Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-60072 |
8.2 (3.1)
|
WordPress Anchor smooth scroll plugin <= 1.0.2 - Local… |
Processby |
Anchor smooth scroll |
2025-12-18T07:22:05.940Z | 2026-01-21T15:36:33.079Z |
| CVE-2025-60076 |
7.5 (3.1)
|
WordPress Ray Enterprise Translation plugin <= 1.7.1 -… |
jbhovik |
Ray Enterprise Translation |
2025-12-18T07:22:06.163Z | 2026-01-21T15:36:09.930Z |
| CVE-2026-22022 |
N/A
|
Apache Solr: Unauthorized bypass of certain "predefine… |
Apache Software Foundation |
Apache Solr |
2026-01-21T13:41:46.346Z | 2026-01-21T15:35:07.116Z |
| CVE-2025-60084 |
8.6 (3.1)
|
WordPress PDF for Elementor Forms + Drag And Drop Temp… |
add-ons.org |
PDF for Elementor Forms + Drag And Drop Template Builder |
2025-12-18T07:22:07.769Z | 2026-01-21T15:32:11.047Z |
| CVE-2025-64203 |
7.1 (3.1)
|
WordPress Mailster plugin < 4.1.14 - Cross Site Script… |
EverPress |
Mailster |
2025-12-18T07:22:11.085Z | 2026-01-21T15:31:02.170Z |
| CVE-2022-46764 |
9.8 (3.1)
|
A SQL injection issue in the web API in TrueConf … |
n/a |
n/a |
2022-12-27T00:00:00.000Z | 2026-01-21T15:27:46.766Z |
| CVE-2025-66803 |
4.8 (3.1)
|
Race condition in the turbo-frame element handler… |
n/a |
n/a |
2026-01-20T00:00:00.000Z | 2026-01-21T15:26:53.433Z |
| CVE-2026-21952 |
4.9 (3.1)
|
Vulnerability in the MySQL Server product of Orac… |
Oracle Corporation |
MySQL Server |
2026-01-20T21:56:30.311Z | 2026-01-21T15:23:16.511Z |
| CVE-2026-21951 |
6.1 (3.1)
|
Vulnerability in the PeopleSoft Enterprise People… |
Oracle Corporation |
PeopleSoft Enterprise PeopleTools |
2026-01-20T21:56:29.982Z | 2026-01-21T15:19:32.304Z |
| CVE-2026-21950 |
6.5 (3.1)
|
Vulnerability in the MySQL Server product of Orac… |
Oracle Corporation |
MySQL Server |
2026-01-20T21:56:29.652Z | 2026-01-21T15:17:33.458Z |
| CVE-2026-21949 |
6.5 (3.1)
|
Vulnerability in the MySQL Server product of Orac… |
Oracle Corporation |
MySQL Server |
2026-01-20T21:56:29.318Z | 2026-01-21T15:15:52.637Z |
| CVE-2026-21948 |
4.9 (3.1)
|
Vulnerability in the MySQL Server product of Orac… |
Oracle Corporation |
MySQL Server |
2026-01-20T21:56:29.010Z | 2026-01-21T15:12:07.779Z |
| CVE-2026-21947 |
3.1 (3.1)
|
Vulnerability in Oracle Java SE (component: JavaF… |
Oracle Corporation |
Oracle Java SE |
2026-01-20T21:56:28.663Z | 2026-01-21T15:09:50.772Z |
| CVE-2025-68133 |
7.4 (3.1)
|
EVerest's unlimited connections can lead to DoS throug… |
EVerest |
everest-core |
2026-01-21T02:25:03.085Z | 2026-01-21T15:09:48.152Z |
| CVE-2026-21946 |
6.1 (3.1)
|
Vulnerability in the JD Edwards EnterpriseOne Too… |
Oracle Corporation |
JD Edwards EnterpriseOne Tools |
2026-01-20T21:56:28.311Z | 2026-01-21T15:07:29.834Z |
| CVE-2026-21945 |
7.5 (3.1)
|
Vulnerability in the Oracle Java SE, Oracle Graal… |
Oracle Corporation |
Oracle Java SE |
2026-01-20T21:56:27.997Z | 2026-01-21T15:05:36.940Z |
| CVE-2026-21944 |
6.5 (3.1)
|
Vulnerability in the Oracle Agile Product Lifecyc… |
Oracle Corporation |
Oracle Agile Product Lifecycle Management for Process |
2026-01-20T21:56:27.694Z | 2026-01-21T15:03:45.583Z |
| CVE-2026-21943 |
6.1 (3.1)
|
Vulnerability in the Oracle Scripting product of … |
Oracle Corporation |
Oracle Scripting |
2026-01-20T21:56:27.362Z | 2026-01-21T15:02:26.204Z |
| CVE-2026-21942 |
5 (3.1)
|
Vulnerability in the Oracle Solaris product of Or… |
Oracle Corporation |
Oracle Solaris |
2026-01-20T21:56:27.042Z | 2026-01-21T14:59:59.056Z |
| CVE-2026-21941 |
4.9 (3.1)
|
Vulnerability in the MySQL Server product of Orac… |
Oracle Corporation |
MySQL Server |
2026-01-20T21:56:26.721Z | 2026-01-21T14:59:00.815Z |
| CVE-2026-21940 |
7.5 (3.1)
|
Vulnerability in the Oracle Agile PLM product of … |
Oracle Corporation |
Oracle Agile PLM |
2026-01-20T21:56:26.402Z | 2026-01-21T14:57:43.763Z |
| CVE-2025-63647 |
7.5 (3.1)
|
A NULL pointer dereference in the parse_meta func… |
n/a |
n/a |
2026-01-20T00:00:00.000Z | 2026-01-21T14:52:39.071Z |
| CVE-2025-57156 |
7.5 (3.1)
|
NULL pointer dereference in the dacp_reply_playqu… |
n/a |
n/a |
2026-01-20T00:00:00.000Z | 2026-01-21T14:50:17.449Z |
| CVE-2025-57155 |
7.5 (3.1)
|
NULL pointer dereference in the daap_reply_groups… |
n/a |
n/a |
2026-01-20T00:00:00.000Z | 2026-01-21T14:47:58.028Z |
| CVE-2025-63648 |
7.5 (3.1)
|
A NULL pointer dereference in the dacp_reply_play… |
n/a |
n/a |
2026-01-20T00:00:00.000Z | 2026-01-21T14:47:18.727Z |
| CVE-2025-66902 |
7.5 (3.1)
|
An input validation issue in in Pithikos websocke… |
n/a |
n/a |
2026-01-20T00:00:00.000Z | 2026-01-21T14:45:23.965Z |
| CVE-2026-1035 |
3.1 (3.1)
|
Org.keycloak.protocol.oidc: keycloak refresh token reu… |
Red Hat |
Red Hat Build of Keycloak |
2026-01-21T05:52:22.495Z | 2026-01-21T14:40:53.542Z |
| CVE-2025-56353 |
7.5 (3.1)
|
In tinyMQTT commit 6226ade15bd4f97be2d196352e64dd… |
n/a |
n/a |
2026-01-20T00:00:00.000Z | 2026-01-21T14:39:58.418Z |
| CVE-2022-50905 |
6.1 (3.1)
9.8 (3.1)
|
e107 CMS v3.2.1 - Reflected XSS via Comment Flow |
e107 |
e107 CMS |
2026-01-13T22:51:48.032Z | 2026-01-21T14:38:26.972Z |
| CVE-2026-21974 |
5.3 (3.1)
|
Vulnerability in the Oracle Life Sciences Central… |
Oracle Corporation |
Oracle Life Sciences Central Designer |
2026-01-20T21:56:36.617Z | 2026-01-21T14:38:13.502Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-71133 |
N/A
|
RDMA/irdma: avoid invalid read in irdma_net_event |
Linux |
Linux |
2026-01-14T15:07:48.524Z | 2026-02-09T08:35:29.446Z |
| CVE-2025-71132 |
N/A
|
smc91x: fix broken irq-context in PREEMPT_RT |
Linux |
Linux |
2026-01-14T15:07:47.860Z | 2026-02-09T08:35:28.371Z |
| CVE-2025-71131 |
N/A
|
crypto: seqiv - Do not use req->iv after crypto_aead_encrypt |
Linux |
Linux |
2026-01-14T15:07:47.194Z | 2026-02-09T08:35:27.322Z |
| CVE-2025-71127 |
N/A
|
wifi: mac80211: Discard Beacon frames to non-broadcast… |
Linux |
Linux |
2026-01-14T15:07:44.218Z | 2026-02-09T08:35:22.963Z |
| CVE-2025-71125 |
N/A
|
tracing: Do not register unsupported perf events |
Linux |
Linux |
2026-01-14T15:06:10.662Z | 2026-02-09T08:35:20.806Z |
| CVE-2025-71123 |
N/A
|
ext4: fix string copying in parse_apply_sb_mount_options() |
