Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-21930 |
2.3 (3.1)
|
Vulnerability in the Oracle ZFS Storage Appliance… |
Oracle Corporation |
Oracle ZFS Storage Appliance Kit |
2026-01-20T21:56:22.940Z | 2026-01-21T20:54:21.244Z |
| CVE-2026-21928 |
5.3 (3.1)
|
Vulnerability in the Oracle Solaris product of Or… |
Oracle Corporation |
Oracle Solaris |
2026-01-20T21:56:22.236Z | 2026-01-21T20:52:42.304Z |
| CVE-2026-21926 |
7.5 (3.1)
|
Vulnerability in the Siebel CRM Deployment produc… |
Oracle Corporation |
Siebel CRM Deployment |
2026-01-20T21:56:21.443Z | 2026-01-21T20:51:46.300Z |
| CVE-2026-21925 |
4.8 (3.1)
|
Vulnerability in the Oracle Java SE, Oracle Graal… |
Oracle Corporation |
Oracle Java SE |
2026-01-20T21:56:21.058Z | 2026-01-21T20:51:07.046Z |
| CVE-2026-21924 |
5.4 (3.1)
|
Vulnerability in the Oracle Utilities Application… |
Oracle Corporation |
Oracle Utilities Application Framework |
2026-01-20T21:56:20.732Z | 2026-01-21T20:50:06.753Z |
| CVE-2026-21923 |
6.5 (3.1)
|
Vulnerability in the Oracle Life Sciences Central… |
Oracle Corporation |
Oracle Life Sciences Central Designer |
2026-01-20T21:56:20.389Z | 2026-01-21T20:49:28.694Z |
| CVE-2026-21922 |
4.2 (3.1)
|
Vulnerability in the Oracle Planning and Budgetin… |
Oracle Corporation |
Oracle Planning and Budgeting Cloud Service |
2026-01-20T21:56:19.994Z | 2026-01-21T20:48:53.795Z |
| CVE-2026-21642 |
6.1 (3.0)
|
HackerOne community member Patrick Lang (7yr) has… |
Revive |
Revive Adserver |
2026-01-20T20:48:48.079Z | 2026-01-21T20:47:21.691Z |
| CVE-2026-23886 |
5.3 (3.1)
|
Swift W3C TraceContext has malformed HTTP header that … |
swift-otel |
swift-w3c-trace-context |
2026-01-19T21:01:52.694Z | 2026-01-21T20:47:10.139Z |
| CVE-2026-21664 |
6.1 (3.0)
|
HackerOne community member Huynh Pham Thanh Luc (… |
Revive |
Revive Adserver |
2026-01-20T20:48:47.976Z | 2026-01-21T20:45:35.234Z |
| CVE-2026-21663 |
6.1 (3.0)
|
HackerOne community member Patrick Lang (7yr) has… |
Revive |
Revive Adserver |
2026-01-20T20:48:47.974Z | 2026-01-21T20:42:21.072Z |
| CVE-2025-59464 |
6.5 (3.0)
|
A memory leak in Node.js’s OpenSSL integration oc… |
nodejs |
node |
2026-01-20T20:41:55.599Z | 2026-01-21T20:41:09.437Z |
| CVE-2026-21637 |
5.9 (3.0)
|
A flaw in Node.js TLS error handling allows remot… |
nodejs |
node |
2026-01-20T20:41:55.352Z | 2026-01-21T20:22:51.033Z |
| CVE-2026-23950 |
8.8 (3.1)
|
node-tar has Race Condition in Path Reservations via U… |
isaacs |
node-tar |
2026-01-20T00:40:48.510Z | 2026-01-21T20:15:57.278Z |
| CVE-2025-59465 |
7.5 (3.0)
|
A malformed `HTTP/2 HEADERS` frame with oversized… |
nodejs |
node |
2026-01-20T20:41:55.317Z | 2026-01-21T20:11:28.986Z |
| CVE-2026-22770 |
6.5 (3.1)
|
ImageMagick vulnerable to Release of Invalid Pointer i… |
ImageMagick |
ImageMagick |
2026-01-20T00:48:19.241Z | 2026-01-21T20:10:46.858Z |
| CVE-2026-21964 |
4.9 (3.1)
|
Vulnerability in the MySQL Server product of Orac… |
Oracle Corporation |
MySQL Server |
2026-01-20T21:56:33.276Z | 2026-01-21T20:04:13.585Z |
| CVE-2026-21965 |
2.7 (3.1)
|
Vulnerability in the MySQL Server product of Orac… |
Oracle Corporation |
MySQL Server |
2026-01-20T21:56:33.583Z | 2026-01-21T19:57:30.139Z |
| CVE-2026-21966 |
6.1 (3.1)
|
Vulnerability in the Oracle Hospitality OPERA 5 P… |
Oracle Corporation |
Oracle Hospitality OPERA 5 Property Services |
2026-01-20T21:56:33.912Z | 2026-01-21T19:54:47.033Z |
| CVE-2026-23955 |
4.2 (3.1)
|
EVerest vulnerable to concatenation of strings literal… |
EVerest |
everest-core |
2026-01-21T19:25:12.104Z | 2026-01-21T19:53:57.098Z |
| CVE-2025-68137 |
8.4 (3.1)
|
EVerest's Integer Overflow and Signed to Unsigned conv… |
EVerest |
everest-core |
2026-01-21T19:20:09.059Z | 2026-01-21T19:51:26.058Z |
| CVE-2025-68136 |
7.4 (3.1)
|
EVerest's inadequate session handling can lead to memo… |
EVerest |
everest-core |
2026-01-21T19:18:21.068Z | 2026-01-21T19:47:04.055Z |
| CVE-2025-13465 |
6.9 (4.0)
|
Prototype Pollution Vulnerability in Lodash _.unset an… |
Lodash |
Lodash |
2026-01-21T19:05:28.846Z | 2026-01-21T19:43:38.268Z |
| CVE-2026-22218 |
7.1 (4.0)
|
Chainlit < 2.9.4 Arbitrary File Read via /project/element |
Chainlit |
Chainlit |
2026-01-19T23:14:52.969Z | 2026-01-21T19:42:24.327Z |
| CVE-2026-21967 |
8.6 (3.1)
|
Vulnerability in the Oracle Hospitality OPERA 5 p… |
Oracle Corporation |
Oracle Hospitality OPERA 5 |
2026-01-20T21:56:34.237Z | 2026-01-21T19:32:12.949Z |
| CVE-2026-21968 |
6.5 (3.1)
|
Vulnerability in the MySQL Server product of Orac… |
Oracle Corporation |
MySQL Server |
2026-01-20T21:56:34.542Z | 2026-01-21T19:21:31.349Z |
| CVE-2025-68135 |
6.5 (3.1)
|
EVerest's inadequate exception handling leads to denia… |
EVerest |
everest-core |
2026-01-21T18:56:05.970Z | 2026-01-21T19:17:21.915Z |
| CVE-2025-68132 |
2.4 (4.0)
|
EVerest has out-of-bounds read in DZG_GSH01 SLIP CRC p… |
EVerest |
everest-core |
2026-01-21T18:28:40.763Z | 2026-01-21T19:06:48.136Z |
| CVE-2025-68134 |
7.4 (3.1)
|
EVerest's use of assert functions can potentially lead… |
EVerest |
everest-core |
2026-01-21T18:32:13.882Z | 2026-01-21T19:03:47.370Z |
| CVE-2026-21970 |
6.5 (3.1)
|
Vulnerability in the Oracle Life Sciences Central… |
Oracle Corporation |
Oracle Life Sciences Central Designer |
2026-01-20T21:56:35.163Z | 2026-01-21T18:59:51.402Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-30628 |
8.5 (3.1)
|
WordPress Amazon Affiliates Addon for WPBakery Page Bu… |
AA-Team |
Amazon Affiliates Addon for WPBakery Page Builder (formerly Visual Composer) |
2025-12-31T20:03:50.402Z | 2026-01-20T14:28:05.322Z |
| CVE-2025-28973 |
6.5 (3.1)
|
WordPress Pro Bulk Watermark Plugin for WordPress <= 2… |
AA-Team |
Pro Bulk Watermark Plugin for WordPress |
2025-12-31T20:02:10.769Z | 2026-01-20T14:28:04.509Z |
| CVE-2025-28949 |
8.5 (3.1)
|
WordPress Mediabay - WordPress Media Library Folders <… |
Codedraft |
Mediabay - WordPress Media Library Folders |
2025-12-31T20:00:22.463Z | 2026-01-20T14:28:05.245Z |
| CVE-2025-27004 |
6.1 (3.1)
|
WordPress Famous - Responsive Image And Video Grid Gal… |
LambertGroup |
Famous - Responsive Image And Video Grid Gallery WordPress Plugin |
2026-01-08T09:17:41.802Z | 2026-01-20T14:28:05.101Z |
| CVE-2025-27002 |
6.1 (3.1)
|
WordPress CountDown With Image or Video Background plu… |
LambertGroup |
CountDown With Image or Video Background |
2026-01-08T09:17:41.443Z | 2026-01-20T14:28:04.180Z |
