Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-22978 |
9.8 (3.1)
|
eladmin <=2.7 is vulnerable to CSV Injection in t… |
n/a |
n/a |
2025-02-03T00:00:00.000Z | 2026-01-20T20:33:23.482Z |
| CVE-2025-14351 |
5.3 (3.1)
|
Custom Fonts – Host Your Fonts Locally <= 2.1.16 - Mis… |
brainstormforce |
Custom Fonts – Host Your Fonts Locally |
2026-01-20T03:25:16.827Z | 2026-01-20T20:33:09.196Z |
| CVE-2026-22755 |
9.3 (4.0)
|
Legacy Vivotek Camera Firmware Command Injection in up… |
Vivotek |
Affected device model numbers are FD8365, FD8365v2, FD9165, FD9171, FD9187, FD9189, FD9365, FD9371, FD9381, FD9387, FD9389, FD9391,FE9180,FE9181, FE9191, FE9381, FE9382, FE9391, FE9582, IB9365, IB93587LPR, IB9371,IB9381, IB9387, IB9389, IB939,IP9165,IP9171, IP9172, IP9181, IP9191, IT9389, MA9321, MA9322, MS9321, MS9390, TB9330 |
2026-01-13T15:12:53.126Z | 2026-01-20T20:33:02.780Z |
| CVE-2025-44137 |
8.2 (3.1)
|
MapTiler Tileserver-php v2.0 is vulnerable to Dir… |
n/a |
n/a |
2025-07-29T00:00:00.000Z | 2026-01-20T20:30:09.461Z |
| CVE-2025-14798 |
5.3 (3.1)
|
LearnPress – WordPress LMS Plugin <= 4.3.2.4 - Missing… |
thimpress |
LearnPress – WordPress LMS Plugin for Create and Sell Online Courses |
2026-01-20T03:25:17.527Z | 2026-01-20T20:28:45.838Z |
| CVE-2025-11266 |
6.8 (4.0)
6.6 (3.1)
|
Grassroots DICOM (GDCM) Out-of-bounds Write |
Grassroots |
DICOM (GDCM) |
2025-12-12T20:48:57.303Z | 2026-01-20T20:25:52.481Z |
| CVE-2026-1045 |
4.4 (3.1)
|
Viet contact <= 1.3.2 - Authenticated (Administrator+)… |
nhomcaodem |
Viet contact |
2026-01-20T05:30:17.306Z | 2026-01-20T20:24:53.824Z |
| CVE-2026-1042 |
4.4 (3.1)
|
WP Hello Bar <= 1.02 - Authenticated (Administrator+) … |
norcross |
WP Hello Bar |
2026-01-20T05:30:18.112Z | 2026-01-20T20:23:34.138Z |
| CVE-2026-1009 |
9 (3.1)
|
Stored Cross-Site Scripting in Altium Live Forum Leadi… |
Altium |
Altium Live |
2026-01-15T22:51:32.441Z | 2026-01-20T20:15:28.251Z |
| CVE-2026-23829 |
5.3 (3.1)
|
Mailpit has SMTP Header Injection via Regex Bypass |
axllent |
mailpit |
2026-01-18T23:23:04.176Z | 2026-01-20T20:08:41.935Z |
| CVE-2026-23525 |
6.4 (3.1)
|
1panel App Store vulnerable to Cross-site Scripting |
1Panel-dev |
1Panel |
2026-01-18T22:10:59.500Z | 2026-01-20T20:07:16.229Z |
| CVE-2026-23626 |
6.8 (3.1)
|
Kimai Vulnerable to Authenticated Server-Side Template… |
kimai |
kimai |
2026-01-18T22:45:35.942Z | 2026-01-20T20:07:08.477Z |
| CVE-2026-23644 |
7.7 (4.0)
|
esm.sh has path traversal in `extractPackageTarball` t… |
esm-dev |
esm.sh |
2026-01-18T22:49:29.676Z | 2026-01-20T20:06:58.947Z |
| CVE-2026-23733 |
6.4 (3.1)
|
Lobe Chat has Cross-Site Scripting (XSS) issue that ma… |
lobehub |
lobe-chat |
2026-01-18T22:56:15.888Z | 2026-01-20T20:06:51.723Z |
| CVE-2025-11043 |
9.1 (4.0)
7.4 (3.1)
|
Improper Server Certificate Validation in Automation Studio |
B&R Industrial Automation GmbH |
