Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-0833 |
6.4 (3.1)
|
Team Section Block <= 2.0.0 - Authenticated (Contribut… |
bplugins |
Team Section Block – Showcase Team Members with Layout Options |
2026-01-17T06:42:19.058Z | 2026-01-21T16:07:08.454Z |
| CVE-2025-57881 |
6.1 (3.1)
|
A reflected cross-site scripting (xss) vulnerabil… |
MedDream |
MedDream PACS Premium |
2026-01-20T14:49:52.820Z | 2026-01-21T16:06:29.616Z |
| CVE-2025-54861 |
6.1 (3.1)
|
A reflected cross-site scripting (xss) vulnerabil… |
MedDream |
MedDream PACS Premium |
2026-01-20T14:49:54.751Z | 2026-01-21T16:05:52.800Z |
| CVE-2025-54814 |
6.1 (3.1)
|
A reflected cross-site scripting (xss) vulnerabil… |
MedDream |
MedDream PACS Premium |
2026-01-20T14:49:56.529Z | 2026-01-21T16:05:14.586Z |
| CVE-2025-54852 |
6.1 (3.1)
|
A reflected cross-site scripting (xss) vulnerabil… |
MedDream |
MedDream PACS Premium |
2026-01-20T14:49:58.226Z | 2026-01-21T16:03:09.670Z |
| CVE-2025-55071 |
6.1 (3.1)
|
A reflected cross-site scripting (xss) vulnerabil… |
MedDream |
MedDream PACS Premium |
2026-01-20T14:50:00.120Z | 2026-01-21T16:02:27.108Z |
| CVE-2025-46270 |
6.1 (3.1)
|
A reflected cross-site scripting (xss) vulnerabil… |
MedDream |
MedDream PACS Premium |
2026-01-20T14:50:02.925Z | 2026-01-21T16:01:41.918Z |
| CVE-2025-54778 |
6.1 (3.1)
|
A reflected cross-site scripting (xss) vulnerabil… |
MedDream |
MedDream PACS Premium |
2026-01-20T14:50:04.564Z | 2026-01-21T16:01:00.369Z |
| CVE-2025-54157 |
6.1 (3.1)
|
A reflected cross-site scripting (xss) vulnerabil… |
MedDream |
MedDream PACS Premium |
2026-01-20T14:50:06.235Z | 2026-01-21T16:00:16.210Z |
| CVE-2025-54495 |
6.1 (3.1)
|
A reflected cross-site scripting (xss) vulnerabil… |
MedDream |
MedDream PACS Premium |
2026-01-20T14:50:07.822Z | 2026-01-21T15:59:30.852Z |
| CVE-2025-53516 |
6.1 (3.1)
|
A reflected cross-site scripting (xss) vulnerabil… |
MedDream |
MedDream PACS Premium |
2026-01-20T14:50:09.451Z | 2026-01-21T15:58:49.690Z |
| CVE-2025-54817 |
6.1 (3.1)
|
A reflected cross-site scripting (xss) vulnerabil… |
MedDream |
MedDream PACS Premium |
2026-01-20T14:50:10.921Z | 2026-01-21T15:58:22.154Z |
| CVE-2025-70645 |
7.5 (3.1)
|
Tenda AX-1806 v1.0.0.1 was discovered to contain … |
n/a |
n/a |
2026-01-21T00:00:00.000Z | 2026-01-21T15:57:51.644Z |
| CVE-2026-21959 |
4.9 (3.1)
|
Vulnerability in the Oracle Workflow product of O… |
Oracle Corporation |
Oracle Workflow |
2026-01-20T21:56:31.676Z | 2026-01-21T15:55:20.278Z |
| CVE-2025-70650 |
7.5 (3.1)
|
Tenda AX-1806 v1.0.0.1 was discovered to contain … |
n/a |
n/a |
2026-01-21T00:00:00.000Z | 2026-01-21T15:53:09.636Z |
| CVE-2026-21961 |
6.1 (3.1)
|
Vulnerability in the PeopleSoft Enterprise HCM Hu… |
Oracle Corporation |
PeopleSoft Enterprise HCM Human Resources |
2026-01-20T21:56:32.326Z | 2026-01-21T15:51:52.957Z |
| CVE-2026-21963 |
6 (3.1)
|
Vulnerability in the Oracle VM VirtualBox product… |
Oracle Corporation |
Oracle VM VirtualBox |
2026-01-20T21:56:32.976Z | 2026-01-21T15:49:37.439Z |
| CVE-2026-1290 |
5.3 (4.0)
|
[PI141230] Fixed A broken access control issue. |
Jamf |
Jamf Pro |
2026-01-21T15:25:19.543Z | 2026-01-21T15:49:21.064Z |
| CVE-2025-70651 |
7.5 (3.1)
|
Tenda AX-1803 v1.0.0.1 was discovered to contain … |
n/a |
n/a |
2026-01-21T00:00:00.000Z | 2026-01-21T15:45:09.124Z |
| CVE-2025-15521 |
9.8 (3.1)
|
Academy LMS – WordPress LMS Plugin for Complete eLearn… |
kodezen |
Academy LMS – WordPress LMS Plugin for Complete eLearning Solution |
2026-01-21T01:23:31.967Z | 2026-01-21T15:43:35.602Z |
| CVE-2025-58945 |
8.2 (3.1)
|
WordPress EcoGrow theme <= 1.7 - Local File Inclusion … |
axiomthemes |
EcoGrow |
2025-12-18T07:21:58.690Z | 2026-01-21T15:42:07.851Z |
| CVE-2025-58946 |
8.2 (3.1)
|
WordPress Vocal theme <= 1.12 - Local File Inclusion v… |
axiomthemes |
Vocal |
2025-12-18T07:21:58.862Z | 2026-01-21T15:41:50.808Z |
| CVE-2025-58947 |
8.2 (3.1)
|
WordPress Athos theme <= 1.9 - Local File Inclusion vu… |
axiomthemes |
Athos |
2025-12-18T07:21:59.042Z | 2026-01-21T15:41:30.700Z |
| CVE-2025-60049 |
8.2 (3.1)
|
WordPress Soleil theme <= 1.17 - Local File Inclusion … |
axiomthemes |
Soleil |
2025-12-18T07:22:01.475Z | 2026-01-21T15:41:15.755Z |
| CVE-2025-60050 |
8.2 (3.1)
|
WordPress Panda theme <= 1.21 - Local File Inclusion v… |
axiomthemes |
Panda |
2025-12-18T07:22:01.712Z | 2026-01-21T15:40:43.518Z |
| CVE-2025-60051 |
8.2 (3.1)
|
WordPress Rare Radio theme <= 1.0.15.1 - Local File In… |
AncoraThemes |
Rare Radio |
2025-12-18T07:22:01.919Z | 2026-01-21T15:40:27.459Z |
| CVE-2025-60052 |
8.2 (3.1)
|
WordPress W&D theme <= 1.0 - Local File Inclusion vuln… |
AncoraThemes |
W&D |
2025-12-18T07:22:02.123Z | 2026-01-21T15:40:12.899Z |
| CVE-2025-60053 |
8.2 (3.1)
|
WordPress MaxCube theme <= 1.3.1 - Local File Inclusio… |
AncoraThemes |
MaxCube |
2025-12-18T07:22:02.315Z | 2026-01-21T15:39:56.826Z |
| CVE-2025-60054 |
8.2 (3.1)
|
WordPress OnLeash theme <= 1.5.2 - Local File Inclusio… |
AncoraThemes |
OnLeash |
2025-12-18T07:22:02.500Z | 2026-01-21T15:39:31.725Z |
| CVE-2026-22444 |
N/A
|
Apache Solr: Insufficient file-access checking in stan… |
Apache Software Foundation |
Apache Solr |
2026-01-21T13:40:24.979Z | 2026-01-21T15:39:04.577Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-21877 |
10 (3.1)
|
n8n is vulnerable to Remote Code Execution via Arbitra… |
n8n-io |
n8n |
2026-01-08T00:39:58.697Z | 2026-01-08T18:59:10.198Z |
| CVE-2025-14435 |
6.8 (3.1)
|
Application-Level DoS via infinite re-render loop in u… |
Mattermost |
Mattermost |
2026-01-16T11:25:35.817Z | 2026-01-16T14:09:00.429Z |
| CVE-2025-9086 |
7.5 (3.1)
|
Out of bounds read for cookie path |
curl |
curl |
2025-09-12T05:10:03.815Z | 2026-01-08T09:51:46.552Z |
| CVE-2025-10966 |
4.3 (3.1)
|
missing SFTP host verification with wolfSSH |
curl |
curl |
2025-11-07T07:26:30.351Z | 2025-11-10T20:26:07.282Z |
| CVE-2026-22819 |
5.9 (3.1)
|
Outray has a Race Condition in main/apps/web/src/route… |
akinloluwami |
outray |
2026-01-14T18:04:33.426Z | 2026-01-14T21:13:36.389Z |
| CVE-2025-10148 |
5.3 (3.1)
|
predictable WebSocket mask |
curl |
curl |
2025-09-12T05:10:37.469Z | 2025-11-18T20:05:32.822Z |
| CVE-2025-13034 |
5.9 (3.1)
|
No QUIC certificate pinning with GnuTLS |
curl |
curl |
2026-01-08T10:00:25.773Z | 2026-01-08T14:58:20.565Z |
