Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-60051 |
8.2 (3.1)
|
WordPress Rare Radio theme <= 1.0.15.1 - Local File In… |
AncoraThemes |
Rare Radio |
2025-12-18T07:22:01.919Z | 2026-01-21T15:40:27.459Z |
| CVE-2025-60052 |
8.2 (3.1)
|
WordPress W&D theme <= 1.0 - Local File Inclusion vuln… |
AncoraThemes |
W&D |
2025-12-18T07:22:02.123Z | 2026-01-21T15:40:12.899Z |
| CVE-2025-60053 |
8.2 (3.1)
|
WordPress MaxCube theme <= 1.3.1 - Local File Inclusio… |
AncoraThemes |
MaxCube |
2025-12-18T07:22:02.315Z | 2026-01-21T15:39:56.826Z |
| CVE-2025-60054 |
8.2 (3.1)
|
WordPress OnLeash theme <= 1.5.2 - Local File Inclusio… |
AncoraThemes |
OnLeash |
2025-12-18T07:22:02.500Z | 2026-01-21T15:39:31.725Z |
| CVE-2026-22444 |
N/A
|
Apache Solr: Insufficient file-access checking in stan… |
Apache Software Foundation |
Apache Solr |
2026-01-21T13:40:24.979Z | 2026-01-21T15:39:04.577Z |
| CVE-2025-60055 |
8.2 (3.1)
|
WordPress Fabrica theme <= 1.8.1 - Local File Inclusio… |
AncoraThemes |
Fabrica |
2025-12-18T07:22:02.704Z | 2026-01-21T15:38:56.104Z |
| CVE-2025-60062 |
9.4 (3.1)
|
WordPress tPlayer plugin <= 1.2.1.6 - SQL Injection vu… |
mmetrodw |
tPlayer |
2025-12-18T07:22:04.109Z | 2026-01-21T15:38:23.015Z |
| CVE-2025-60063 |
8.2 (3.1)
|
WordPress Rosalinda theme <= 1.2.3 - Local File Inclus… |
axiomthemes |
Rosalinda |
2025-12-18T07:22:04.312Z | 2026-01-21T15:36:49.660Z |
| CVE-2025-60072 |
8.2 (3.1)
|
WordPress Anchor smooth scroll plugin <= 1.0.2 - Local… |
Processby |
Anchor smooth scroll |
2025-12-18T07:22:05.940Z | 2026-01-21T15:36:33.079Z |
| CVE-2025-60076 |
7.5 (3.1)
|
WordPress Ray Enterprise Translation plugin <= 1.7.1 -… |
jbhovik |
Ray Enterprise Translation |
2025-12-18T07:22:06.163Z | 2026-01-21T15:36:09.930Z |
| CVE-2026-22022 |
N/A
|
Apache Solr: Unauthorized bypass of certain "predefine… |
Apache Software Foundation |
Apache Solr |
2026-01-21T13:41:46.346Z | 2026-01-21T15:35:07.116Z |
| CVE-2025-60084 |
8.6 (3.1)
|
WordPress PDF for Elementor Forms + Drag And Drop Temp… |
add-ons.org |
PDF for Elementor Forms + Drag And Drop Template Builder |
2025-12-18T07:22:07.769Z | 2026-01-21T15:32:11.047Z |
| CVE-2025-64203 |
7.1 (3.1)
|
WordPress Mailster plugin < 4.1.14 - Cross Site Script… |
EverPress |
Mailster |
2025-12-18T07:22:11.085Z | 2026-01-21T15:31:02.170Z |
| CVE-2022-46764 |
9.8 (3.1)
|
A SQL injection issue in the web API in TrueConf … |
n/a |
n/a |
2022-12-27T00:00:00.000Z | 2026-01-21T15:27:46.766Z |
| CVE-2025-66803 |
4.8 (3.1)
|
Race condition in the turbo-frame element handler… |
n/a |
n/a |
2026-01-20T00:00:00.000Z | 2026-01-21T15:26:53.433Z |
| CVE-2026-21952 |
4.9 (3.1)
|
Vulnerability in the MySQL Server product of Orac… |
Oracle Corporation |
MySQL Server |
2026-01-20T21:56:30.311Z | 2026-01-21T15:23:16.511Z |
| CVE-2026-21951 |
6.1 (3.1)
|
Vulnerability in the PeopleSoft Enterprise People… |
Oracle Corporation |
PeopleSoft Enterprise PeopleTools |
2026-01-20T21:56:29.982Z | 2026-01-21T15:19:32.304Z |
| CVE-2026-21950 |
6.5 (3.1)
|
Vulnerability in the MySQL Server product of Orac… |
Oracle Corporation |
MySQL Server |
2026-01-20T21:56:29.652Z | 2026-01-21T15:17:33.458Z |
| CVE-2026-21949 |
6.5 (3.1)
|
Vulnerability in the MySQL Server product of Orac… |
Oracle Corporation |
MySQL Server |
2026-01-20T21:56:29.318Z | 2026-01-21T15:15:52.637Z |
| CVE-2026-21948 |
4.9 (3.1)
|
Vulnerability in the MySQL Server product of Orac… |
Oracle Corporation |
MySQL Server |
2026-01-20T21:56:29.010Z | 2026-01-21T15:12:07.779Z |
| CVE-2026-21947 |
3.1 (3.1)
|
Vulnerability in Oracle Java SE (component: JavaF… |
Oracle Corporation |
Oracle Java SE |
2026-01-20T21:56:28.663Z | 2026-01-21T15:09:50.772Z |
| CVE-2025-68133 |
7.4 (3.1)
|
EVerest's unlimited connections can lead to DoS throug… |
EVerest |
everest-core |
2026-01-21T02:25:03.085Z | 2026-01-21T15:09:48.152Z |
| CVE-2026-21946 |
6.1 (3.1)
|
Vulnerability in the JD Edwards EnterpriseOne Too… |
Oracle Corporation |
JD Edwards EnterpriseOne Tools |
2026-01-20T21:56:28.311Z | 2026-01-21T15:07:29.834Z |
| CVE-2026-21945 |
7.5 (3.1)
|
Vulnerability in the Oracle Java SE, Oracle Graal… |
Oracle Corporation |
Oracle Java SE |
2026-01-20T21:56:27.997Z | 2026-01-21T15:05:36.940Z |
| CVE-2026-21944 |
6.5 (3.1)
|
Vulnerability in the Oracle Agile Product Lifecyc… |
Oracle Corporation |
Oracle Agile Product Lifecycle Management for Process |
2026-01-20T21:56:27.694Z | 2026-01-21T15:03:45.583Z |
| CVE-2026-21943 |
6.1 (3.1)
|
Vulnerability in the Oracle Scripting product of … |
Oracle Corporation |
Oracle Scripting |
2026-01-20T21:56:27.362Z | 2026-01-21T15:02:26.204Z |
| CVE-2026-21942 |
5 (3.1)
|
Vulnerability in the Oracle Solaris product of Or… |
Oracle Corporation |
Oracle Solaris |
2026-01-20T21:56:27.042Z | 2026-01-21T14:59:59.056Z |
| CVE-2026-21941 |
4.9 (3.1)
|
Vulnerability in the MySQL Server product of Orac… |
Oracle Corporation |
MySQL Server |
2026-01-20T21:56:26.721Z | 2026-01-21T14:59:00.815Z |
| CVE-2026-21940 |
7.5 (3.1)
|
Vulnerability in the Oracle Agile PLM product of … |
Oracle Corporation |
Oracle Agile PLM |
2026-01-20T21:56:26.402Z | 2026-01-21T14:57:43.763Z |
| CVE-2025-63647 |
7.5 (3.1)
|
A NULL pointer dereference in the parse_meta func… |
n/a |
n/a |
2026-01-20T00:00:00.000Z | 2026-01-21T14:52:39.071Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-23916 |
N/A
|
Not used | N/A | N/A | 2026-01-20T03:55:05.817Z | |
| CVE-2026-23915 |
N/A
|
Not used | N/A | N/A | 2026-01-20T03:55:06.297Z | |
| CVE-2026-23914 |
N/A
|
Not used | N/A | N/A | 2026-01-20T03:55:06.762Z | |
| CVE-2026-23913 |
N/A
|
Not used | N/A | N/A | 2026-01-20T03:55:07.342Z | |
| CVE-2026-23912 |
N/A
|
Not used | N/A | N/A | 2026-01-20T03:55:07.819Z | |
| CVE-2026-23911 |
N/A
|
Not used | N/A | N/A | 2026-01-20T03:55:08.281Z | |
| CVE-2026-23910 |
N/A
|
Not used | N/A | N/A | 2026-01-20T03:55:08.723Z | |
| CVE-2026-23909 |
N/A
|
Not used | N/A | N/A | 2026-01-20T03:55:09.182Z | |
| CVE-2025-68161 |
6.3 (4.0)
|
Apache Log4j Core: Missing TLS hostname verification i… |
Apache Software Foundation |
Apache Log4j Core |
2025-12-18T20:47:49.123Z | 2026-01-20T00:13:44.911Z |
| CVE-2025-71137 |
N/A
|
octeontx2-pf: fix "UBSAN: shift-out-of-bounds error" |
Linux |
Linux |
2026-01-14T15:07:51.264Z | 2026-02-09T08:35:34.357Z |
| CVE-2025-71136 |
N/A
|
media: adv7842: Avoid possible out-of-bounds array acc… |