Linux |
Linux |
2026-01-14T15:06:09.246Z | 2026-02-09T08:35:18.369Z |
| CVE-2025-71121 |
N/A
|
parisc: Do not reprogram affinitiy on ASP chip |
Linux |
Linux |
2026-01-14T15:06:07.871Z | 2026-02-09T08:35:16.277Z |
| CVE-2025-71120 |
N/A
|
SUNRPC: svcauth_gss: avoid NULL deref on zero length g… |
Linux |
Linux |
2026-01-14T15:06:07.194Z | 2026-02-09T08:35:15.157Z |
| CVE-2025-71118 |
N/A
|
ACPICA: Avoid walking the Namespace if start_node is NULL |
Linux |
Linux |
2026-01-14T15:06:05.861Z | 2026-02-09T08:35:13.020Z |
| CVE-2025-71116 |
N/A
|
libceph: make decode_pool() more resilient against cor… |
Linux |
Linux |
2026-01-14T15:06:04.476Z | 2026-02-09T08:35:10.946Z |
| CVE-2025-71114 |
N/A
|
via_wdt: fix critical boot hang due to unnamed resourc… |
Linux |
Linux |
2026-01-14T15:06:00.848Z | 2026-02-09T08:35:08.836Z |
| CVE-2025-71113 |
N/A
|
crypto: af_alg - zero initialize memory allocated via … |
Linux |
Linux |
2026-01-14T15:05:59.992Z | 2026-02-09T08:35:07.779Z |
| CVE-2025-71112 |
N/A
|
net: hns3: add VLAN id validation before using |
Linux |
Linux |
2026-01-14T15:05:59.308Z | 2026-02-09T08:35:06.680Z |
| CVE-2025-71111 |
N/A
|
hwmon: (w83791d) Convert macros to functions to avoid TOCTOU |
Linux |
Linux |
2026-01-14T15:05:58.649Z | 2026-02-09T08:35:05.517Z |
| CVE-2025-71108 |
N/A
|
usb: typec: ucsi: Handle incorrect num_connectors capability |
Linux |
Linux |
2026-01-14T15:05:56.553Z | 2026-02-09T08:35:02.075Z |
| CVE-2025-71105 |
N/A
|
f2fs: use global inline_xattr_slab instead of per-sb s… |
Linux |
Linux |
2026-01-14T15:05:54.510Z | 2026-02-09T08:34:58.276Z |
| CVE-2025-71104 |
N/A
|
KVM: x86: Fix VM hard lockup after prolonged inactivit… |
Linux |
Linux |
2026-01-14T15:05:53.802Z | 2026-02-09T08:34:57.200Z |
| CVE-2025-71102 |
N/A
|
scs: fix a wrong parameter in __scs_magic |
Linux |
Linux |
2026-01-14T15:05:52.389Z | 2026-02-09T08:34:55.111Z |
| CVE-2025-71098 |
N/A
|
ip6_gre: make ip6gre_header() robust |
Linux |
Linux |
2026-01-13T15:34:57.536Z | 2026-02-09T08:34:50.957Z |
| CVE-2025-71097 |
N/A
|
ipv4: Fix reference count leak when using error routes… |
Linux |
Linux |
2026-01-13T15:34:56.814Z | 2026-02-09T08:34:49.901Z |
| CVE-2025-71096 |
N/A
|
RDMA/core: Check for the presence of LS_NLA_TYPE_DGID … |
Linux |
Linux |
2026-01-13T15:34:56.118Z | 2026-02-09T08:34:48.888Z |
| CVE-2025-71094 |
N/A
|
net: usb: asix: validate PHY address before use |
Linux |
Linux |
2026-01-13T15:34:54.669Z | 2026-02-09T08:34:46.736Z |
| CVE-2025-71093 |
N/A
|
e1000: fix OOB in e1000_tbi_should_accept() |
Linux |
Linux |
2026-01-13T15:34:53.803Z | 2026-02-09T08:34:45.622Z |
| CVE-2025-71091 |
N/A
|
team: fix check for port enabled in team_queue_overrid… |
Linux |
Linux |
2026-01-13T15:34:52.431Z | 2026-02-09T08:34:43.414Z |
| CVE-2025-71087 |
N/A
|
iavf: fix off-by-one issues in iavf_config_rss_reg() |
Linux |
Linux |
2026-01-13T15:34:49.691Z | 2026-02-09T08:34:38.872Z |
| CVE-2025-71086 |
N/A
|
net: rose: fix invalid array index in rose_kill_by_device() |
Linux |
Linux |
2026-01-13T15:34:49.007Z | 2026-02-09T08:34:37.864Z |
| CVE-2025-71085 |
N/A
|
ipv6: BUG() in pskb_expand_head() as part of calipso_s… |
Linux |
Linux |
2026-01-13T15:34:48.324Z | 2026-02-09T08:34:36.802Z |
| CVE-2025-71084 |
N/A
|
RDMA/cm: Fix leaking the multicast GID table reference |
Linux |
Linux |
2026-01-13T15:34:47.665Z | 2026-02-09T08:34:35.725Z |
| CVE-2025-71083 |
N/A
|
drm/ttm: Avoid NULL pointer deref for evicted BOs |
Linux |
Linux |
2026-01-13T15:34:46.974Z | 2026-02-09T08:34:34.629Z |
| CVE-2025-71082 |
N/A
|
Bluetooth: btusb: revert use of devm_kzalloc in btusb |
Linux |
Linux |
2026-01-13T15:34:46.301Z | 2026-02-09T08:34:33.532Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-71113 | In the Linux kernel, the following vulnerability has been resolved: crypto: af_alg - zero initiali… | 2026-01-14T15:16:00.433 | 2026-01-19T13:16:18.450 |
| fkie_cve-2025-71112 | In the Linux kernel, the following vulnerability has been resolved: net: hns3: add VLAN id validat… | 2026-01-14T15:16:00.313 | 2026-01-19T13:16:18.353 |
| fkie_cve-2025-71111 | In the Linux kernel, the following vulnerability has been resolved: hwmon: (w83791d) Convert macro… | 2026-01-14T15:16:00.193 | 2026-01-19T13:16:18.260 |
| fkie_cve-2025-71108 | In the Linux kernel, the following vulnerability has been resolved: usb: typec: ucsi: Handle incor… | 2026-01-14T15:15:59.867 | 2026-01-19T13:16:18.163 |
| fkie_cve-2025-71105 | In the Linux kernel, the following vulnerability has been resolved: f2fs: use global inline_xattr_… | 2026-01-14T15:15:59.533 | 2026-01-19T13:16:18.053 |
| fkie_cve-2025-71104 | In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Fix VM hard lockup a… | 2026-01-14T15:15:59.423 | 2026-01-19T13:16:17.953 |
| fkie_cve-2025-71102 | In the Linux kernel, the following vulnerability has been resolved: scs: fix a wrong parameter in … | 2026-01-14T15:15:59.210 | 2026-01-19T13:16:17.857 |
| fkie_cve-2025-71098 | In the Linux kernel, the following vulnerability has been resolved: ip6_gre: make ip6gre_header() … | 2026-01-13T16:16:09.703 | 2026-01-19T13:16:17.760 |
| fkie_cve-2025-71097 | In the Linux kernel, the following vulnerability has been resolved: ipv4: Fix reference count leak… | 2026-01-13T16:16:09.583 | 2026-01-19T13:16:17.663 |
| fkie_cve-2025-71096 | In the Linux kernel, the following vulnerability has been resolved: RDMA/core: Check for the prese… | 2026-01-13T16:16:09.470 | 2026-01-19T13:16:17.567 |
| fkie_cve-2025-71094 | In the Linux kernel, the following vulnerability has been resolved: net: usb: asix: validate PHY a… | 2026-01-13T16:16:09.150 | 2026-01-19T13:16:17.467 |
| fkie_cve-2025-71093 | In the Linux kernel, the following vulnerability has been resolved: e1000: fix OOB in e1000_tbi_sh… | 2026-01-13T16:16:09.033 | 2026-01-19T13:16:17.347 |
| fkie_cve-2025-71091 | In the Linux kernel, the following vulnerability has been resolved: team: fix check for port enabl… | 2026-01-13T16:16:08.810 | 2026-01-19T13:16:17.250 |