| CVE-2025-14524 |
5.3 (3.1)
|
bearer token leak on cross-protocol redirect |
curl |
curl |
2026-01-08T10:07:25.655Z | 2026-01-09T19:25:30.460Z |
| CVE-2026-22820 |
6.3 (4.0)
|
Outray cli is vulnerable to race conditions in tunnels… |
akinloluwami |
outray |
2026-01-14T15:06:51.127Z | 2026-01-14T15:19:46.837Z |
| CVE-2025-14819 |
5.3 (3.1)
|
OpenSSL partial chain store policy bypass |
curl |
curl |
2026-01-08T10:07:54.408Z | 2026-01-08T15:02:04.303Z |
| CVE-2025-15079 |
5.3 (3.1)
|
libssh global known_hosts override |
curl |
curl |
2026-01-08T10:08:13.410Z | 2026-01-08T14:46:47.042Z |
| CVE-2025-15224 |
3.1 (3.1)
|
libssh key passphrase bypass without agent set |
curl |
curl |
2026-01-08T10:08:27.516Z | 2026-01-08T14:39:55.278Z |
| CVE-2025-62595 |
4.3 (3.1)
|
Koa Vulnerable to Open Redirect via Trailing Double-Sl… |
koajs |
koa |
2025-10-21T16:20:43.809Z | 2025-10-21T16:35:48.461Z |
| CVE-2025-25200 |
9.2 (4.0)
|
Koa has Inefficient Regular Expression Complexity |
koajs |
koa |
2025-02-12T17:59:04.615Z | 2025-02-12T19:29:10.232Z |
| CVE-2025-20998 |
5.5 (3.1)
|
Improper access control in SamsungAccount for Gal… |
Samsung Mobile |
Samsung Mobile Devices |
2025-07-08T10:34:27.871Z | 2025-07-11T13:30:37.481Z |
| CVE-2025-21004 |
6.2 (3.1)
|
Improper verification of intent by broadcast rece… |
Samsung Mobile |
Samsung Mobile Devices |
2025-07-08T10:34:34.247Z | 2025-07-08T18:13:09.259Z |
| CVE-2025-43019 |
5.8 (4.0)
|
HP Support Assistant – Potential Escalation of Privilege |
HP Inc. |
HP Support Assistant |
2025-07-08T15:25:34.337Z | 2025-07-08T15:35:59.639Z |
| CVE-2025-59429 |
8.5 (4.0)
|
FreePBX core module vulnerable to reflected cross-site… |
FreePBX |
core |
2025-10-14T19:26:02.072Z | 2026-02-13T22:02:12.825Z |
| CVE-2025-8110 |
8.7 (4.0)
|
File overwrite in file update API in Gogs |
Gogs |
Gogs |
2025-12-10T13:23:46.777Z | 2026-02-26T16:21:06.106Z |
| CVE-2026-23917 |
N/A
|
Not used | N/A | N/A | 2026-01-20T03:55:05.288Z | |
| CVE-2026-23916 |
N/A
|
Not used | N/A | N/A | 2026-01-20T03:55:05.817Z | |
| CVE-2026-23915 |
N/A
|
Not used | N/A | N/A | 2026-01-20T03:55:06.297Z | |
| CVE-2026-23914 |
N/A
|
Not used | N/A | N/A | 2026-01-20T03:55:06.762Z | |
| CVE-2026-23913 |
N/A
|
Not used | N/A | N/A | 2026-01-20T03:55:07.342Z | |
| CVE-2026-23912 |
N/A
|
Not used | N/A | N/A | 2026-01-20T03:55:07.819Z | |
| CVE-2026-23911 |
N/A
|
Not used | N/A | N/A | 2026-01-20T03:55:08.281Z | |
| CVE-2026-23910 |
N/A
|
Not used | N/A | N/A | 2026-01-20T03:55:08.723Z | |
| CVE-2026-23909 |
N/A
|
Not used | N/A | N/A | 2026-01-20T03:55:09.182Z | |
| CVE-2025-68161 |
6.3 (4.0)
|
Apache Log4j Core: Missing TLS hostname verification i… |
Apache Software Foundation |
Apache Log4j Core |
2025-12-18T20:47:49.123Z | 2026-01-20T00:13:44.911Z |
| CVE-2025-71137 |
N/A
|
octeontx2-pf: fix "UBSAN: shift-out-of-bounds error" |
Linux |
Linux |
2026-01-14T15:07:51.264Z | 2026-02-09T08:35:34.357Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-13034 | When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey` with the curl tool,cur… | 2026-01-08T10:15:45.407 | 2026-01-20T14:54:02.730 |
| fkie_cve-2025-14524 | When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-pro… | 2026-01-08T10:15:46.607 | 2026-01-20T14:53:11.017 |
| fkie_cve-2026-22820 | Outray openSource ngrok alternative. Prior to 0.1.5, a TOCTOU race condition vulnerability allows a… | 2026-01-14T15:16:05.663 | 2026-01-20T14:52:10.373 |
| fkie_cve-2025-14819 | When doing TLS related transfers with reused easy or multi handles and altering the `CURLSSLOPT_NO… | 2026-01-08T10:15:46.730 | 2026-01-20T14:51:26.263 |
| fkie_cve-2025-15079 | When doing SSH-based transfers using either SCP or SFTP, and setting the known_hosts file, libcurl … | 2026-01-08T10:15:47.100 | 2026-01-20T14:50:24.330 |
| fkie_cve-2025-15224 | When doing SSH-based transfers using either SCP or SFTP, and asked to do public key authentication,… | 2026-01-08T10:15:47.207 | 2026-01-20T14:47:52.710 |
| fkie_cve-2025-62595 | Koa is expressive middleware for Node.js using ES2017 async functions. In versions 2.16.2 to before… | 2025-10-21T17:15:40.737 | 2026-01-20T14:45:48.283 |
| fkie_cve-2025-25200 | Koa is expressive middleware for Node.js using ES2017 async functions. Prior to versions 0.21.2, 1.… | 2025-02-12T18:15:28.110 | 2026-01-20T14:42:45.760 |
| fkie_cve-2025-20998 | Improper access control in SamsungAccount for Galaxy Watch prior to SMR Jul-2025 Release 1 allows l… | 2025-07-08T11:15:25.137 | 2026-01-20T14:42:28.020 |
| fkie_cve-2025-21004 | Improper verification of intent by broadcast receiver in System UI for Galaxy Watch prior to SMR Ju… | 2025-07-08T11:15:25.923 | 2026-01-20T14:41:30.180 |
| fkie_cve-2025-43019 | A potential security vulnerability has been identified in the HP Support Assistant, which allows a … | 2025-07-08T16:15:57.763 | 2026-01-20T14:39:40.063 |
| fkie_cve-2025-59429 | FreePBX is an open source GUI for managing Asterisk. In versions prior to 16.0.68.39 for FreePBX 16… | 2025-10-14T20:15:50.233 | 2026-01-20T13:59:00.880 |
| fkie_cve-2025-8110 | Improper Symbolic link handling in the PutContents API in Gogs allows Local Execution of Code. | 2025-12-10T14:16:19.847 | 2026-01-20T13:47:34.450 |
| fkie_cve-2026-23917 | Rejected reason: Not used | 2026-01-20T05:16:17.093 | 2026-01-20T05:16:17.093 |
| fkie_cve-2026-23916 | Rejected reason: Not used | 2026-01-20T05:16:17.030 | 2026-01-20T05:16:17.030 |
| fkie_cve-2026-23915 | Rejected reason: Not used | 2026-01-20T05:16:16.953 | 2026-01-20T05:16:16.953 |
| fkie_cve-2026-23914 | Rejected reason: Not used | 2026-01-20T05:16:16.883 | 2026-01-20T05:16:16.883 |
| fkie_cve-2026-23913 | Rejected reason: Not used | 2026-01-20T05:16:16.817 | 2026-01-20T05:16:16.817 |
| fkie_cve-2026-23912 | Rejected reason: Not used | 2026-01-20T05:16:16.743 | 2026-01-20T05:16:16.743 |
| fkie_cve-2026-23911 | Rejected reason: Not used | 2026-01-20T05:16:16.673 | 2026-01-20T05:16:16.673 |
| fkie_cve-2026-23910 | Rejected reason: Not used | 2026-01-20T05:16:16.600 | 2026-01-20T05:16:16.600 |
| fkie_cve-2026-23909 | Rejected reason: Not used | 2026-01-20T05:16:16.467 | 2026-01-20T05:16:16.467 |
| fkie_cve-2025-68161 | The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does not perform TLS hos… | 2025-12-18T21:15:57.960 | 2026-01-20T01:15:55.067 |