B&R Automation Studio |
2026-01-19T15:52:14.618Z | 2026-01-20T20:06:44.198Z |
| CVE-2025-11044 |
8.9 (4.0)
6.8 (3.1)
|
Vulnerability on Automation Runtime my cause DoS Conditions |
B&R Industrial Automation GmbH |
Automation Runtime |
2026-01-19T15:57:15.188Z | 2026-01-20T20:06:35.541Z |
| CVE-2025-52659 |
2.8 (3.1)
|
HCL AION is affected by a Cacheable HTTP Response vuln… |
HCL Software |
AION |
2026-01-19T17:54:19.126Z | 2026-01-20T20:06:29.031Z |
| CVE-2025-55249 |
3.5 (3.1)
|
HCL AION is affected by a Missing Security Response He… |
HCL Software |
AION |
2026-01-19T18:01:04.554Z | 2026-01-20T20:06:21.532Z |
| CVE-2025-52661 |
2.4 (3.1)
|
HCL AION version 2 is affected by a JWT Token Exp… |
HCL Software |
AION |
2026-01-19T18:04:31.472Z | 2026-01-20T20:06:15.964Z |
| CVE-2025-55250 |
1.8 (3.1)
|
HCL AION is affected by a Technical Error Disclosure v… |
HCL Software |
AION |
2026-01-19T18:09:03.306Z | 2026-01-20T20:06:09.761Z |
| CVE-2025-55252 |
3.1 (3.1)
|
HCL AION is affected by a Weak Password Policy vulnerability |
HCL Software |
AION |
2026-01-19T18:13:17.724Z | 2026-01-20T20:06:01.277Z |
| CVE-2026-23841 |
9.3 (3.1)
|
Movary vulnerable to Cross-site Scripting with `?categ… |
leepeuker |
movary |
2026-01-19T18:35:21.866Z | 2026-01-20T20:05:55.115Z |
| CVE-2026-23842 |
7.5 (3.1)
|
ChatterBot has Denial of Service via Database Connecti… |
gunthercox |
ChatterBot |
2026-01-19T18:39:37.059Z | 2026-01-20T20:05:48.462Z |
| CVE-2026-23843 |
7.1 (3.1)
|
teklifolustur_app's IDOR vulnerability allows unauthor… |
sibercii6-crypto |
teklifolustur_app |
2026-01-19T18:42:56.765Z | 2026-01-20T20:05:43.380Z |
| CVE-2026-23845 |
5.8 (3.1)
|
Mailpit Vulnerable to Server-Side Request Forgery (SSR… |
axllent |
mailpit |
2026-01-19T19:01:38.163Z | 2026-01-20T20:05:35.862Z |
| CVE-2025-69198 |
6 (4.0)
|
Pterodactyl's improper resource locking allows raced q… |
pterodactyl |
panel |
2026-01-19T19:05:38.530Z | 2026-01-20T20:05:30.610Z |
| CVE-2025-69199 |
8.3 (4.0)
|
Pterodactyl Wings's websocket endpoints have no visibl… |
pterodactyl |
panel |
2026-01-19T19:17:53.569Z | 2026-01-20T20:05:22.699Z |
| CVE-2026-23850 |
7.8 (4.0)
|
SiYuan vulnerable to arbitrary file read |
siyuan-note |
siyuan |
2026-01-19T19:52:58.615Z | 2026-01-20T20:05:16.346Z |
| CVE-2026-23851 |
8.3 (4.0)
|
SiYuan Vulnerable to Arbitrary File Read via File Copy… |
siyuan-note |
siyuan |
2026-01-19T19:57:29.460Z | 2026-01-20T20:05:11.018Z |
| CVE-2026-23852 |
5.8 (4.0)
|
SiYuan vulnerable to Stored XSS / RCE via `setBlockAtt… |
siyuan-note |
siyuan |
2026-01-19T20:00:05.839Z | 2026-01-20T20:05:02.903Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-68757 |
N/A
|
drm/vgem-fence: Fix potential deadlock on release |
Linux |
Linux |
2026-01-05T09:32:30.496Z | 2026-02-09T08:33:01.777Z |
| CVE-2025-68746 |
N/A
|
spi: tegra210-quad: Fix timeout handling |
Linux |
Linux |