Linux |
Linux |
2026-01-14T15:07:50.568Z | 2026-02-09T08:35:32.724Z |
| CVE-2025-71133 |
N/A
|
RDMA/irdma: avoid invalid read in irdma_net_event |
Linux |
Linux |
2026-01-14T15:07:48.524Z | 2026-02-09T08:35:29.446Z |
| CVE-2025-71132 |
N/A
|
smc91x: fix broken irq-context in PREEMPT_RT |
Linux |
Linux |
2026-01-14T15:07:47.860Z | 2026-02-09T08:35:28.371Z |
| CVE-2025-71131 |
N/A
|
crypto: seqiv - Do not use req->iv after crypto_aead_encrypt |
Linux |
Linux |
2026-01-14T15:07:47.194Z | 2026-02-09T08:35:27.322Z |
| CVE-2025-71127 |
N/A
|
wifi: mac80211: Discard Beacon frames to non-broadcast… |
Linux |
Linux |
2026-01-14T15:07:44.218Z | 2026-02-09T08:35:22.963Z |
| CVE-2025-71125 |
N/A
|
tracing: Do not register unsupported perf events |
Linux |
Linux |
2026-01-14T15:06:10.662Z | 2026-02-09T08:35:20.806Z |
| CVE-2025-71123 |
N/A
|
ext4: fix string copying in parse_apply_sb_mount_options() |
Linux |
Linux |
2026-01-14T15:06:09.246Z | 2026-02-09T08:35:18.369Z |
| CVE-2025-71121 |
N/A
|
parisc: Do not reprogram affinitiy on ASP chip |
Linux |
Linux |
2026-01-14T15:06:07.871Z | 2026-02-09T08:35:16.277Z |
| CVE-2025-71120 |
N/A
|
SUNRPC: svcauth_gss: avoid NULL deref on zero length g… |
Linux |
Linux |
2026-01-14T15:06:07.194Z | 2026-02-09T08:35:15.157Z |
| CVE-2025-71118 |
N/A
|
ACPICA: Avoid walking the Namespace if start_node is NULL |
Linux |
Linux |
2026-01-14T15:06:05.861Z | 2026-02-09T08:35:13.020Z |
| CVE-2025-71116 |
N/A
|
libceph: make decode_pool() more resilient against cor… |
Linux |
Linux |
2026-01-14T15:06:04.476Z | 2026-02-09T08:35:10.946Z |
| CVE-2025-71114 |
N/A
|
via_wdt: fix critical boot hang due to unnamed resourc… |
Linux |
Linux |
2026-01-14T15:06:00.848Z | 2026-02-09T08:35:08.836Z |
| CVE-2025-71113 |
N/A
|
crypto: af_alg - zero initialize memory allocated via … |
Linux |
Linux |
2026-01-14T15:05:59.992Z | 2026-02-09T08:35:07.779Z |
| CVE-2025-71112 |
N/A
|
net: hns3: add VLAN id validation before using |
Linux |
Linux |
2026-01-14T15:05:59.308Z | 2026-02-09T08:35:06.680Z |
| CVE-2025-71111 |
N/A
|
hwmon: (w83791d) Convert macros to functions to avoid TOCTOU |
Linux |
Linux |
2026-01-14T15:05:58.649Z | 2026-02-09T08:35:05.517Z |
| CVE-2025-71108 |
N/A
|
usb: typec: ucsi: Handle incorrect num_connectors capability |
Linux |
Linux |
2026-01-14T15:05:56.553Z | 2026-02-09T08:35:02.075Z |
| CVE-2025-71105 |
N/A
|
f2fs: use global inline_xattr_slab instead of per-sb s… |
Linux |
Linux |
2026-01-14T15:05:54.510Z | 2026-02-09T08:34:58.276Z |
| CVE-2025-71104 |
N/A
|
KVM: x86: Fix VM hard lockup after prolonged inactivit… |
Linux |
Linux |
2026-01-14T15:05:53.802Z | 2026-02-09T08:34:57.200Z |
| CVE-2025-71102 |
N/A
|
scs: fix a wrong parameter in __scs_magic |
Linux |
Linux |
2026-01-14T15:05:52.389Z | 2026-02-09T08:34:55.111Z |
| CVE-2025-71098 |
N/A
|
ip6_gre: make ip6gre_header() robust |
Linux |
Linux |
2026-01-13T15:34:57.536Z | 2026-02-09T08:34:50.957Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-23910 | Rejected reason: Not used | 2026-01-20T05:16:16.600 | 2026-01-20T05:16:16.600 |
| fkie_cve-2026-23909 | Rejected reason: Not used | 2026-01-20T05:16:16.467 | 2026-01-20T05:16:16.467 |
| fkie_cve-2025-68161 | The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does not perform TLS hos… | 2025-12-18T21:15:57.960 | 2026-01-20T01:15:55.067 |
| fkie_cve-2025-71137 | In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: fix "UBSAN: shif… | 2026-01-14T15:16:03.487 | 2026-01-19T13:16:19.683 |
| fkie_cve-2025-71136 | In the Linux kernel, the following vulnerability has been resolved: media: adv7842: Avoid possible… | 2026-01-14T15:16:03.383 | 2026-01-19T13:16:19.583 |
| fkie_cve-2025-71133 | In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: avoid invalid read… | 2026-01-14T15:16:03.053 | 2026-01-19T13:16:19.490 |
| fkie_cve-2025-71132 | In the Linux kernel, the following vulnerability has been resolved: smc91x: fix broken irq-context… | 2026-01-14T15:16:02.947 | 2026-01-19T13:16:19.400 |
| fkie_cve-2025-71131 | In the Linux kernel, the following vulnerability has been resolved: crypto: seqiv - Do not use req… | 2026-01-14T15:16:02.843 | 2026-01-19T13:16:19.303 |
| fkie_cve-2025-71127 | In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: Discard Beacon… | 2026-01-14T15:16:02.430 | 2026-01-19T13:16:19.210 |
| fkie_cve-2025-71125 | In the Linux kernel, the following vulnerability has been resolved: tracing: Do not register unsup… | 2026-01-14T15:16:02.213 | 2026-01-19T13:16:19.113 |
| fkie_cve-2025-71123 | In the Linux kernel, the following vulnerability has been resolved: ext4: fix string copying in pa… | 2026-01-14T15:16:02.000 | 2026-01-19T13:16:19.013 |
| fkie_cve-2025-71121 | In the Linux kernel, the following vulnerability has been resolved: parisc: Do not reprogram affin… | 2026-01-14T15:16:01.800 | 2026-01-19T13:16:18.920 |
| fkie_cve-2025-71120 | In the Linux kernel, the following vulnerability has been resolved: SUNRPC: svcauth_gss: avoid NUL… | 2026-01-14T15:16:01.690 | 2026-01-19T13:16:18.823 |
| fkie_cve-2025-71118 | In the Linux kernel, the following vulnerability has been resolved: ACPICA: Avoid walking the Name… | 2026-01-14T15:16:01.483 | 2026-01-19T13:16:18.733 |
| fkie_cve-2025-71116 | In the Linux kernel, the following vulnerability has been resolved: libceph: make decode_pool() mo… | 2026-01-14T15:16:01.277 | 2026-01-19T13:16:18.640 |
| fkie_cve-2025-71114 | In the Linux kernel, the following vulnerability has been resolved: via_wdt: fix critical boot han… | 2026-01-14T15:16:01.063 | 2026-01-19T13:16:18.543 |
| fkie_cve-2025-71113 | In the Linux kernel, the following vulnerability has been resolved: crypto: af_alg - zero initiali… | 2026-01-14T15:16:00.433 | 2026-01-19T13:16:18.450 |
| fkie_cve-2025-71112 | In the Linux kernel, the following vulnerability has been resolved: net: hns3: add VLAN id validat… | 2026-01-14T15:16:00.313 | 2026-01-19T13:16:18.353 |
| fkie_cve-2025-71111 | In the Linux kernel, the following vulnerability has been resolved: hwmon: (w83791d) Convert macro… | 2026-01-14T15:16:00.193 | 2026-01-19T13:16:18.260 |
| fkie_cve-2025-71108 | In the Linux kernel, the following vulnerability has been resolved: usb: typec: ucsi: Handle incor… | 2026-01-14T15:15:59.867 | 2026-01-19T13:16:18.163 |
| fkie_cve-2025-71105 | In the Linux kernel, the following vulnerability has been resolved: f2fs: use global inline_xattr_… | 2026-01-14T15:15:59.533 | 2026-01-19T13:16:18.053 |