| fkie_cve-2025-71137 | In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: fix "UBSAN: shif… | 2026-01-14T15:16:03.487 | 2026-01-19T13:16:19.683 |
| fkie_cve-2025-71136 | In the Linux kernel, the following vulnerability has been resolved: media: adv7842: Avoid possible… | 2026-01-14T15:16:03.383 | 2026-01-19T13:16:19.583 |
| fkie_cve-2025-71133 | In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: avoid invalid read… | 2026-01-14T15:16:03.053 | 2026-01-19T13:16:19.490 |
| fkie_cve-2025-71132 | In the Linux kernel, the following vulnerability has been resolved: smc91x: fix broken irq-context… | 2026-01-14T15:16:02.947 | 2026-01-19T13:16:19.400 |
| fkie_cve-2025-71131 | In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Do not use req… | 2026-01-14T15:16:02.843 | 2026-01-19T13:16:19.303 |
| fkie_cve-2025-71127 | In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: Discard Beacon… | 2026-01-14T15:16:02.430 | 2026-01-19T13:16:19.210 |
| fkie_cve-2025-71125 | In the Linux kernel, the following vulnerability has been resolved: tracing: Do not register unsup… | 2026-01-14T15:16:02.213 | 2026-01-19T13:16:19.113 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-pmr8-7hfr-pqgg |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:35Z | 2026-01-02T18:30:35Z |
| ghsa-p2j4-f9mr-jgwh |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:35Z | 2026-01-02T18:30:35Z |
| ghsa-mp46-hrfp-mv24 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:35Z |
| ghsa-mjr5-vpc2-96v9 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:35Z | 2026-01-02T18:30:35Z |
| ghsa-j5xr-p3gc-vjm7 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:35Z | 2026-01-02T18:30:35Z |
| ghsa-hxfc-qqc8-5973 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:35Z | 2026-01-02T18:30:35Z |
| ghsa-hcjq-pf59-fr2q |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:35Z | 2026-01-02T18:30:35Z |
| ghsa-g8gm-xffm-6hq4 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:35Z | 2026-01-02T18:30:35Z |
| ghsa-frx6-jcq3-g57f |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:35Z | 2026-01-02T18:30:35Z |
| ghsa-fq58-v245-p7vf |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:35Z | 2026-01-02T18:30:35Z |
| ghsa-f4vc-2vqv-hpv4 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:35Z | 2026-01-02T18:30:35Z |
| ghsa-ch6w-6j9h-mh74 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:35Z | 2026-01-02T18:30:35Z |
| ghsa-c9j9-v8p6-fm5m |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:35Z | 2026-01-02T18:30:35Z |
| ghsa-8vj7-xx8v-58qm |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:35Z | 2026-01-02T18:30:35Z |
| ghsa-7v6p-5cw4-8w4h |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:35Z | 2026-01-02T18:30:35Z |
| ghsa-7gpm-2c44-rxwm |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:35Z | 2026-01-02T18:30:35Z |
| ghsa-6v3m-8592-63c7 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:35Z | 2026-01-02T18:30:35Z |
| ghsa-67p7-m2pp-372h |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:35Z | 2026-01-02T18:30:35Z |
| ghsa-66q9-4j2w-4pgp |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:35Z | 2026-01-02T18:30:35Z |
| ghsa-4p4j-c7q8-qm54 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:35Z | 2026-01-02T18:30:35Z |
| ghsa-465m-7qm8-9fg5 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:35Z | 2026-01-02T18:30:35Z |
| ghsa-3jf4-475v-2r4g |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:35Z | 2026-01-02T18:30:35Z |
| ghsa-2whc-8658-9gvr |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:35Z | 2026-01-02T18:30:35Z |
| ghsa-2m3q-qmg5-8x72 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:35Z | 2026-01-02T18:30:35Z |
| ghsa-xwvc-jhhh-34wf |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-xpjg-4p4f-hgxc |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-x68q-4r43-p95c |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-w6c8-hgwv-3vx8 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:34Z |
| ghsa-vqj7-wf2v-jq72 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-v44q-58f6-2xr4 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-25399 | Subrion CMS 4.2.1 is vulnerable to Cross Site Scripting (XSS) via adminer.php. | 2024-02-08T06:02:25.096918Z |
| gsd-2024-25351 | SQL Injection vulnerability in /zms/admin/changeimage.php in PHPGurukul Zoo Management Sy… | 2024-02-08T06:02:25.096649Z |
| gsd-2024-25455 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.095898Z |
| gsd-2024-25293 | mjml-app versions 3.0.4 and 3.1.0-beta were discovered to contain a remote code execution… | 2024-02-08T06:02:25.095355Z |
| gsd-2024-25407 | SteVe v3.6.0 was discovered to use predictable transaction ID's when receiving a StartTra… | 2024-02-08T06:02:25.095020Z |
| gsd-2024-25402 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.094753Z |
| gsd-2024-25196 | Open Robotics Robotic Operating Sytstem 2 (ROS2) and Nav2 humble versions were discovered… | 2024-02-08T06:02:25.094484Z |
| gsd-2024-25367 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.093782Z |
| gsd-2024-25477 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.093555Z |
| gsd-2024-25515 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.093321Z |
| gsd-2024-25220 | Task Manager App v1.0 was discovered to contain a SQL injection vulnerability via the tas… | 2024-02-08T06:02:25.092777Z |
| gsd-2024-25460 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.092491Z |
| gsd-2024-25420 | An issue in Ignite Realtime Openfire v.4.9.0 and before allows a remote attacker to escal… | 2024-02-08T06:02:25.092197Z |
| gsd-2024-25357 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.091853Z |
| gsd-2024-25223 | Simple Admin Panel App v1.0 was discovered to contain a SQL injection vulnerability via t… | 2024-02-08T06:02:25.091077Z |
| gsd-2024-25500 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.090516Z |
| gsd-2024-25451 | Bento4 v1.6.0-640 was discovered to contain an out-of-memory bug via the AP4_DataBuffer::… | 2024-02-08T06:02:25.090271Z |
| gsd-2024-25199 | Inappropriate pointer order of map_sub_ and map_free(map_) (amcl_node.cpp) in Open Roboti… | 2024-02-08T06:02:25.089463Z |
| gsd-2024-25317 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.089165Z |
