Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-56353 |
7.5 (3.1)
|
In tinyMQTT commit 6226ade15bd4f97be2d196352e64dd… |
n/a |
n/a |
2026-01-20T00:00:00.000Z | 2026-01-21T14:39:58.418Z |
| CVE-2022-50905 |
6.1 (3.1)
9.8 (3.1)
|
e107 CMS v3.2.1 - Reflected XSS via Comment Flow |
e107 |
e107 CMS |
2026-01-13T22:51:48.032Z | 2026-01-21T14:38:26.972Z |
| CVE-2026-21974 |
5.3 (3.1)
|
Vulnerability in the Oracle Life Sciences Central… |
Oracle Corporation |
Oracle Life Sciences Central Designer |
2026-01-20T21:56:36.617Z | 2026-01-21T14:38:13.502Z |
| CVE-2025-65482 |
9.8 (3.1)
|
An XML External Entity (XXE) vulnerability in ope… |
n/a |
n/a |
2026-01-20T00:00:00.000Z | 2026-01-21T14:36:14.418Z |
| CVE-2026-21975 |
4.5 (3.1)
|
Vulnerability in the Java VM component of Oracle … |
Oracle Corporation |
Oracle Database Server |
2026-01-20T21:56:36.948Z | 2026-01-21T14:36:01.703Z |
| CVE-2025-64087 |
9.8 (3.1)
|
A Server-Side Template Injection (SSTI) vulnerabi… |
n/a |
n/a |
2026-01-20T00:00:00.000Z | 2026-01-21T14:34:26.011Z |
| CVE-2026-21981 |
4.6 (3.1)
|
Vulnerability in the Oracle VM VirtualBox product… |
Oracle Corporation |
Oracle VM VirtualBox |
2026-01-20T21:56:38.977Z | 2026-01-21T14:31:45.610Z |
| CVE-2026-0988 |
3.7 (3.1)
|
Glib: glib: denial of service via integer overflow in … |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-01-21T11:38:39.370Z | 2026-01-21T14:25:43.521Z |
| CVE-2025-14083 |
2.7 (3.1)
|
Keycloak-server: keycloak: improper access control in … |
Red Hat |
Red Hat Build of Keycloak |
2026-01-21T12:04:12.641Z | 2026-01-21T14:24:52.423Z |
| CVE-2025-50505 |
7.8 (3.1)
|
Clash Verge Rev thru 2.2.3 (fixed in 2.3.0) force… |
n/a |
n/a |
2025-10-07T00:00:00.000Z | 2026-01-21T14:12:55.381Z |
| CVE-2025-65397 |
6.8 (3.1)
|
An insecure authentication mechanism in the safe_… |
n/a |
n/a |
2026-01-14T00:00:00.000Z | 2026-01-21T13:51:06.694Z |
| CVE-2025-61662 |
7.8 (3.1)
|
Grub2: missing unregister call for gettext command may… |
GNU |
grub2 |
2025-11-18T18:20:48.351Z | 2026-01-21T13:15:44.599Z |
| CVE-2025-4478 |
6.5 (3.1)
|
Gnome-remote-desktop: freerdp: unauthenticated rdp pac… |
|
|
2025-05-16T14:22:17.265Z | 2026-01-21T13:03:22.938Z |
| CVE-2024-3623 |
6.5 (3.1)
|
Mirror-registry: default database secret key stored in… |
|
|
2024-04-25T17:46:47.141Z | 2026-01-21T13:03:17.136Z |
| CVE-2025-7424 |
7.5 (3.1)
|
Libxslt: type confusion in xmlnode.psvi between styles… |
GNOME |
libxslt |
2025-07-10T14:05:41.808Z | 2026-01-21T13:03:16.082Z |
| CVE-2025-5255 |
4.8 (4.0)
|
TCC Bypass via Dylib Injection in Phoenix Code |
Core.ai |
Phoenix Code |
2025-06-20T10:01:42.561Z | 2026-01-21T11:22:11.225Z |
| CVE-2025-59870 |
7.4 (3.1)
|
Improper management of a static JWT signing secret in … |
HCL Software |
MyXalytics |
2026-01-16T10:12:01.499Z | 2026-01-21T11:12:41.559Z |
| CVE-2025-39822 |
5.5 (3.1)
|
io_uring/kbuf: fix signedness in this_len calculation |
Linux |
Linux |
2025-09-16T13:00:21.533Z | 2026-01-21T06:54:26.396Z |
| CVE-2026-1180 |
5.8 (3.1)
|
Org.keycloak.protocol.oidc: blind server-side request … |
Red Hat |
Red Hat Build of Keycloak |
2026-01-20T12:33:00.556Z | 2026-01-21T05:52:01.084Z |
| CVE-2026-24020 |
N/A
|
Not used | N/A | N/A | 2026-01-21T03:55:09.158Z | |
| CVE-2026-24021 |
N/A
|
Not used | N/A | N/A | 2026-01-21T03:55:08.693Z | |
| CVE-2026-24022 |
N/A
|
Not used | N/A | N/A | 2026-01-21T03:55:08.207Z | |
| CVE-2026-24023 |
N/A
|
Not used | N/A | N/A | 2026-01-21T03:55:07.710Z | |
| CVE-2026-24024 |
N/A
|
Not used | N/A | N/A | 2026-01-21T03:55:07.239Z | |
| CVE-2026-24025 |
N/A
|
Not used | N/A | N/A | 2026-01-21T03:55:06.713Z | |
| CVE-2026-24026 |
N/A
|
Not used | N/A | N/A | 2026-01-21T03:55:05.986Z | |
| CVE-2026-21618 |
8.5 (4.0)
|
Cross-site scripting (XSS) in OAuth Device Authorizati… |
hexpm |
hexpm |
2026-01-19T14:22:46.770Z | 2026-01-21T03:45:42.733Z |
| CVE-2020-10188 |
N/A
|
utility.c in telnetd in netkit telnet through 0.1… |
n/a |
n/a |
2020-03-06T14:07:21.000Z | 2026-01-21T01:32:48.733Z |
| CVE-2025-64205 |
8.2 (3.1)
|
WordPress Jannah theme <= 7.6.0 - Local File Inclusion… |
TieLabs |
Jannah |
2025-12-18T07:22:11.263Z | 2026-01-20T21:48:33.454Z |
| CVE-2025-64225 |
6.1 (3.1)
|
WordPress Stockie Extra plugin <= 1.2.11 - Content Inj… |
colabrio |
Stockie Extra |
2025-12-18T07:22:13.245Z | 2026-01-20T21:46:48.570Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-71086 |
N/A
|
net: rose: fix invalid array index in rose_kill_by_device() |
Linux |
Linux |
2026-01-13T15:34:49.007Z | 2026-02-09T08:34:37.864Z |
| CVE-2025-71085 |
N/A
|
ipv6: BUG() in pskb_expand_head() as part of calipso_s… |
Linux |
Linux |
2026-01-13T15:34:48.324Z | 2026-02-09T08:34:36.802Z |
| CVE-2025-71084 |
N/A
|
RDMA/cm: Fix leaking the multicast GID table reference |
Linux |
Linux |
2026-01-13T15:34:47.665Z | 2026-02-09T08:34:35.725Z |
| CVE-2025-71083 |
N/A
|
drm/ttm: Avoid NULL pointer deref for evicted BOs |
Linux |
Linux |
2026-01-13T15:34:46.974Z | 2026-02-09T08:34:34.629Z |
| CVE-2025-71082 |
N/A
|
Bluetooth: btusb: revert use of devm_kzalloc in btusb |
Linux |
Linux |
2026-01-13T15:34:46.301Z | 2026-02-09T08:34:33.532Z |
| CVE-2025-71081 |
N/A
|
ASoC: stm32: sai: fix OF node leak on probe |
Linux |
Linux |
2026-01-13T15:34:45.503Z | 2026-02-09T08:34:32.444Z |
| CVE-2025-71079 |
N/A
|
net: nfc: fix deadlock between nfc_unregister_device a… |
Linux |
Linux |
2026-01-13T15:34:44.136Z | 2026-02-09T08:34:30.426Z |
| CVE-2025-71078 |
N/A
|
powerpc/64s/slb: Fix SLB multihit issue during SLB preload |
Linux |
Linux |
2026-01-13T15:34:43.437Z | 2026-02-09T08:34:29.368Z |
| CVE-2025-71077 |
N/A
|
tpm: Cap the number of PCR banks |
Linux |
Linux |
2026-01-13T15:31:29.435Z | 2026-02-09T08:34:28.240Z |
| CVE-2025-71075 |
N/A
|
scsi: aic94xx: fix use-after-free in device removal path |
Linux |
Linux |
2026-01-13T15:31:28.075Z | 2026-02-09T08:34:26.065Z |
| CVE-2025-71069 |
N/A
|
f2fs: invalidate dentry cache on failed whiteout creation |
Linux |
Linux |
2026-01-13T15:31:23.948Z | 2026-02-09T08:34:19.788Z |
| CVE-2025-71068 |
N/A
|
svcrdma: bound check rq_pages index in inline path |
Linux |
Linux |
2026-01-13T15:31:23.283Z | 2026-02-09T08:34:18.772Z |
| CVE-2025-71066 |
N/A
|
net/sched: ets: Always remove class from active list b… |
Linux |