| CVE-2025-23993 |
9.8 (3.1)
|
WordPress Felan Framework plugin <= 1.1.3 - SQL Inject… |
RiceTheme |
Felan Framework |
2026-01-08T09:17:41.179Z | 2026-01-20T14:28:04.367Z |
| CVE-2025-23757 |
7.1 (3.1)
|
WordPress ZD Scribd iPaper plugin <= 1.0 - Reflected C… |
Proloy Chakroborty |
ZD Scribd iPaper |
2025-12-31T19:58:33.725Z | 2026-01-20T14:28:04.227Z |
| CVE-2025-23719 |
7.1 (3.1)
|
WordPress ZhinaTwitterWidget plugin <= 1.0 - Reflected… |
zckevin |
ZhinaTwitterWidget |
2025-12-31T19:57:28.449Z | 2026-01-20T14:28:04.844Z |
| CVE-2025-23707 |
7.1 (3.1)
|
WordPress En Masse plugin <= 1.0 - Reflected Cross Sit… |
Matamko |
En Masse |
2025-12-31T19:56:21.648Z | 2026-01-20T14:28:04.966Z |
| CVE-2025-23705 |
7.1 (3.1)
|
WordPress Zielke Design Project Gallery plugin <= 2.5.… |
Terry Zielke |
Zielke Design Project Gallery |
2025-12-31T19:55:23.308Z | 2026-01-20T14:28:05.005Z |
| CVE-2025-23667 |
7.1 (3.1)
|
WordPress custom-post-edit plugin <= 1.0.4 - Reflected… |
Christopher Churchill |
custom-post-edit |
2025-12-31T19:54:20.344Z | 2026-01-20T14:28:05.237Z |
| CVE-2025-23608 |
7.1 (3.1)
|
WordPress LIVE TV plugin <= 1.2 - Reflected Cross Site… |
Omar Mohamed Mohamoud |
LIVE TV |
2025-12-31T17:07:06.352Z | 2026-01-20T14:28:04.213Z |
| CVE-2025-23554 |
7.1 (3.1)
|
WordPress Off Page SEO plugin <= 3.0.3 - Reflected Cro… |
Jakub Glos |
Off Page SEO |
2025-12-29T23:51:32.627Z | 2026-01-20T14:28:05.444Z |
| CVE-2025-23550 |
7.1 (3.1)
|
WordPress Product Puller plugin <= 1.5.1 - Reflected C… |
Kemal YAZICI |
Product Puller |
2025-12-29T23:50:08.713Z | 2026-01-20T14:28:05.210Z |
| CVE-2025-23504 |
9.8 (3.1)
|
WordPress Felan Framework plugin <= 1.1.3 - Account Ta… |
RiceTheme |
Felan Framework |
2026-01-08T09:17:40.900Z | 2026-01-20T14:28:04.968Z |
| CVE-2025-23469 |
7.1 (3.1)
|
WordPress Sleekplan plugin <= 0.2.0 - Reflected Cross … |
Sleekplan |
Sleekplan |
2025-12-29T23:48:36.314Z | 2026-01-20T14:28:04.821Z |
| CVE-2025-23458 |
7.1 (3.1)
|
WordPress Ads24 Lite plugin <= 1.0 - Reflected Cross S… |
Rakessh |
Ads24 Lite |
2025-12-29T23:32:44.943Z | 2026-01-20T14:28:04.180Z |
| CVE-2025-22728 |
9.8 (3.1)
|
WordPress Workreap (theme's plugin) plugin <= 3.3.6 - … |
AmentoTech |
Workreap (theme's plugin) |
2026-01-08T09:17:40.670Z | 2026-01-20T14:28:04.993Z |
| CVE-2025-22726 |
9.1 (3.1)
|
WordPress nK Themes Helper plugin <= 1.7.9 - Server Si… |
_nK |
nK Themes Helper |
2026-01-08T09:17:40.458Z | 2026-01-20T14:28:05.364Z |
| CVE-2025-22725 |
5.4 (3.1)
|
WordPress WP Virtual Assistant plugin <= 3.0 - Cross S… |
loopus |
WP Virtual Assistant |
2026-01-08T09:17:39.840Z | 2026-01-20T14:28:05.240Z |
| CVE-2025-22715 |
8.1 (3.1)
|
WordPress WP Attractive Donations System - Easy Stripe… |
loopus |
WP Attractive Donations System - Easy Stripe & Paypal donations |
2026-01-08T09:17:39.620Z | 2026-01-20T14:28:05.345Z |
| CVE-2025-22713 |
9.8 (3.1)
|
WordPress WooCommerce Orders & Customers Exporter plug… |
vanquish |
WooCommerce Orders & Customers Exporter |
2026-01-08T09:17:39.375Z | 2026-01-20T14:28:05.344Z |
| CVE-2025-22712 |
9.8 (3.1)
|
WordPress Typify theme <= 3.0.2 - Local File Inclusion… |
QantumThemes |
Typify |
2026-01-08T09:17:39.147Z | 2026-01-20T14:28:05.549Z |
| CVE-2025-22509 |
9.8 (3.1)
|
WordPress Atlas theme <= 2.1.0 - Local File Inclusion … |
TMRW-studio |
Atlas |
2026-01-08T09:17:38.524Z | 2026-01-20T14:28:04.634Z |
| CVE-2025-22288 |
4.1 (3.1)
|
WordPress Smush Image Compression and Optimization plu… |
WPMU DEV - Your All-in-One WordPress Platform |
Smush Image Compression and Optimization |
2025-11-06T15:53:18.126Z | 2026-01-20T14:28:05.015Z |
| CVE-2025-14431 |
9.8 (3.1)
|
WordPress Navian theme <= 1.5.4 - Local File Inclusion… |
THEMELOGI |
Navian |
2026-01-08T09:17:38.310Z | 2026-01-20T14:28:04.567Z |
| CVE-2025-14360 |
9.8 (3.1)
|
WordPress Blockons plugin <= 1.2.15 - Broken Access Co… |
Kaira |
Blockons |
2026-01-08T09:17:37.614Z | 2026-01-20T14:28:05.215Z |
| CVE-2025-14359 |
9.8 (3.1)
|
WordPress Oshine theme <= 7.2.7 - Local File Inclusion… |
brandexponents |
Oshine |
2026-01-08T09:17:37.351Z | 2026-01-20T14:28:04.952Z |
| CVE-2025-14358 |
9.8 (3.1)
|
WordPress REHub Framework plugin <= 19.9.5 - Broken Ac… |
sizam |
REHub Framework |
2026-01-08T09:17:37.140Z | 2026-01-20T14:28:04.797Z |
| CVE-2025-14314 |
8.5 (3.1)
|
WordPress PopupKit plugin <= 2.1.5 - SQL Injection vul… |
Roxnor |
PopupKit |
2025-12-18T07:21:40.676Z | 2026-01-20T14:28:04.473Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-30628 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2025-12-31T20:15:42.353 | 2026-01-20T15:16:22.010 |
| fkie_cve-2025-28973 | Path Traversal: '.../...//' vulnerability in AA-Team Pro Bulk Watermark Plugin for WordPress allows… | 2025-12-31T20:15:42.207 | 2026-01-20T15:16:21.903 |
| fkie_cve-2025-28949 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2025-12-31T20:15:42.060 | 2026-01-20T15:16:21.647 |
| fkie_cve-2025-27004 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-01-08T10:15:48.923 | 2026-01-20T15:16:19.780 |
| fkie_cve-2025-27002 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-01-08T10:15:48.797 | 2026-01-20T15:16:19.533 |
| fkie_cve-2025-23993 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2026-01-08T10:15:48.650 | 2026-01-20T15:16:19.363 |
| fkie_cve-2025-23757 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-12-31T20:15:41.917 | 2026-01-20T15:16:19.250 |
| fkie_cve-2025-23719 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-12-31T20:15:41.770 | 2026-01-20T15:16:19.120 |
| fkie_cve-2025-23707 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-12-31T20:15:41.630 | 2026-01-20T15:16:19.000 |
| fkie_cve-2025-23705 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-12-31T20:15:41.483 | 2026-01-20T15:16:18.867 |
| fkie_cve-2025-23667 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-12-31T20:15:40.550 | 2026-01-20T15:16:18.757 |
| fkie_cve-2025-23608 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-12-31T18:15:44.007 | 2026-01-20T15:16:18.647 |
| fkie_cve-2025-23554 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-12-30T00:15:51.890 | 2026-01-20T15:16:18.550 |
| fkie_cve-2025-23550 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-12-30T00:15:51.747 | 2026-01-20T15:16:18.450 |
| fkie_cve-2025-23504 | Authentication Bypass Using an Alternate Path or Channel vulnerability in RiceTheme Felan Framework… | 2026-01-08T10:15:48.513 | 2026-01-20T15:16:18.287 |
