287 |
| fkie_cve-2025-23469 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-12-30T00:15:51.597 | 2026-01-20T15:16:17.690 |
| fkie_cve-2025-23458 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-12-30T00:15:51.447 | 2026-01-20T15:16:17.577 |
| fkie_cve-2025-22728 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2026-01-08T10:15:48.390 | 2026-01-20T15:16:17.450 |
| fkie_cve-2025-22726 | Server-Side Request Forgery (SSRF) vulnerability in _nK nK Themes Helper nk-themes-helper allows Se… | 2026-01-08T10:15:48.247 | 2026-01-20T15:16:17.330 |
| fkie_cve-2025-22725 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-01-08T10:15:48.120 | 2026-01-20T15:16:17.203 |
| fkie_cve-2025-22715 | Missing Authorization vulnerability in loopus WP Attractive Donations System - Easy Stripe & Paypal… | 2026-01-08T10:15:47.990 | 2026-01-20T15:16:17.070 |
| fkie_cve-2025-22713 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2026-01-08T10:15:47.850 | 2026-01-20T15:16:16.940 |
| fkie_cve-2025-22712 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-01-08T10:15:47.727 | 2026-01-20T15:16:16.813 |
| fkie_cve-2025-22509 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-01-08T10:15:47.337 | 2026-01-20T15:16:16.430 |
| fkie_cve-2025-22288 | Path Traversal: '.../...//' vulnerability in WPMU DEV - Your All-in-One WordPress Platform Smush Im… | 2025-11-06T16:15:49.647 | 2026-01-20T15:16:16.277 |
| fkie_cve-2025-14431 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-01-08T10:15:46.463 | 2026-01-20T15:16:15.223 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-94wj-fc7f-845h |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:39Z | 2026-01-02T18:30:39Z |
| ghsa-7h5f-mpjc-vfm3 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:39Z | 2026-01-02T18:30:39Z |
| ghsa-79x4-f782-c29m |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:39Z | 2026-01-02T18:30:39Z |
| ghsa-7588-w2hf-mpw6 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:39Z | 2026-01-02T18:30:39Z |
| ghsa-5rw8-h6r4-fv28 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:39Z | 2026-01-02T18:30:39Z |
| ghsa-5f6h-2m8p-p84p |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:39Z | 2026-01-02T18:30:39Z |
| ghsa-456g-4jpc-gj7q |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:39Z | 2026-01-02T18:30:39Z |
| ghsa-44j4-f8g7-6rvw |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:39Z | 2026-01-02T18:30:39Z |
| ghsa-43x5-4jf2-wfq3 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:39Z | 2026-01-02T18:30:39Z |
| ghsa-2fq7-wr7m-4f94 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:39Z | 2026-01-02T18:30:39Z |
| ghsa-wq63-mx38-2j5f |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-vj2f-g9vx-mxr2 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-rj9w-cgpx-75w6 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-r85v-h3pq-48w5 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-r5g5-c2j6-8j8r |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-ppvp-3pc4-27m5 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-pjcm-33h8-599q |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-pcfg-f8h5-4pc7 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-p66q-3m7v-c8x3 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-m932-x76f-x6fv |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-jh6f-4pq5-95q3 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-h674-97ph-gwxw |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-gjjv-h8p2-77r7 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-f77j-3wr8-mxm9 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-f44q-qq73-2g32 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-9vr2-2x6c-jf8f |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-8p9x-rjvp-x4m6 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-8jq4-39wg-9593 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-8fqw-36pc-r97j |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-7gwh-6c6q-f3mh |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-25669 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-10T06:02:58.177970Z |
| gsd-2024-25656 | Improper input validation in AVSystem Unified Management Platform (UMP) 23.07.0.16567~LTS… | 2024-02-10T06:02:58.176909Z |
| gsd-2024-25694 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-10T06:02:58.176033Z |
| gsd-2024-25650 | Insecure key exchange between Delinea PAM Secret Server 11.4 and the Distributed Engine 8… | 2024-02-10T06:02:58.169545Z |
| gsd-2024-25668 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-10T06:02:58.169225Z |
| gsd-2024-25683 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-10T06:02:58.163760Z |
| gsd-2024-25651 | User enumeration can occur in the Authentication REST API in Delinea PAM Secret Server 11… | 2024-02-10T06:02:58.162832Z |