| fkie_cve-2025-71104 | In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Fix VM hard lockup a… | 2026-01-14T15:15:59.423 | 2026-01-19T13:16:17.953 |
| fkie_cve-2025-71102 | In the Linux kernel, the following vulnerability has been resolved: scs: fix a wrong parameter in … | 2026-01-14T15:15:59.210 | 2026-01-19T13:16:17.857 |
| fkie_cve-2025-71098 | In the Linux kernel, the following vulnerability has been resolved: ip6_gre: make ip6gre_header() … | 2026-01-13T16:16:09.703 | 2026-01-19T13:16:17.760 |
| fkie_cve-2025-71097 | In the Linux kernel, the following vulnerability has been resolved: ipv4: Fix reference count leak… | 2026-01-13T16:16:09.583 | 2026-01-19T13:16:17.663 |
| fkie_cve-2025-71096 | In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Check for the prese… | 2026-01-13T16:16:09.470 | 2026-01-19T13:16:17.567 |
| fkie_cve-2025-71094 | In the Linux kernel, the following vulnerability has been resolved: net: usb: asix: validate PHY a… | 2026-01-13T16:16:09.150 | 2026-01-19T13:16:17.467 |
| fkie_cve-2025-71093 | In the Linux kernel, the following vulnerability has been resolved: e1000: fix OOB in e1000_tbi_sh… | 2026-01-13T16:16:09.033 | 2026-01-19T13:16:17.347 |
| fkie_cve-2025-71091 | In the Linux kernel, the following vulnerability has been resolved: team: fix check for port enabl… | 2026-01-13T16:16:08.810 | 2026-01-19T13:16:17.250 |
| fkie_cve-2025-71087 | In the Linux kernel, the following vulnerability has been resolved: iavf: fix off-by-one issues in… | 2026-01-13T16:16:08.343 | 2026-01-19T13:16:17.150 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-7gpm-2c44-rxwm |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:35Z | 2026-01-02T18:30:35Z |
| ghsa-6v3m-8592-63c7 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:35Z | 2026-01-02T18:30:35Z |
| ghsa-67p7-m2pp-372h |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:35Z | 2026-01-02T18:30:35Z |
| ghsa-66q9-4j2w-4pgp |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:35Z | 2026-01-02T18:30:35Z |
| ghsa-4p4j-c7q8-qm54 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:35Z | 2026-01-02T18:30:35Z |
| ghsa-465m-7qm8-9fg5 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:35Z | 2026-01-02T18:30:35Z |
| ghsa-3jf4-475v-2r4g |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:35Z | 2026-01-02T18:30:35Z |
| ghsa-2whc-8658-9gvr |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:35Z | 2026-01-02T18:30:35Z |
| ghsa-2m3q-qmg5-8x72 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:35Z | 2026-01-02T18:30:35Z |
| ghsa-xwvc-jhhh-34wf |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-xpjg-4p4f-hgxc |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-x68q-4r43-p95c |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-w6c8-hgwv-3vx8 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:34Z |
| ghsa-vqj7-wf2v-jq72 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-v44q-58f6-2xr4 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-rc4g-mrf8-24m3 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-qfp4-7723-gfhx |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-pjpg-chp3-j9qh |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-mrqx-phqr-v36f |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-jp8h-hv7v-34p6 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-jm99-qx6q-rp6w |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-hv6j-vx6q-7qgj |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-hrgf-5299-c7qw |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-hf35-7jwj-h44f |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-gr7c-m7g3-pggm |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-cw7v-h2mm-xwx7 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-cfgh-22rm-8wrg |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-9wxq-g5hp-9rc2 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-8xf2-393q-95r9 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-7rfc-r3gg-cg6m |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-25343 | Tenda N300 F3 router vulnerability allows users to bypass intended security policy and cr… | 2024-02-08T06:02:25.082447Z |
| gsd-2024-25360 | A hidden interface in Motorola CX2L Router firmware v1.0.1 leaks information regarding th… | 2024-02-08T06:02:25.082086Z |
| gsd-2024-25514 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.081583Z |
| gsd-2024-25537 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.081353Z |
| gsd-2024-25232 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.081061Z |
| gsd-2024-25299 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.080804Z |
| gsd-2024-25257 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.080517Z |
| gsd-2024-25338 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.080254Z |
| gsd-2024-25397 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.079682Z |
| gsd-2024-25404 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.079434Z |
| gsd-2024-25221 | A cross-site scripting (XSS) vulnerability in Task Manager App v1.0 allows attackers to e… | 2024-02-08T06:02:25.078951Z |
| gsd-2024-25516 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.078649Z |
| gsd-2024-25272 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.078132Z |
| gsd-2024-25488 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.077909Z |
| gsd-2024-25457 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.076890Z |
| gsd-2024-25320 | Tongda OA v2017 and up to v11.9 was discovered to contain a SQL injection vulnerability v… | 2024-02-08T06:02:25.076613Z |
| gsd-2024-25379 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.076068Z |
| gsd-2024-25190 | l8w8jwt 2.2.1 uses memcmp (which is not constant time) to verify authentication, which ma… | 2024-02-08T06:02:25.075786Z |
| gsd-2024-25174 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.075506Z |
| gsd-2024-25509 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.075213Z |
| gsd-2024-25385 | An issue in flvmeta v.1.2.2 allows a local attacker to cause a denial of service via the … | 2024-02-08T06:02:25.074662Z |
| gsd-2024-25411 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.073724Z |
| gsd-2024-25303 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.073288Z |
| gsd-2024-25267 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.072735Z |