| fkie_cve-2025-23469 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-12-30T00:15:51.597 | 2026-01-20T15:16:17.690 |
| fkie_cve-2025-23458 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-12-30T00:15:51.447 | 2026-01-20T15:16:17.577 |
| fkie_cve-2025-22728 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2026-01-08T10:15:48.390 | 2026-01-20T15:16:17.450 |
| fkie_cve-2025-22726 | Server-Side Request Forgery (SSRF) vulnerability in _nK nK Themes Helper nk-themes-helper allows Se… | 2026-01-08T10:15:48.247 | 2026-01-20T15:16:17.330 |
| fkie_cve-2025-22725 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2026-01-08T10:15:48.120 | 2026-01-20T15:16:17.203 |
| fkie_cve-2025-22715 | Missing Authorization vulnerability in loopus WP Attractive Donations System - Easy Stripe & Paypal… | 2026-01-08T10:15:47.990 | 2026-01-20T15:16:17.070 |
| fkie_cve-2025-22713 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2026-01-08T10:15:47.850 | 2026-01-20T15:16:16.940 |
| fkie_cve-2025-22712 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-01-08T10:15:47.727 | 2026-01-20T15:16:16.813 |
| fkie_cve-2025-22509 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-01-08T10:15:47.337 | 2026-01-20T15:16:16.430 |
| fkie_cve-2025-22288 | Path Traversal: '.../...//' vulnerability in WPMU DEV - Your All-in-One WordPress Platform Smush Im… | 2025-11-06T16:15:49.647 | 2026-01-20T15:16:16.277 |
| fkie_cve-2025-14431 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-01-08T10:15:46.463 | 2026-01-20T15:16:15.223 |
| fkie_cve-2025-14360 | Missing Authorization vulnerability in Kaira Blockons blockons allows Accessing Functionality Not P… | 2026-01-08T10:15:46.067 | 2026-01-20T15:16:14.707 |
| fkie_cve-2025-14359 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2026-01-08T10:15:45.920 | 2026-01-20T15:16:14.577 |
| fkie_cve-2025-14358 | Missing Authorization vulnerability in sizam REHub Framework rehub-framework allows Accessing Funct… | 2026-01-08T10:15:45.790 | 2026-01-20T15:16:14.440 |
| fkie_cve-2025-14314 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2025-12-18T08:15:49.510 | 2026-01-20T15:16:14.297 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-f77j-3wr8-mxm9 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-f44q-qq73-2g32 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-9vr2-2x6c-jf8f |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-8p9x-rjvp-x4m6 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-8jq4-39wg-9593 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-8fqw-36pc-r97j |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-7gwh-6c6q-f3mh |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-76mq-fxp8-4m27 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:37Z | 2026-01-02T18:30:38Z |
| ghsa-6q6f-p984-3w35 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-6gc9-g2rv-qm3r |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-6852-5rjc-4j2q |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-5jpg-c8hq-px28 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-55pf-5gc7-3fx4 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-5256-43f4-ccfr |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-4p63-r7m3-7c2m |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-4frx-5wwm-vwm7 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-3mjc-mr9p-3j4r |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-34rp-pjw3-wvhp |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-25vx-42cc-p9wj |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:38Z | 2026-01-02T18:30:38Z |
| ghsa-xvq4-9j7v-qqhv |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:37Z | 2026-01-02T18:30:37Z |
| ghsa-xg2q-wm92-9w6g |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:37Z | 2026-01-02T18:30:37Z |
| ghsa-x279-ph5r-3w5g |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:37Z | 2026-01-02T18:30:37Z |
| ghsa-ww2x-px2w-p5jr |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:37Z | 2026-01-02T18:30:37Z |
| ghsa-w8fc-wq9c-q5h5 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:37Z | 2026-01-02T18:30:37Z |
| ghsa-v4h9-294f-9qcp |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:37Z | 2026-01-02T18:30:37Z |
| ghsa-qv4c-xx9g-f28c |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:37Z | 2026-01-02T18:30:37Z |
| ghsa-pw8g-g456-jx2q |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:37Z | 2026-01-02T18:30:37Z |
| ghsa-p959-7pgx-r97v |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:37Z | 2026-01-02T18:30:37Z |
| ghsa-p389-m5cq-222c |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:37Z | 2026-01-02T18:30:37Z |
| ghsa-mxfp-pxwf-pg5f |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:37Z | 2026-01-02T18:30:37Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-1385 | The WP-Stateless – Google Cloud Storage plugin for WordPress is vulnerable to unauthorize… | 2024-02-09T06:02:34.509122Z |
| gsd-2024-1370 | The Maintenance Page plugin for WordPress is vulnerable to unauthorized access of data du… | 2024-02-09T06:02:34.506763Z |
| gsd-2024-1383 | The WPvivid Backup for MainWP plugin for WordPress is vulnerable to Reflected Cross-Site … | 2024-02-09T06:02:34.502594Z |
| gsd-2024-1378 | A command injection vulnerability was identified in GitHub Enterprise Server that allowed… | 2024-02-09T06:02:34.501503Z |
| gsd-2024-1360 | The Colibri WP theme for WordPress is vulnerable to Cross-Site Request Forgery in all ver… | 2024-02-09T06:02:34.500675Z |
| gsd-2024-1392 | The Elementor Addon Elements plugin for WordPress is vulnerable to Stored Cross-Site Scri… | 2024-02-09T06:02:34.500316Z |
| gsd-2024-1373 | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-46209. Reason: This c… | 2024-02-09T06:02:34.493452Z |
| gsd-2024-25638 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-09T06:02:34.492625Z |
| gsd-2024-25597 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-02-09T06:02:34.491368Z |
| gsd-2024-25636 | Misskey is an open source, decentralized social media platform with ActivityPub support. … | 2024-02-09T06:02:34.488961Z |
| gsd-2024-25632 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-09T06:02:34.481592Z |
| gsd-2024-25592 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-02-09T06:02:34.480157Z |