| gsd-2024-25692 | There is a cross-site-request forgery vulnerability in Esri Portal for ArcGIS Versions 1… | 2024-02-10T06:02:58.162010Z |
| gsd-2024-25649 | In Delinea PAM Secret Server 11.4, it is possible for an attacker (with Administrator acc… | 2024-02-10T06:02:58.161041Z |
| gsd-2024-25708 | There is a stored Cross-site Scripting vulnerability in Esri Portal for ArcGIS Enterprise… | 2024-02-10T06:02:58.158650Z |
| gsd-2024-25663 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-10T06:02:58.156016Z |
| gsd-2024-25661 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-10T06:02:58.151962Z |
| gsd-2024-25665 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-10T06:02:58.149520Z |
| gsd-2024-25686 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-10T06:02:58.146047Z |
| gsd-2024-25667 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-10T06:02:58.144405Z |
| gsd-2024-22475 | Cross-site request forgery vulnerability in multiple printers and scanners which implemen… | 2024-02-09T06:02:35.150076Z |
| gsd-2024-1355 | A command injection vulnerability was identified in GitHub Enterprise Server that allowed… | 2024-02-09T06:02:34.668477Z |
| gsd-2024-1368 | The Page Duplicator plugin for WordPress is vulnerable to unauthorized modification of da… | 2024-02-09T06:02:34.664596Z |
| gsd-2024-1376 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-09T06:02:34.661982Z |
| gsd-2024-1365 | The YML for Yandex Market plugin for WordPress is vulnerable to Reflected Cross-Site Scri… | 2024-02-09T06:02:34.657792Z |
| gsd-2024-1363 | The Easy Accordion – Best Accordion FAQ Plugin for WordPress plugin for WordPress is vuln… | 2024-02-09T06:02:34.655979Z |
| gsd-2024-1384 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-09T06:02:34.651833Z |
| gsd-2024-1362 | The Colibri Page Builder plugin for WordPress is vulnerable to Cross-Site Request Forgery… | 2024-02-09T06:02:34.649242Z |
| gsd-2024-1359 | A command injection vulnerability was identified in GitHub Enterprise Server that allowed… | 2024-02-09T06:02:34.640972Z |
| gsd-2024-1364 | The Elementor Website Builder Pro plugin for WordPress is vulnerable to Stored Cross-Site… | 2024-02-09T06:02:34.637230Z |
| gsd-2024-1372 | A command injection vulnerability was identified in GitHub Enterprise Server that allowed… | 2024-02-09T06:02:34.636940Z |
| gsd-2024-1348 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-09T06:02:34.635338Z |
| gsd-2024-1343 | A weak permission was found in the backup directory in LaborOfficeFree affecting version … | 2024-02-09T06:02:34.630731Z |
| gsd-2024-1386 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-09T06:02:34.628720Z |
| gsd-2024-1387 | The Happy Addons for Elementor plugin for WordPress is vulnerable to unauthorized access … | 2024-02-09T06:02:34.627773Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-183835 | Malicious code in masolv-ilo-cvaginahu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183834 | Malicious code in masolv-ilo-cvaginaavcuovhu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183833 | Malicious code in masolv-avog-uucav (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183832 | Malicious code in masolv-avo-uucav (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183831 | Malicious code in masolv-avo-ucav (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183830 | Malicious code in masolv-avo-cobsav (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183829 | Malicious code in masolv-avo-cobsabvov (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183828 | Malicious code in masolv-avo-cobsabubasvov (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183827 | Malicious code in masolv-avo-cobsabuabasvov (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183826 | Malicious code in masolv-avo-cobsabsvov (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183825 | Malicious code in masolv-avo-cobsabbasvov (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183824 | Malicious code in masolv-avo-cbv (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183823 | Malicious code in masolv-avo-cbsv (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183822 | Malicious code in masolv-avo-cbsav (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183821 | Malicious code in masolv-avo-cav (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183820 | Malicious code in masolv-avlo-cvov (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183819 | Malicious code in masolv-avlo-cvoifaufoiv (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183818 | Malicious code in masolv-avlo-cov (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183817 | Malicious code in masolv-avlo-cobsvov (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183816 | Malicious code in masolv-avlo-cobsabuabasvov (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183815 | Malicious