| fkie_cve-2025-71087 | In the Linux kernel, the following vulnerability has been resolved: iavf: fix off-by-one issues in… | 2026-01-13T16:16:08.343 | 2026-01-19T13:16:17.150 |
| fkie_cve-2025-71086 | In the Linux kernel, the following vulnerability has been resolved: net: rose: fix invalid array i… | 2026-01-13T16:16:08.230 | 2026-01-19T13:16:17.053 |
| fkie_cve-2025-71085 | In the Linux kernel, the following vulnerability has been resolved: ipv6: BUG() in pskb_expand_hea… | 2026-01-13T16:16:08.117 | 2026-01-19T13:16:16.953 |
| fkie_cve-2025-71084 | In the Linux kernel, the following vulnerability has been resolved: RDMA/cm: Fix leaking the multi… | 2026-01-13T16:16:08.007 | 2026-01-19T13:16:16.863 |
| fkie_cve-2025-71083 | In the Linux kernel, the following vulnerability has been resolved: drm/ttm: Avoid NULL pointer de… | 2026-01-13T16:16:07.893 | 2026-01-19T13:16:16.767 |
| fkie_cve-2025-71082 | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btusb: revert use o… | 2026-01-13T16:16:07.780 | 2026-01-19T13:16:16.667 |
| fkie_cve-2025-71081 | In the Linux kernel, the following vulnerability has been resolved: ASoC: stm32: sai: fix OF node … | 2026-01-13T16:16:07.660 | 2026-01-19T13:16:16.567 |
| fkie_cve-2025-71079 | In the Linux kernel, the following vulnerability has been resolved: net: nfc: fix deadlock between… | 2026-01-13T16:16:07.433 | 2026-01-19T13:16:16.467 |
| fkie_cve-2025-71078 | In the Linux kernel, the following vulnerability has been resolved: powerpc/64s/slb: Fix SLB multi… | 2026-01-13T16:16:07.317 | 2026-01-19T13:16:16.363 |
| fkie_cve-2025-71077 | In the Linux kernel, the following vulnerability has been resolved: tpm: Cap the number of PCR ban… | 2026-01-13T16:16:07.200 | 2026-01-19T13:16:16.267 |
| fkie_cve-2025-71075 | In the Linux kernel, the following vulnerability has been resolved: scsi: aic94xx: fix use-after-f… | 2026-01-13T16:16:06.977 | 2026-01-19T13:16:16.167 |
| fkie_cve-2025-71069 | In the Linux kernel, the following vulnerability has been resolved: f2fs: invalidate dentry cache … | 2026-01-13T16:16:06.300 | 2026-01-19T13:16:16.067 |
| fkie_cve-2025-71068 | In the Linux kernel, the following vulnerability has been resolved: svcrdma: bound check rq_pages … | 2026-01-13T16:16:06.187 | 2026-01-19T13:16:15.973 |
| fkie_cve-2025-71066 | In the Linux kernel, the following vulnerability has been resolved: net/sched: ets: Always remove … | 2026-01-13T16:16:05.960 | 2026-01-19T13:16:15.863 |
| fkie_cve-2025-71064 | In the Linux kernel, the following vulnerability has been resolved: net: hns3: using the num_tqps … | 2026-01-13T16:16:05.740 | 2026-01-19T13:16:15.763 |
| fkie_cve-2025-68821 | In the Linux kernel, the following vulnerability has been resolved: fuse: fix readahead reclaim de… | 2026-01-13T16:16:04.440 | 2026-01-19T13:16:15.663 |
| fkie_cve-2025-68820 | In the Linux kernel, the following vulnerability has been resolved: ext4: xattr: fix null pointer … | 2026-01-13T16:16:04.327 | 2026-01-19T13:16:15.563 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-72q9-j6v7-8v8v |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-6cwg-57p4-7fxc |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-6cv4-c7r3-gm9q |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-663j-wmv9-mph8 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-5w46-mjp2-2687 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-3r6q-fp39-vrgw |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-3fp8-5gxg-cm93 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-2jjh-699r-xmc8 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-2gf3-jh5q-424w |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-x8x6-9g4r-x75p |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-wx82-w23f-w8jp |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-wjw3-5hm6-mw94 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-qfmr-5638-wr4j |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-p7gf-xmv9-cjxg |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-jwxq-6v3p-8vw5 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-jwch-2pcm-p9rg |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-jqg5-gvgh-f676 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-jh73-v795-5fpj |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-h85f-rq5f-jxh2 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-h42r-9gq7-6qj6 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-g974-762p-2jgj |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-fv4r-hhcm-5686 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-9r2p-4qfw-jcgh |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-9h3w-w3wc-4m3g |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-94w9-pfw6-pv3m |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-8jcj-m542-p8q5 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-2x9m-6c92-hh49 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-qm2c-v5cv-h595 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:32Z | 2026-01-02T18:30:32Z |
| ghsa-q78c-4p9j-hx79 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:32Z | 2026-01-02T18:30:32Z |
| ghsa-q6px-hfwh-g86m |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:32Z | 2026-01-02T18:30:32Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-25352 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.070869Z |
| gsd-2024-25301 | Redaxo v5.15.1 was discovered to contain a remote code execution (RCE) vulnerability via … | 2024-02-08T06:02:25.070587Z |
| gsd-2024-25238 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.070265Z |
| gsd-2024-25501 | An issue WinMail v.7.1 and v.5.1 and before allows a remote attacker to execute arbitrary… | 2024-02-08T06:02:25.069988Z |
| gsd-2024-25371 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.069767Z |
| gsd-2024-25522 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.069480Z |
| gsd-2024-25270 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.068667Z |
| gsd-2024-25524 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.068117Z |
| gsd-2024-25264 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.067826Z |