| gsd-2024-25603 | Stored cross-site scripting (XSS) vulnerability in the Dynamic Data Mapping module's DDMF… | 2024-02-09T06:02:34.478525Z |
| gsd-2024-25609 | HtmlUtil.escapeRedirect in Liferay Portal 7.2.0 through 7.4.3.12, and older unsupported v… | 2024-02-09T06:02:34.471544Z |
| gsd-2024-25591 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Benjamin Roja… | 2024-02-09T06:02:34.467943Z |
| gsd-2024-25634 | alf.io is an open source ticket reservation system. Prior to version 2.0-Mr-2402, an atta… | 2024-02-09T06:02:34.467718Z |
| gsd-2024-25584 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-09T06:02:34.462192Z |
| gsd-2024-25581 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-09T06:02:34.459260Z |
| gsd-2024-25641 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-09T06:02:34.456623Z |
| gsd-2024-25569 | An out-of-bounds read vulnerability exists in the RAWCodec::DecodeBytes functionality of … | 2024-02-09T06:02:34.454300Z |
| gsd-2024-25633 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-09T06:02:34.451448Z |
| gsd-2024-25596 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vuln… | 2024-02-09T06:02:34.449028Z |
| gsd-2024-25583 | A crafted response from an upstream server the recursor has been configured to forward-re… | 2024-02-09T06:02:34.441632Z |
| gsd-2024-25605 | The Journal module in Liferay Portal 7.2.0 through 7.4.3.4, and older unsupported version… | 2024-02-09T06:02:34.441064Z |
| gsd-2024-25623 | Mastodon is a free, open-source social network server based on ActivityPub. Prior to vers… | 2024-02-09T06:02:34.439196Z |
| gsd-2024-25645 | Under certain condition SAP NetWeaver (Enterprise Portal) - version 7.50 allows an attack… | 2024-02-09T06:02:34.434516Z |
| gsd-2024-25627 | Alf.io is a free and open source event attendance management system. An administrator on … | 2024-02-09T06:02:34.433264Z |
| gsd-2024-25646 | Due to improper validation, SAP BusinessObject Business Intelligence Launch Pad allows an… | 2024-02-09T06:02:34.432988Z |
| gsd-2024-25607 | The default password hashing algorithm (PBKDF2-HMAC-SHA1) in Liferay Portal 7.2.0 through… | 2024-02-09T06:02:34.432625Z |
| gsd-2024-25595 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-09T06:02:34.429959Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-183784 | Malicious code in manu-oyib-givakssuisois (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183783 | Malicious code in manu-oyib-givaksois (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183782 | Malicious code in manu-oyib-givaksisois (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183781 | Malicious code in manu-oyib-givakois (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183780 | Malicious code in manu-oyib-givakisssuisois (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183779 | Malicious code in manu-oyib-givakisois (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183778 | Malicious code in manu-oyib-givakisassuisois (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183777 | Malicious code in manu-oyib-gisoki (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183776 | Malicious code in manu-oyib-gisoi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183775 | Malicious code in manu-oyib-gisnuosi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183774 | Malicious code in manu-oyib-gisnuosgisof (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183773 | Malicious code in manu-oyib-gisnuosgimsof (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183772 | Malicious code in manu-oyib-gisnuosgif (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183771 | Malicious code in manu-oyib-gisnuosgi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183770 | Malicious code in manu-oyib-gisnoi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183769 | Malicious code in manu-oyib-gisi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183768 | Malicious code in manu-oyib-giks (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183767 | Malicious code in manu-oyib-gikois (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183766 | Malicious code in manu-oyib-gikis (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183765 | Malicious code in manu-oyib-giakois (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183764 | Malicious code in manu-oyib-gi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183763 | Malicious code in manu-oyi-giusgimsof (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183762 | Malicious code in manu-oyi-giuosgimsof (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183761 | Malicious code in manu-oyi-gisnuosgimsof (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183760 | Malicious code in manu-oyi-gisgimsof (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183759 | Malicious code in manu-oyi-giof (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183758 | Malicious code in manu-oyi-gioafisoi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183757 | Malicious code in manu-oyi-gioafisiasloi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183756 | Malicious code in manu-oyi-gioafisi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183755 | Malicious code in manu-oyi-gioafisasioasloi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2023:7042 | Red Hat Security Advisory: python27:2.7 security and bug fix update | 2023-11-14T15:43:57+00:00 | 2025-11-21T18:50:21+00:00 |
| rhsa-2023:7038 | Red Hat Security Advisory: flatpak security, bug fix, and enhancement update | 2023-11-14T15:47:04+00:00 | 2025-11-21T18:50:21+00:00 |
| rhsa-2023:7029 | Red Hat Security Advisory: libX11 security update | 2023-11-14T15:15:27+00:00 | 2025-11-21T18:50:19+00:00 |
| rhsa-2023:7025 | Red Hat Security Advisory: ruby:2.5 security update | 2023-11-14T15:32:25+00:00 | 2025-11-21T18:50:19+00:00 |
| rhsa-2023:7022 | Red Hat Security Advisory: tang security and bug fix update | 2023-11-14T15:25:08+00:00 | 2025-11-21T18:50:18+00:00 |
| rhsa-2023:7010 | Red Hat Security Advisory: sysstat security and bug fix update | 2023-11-14T15:24:31+00:00 | 2025-11-21T18:50:18+00:00 |
| rhsa-2023:7016 | Red Hat Security Advisory: libpq security update | 2023-11-14T15:25:45+00:00 | 2025-11-21T18:50:17+00:00 |
| rhsa-2023:7015 | Red Hat Security Advisory: wireshark security update | 2023-11-14T16:07:33+00:00 | 2025-11-21T18:50:17+00:00 |