Linux |
2026-01-13T15:31:21.931Z | 2026-02-09T08:34:16.660Z |
| CVE-2025-71064 |
N/A
|
net: hns3: using the num_tqps in the vf driver to appl… |
Linux |
Linux |
2026-01-13T15:31:20.503Z | 2026-02-09T08:34:14.420Z |
| CVE-2025-68821 |
N/A
|
fuse: fix readahead reclaim deadlock |
Linux |
Linux |
2026-01-13T15:29:24.014Z | 2026-02-09T08:34:11.363Z |
| CVE-2025-68820 |
N/A
|
ext4: xattr: fix null pointer deref in ext4_raw_inode() |
Linux |
Linux |
2026-01-13T15:29:23.351Z | 2026-02-09T08:34:10.331Z |
| CVE-2025-68819 |
N/A
|
media: dvb-usb: dtv5100: fix out-of-bounds in dtv5100_… |
Linux |
Linux |
2026-01-13T15:29:22.695Z | 2026-02-09T08:34:09.266Z |
| CVE-2025-68818 |
N/A
|
scsi: Revert "scsi: qla2xxx: Perform lockless command … |
Linux |
Linux |
2026-01-13T15:29:22.018Z | 2026-02-09T08:34:08.239Z |
| CVE-2025-68816 |
N/A
|
net/mlx5: fw_tracer, Validate format string parameters |
Linux |
Linux |
2026-01-13T15:29:20.464Z | 2026-02-09T08:34:06.146Z |
| CVE-2025-68815 |
N/A
|
net/sched: ets: Remove drr class from the active list … |
Linux |
Linux |
2026-01-13T15:29:19.789Z | 2026-02-09T08:34:05.037Z |
| CVE-2025-68814 |
N/A
|
io_uring: fix filename leak in __io_openat_prep() |
Linux |
Linux |
2026-01-13T15:29:19.129Z | 2026-02-09T08:34:04.016Z |
| CVE-2025-68813 |
N/A
|
ipvs: fix ipv4 null-ptr-deref in route error path |
Linux |
Linux |
2026-01-13T15:29:18.483Z | 2026-02-09T08:34:02.933Z |
| CVE-2025-68808 |
N/A
|
media: vidtv: initialize local pointers upon transfer … |
Linux |
Linux |
2026-01-13T15:29:15.164Z | 2026-02-09T08:33:57.275Z |
| CVE-2025-68804 |
N/A
|
platform/chrome: cros_ec_ishtp: Fix UAF after unbindin… |
Linux |
Linux |
2026-01-13T15:29:12.418Z | 2026-02-09T08:33:53.030Z |
| CVE-2025-68803 |
N/A
|
NFSD: NFSv4 file creation neglects setting ACL |
Linux |
Linux |
2026-01-13T15:29:11.732Z | 2026-02-09T08:33:52.010Z |
| CVE-2025-68801 |
N/A
|
mlxsw: spectrum_router: Fix neighbour use-after-free |
Linux |
Linux |
2026-01-13T15:29:10.349Z | 2026-02-09T08:33:49.549Z |
| CVE-2025-68800 |
N/A
|
mlxsw: spectrum_mr: Fix use-after-free when updating m… |
Linux |
Linux |
2026-01-13T15:29:09.688Z | 2026-02-09T08:33:48.526Z |
| CVE-2025-68799 |
N/A
|
caif: fix integer underflow in cffrml_receive() |
Linux |
Linux |
2026-01-13T15:29:09.012Z | 2026-02-09T08:33:47.455Z |
| CVE-2025-68797 |
N/A
|
char: applicom: fix NULL pointer dereference in ac_ioctl |
Linux |
Linux |
2026-01-13T15:29:07.575Z | 2026-02-09T08:33:45.207Z |
| CVE-2025-68796 |
N/A
|
f2fs: fix to avoid updating zero-sized extent in exten… |
Linux |
Linux |
2026-01-13T15:29:06.892Z | 2026-02-09T08:33:44.079Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-68819 | In the Linux kernel, the following vulnerability has been resolved: media: dvb-usb: dtv5100: fix o… | 2026-01-13T16:16:04.210 | 2026-01-19T13:16:15.467 |
| fkie_cve-2025-68818 | In the Linux kernel, the following vulnerability has been resolved: scsi: Revert "scsi: qla2xxx: P… | 2026-01-13T16:16:04.097 | 2026-01-19T13:16:15.363 |
| fkie_cve-2025-68816 | In the Linux kernel, the following vulnerability has been resolved: net/mlx5: fw_tracer, Validate … | 2026-01-13T16:16:03.870 | 2026-01-19T13:16:15.263 |
| fkie_cve-2025-68815 | In the Linux kernel, the following vulnerability has been resolved: net/sched: ets: Remove drr cla… | 2026-01-13T16:16:03.757 | 2026-01-19T13:16:15.163 |
| fkie_cve-2025-68814 | In the Linux kernel, the following vulnerability has been resolved: io_uring: fix filename leak in… | 2026-01-13T16:16:03.643 | 2026-01-19T13:16:15.057 |
| fkie_cve-2025-68813 | In the Linux kernel, the following vulnerability has been resolved: ipvs: fix ipv4 null-ptr-deref … | 2026-01-13T16:16:03.523 | 2026-01-19T13:16:14.950 |
| fkie_cve-2025-68808 | In the Linux kernel, the following vulnerability has been resolved: media: vidtv: initialize local… | 2026-01-13T16:16:02.967 | 2026-01-19T13:16:14.850 |
| fkie_cve-2025-68804 | In the Linux kernel, the following vulnerability has been resolved: platform/chrome: cros_ec_ishtp… | 2026-01-13T16:16:02.507 | 2026-01-19T13:16:14.757 |
| fkie_cve-2025-68803 | In the Linux kernel, the following vulnerability has been resolved: NFSD: NFSv4 file creation negl… | 2026-01-13T16:16:02.377 | 2026-01-19T13:16:14.650 |
| fkie_cve-2025-68801 | In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_router: Fix ne… | 2026-01-13T16:16:02.137 | 2026-01-19T13:16:14.553 |
| fkie_cve-2025-68800 | In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_mr: Fix use-af… | 2026-01-13T16:16:02.023 | 2026-01-19T13:16:14.453 |
| fkie_cve-2025-68799 | In the Linux kernel, the following vulnerability has been resolved: caif: fix integer underflow in… | 2026-01-13T16:16:01.907 | 2026-01-19T13:16:14.353 |
| fkie_cve-2025-68797 | In the Linux kernel, the following vulnerability has been resolved: char: applicom: fix NULL point… | 2026-01-13T16:16:01.660 | 2026-01-19T13:16:14.250 |
| fkie_cve-2025-68796 | In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid updating ze… | 2026-01-13T16:16:01.540 | 2026-01-19T13:16:14.150 |
| fkie_cve-2025-68795 | In the Linux kernel, the following vulnerability has been resolved: ethtool: Avoid overflowing use… | 2026-01-13T16:16:01.420 | 2026-01-19T13:16:14.050 |
| fkie_cve-2025-68788 | In the Linux kernel, the following vulnerability has been resolved: fsnotify: do not generate ACCE… | 2026-01-13T16:15:58.623 | 2026-01-19T13:16:13.853 |
| fkie_cve-2025-68787 | In the Linux kernel, the following vulnerability has been resolved: netrom: Fix memory leak in nr_… | 2026-01-13T16:15:58.497 | 2026-01-19T13:16:13.750 |
| fkie_cve-2025-68785 | In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: fix middle a… | 2026-01-13T16:15:58.227 | 2026-01-19T13:16:13.650 |
| fkie_cve-2025-68783 | In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-mixer: us16x08: vali… | 2026-01-13T16:15:58.000 | 2026-01-19T13:16:13.550 |
| fkie_cve-2025-68782 | In the Linux kernel, the following vulnerability has been resolved: scsi: target: Reset t_task_cdb… | 2026-01-13T16:15:57.890 | 2026-01-19T13:16:13.450 |
| fkie_cve-2025-68780 | In the Linux kernel, the following vulnerability has been resolved: sched/deadline: only set free_… | 2026-01-13T16:15:57.657 | 2026-01-19T13:16:13.357 |