| gsd-2024-25378 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.088596Z |
| gsd-2024-25212 | Employee Managment System v1.0 was discovered to contain a SQL injection vulnerability vi… | 2024-02-08T06:02:25.087232Z |
| gsd-2024-25527 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.087017Z |
| gsd-2024-25210 | Simple Expense Tracker v1.0 was discovered to contain a SQL injection vulnerability via t… | 2024-02-08T06:02:25.086194Z |
| gsd-2024-25304 | Code-projects Simple School Managment System 1.0 allows SQL Injection via the 'apass' par… | 2024-02-08T06:02:25.085044Z |
| gsd-2024-25366 | Buffer Overflow vulnerability in mz-automation.de libiec61859 v.1.4.0 allows a remote att… | 2024-02-08T06:02:25.084493Z |
| gsd-2024-25305 | Code-projects Simple School Managment System 1.0 allows Authentication Bypass via the use… | 2024-02-08T06:02:25.083965Z |
| gsd-2024-25327 | Cross Site Scripting (XSS) vulnerability in Justice Systems FullCourt Enterprise v.8.2 al… | 2024-02-08T06:02:25.083447Z |
| gsd-2024-25503 | Cross Site Scripting (XSS) vulnerability in Advanced REST Client v.17.0.9 allows a remote… | 2024-02-08T06:02:25.083180Z |
| gsd-2024-25283 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.082960Z |
| gsd-2024-25315 | Code-projects Hotel Managment System 1.0, allows SQL Injection via the 'rid' parameter in… | 2024-02-08T06:02:25.082732Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-183634 | Malicious code in mahnu-nofy-gaoigaa (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183633 | Malicious code in mahnu-nofy-gaoaigaa (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183632 | Malicious code in mahnu-nofy-gam (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183631 | Malicious code in mahnu-nofy-gaigaa (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183630 | Malicious code in mahnu-nofy-gaga (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183629 | Malicious code in mahnu-nofy-gag (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183628 | Malicious code in mahnu-nofy-ga (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183627 | Malicious code in mahnu-nofty-gam (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183626 | Malicious code in mahnu-nofity-gaomoni (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183625 | Malicious code in mahnu-nofity-gaomoani (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183624 | Malicious code in mahnu-nofity-gaomni (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183623 | Malicious code in mahnu-nofity-gamoani (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183622 | Malicious code in mahnu-nofity-gamni (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183621 | Malicious code in mahnu-nofity-gami (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183620 | Malicious code in mahnu-nofity-gam (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183619 | Malicious code in lomi-ifush-ugofalifufu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183618 | Malicious code in lomi-ifush-ugofalifuafu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183617 | Malicious code in lomi-ifush-ugofalifu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183616 | Malicious code in lomi-ifush-ugofalif (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183615 | Malicious code in lomi-ifush-ugofali (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183614 | Malicious code in lomi-ifush-ugofai (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183613 | Malicious code in lomi-ifush-ugofa (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183612 | Malicious code in lomi-ifush-ugof (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183611 | Malicious code in lomi-ifush-ugo (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183610 | Malicious code in lomi-ifush-ugio (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183609 | Malicious code in lomi-ifush-ugilkfobi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183608 | Malicious code in lomi-ifush-ugilkfoabi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183607 | Malicious code in lomi-ifush-ugikoi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183606 | Malicious code in lomi-ifush-ugikobi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183605 | Malicious code in lomi-ifush-ugiko (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2023:5758 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update | 2023-10-16T15:39:55+00:00 | 2025-11-21T18:47:17+00:00 |
| rhsa-2023:5752 | Red Hat Security Advisory: java-17-openjdk security and bug fix update | 2023-10-18T16:23:52+00:00 | 2025-11-21T18:47:17+00:00 |
| rhsa-2023:5753 | Red Hat Security Advisory: java-17-openjdk security and bug fix update | 2023-10-18T16:26:18+00:00 | 2025-11-21T18:47:16+00:00 |
| rhsa-2023:5751 | Red Hat Security Advisory: java-17-openjdk security and bug fix update | 2023-10-18T17:06:43+00:00 | 2025-11-21T18:47:16+00:00 |
| rhsa-2023:5750 | Red Hat Security Advisory: java-17-openjdk security and bug fix update | 2023-10-18T16:25:25+00:00 | 2025-11-21T18:47:16+00:00 |
| rhsa-2023:5747 | Red Hat Security Advisory: java-17-openjdk security and bug fix update | 2023-10-18T16:21:09+00:00 | 2025-11-21T18:47:15+00:00 |
| rhsa-2023:5746 | Red Hat Security Advisory: OpenJDK 17.0.9 Security Update for Windows Builds | 2023-10-18T16:22:19+00:00 | 2025-11-21T18:47:14+00:00 |
| rhsa-2023:5745 | Red Hat Security Advisory: OpenJDK 17.0.9 Security Update for Portable Linux Builds | 2023-10-18T16:22:31+00:00 | 2025-11-21T18:47:14+00:00 |
| rhsa-2023:5744 | Red Hat Security Advisory: java-11-openjdk security and bug fix update | 2023-10-18T16:26:18+00:00 | 2025-11-21T18:47:14+00:00 |
| rhsa-2023:5743 | Red Hat Security Advisory: java-11-openjdk security and bug fix update | 2023-10-18T16:00:17+00:00 | 2025-11-21T18:47:13+00:00 |
| rhsa-2023:5742 | Red Hat Security Advisory: java-11-openjdk security and bug fix update | 2023-10-18T15:02:28+00:00 | 2025-11-21T18:47:13+00:00 |
| rhsa-2023:5741 | Red Hat Security Advisory: java-11-openjdk security and bug fix update | 2023-10-18T15:57:21+00:00 | 2025-11-21T18:47:12+00:00 |
| rhsa-2023:5740 | Red Hat Security Advisory: java-11-openjdk security and bug fix update | 2023-10-18T16:21:10+00:00 | 2025-11-21T18:47:12+00:00 |