| gsd-2024-25222 | Task Manager App v1.0 was discovered to contain a SQL injection vulnerability via the pro… | 2024-02-08T06:02:25.067596Z |
| gsd-2024-25202 | Cross Site Scripting vulnerability in Phpgurukul User Registration & Login and User Manag… | 2024-02-08T06:02:25.066788Z |
| gsd-2024-25550 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.066451Z |
| gsd-2024-25491 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.066224Z |
| gsd-2024-25463 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.066005Z |
| gsd-2024-25261 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.065712Z |
| gsd-2024-25425 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.065202Z |
| gsd-2024-25391 | A stack buffer overflow occurs in libc/posix/ipc/mqueue.c in RT-Thread through 5.0.2. | 2024-02-08T06:02:25.064907Z |
| gsd-2024-25475 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.064612Z |
| gsd-2024-25462 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.064378Z |
| gsd-2024-25408 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.064080Z |
| gsd-2024-25311 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.063473Z |
| gsd-2024-25361 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.062766Z |
| gsd-2024-25443 | An issue in the HuginBase::ImageVariable<double>::linkWith function of Hugin v2022.0.0 al… | 2024-02-08T06:02:25.062539Z |
| gsd-2024-25490 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.062252Z |
| gsd-2024-25216 | Employee Managment System v1.0 was discovered to contain a SQL injection vulnerability vi… | 2024-02-08T06:02:25.062026Z |
| gsd-2024-25201 | Espruino 2v20 (commit fcc9ba4) was discovered to contain an Out-of-bounds Read via jsvStr… | 2024-02-08T06:02:25.061448Z |
| gsd-2024-25274 | An arbitrary file upload vulnerability in the component /sysFile/upload of Novel-Plus v4.… | 2024-02-08T06:02:25.061025Z |
| gsd-2024-25160 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.060466Z |
| gsd-2024-25507 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.059847Z |
| gsd-2024-25325 | SQL injection vulnerability in Employee Management System v.1.0 allows a local attacker t… | 2024-02-08T06:02:25.059566Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-183574 | Malicious code in lomi-fus-ufisaga (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183573 | Malicious code in lomi-fus-ufga (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183572 | Malicious code in lomi-fuis-ufisga (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183571 | Malicious code in lomi-fuis-ufisa (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183570 | Malicious code in lomi-fuis-fso (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183569 | Malicious code in lomi-fuis-fsa (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183568 | Malicious code in lomi-fuis-fs (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183567 | Malicious code in lomi-fuis-fiso (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183566 | Malicious code in lomi-fuis-fas (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183565 | Malicious code in lomi-fuis-fans (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183564 | Malicious code in lomi-fuis-faniso (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183563 | Malicious code in lomi-fuis-fangususo (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183562 | Malicious code in lomi-fuis-fangusuiso (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183561 | Malicious code in lomi-fuis-fangusso (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183560 | Malicious code in lomi-fuis-fangusauiso (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183559 | Malicious code in lomi-fuis-fangusaugiso (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183558 | Malicious code in lomi-fuis-fangusaugaiso (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183557 | Malicious code in lomi-fuis-fangusauaiso (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183556 | Malicious code in lomi-fuis-fanguaiso (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183555 | Malicious code in lomi-fuis-fangsuaiso (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183554 | Malicious code in lomi-fuis-fangsso (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183553 | Malicious code in lomi-fuis-fangso (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183552 | Malicious code in lomi-fuis-fangs (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183551 | Malicious code in lomi-fuis-fangiso (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183550 | Malicious code in lomi-fuis-fangaiso (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183549 | Malicious code in lomi-fuis-faks (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183548 | Malicious code in lomi-fuis-fakiugaubas (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183547 | Malicious code in lomi-fuis-fakiugabas (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183546 | Malicious code in lomi-fuis-fakiugaas (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183545 | Malicious code in lomi-fuis-fakiuas (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2023:5474 | Red Hat Security Advisory: bind security update | 2023-10-05T14:42:18+00:00 | 2025-11-21T18:46:16+00:00 |
| rhsa-2023:5473 | Red Hat Security Advisory: bind security update | 2023-10-05T14:36:14+00:00 | 2025-11-21T18:46:16+00:00 |
| rhsa-2023:5472 | Red Hat Security Advisory: python3.9 security update | 2023-10-05T14:27:59+00:00 | 2025-11-21T18:46:16+00:00 |
| rhsa-2023:5462 | Red Hat Security Advisory: python3.9 security update | 2023-10-05T13:39:32+00:00 | 2025-11-21T18:46:16+00:00 |
| rhsa-2023:5465 | Red Hat Security Advisory: frr security update | 2023-10-05T14:39:28+00:00 | 2025-11-21T18:46:14+00:00 |
| rhsa-2023:5464 | Red Hat Security Advisory: frr security update | 2023-10-05T13:05:06+00:00 | 2025-11-21T18:46:14+00:00 |
| rhsa-2023:5463 | Red Hat Security Advisory: python3.11 security update | 2023-10-05T14:05:46+00:00 | 2025-11-21T18:46:13+00:00 |