| rhsa-2023:6972 | Red Hat Security Advisory: grafana security and enhancement update | 2023-11-14T15:53:11+00:00 | 2025-11-21T18:50:17+00:00 |
| rhsa-2023:6980 | Red Hat Security Advisory: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update | 2023-11-14T16:06:41+00:00 | 2025-11-21T18:50:15+00:00 |
| rhsa-2023:6976 | Red Hat Security Advisory: libfastjson security update | 2023-11-14T15:36:31+00:00 | 2025-11-21T18:50:15+00:00 |
| rhsa-2023:6967 | Red Hat Security Advisory: qt5-qtbase security update | 2023-11-14T15:32:22+00:00 | 2025-11-21T18:50:14+00:00 |
| rhsa-2023:6961 | Red Hat Security Advisory: qt5-qtsvg security update | 2023-11-14T15:19:40+00:00 | 2025-11-21T18:50:13+00:00 |
| rhsa-2023:6944 | Red Hat Security Advisory: protobuf-c security update | 2023-11-14T16:13:21+00:00 | 2025-11-21T18:50:13+00:00 |
| rhsa-2023:6916 | Red Hat Security Advisory: xorg-x11-server security and bug fix update | 2023-11-14T15:32:20+00:00 | 2025-11-21T18:50:12+00:00 |
| rhsa-2023:6940 | Red Hat Security Advisory: mod_auth_openidc:2.3 security and bug fix update | 2023-11-14T15:51:39+00:00 | 2025-11-21T18:50:11+00:00 |
| rhsa-2023:6933 | Red Hat Security Advisory: libreoffice security update | 2023-11-14T15:53:03+00:00 | 2025-11-21T18:50:09+00:00 |
| rhsa-2023:6919 | Red Hat Security Advisory: edk2 security and bug fix update | 2023-11-14T16:13:48+00:00 | 2025-11-21T18:50:08+00:00 |
| rhsa-2023:6917 | Red Hat Security Advisory: xorg-x11-server-Xwayland security and bug fix update | 2023-11-14T15:41:13+00:00 | 2025-11-21T18:50:08+00:00 |
| rhsa-2023:6887 | Red Hat Security Advisory: java-21-openjdk security and bug fix update | 2023-11-14T17:00:33+00:00 | 2025-11-21T18:50:04+00:00 |
| rhsa-2023:6885 | Red Hat Security Advisory: python security update | 2023-11-13T09:11:14+00:00 | 2025-11-21T18:50:04+00:00 |
| rhsa-2023:6884 | Red Hat Security Advisory: squid security update | 2023-11-13T09:03:59+00:00 | 2025-11-21T18:50:03+00:00 |
| rhsa-2023:6882 | Red Hat Security Advisory: squid34 security update | 2023-11-13T08:57:29+00:00 | 2025-11-21T18:50:02+00:00 |
| rhsa-2023:6879 | Red Hat Security Advisory: Red Hat AMQ Broker 7.11.4 release and security update | 2023-11-09T23:26:41+00:00 | 2025-11-21T18:50:02+00:00 |
| rhsa-2023:6878 | Red Hat Security Advisory: Red Hat AMQ Broker 7.10.5 release and security update | 2023-11-09T23:26:04+00:00 | 2025-11-21T18:50:02+00:00 |
| rhsa-2023:6877 | Red Hat Security Advisory: security update jboss-amq-6/amq63-openshift container image | 2023-11-09T21:28:13+00:00 | 2025-11-21T18:50:02+00:00 |
| rhsa-2023:6866 | Red Hat Security Advisory: jboss-amq-6-amq63-openshift-container security update | 2023-11-09T19:11:07+00:00 | 2025-11-21T18:50:01+00:00 |
| rhsa-2023:6849 | Red Hat Security Advisory: Red Hat JBoss Fuse/A-MQ Fuse 6.3 R20 HF1 security and bug fix update | 2023-11-09T12:33:27+00:00 | 2025-11-21T18:50:00+00:00 |
| rhsa-2023:6823 | Red Hat Security Advisory: python3 security update | 2023-11-08T15:48:28+00:00 | 2025-11-21T18:49:50+00:00 |
| rhsa-2023:6813 | Red Hat Security Advisory: kernel security and bug fix update | 2023-11-08T11:00:24+00:00 | 2025-11-21T18:49:48+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2020-15106 | Improper Input Validation in etcd | 2020-08-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-14372 | A flaw was found in grub2 in versions prior to 2.06 where it incorrectly enables the usage of the ACPI command when Secure Boot is enabled. This flaw allows an attacker with privileged access to craft a Secondary System Description Table (SSDT) containing code to overwrite the Linux kernel lockdown variable content directly into memory. The table is further loaded and executed by the kernel defeating its Secure Boot lockdown and allowing the attacker to load unsigned code. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | 2021-03-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-14342 | It was found that cifs-utils' mount.cifs was invoking a shell when requesting the Samba password which could be used to inject arbitrary commands. An attacker able to invoke mount.cifs with special permission such as via sudo rules could use this flaw to escalate their privileges. | 2020-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-14309 | There's an issue with grub2 in all versions before 2.06 when handling squashfs filesystems containing a symbolic link with name length of UINT32 bytes in size. The name size leads to an arithmetic overflow leading to a zero-size allocation further causing a heap-based buffer overflow with attacker controlled data. | 2020-07-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-14308 | In grub2 versions before 2.06 the grub memory allocator doesn't check for possible arithmetic overflows on the requested allocation size. This leads the function to return invalid memory allocations which can be further used to cause possible integrity confidentiality and availability impacts during the boot process. | 2020-07-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-14147 | An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression. | 2020-06-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-13962 | Qt 5.12.2 through 5.14.2 as used in unofficial builds of Mumble 1.3.0 and other products mishandles OpenSSL's error queue which can cause a denial of service to QSslSocket users. Because errors leak in unrelated TLS sessions an unrelated session may be disconnected when any handshake fails. (Mumble 1.3.1 is not affected regardless of the Qt version.) | 2020-06-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-13950 | mod_proxy_http NULL pointer dereference | 2021-06-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-13645 | In GNOME glib-networking through 2.64.2 the implementation of GTlsClientConnection skips hostname verification of the server's TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior to fail the certificate verification. Applications that fail to provide the server identity including Balsa before 2.5.11 and 2.6.x before 2.6.1 accept a TLS certificate if the certificate is valid for any host. | 2020-05-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-12762 | json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file as demonstrated by printbuf_memappend. | 2020-05-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-12663 | Unbound before 1.10.1 has an infinite loop via malformed DNS