2025-12-24T12:09:42.213Z | 2026-02-09T08:32:50.612Z |
| CVE-2025-68740 |
N/A
|
ima: Handle error code returned by ima_filter_rule_match() |
Linux |
Linux |
2025-12-24T12:09:37.971Z | 2026-02-09T08:32:44.070Z |
| CVE-2025-68733 |
N/A
|
smack: fix bug: unprivileged task can create labels |
Linux |
Linux |
2025-12-24T10:33:15.347Z | 2026-02-09T08:32:29.776Z |
| CVE-2025-68732 |
N/A
|
gpu: host1x: Fix race in syncpt alloc/free |
Linux |
Linux |
2025-12-24T10:33:14.664Z | 2026-02-09T08:32:28.684Z |
| CVE-2025-68728 |
N/A
|
ntfs3: fix uninit memory after failed mi_read in mi_fo… |
Linux |
Linux |
2025-12-24T10:33:11.847Z | 2026-02-09T08:32:24.461Z |
| CVE-2025-68727 |
N/A
|
ntfs3: Fix uninit buffer allocated by __getname() |
Linux |
Linux |
2025-12-24T10:33:11.085Z | 2026-02-09T08:32:23.446Z |
| CVE-2025-68724 |
N/A
|
crypto: asymmetric_keys - prevent overflow in asymmetr… |
Linux |
Linux |
2025-12-24T10:33:08.932Z | 2026-02-09T08:32:19.959Z |
| CVE-2025-68372 |
N/A
|
nbd: defer config put in recv_work |
Linux |
Linux |
2025-12-24T10:33:02.679Z | 2026-02-09T08:32:09.736Z |
| CVE-2025-68369 |
N/A
|
ntfs3: init run lock for extend inode |
Linux |
Linux |
2025-12-24T10:32:55.440Z | 2026-02-09T08:32:06.264Z |
| CVE-2025-68367 |
N/A
|
macintosh/mac_hid: fix race condition in mac_hid_toggl… |
Linux |
Linux |
2025-12-24T10:32:54.084Z | 2026-02-09T08:32:03.804Z |
| CVE-2025-68366 |
N/A
|
nbd: defer config unlock in nbd_genl_connect |
Linux |
Linux |
2025-12-24T10:32:53.399Z | 2026-02-09T08:32:02.582Z |
| CVE-2025-68364 |
N/A
|
ocfs2: relax BUG() to ocfs2_error() in __ocfs2_move_extent() |
Linux |
Linux |
2025-12-24T10:32:51.922Z | 2026-02-09T08:32:00.295Z |
| CVE-2025-68362 |
N/A
|
wifi: rtl818x: rtl8187: Fix potential buffer underflow… |
Linux |
Linux |
2025-12-24T10:32:50.492Z | 2026-02-09T08:31:57.901Z |
| CVE-2025-68354 |
N/A
|
regulator: core: Protect regulator_supply_alias_list w… |
Linux |
Linux |
2025-12-24T10:32:44.840Z | 2026-02-09T08:31:49.898Z |
| CVE-2025-68349 |
N/A
|
NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_la… |
Linux |
Linux |
2025-12-24T10:32:41.253Z | 2026-02-09T08:31:43.772Z |
| CVE-2025-68346 |
N/A
|
ALSA: dice: fix buffer overflow in detect_stream_formats() |
Linux |
Linux |
2025-12-24T10:32:39.101Z | 2026-02-09T08:31:35.157Z |
| CVE-2025-68344 |
N/A
|
ALSA: wavefront: Fix integer overflow in sample size v… |
Linux |
Linux |
2025-12-24T10:32:37.615Z | 2026-02-09T08:31:32.875Z |
| CVE-2025-68337 |
N/A
|
jbd2: avoid bug_on in jbd2_journal_get_create_access()… |
Linux |
Linux |
2025-12-22T16:14:14.145Z | 2026-02-09T08:31:31.824Z |
| CVE-2025-68336 |
N/A
|
locking/spinlock/debug: Fix data-race in do_raw_write_lock |
Linux |
Linux |
2025-12-22T16:14:13.425Z | 2026-02-09T08:31:30.516Z |
| CVE-2025-68335 |
N/A
|
comedi: pcl818: fix null-ptr-deref in pcl818_ai_cancel() |
Linux |
Linux |
2025-12-22T16:14:12.614Z | 2026-02-09T08:31:29.256Z |