| rhsa-2023:5739 | Red Hat Security Advisory: java-11-openjdk security and bug fix update | 2023-10-18T15:00:03+00:00 | 2025-11-21T18:47:11+00:00 |
| rhsa-2023:5737 | Red Hat Security Advisory: java-11-openjdk security update | 2023-10-18T16:23:31+00:00 | 2025-11-21T18:47:11+00:00 |
| rhsa-2023:5736 | Red Hat Security Advisory: java-11-openjdk security and bug fix update | 2023-10-18T16:32:38+00:00 | 2025-11-21T18:47:10+00:00 |
| rhsa-2023:5735 | Red Hat Security Advisory: OpenJDK 11.0.21 Security Update for Windows Builds | 2023-10-18T16:22:30+00:00 | 2025-11-21T18:47:10+00:00 |
| rhsa-2023:5734 | Red Hat Security Advisory: OpenJDK 11.0.21 Security Update for Portable Linux Builds | 2023-10-18T16:22:25+00:00 | 2025-11-21T18:47:09+00:00 |
| rhsa-2023:5733 | Red Hat Security Advisory: java-1.8.0-openjdk security update | 2023-10-18T23:08:49+00:00 | 2025-11-21T18:47:09+00:00 |
| rhsa-2023:5732 | Red Hat Security Advisory: java-1.8.0-openjdk security update | 2023-10-18T23:04:23+00:00 | 2025-11-21T18:47:08+00:00 |
| rhsa-2023:5731 | Red Hat Security Advisory: java-1.8.0-openjdk security update | 2023-10-18T23:02:16+00:00 | 2025-11-21T18:47:08+00:00 |
| rhsa-2023:5730 | Red Hat Security Advisory: java-1.8.0-openjdk security update | 2023-10-18T23:32:13+00:00 | 2025-11-21T18:47:08+00:00 |
| rhsa-2023:5729 | Red Hat Security Advisory: java-1.8.0-openjdk security update | 2023-10-18T23:07:47+00:00 | 2025-11-21T18:47:07+00:00 |
| rhsa-2023:5728 | Red Hat Security Advisory: java-1.8.0-openjdk security update | 2023-10-18T23:04:28+00:00 | 2025-11-21T18:47:07+00:00 |
| rhsa-2023:5727 | Red Hat Security Advisory: java-1.8.0-openjdk security update | 2023-10-18T23:03:34+00:00 | 2025-11-21T18:47:07+00:00 |
| rhsa-2023:5726 | Red Hat Security Advisory: OpenJDK 8u392 Windows Security Update | 2023-10-18T16:22:42+00:00 | 2025-11-21T18:47:07+00:00 |
| rhsa-2023:5725 | Red Hat Security Advisory: OpenJDK 8u392 Security Update for Portable Linux Builds | 2023-10-18T16:22:43+00:00 | 2025-11-21T18:47:06+00:00 |
| rhsa-2023:5693 | Red Hat Security Advisory: Red Hat Ceph Storage 6.1 security, enhancement, and bug fix update | 2023-10-12T16:37:02+00:00 | 2025-11-21T18:46:56+00:00 |
| rhsa-2023:5701 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.3 Product Security and Bug Fix Update | 2023-10-16T01:05:28+00:00 | 2025-11-21T18:46:54+00:00 |
| rhsa-2023:5691 | Red Hat Security Advisory: bind security update | 2023-10-12T15:06:22+00:00 | 2025-11-21T18:46:52+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2021-21284 | privilege escalation in Moby | 2021-02-02T00:00:00.000Z | 2021-07-27T00:00:00.000Z |
| msrc_cve-2020-27534 | util/binfmt_misc/check.go in Builder in Docker Engine before 19.03.9 calls os.OpenFile with a potentially unsafe qemu-check temporary pathname constructed with an empty first argument in an ioutil.TempDir call. | 2020-12-02T00:00:00.000Z | 2021-07-16T00:00:00.000Z |
| msrc_cve-2019-5736 | runc through 1.0-rc6 as used in Docker before 18.09.2 and other products allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image or (2) an existing container to which the attacker previously had write access that can be attached with docker exec. This occurs because of file-descriptor mishandling related to /proc/self/exe. | 2019-02-02T00:00:00.000Z | 2021-07-16T00:00:00.000Z |
| msrc_cve-2019-16884 | runc through 1.0.0-rc8 as used in Docker through 19.03.2-ce and other products allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets and thus a malicious Docker image can mount over a /proc directory. | 2019-09-02T00:00:00.000Z | 2021-07-16T00:00:00.000Z |
| msrc_cve-2019-13509 | In Docker CE and EE before 18.09.8 (as well as Docker EE before 17.06.2-ee-23 and 18.x before 18.03.1-ee-10) Docker Engine in debug mode may sometimes add secrets to the debug log. This applies to a scenario where docker stack deploy is run to redeploy a stack that includes (non external) secrets. It potentially applies to other API users of the stack API if they resend the secret. | 2019-07-02T00:00:00.000Z | 2021-07-16T00:00:00.000Z |
| msrc_cve-2019-13139 | In Docker before 18.09.4 an attacker who is capable of supplying or manipulating the build path for the "docker build" command would be able to gain command execution. An issue exists in the way "docker build" processes remote git URLs and results in command injection into the underlying "git clone" command leading to code execution in the context of the user executing the "docker build" command. This occurs because git ref can be misinterpreted as a flag. | 2019-08-02T00:00:00.000Z | 2021-07-16T00:00:00.000Z |
| msrc_cve-2017-14992 | Lack of content verification in Docker-CE (Also known as Moby) versions 1.12.6-0 1.10.3 17.03.0 17.03.1 17.03.2 17.06.0 17.06.1 17.06.2 17.09.0 and earlier allows a remote attacker to cause a Denial of Service via a crafted image layer payload aka gzip bombing. | 2017-11-02T00:00:00.000Z | 2021-07-16T00:00:00.000Z |
| msrc_cve-2016-3697 | libcontainer/user/user.go in runC before 0.1.0 as used in Docker before 1.11.2 improperly treats a numeric UID as a potential username which allows local users to gain privileges via a numeric username in the password file in a container. | 2016-06-02T00:00:00.000Z | 2021-07-16T00:00:00.000Z |
| msrc_cve-2015-3631 | Docker Engine before 1.6.1 allows local users to set arbitrary Linux Security Modules (LSM) and docker_t policies via an image that allows volumes to override files in /proc. | 2015-05-02T00:00:00.000Z | 2021-07-16T00:00:00.000Z |
| msrc_cve-2015-3630 | Docker Engine before 1.6.1 uses weak permissions for (1) /proc/asound (2) /proc/timer_stats (3) /proc/latency_stats and (4) /proc/fs which allows local users to modify the host obtain sensitive information and perform protocol downgrade attacks via a crafted image. | 2015-05-02T00:00:00.000Z | 2021-07-16T00:00:00.000Z |
| msrc_cve-2015-3627 | Libcontainer and Docker Engine before 1.6.1 opens the file-descriptor passed to the pid-1 process before performing the chroot which allows local users to gain privileges via a symlink attack in an image. | 2015-05-02T00:00:00.000Z | 2021-07-16T00:00:00.000Z |