| gsd-2024-25469 | SQL Injection vulnerability in CRMEB crmeb_java v.1.3.4 and before allows a remote attack… | 2024-02-08T06:02:25.072516Z |
| gsd-2024-25268 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.072297Z |
| gsd-2024-25271 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.072031Z |
| gsd-2024-25529 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.071691Z |
| gsd-2024-25224 | A cross-site scripting (XSS) vulnerability in Simple Admin Panel App v1.0 allows attacker… | 2024-02-08T06:02:25.071421Z |
| gsd-2024-25418 | flusity-CMS v2.33 was discovered to contain a Cross-Site Request Forgery (CSRF) via the c… | 2024-02-08T06:02:25.071156Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-183604 | Malicious code in lomi-ifush-ugikfobi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183603 | Malicious code in lomi-ifush-ugi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183602 | Malicious code in lomi-ifush-ug (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183601 | Malicious code in lomi-ifus-ugofaliuafu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183600 | Malicious code in lomi-ifus-ugofalifuafu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183599 | Malicious code in lomi-ifus-ugofaliau (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183598 | Malicious code in lomi-ifus-ugofalia (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183597 | Malicious code in lomi-ifus-ugofaia (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183596 | Malicious code in lomi-ifus-ugofai (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183595 | Malicious code in lomi-ifus-ugaioi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183594 | Malicious code in lomi-ifus-ugaiofi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183593 | Malicious code in lomi-ifus-ugaioalfi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183592 | Malicious code in lomi-ifus-ugaioafi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183591 | Malicious code in lomi-ifus-ugaii (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183590 | Malicious code in lomi-ifus-ugaifoalfi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183589 | Malicious code in lomi-ifus-ugaiaufoalfi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183588 | Malicious code in lomi-ifus-ugaiaubfoalfi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183587 | Malicious code in lomi-ifus-ugai (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183586 | Malicious code in lomi-fus-ugaif (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183585 | Malicious code in lomi-fus-ugaiaufo (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183584 | Malicious code in lomi-fus-ugaiauf (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183583 | Malicious code in lomi-fus-ugaiaubfolfi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183582 | Malicious code in lomi-fus-ugaiaubfoi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183581 | Malicious code in lomi-fus-ugaiaubfofi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183580 | Malicious code in lomi-fus-ugaiaubfoalfi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183579 | Malicious code in lomi-fus-ugaiaf (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183578 | Malicious code in lomi-fus-ugaf (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183577 | Malicious code in lomi-fus-uga (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183576 | Malicious code in lomi-fus-ufsga (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183575 | Malicious code in lomi-fus-ufisga (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2023:5690 | Red Hat Security Advisory: bind security update | 2023-10-12T14:58:37+00:00 | 2025-11-21T18:46:51+00:00 |
| rhsa-2023:5689 | Red Hat Security Advisory: bind security update | 2023-10-12T14:59:07+00:00 | 2025-11-21T18:46:50+00:00 |
| rhsa-2023:5628 | Red Hat Security Advisory: kernel security and bug fix update | 2023-10-10T16:28:08+00:00 | 2025-11-21T18:46:46+00:00 |
| rhsa-2023:5622 | Red Hat Security Advisory: kernel security and bug fix update | 2023-10-10T16:24:01+00:00 | 2025-11-21T18:46:45+00:00 |
| rhsa-2023:5621 | Red Hat Security Advisory: kernel-rt security and bug fix update | 2023-10-10T15:54:21+00:00 | 2025-11-21T18:46:44+00:00 |
| rhsa-2023:5616 | Red Hat Security Advisory: python-reportlab security update | 2023-10-10T16:22:29+00:00 | 2025-11-21T18:46:44+00:00 |
| rhsa-2023:5615 | Red Hat Security Advisory: libssh2 security update | 2023-10-10T16:23:10+00:00 | 2025-11-21T18:46:44+00:00 |
| rhsa-2023:5610 | Red Hat Security Advisory: tar security update | 2023-10-10T15:48:28+00:00 | 2025-11-21T18:46:43+00:00 |
| rhsa-2023:5603 | Red Hat Security Advisory: kernel-rt security and bug fix update | 2023-10-10T15:27:31+00:00 | 2025-11-21T18:46:41+00:00 |
| rhsa-2023:5597 | Red Hat Security Advisory: libqb security update | 2023-10-10T15:36:26+00:00 | 2025-11-21T18:46:40+00:00 |
| rhsa-2023:5589 | Red Hat Security Advisory: kernel security and bug fix update | 2023-10-10T14:16:11+00:00 | 2025-11-21T18:46:39+00:00 |
| rhsa-2023:5588 | Red Hat Security Advisory: kernel-rt security and bug fix update | 2023-10-10T14:10:26+00:00 | 2025-11-21T18:46:39+00:00 |
| rhsa-2023:5587 | Red Hat Security Advisory: virt:rhel security update | 2023-10-10T14:18:28+00:00 | 2025-11-21T18:46:38+00:00 |
| rhsa-2023:5580 | Red Hat Security Advisory: kpatch-patch security update | 2023-10-10T10:24:31+00:00 | 2025-11-21T18:46:38+00:00 |
| rhsa-2023:5575 | Red Hat Security Advisory: kpatch-patch security update | 2023-10-10T10:16:20+00:00 | 2025-11-21T18:46:37+00:00 |
| rhsa-2023:5574 | Red Hat Security Advisory: kpatch-patch security update | 2023-10-10T10:28:31+00:00 | 2025-11-21T18:46:37+00:00 |
| rhsa-2023:5548 | Red Hat Security Advisory: kpatch-patch security update | 2023-10-10T09:46:02+00:00 | 2025-11-21T18:46:36+00:00 |
| rhsa-2023:5540 | Red Hat Security Advisory: libvpx security update | 2023-10-09T10:46:48+00:00 | 2025-11-21T18:46:35+00:00 |
| rhsa-2023:5539 | Red Hat Security Advisory: libvpx security update | 2023-10-09T10:48:58+00:00 | 2025-11-21T18:46:34+00:00 |
| rhsa-2023:5538 | Red Hat Security Advisory: libvpx security update | 2023-10-09T14:12:09+00:00 | 2025-11-21T18:46:34+00:00 |