| CVE-2025-68332 |
N/A
|
comedi: c6xdigio: Fix invalid PNP driver unregistration |
Linux |
Linux |
2025-12-22T16:14:10.146Z | 2026-02-09T08:31:28.074Z |
| CVE-2025-68325 |
N/A
|
net/sched: sch_cake: Fix incorrect qlen reduction in c… |
Linux |
Linux |
2025-12-18T15:02:50.214Z | 2026-02-09T08:31:26.912Z |
| CVE-2025-68282 |
N/A
|
usb: gadget: udc: fix use-after-free in usb_gadget_sta… |
Linux |
Linux |
2025-12-16T15:06:04.332Z | 2026-01-19T12:18:16.378Z |
| CVE-2025-68266 |
N/A
|
bfs: Reconstruct file type when loading from disk |
Linux |
Linux |
2025-12-16T14:47:06.240Z | 2026-01-19T12:18:15.201Z |
| CVE-2025-68264 |
N/A
|
ext4: refresh inline data size before write operations |
Linux |
Linux |
2025-12-16T14:45:06.268Z | 2026-02-09T08:31:23.589Z |
| CVE-2025-68261 |
N/A
|
ext4: add i_data_sem protection in ext4_destroy_inline… |
Linux |
Linux |
2025-12-16T14:45:03.252Z | 2026-02-09T08:31:20.130Z |
| CVE-2025-68258 |
N/A
|
comedi: multiq3: sanitize config options in multiq3_attach() |
Linux |
Linux |
2025-12-16T14:45:00.920Z | 2026-02-09T08:31:11.628Z |
| CVE-2025-68257 |
N/A
|
comedi: check device's attached status in compat ioctls |
Linux |
Linux |
2025-12-16T14:44:59.535Z | 2026-02-09T08:31:10.507Z |
| CVE-2025-68255 |
N/A
|
staging: rtl8723bs: fix stack buffer overflow in OnAss… |
Linux |
Linux |
2025-12-16T14:44:58.031Z | 2026-02-09T08:31:08.339Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-68727 | In the Linux kernel, the following vulnerability has been resolved: ntfs3: Fix uninit buffer alloc… | 2025-12-24T11:16:02.000 | 2026-01-19T13:16:11.340 |
| fkie_cve-2025-68724 | In the Linux kernel, the following vulnerability has been resolved: crypto: asymmetric_keys - prev… | 2025-12-24T11:16:01.697 | 2026-01-19T13:16:11.240 |
| fkie_cve-2025-68372 | In the Linux kernel, the following vulnerability has been resolved: nbd: defer config put in recv_… | 2025-12-24T11:16:00.777 | 2026-01-19T13:16:11.140 |
| fkie_cve-2025-68369 | In the Linux kernel, the following vulnerability has been resolved: ntfs3: init run lock for exten… | 2025-12-24T11:16:00.470 | 2026-01-19T13:16:11.047 |
| fkie_cve-2025-68367 | In the Linux kernel, the following vulnerability has been resolved: macintosh/mac_hid: fix race co… | 2025-12-24T11:16:00.267 | 2026-01-19T13:16:10.943 |
| fkie_cve-2025-68366 | In the Linux kernel, the following vulnerability has been resolved: nbd: defer config unlock in nb… | 2025-12-24T11:16:00.163 | 2026-01-19T13:16:10.847 |
| fkie_cve-2025-68364 | In the Linux kernel, the following vulnerability has been resolved: ocfs2: relax BUG() to ocfs2_er… | 2025-12-24T11:15:59.960 | 2026-01-19T13:16:10.750 |
| fkie_cve-2025-68362 | In the Linux kernel, the following vulnerability has been resolved: wifi: rtl818x: rtl8187: Fix po… | 2025-12-24T11:15:59.593 | 2026-01-19T13:16:10.650 |