answers received from upstream servers. | 2020-05-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-12662 | Unbound before 1.10.1 has Insufficient Control of Network Message Volume aka an "NXNSAttack" issue. This is triggered by random subdomains in the NSDNAME in NS records. | 2020-05-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-12403 | A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20 it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability. | 2021-05-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-10713 | A flaw was found in grub2 prior to version 2.06. An attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process. This flaw also allows the bypass of Secure Boot protections. In order to load an untrusted or modified kernel an attacker would first need to establish access to the system such as gaining physical access obtain the ability to alter a pxe-boot network or have remote access to a networked system with root access. With this access an attacker could then craft a string to cause a buffer overflow by injecting a malicious payload that leads to arbitrary code execution within GRUB. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | 2020-07-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-10701 | A missing authorization flaw was found in the libvirt API responsible for changing the QEMU agent response timeout. This flaw allows read-only connections to adjust the time that libvirt waits for the QEMU guest agent to respond to agent commands. Depending on the timeout value that is set this flaw can make guest agent commands fail because the agent cannot respond in time. Unprivileged users with a read-only connection could abuse this flaw to set the response timeout for all guest agent messages to zero potentially leading to a denial of service. This flaw affects libvirt versions before 6.2.0. | 2021-05-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-10109 | In Twisted Web through 19.10.0 there was an HTTP request splitting vulnerability. When presented with a content-length and a chunked encoding header the content-length took precedence and the remainder of the request body was interpreted as a pipelined request. | 2020-03-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-10108 | In Twisted Web through 19.10.0 there was an HTTP request splitting vulnerability. When presented with two content-length headers it ignored the first header. When the second content-length value was set to zero the request body was interpreted as a pipelined request. | 2020-03-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-0570 | Uncontrolled search path in the QT Library before 5.14.0 5.12.7 and 5.9.10 may allow an authenticated user to potentially enable elevation of privilege via local access. | 2020-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2019-9755 | An integer underflow issue exists in ntfs-3g 2017.3.23. A local attacker could potentially exploit this by running /bin/ntfs-3g with specially crafted arguments from a specially crafted directory to cause a heap buffer overflow resulting in a crash or the ability to execute arbitrary code. In installations where /bin/ntfs-3g is a setuid-root binary this could lead to a local escalation of privileges. | 2019-06-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2019-6706 | Lua 5.3.5 has a use-after-free in lua_upvaluejoin in lapi.c. For example a crash outcome might be achieved by an attacker who is able to trigger a debug.upvaluejoin call in which the arguments have certain relationships. | 2019-01-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2019-6292 | An issue was discovered in singledocparser.cpp in yaml-cpp (aka LibYaml-C++) 0.6.2. Stack Exhaustion occurs in YAML::SingleDocParser and there is a stack consumption problem caused by recursive stack frames: HandleCompactMap HandleMap HandleFlowSequence HandleSequence HandleNode. Remote attackers could leverage this vulnerability to cause a denial-of-service via a cpp file. | 2019-01-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2019-6285 | The SingleDocParser::HandleFlowSequence function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file. | 2019-01-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2019-19906 | cyrus-sasl (aka Cyrus SASL) 2.1.27 has an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet. The OpenLDAP crash is ultimately caused by an off-by-one error in _sasl_add_string in common.c in cyrus-sasl. | 2019-12-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2019-18874 | psutil (aka python-psutil) through 5.6.5 can have a double free. This occurs because of refcount mishandling within a while or for loop that converts system data into a Python object. | 2019-11-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2019-17567 | mod_proxy_wstunnel tunneling of non Upgraded connections | 2021-06-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2019-17498 | In libssh2 v1.9.0 and earlier versions the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server. | 2019-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2019-16275 | hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range. | 2019-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2019-12855 | In words.protocols.jabber.xmlstream in Twisted through 19.2.1 XMPP support did not verify certificates when used with TLS allowing an attacker to MITM connections. | 2019-06-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2019-12749 | dbus before 1.10.28 1.12.x before 1.12.16 and 1.13.x before 1.13.12 as used in DBusServer in Canonical Upstart in Ubuntu 14.04 (and in some less common uses of dbus-daemon) allows cookie spoofing because of symlink mishandling in the reference implementation of DBUS_COOKIE_SHA1 in the libdbus library. (This only affects the DBUS_COOKIE_SHA1 authentication mechanism.) A malicious client with write access to its own home directory could manipulate a ~/.dbus-keyrings symlink to cause a DBusServer with a different uid to read and write in unintended locations. In the worst case this could result in the DBusServer reusing a cookie that is known to the malicious client and treating that cookie as evidence that a subsequent client connection came from an attacker-chosen uid allowing authentication bypass. | 2019-06-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2019-12450 | file_copy_fallback in gio/gfile.c in GNOME GLib 2.15.0 through 2.61.1 does not properly restrict file permissions while a copy operation is in progress. Instead default permissions are used. | 2019-05-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-201605-0253 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:03:04.276000Z |