| fkie_cve-2025-68777 | In the Linux kernel, the following vulnerability has been resolved: Input: ti_am335x_tsc - fix off… | 2026-01-13T16:15:57.310 | 2026-01-19T13:16:13.260 |
| fkie_cve-2025-68776 | In the Linux kernel, the following vulnerability has been resolved: net/hsr: fix NULL pointer dere… | 2026-01-13T16:15:57.193 | 2026-01-19T13:16:13.157 |
| fkie_cve-2025-68774 | In the Linux kernel, the following vulnerability has been resolved: hfsplus: fix missing hfs_bnode… | 2026-01-13T16:15:56.960 | 2026-01-19T13:16:13.050 |
| fkie_cve-2025-68773 | In the Linux kernel, the following vulnerability has been resolved: spi: fsl-cpm: Check length par… | 2026-01-13T16:15:56.840 | 2026-01-19T13:16:12.950 |
| fkie_cve-2025-68771 | In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix kernel BUG in ocfs2… | 2026-01-13T16:15:56.590 | 2026-01-19T13:16:12.853 |
| fkie_cve-2025-68769 | In the Linux kernel, the following vulnerability has been resolved: f2fs: fix return value of f2fs… | 2026-01-13T16:15:56.353 | 2026-01-19T13:16:12.753 |
| fkie_cve-2025-68767 | In the Linux kernel, the following vulnerability has been resolved: hfsplus: Verify inode mode whe… | 2026-01-13T16:15:56.120 | 2026-01-19T13:16:12.603 |
| fkie_cve-2025-68765 | In the Linux kernel, the following vulnerability has been resolved: mt76: mt7615: Fix memory leak … | 2026-01-05T10:15:57.697 | 2026-01-19T13:16:12.353 |
| fkie_cve-2025-68764 | In the Linux kernel, the following vulnerability has been resolved: NFS: Automounted filesystems s… | 2026-01-05T10:15:57.587 | 2026-01-19T13:16:12.240 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-3r6q-fp39-vrgw |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-3fp8-5gxg-cm93 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-2jjh-699r-xmc8 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-2gf3-jh5q-424w |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:34Z | 2026-01-02T18:30:34Z |
| ghsa-x8x6-9g4r-x75p |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-wx82-w23f-w8jp |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-wjw3-5hm6-mw94 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-qfmr-5638-wr4j |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-p7gf-xmv9-cjxg |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-jwxq-6v3p-8vw5 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-jwch-2pcm-p9rg |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-jqg5-gvgh-f676 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-jh73-v795-5fpj |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-h85f-rq5f-jxh2 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-h42r-9gq7-6qj6 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-g974-762p-2jgj |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-fv4r-hhcm-5686 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-9r2p-4qfw-jcgh |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-9h3w-w3wc-4m3g |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-94w9-pfw6-pv3m |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-8jcj-m542-p8q5 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-2x9m-6c92-hh49 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:33Z | 2026-01-02T18:30:33Z |
| ghsa-qm2c-v5cv-h595 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:32Z | 2026-01-02T18:30:32Z |
| ghsa-q78c-4p9j-hx79 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:32Z | 2026-01-02T18:30:32Z |
| ghsa-q6px-hfwh-g86m |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:32Z | 2026-01-02T18:30:32Z |
| ghsa-h94v-9j54-ggxv |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:32Z | 2026-01-02T18:30:32Z |
| ghsa-g72c-329f-gv7j |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:32Z | 2026-01-02T18:30:32Z |
| ghsa-7q3p-4866-jcq3 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:32Z | 2026-01-02T18:30:32Z |
| ghsa-663w-qp75-9jv7 |
|
Rejected reason: This CVE ID was rejected because it was reserved but not used for a vulnerability … | 2026-01-02T18:30:32Z | 2026-01-02T18:30:32Z |
| ghsa-3f2p-v5v9-hq46 |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was identified in Daptin 0.10.3. Affected by this vulnerability is the function goq… | 2026-01-02T18:30:32Z | 2026-01-02T18:30:32Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-25231 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.059273Z |
| gsd-2024-25227 | SQL Injection vulnerability in ABO.CMS version 5.8, allows remote attackers to execute ar… | 2024-02-08T06:02:25.059052Z |
| gsd-2024-25508 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.058777Z |
| gsd-2024-25419 | flusity-CMS v2.33 was discovered to contain a Cross-Site Request Forgery (CSRF) via the c… | 2024-02-08T06:02:25.058483Z |
| gsd-2024-25435 | A cross-site scripting (XSS) vulnerability in Md1health Md1patient v2.0.0 allows attacker… | 2024-02-08T06:02:25.058190Z |
| gsd-2024-25234 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.057937Z |
| gsd-2024-25393 | A stack buffer overflow occurs in net/at/src/at_server.c in RT-Thread through 5.0.2. | 2024-02-08T06:02:25.057667Z |
| gsd-2024-25512 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.057393Z |
| gsd-2024-25168 | SQL injection vulnerability in snow snow v.2.0.0 allows a remote attacker to execute arbi… | 2024-02-08T06:02:25.056826Z |
| gsd-2024-25448 | An issue in the imlib_free_image_and_decache function of imlib2 v1.9.1 allows attackers t… | 2024-02-08T06:02:25.056544Z |
| gsd-2024-25279 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.056261Z |
| gsd-2024-25542 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.056042Z |
| gsd-2024-25376 | An issue discovered in Thesycon Software Solutions Gmbh & Co. KG TUSBAudio MSI-based inst… | 2024-02-08T06:02:25.055746Z |
| gsd-2024-25348 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.055479Z |
| gsd-2024-25482 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.055269Z |
| gsd-2024-25176 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.054982Z |
| gsd-2024-25316 | Code-projects Hotel Managment System 1.0 allows SQL Injection via the 'eid' parameter in … | 2024-02-08T06:02:25.054685Z |
| gsd-2024-25164 | iA Path Traversal vulnerability exists in iDURAR v2.0.0, that allows unauthenticated atta… | 2024-02-08T06:02:25.054143Z |