| msrc_cve-2014-9358 | Docker before 1.3.3 does not properly validate image IDs which allows remote attackers to conduct path traversal attacks and spoof repositories via a crafted image in a (1) "docker load" operation or (2) "registry communications." | 2014-12-02T00:00:00.000Z | 2021-07-16T00:00:00.000Z |
| msrc_cve-2014-9356 | Path traversal vulnerability in Docker before 1.3.3 allows remote attackers to write to arbitrary files and bypass a container protection mechanism via a full pathname in a symlink in an (1) image or (2) build in a Dockerfile. | 2019-12-02T00:00:00.000Z | 2021-07-16T00:00:00.000Z |
| msrc_cve-2014-8179 | Docker Engine before 1.8.3 and CS Docker Engine before 1.6.2-CS7 does not properly validate and extract the manifest object from its JSON representation during a pull which allows attackers to inject new attributes in a JSON object and bypass pull-by-digest validation. | 2019-12-02T00:00:00.000Z | 2021-07-16T00:00:00.000Z |
| msrc_cve-2014-8178 | Docker Engine before 1.8.3 and CS Docker Engine before 1.6.2-CS7 do not use a globally unique identifier to store image layers which makes it easier for attackers to poison the image cache via a crafted image in pull or push commands. | 2019-12-02T00:00:00.000Z | 2021-07-16T00:00:00.000Z |
| msrc_cve-2014-6407 | Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation. | 2014-12-02T00:00:00.000Z | 2021-07-16T00:00:00.000Z |
| msrc_cve-2014-5282 | Docker before 1.3 does not properly validate image IDs which allows remote attackers to redirect to another image through the loading of untrusted images via 'docker load'. | 2018-02-02T00:00:00.000Z | 2021-07-16T00:00:00.000Z |
| msrc_cve-2014-5278 | A vulnerability exists in Docker before 1.2 via container names which may collide with and override container IDs. | 2020-02-02T00:00:00.000Z | 2021-07-16T00:00:00.000Z |
| msrc_cve-2014-5277 | Docker before 1.3.1 and docker-py before 0.5.3 fall back to HTTP when the HTTPS connection to the registry fails which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the client and the registry to block HTTPS traffic. | 2014-11-02T00:00:00.000Z | 2021-07-16T00:00:00.000Z |
| msrc_cve-2014-0048 | An issue was found in Docker before 1.6.0. Some programs and scripts in Docker are downloaded via HTTP and then executed or used in unsafe ways. | 2020-01-02T00:00:00.000Z | 2021-07-16T00:00:00.000Z |
| msrc_cve-2014-0047 | Docker before 1.5 allows local users to have unspecified impact via vectors involving unsafe /tmp usage. | 2017-10-02T00:00:00.000Z | 2021-07-16T00:00:00.000Z |
| msrc_cve-2021-33560 | Libgcrypt before 1.8.8 and 1.9.x before 1.9.3 mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm and the window size is not chosen appropriately. This for example affects use of ElGamal in OpenPGP. | 2021-06-02T00:00:00.000Z | 2021-06-16T00:00:00.000Z |
| msrc_cve-2020-27661 | A divide-by-zero issue was found in dwc2_handle_packet in hw/usb/hcd-dwc2.c in the hcd-dwc2 USB host controller emulation of QEMU. A malicious guest could use this flaw to crash the QEMU process on the host resulting in a denial of service. | 2021-06-02T00:00:00.000Z | 2021-06-15T00:00:00.000Z |
| msrc_cve-2021-32027 | A flaw was found in postgresql in versions before 13.3 before 12.7 before 11.12 before 10.17 and before 9.6.22. While modifying certain SQL array values missing bounds checks let authenticated database users write arbitrary bytes to a wide area of server memory. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | 2021-06-02T00:00:00.000Z | 2021-06-11T00:00:00.000Z |
| msrc_cve-2021-23017 | A security issue in nginx resolver was identified which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite resulting in worker process crash or potential other impact. | 2021-06-02T00:00:00.000Z | 2021-06-11T00:00:00.000Z |
| msrc_cve-2021-3546 | An out-of-bounds write vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw occurs while processing the 'VIRTIO_GPU_CMD_GET_CAPSET' command from the guest. It could allow a privileged guest user to crash the QEMU process on the host resulting in a denial of service condition or potential code execution with the privileges of the QEMU process. | 2021-06-02T00:00:00.000Z | 2021-06-10T00:00:00.000Z |
| msrc_cve-2021-3545 | An information disclosure vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw exists in virgl_cmd_get_capset_info() in contrib/vhost-user-gpu/virgl.c and could occur due to the read of uninitialized memory. A malicious guest could exploit this issue to leak memory from the host. | 2021-06-02T00:00:00.000Z | 2021-06-10T00:00:00.000Z |
| msrc_cve-2021-31525 | net/http in Go before 1.15.12 and 1.16.x before 1.16.4 allows remote attackers to cause a denial of service (panic) via a large header to ReadRequest or ReadResponse. Server Transport and Client can each be affected in some configurations. | 2021-05-02T00:00:00.000Z | 2021-06-09T00:00:00.000Z |
| msrc_cve-2020-35506 | A use-after-free vulnerability was found in the am53c974 SCSI host bus adapter emulation of QEMU in versions before 6.0.0 during the handling of the 'Information Transfer' command (CMD_TI). This flaw allows a privileged guest user to crash the QEMU process on the host resulting in a denial of service or potential code execution with the privileges of the QEMU process. | 2021-05-02T00:00:00.000Z | 2021-06-09T00:00:00.000Z |
| msrc_cve-2020-35505 | A NULL pointer dereference flaw was found in the am53c974 SCSI host bus adapter emulation of QEMU in versions before 6.0.0. This issue occurs while handling the 'Information Transfer' command. This flaw allows a privileged guest user to crash the QEMU process on the host resulting in a denial of service. The highest threat from this vulnerability is to system availability. | 2021-05-02T00:00:00.000Z | 2021-06-09T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-201604-0152 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.343 and 19.x through 21.… | 2025-04-13T23:02:37.296000Z |
| var-201607-0070 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.… | 2025-04-13T23:02:37.245000Z |
| var-201607-0103 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows a… | 2025-04-13T23:02:37.198000Z |
| var-201604-0167 | Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows a… | 2025-04-13T23:02:35.960000Z |