| rhsa-2023:5537 | Red Hat Security Advisory: libvpx security update | 2023-10-09T11:02:21+00:00 | 2025-11-21T18:46:34+00:00 |
| rhsa-2023:5536 | Red Hat Security Advisory: libvpx security update | 2023-10-09T10:56:36+00:00 | 2025-11-21T18:46:34+00:00 |
| rhsa-2023:5535 | Red Hat Security Advisory: libvpx security update | 2023-10-09T11:03:08+00:00 | 2025-11-21T18:46:33+00:00 |
| rhsa-2023:5534 | Red Hat Security Advisory: libvpx security update | 2023-10-09T11:29:24+00:00 | 2025-11-21T18:46:32+00:00 |
| rhsa-2023:5531 | Red Hat Security Advisory: python3 security update | 2023-10-09T10:22:58+00:00 | 2025-11-21T18:46:32+00:00 |
| rhsa-2023:5532 | Red Hat Security Advisory: nodejs security and bug fix update | 2023-10-09T14:04:18+00:00 | 2025-11-21T18:46:30+00:00 |
| rhsa-2023:5529 | Red Hat Security Advisory: bind security update | 2023-10-09T10:03:27+00:00 | 2025-11-21T18:46:27+00:00 |
| rhsa-2023:5528 | Red Hat Security Advisory: python3 security update | 2023-10-09T10:56:47+00:00 | 2025-11-21T18:46:25+00:00 |
| rhsa-2023:5527 | Red Hat Security Advisory: bind security update | 2023-10-09T10:03:28+00:00 | 2025-11-21T18:46:25+00:00 |
| rhsa-2023:5526 | Red Hat Security Advisory: bind security update | 2023-10-09T10:55:45+00:00 | 2025-11-21T18:46:25+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2021-33194 | golang.org/x/net before v0.0.0-20210520170846-37e1c6afe023 allows attackers to cause a denial of service (infinite loop) via crafted ParseFragment input. | 2021-05-02T00:00:00.000Z | 2021-06-08T00:00:00.000Z |
| msrc_cve-2020-8174 | napi_get_value_string_*() allows various kinds of memory corruption in node < 10.21.0 12.18.0 and < 14.4.0. | 2020-07-02T00:00:00.000Z | 2021-06-06T00:00:00.000Z |
| msrc_cve-2019-5737 | In Node.js including 6.x before 6.17.0 8.x before 8.15.1 10.x before 10.15.2 and 11.x before 11.10.1 an attacker can cause a Denial of Service (DoS) by establishing an HTTP or HTTPS connection in keep-alive mode and by sending headers very slowly. This keeps the connection and associated resources alive for a long period of time. Potential attacks are mitigated by the use of a load balancer or other proxy layer. This vulnerability is an extension of CVE-2018-12121 addressed in November and impacts all active Node.js release lines including 6.x before 6.17.0 8.x before 8.15.1 10.x before 10.15.2 and 11.x before 11.10.1. | 2019-03-02T00:00:00.000Z | 2021-06-06T00:00:00.000Z |
| msrc_cve-2018-7167 | Calling Buffer.fill() or Buffer.alloc() with some parameters can lead to a hang which could result in a Denial of Service. In order to address this vulnerability the implementations of Buffer.alloc() and Buffer.fill() were updated so that they zero fill instead of hanging in these cases. All versions of Node.js 6.x (LTS "Boron") 8.x (LTS "Carbon") and 9.x are vulnerable. All versions of Node.js 10.x (Current) are NOT vulnerable. | 2018-06-02T00:00:00.000Z | 2021-06-06T00:00:00.000Z |
| msrc_cve-2018-7164 | Node.js versions 9.7.0 and later and 10.x are vulnerable and the severity is MEDIUM. A bug introduced in 9.7.0 increases the memory consumed when reading from the network into JavaScript using the net.Socket object directly as a stream. An attacker could use this cause a denial of service by sending tiny chunks of data in short succession. This vulnerability was restored by reverting to the prior behaviour. | 2018-06-02T00:00:00.000Z | 2021-06-06T00:00:00.000Z |
| msrc_cve-2018-7162 | All versions of Node.js 9.x and 10.x are vulnerable and the severity is HIGH. An attacker can cause a denial of service (DoS) by causing a node process which provides an http server supporting TLS server to crash. This can be accomplished by sending duplicate/unexpected messages during the handshake. This vulnerability has been addressed by updating the TLS implementation. | 2018-06-02T00:00:00.000Z | 2021-06-06T00:00:00.000Z |
| msrc_cve-2018-7161 | All versions of Node.js 8.x 9.x and 10.x are vulnerable and the severity is HIGH. An attacker can cause a denial of service (DoS) by causing a node server providing an http2 server to crash. This can be accomplished by interacting with the http2 server in a manner that triggers a cleanup bug where objects are used in native code after they are no longer available. This has been addressed by updating the http2 implementation. | 2018-06-02T00:00:00.000Z | 2021-06-06T00:00:00.000Z |
| msrc_cve-2018-12123 | Node.js: All versions prior to Node.js 6.15.0 8.14.0 10.14.0 and 11.3.0: Hostname spoofing in URL parser for javascript protocol: If a Node.js application is using url.parse() to determine the URL hostname that hostname can be spoofed by using a mixed case "javascript:" (e.g. "javAscript:") protocol (other protocols are not affected). If security decisions are made about the URL based on the hostname they may be incorrect. | 2018-11-02T00:00:00.000Z | 2021-06-06T00:00:00.000Z |
| msrc_cve-2018-12122 | Node.js: All versions prior to Node.js 6.15.0 8.14.0 10.14.0 and 11.3.0: Slowloris HTTP Denial of Service: An attacker can cause a Denial of Service (DoS) by sending headers very slowly keeping HTTP or HTTPS connections and associated resources alive for a long period of time. | 2018-11-02T00:00:00.000Z | 2021-06-06T00:00:00.000Z |
| msrc_cve-2018-12121 | Node.js: All versions prior to Node.js 6.15.0 8.14.0 10.14.0 and 11.3.0: Denial of Service with large HTTP headers: By using a combination of many requests with maximum sized headers (almost 80 KB per connection) and carefully timed completion of the headers it is possible to cause the HTTP server to abort from heap allocation failure. Attack potential is mitigated by the use of a load balancer or other proxy layer. | 2018-11-02T00:00:00.000Z | 2021-06-06T00:00:00.000Z |
| msrc_cve-2018-12116 | Node.js: All versions prior to Node.js 6.15.0 and 8.14.0: HTTP request splitting: If Node.js can be convinced to use unsanitized user-provided Unicode data for the `path` option of an HTTP request then data can be provided which will trigger a second unexpected and user-defined HTTP request to made to the same server. | 2018-11-02T00:00:00.000Z | 2021-06-06T00:00:00.000Z |
| msrc_cve-2018-1000168 | nghttp2 version >= 1.10.0 and nghttp2 <= v1.31.0 contains an Improper Input Validation CWE-20 vulnerability in ALTSVC frame handling that can result in segmentation fault leading to denial of service. This attack appears to be exploitable via network client. This vulnerability appears to have been fixed in >= 1.31.1. | 2018-05-02T00:00:00.000Z | 2021-06-06T00:00:00.000Z |