| gsd-2024-25269 | libheif <= 1.17.6 contains a memory leak in the function JpegEncoder::Encode. This flaw a… | 2024-02-08T06:02:25.053782Z |
| gsd-2024-25519 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.053510Z |
| gsd-2024-25525 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.052905Z |
| gsd-2024-25225 | A cross-site scripting (XSS) vulnerability in Simple Admin Panel App v1.0 allows attacker… | 2024-02-08T06:02:25.052621Z |
| gsd-2024-25511 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.052041Z |
| gsd-2024-25428 | SQL Injection vulnerability in MRCMS v3.1.2 allows attackers to run arbitrary system comm… | 2024-02-08T06:02:25.051496Z |
| gsd-2024-25364 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.051206Z |
| gsd-2024-25368 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.049538Z |
| gsd-2024-25422 | SQL Injection vulnerability in SEMCMS v.4.8 allows a remote attacker to execute arbitrary… | 2024-02-08T06:02:25.049210Z |
| gsd-2024-25186 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.048597Z |
| gsd-2024-25203 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.048101Z |
| gsd-2024-25178 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.047817Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-183544 | Malicious code in lomi-fuis-fakias (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183543 | Malicious code in lomi-fuis-fakas (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183542 | Malicious code in lomi-fuis-faiso (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183541 | Malicious code in lomi-fis-fakugiukatajb (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183540 | Malicious code in lomi-fis-fakugikatajb (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183539 | Malicious code in lomi-fis-fakugikajb (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183538 | Malicious code in lomi-fis-fakugiajb (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183537 | Malicious code in lomi-fis-fakugiab (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183536 | Malicious code in lomi-fis-fakugb (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183535 | Malicious code in lomi-fis-fakiugb (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183534 | Malicious code in lomi-fis-fakiugaubas (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183533 | Malicious code in lomi-fis-fakiugabs (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183532 | Malicious code in lomi-fis-fakiugabas (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183531 | Malicious code in loibac-ubg-tuagiga (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183530 | Malicious code in loibac-ubg-tuagaufaigga (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183529 | Malicious code in loibac-ubg-tuagauaigga (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183528 | Malicious code in loibac-ubg-tuagaigga (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183527 | Malicious code in loibac-ubg-tuagaiga (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183526 | Malicious code in loibac-ubg-tuagaaigga (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183525 | Malicious code in loibac-ubg-tuaga (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183524 | Malicious code in loibac-ubg-taga (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183523 | Malicious code in loibac-ubg-aga (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183522 | Malicious code in lobkaic-gib-giugavsaguga (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183521 | Malicious code in lobic-gob-gvi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183520 | Malicious code in lobic-gob-gvatufagi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183519 | Malicious code in lobic-gob-gvatuagfagi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183518 | Malicious code in lobic-gob-gvatuafagi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183517 | Malicious code in lobic-gob-gvatgi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183516 | Malicious code in lobic-gob-gvatfagi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183515 | Malicious code in lobic-gob-gvai (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2023:5214 | Red Hat Security Advisory: libwebp security update | 2023-09-19T08:06:01+00:00 | 2025-11-21T18:45:21+00:00 |
| rhsa-2023:5209 | Red Hat Security Advisory: Red Hat Virtualization Host 4.4.z SP 1 security update | 2023-09-19T01:11:17+00:00 | 2025-11-21T18:45:19+00:00 |
| rhsa-2023:5208 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update | 2023-09-18T18:16:01+00:00 | 2025-11-21T18:45:19+00:00 |
| rhsa-2023:5205 | Red Hat Security Advisory: firefox security update | 2023-09-18T15:19:44+00:00 | 2025-11-21T18:45:18+00:00 |
| rhsa-2023:5204 | Red Hat Security Advisory: libwebp security update | 2023-09-18T15:19:12+00:00 | 2025-11-21T18:45:18+00:00 |
| rhsa-2023:5202 | Red Hat Security Advisory: thunderbird security update | 2023-09-18T14:30:13+00:00 | 2025-11-21T18:45:17+00:00 |
| rhsa-2023:5201 | Red Hat Security Advisory: thunderbird security update | 2023-09-18T14:31:22+00:00 | 2025-11-21T18:45:16+00:00 |
| rhsa-2023:5200 | Red Hat Security Advisory: firefox security update | 2023-09-18T14:29:44+00:00 | 2025-11-21T18:45:16+00:00 |
| rhsa-2023:5198 | Red Hat Security Advisory: firefox security update | 2023-09-18T13:54:07+00:00 | 2025-11-21T18:45:16+00:00 |
| rhsa-2023:5197 | Red Hat Security Advisory: firefox security update | 2023-09-18T13:57:46+00:00 | 2025-11-21T18:45:16+00:00 |
| rhsa-2023:5194 | Red Hat Security Advisory: frr security update | 2023-09-18T13:53:53+00:00 | 2025-11-21T18:45:16+00:00 |
| rhsa-2023:5196 | Red Hat Security Advisory: frr security and bug fix update | 2023-09-18T13:52:28+00:00 | 2025-11-21T18:45:14+00:00 |
| rhsa-2023:5195 | Red Hat Security Advisory: frr security and bug fix update | 2023-09-18T14:02:20+00:00 | 2025-11-21T18:45:13+00:00 |
| rhsa-2023:5193 | Red Hat Security Advisory: dbus security update | 2023-09-18T14:05:40+00:00 | 2025-11-21T18:45:12+00:00 |
| rhsa-2023:5192 | Red Hat Security Advisory: firefox security update | 2023-09-18T13:52:27+00:00 | 2025-11-21T18:45:12+00:00 |