code in masolv-avlo-cobsababasvov (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183814 | Malicious code in masolv-avlo-cobsabaasvov (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183813 | Malicious code in masolv-avlo-cobasvov (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183812 | Malicious code in masolv-avlo-cobabsvov (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183811 | Malicious code in masolv-avlo-cobabasvov (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183810 | Malicious code in masolv-avlo-civsoifaufoiv (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183809 | Malicious code in masolv-avlo-civbusasoifaufoiv (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183808 | Malicious code in masolv-avlo-civbsoifaufoiv (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183807 | Malicious code in masolv-avlo-civbsasoifaufoiv (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183806 | Malicious code in masolv-avlo-ciov (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2023:7434 | Red Hat Security Advisory: kernel security and bug fix update | 2023-11-21T15:36:34+00:00 | 2025-11-21T18:51:18+00:00 |
| rhsa-2023:7431 | Red Hat Security Advisory: kernel-rt security update | 2023-11-21T15:30:04+00:00 | 2025-11-21T18:51:16+00:00 |
| rhsa-2023:7419 | Red Hat Security Advisory: kpatch-patch security update | 2023-11-21T15:31:09+00:00 | 2025-11-21T18:51:13+00:00 |
| rhsa-2023:7417 | Red Hat Security Advisory: kpatch-patch security update | 2023-11-21T14:47:07+00:00 | 2025-11-21T18:51:11+00:00 |
| rhsa-2023:7410 | Red Hat Security Advisory: kpatch-patch security update | 2023-11-21T11:47:34+00:00 | 2025-11-21T18:51:08+00:00 |
| rhsa-2023:7409 | Red Hat Security Advisory: glibc security update | 2023-11-21T12:19:03+00:00 | 2025-11-21T18:51:08+00:00 |
| rhsa-2023:7408 | Red Hat Security Advisory: samba security update | 2023-11-21T12:13:43+00:00 | 2025-11-21T18:51:06+00:00 |
| rhsa-2023:7405 | Red Hat Security Advisory: tigervnc security update | 2023-11-21T11:39:16+00:00 | 2025-11-21T18:51:06+00:00 |
| rhsa-2023:7403 | Red Hat Security Advisory: pixman security update | 2023-11-21T11:37:23+00:00 | 2025-11-21T18:51:05+00:00 |
| rhsa-2023:7394 | Red Hat Security Advisory: binutils security update | 2023-11-21T11:51:13+00:00 | 2025-11-21T18:51:04+00:00 |
| rhsa-2023:7392 | Red Hat Security Advisory: c-ares security update | 2023-11-21T11:47:27+00:00 | 2025-11-21T18:51:03+00:00 |
| rhsa-2023:7388 | Red Hat Security Advisory: tigervnc security update | 2023-11-21T11:18:31+00:00 | 2025-11-21T18:51:02+00:00 |
| rhsa-2023:7386 | Red Hat Security Advisory: pixman security update | 2023-11-21T11:18:24+00:00 | 2025-11-21T18:51:02+00:00 |
| rhsa-2023:7376 | Red Hat Security Advisory: libqb security update | 2023-11-21T11:23:23+00:00 | 2025-11-21T18:50:59+00:00 |
| rhsa-2023:7375 | Red Hat Security Advisory: pixman security update | 2023-11-21T11:12:13+00:00 | 2025-11-21T18:50:59+00:00 |
| rhsa-2023:7373 | Red Hat Security Advisory: tigervnc security update | 2023-11-21T11:15:53+00:00 | 2025-11-21T18:50:58+00:00 |
| rhsa-2023:7371 | Red Hat Security Advisory: samba security update | 2023-11-21T11:26:51+00:00 | 2025-11-21T18:50:58+00:00 |
| rhsa-2023:7361 | Red Hat Security Advisory: ncurses security update | 2023-11-21T10:27:06+00:00 | 2025-11-21T18:50:57+00:00 |
| rhsa-2023:7341 | Red Hat Security Advisory: Red Hat Quay security update | 2023-11-30T14:34:57+00:00 | 2025-11-21T18:50:55+00:00 |
| rhsa-2023:7294 | Red Hat Security Advisory: kernel security update | 2023-11-15T20:35:20+00:00 | 2025-11-21T18:50:52+00:00 |
| rhsa-2023:7279 | Red Hat Security Advisory: open-vm-tools security update | 2023-11-15T20:40:40+00:00 | 2025-11-21T18:50:52+00:00 |
| rhsa-2023:7277 | Red Hat Security Advisory: open-vm-tools security update | 2023-11-15T21:25:18+00:00 | 2025-11-21T18:50:51+00:00 |
| rhsa-2023:7276 | Red Hat Security Advisory: open-vm-tools security update | 2023-11-15T21:25:39+00:00 | 2025-11-21T18:50:51+00:00 |
| rhsa-2023:7267 | Red Hat Security Advisory: open-vm-tools security update | 2023-11-15T20:38:58+00:00 | 2025-11-21T18:50:50+00:00 |
| rhsa-2023:7265 | Red Hat Security Advisory: open-vm-tools security update | 2023-11-15T20:35:19+00:00 | 2025-11-21T18:50:50+00:00 |
| rhsa-2023:7264 | Red Hat Security Advisory: open-vm-tools security update | 2023-11-15T21:50:29+00:00 | 2025-11-21T18:50:50+00:00 |
| rhsa-2023:7263 | Red Hat Security Advisory: open-vm-tools security update | 2023-11-15T23:19:09+00:00 | 2025-11-21T18:50:50+00:00 |
| rhsa-2023:7262 | Red Hat Security Advisory: open-vm-tools security update | 2023-11-15T21:26:54+00:00 | 2025-11-21T18:50:49+00:00 |
| rhsa-2023:7261 | Red Hat Security Advisory: open-vm-tools security update | 2023-11-15T20:38:49+00:00 | 2025-11-21T18:50:49+00:00 |