| rhsa-2023:5461 | Red Hat Security Advisory: ImageMagick security update | 2023-10-05T13:36:54+00:00 | 2025-11-21T18:46:11+00:00 |
| rhsa-2023:5460 | Red Hat Security Advisory: bind9.16 security update | 2023-10-05T13:13:08+00:00 | 2025-11-21T18:46:11+00:00 |
| rhsa-2023:5459 | Red Hat Security Advisory: ghostscript security update | 2023-10-05T14:48:51+00:00 | 2025-11-21T18:46:10+00:00 |
| rhsa-2023:5458 | Red Hat Security Advisory: libeconf security update | 2023-10-05T13:08:45+00:00 | 2025-11-21T18:46:09+00:00 |
| rhsa-2023:5457 | Red Hat Security Advisory: frr security update | 2023-10-05T14:44:02+00:00 | 2025-11-21T18:46:09+00:00 |
| rhsa-2023:5456 | Red Hat Security Advisory: python3.11 security update | 2023-10-05T13:34:00+00:00 | 2025-11-21T18:46:01+00:00 |
| rhsa-2023:5414 | Red Hat Security Advisory: kernel security update | 2023-10-03T07:17:35+00:00 | 2025-11-21T18:45:45+00:00 |
| rhsa-2023:5405 | Red Hat Security Advisory: virt:av and virt-devel:av security update | 2023-09-28T19:02:26+00:00 | 2025-11-21T18:45:45+00:00 |
| rhsa-2023:5353 | Red Hat Security Advisory: libtiff security update | 2023-09-26T09:25:57+00:00 | 2025-11-21T18:45:40+00:00 |
| rhsa-2023:5309 | Red Hat Security Advisory: libwebp security update | 2023-09-20T16:46:21+00:00 | 2025-11-21T18:45:34+00:00 |
| rhsa-2023:5264 | Red Hat Security Advisory: virt:rhel and virt-devel:rhel security and bug fix update | 2023-09-19T15:13:14+00:00 | 2025-11-21T18:45:32+00:00 |
| rhsa-2023:5252 | Red Hat Security Advisory: dmidecode security update | 2023-09-19T14:09:17+00:00 | 2025-11-21T18:45:30+00:00 |
| rhsa-2023:5249 | Red Hat Security Advisory: ncurses security update | 2023-09-19T14:10:14+00:00 | 2025-11-21T18:45:30+00:00 |
| rhsa-2023:5239 | Red Hat Security Advisory: virt:rhel and virt-devel:rhel security update | 2023-09-19T13:08:33+00:00 | 2025-11-21T18:45:29+00:00 |
| rhsa-2023:5238 | Red Hat Security Advisory: kernel security update | 2023-09-19T12:41:04+00:00 | 2025-11-21T18:45:28+00:00 |
| rhsa-2023:5236 | Red Hat Security Advisory: libwebp: critical security update | 2023-09-19T12:43:31+00:00 | 2025-11-21T18:45:28+00:00 |
| rhsa-2023:5221 | Red Hat Security Advisory: kpatch-patch security update | 2023-09-19T08:06:11+00:00 | 2025-11-21T18:45:28+00:00 |
| rhsa-2023:5235 | Red Hat Security Advisory: kpatch-patch security update | 2023-09-19T12:42:34+00:00 | 2025-11-21T18:45:27+00:00 |
| rhsa-2023:5224 | Red Hat Security Advisory: thunderbird security update | 2023-09-19T08:05:47+00:00 | 2025-11-21T18:45:26+00:00 |
| rhsa-2023:5223 | Red Hat Security Advisory: thunderbird security update | 2023-09-19T08:04:31+00:00 | 2025-11-21T18:45:26+00:00 |
| rhsa-2023:5222 | Red Hat Security Advisory: libwebp security update | 2023-09-19T08:01:54+00:00 | 2025-11-21T18:45:25+00:00 |
| rhsa-2023:5219 | Red Hat Security Advisory: frr security and bug fix update | 2023-09-19T08:07:49+00:00 | 2025-11-21T18:45:24+00:00 |
| rhsa-2023:5206 | Red Hat Security Advisory: RHACS 4.2 enhancement and security update | 2023-09-18T16:39:39+00:00 | 2025-11-21T18:45:23+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2020-36332 | A flaw was found in libwebp in versions before 1.0.1. When reading a file libwebp allocates an excessive amount of memory. The highest threat from this vulnerability is to the service availability. | 2021-05-02T00:00:00.000Z | 2021-05-25T00:00:00.000Z |
| msrc_cve-2020-36331 | A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function ChunkAssignData. The highest threat from this vulnerability is to data confidentiality and to the service availability. | 2021-05-02T00:00:00.000Z | 2021-05-25T00:00:00.000Z |
| msrc_cve-2020-36330 | A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function ChunkVerifyAndAssign. The highest threat from this vulnerability is to data confidentiality and to the service availability. | 2021-05-02T00:00:00.000Z | 2021-05-25T00:00:00.000Z |
| msrc_cve-2020-36329 | A flaw was found in libwebp in versions before 1.0.1. A use-after-free was found due to a thread being killed too early. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | 2021-05-02T00:00:00.000Z | 2021-05-25T00:00:00.000Z |
| msrc_cve-2020-36328 | A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow in function WebPDecodeRGBInto is possible due to an invalid check for buffer size. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | 2021-05-02T00:00:00.000Z | 2021-05-25T00:00:00.000Z |
| msrc_cve-2018-25014 | A use of uninitialized value was found in libwebp in versions before 1.0.1 in ReadSymbol(). | 2021-05-02T00:00:00.000Z | 2021-05-25T00:00:00.000Z |
| msrc_cve-2018-25013 | A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in ShiftBytes(). | 2021-05-02T00:00:00.000Z | 2021-05-25T00:00:00.000Z |
| msrc_cve-2018-25012 | A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in GetLE24(). | 2021-05-02T00:00:00.000Z | 2021-05-25T00:00:00.000Z |
| msrc_cve-2018-25011 | A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in PutLE16(). | 2021-05-02T00:00:00.000Z | 2021-05-25T00:00:00.000Z |
| msrc_cve-2018-25010 | A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in ApplyFilter(). | 2021-05-02T00:00:00.000Z | 2021-05-25T00:00:00.000Z |
| msrc_cve-2018-25009 | A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in GetLE16(). | 2021-05-02T00:00:00.000Z | 2021-05-25T00:00:00.000Z |
| msrc_cve-2021-3537 | A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability. | 2021-05-02T00:00:00.000Z | 2021-05-20T00:00:00.000Z |
| msrc_cve-2021-25216 | A second vulnerability in BIND's GSSAPI security policy negotiation can be targeted by a buffer overflow attack | 2021-04-02T00:00:00.000Z | 2021-05-13T00:00:00.000Z |
| msrc_cve-2021-25214 | A broken inbound incremental zone update (IXFR) can cause named to terminate unexpectedly | 2021-04-02T00:00:00.000Z | 2021-05-13T00:00:00.000Z |
| msrc_cve-2021-20266 | A flaw was found in RPM's hdrblobInit() in lib/header.c. This flaw allows an attacker who can modify the rpmdb to cause an out-of-bounds read. The highest threat from this vulnerability is to system availability. | 2021-04-02T00:00:00.000Z | 2021-05-13T00:00:00.000Z |