| var-201605-0242 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:03:04.236000Z |
| var-201605-0293 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:03:04.198000Z |
| var-201605-0251 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:03:04.157000Z |
| var-201605-0308 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acro… | 2025-04-13T23:03:04.122000Z |
| var-201605-0088 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:03:04.088000Z |
| var-201605-0160 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:03:04.050000Z |
| var-201605-0238 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acro… | 2025-04-13T23:03:04.012000Z |
| var-201605-0247 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acro… | 2025-04-13T23:03:03.973000Z |
| var-201605-0111 | Heap-based buffer overflow in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acroba… | 2025-04-13T23:03:03.938000Z |
| var-201605-0250 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acro… | 2025-04-13T23:03:03.901000Z |
| var-201605-0256 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acro… | 2025-04-13T23:03:03.861000Z |
| var-201605-0233 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:03:03.818000Z |
| var-201605-0072 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:03:03.776000Z |
| var-201605-0303 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:03:03.734000Z |
| var-201605-0257 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acro… | 2025-04-13T23:03:03.661000Z |
| var-201605-0087 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:03:03.617000Z |
| var-201605-0306 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:03:03.578000Z |
| var-201605-0294 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:03:03.539000Z |
| var-201605-0166 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:03:03.505000Z |
| var-201605-0292 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:03:03.467000Z |
| var-201605-0165 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:03:03.428000Z |
| var-201605-0149 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:03:03.392000Z |
| var-201605-0091 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:03:03.352000Z |
| var-201605-0305 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:03:02.877000Z |
| var-201605-0161 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:03:02.839000Z |
| var-201605-0240 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acro… | 2025-04-13T23:03:02.799000Z |
| var-201605-0113 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:03:02.761000Z |
| var-201605-0307 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.16, Acrobat and Acro… | 2025-04-13T23:03:02.725000Z |
| var-201605-0289 | Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:03:02.691000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2020:3424-1 | Security update for wpa_supplicant | 2020-11-19T15:11:57Z | 2020-11-19T15:11:57Z |
| suse-su-2020:3423-1 | Security update for buildah | 2020-11-19T15:11:49Z | 2020-11-19T15:11:49Z |
| suse-su-2020:3418-1 | Security update for MozillaThunderbird | 2020-11-19T12:27:11Z | 2020-11-19T12:27:11Z |
| suse-su-2020:3416-1 | Security update for xen | 2020-11-19T11:46:21Z | 2020-11-19T11:46:21Z |
| suse-su-2020:3415-1 | Security update for xen | 2020-11-19T11:46:01Z | 2020-11-19T11:46:01Z |
| suse-su-2020:3414-1 | Security update for xen | 2020-11-19T11:45:41Z | 2020-11-19T11:45:41Z |
| suse-su-2020:3413-1 | Security update for xen | 2020-11-19T11:45:25Z | 2020-11-19T11:45:25Z |
| suse-su-2020:3412-1 | Security update for xen | 2020-11-19T11:45:04Z | 2020-11-19T11:45:04Z |
| suse-su-2020:3400-1 | Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP1) | 2020-11-19T11:04:09Z | 2020-11-19T11:04:09Z |
| suse-su-2020:3389-1 | Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP2) | 2020-11-19T10:45:06Z | 2020-11-19T10:45:06Z |
| suse-su-2020:3402-1 | Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP2) | 2020-11-19T10:44:43Z | 2020-11-19T10:44:43Z |
| suse-su-2020:3385-1 | Security update for perl-DBI | 2020-11-19T10:34:27Z | 2020-11-19T10:34:27Z |
| suse-su-2020:3384-1 | Security update for perl-DBI | 2020-11-19T10:33:57Z | 2020-11-19T10:33:57Z |
| suse-su-2020:3383-1 | Security update for MozillaFirefox | 2020-11-19T10:16:09Z | 2020-11-19T10:16:09Z |
| suse-su-2020:3380-1 | Security update for wpa_supplicant | 2020-11-19T08:31:42Z | 2020-11-19T08:31:42Z |
| suse-su-2020:3379-1 | Security update for krb5 | 2020-11-19T08:30:55Z | 2020-11-19T08:30:55Z |
| suse-su-2020:3378-1 | Security update for podman | 2020-11-19T08:30:15Z | 2020-11-19T08:30:15Z |
| suse-su-2020:3377-1 | Security update for krb5 | 2020-11-19T08:29:53Z | 2020-11-19T08:29:53Z |
| suse-su-2020:3376-1 | Security update for wireshark | 2020-11-19T08:29:31Z | 2020-11-19T08:29:31Z |
| suse-su-2020:3375-1 | Security update for krb5 | 2020-11-19T08:28:34Z | 2020-11-19T08:28:34Z |
| suse-su-2020:3374-1 | Security update for ucode-intel | 2020-11-19T08:28:04Z | 2020-11-19T08:28:04Z |
| suse-su-2020:3373-1 | Security update for ucode-intel | 2020-11-19T08:27:45Z | 2020-11-19T08:27:45Z |
| suse-su-2020:3372-1 | Security update for ucode-intel | 2020-11-19T08:27:30Z | 2020-11-19T08:27:30Z |
| suse-su-2020:14546-1 | Security update for microcode_ctl | 2020-11-19T08:27:15Z | 2020-11-19T08:27:15Z |
| suse-su-2020:3369-1 | Security update for go1.14 | 2020-11-19T08:26:22Z | 2020-11-19T08:26:22Z |
| suse-su-2020:3368-1 | Security update for go1.15 | 2020-11-19T08:24:49Z | 2020-11-19T08:24:49Z |
| suse-su-2020:3367-1 | Security update for libzypp, zypper | 2020-11-18T13:25:54Z | 2020-11-18T13:25:54Z |
| suse-su-2020:3360-1 | Security update for tcpdump | 2020-11-17T12:41:00Z | 2020-11-17T12:41:00Z |
| suse-su-2020:3359-1 | Security update for java-11-openjdk | 2020-11-17T12:19:11Z | 2020-11-17T12:19:11Z |
| suse-su-2020:3358-1 | Security update for tcpdump | 2020-11-17T12:17:22Z | 2020-11-17T12:17:22Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2024-40915 | Adobe Framemaker数字错误漏洞 | 2024-10-11 | 2024-10-17 |