| msrc_cve-2018-0734 | Timing attack against DSA | 2018-10-02T00:00:00.000Z | 2021-06-06T00:00:00.000Z |
| msrc_cve-2021-20221 | An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU up to and including qemu 4.2.0on aarch64 platform. The issue occurs because while writing an interrupt ID to the controller memory area it is not masked to be 4 bits wide. It may lead to the said issue while updating controller state fields and their subsequent processing. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario. | 2021-05-02T00:00:00.000Z | 2021-06-05T00:00:00.000Z |
| msrc_cve-2021-20181 | A race condition flaw was found in the 9pfs server implementation of QEMU up to and including 5.2.0. This flaw allows a malicious 9p client to cause a use-after-free error potentially escalating their privileges on the system. The highest threat from this vulnerability is to confidentiality integrity as well as system availability. | 2021-05-02T00:00:00.000Z | 2021-06-05T00:00:00.000Z |
| msrc_cve-2021-3527 | A flaw was found in the USB redirector device (usb-redir) of QEMU. Small USB packets are combined into a single large transfer request to reduce the overhead and improve performance. The combined size of the bulk transfer is used to dynamically allocate a variable length array (VLA) on the stack without proper validation. Since the total size is not bounded a malicious guest could use this flaw to influence the array length and cause the QEMU process to perform an excessive allocation on the stack resulting in a denial of service. | 2021-05-02T00:00:00.000Z | 2021-06-04T00:00:00.000Z |
| msrc_cve-2021-3421 | A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha. | 2021-05-02T00:00:00.000Z | 2021-06-04T00:00:00.000Z |
| msrc_cve-2021-20191 | A flaw was found in ansible. Credentials such as secrets are being disclosed in console log by default and not protected by no_log feature when using those modules. An attacker can take advantage of this information to steal those credentials. The highest threat from this vulnerability is to data confidentiality. Versions before ansible 2.9.18 are affected. | 2021-05-02T00:00:00.000Z | 2021-06-04T00:00:00.000Z |
| msrc_cve-2021-20178 | A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality. | 2021-05-02T00:00:00.000Z | 2021-06-04T00:00:00.000Z |
| msrc_cve-2021-3445 | A flaw was found in libdnf's signature verification functionality in versions before 0.60.1. This flaw allows an attacker to achieve code execution if they can alter the header information of an RPM package and then trick a user or system into installing it. The highest risk of this vulnerability is to confidentiality integrity as well as system availability. | 2021-05-02T00:00:00.000Z | 2021-06-03T00:00:00.000Z |
| msrc_cve-2021-20236 | A flaw was found in the ZeroMQ server in versions before 4.3.3. This flaw allows a malicious client to cause a stack buffer overflow on the server by sending crafted topic subscription requests and then unsubscribing. The highest threat from this vulnerability is to confidentiality integrity as well as system availability. | 2021-05-02T00:00:00.000Z | 2021-06-03T00:00:00.000Z |
| msrc_cve-2021-33574 | The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller leading to a denial of service (application crash) or possibly unspecified other impact. | 2021-05-02T00:00:00.000Z | 2021-06-02T00:00:00.000Z |
| msrc_cve-2020-20178 | Ethereum 0xe933c0cd9784414d5f278c114904f5a84b396919#code.sol latest version is affected by a denial of service vulnerability in the affected payout function. Once the length of this array is too long it will result in an exception. Attackers can make attacks by creating a series of account addresses. | 2021-05-02T00:00:00.000Z | 2021-05-29T00:00:00.000Z |
| msrc_cve-2021-3518 | There's a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality integrity and availability. | 2021-05-02T00:00:00.000Z | 2021-05-26T00:00:00.000Z |
| msrc_cve-2021-3517 | There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application. | 2021-05-02T00:00:00.000Z | 2021-05-26T00:00:00.000Z |
| msrc_cve-2021-3200 | Buffer overflow vulnerability in libsolv 2020-12-13 via the Solver * testcase_read(Pool *pool FILE *fp const char *testcase Queue *job char **resultp int *resultflagsp function at src/testcase.c: line 2334 which could cause a denial of service | 2021-05-02T00:00:00.000Z | 2021-05-25T00:00:00.000Z |
| msrc_cve-2020-36332 | A flaw was found in libwebp in versions before 1.0.1. When reading a file libwebp allocates an excessive amount of memory. The highest threat from this vulnerability is to the service availability. | 2021-05-02T00:00:00.000Z | 2021-05-25T00:00:00.000Z |
| msrc_cve-2020-36331 | A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function ChunkAssignData. The highest threat from this vulnerability is to data confidentiality and to the service availability. | 2021-05-02T00:00:00.000Z | 2021-05-25T00:00:00.000Z |
| msrc_cve-2020-36330 | A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function ChunkVerifyAndAssign. The highest threat from this vulnerability is to data confidentiality and to the service availability. | 2021-05-02T00:00:00.000Z | 2021-05-25T00:00:00.000Z |
| msrc_cve-2020-36329 | A flaw was found in libwebp in versions before 1.0.1. A use-after-free was found due to a thread being killed too early. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | 2021-05-02T00:00:00.000Z | 2021-05-25T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-201609-0576 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.… | 2025-04-13T23:02:34.513000Z |
| var-201609-0452 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.… | 2025-04-13T23:02:34.466000Z |
| var-201609-0462 | Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows a… | 2025-04-13T23:02:34.419000Z |
| var-201607-0072 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows a… | 2025-04-13T23:02:34.334000Z |
| var-201606-0490 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Ad… | 2025-04-13T23:02:34.290000Z |
| var-201609-0428 | Integer overflow in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.… | 2025-04-13T23:02:34.245000Z |