| rhsa-2023:7260 | Red Hat Security Advisory: open-vm-tools security update | 2023-11-15T21:26:14+00:00 | 2025-11-21T18:50:48+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2021-22939 | If the Node.js https API was used incorrectly and "undefined" was in passed for the "rejectUnauthorized" parameter no error was returned and connections to servers with an expired certificate would have been accepted. | 2021-08-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-22930 | Node.js before 16.6.0 14.17.4 and 12.22.4 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption to change process behavior. | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-22926 | libcurl-using applications can ask for a specific client certificate to be used in a transfer. This is done with the `CURLOPT_SSLCERT` option (`--cert` with the command line tool).When libcurl is built to use the macOS native TLS library Secure Transport an application can ask for the client certificate by name or with a file name - using the same option. If the name exists as a file it will be used instead of by name.If the appliction runs with a current working directory that is writable by other users (like `/tmp`) a malicious user can create a file name with the same name as the app wants to use by name and thereby trick the application to use the file based cert instead of the one referred to by name making libcurl send the wrong client certificate in the TLS connection handshake. | 2021-08-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-22925 | curl supports the `-t` command line option known as `CURLOPT_TELNETOPTIONS`in libcurl. This rarely used option is used to send variable=content pairs toTELNET servers.Due to flaw in the option parser for sending `NEW_ENV` variables libcurlcould be made to pass on uninitialized data from a stack based buffer to theserver. Therefore potentially revealing sensitive internal information to theserver using a clear-text network protocol.This could happen because curl did not call and use sscanf() correctly whenparsing the string provided by the application. | 2021-08-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-22924 | libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup.Due to errors in the logic the config matching function did not take 'issuercert' into account and it compared the involved paths *case insensitively*which could lead to libcurl reusing wrong connections.File paths are or can be case sensitive on many systems but not all and caneven vary depending on used file systems.The comparison also didn't include the 'issuer cert' which a transfer can setto qualify how to verify the server certificate. | 2021-08-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-22923 | When curl is instructed to get content using the metalink feature and a user name and password are used to download the metalink XML file those same credentials are then subsequently passed on to each of the servers from which curl will download or try to download the contents from. Often contrary to the user's expectations and intentions and without telling the user it happened. | 2021-08-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-22922 | When curl is instructed to download content using the metalink feature thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs potentially hosted by different servers and theclient can then download the file from one or several of them. In a serial orparallel manner.If one of the servers hosting the contents has been breached and the contentsof the specific file on that server is replaced with a modified payload curlshould detect this when the hash of the file mismatches after a completeddownload. It should remove the contents and instead try getting the contentsfrom another URL. This is not done and instead such a hash mismatch is onlymentioned in text and the potentially malicious content is kept in the file ondisk. | 2021-08-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-22901 | curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentially reach remote code execution in the client. When libcurl at run-time sets up support for TLS 1.3 session tickets on a connection using OpenSSL it stores pointers to the transfer in-memory object for later retrieval when a session ticket arrives. If the connection is used by multiple transfers (like with a reused HTTP/1.1 connection or multiplexed HTTP/2 connection) that first transfer object might be freed before the new session is established on that connection and then the function will access a memory buffer that might be freed. When using that memory libcurl might even call a function pointer in the object making it possible for a remote code execution if the server could somehow manage to get crafted memory content into the correct | 2021-06-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-22898 | curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option known as `CURLOPT_TELNETOPTIONS` in libcurl is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables libcurl could be made to pass on uninitialized data from a stack based buffer to the server resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol. | 2021-06-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-22897 | curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single "static" variable in the library which has the surprising side-effect that if an application sets up multiple concurrent transfers the last one that sets the ciphers will accidentally control the set used by all transfers. In a worst-case scenario this weakens transport security significantly. | 2021-06-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-21309 | Integer overflow on 32-bit systems | 2021-02-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-21303 | Injection attack in Helm | 2021-02-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-20232 | A flaw was found in gnutls. A use after free issue in client_send_params in lib/ext/pre_shared_key.c may lead to memory corruption and other potential consequences. | 2021-03-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-20231 | A flaw was found in gnutls. A use after free issue in client sending key_share extension may lead to memory corruption and other consequences. | 2021-03-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-20228 | A flaw was found in the Ansible Engine 2.9.18 where sensitive info is not masked by default and is not protected by the no_log feature when using the sub-option feature of the basic.py module. This flaw allows an attacker to obtain sensitive information. The highest threat from this vulnerability is to confidentiality. | 2021-04-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-8037 | ppp decapsulator can be convinced to allocate a large amount of memory | 2020-11-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-8032 | Local privilege escalation to root due to insecure tmp file usage | 2021-02-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-6750 | GSocketClient in GNOME GLib through 2.62.4 may occasionally connect directly to a target address instead of connecting via a proxy server when configured to do so because the proxy_addr field is mishandled. This bug is timing-dependent and may occur only sporadically depending on network delays. The greatest security relevance is in use cases where a proxy is used to help with privacy/anonymity even though there is no technical barrier to a direct connection. NOTE: versions before 2.60 are unaffected. | 2020-01-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-5208 | remote code execution vulnerability in ipmitool | 2020-02-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-36325 | An issue was discovered in Jansson through 2.13.1. Due to a parsing error in json_loads there's an out-of-bounds read-access bug. NOTE: the vendor reports that this only occurs when a programmer fails to follow the API specification | 2021-04-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-35524 | A heap-based buffer overflow flaw was found in libtiff in the handling of TIFF images in libtiff's TIFF2PDF tool. A specially crafted TIFF file can lead to arbitrary code execution. The highest threat from this vulnerability is to confidentiality integrity as well as system availability. | 2021-03-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-35523 | An integer overflow flaw was found in libtiff that exists in the tif_getimage.c file. This flaw allows an attacker to inject and execute arbitrary code when a user opens a crafted TIFF file. The highest threat from this vulnerability is to confidentiality integrity as well as system availability. | 2021-03-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-35522 | In LibTIFF there is a memory malloc failure in tif_pixarlog.c. A crafted TIFF document can lead to an abort resulting in a remote denial of service attack. | 2021-03-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-35521 | A flaw was found in libtiff. Due to a memory allocation failure in tif_read.c a crafted TIFF file can lead to an abort resulting in denial of service. | 2021-03-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-35508 | A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux kernel child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process. | 2021-03-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-35499 | A NULL pointer dereference flaw in Linux kernel versions prior to 5.11 may be seen if sco_sock_getsockopt function in net/bluetooth/sco.c do not have a sanity check for a socket connection when using BT_SNDMTU/BT_RCVMTU for SCO sockets. This could allow a local attacker with a special user privilege to crash the system (DOS) or leak kernel internal information. | 2021-02-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-35457 | GNOME GLib before 2.65.3 has an integer overflow that might lead to an out-of-bounds write in g_option_group_add_entries. NOTE: the vendor's position is "Realistically this is not a security issue. The standard pattern is for callers to provide a static list of option entries in a fixed number of calls to g_option_group_add_entries()." The researcher states that this pattern is undocumented | 2020-12-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-35452 | mod_auth_digest possible stack overflow by one nul byte | 2021-06-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-29511 | The encoding/xml package in Go (all versions) does not correctly preserve the semantics of element namespace prefixes during tokenization round-trips which allows an attacker to craft inputs that behave in conflicting ways during different stages of processing in affected downstream applications. | 2020-12-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-29509 | The encoding/xml package in Go (all versions) does not correctly preserve the semantics of attribute namespace prefixes during tokenization round-trips which allows an attacker to craft inputs that behave in conflicting ways during different stages of processing in affected downstream applications. | 2020-12-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-201602-0329 | Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and O… | 2025-04-13T23:03:09.301000Z |
| var-201603-0277 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.… | 2025-04-13T23:03:09.215000Z |
| var-201602-0323 | Use-after-free vulnerability in the URLRequest object implementation in Adobe Flash Playe… | 2025-04-13T23:03:09.171000Z |
| var-201602-0341 | Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and O… | 2025-04-13T23:03:09.131000Z |
| var-201602-0328 | Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and O… | 2025-04-13T23:03:09.092000Z |
| var-201603-0262 | Use-after-free vulnerability in the setInterval method in Adobe Flash Player before 18.0.… | 2025-04-13T23:03:09.049000Z |
| var-201603-0280 | Integer overflow in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.… | 2025-04-13T23:03:09.007000Z |
| var-201602-0324 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x be… | 2025-04-13T23:03:08.968000Z |
| var-201602-0339 | Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and O… | 2025-04-13T23:03:08.929000Z |
| var-201602-0338 | Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and O… | 2025-04-13T23:03:08.889000Z |
| var-201603-0274 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.… | 2025-04-13T23:03:08.849000Z |
| var-201603-0266 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.… | 2025-04-13T23:03:08.809000Z |
| var-201603-0271 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.… | 2025-04-13T23:03:08.767000Z |
| var-201602-0336 | Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and O… | 2025-04-13T23:03:08.726000Z |
| var-201602-0332 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x be… | 2025-04-13T23:03:08.686000Z |
| var-201602-0330 | Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and O… | 2025-04-13T23:03:08.648000Z |
| var-201602-0327 | Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and O… | 2025-04-13T23:03:08.610000Z |
| var-201602-0331 | Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and O… | 2025-04-13T23:03:08.573000Z |
| var-201602-0322 | Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and O… | 2025-04-13T23:03:08.533000Z |
| var-201603-0273 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.… | 2025-04-13T23:03:08.493000Z |
| var-201603-0263 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.… | 2025-04-13T23:03:08.453000Z |
| var-201603-0036 | The HTTPS Proxy feature in Cisco AsyncOS before 8.5.3-051 and 9.x before 9.0.0-485 on Web… | 2025-04-13T23:03:08.302000Z |
| var-201603-0141 | Apple Software Update before 2.2 on Windows does not use HTTPS, which makes it easier for… | 2025-04-13T23:03:08.269000Z |
| var-201603-0203 | Untrusted search path vulnerability in Adobe Reader and Acrobat before 11.0.15, Acrobat a… | 2025-04-13T23:03:07.698000Z |
| var-201603-0202 | Adobe Reader and Acrobat before 11.0.15, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:03:07.664000Z |
| var-201603-0204 | Adobe Reader and Acrobat before 11.0.15, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:03:07.629000Z |
| var-201604-0006 | Cisco TelePresence Server 3.1 on 7010, Mobility Services Engine (MSE) 8710, Multiparty Me… | 2025-04-13T23:03:07.501000Z |
| var-201604-0048 | Cisco UCS Invicta C3124SA Appliance 4.3.1 through 5.0.1, UCS Invicta Scaling System and A… | 2025-04-13T23:03:07.471000Z |