| msrc_cve-2021-25215 | An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself | 2021-04-02T00:00:00.000Z | 2021-05-10T00:00:00.000Z |
| msrc_cve-2021-20294 | A flaw was found in binutils readelf 2.35 program. An attacker who is able to convince a victim using readelf to read a crafted file could trigger a stack buffer overflow out-of-bounds write of arbitrary data supplied by the attacker. The highest impact of this flaw is to confidentiality integrity and availability. | 2021-04-02T00:00:00.000Z | 2021-05-10T00:00:00.000Z |
| msrc_cve-2021-20271 | A flaw was found in RPM's signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package whose signature header was modified to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity confidentiality and system availability. | 2021-03-02T00:00:00.000Z | 2021-04-01T00:00:00.000Z |
| msrc_cve-2021-3409 | The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this. | 2021-03-02T00:00:00.000Z | 2021-03-30T00:00:00.000Z |
| msrc_cve-2021-3392 | A use-after-free flaw was found in the MegaRAID emulator of QEMU. This issue occurs while processing SCSI I/O requests in the case of an error mptsas_free_request() that does not dequeue the request object 'req' from a pending requests queue. This flaw allows a privileged guest user to crash the QEMU process on the host resulting in a denial of service. Versions between 2.10.0 and 5.2.0 are potentially affected. | 2021-03-02T00:00:00.000Z | 2021-03-30T00:00:00.000Z |
| msrc_cve-2020-35492 | A flaw was found in cairo's image-compositor.c in all versions prior to 1.17.4. This flaw allows an attacker who can provide a crafted input file to cairo's image-compositor (for example by convincing a user to open a file in an application using cairo or if an application uses cairo on untrusted input) to cause a stack buffer overflow -> out-of-bounds WRITE. The highest impact from this vulnerability is to confidentiality integrity as well as system availability. | 2021-03-02T00:00:00.000Z | 2021-03-30T00:00:00.000Z |
| msrc_cve-2021-27928 | A remote code execution issue was discovered in MariaDB 10.2 before 10.2.37 10.3 before 10.3.28 10.4 before 10.4.18 and 10.5 before 10.5.9; Percona Server through 2021-03-03; and the wsrep patch through 2021-03-03 for MySQL. An untrusted search path leads to eval injection in which a database SUPER user can execute OS commands after modifying wsrep_provider and wsrep_notify_cmd. NOTE: this does not affect an Oracle product. | 2021-03-02T00:00:00.000Z | 2021-03-27T00:00:00.000Z |
| msrc_cve-2021-20227 | A flaw was found in SQLite's SELECT query functionality (src/select.c). This flaw allows an attacker who is capable of running SQL queries locally on the SQLite database to cause a denial of service or possible code execution by triggering a use-after-free. The highest threat from this vulnerability is to system availability. | 2021-03-02T00:00:00.000Z | 2021-03-27T00:00:00.000Z |
| msrc_cve-2021-3416 | A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host resulting in DoS scenario. | 2021-03-02T00:00:00.000Z | 2021-03-26T00:00:00.000Z |
| msrc_cve-2021-3444 | Linux kernel bpf verifier incorrect mod32 truncation | 2021-03-02T00:00:00.000Z | 2021-03-25T00:00:00.000Z |
| msrc_cve-2021-27506 | The ClamAV Engine (version 0.103.1 and below) component embedded in Storsmshield Network Security (SNS) is subject to DoS in case of parsing of malformed png files. This affect Netasq versions 9.1.0 to 9.1.11 and SNS versions 1.0.0 to 4.2.0. This issue is fixed in SNS 3.7.19 3.11.7 and 4.2.1. | 2021-03-02T00:00:00.000Z | 2021-03-25T00:00:00.000Z |
| msrc_cve-2021-20268 | An out-of-bounds access flaw was found in the Linux kernel's implementation of the eBPF code verifier in the way a user running the eBPF script calls dev_map_init_map or sock_map_alloc. This flaw allows a local user to crash the system or possibly escalate their privileges. The highest threat from this vulnerability is to confidentiality integrity as well as system availability. | 2021-03-02T00:00:00.000Z | 2021-03-25T00:00:00.000Z |
| msrc_cve-2021-3411 | A flaw was found in the Linux kernel in versions prior to 5.10. A violation of memory access was found while detecting a padding of int3 in the linking state. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | 2021-03-02T00:00:00.000Z | 2021-03-13T00:00:00.000Z |
| msrc_cve-2021-28041 | ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios such as unconstrained agent-socket access on a legacy operating system or the forwarding of an agent to an attacker-controlled host. | 2021-03-02T00:00:00.000Z | 2021-03-10T00:00:00.000Z |
| msrc_cve-2020-8277 | A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1 < 14.15.1 and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1 14.15.1 and 12.19.1. | 2020-11-02T00:00:00.000Z | 2021-03-09T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-201609-0457 | Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows a… | 2025-04-13T23:02:32.820000Z |
| var-201604-0156 | Stack-based buffer overflow in Adobe Flash Player before 18.0.0.343 and 19.x through 21.x… | 2025-04-13T23:02:32.774000Z |
| var-201606-0504 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Ad… | 2025-04-13T23:02:32.735000Z |
| var-201607-0514 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows a… | 2025-04-13T23:02:32.681000Z |
| var-201606-0501 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Ad… | 2025-04-13T23:02:32.637000Z |
| var-201604-0522 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.343 and 19.x through 21.… | 2025-04-13T23:02:32.594000Z |
| var-201606-0048 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Ad… | 2025-04-13T23:02:32.554000Z |
| var-201604-0162 | Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows a… | 2025-04-13T23:02:32.475000Z |
| var-201604-0166 | Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows a… | 2025-04-13T23:02:32.434000Z |
| var-201606-0495 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Ad… | 2025-04-13T23:02:32.394000Z |