| rhsa-2023:5187 | Red Hat Security Advisory: firefox security update | 2023-09-18T13:48:58+00:00 | 2025-11-21T18:45:12+00:00 |
| rhsa-2023:5191 | Red Hat Security Advisory: thunderbird security update | 2023-09-18T13:54:41+00:00 | 2025-11-21T18:45:11+00:00 |
| rhsa-2023:5190 | Red Hat Security Advisory: libwebp security update | 2023-09-18T13:48:59+00:00 | 2025-11-21T18:45:10+00:00 |
| rhsa-2023:5189 | Red Hat Security Advisory: libwebp security update | 2023-09-18T13:54:00+00:00 | 2025-11-21T18:45:10+00:00 |
| rhsa-2023:5188 | Red Hat Security Advisory: thunderbird security update | 2023-09-18T13:45:59+00:00 | 2025-11-21T18:45:09+00:00 |
| rhsa-2023:5186 | Red Hat Security Advisory: thunderbird security update | 2023-09-18T13:49:01+00:00 | 2025-11-21T18:45:08+00:00 |
| rhsa-2023:5185 | Red Hat Security Advisory: thunderbird security update | 2023-09-18T13:34:00+00:00 | 2025-11-21T18:45:08+00:00 |
| rhsa-2023:5184 | Red Hat Security Advisory: firefox security update | 2023-09-18T13:37:09+00:00 | 2025-11-21T18:45:08+00:00 |
| rhsa-2023:5183 | Red Hat Security Advisory: firefox security update | 2023-09-18T13:34:55+00:00 | 2025-11-21T18:45:07+00:00 |
| rhsa-2023:5178 | Red Hat Security Advisory: busybox security update | 2023-09-18T07:34:32+00:00 | 2025-11-21T18:45:07+00:00 |
| rhsa-2023:5175 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.2.10 security update | 2023-09-14T17:33:39+00:00 | 2025-11-21T18:45:05+00:00 |
| rhsa-2023:5174 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.3 security update | 2023-09-14T17:33:40+00:00 | 2025-11-21T18:45:05+00:00 |
| rhsa-2023:5170 | Red Hat Security Advisory: Red Hat build of Quarkus 2.13.8 release and security update | 2023-09-14T14:32:56+00:00 | 2025-11-21T18:45:05+00:00 |
| rhsa-2023:5146 | Red Hat Security Advisory: .NET 7.0 security update | 2023-09-13T15:03:36+00:00 | 2025-11-21T18:45:02+00:00 |
| rhsa-2023:5145 | Red Hat Security Advisory: .NET 7.0 security update | 2023-09-13T15:06:50+00:00 | 2025-11-21T18:45:02+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2020-27618 | The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier when processing invalid multi-byte input sequences in IBM1364 IBM1371 IBM1388 IBM1390 and IBM1399 encodings fails to advance the input state which could lead to an infinite loop in applications resulting in a denial of service a different vulnerability from CVE-2016-10228. | 2021-02-02T00:00:00.000Z | 2021-03-05T00:00:00.000Z |
| msrc_cve-2021-20203 | An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario. | 2021-02-02T00:00:00.000Z | 2021-03-04T00:00:00.000Z |
| msrc_cve-2021-20229 | A flaw was found in PostgreSQL in versions before 13.2. This flaw allows a user with SELECT privilege on one column to craft a special query that returns all columns of the table. The highest threat from this vulnerability is to confidentiality. | 2021-02-02T00:00:00.000Z | 2021-02-27T00:00:00.000Z |
| msrc_cve-2020-8625 | A vulnerability in BIND's GSSAPI security policy negotiation can be targeted by a buffer overflow attack | 2021-02-02T00:00:00.000Z | 2021-02-27T00:00:00.000Z |
| msrc_cve-2021-26932 | An issue was discovered in the Linux kernel 3.2 through 5.10.16 as used by Xen. Grant mapping operations often occur in batch hypercalls where a number of operations are done in a single hypercall the success or failure of each one is reported to the backend driver and the backend driver then loops over the results performing follow-up actions based on the success or failure of each operation. Unfortunately when running in PV mode the Linux backend drivers mishandle this: Some errors are ignored effectively implying their success from the success of related batch elements. In other cases errors resulting from one batch element lead to further batch elements not being inspected and hence successful ones to not be possible to properly unmap upon error recovery. Only systems with Linux backends running in PV mode are vulnerable. Linux backends run in HVM / PVH modes are not vulnerable. This affects arch/*/xen/p2m.c and drivers/xen/gntdev.c. | 2021-02-02T00:00:00.000Z | 2021-02-26T00:00:00.000Z |
| msrc_cve-2021-26934 | An issue was discovered in the Linux kernel 4.18 through 5.10.16 as used by Xen. The backend allocation (aka be-alloc) mode of the drm_xen_front drivers was not meant to be a supported configuration but this wasn't stated accordingly in its support status entry. | 2021-02-02T00:00:00.000Z | 2021-02-25T00:00:00.000Z |
| msrc_cve-2021-26931 | An issue was discovered in the Linux kernel 2.6.39 through 5.10.16 as used in Xen. Block net and SCSI backends consider certain errors a plain bug deliberately causing a kernel crash. For errors potentially being at least under the influence of guests (such as out of memory conditions) it isn't correct to assume a plain bug. Memory allocations potentially causing such crashes occur only when Linux is running in PV mode though. This affects drivers/block/xen-blkback/blkback.c and drivers/xen/xen-scsiback.c. | 2021-02-02T00:00:00.000Z | 2021-02-25T00:00:00.000Z |
| msrc_cve-2021-26930 | An issue was discovered in the Linux kernel 3.11 through 5.10.16 as used by Xen. To service requests to the PV backend the driver maps grant references provided by the frontend. In this process errors may be encountered. In one case an error encountered earlier might be discarded by later processing resulting in the caller assuming successful mapping and hence subsequent operations trying to access space that wasn't mapped. In another case internal state would be insufficiently updated preventing safe recovery from the error. This affects drivers/block/xen-blkback/blkback.c. | 2021-02-02T00:00:00.000Z | 2021-02-25T00:00:00.000Z |
| msrc_cve-2020-35498 | A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide potentially causing a denial of service. The highest threat from this vulnerability is to system availability. | 2021-02-02T00:00:00.000Z | 2021-02-18T00:00:00.000Z |
| msrc_cve-2021-26708 | A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support. | 2021-02-02T00:00:00.000Z | 2021-02-11T00:00:00.000Z |
| msrc_cve-2020-15358 | In SQLite before 3.32.3 select.c mishandles query-flattener optimization leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation. | 2020-06-02T00:00:00.000Z | 2021-02-11T00:00:00.000Z |