| var-201604-0068 | SQL injection vulnerability in Ecava IntegraXor before 5.0 build 4522 allows remote attac… | 2025-04-13T23:03:07.400000Z |
| var-201604-0382 | Cross-site request forgery (CSRF) vulnerability on NEC Aterm WG300HP devices allows remot… | 2025-04-13T23:03:06.580000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2020:3586-1 | Security update for xorg-x11-server | 2020-12-01T15:31:21Z | 2020-12-01T15:31:21Z |
| suse-su-2020:3585-1 | Security update for xorg-x11-server | 2020-12-01T15:30:42Z | 2020-12-01T15:30:42Z |
| suse-su-2020:14553-1 | Security update for xorg-x11-server | 2020-12-01T15:29:34Z | 2020-12-01T15:29:34Z |
| suse-su-2020:3582-1 | Security update for xorg-x11-server | 2020-12-01T15:28:46Z | 2020-12-01T15:28:46Z |
| suse-su-2020:2198-1 | Security update for webkit2gtk3 | 2020-12-01T12:21:26Z | 2020-12-01T12:21:26Z |
| suse-su-2020:2475-2 | Security update for libX11 | 2020-12-01T06:33:11Z | 2020-12-01T06:33:11Z |
| suse-su-2020:3568-1 | Security update for mutt | 2020-11-30T15:59:08Z | 2020-11-30T15:59:08Z |
| suse-su-2020:14551-1 | Security update for mutt | 2020-11-30T15:57:54Z | 2020-11-30T15:57:54Z |
| suse-su-2020:3566-1 | Security update for python-setuptools | 2020-11-30T15:57:10Z | 2020-11-30T15:57:10Z |
| suse-su-2020:3565-1 | Security update for python-pip | 2020-11-30T15:56:26Z | 2020-11-30T15:56:26Z |
| suse-su-2020:3564-1 | Security update for mariadb | 2020-11-30T15:54:24Z | 2020-11-30T15:54:24Z |
| suse-su-2020:3563-1 | Security update for python36 | 2020-11-30T15:53:59Z | 2020-11-30T15:53:59Z |
| suse-su-2020:3552-1 | Security update for binutils | 2020-11-27T17:11:51Z | 2020-11-27T17:11:51Z |
| suse-su-2020:3551-1 | Security update for libssh2_org | 2020-11-27T13:54:59Z | 2020-11-27T13:54:59Z |
| suse-su-2020:2474-2 | Security update for libX11 | 2020-11-27T13:14:10Z | 2020-11-27T13:14:10Z |
| suse-su-2020:3550-1 | Security update for LibVNCServer | 2020-11-27T11:23:28Z | 2020-11-27T11:23:28Z |
| suse-su-2020:3549-1 | Security update for nodejs12 | 2020-11-27T11:22:09Z | 2020-11-27T11:22:09Z |
| suse-su-2020:3548-1 | Security update for MozillaFirefox | 2020-11-27T11:18:56Z | 2020-11-27T11:18:56Z |
| suse-su-2020:3473-2 | Security update for ceph | 2020-11-26T17:15:41Z | 2020-11-26T17:15:41Z |
| suse-su-2020:3544-1 | Security update for the Linux Kernel | 2020-11-26T15:53:57Z | 2020-11-26T15:53:57Z |
| suse-su-2020:3539-1 | Security update for ceph | 2020-11-26T14:52:36Z | 2020-11-26T14:52:36Z |
| suse-su-2020:3532-1 | Security update for the Linux Kernel | 2020-11-26T11:49:26Z | 2020-11-26T11:49:26Z |
| suse-su-2020:14550-1 | Security update for python | 2020-11-26T11:49:04Z | 2020-11-26T11:49:04Z |
| suse-su-2020:14549-1 | Security update for LibVNCServer | 2020-11-26T11:47:01Z | 2020-11-26T11:47:01Z |
| suse-su-2020:3528-1 | Security update for MozillaThunderbird | 2020-11-26T10:52:39Z | 2020-11-26T10:52:39Z |
| suse-su-2020:3522-1 | Security update for the Linux Kernel | 2020-11-25T13:32:43Z | 2020-11-25T13:32:43Z |
| suse-su-2020:3516-1 | Security update for bluez | 2020-11-25T12:16:05Z | 2020-11-25T12:16:05Z |
| suse-su-2020:3515-1 | Security update for LibVNCServer | 2020-11-25T12:15:02Z | 2020-11-25T12:15:02Z |
| suse-su-2020:3514-1 | Security update for ucode-intel | 2020-11-25T12:14:12Z | 2020-11-25T12:14:12Z |
| suse-su-2020:3513-1 | Security update for the Linux Kernel | 2020-11-25T09:47:02Z | 2020-11-25T09:47:02Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2024-41252 | IBM QRadar Suite日志信息泄露漏洞 | 2024-02-22 | 2024-10-21 |
| cnvd-2024-41251 | IBM QRadar Suite日志信息泄露漏洞(CNVD-2024-41251) | 2024-02-22 | 2024-10-21 |
| cnvd-2024-41250 | IBM QRadar Suite日志信息泄露漏洞(CNVD-2024-41250) | 2024-02-22 | 2024-10-21 |
| cnvd-2024-41249 | IBM QRadar Suite证书验证错误漏洞 | 2024-03-05 | 2024-10-21 |
| cnvd-2024-41248 | IBM MQ Operator信息泄露漏洞 | 2024-03-05 | 2024-10-21 |
| cnvd-2024-41247 | IBM MQ Operator加密问题漏洞 | 2024-03-05 | 2024-10-21 |
| cnvd-2024-41246 | IBM MQ权限提升漏洞(CNVD-2024-41246) | 2024-07-02 | 2024-10-21 |
| cnvd-2024-41245 | IBM MQ拒绝服务漏洞(CNVD-2024-41245) | 2024-07-02 | 2024-10-21 |
| cnvd-2024-41244 | IBM MQ信息泄露漏洞(CNVD-2024-41244) | 2024-07-02 | 2024-10-21 |
| cnvd-2024-41243 | IBM MQ拒绝服务漏洞(CNVD-2024-41243) | 2024-07-02 | 2024-10-21 |
| cnvd-2024-41242 | IBM MQ信息泄露漏洞(CNVD-2024-41242) | 2024-07-02 | 2024-10-21 |
| cnvd-2024-40578 | 江苏浪潮信息咨询有限公司国资监管信息化平台存在文件上传漏洞 | 2024-09-06 | 2024-10-21 |
| cnvd-2024-40569 | 北京北大方正电子有限公司方正畅享全媒体新闻采编系统存在SQL注入漏洞(CNVD-2024-40569) | 2024-09-06 | 2024-10-21 |
| cnvd-2023-50681 | 北京亚控科技发展有限公司kingh5stream存在逻辑缺陷漏洞(CNVD-2023-50681) | 2023-04-17 | 2024-10-21 |
| cnvd-2024-41672 | Zenario CMS跨站脚本漏洞 | 2024-10-13 | 2024-10-18 |
| cnvd-2024-41671 | OFCMS跨站脚本漏洞(CNVD-2024-41671) | 2024-10-13 | 2024-10-18 |
| cnvd-2024-41052 | D-Link DIR-605L formAdvanceSetup函数缓冲区溢出漏洞 | 2024-10-13 | 2024-10-18 |
| cnvd-2024-41042 | D-Link DIR-619L formSetQoS函数缓冲区溢出漏洞 | 2024-10-17 | 2024-10-18 |