| var-201604-0154 | Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows a… | 2025-04-13T23:02:32.351000Z |
| var-201606-0509 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Ad… | 2025-04-13T23:02:32.309000Z |
| var-201609-0463 | Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows a… | 2025-04-13T23:02:32.262000Z |
| var-201606-0479 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Ad… | 2025-04-13T23:02:32.219000Z |
| var-201607-0087 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows a… | 2025-04-13T23:02:32.176000Z |
| var-201606-0507 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Ad… | 2025-04-13T23:02:32.133000Z |
| var-201609-0579 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.… | 2025-04-13T23:02:32.088000Z |
| var-201607-0086 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows a… | 2025-04-13T23:02:32.040000Z |
| var-201607-0523 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.… | 2025-04-13T23:02:31.957000Z |
| var-201607-0098 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows a… | 2025-04-13T23:02:31.872000Z |
| var-201607-0092 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows a… | 2025-04-13T23:02:31.795000Z |
| var-201604-0161 | Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows a… | 2025-04-13T23:02:31.716000Z |
| var-201607-0089 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.… | 2025-04-13T23:02:31.668000Z |
| var-201606-0492 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Ad… | 2025-04-13T23:02:31.626000Z |
| var-201609-0573 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.… | 2025-04-13T23:02:31.571000Z |
| var-201609-0574 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.… | 2025-04-13T23:02:30.648000Z |
| var-201606-0053 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Ad… | 2025-04-13T23:02:30.608000Z |
| var-201606-0503 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Ad… | 2025-04-13T23:02:30.567000Z |
| var-201607-0517 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows a… | 2025-04-13T23:02:30.521000Z |
| var-201610-0463 | Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows a… | 2025-04-13T23:02:30.473000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2020:2881-1 | Security update for tigervnc | 2020-10-09T12:43:55Z | 2020-10-09T12:43:55Z |
| suse-su-2020:2880-1 | Security update for tigervnc | 2020-10-09T12:43:23Z | 2020-10-09T12:43:23Z |
| suse-su-2020:2879-1 | Security update for the Linux Kernel | 2020-10-08T13:05:37Z | 2020-10-08T13:05:37Z |
| suse-su-2020:2877-1 | Security update for qemu | 2020-10-07T12:43:34Z | 2020-10-07T12:43:34Z |
| suse-su-2020:2876-1 | Security update for ardana-ansible, ardana-cinder, ardana-cobbler, ardana-installer-ui, ardana-opsconsole-ui, ardana-osconfig, crowbar-core, grafana, grafana-natel-discrete-panel, openstack-cinder, openstack-dashboard, openstack-ironic, openstack-ironic-python-agent, openstack-manila, openstack-neutron, openstack-neutron-infoblox, openstack-nova, python-Flask-Cors, rubygem-crowbar-client, storm, storm-kit, venv-openstack-cinder, venv-openstack-horizon | 2020-10-07T11:40:24Z | 2020-10-07T11:40:24Z |
| suse-su-2020:2872-1 | Security update for hexchat | 2020-10-06T15:39:27Z | 2020-10-06T15:39:27Z |
| suse-su-2020:2870-1 | Security update for nodejs8 | 2020-10-06T15:39:14Z | 2020-10-06T15:39:14Z |
| suse-su-2020:2864-1 | Security update for gnutls | 2020-10-06T08:34:18Z | 2020-10-06T08:34:18Z |
| suse-su-2020:14511-1 | Security update for openssl1 | 2020-10-05T15:29:58Z | 2020-10-05T15:29:58Z |
| suse-su-2020:2861-1 | Security update for java-1_7_0-openjdk | 2020-10-05T15:29:09Z | 2020-10-05T15:29:09Z |
| suse-su-2020:14510-1 | Security update for perl-DBI | 2020-10-05T12:13:10Z | 2020-10-05T12:13:10Z |
| suse-su-2020:2856-1 | Security update for perl-DBI | 2020-10-05T07:44:34Z | 2020-10-05T07:44:34Z |
| suse-su-2020:2830-1 | Security update for permissions | 2020-10-02T08:34:30Z | 2020-10-02T08:34:30Z |
| suse-su-2020:2829-1 | Security update for nodejs10 | 2020-10-02T08:34:15Z | 2020-10-02T08:34:15Z |
| suse-su-2020:2828-1 | Security update for perl-DBI | 2020-10-02T08:33:26Z | 2020-10-02T08:33:26Z |
| suse-su-2020:2827-1 | Security update for perl-DBI | 2020-10-02T08:33:13Z | 2020-10-02T08:33:13Z |
| suse-su-2020:2823-1 | Security update for nodejs10 | 2020-10-01T12:02:36Z | 2020-10-01T12:02:36Z |
| suse-su-2020:2822-1 | Security update for xen | 2020-10-01T10:33:59Z | 2020-10-01T10:33:59Z |
| suse-su-2020:2814-1 | Security update for permissions | 2020-10-01T07:55:40Z | 2020-10-01T07:55:40Z |
| suse-su-2020:2813-1 | Security update for nodejs12 | 2020-10-01T07:55:11Z | 2020-10-01T07:55:11Z |
| suse-su-2020:2812-1 | Security update for nodejs12 | 2020-10-01T07:54:58Z | 2020-10-01T07:54:58Z |
| suse-su-2020:2807-1 | Security update for aspell | 2020-09-30T12:36:40Z | 2020-09-30T12:36:40Z |
| suse-su-2020:2806-1 | Security update for tar | 2020-09-30T12:36:13Z | 2020-09-30T12:36:13Z |
| suse-su-2020:2800-1 | Security update for nodejs8 | 2020-09-30T07:56:15Z | 2020-09-30T07:56:15Z |
| suse-su-2020:2792-1 | Security update for bcm43xx-firmware | 2020-09-29T12:15:03Z | 2020-09-29T12:15:03Z |
| suse-su-2020:2791-1 | Security update for xen | 2020-09-29T12:13:49Z | 2020-09-29T12:13:49Z |
| suse-su-2020:2790-1 | Security update for xen | 2020-09-29T12:13:34Z | 2020-09-29T12:13:34Z |
| suse-su-2020:2789-1 | Security update for xen | 2020-09-29T12:13:18Z | 2020-09-29T12:13:18Z |
| suse-su-2020:2788-1 | Security update for xen | 2020-09-29T12:13:04Z | 2020-09-29T12:13:04Z |
| suse-su-2020:2787-1 | Security update for xen | 2020-09-29T12:12:46Z | 2020-09-29T12:12:46Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2024-39667 | Microsoft Dynamics 365(On-Premises)信息泄露漏洞(CNVD-2024-39667) | 2024-06-14 | 2024-09-30 |
| cnvd-2024-39666 | GTKWave操作系统命令注入漏洞(CNVD-2024-39666) | 2024-01-11 | 2024-09-30 |
| cnvd-2024-39665 | GTKWave操作系统命令注入漏洞(CNVD-2024-39665) | 2024-01-11 | 2024-09-30 |
| cnvd-2024-39664 | GTKWave操作系统命令注入漏洞(CNVD-2024-39664) | 2024-01-11 | 2024-09-30 |
| cnvd-2024-39663 | GTKWave操作系统命令注入漏洞 | 2024-01-11 | 2024-09-30 |