| var-201607-0085 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows a… | 2025-04-13T23:02:35.914000Z |
| var-201606-0489 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Ad… | 2025-04-13T23:02:35.873000Z |
| var-201610-0466 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.382 and 19.x through 23.… | 2025-04-13T23:02:35.823000Z |
| var-201604-0165 | Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows a… | 2025-04-13T23:02:35.779000Z |
| var-201607-0082 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows a… | 2025-04-13T23:02:35.733000Z |
| var-201610-0394 | Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows a… | 2025-04-13T23:02:35.685000Z |
| var-201607-0101 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows a… | 2025-04-13T23:02:35.641000Z |
| var-201607-0073 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows a… | 2025-04-13T23:02:35.544000Z |
| var-201607-0522 | Race condition in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.… | 2025-04-13T23:02:35.488000Z |
| var-201607-0088 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.… | 2025-04-13T23:02:35.441000Z |
| var-201604-0153 | Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows a… | 2025-04-13T23:02:35.319000Z |
| var-201607-0083 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows a… | 2025-04-13T23:02:35.273000Z |
| var-201609-0454 | Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows a… | 2025-04-13T23:02:35.225000Z |
| var-201609-0571 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.… | 2025-04-13T23:02:35.170000Z |
| var-201607-0071 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows a… | 2025-04-13T23:02:35.110000Z |
| var-201604-0517 | Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows a… | 2025-04-13T23:02:35.059000Z |
| var-201606-0483 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Ad… | 2025-04-13T23:02:35.019000Z |
| var-201610-0425 | Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows a… | 2025-04-13T23:02:34.926000Z |
| var-201606-0496 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Ad… | 2025-04-13T23:02:34.886000Z |
| var-201607-0066 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows a… | 2025-04-13T23:02:34.838000Z |
| var-201604-0164 | Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows a… | 2025-04-13T23:02:34.793000Z |
| var-201607-0515 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows a… | 2025-04-13T23:02:34.747000Z |
| var-201606-0510 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Ad… | 2025-04-13T23:02:34.705000Z |
| var-201607-0524 | Heap-based buffer overflow in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x … | 2025-04-13T23:02:34.659000Z |
| var-201609-0455 | Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows a… | 2025-04-13T23:02:34.607000Z |
| var-201606-0480 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Ad… | 2025-04-13T23:02:34.566000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2020:3045-1 | Security update for virt-bootstrap | 2020-10-27T13:34:57Z | 2020-10-27T13:34:57Z |
| suse-su-2020:3039-1 | Security update for libvirt | 2020-10-27T08:08:29Z | 2020-10-27T08:08:29Z |
| suse-su-2020:3038-1 | Security update for libvirt | 2020-10-27T08:08:14Z | 2020-10-27T08:08:14Z |
| suse-su-2020:3037-1 | Security update for libvirt | 2020-10-26T15:20:48Z | 2020-10-26T15:20:48Z |
| suse-su-2020:3036-1 | Security update for rmt-server | 2020-10-26T11:11:15Z | 2020-10-26T11:11:15Z |
| suse-su-2020:3034-1 | Security update for bluez | 2020-10-26T10:38:45Z | 2020-10-26T10:38:45Z |
| suse-su-2020:14522-1 | Security update for MozillaFirefox | 2020-10-26T10:38:04Z | 2020-10-26T10:38:04Z |
| suse-su-2020:3030-1 | Security update for SDL | 2020-10-26T08:24:35Z | 2020-10-26T08:24:35Z |
| suse-su-2020:3024-1 | Security update for glibc | 2020-10-23T12:22:22Z | 2020-10-23T12:22:22Z |
| suse-su-2020:3023-1 | Security update for libcdio | 2020-10-23T12:21:45Z | 2020-10-23T12:21:45Z |
| suse-su-2020:3022-1 | Security update for MozillaFirefox | 2020-10-23T12:21:06Z | 2020-10-23T12:21:06Z |
| suse-su-2020:3021-1 | Security update for MozillaFirefox | 2020-10-23T12:20:09Z | 2020-10-23T12:20:09Z |
| suse-su-2020:3016-1 | Security update for python-pip | 2020-10-23T09:29:04Z | 2020-10-23T09:29:04Z |
| suse-su-2020:3014-1 | Security update for the Linux Kernel | 2020-10-23T07:33:43Z | 2020-10-23T07:33:43Z |
| suse-su-2020:3003-1 | Security update for mercurial | 2020-10-22T14:14:59Z | 2020-10-22T14:14:59Z |
| suse-su-2020:2712-2 | Security update for openldap2 | 2020-10-22T14:14:39Z | 2020-10-22T14:14:39Z |
| suse-su-2020:14521-1 | Security update for xen | 2020-10-22T12:09:09Z | 2020-10-22T12:09:09Z |
| suse-su-2020:2999-1 | Security update for the Linux Kernel | 2020-10-22T08:06:37Z | 2020-10-22T08:06:37Z |
| suse-su-2020:2998-1 | Security update for freetype2 | 2020-10-22T08:05:13Z | 2020-10-22T08:05:13Z |
| suse-su-2020:2997-1 | Security update for php7 | 2020-10-22T08:04:30Z | 2020-10-22T08:04:30Z |
| suse-su-2020:2996-1 | Security update for tomcat | 2020-10-22T08:04:00Z | 2020-10-22T08:04:00Z |
| suse-su-2020:2995-1 | Security update for freetype2 | 2020-10-22T08:03:53Z | 2020-10-22T08:03:53Z |
| suse-su-2020:2988-1 | Security update for gnutls | 2020-10-21T15:35:55Z | 2020-10-21T15:35:55Z |
| suse-su-2020:2981-1 | Security update for the Linux Kernel | 2020-10-21T11:29:25Z | 2020-10-21T11:29:25Z |
| suse-su-2020:2980-1 | Security update for the Linux Kernel | 2020-10-21T11:29:08Z | 2020-10-21T11:29:08Z |
| suse-su-2020:2972-1 | Security update for the Linux Kernel | 2020-10-20T15:08:23Z | 2020-10-20T15:08:23Z |
| suse-su-2020:2970-1 | Security update for libvirt | 2020-10-20T14:06:17Z | 2020-10-20T14:06:17Z |
| suse-su-2020:2969-1 | Security update for libvirt | 2020-10-20T14:05:57Z | 2020-10-20T14:05:57Z |
| suse-su-2020:2968-1 | Security update for taglib | 2020-10-20T14:04:53Z | 2020-10-20T14:04:53Z |
| suse-su-2020:2967-1 | Security update for hunspell | 2020-10-20T14:04:36Z | 2020-10-20T14:04:36Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2024-40017 | Siemens Tecnomatix Plant Simulation越界写入漏洞(CNVD-2024-40017) | 2024-10-10 | 2024-10-10 |
| cnvd-2024-40016 | Siemens Tecnomatix Plant Simulation内存损坏漏洞(CNVD-2024-40016) | 2024-10-10 | 2024-10-10 |
| cnvd-2024-40015 | Siemens Tecnomatix Plant Simulation内存损坏漏洞(CNVD-2024-40015) | 2024-10-10 | 2024-10-10 |