| msrc_cve-2020-36242 | In the cryptography package before 3.3.2 for Python certain sequences of update calls to symmetrically encrypt multi-GB values could result in an integer overflow and buffer overflow as demonstrated by the Fernet class. | 2021-02-02T00:00:00.000Z | 2021-02-10T00:00:00.000Z |
| msrc_cve-2021-3348 | nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup aka CID-b98e762e3d71. | 2021-02-02T00:00:00.000Z | 2021-02-06T00:00:00.000Z |
| msrc_cve-2020-17380 | A heap-based buffer overflow was found in QEMU through 5.0.0 in the SDHCI device emulation support. It could occur while doing a multi block SDMA transfer via the sdhci_sdma_transfer_multi_blocks() routine in hw/sd/sdhci.c. A guest user or process could use this flaw to crash the QEMU process on the host resulting in a denial of service condition or potentially execute arbitrary code with privileges of the QEMU process on the host. | 2021-01-02T00:00:00.000Z | 2021-02-06T00:00:00.000Z |
| msrc_cve-2021-3347 | An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling allowing local users to execute code in the kernel aka CID-34b1a1ce1458. | 2021-01-02T00:00:00.000Z | 2021-02-05T00:00:00.000Z |
| msrc_cve-2021-3326 | The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier when processing invalid input sequences in the ISO-2022-JP-3 encoding fails an assertion in the code path and aborts the program potentially resulting in a denial of service. | 2021-01-02T00:00:00.000Z | 2021-02-04T00:00:00.000Z |
| msrc_cve-2020-36230 | A flaw was discovered in OpenLDAP before 2.4.57 leading in an assertion failure in slapd in the X.509 DN parsing in decode.c ber_next_element resulting in denial of service. | 2021-01-02T00:00:00.000Z | 2021-01-30T00:00:00.000Z |
| msrc_cve-2020-36229 | A flaw was discovered in ldap_X509dn2bv in OpenLDAP before 2.4.57 leading to a slapd crash in the X.509 DN parsing in ad_keystring resulting in denial of service. | 2021-01-02T00:00:00.000Z | 2021-01-30T00:00:00.000Z |
| msrc_cve-2020-36228 | An integer underflow was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Certificate List Exact Assertion processing resulting in denial of service. | 2021-01-02T00:00:00.000Z | 2021-01-30T00:00:00.000Z |
| msrc_cve-2020-36227 | A flaw was discovered in OpenLDAP before 2.4.57 leading to an infinite loop in slapd with the cancel_extop Cancel operation resulting in denial of service. | 2021-01-02T00:00:00.000Z | 2021-01-30T00:00:00.000Z |
| msrc_cve-2020-36226 | A flaw was discovered in OpenLDAP before 2.4.57 leading to a memch->bv_len miscalculation and slapd crash in the saslAuthzTo processing resulting in denial of service. | 2021-01-02T00:00:00.000Z | 2021-01-30T00:00:00.000Z |
| msrc_cve-2021-3178 | fs/nfsd/nfs3xdr.c in the Linux kernel through 5.10.8 when there is an NFS export of a subdirectory of a filesystem allows remote attackers to traverse to other parts of the filesystem via READDIRPLUS. NOTE: some parties argue that such a subdirectory export is not intended to prevent this attack; see also the exports(5) no_subtree_check default behavior | 2021-01-02T00:00:00.000Z | 2021-01-29T00:00:00.000Z |
| msrc_cve-2021-3177 | Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely. | 2021-01-02T00:00:00.000Z | 2021-01-29T00:00:00.000Z |
| msrc_cve-2020-36225 | A flaw was discovered in OpenLDAP before 2.4.57 leading to a double free and slapd crash in the saslAuthzTo processing resulting in denial of service. | 2021-01-02T00:00:00.000Z | 2021-01-29T00:00:00.000Z |
| msrc_cve-2020-36224 | A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the saslAuthzTo processing resulting in denial of service. | 2021-01-02T00:00:00.000Z | 2021-01-29T00:00:00.000Z |
| msrc_cve-2020-36223 | A flaw was discovered in OpenLDAP before 2.4.57 leading to a slapd crash in the Values Return Filter control handling resulting in denial of service (double free and out-of-bounds read). | 2021-01-02T00:00:00.000Z | 2021-01-29T00:00:00.000Z |
| msrc_cve-2020-36222 | A flaw was discovered in OpenLDAP before 2.4.57 leading to an assertion failure in slapd in the saslAuthzTo validation resulting in denial of service. | 2021-01-02T00:00:00.000Z | 2021-01-29T00:00:00.000Z |
| msrc_cve-2020-36221 | An integer underflow was discovered in OpenLDAP before 2.4.57 leading to slapd crashes in the Certificate Exact Assertion processing resulting in denial of service (schema_init.c serialNumberAndIssuerCheck). | 2021-01-02T00:00:00.000Z | 2021-01-29T00:00:00.000Z |
| msrc_cve-2020-25685 | A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query dnsmasq checks in forward.c:reply_query() which is the forwarded query that matches the reply by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSSEC SHA-1 when it is) this flaw allows an off-path attacker to find several different domains all having the same hash substantially reducing the number of attempts they would have to perform to forge a reply and get it accepted by dnsmasq. This is in contrast with RFC5452 which specifies that the query name is one of the attributes of a query that must be used to match a reply. This flaw could be abused to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25684 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity. | 2021-01-02T00:00:00.000Z | 2021-01-29T00:00:00.000Z |
| msrc_cve-2020-25684 | A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However it does not use the address/port to retrieve the exact forwarded query substantially reducing the number of attempts an attacker on the network would have to perform to forge a reply and get it accepted by dnsmasq. This issue contrasts with RFC5452 which specifies a query's attributes that all must be used to match a reply. This flaw allows an attacker to perform a DNS Cache Poisoning attack. If chained with CVE-2020-25685 or CVE-2020-25686 the attack complexity of a successful attack is reduced. The highest threat from this vulnerability is to data integrity. | 2021-01-02T00:00:00.000Z | 2021-01-29T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-201607-0094 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows a… | 2025-04-13T23:02:30.429000Z |
| var-201609-0459 | Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows a… | 2025-04-13T23:02:30.381000Z |