| cnvd-2024-39662 | Microsoft Edge (Chromium-based)远程代码执行漏洞(CNVD-2024-39662) | 2024-07-26 | 2024-09-30 |
| cnvd-2024-39661 | Microsoft Edge (HTML-based)内存破坏漏洞(CNVD-2024-39661) | 2024-08-12 | 2024-09-30 |
| cnvd-2024-39660 | Microsoft Edge (HTML-based)内存破坏漏洞 | 2024-08-27 | 2024-09-30 |
| cnvd-2024-39659 | Microsoft Edge (Chromium-based)远程代码执行漏洞(CNVD-2024-39659) | 2024-08-29 | 2024-09-30 |
| cnvd-2024-39658 | Microsoft Edge (Chromium-based)信息泄露漏洞(CNVD-2024-39658) | 2024-09-14 | 2024-09-30 |
| cnvd-2024-39657 | Microsoft Edge (Chromium-based)信息泄露漏洞(CNVD-2024-39657) | 2024-09-14 | 2024-09-30 |
| cnvd-2024-39656 | Microsoft Edge (Chromium-based)远程代码执行漏洞(CNVD-2024-39656) | 2024-09-23 | 2024-09-30 |
| cnvd-2024-39655 | GTKWave内存错误引用漏洞(CNVD-2024-39655) | 2024-01-11 | 2024-09-30 |
| cnvd-2024-39654 | Kofax Power PDF内存错误引用信息泄露漏洞(CNVD-2024-39654) | 2024-08-13 | 2024-09-30 |
| cnvd-2024-39640 | Kofax Power PDF内存错误引用信息泄露漏洞 | 2024-08-13 | 2024-09-30 |
| cnvd-2024-39639 | GTKWave越界写入漏洞(CNVD-2024-39639) | 2024-01-11 | 2024-09-30 |
| cnvd-2024-39638 | GTKWave代码问题漏洞 | 2024-01-11 | 2024-09-30 |
| cnvd-2024-39637 | GTKWave内存错误引用漏洞(CNVD-2024-39637) | 2024-01-11 | 2024-09-30 |
| cnvd-2024-39526 | Microsoft Edge (Chromium-based)远程代码执行漏洞(CNVD-2024-39526) | 2024-08-12 | 2024-09-30 |
| cnvd-2024-38477 | 广州万户网络技术有限公司ezEIP存在SQL注入漏洞 | 2024-08-16 | 2024-09-30 |
| cnvd-2024-38466 | 北京亿赛通科技发展有限责任公司电子文档安全管理系统存在命令执行漏洞(CNVD-2024-38466) | 2024-08-16 | 2024-09-30 |
| cnvd-2024-38465 | 北京亿赛通科技发展有限责任公司电子文档安全管理系统存在命令执行漏洞(CNVD-2024-38465) | 2024-08-16 | 2024-09-30 |
| cnvd-2024-39584 | Apache Hertzbeat SQL注入漏洞 | 2024-08-23 | 2024-09-29 |
| cnvd-2024-39583 | SeaCMS跨站脚本漏洞(CNVD-2024-39583) | 2024-09-05 | 2024-09-29 |
| cnvd-2024-39525 | Microsoft SharePoint Server远程代码执行漏洞(CNVD-2024-39525) | 2024-09-12 | 2024-09-29 |
| cnvd-2024-39524 | Microsoft SharePoint Server远程代码执行漏洞(CNVD-2024-39524) | 2024-09-12 | 2024-09-29 |
| cnvd-2024-39523 | Microsoft SharePoint Server远程代码执行漏洞(CNVD-2024-39523) | 2024-09-12 | 2024-09-29 |
| cnvd-2024-39522 | Microsoft SharePoint Server拒绝服务漏洞(CNVD-2024-39522) | 2024-09-12 | 2024-09-29 |
| cnvd-2024-39521 | Microsoft SharePoint Server远程代码执行漏洞(CNVD-2024-39521) | 2024-09-12 | 2024-09-29 |
| cnvd-2024-39286 | Linux kernel存在未明漏洞(CNVD-2024-39286) | 2024-09-20 | 2024-09-29 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2010-avi-336 | Vulnérabilité dans JBoss ESB | 2010-07-27T00:00:00.000000 | 2010-07-27T00:00:00.000000 |
| certa-2010-avi-335 | Vulnérabilité dans Mozilla Firefox | 2010-07-26T00:00:00.000000 | 2010-07-26T00:00:00.000000 |
| certa-2010-avi-334 | Vulnérabilité dans RSA Federated Identity Manager | 2010-07-22T00:00:00.000000 | 2010-07-22T00:00:00.000000 |
| certa-2010-avi-333 | Vulnérabilité dans Novell Teaming | 2010-07-22T00:00:00.000000 | 2010-07-22T00:00:00.000000 |
| certa-2010-avi-332 | Vulnérabilité dans Cisco CDS Internet Streamer | 2010-07-22T00:00:00.000000 | 2010-07-22T00:00:00.000000 |
| certa-2010-avi-331 | Vulnérabilité dans SAP J2EE | 2010-07-22T00:00:00.000000 | 2010-07-22T00:00:00.000000 |
| certa-2010-avi-330 | Vulnérabilité dans HP OpenView Network Node Manager | 2010-07-22T00:00:00.000000 | 2010-07-22T00:00:00.000000 |
| certa-2010-avi-329 | Vulnérabilité dans Intel Math Kernel Library | 2010-07-21T00:00:00.000000 | 2010-07-21T00:00:00.000000 |
| certa-2010-avi-328 | Vulnérabilité dans HP OpenView Network Node Manager | 2010-07-21T00:00:00.000000 | 2010-07-21T00:00:00.000000 |
| certa-2010-avi-327 | Multiples vulnérabilités dans les produits Mozilla | 2010-07-21T00:00:00.000000 | 2010-07-21T00:00:00.000000 |
| certa-2010-avi-291 | Multiples vulnérabilités dans libpng | 2010-06-28T00:00:00.000000 | 2010-07-21T00:00:00.000000 |
| certa-2010-avi-326 | Vulnérabilités dans VMware vCenter Update Manager | 2010-07-20T00:00:00.000000 | 2010-07-20T00:00:00.000000 |
| certa-2010-avi-324 | Vulnérabilité dans Apple iTunes | 2010-07-20T00:00:00.000000 | 2010-07-20T00:00:00.000000 |
| certa-2010-avi-323 | Vulnérabilité dans IBM SolidDB | 2010-07-19T00:00:00.000000 | 2010-07-19T00:00:00.000000 |
| certa-2010-avi-322 | Vulnérabilités dans F5 FirePass | 2010-07-19T00:00:00.000000 | 2010-07-19T00:00:00.000000 |
| certa-2010-avi-321 | Vulnérabilité dans IBM AIX | 2010-07-19T00:00:00.000000 | 2010-07-19T00:00:00.000000 |
| certa-2010-avi-320 | Vulnérabilité dans ISC Bind | 2010-07-19T00:00:00.000000 | 2010-07-19T00:00:00.000000 |
| certa-2010-avi-319 | Multiples vulnérabilités dans les produits Novell GroupeWise | 2010-07-19T00:00:00.000000 | 2010-07-19T00:00:00.000000 |
| certa-2010-avi-318 | Multiples vulnérabilités dans Joomla! | 2010-07-19T00:00:00.000000 | 2010-07-19T00:00:00.000000 |
| certa-2010-avi-317 | Multiples vulnérabilités dans HP Insight | 2010-07-16T00:00:00.000000 | 2010-07-16T00:00:00.000000 |
| certa-2010-avi-316 | Multiples vulnérabilités dans Sun Solaris | 2010-07-16T00:00:00.000000 | 2010-07-16T00:00:00.000000 |
| certa-2010-avi-315 | Vulnérabilités dans FreeType | 2010-07-16T00:00:00.000000 | 2010-07-16T00:00:00.000000 |
| certa-2010-avi-314 | Multiples vulnérabilités dans les produits Oracle | 2010-07-15T00:00:00.000000 | 2010-07-15T00:00:00.000000 |
| certa-2010-avi-313 | Vulnérabilité de Microsoft Office Outlook | 2010-07-15T00:00:00.000000 | 2010-07-15T00:00:00.000000 |
| certa-2010-avi-312 | Vulnérabilités dans Microsoft Office Access | 2010-07-15T00:00:00.000000 | 2010-07-15T00:00:00.000000 |
| certa-2010-avi-311 | Vulnérabilité du pilote d'affichage canonique dans Microsoft Windows | 2010-07-15T00:00:00.000000 | 2010-07-15T00:00:00.000000 |
| certa-2010-avi-310 | Vulnérabilité dans le Centre d'aide et de support Windows | 2010-07-15T00:00:00.000000 | 2010-07-15T00:00:00.000000 |
| certa-2010-avi-214 | Multiples vulnérabilités dans PostgreSQL | 2010-05-18T00:00:00.000000 | 2010-07-15T00:00:00.000000 |
| certa-2010-avi-023 | Multiples vulnérabilités dans Realplayer et Helix Player | 2010-01-21T00:00:00.000000 | 2010-07-15T00:00:00.000000 |
| certa-2010-avi-309 | Vulnérabilités dans GNU gv | 2010-07-13T00:00:00.000000 | 2010-07-13T00:00:00.000000 |