| cnvd-2024-40886 | Oracle WebLogic Server远程代码执行漏洞(CNVD-2024-40886) | 2024-10-16 | 2024-10-16 |
| cnvd-2024-40840 | Ellevo跨站脚本漏洞 | 2024-09-27 | 2024-10-16 |
| cnvd-2024-40839 | Tenda G3缓冲区溢出漏洞(CNVD-2024-40839) | 2024-08-29 | 2024-10-16 |
| cnvd-2024-40838 | D-Link DIR-619L缓冲区溢出漏洞(CNVD-2024-40838) | 2024-10-13 | 2024-10-16 |
| cnvd-2024-40837 | D-Link DIR-619L缓冲区溢出漏洞(CNVD-2024-40837) | 2024-10-13 | 2024-10-16 |
| cnvd-2024-40836 | D-Link DIR-619L缓冲区溢出漏洞 | 2024-10-13 | 2024-10-16 |
| cnvd-2024-40835 | Rockwell Automation Pavilion8授权问题漏洞(CNVD-2024-40835) | 2024-09-14 | 2024-10-16 |
| cnvd-2024-40834 | Rockwell Automation Pavilion8路径遍历漏洞 | 2024-09-14 | 2024-10-16 |
| cnvd-2024-40833 | Rockwell Automation 5015-AENFTXT输入验证错误漏洞 | 2024-07-18 | 2024-10-16 |
| cnvd-2024-40832 | Delta Electronics CNCSoft-G2越界读取漏洞(CNVD-2024-40832) | 2024-10-12 | 2024-10-16 |
| cnvd-2024-40831 | Delta Electronics CNCSoft-G2缓冲区溢出漏洞(CNVD-2024-40831) | 2024-10-12 | 2024-10-16 |
| cnvd-2024-40830 | Delta Electronics CNCSoft-G2越界写漏洞 | 2024-10-12 | 2024-10-16 |
| cnvd-2024-40829 | Delta Electronics CNCSoft-G2缓冲区溢出漏洞(CNVD-2024-40829) | 2024-10-12 | 2024-10-16 |
| cnvd-2024-40828 | Delta Electronics CNCSoft-G2未初始化变量漏洞 | 2024-10-12 | 2024-10-16 |
| cnvd-2024-40827 | Trend Micro Apex One安全代理链接漏洞 | 2024-06-12 | 2024-10-16 |
| cnvd-2024-40826 | Trend Micro Apex One权限提升漏洞(CNVD-2024-40826) | 2024-06-12 | 2024-10-16 |
| cnvd-2024-40825 | Trend Micro Apex One权限提升漏洞(CNVD-2024-40825) | 2024-06-12 | 2024-10-16 |
| cnvd-2024-40824 | Trend Micro Apex One拒绝服务漏洞 | 2024-06-12 | 2024-10-16 |
| cnvd-2024-40823 | Trend Micro Apex One信息泄露漏洞(CNVD-2024-40823) | 2024-06-12 | 2024-10-16 |
| cnvd-2024-40822 | Trend Micro Deep Security权限提升漏洞 | 2024-06-12 | 2024-10-16 |
| cnvd-2024-40821 | Trend Micro InterScan Web Security Virtual Appliance跨站脚本漏洞(CNVD-2024-40821) | 2024-06-12 | 2024-10-16 |
| cnvd-2024-40820 | Trend Micro VPN Proxy One Pro拒绝服务漏洞 | 2024-06-12 | 2024-10-16 |
| cnvd-2024-40819 | Trend Micro Apex One访问控制错误漏洞(CNVD-2024-40819) | 2024-06-12 | 2024-10-16 |
| cnvd-2024-40818 | Trend Micro Apex One权限提升漏洞(CNVD-2024-40818) | 2024-06-11 | 2024-10-16 |
| cnvd-2024-40816 | Foxit PDF Reader代码执行漏洞(CNVD-2024-40816) | 2024-08-22 | 2024-10-16 |
| cnvd-2024-40815 | Foxit PDF Reader代码执行漏洞(CNVD-2024-40815) | 2024-08-22 | 2024-10-16 |
| cnvd-2024-40814 | Foxit PDF Reader资源管理错误漏洞(CNVD-2024-40814) | 2024-08-22 | 2024-10-16 |
| cnvd-2024-40813 | Foxit PDF Reader代码执行漏洞(CNVD-2024-40813) | 2024-09-29 | 2024-10-16 |
| cnvd-2024-40812 | Foxit PDF Reader代码执行漏洞(CNVD-2024-40812) | 2024-09-29 | 2024-10-16 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2010-avi-546 | Multiples vulnérabilités dans Adobe Flash Server | 2010-11-10T00:00:00.000000 | 2010-11-10T00:00:00.000000 |
| certa-2010-avi-545 | Vulnérabilités dans Microsoft Forefront Unified Access Gateway | 2010-11-10T00:00:00.000000 | 2010-11-10T00:00:00.000000 |
| certa-2010-avi-544 | Vulnérabilités dans Microsoft PowerPoint | 2010-11-10T00:00:00.000000 | 2010-11-10T00:00:00.000000 |
| certa-2010-avi-543 | Vulnérabilités dans Microsoft Office | 2010-11-10T00:00:00.000000 | 2010-11-10T00:00:00.000000 |
| certa-2010-avi-542 | Vulnérabilités dans Novell GroupWise | 2010-11-09T00:00:00.000000 | 2010-11-09T00:00:00.000000 |
| certa-2010-avi-541 | Vulnérabilités dans Joomla! | 2010-11-09T00:00:00.000000 | 2010-11-09T00:00:00.000000 |
| certa-2010-avi-540 | Vulnérabilité dans Cisco Unified Communications Manager | 2010-11-08T00:00:00.000000 | 2010-11-08T00:00:00.000000 |
| certa-2010-avi-539 | Multiples vulnérabilités dans Cisco Intelligent Contact Manager | 2010-11-08T00:00:00.000000 | 2010-11-08T00:00:00.000000 |
| certa-2010-avi-538 | Multiples vulnérabilités dans Adobe Flash Player | 2010-11-05T00:00:00.000000 | 2010-11-05T00:00:00.000000 |
| certa-2010-avi-537 | Vulnérabilité dans Intel Xeon Baseboard Management Component | 2010-11-05T00:00:00.000000 | 2010-11-05T00:00:00.000000 |
| certa-2010-avi-536 | Multiples Vulnérabilités dans Google Chrome | 2010-11-05T00:00:00.000000 | 2010-11-05T00:00:00.000000 |
| certa-2010-avi-535 | Vulnérabilité dans IBM WebSphere | 2010-11-05T00:00:00.000000 | 2010-11-05T00:00:00.000000 |
| certa-2010-avi-534 | Vulnérabilités dans MySQL | 2010-11-05T00:00:00.000000 | 2010-11-05T00:00:00.000000 |
| certa-2010-avi-533 | Multiples vulnérabilités dans Bugzilla | 2010-11-04T00:00:00.000000 | 2010-11-04T00:00:00.000000 |
| certa-2010-avi-532 | Vulnérabilité dans ISC DHCP | 2010-11-03T00:00:00.000000 | 2010-11-03T00:00:00.000000 |
| certa-2010-avi-531 | Vulnérabilités dans ProFTPD | 2010-11-03T00:00:00.000000 | 2010-11-03T00:00:00.000000 |
| certa-2010-avi-530 | Multiples vulnérabilités dans Linux PAM | 2010-11-03T00:00:00.000000 | 2010-11-03T00:00:00.000000 |
| certa-2010-avi-529 | Vulnérabilité dans IBM Tivoli Directory Proxy Server | 2010-11-03T00:00:00.000000 | 2010-11-03T00:00:00.000000 |
| certa-2010-avi-528 | Vulnérabilité dans SonicWALL SSL-VPN | 2010-11-02T00:00:00.000000 | 2010-11-02T00:00:00.000000 |
| certa-2010-avi-527 | Vulnérabilité dans les copieurs Xerox | 2010-11-02T00:00:00.000000 | 2010-11-02T00:00:00.000000 |
| certa-2010-avi-526 | Multiples vulnérabilités dans IBM HTTP Server | 2010-10-29T00:00:00.000000 | 2010-10-29T00:00:00.000000 |
| certa-2010-avi-525 | Vulnérabilités dans Symantec IM Manager | 2010-10-29T00:00:00.000000 | 2010-10-29T00:00:00.000000 |
| certa-2010-avi-524 | Vulnérabilité dans PAM | 2010-10-29T00:00:00.000000 | 2010-10-29T00:00:00.000000 |
| certa-2010-avi-523 | Multiples vulnérabilités dans Adobe Shockwave Player | 2010-10-29T00:00:00.000000 | 2010-10-29T00:00:00.000000 |
| certa-2010-avi-522 | Vulnérabilité dans IBM WebSphere | 2010-10-29T00:00:00.000000 | 2010-10-29T00:00:00.000000 |
| certa-2010-avi-499 | Multiples vulnérabilités dans les produits Oracle | 2010-10-14T00:00:00.000000 | 2010-10-29T00:00:00.000000 |
| certa-2010-avi-520 | Vulnérabilité dans glibc | 2010-10-28T00:00:00.000000 | 2010-10-28T00:00:00.000000 |
| certa-2010-avi-519 | Vulnérabilité dans HP Virtual Connect Enterprise Manager | 2010-10-28T00:00:00.000000 | 2010-10-28T00:00:00.000000 |
| certa-2010-avi-518 | Vulnérabilité dans HP Virtual Server Environment | 2010-10-28T00:00:00.000000 | 2010-10-28T00:00:00.000000 |
| certa-2010-avi-517 | Vulnérabilités dans CiscoWorks Common Services | 2010-10-28T00:00:00.000000 | 2010-10-28T00:00:00.000000 |