| var-201606-0044 | Adobe Flash Player before 18.0.0.352 and 19.x through 21.x before 21.0.0.242 on Windows a… | 2025-04-13T23:02:30.339000Z |
| var-201604-0519 | Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows a… | 2025-04-13T23:02:30.299000Z |
| var-201607-0093 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows a… | 2025-04-13T23:02:30.258000Z |
| var-201609-0577 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.… | 2025-04-13T23:02:30.212000Z |
| var-201607-0102 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows a… | 2025-04-13T23:02:30.169000Z |
| var-201607-0084 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows a… | 2025-04-13T23:02:30.114000Z |
| var-201607-0100 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows a… | 2025-04-13T23:02:30.069000Z |
| var-201609-0453 | Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows a… | 2025-04-13T23:02:30.021000Z |
| var-201606-0486 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Ad… | 2025-04-13T23:02:26.396000Z |
| var-201606-0484 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Ad… | 2025-04-13T23:02:26.355000Z |
| var-201606-0045 | Adobe Flash Player before 18.0.0.352 and 19.x through 21.x before 21.0.0.242 on Windows a… | 2025-04-13T23:02:26.315000Z |
| var-201609-0451 | Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows a… | 2025-04-13T23:02:26.269000Z |
| var-201606-0502 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Ad… | 2025-04-13T23:02:26.227000Z |
| var-201607-0077 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.… | 2025-04-13T23:02:26.181000Z |
| var-201607-0079 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.… | 2025-04-13T23:02:26.133000Z |
| var-201610-0462 | Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows a… | 2025-04-13T23:02:26.084000Z |
| var-201609-0461 | Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows a… | 2025-04-13T23:02:26.035000Z |
| var-201609-0569 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.… | 2025-04-13T23:02:25.987000Z |
| var-201610-0427 | Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows a… | 2025-04-13T23:02:25.940000Z |
| var-201607-0075 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.… | 2025-04-13T23:02:25.858000Z |
| var-201607-0065 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows a… | 2025-04-13T23:02:25.810000Z |
| var-201606-0050 | Adobe Flash Player before 18.0.0.352 and 19.x through 21.x before 21.0.0.242 on Windows a… | 2025-04-13T23:02:25.766000Z |
| var-201607-0095 | Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows a… | 2025-04-13T23:02:25.726000Z |
| var-201609-0464 | Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows a… | 2025-04-13T23:02:25.680000Z |
| var-201609-0575 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.… | 2025-04-13T23:02:25.630000Z |
| var-201607-0076 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.… | 2025-04-13T23:02:25.583000Z |
| var-201604-0155 | Use-after-free vulnerability in the LoadVars.decode function in Adobe Flash Player before… | 2025-04-13T23:02:25.533000Z |
| var-201606-0506 | Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Ad… | 2025-04-13T23:02:25.491000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2020:2786-1 | Security update for xen | 2020-09-29T12:12:25Z | 2020-09-29T12:12:25Z |
| suse-su-2020:2785-1 | Security update for pdns | 2020-09-29T10:50:57Z | 2020-09-29T10:50:57Z |
| suse-su-2020:2784-1 | Security update for python-pip | 2020-09-29T10:43:57Z | 2020-09-29T10:43:57Z |
| suse-su-2020:2776-1 | Security update for go1.15 | 2020-09-29T08:14:41Z | 2020-09-29T08:14:41Z |
| suse-su-2020:2770-1 | Security update for dpdk | 2020-09-28T15:49:35Z | 2020-09-28T15:49:35Z |
| suse-su-2020:2769-1 | Security update for dpdk | 2020-09-28T15:49:12Z | 2020-09-28T15:49:12Z |
| suse-su-2020:2768-1 | Security update for dpdk | 2020-09-28T15:48:53Z | 2020-09-28T15:48:53Z |
| suse-su-2020:2767-1 | Security update for dpdk | 2020-09-28T15:48:33Z | 2020-09-28T15:48:33Z |
| suse-su-2020:14502-1 | Security update for MozillaFirefox | 2020-09-28T13:46:17Z | 2020-09-28T13:46:17Z |
| suse-su-2020:2761-1 | Security update for go1.14 | 2020-09-28T07:24:52Z | 2020-09-28T07:24:52Z |
| suse-su-2020:2760-1 | Security update for libqt5-qtbase | 2020-09-28T07:24:10Z | 2020-09-28T07:24:10Z |
| suse-su-2020:2759-1 | Security update for MozillaFirefox | 2020-09-26T07:22:01Z | 2020-09-26T07:22:01Z |
| suse-su-2020:2751-1 | Security update for libqt5-qtbase | 2020-09-25T10:56:05Z | 2020-09-25T10:56:05Z |
| suse-su-2020:2750-1 | Security update for ImageMagick | 2020-09-25T09:37:26Z | 2020-09-25T09:37:26Z |
| suse-su-2020:2749-1 | Security update for MozillaFirefox | 2020-09-25T09:10:38Z | 2020-09-25T09:10:38Z |
| suse-su-2020:2748-1 | Security update for libqt5-qtbase | 2020-09-25T08:45:53Z | 2020-09-25T08:45:53Z |
| suse-su-2020:2747-1 | Security update for MozillaFirefox | 2020-09-25T08:11:45Z | 2020-09-25T08:11:45Z |
| suse-su-2020:2581-1 | Security update for openldap2 | 2020-09-25T07:24:09Z | 2020-09-25T07:24:09Z |
| suse-su-2020:2712-1 | Security update for openldap2 | 2020-09-25T07:14:49Z | 2020-09-25T07:14:49Z |
| suse-su-2020:2744-1 | Security update for tiff | 2020-09-24T15:56:57Z | 2020-09-24T15:56:57Z |
| suse-su-2020:2743-1 | Security update for qemu | 2020-09-24T15:55:29Z | 2020-09-24T15:55:29Z |
| suse-su-2020:2742-1 | Security update for libqt5-qtbase | 2020-09-24T15:55:04Z | 2020-09-24T15:55:04Z |
| suse-su-2020:2741-1 | Security update for libqt5-qtbase | 2020-09-24T15:54:28Z | 2020-09-24T15:54:28Z |
| suse-su-2020:2733-1 | Security update for bcm43xx-firmware | 2020-09-24T08:49:14Z | 2020-09-24T08:49:14Z |
| suse-su-2020:2731-1 | Security update for conmon, fuse-overlayfs, libcontainers-common, podman | 2020-09-24T05:42:41Z | 2020-09-24T05:42:41Z |
| suse-su-2020:2730-1 | Security update for samba | 2020-09-23T14:35:52Z | 2020-09-23T14:35:52Z |
| suse-su-2020:2729-1 | Security update for cifs-utils | 2020-09-23T14:01:03Z | 2020-09-23T14:01:03Z |
| suse-su-2020:2728-1 | Security update for cifs-utils | 2020-09-23T14:00:23Z | 2020-09-23T14:00:23Z |
| suse-su-2020:2727-1 | Security update for wavpack | 2020-09-23T13:59:57Z | 2020-09-23T13:59:57Z |