| var-201607-0519 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows a… | 2025-04-13T23:02:34.198000Z |
| var-201607-0521 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows a… | 2025-04-13T23:02:34.150000Z |
| var-201606-0481 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Ad… | 2025-04-13T23:02:34.042000Z |
| var-201607-0104 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows a… | 2025-04-13T23:02:33.967000Z |
| var-201604-0521 | Untrusted search path vulnerability in Adobe Flash Player before 18.0.0.343 and 19.x thro… | 2025-04-13T23:02:33.923000Z |
| var-201606-0042 | Adobe Flash Player before 18.0.0.352 and 19.x through 21.x before 21.0.0.242 on Windows a… | 2025-04-13T23:02:33.875000Z |
| var-201607-0078 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.… | 2025-04-13T23:02:33.798000Z |
| var-201606-0498 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Ad… | 2025-04-13T23:02:33.755000Z |
| var-201606-0487 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Ad… | 2025-04-13T23:02:33.716000Z |
| var-201606-0052 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.352 and 19.x through 21.… | 2025-04-13T23:02:33.668000Z |
| var-201610-0465 | Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows a… | 2025-04-13T23:02:33.611000Z |
| var-201610-0464 | Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows a… | 2025-04-13T23:02:33.564000Z |
| var-201604-0151 | Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows a… | 2025-04-13T23:02:33.485000Z |
| var-201606-0499 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Ad… | 2025-04-13T23:02:33.445000Z |
| var-201606-0494 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Ad… | 2025-04-13T23:02:33.406000Z |
| var-201607-0105 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows a… | 2025-04-13T23:02:33.363000Z |
| var-201610-0395 | Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows a… | 2025-04-13T23:02:33.309000Z |
| var-201604-0163 | Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows a… | 2025-04-13T23:02:33.232000Z |
| var-201607-0518 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows a… | 2025-04-13T23:02:33.186000Z |
| var-201604-0150 | Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows a… | 2025-04-13T23:02:33.109000Z |
| var-201606-0488 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Ad… | 2025-04-13T23:02:33.068000Z |
| var-201607-0067 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows a… | 2025-04-13T23:02:33.020000Z |
| var-201604-0518 | Use-after-free vulnerability in the Transform object implementation in Adobe Flash Player… | 2025-04-13T23:02:32.913000Z |
| var-201610-0461 | Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows a… | 2025-04-13T23:02:32.866000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2020:2966-1 | Security update for hunspell | 2020-10-20T14:04:07Z | 2020-10-20T14:04:07Z |
| suse-su-2020:2951-1 | Security update for transfig | 2020-10-16T14:09:41Z | 2020-10-16T14:09:41Z |
| suse-su-2020:2943-1 | Security update for php72 | 2020-10-16T07:48:38Z | 2020-10-16T07:48:38Z |
| suse-su-2020:2942-1 | Security update for blktrace | 2020-10-16T07:47:41Z | 2020-10-16T07:47:41Z |
| suse-su-2020:2941-1 | Security update for php7 | 2020-10-16T07:42:09Z | 2020-10-16T07:42:09Z |
| suse-su-2020:2939-1 | Security update for crmsh | 2020-10-15T14:08:04Z | 2020-10-15T14:08:04Z |
| suse-su-2020:2931-1 | Security update for bcm43xx-firmware | 2020-10-15T09:01:14Z | 2020-10-15T09:01:14Z |
| suse-su-2020:2930-1 | Security update for crmsh | 2020-10-15T09:01:07Z | 2020-10-15T09:01:07Z |
| suse-su-2020:2929-1 | Security update for rubygem-activesupport-4_2 | 2020-10-15T09:00:58Z | 2020-10-15T09:00:58Z |
| suse-su-2020:2928-1 | Security update for crmsh | 2020-10-14T14:37:24Z | 2020-10-14T14:37:24Z |
| suse-su-2020:2924-1 | Security update for libqt5-qtsvg | 2020-10-14T12:31:45Z | 2020-10-14T12:31:45Z |
| suse-su-2020:2923-1 | Security update for libqt5-qtimageformats | 2020-10-14T12:31:14Z | 2020-10-14T12:31:14Z |
| suse-su-2020:14516-1 | Security update for php53 | 2020-10-14T12:30:41Z | 2020-10-14T12:30:41Z |
| suse-su-2020:2920-1 | Security update for php7 | 2020-10-14T12:29:56Z | 2020-10-14T12:29:56Z |
| suse-ru-2020:2915-1 | Recommended update for bind | 2020-10-13T15:33:50Z | 2020-10-13T15:33:50Z |
| suse-su-2020:2914-1 | Security update for bind | 2020-10-13T15:25:49Z | 2020-10-13T15:25:49Z |
| suse-su-2020:2913-1 | Security update for crmsh | 2020-10-13T14:51:11Z | 2020-10-13T14:51:11Z |
| suse-su-2020:2911-1 | Security update for ansible, crowbar-core, crowbar-openstack, grafana, grafana-natel-discrete-panel, openstack-aodh, openstack-barbican, openstack-cinder, openstack-gnocchi, openstack-heat, openstack-ironic, openstack-magnum, openstack-manila, openstack-monasca-agent, openstack-murano, openstack-neutron, openstack-neutron-vpnaas, openstack-nova, openstack-sahara, python-Pillow, rubygem-crowbar-client | 2020-10-13T14:46:03Z | 2020-10-13T14:46:03Z |
| suse-su-2020:2908-1 | Security update for the Linux Kernel | 2020-10-13T13:49:58Z | 2020-10-13T13:49:58Z |
| suse-su-2020:2907-1 | Security update for the Linux Kernel | 2020-10-13T13:49:40Z | 2020-10-13T13:49:40Z |
| suse-su-2020:2906-1 | Security update for the Linux Kernel | 2020-10-13T13:49:20Z | 2020-10-13T13:49:20Z |
| suse-su-2020:2905-1 | Security update for the Linux Kernel | 2020-10-13T13:49:03Z | 2020-10-13T13:49:03Z |
| suse-su-2020:2904-1 | Security update for the Linux Kernel | 2020-10-13T13:47:05Z | 2020-10-13T13:47:05Z |
| suse-su-2020:2901-1 | Security update for libproxy | 2020-10-13T12:23:17Z | 2020-10-13T12:23:17Z |
| suse-su-2020:2900-1 | Security update for libproxy | 2020-10-13T12:20:53Z | 2020-10-13T12:20:53Z |
| suse-su-2020:2899-1 | Security update for rubygem-activesupport-5_1 | 2020-10-13T12:18:25Z | 2020-10-13T12:18:25Z |
| suse-su-2020:2898-1 | Security update for tigervnc | 2020-10-13T12:17:24Z | 2020-10-13T12:17:24Z |
| suse-su-2020:2896-1 | Security update for php74 | 2020-10-13T11:05:56Z | 2020-10-13T11:05:56Z |
| suse-su-2020:2894-1 | Security update for php5 | 2020-10-12T15:07:54Z | 2020-10-12T15:07:54Z |
| suse-su-2020:2882-1 | Security update for tigervnc | 2020-10-09T12:44:33Z | 2020-10-09T12:44:33Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2024-39738 | Google Chrome安全绕过漏洞(CNVD-2024-39738) | 2024-09-27 | 2024-10-08 |