| cnvd-2024-41041 | D-Link DIR-619L formSetPortTr函数缓冲区溢出漏洞 | 2024-10-17 | 2024-10-18 |
| cnvd-2024-41040 | D-Link DIR-619L formSetPassword函数缓冲区溢出漏洞 | 2024-10-17 | 2024-10-18 |
| cnvd-2024-41039 | D-Link DIR-619L formSetMuti函数缓冲区溢出漏洞 | 2024-10-17 | 2024-10-18 |
| cnvd-2024-41038 | NETGEAR EX6120命令注入漏洞 | 2024-10-17 | 2024-10-18 |
| cnvd-2024-41037 | D-Link DIR-820L缓冲区溢出漏洞(CNVD-2024-41037) | 2024-10-17 | 2024-10-18 |
| cnvd-2024-41036 | D-Link DCS-960L缓冲区溢出漏洞 | 2024-10-17 | 2024-10-18 |
| cnvd-2024-41035 | TP-LINK TL-WR740N缓冲区溢出漏洞 | 2024-10-17 | 2024-10-18 |
| cnvd-2024-41011 | Esri Portal For ArcGIS重定向漏洞(CNVD-2024-41011) | 2024-10-17 | 2024-10-18 |
| cnvd-2024-41010 | Esri Portal For ArcGIS跨站脚本漏洞(CNVD-2024-41010) | 2024-10-17 | 2024-10-18 |
| cnvd-2024-41009 | Esri Portal For ArcGIS跨站脚本漏洞(CNVD-2024-41009) | 2024-10-17 | 2024-10-18 |
| cnvd-2024-41008 | Esri Portal For ArcGIS跨站脚本漏洞(CNVD-2024-41008) | 2024-10-17 | 2024-10-18 |
| cnvd-2024-41007 | Esri Portal For ArcGIS跨站脚本漏洞(CNVD-2024-41007) | 2024-10-17 | 2024-10-18 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2010-avi-606 | Vulnérabilités dans Microsoft Publisher | 2010-12-15T00:00:00.000000 | 2010-12-15T00:00:00.000000 |
| certa-2010-avi-605 | Vulnérabilité dans Microsoft Windows Hyper-V VMBus | 2010-12-15T00:00:00.000000 | 2010-12-15T00:00:00.000000 |
| certa-2010-avi-604 | Vulnérabilité dans le service Netlogon de Microsoft Windows | 2010-12-15T00:00:00.000000 | 2010-12-15T00:00:00.000000 |
| certa-2010-avi-603 | Vulnérabilité dans l'interface utilisateur Microsoft | 2010-12-15T00:00:00.000000 | 2010-12-15T00:00:00.000000 |
| certa-2010-avi-602 | Vulnérabilité dans le noyau de Windows | 2010-12-15T00:00:00.000000 | 2010-12-15T00:00:00.000000 |
| certa-2010-avi-601 | Multiples vulnérabilités dans le sous-système graphique Windows | 2010-12-15T00:00:00.000000 | 2010-12-15T00:00:00.000000 |
| certa-2010-avi-600 | Vulnérabilité dans l'assistant de connexion Internet Windows | 2010-12-15T00:00:00.000000 | 2010-12-15T00:00:00.000000 |
| certa-2010-avi-599 | Vulnérabilité dans le carnet d'adresses Windows | 2010-12-15T00:00:00.000000 | 2010-12-15T00:00:00.000000 |
| certa-2010-avi-598 | Vulnérabilité dans Windows | 2010-12-15T00:00:00.000000 | 2010-12-15T00:00:00.000000 |
| certa-2010-avi-597 | Vulnérabilité dans le codeur Windows Media | 2010-12-15T00:00:00.000000 | 2010-12-15T00:00:00.000000 |
| certa-2010-avi-596 | Vulnérabilité dans Microsoft Movie Maker | 2010-12-15T00:00:00.000000 | 2010-12-15T00:00:00.000000 |
| certa-2010-avi-595 | Vulnérabilités dans le pilote de police OpenType | 2010-12-15T00:00:00.000000 | 2010-12-15T00:00:00.000000 |
| certa-2010-avi-594 | Vulnérabilité dans le planificateur de tâches de Windows | 2010-12-15T00:00:00.000000 | 2010-12-15T00:00:00.000000 |
| certa-2010-avi-593 | Vulnérabilités dans Microsoft Internet Explorer | 2010-12-15T00:00:00.000000 | 2010-12-15T00:00:00.000000 |
| certa-2010-avi-592 | Multiples vulnérabilités dans Google Chrome | 2010-12-14T00:00:00.000000 | 2010-12-14T00:00:00.000000 |
| certa-2010-avi-591 | Vulnérabilités dans Novell ZENworks | 2010-12-14T00:00:00.000000 | 2010-12-14T00:00:00.000000 |
| certa-2010-avi-589 | Vulnérabilité dans des produits de chiffrement Sophos | 2010-12-14T00:00:00.000000 | 2010-12-14T00:00:00.000000 |
| certa-2010-avi-588 | Vulnérabilité dans Lotus Mobile Connect | 2010-12-14T00:00:00.000000 | 2010-12-14T00:00:00.000000 |
| certa-2010-avi-587 | Vulnérabilités dans Exim 4 | 2010-12-13T00:00:00.000000 | 2010-12-13T00:00:00.000000 |
| certa-2010-avi-586 | Multiples vulnérabilités dans RealPlayer | 2010-12-13T00:00:00.000000 | 2010-12-13T00:00:00.000000 |
| certa-2010-avi-576 | Vulnérabilités dans ClamAV | 2010-12-03T00:00:00.000000 | 2010-12-10T00:00:00.000000 |
| certa-2010-avi-584 | Vulnérabilité dans Citrix Web Interface | 2010-12-09T00:00:00.000000 | 2010-12-09T00:00:00.000000 |
| certa-2010-avi-583 | Multiples vulnérabilités dans VMware ESX | 2010-12-09T00:00:00.000000 | 2010-12-09T00:00:00.000000 |
| certa-2010-avi-582 | Vulnérabilités dans WordPress | 2010-12-09T00:00:00.000000 | 2010-12-09T00:00:00.000000 |
| certa-2010-avi-581 | Multiples vulnérabilités dans QuickTime | 2010-12-08T00:00:00.000000 | 2010-12-08T00:00:00.000000 |
| certa-2010-avi-580 | Vulnérabilité dans le module Safe de Perl | 2010-12-07T00:00:00.000000 | 2010-12-07T00:00:00.000000 |
| certa-2010-avi-579 | Vulnérabilités dans AWStats | 2010-12-06T00:00:00.000000 | 2010-12-06T00:00:00.000000 |
| certa-2010-avi-578 | Multiples vulnérabilités dans Google Chrome | 2010-12-06T00:00:00.000000 | 2010-12-06T00:00:00.000000 |
| certa-2010-avi-577 | Vulnérabilité dans CUPS | 2010-12-06T00:00:00.000000 | 2010-12-06T00:00:00.000000 |
| certa-2010-avi-574 | Multiples vulnérabilités dans les produits VMware | 2010-12-03T00:00:00.000000 | 2010-12-03T00:00:00.000000 |