| cnvd-2024-40014 | Siemens Tecnomatix Plant Simulation内存损坏漏洞(CNVD-2024-40014) | 2024-10-10 | 2024-10-10 |
| cnvd-2024-40013 | Siemens Tecnomatix Plant Simulation内存损坏漏洞(CNVD-2024-40013) | 2024-10-10 | 2024-10-10 |
| cnvd-2024-40012 | Siemens Tecnomatix Plant Simulation空指针解引用漏洞(CNVD-2024-40012) | 2024-10-10 | 2024-10-10 |
| cnvd-2024-40011 | Siemens JT2Go堆栈缓冲区溢出漏洞 | 2024-10-10 | 2024-10-10 |
| cnvd-2024-40010 | Siemens SENTRON PAC Meter认证错误漏洞 | 2024-10-10 | 2024-10-10 |
| cnvd-2024-40009 | Siemens Simcenter Nastran堆缓冲区溢出漏洞 | 2024-10-10 | 2024-10-10 |
| cnvd-2024-40008 | Siemens Simcenter Nastran内存损坏漏洞 | 2024-10-10 | 2024-10-10 |
| cnvd-2024-40007 | Siemens多款产品URL重定向漏洞 | 2024-10-10 | 2024-10-10 |
| cnvd-2024-39952 | DrayTek Vigor 3910缓冲区溢出漏洞(CNVD-2024-39952) | 2024-09-20 | 2024-10-09 |
| cnvd-2024-39951 | DrayTek Vigor 3910缓冲区溢出漏洞(CNVD-2024-39951) | 2024-09-20 | 2024-10-09 |
| cnvd-2024-39950 | DrayTek Vigor 3910缓冲区溢出漏洞(CNVD-2024-39950) | 2024-09-20 | 2024-10-09 |
| cnvd-2024-39949 | DrayTek Vigor 3910缓冲区溢出漏洞(CNVD-2024-39949) | 2024-09-20 | 2024-10-09 |
| cnvd-2024-39948 | DrayTek Vigor 3910缓冲区溢出漏洞(CNVD-2024-39948) | 2024-09-20 | 2024-10-09 |
| cnvd-2024-39947 | DrayTek Vigor 3910缓冲区溢出漏洞(CNVD-2024-39947) | 2024-09-20 | 2024-10-09 |
| cnvd-2024-39946 | DrayTek Vigor 3910缓冲区溢出漏洞(CNVD-2024-39946) | 2024-09-20 | 2024-10-09 |
| cnvd-2024-39945 | DrayTek Vigor 3910缓冲区溢出漏洞(CNVD-2024-39945) | 2024-09-20 | 2024-10-09 |
| cnvd-2024-39944 | DrayTek Vigor 3910缓冲区溢出漏洞(CNVD-2024-39944) | 2024-09-20 | 2024-10-09 |
| cnvd-2024-39943 | DrayTek Vigor 3910缓冲区溢出漏洞 | 2024-09-20 | 2024-10-09 |
| cnvd-2024-39843 | 用友网络科技股份有限公司用友时空企业信息融通平台KSOA存在SQL注入漏洞(CNVD-2024-39843) | 2024-08-29 | 2024-10-09 |
| cnvd-2024-39746 | Google Chrome缓冲区溢出漏洞(CNVD-2024-39746) | 2024-09-25 | 2024-10-08 |
| cnvd-2024-39745 | Google Chrome输入验证错误漏洞(CNVD-2024-39745) | 2024-09-25 | 2024-10-08 |
| cnvd-2024-39744 | Google Chrome安全绕过漏洞(CNVD-2024-39744) | 2024-09-25 | 2024-10-08 |
| cnvd-2024-39743 | Google Chrome安全绕过漏洞(CNVD-2024-39743) | 2024-09-25 | 2024-10-08 |
| cnvd-2024-39742 | Google Chrome安全绕过漏洞(CNVD-2024-39742) | 2024-09-25 | 2024-10-08 |
| cnvd-2024-39741 | Google Chrome代码执行漏洞(CNVD-2024-39741) | 2024-09-25 | 2024-10-08 |
| cnvd-2024-39740 | Google Chrome整数溢出漏洞(CNVD-2024-39740) | 2024-09-27 | 2024-10-08 |
| cnvd-2024-39739 | Google Chrome类型混淆漏洞(CNVD-2024-39739) | 2024-09-27 | 2024-10-08 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2010-avi-392 | Vulnérabilité dans le noyau Linux | 2010-08-19T00:00:00.000000 | 2010-08-19T00:00:00.000000 |
| certa-2010-avi-391 | Vulnérabilité dans le module pam_xauth | 2010-08-19T00:00:00.000000 | 2010-08-19T00:00:00.000000 |
| certa-2010-avi-390 | Multiples vulnérabilités dans IBM Tivoli Storage Manager FastBack | 2010-08-19T00:00:00.000000 | 2010-08-19T00:00:00.000000 |
| certa-2010-avi-359 | Multiples vulnérabilités dans FreeType | 2010-08-09T00:00:00.000000 | 2010-08-19T00:00:00.000000 |
| certa-2010-avi-389 | Vulnérabilité dans QuickTime | 2010-08-17T00:00:00.000000 | 2010-08-17T00:00:00.000000 |
| certa-2010-avi-388 | Vulnérabilité dans Citrix XenApp Online Plug-in | 2010-08-17T00:00:00.000000 | 2010-08-17T00:00:00.000000 |
| certa-2010-avi-387 | Vulnérabilités dans Apache Geronimo | 2010-08-17T00:00:00.000000 | 2010-08-17T00:00:00.000000 |
| certa-2010-avi-386 | Multiples vulnérabilités dans Drupal | 2010-08-17T00:00:00.000000 | 2010-08-17T00:00:00.000000 |
| certa-2010-avi-384 | Multiples vulnérabilités dans Opera | 2010-08-13T00:00:00.000000 | 2010-08-17T00:00:00.000000 |
| certa-2010-avi-348 | Multiples vulnérabilités dans Wireshark | 2010-07-30T00:00:00.000000 | 2010-08-17T00:00:00.000000 |
| certa-2010-avi-282 | Vulnérabilités dans Mozilla Firefox | 2010-06-23T00:00:00.000000 | 2010-08-17T00:00:00.000000 |
| certa-2010-avi-385 | Vulnérabilités dans PHP | 2010-08-13T00:00:00.000000 | 2010-08-13T00:00:00.000000 |
| certa-2010-avi-383 | Vulnérabilité dans Cisco IOS | 2010-08-13T00:00:00.000000 | 2010-08-13T00:00:00.000000 |
| certa-2010-avi-382 | Vulnérabilité dans Cisco Wireless Control | 2010-08-13T00:00:00.000000 | 2010-08-13T00:00:00.000000 |
| certa-2010-avi-381 | Vulnérabilités dans Cisco ACE | 2010-08-13T00:00:00.000000 | 2010-08-13T00:00:00.000000 |
| certa-2010-avi-380 | Multiples vulnérabilités dans Apple iOS | 2010-08-12T00:00:00.000000 | 2010-08-12T00:00:00.000000 |
| certa-2010-avi-379 | Vulnérabilités dans Adobe Flash Media Server | 2010-08-11T00:00:00.000000 | 2010-08-11T00:00:00.000000 |
| certa-2010-avi-378 | Vulnérabilité dans ColdFusion | 2010-08-11T00:00:00.000000 | 2010-08-11T00:00:00.000000 |
| certa-2010-avi-377 | Vulnérabilités dans Adobe AIR et Flash Player | 2010-08-11T00:00:00.000000 | 2010-08-11T00:00:00.000000 |
| certa-2010-avi-376 | Vulnérabilités dans Microsoft .NET Common Language Runtime et Microsoft Silverlight | 2010-08-11T00:00:00.000000 | 2010-08-11T00:00:00.000000 |
| certa-2010-avi-375 | Vulnérabilités dans la fonctionnalité de suivi de services sous Microsoft Windows | 2010-08-11T00:00:00.000000 | 2010-08-11T00:00:00.000000 |
| certa-2010-avi-374 | Vulnérabilités dans la pile TCP/IP de Microsoft Windows | 2010-08-11T00:00:00.000000 | 2010-08-11T00:00:00.000000 |
| certa-2010-avi-373 | Vulnérabilité dans Microsoft Excel | 2010-08-11T00:00:00.000000 | 2010-08-11T00:00:00.000000 |
| certa-2010-avi-372 | Multiples vulnérabilités dans Microsoft Office Word | 2010-08-11T00:00:00.000000 | 2010-08-11T00:00:00.000000 |
| certa-2010-avi-371 | Vulnérabilité dans Microsoft Cinepak Codec | 2010-08-11T00:00:00.000000 | 2010-08-11T00:00:00.000000 |
| certa-2010-avi-370 | Multiples vulnérabilités dans le seveur SMB de Microsoft Windows | 2010-08-11T00:00:00.000000 | 2010-08-11T00:00:00.000000 |
| certa-2010-avi-369 | Multiples vulnérabilités dans Microsoft Internet Explorer | 2010-08-11T00:00:00.000000 | 2010-08-11T00:00:00.000000 |
| certa-2010-avi-368 | Vulnérabilité du Codec MicrosoftMPEG Layer-3 | 2010-08-11T00:00:00.000000 | 2010-08-11T00:00:00.000000 |
| certa-2010-avi-367 | Vulnérabilité dans Microsoft XML Core Services | 2010-08-11T00:00:00.000000 | 2010-08-11T00:00:00.000000 |
| certa-2010-avi-366 | Vulnérabilité dans Windows Movie Maker | 2010-08-11T00:00:00.000000 | 2010-08-11T00:00:00.000000 |