| cnvd-2024-39737 | Google Chrome释放后重用漏洞(CNVD-2024-39737) | 2024-09-27 | 2024-10-08 |
| cnvd-2024-38820 | 施耐德电气(中国)有限公司Modicon TM221存在信息泄露漏洞 | 2024-08-23 | 2024-10-07 |
| cnvd-2024-40101 | 北京星网锐捷网络技术有限公司NBR800G存在命令执行漏洞(CNVD-2024-40101) | 2024-08-22 | 2024-10-06 |
| cnvd-2024-40062 | 瑞斯康达科技发展股份有限公司MSG5200-2GEC-4E-X4和MSG2100E-UPON-4V存在文件上传漏洞 | 2024-08-22 | 2024-10-06 |
| cnvd-2024-38747 | 浙江大华技术股份有限公司智能云网关注册管理平台存在SQL注入漏洞(CNVD-2024-38747) | 2024-08-19 | 2024-10-03 |
| cnvd-2024-38701 | 用友网络科技股份有限公司U8CRM存在SQL注入漏洞(CNVD-2024-38701) | 2024-08-18 | 2024-10-02 |
| cnvd-2024-39689 | Google Android权限提升漏洞(CNVD-2024-39689) | 2024-07-12 | 2024-10-01 |
| cnvd-2024-39688 | Google Android Framework权限提升漏洞(CNVD-2024-39688) | 2024-07-12 | 2024-10-01 |
| cnvd-2024-39687 | Google Android权限提升漏洞(CNVD-2024-39687) | 2024-07-12 | 2024-10-01 |
| cnvd-2024-39686 | Google Android Framework权限提升漏洞(CNVD-2024-39686) | 2024-07-12 | 2024-10-01 |
| cnvd-2024-39685 | Google Android权限提升漏洞(CNVD-2024-39685) | 2024-07-12 | 2024-10-01 |
| cnvd-2024-39684 | Google Android Framework权限提升漏洞(CNVD-2024-39684) | 2024-07-12 | 2024-10-01 |
| cnvd-2024-39683 | Google Android Framework权限提升漏洞(CNVD-2024-39683) | 2024-07-12 | 2024-10-01 |
| cnvd-2024-39682 | Google Android Framework权限提升漏洞(CNVD-2024-39682) | 2024-07-12 | 2024-10-01 |
| cnvd-2024-39681 | Google Android权限提升漏洞(CNVD-2024-39681) | 2024-07-12 | 2024-10-01 |
| cnvd-2024-39680 | Advantech ADAM-5630访问控制错误漏洞 | 2024-09-30 | 2024-10-01 |
| cnvd-2024-39679 | Advantech ADAM-5550跨站脚本漏洞 | 2024-09-30 | 2024-10-01 |
| cnvd-2024-39678 | Advantech ADAM-5550信息泄露漏洞 | 2024-09-30 | 2024-10-01 |
| cnvd-2024-39677 | Microsoft SharePoint Server远程代码执行漏洞(CNVD-2024-39677) | 2024-03-14 | 2024-10-01 |
| cnvd-2024-39676 | Microsoft SharePoint Server欺骗漏洞(CNVD-2024-39676) | 2024-04-11 | 2024-10-01 |
| cnvd-2024-39675 | Microsoft SharePoint Server信息泄露漏洞(CNVD-2024-39675) | 2024-05-16 | 2024-10-01 |
| cnvd-2024-39674 | Microsoft SharePoint Server远程代码执行漏洞(CNVD-2024-39674) | 2024-05-16 | 2024-10-01 |
| cnvd-2024-39673 | Microsoft SharePoint Server信息泄露漏洞(CNVD-2024-39673) | 2024-07-12 | 2024-10-01 |
| cnvd-2024-39672 | Microsoft SharePoint Server远程代码执行漏洞(CNVD-2024-39672) | 2024-07-12 | 2024-10-01 |
| cnvd-2024-39671 | Microsoft SharePoint Server远程代码执行漏洞(CNVD-2024-39671) | 2024-07-12 | 2024-10-01 |
| cnvd-2024-39670 | Microsoft Dynamics 365(on-premises)跨站脚本漏洞(CNVD-2024-39670) | 2024-02-23 | 2024-10-01 |
| cnvd-2024-39669 | GTKWave操作系统命令注入漏洞(CNVD-2024-39669) | 2024-01-11 | 2024-10-01 |
| cnvd-2024-39668 | GTKWave操作系统命令注入漏洞(CNVD-2024-39668) | 2024-01-11 | 2024-10-01 |
| cnvd-2024-40463 | 友讯电子设备(上海)有限公司DIR-X4860操作系统命令注入漏洞 | 2024-09-23 | 2024-09-30 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2010-avi-365 | Vulnérabilités dans SSL/TLS et Secure Channel de Windows | 2010-08-11T00:00:00.000000 | 2010-08-11T00:00:00.000000 |
| certa-2010-avi-364 | Vulnérabilités de pilotes en mode noyau de Windows | 2010-08-11T00:00:00.000000 | 2010-08-11T00:00:00.000000 |
| certa-2010-avi-363 | Vulnérabilités dans le noyau Windows | 2010-08-11T00:00:00.000000 | 2010-08-11T00:00:00.000000 |
| certa-2010-avi-325 | Multiples vulnérabilités dans OpenLDAP | 2010-07-20T00:00:00.000000 | 2010-08-10T00:00:00.000000 |
| certa-2010-avi-362 | Vulnérabilités dans Bugzilla | 2010-08-09T00:00:00.000000 | 2010-08-09T00:00:00.000000 |
| certa-2010-avi-361 | Vulnérabilité dans wget | 2010-08-09T00:00:00.000000 | 2010-08-09T00:00:00.000000 |
| certa-2010-avi-360 | Vulnérabilité dans Foxit Reader | 2010-08-09T00:00:00.000000 | 2010-08-09T00:00:00.000000 |
| certa-2010-avi-358 | Vulnérabilités dans les produits Cisco ASA | 2010-08-06T00:00:00.000000 | 2010-08-06T00:00:00.000000 |
| certa-2010-avi-357 | Multiples vulnérabilités dans Cisco Firewall Services Module | 2010-08-06T00:00:00.000000 | 2010-08-06T00:00:00.000000 |
| certa-2010-avi-356 | Vulnérabilités dans IBM Tivoli Directory Server | 2010-08-06T00:00:00.000000 | 2010-08-06T00:00:00.000000 |
| certa-2010-avi-355 | Vulnérabilité dans Linux CIFS | 2010-08-04T00:00:00.000000 | 2010-08-04T00:00:00.000000 |
| certa-2010-avi-354 | Vulnérabilités dans JBoss Enterprise SOA | 2010-08-04T00:00:00.000000 | 2010-08-04T00:00:00.000000 |
| certa-2010-avi-353 | Vulnérabilité dans le Shell de Microsoft Windows | 2010-08-03T00:00:00.000000 | 2010-08-03T00:00:00.000000 |
| certa-2010-avi-352 | Vulnérabilités dans Novell iPrint Client | 2010-08-02T00:00:00.000000 | 2010-08-02T00:00:00.000000 |
| certa-2010-avi-351 | Vulnérabilité dans SPIP | 2010-08-02T00:00:00.000000 | 2010-08-02T00:00:00.000000 |
| certa-2010-avi-350 | Vulnérabilité dans EMC Disk Library | 2010-08-02T00:00:00.000000 | 2010-08-02T00:00:00.000000 |
| certa-2010-avi-349 | Vulnérabilité dans Akamai Download Manager | 2010-08-02T00:00:00.000000 | 2010-08-02T00:00:00.000000 |
| certa-2010-avi-264 | Multiples vulnérabilités dans Apache | 2010-06-14T00:00:00.000000 | 2010-08-02T00:00:00.000000 |
| certa-2010-avi-347 | Multiples vulnérabilités dans TYPO3 | 2010-07-30T00:00:00.000000 | 2010-07-30T00:00:00.000000 |
| certa-2010-avi-346 | Vulnérabilités dans MediaWiki | 2010-07-30T00:00:00.000000 | 2010-07-30T00:00:00.000000 |
| certa-2010-avi-345 | Vulnérabilité dans la bibliothèque libmspack | 2010-07-30T00:00:00.000000 | 2010-07-30T00:00:00.000000 |
| certa-2010-avi-344 | Multiples vulnérabilités dans SAP NetWeaver | 2010-07-29T00:00:00.000000 | 2010-07-29T00:00:00.000000 |
| certa-2010-avi-343 | Vulnérabilité de Dovecot | 2010-07-29T00:00:00.000000 | 2010-07-29T00:00:00.000000 |
| certa-2010-avi-342 | Multiples vulnérabilités dans Apple Safari | 2010-07-29T00:00:00.000000 | 2010-07-29T00:00:00.000000 |
| certa-2010-avi-341 | Vulnérabilité dans GnuPG | 2010-07-29T00:00:00.000000 | 2010-07-29T00:00:00.000000 |
| certa-2010-avi-044 | Vulnérabilité dans BIND avec DNSSEC | 2010-02-02T00:00:00.000000 | 2010-07-29T00:00:00.000000 |
| certa-2010-avi-340 | Vulnérabilité dans Nessus Web Server Plugin | 2010-07-28T00:00:00.000000 | 2010-07-28T00:00:00.000000 |
| certa-2010-avi-339 | Multiples vulnérabilités dans les produits Symantec | 2010-07-28T00:00:00.000000 | 2010-07-28T00:00:00.000000 |
| certa-2010-avi-338 | Vulnérabilités dans IBM Lotus Notes | 2010-07-28T00:00:00.000000 | 2010-07-28T00:00:00.000000 |
| certa-2010-avi-337 | Vulnérabilités dans Google Chrome | 2010-07-27T00:00:00.000000 | 2010-07-27T00:00:00.000000 |