| suse-su-2020:2726-1 | Security update for python-pip | 2020-09-23T13:59:35Z | 2020-09-23T13:59:35Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2024-39285 | Linux kernel存在未明漏洞(CNVD-2024-39285) | 2024-09-20 | 2024-09-29 |
| cnvd-2024-39283 | Linux kernel存在未明漏洞(CNVD-2024-39283) | 2024-09-20 | 2024-09-29 |
| cnvd-2024-39282 | Linux kernel存在未明漏洞(CNVD-2024-39282) | 2024-09-20 | 2024-09-29 |
| cnvd-2024-39281 | Linux kernel存在未明漏洞(CNVD-2024-39281) | 2024-09-20 | 2024-09-29 |
| cnvd-2024-39280 | Linux kernel存在未明漏洞(CNVD-2024-39280) | 2024-09-20 | 2024-09-29 |
| cnvd-2024-39279 | Linux kernel存在未明漏洞(CNVD-2024-39279) | 2024-09-20 | 2024-09-29 |
| cnvd-2024-39278 | Linux kernel存在未明漏洞(CNVD-2024-39278) | 2024-09-20 | 2024-09-29 |
| cnvd-2024-39265 | Linux kernel存在未明漏洞(CNVD-2024-39265) | 2024-09-20 | 2024-09-29 |
| cnvd-2024-39261 | Linux kernel存在未明漏洞(CNVD-2024-39261) | 2024-09-20 | 2024-09-29 |
| cnvd-2024-38489 | 用友网络科技股份有限公司用友U8+CRM存在SQL注入漏洞(CNVD-2024-38489) | 2024-08-15 | 2024-09-29 |
| cnvd-2024-38505 | 润申标准化技术服务(上海)有限公司企业标准化管理系统存在SQL注入漏洞 | 2024-08-14 | 2024-09-28 |
| cnvd-2024-39520 | Linux kernel存在未明漏洞(CNVD-2024-39520) | 2024-09-10 | 2024-09-27 |
| cnvd-2024-39519 | Linux kernel存在未明漏洞(CNVD-2024-39519) | 2024-09-13 | 2024-09-27 |
| cnvd-2024-39518 | Linux kernel存在未明漏洞(CNVD-2024-39518) | 2024-09-13 | 2024-09-27 |
| cnvd-2024-39479 | Linux kernel存在未明漏洞(CNVD-2024-39479) | 2024-09-13 | 2024-09-27 |
| cnvd-2024-39478 | Linux kernel存在未明漏洞(CNVD-2024-39478) | 2024-09-13 | 2024-09-27 |
| cnvd-2024-39477 | Linux kernel存在未明漏洞(CNVD-2024-39477) | 2024-09-13 | 2024-09-27 |
| cnvd-2024-39476 | Linux kernel存在未明漏洞(CNVD-2024-39476) | 2024-09-13 | 2024-09-27 |
| cnvd-2024-39475 | Linux kernel存在未明漏洞(CNVD-2024-39475) | 2024-09-13 | 2024-09-27 |
| cnvd-2024-39474 | Linux kernel存在未明漏洞(CNVD-2024-39474) | 2024-09-13 | 2024-09-27 |
| cnvd-2024-39473 | Linux kernel存在未明漏洞(CNVD-2024-39473) | 2024-09-13 | 2024-09-27 |
| cnvd-2024-39472 | Linux kernel存在未明漏洞(CNVD-2024-39472) | 2024-09-13 | 2024-09-27 |
| cnvd-2024-39471 | Linux kernel存在未明漏洞(CNVD-2024-39471) | 2024-09-13 | 2024-09-27 |
| cnvd-2024-39470 | Linux kernel存在未明漏洞(CNVD-2024-39470) | 2024-09-13 | 2024-09-27 |
| cnvd-2024-39469 | Linux kernel存在未明漏洞(CNVD-2024-39469) | 2024-09-13 | 2024-09-27 |
| cnvd-2024-39468 | Linux kernel存在未明漏洞(CNVD-2024-39468) | 2024-09-13 | 2024-09-27 |
| cnvd-2024-39467 | Linux kernel存在未明漏洞(CNVD-2024-39467) | 2024-09-13 | 2024-09-27 |
| cnvd-2024-39466 | Linux kernel存在未明漏洞(CNVD-2024-39466) | 2024-09-13 | 2024-09-27 |
| cnvd-2024-39465 | Linux kernel存在未明漏洞(CNVD-2024-39465) | 2024-09-13 | 2024-09-27 |
| cnvd-2024-39464 | Linux kernel存在未明漏洞(CNVD-2024-39464) | 2024-09-13 | 2024-09-27 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2010-avi-308 | Vulnérabilité dans FreeBSD | 2010-07-13T00:00:00.000000 | 2010-07-13T00:00:00.000000 |
| certa-2010-avi-307 | Vulnérabilité dans mono | 2010-07-13T00:00:00.000000 | 2010-07-13T00:00:00.000000 |
| certa-2010-avi-306 | Multiples vulnérabilités dans VMware Studio | 2010-07-13T00:00:00.000000 | 2010-07-13T00:00:00.000000 |
| certa-2010-avi-305 | Vulnérabilité dans Ruby | 2010-07-08T00:00:00.000000 | 2010-07-08T00:00:00.000000 |
| certa-2010-avi-304 | Vulnérabilité dans Ubuntu | 2010-07-08T00:00:00.000000 | 2010-07-08T00:00:00.000000 |
| certa-2010-avi-303 | Vulnérabilité dans les commutateurs Cisco Industrial Ethernet 3000 series | 2010-07-08T00:00:00.000000 | 2010-07-08T00:00:00.000000 |
| certa-2010-avi-290 | Vulnérabiltés dans Bugzilla | 2010-06-28T00:00:00.000000 | 2010-07-08T00:00:00.000000 |
| certa-2010-avi-302 | Multiples vulnérabilités dans Novell Identity Manager | 2010-07-05T00:00:00.000000 | 2010-07-05T00:00:00.000000 |
| certa-2010-avi-301 | Vulnérabilité dans Bogofilter | 2010-07-05T00:00:00.000000 | 2010-07-05T00:00:00.000000 |
| certa-2010-avi-300 | Multiples vulnérabilités dans Google Chrome | 2010-07-05T00:00:00.000000 | 2010-07-05T00:00:00.000000 |
| certa-2010-avi-295 | Vulnérabilité dans Citrix XenServer | 2010-06-29T00:00:00.000000 | 2010-07-05T00:00:00.000000 |
| certa-2010-avi-299 | Vulnérabilité de sudo | 2010-07-02T00:00:00.000000 | 2010-07-02T00:00:00.000000 |
| certa-2010-avi-297 | Vulnérabilités sur OpenVMS | 2010-06-30T00:00:00.000000 | 2010-07-02T00:00:00.000000 |
| certa-2010-avi-260 | Vulnérabilités dans Wireshark | 2010-06-11T00:00:00.000000 | 2010-07-02T00:00:00.000000 |
| certa-2010-avi-298 | Vulnérabilités dans Opera | 2010-07-01T00:00:00.000000 | 2010-07-01T00:00:00.000000 |
| certa-2010-avi-296 | Multiples vulnérabilités dans Adobe Reader et Adobe Acrobat | 2010-06-30T00:00:00.000000 | 2010-06-30T00:00:00.000000 |
| certa-2010-avi-292 | Vulnérabilités dans Cisco ASA | 2010-06-28T00:00:00.000000 | 2010-06-30T00:00:00.000000 |
| certa-2010-avi-294 | Vulnérabilité de MySQL | 2010-06-29T00:00:00.000000 | 2010-06-29T00:00:00.000000 |
| certa-2010-avi-281 | Vulnérabilités dans LibTIFF | 2010-06-23T00:00:00.000000 | 2010-06-29T00:00:00.000000 |
| certa-2010-avi-278 | Vulnérabilités dans Moodle | 2010-06-22T00:00:00.000000 | 2010-06-29T00:00:00.000000 |
| certa-2010-avi-262 | Vulnérabilités dans LibTIFF | 2010-06-14T00:00:00.000000 | 2010-06-29T00:00:00.000000 |
| certa-2010-avi-293 | Multiples vulnérabilités dans VMware ESX Server | 2010-06-28T00:00:00.000000 | 2010-06-28T00:00:00.000000 |
| certa-2010-avi-289 | Vulnérabilités dans IBM WebSphere | 2010-06-25T00:00:00.000000 | 2010-06-25T00:00:00.000000 |
| certa-2010-avi-288 | Multiples vulnérabilités dans Google Chrome | 2010-06-25T00:00:00.000000 | 2010-06-25T00:00:00.000000 |
| certa-2010-avi-219 | Vulnérabilité dans MIT Kerberos | 2010-05-19T00:00:00.000000 | 2010-06-25T00:00:00.000000 |
| certa-2010-avi-287 | Vulnérabilité dans HP Openview | 2010-06-24T00:00:00.000000 | 2010-06-24T00:00:00.000000 |
| certa-2010-avi-286 | Vulnérabilités dans InterScan Web Security Virtual Appliance | 2010-06-23T00:00:00.000000 | 2010-06-23T00:00:00.000000 |
| certa-2010-avi-285 | Vulnérabilité dans F-Secure Policy Manager | 2010-06-23T00:00:00.000000 | 2010-06-23T00:00:00.000000 |
| certa-2010-avi-284 | Multiples vulnérabilités dans Tomcat sous HP-UX | 2010-06-23T00:00:00.000000 | 2010-06-23T00:00:00.000000 |
| certa-2010-avi-283 | Vulnérabilités dans Mozilla Thunderbird | 2010-06-23T00:00:00.000000 | 2010-06-23T00:00:00.000000 |