| fkie_cve-2025-68354 | In the Linux kernel, the following vulnerability has been resolved: regulator: core: Protect regul… | 2025-12-24T11:15:58.757 | 2026-01-19T13:16:10.550 |
| fkie_cve-2025-68349 | In the Linux kernel, the following vulnerability has been resolved: NFSv4/pNFS: Clear NFS_INO_LAYO… | 2025-12-24T11:15:58.247 | 2026-01-19T13:16:10.453 |
| fkie_cve-2025-68346 | In the Linux kernel, the following vulnerability has been resolved: ALSA: dice: fix buffer overflo… | 2025-12-24T11:15:57.947 | 2026-01-19T13:16:10.357 |
| fkie_cve-2025-68344 | In the Linux kernel, the following vulnerability has been resolved: ALSA: wavefront: Fix integer o… | 2025-12-24T11:15:57.740 | 2026-01-19T13:16:10.253 |
| fkie_cve-2025-68337 | In the Linux kernel, the following vulnerability has been resolved: jbd2: avoid bug_on in jbd2_jou… | 2025-12-22T17:16:01.463 | 2026-01-19T13:16:10.153 |
| fkie_cve-2025-68336 | In the Linux kernel, the following vulnerability has been resolved: locking/spinlock/debug: Fix da… | 2025-12-22T17:16:01.357 | 2026-01-19T13:16:10.053 |
| fkie_cve-2025-68335 | In the Linux kernel, the following vulnerability has been resolved: comedi: pcl818: fix null-ptr-d… | 2025-12-22T17:16:01.237 | 2026-01-19T13:16:09.957 |
| fkie_cve-2025-68332 | In the Linux kernel, the following vulnerability has been resolved: comedi: c6xdigio: Fix invalid … | 2025-12-22T17:16:00.910 | 2026-01-19T13:16:09.853 |
| fkie_cve-2025-68325 | In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_cake: Fix incor… | 2025-12-18T15:16:06.320 | 2026-01-19T13:16:09.747 |
| fkie_cve-2025-68282 | In the Linux kernel, the following vulnerability has been resolved: usb: gadget: udc: fix use-afte… | 2025-12-16T16:16:06.970 | 2026-01-19T13:16:09.647 |
| fkie_cve-2025-68266 | In the Linux kernel, the following vulnerability has been resolved: bfs: Reconstruct file type whe… | 2025-12-16T15:15:56.140 | 2026-01-19T13:16:09.547 |
| fkie_cve-2025-68264 | In the Linux kernel, the following vulnerability has been resolved: ext4: refresh inline data size… | 2025-12-16T15:15:55.920 | 2026-01-19T13:16:09.450 |
| fkie_cve-2025-68261 | In the Linux kernel, the following vulnerability has been resolved: ext4: add i_data_sem protectio… | 2025-12-16T15:15:55.547 | 2026-01-19T13:16:09.347 |
| fkie_cve-2025-68258 | In the Linux kernel, the following vulnerability has been resolved: comedi: multiq3: sanitize conf… | 2025-12-16T15:15:55.207 | 2026-01-19T13:16:09.247 |
| fkie_cve-2025-68257 | In the Linux kernel, the following vulnerability has been resolved: comedi: check device's attache… | 2025-12-16T15:15:55.100 | 2026-01-19T13:16:09.150 |
| fkie_cve-2025-68255 | In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix stack … | 2025-12-16T15:15:54.880 | 2026-01-19T13:16:09.057 |
| fkie_cve-2025-68254 | In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix out-of… | 2025-12-16T15:15:54.767 | 2026-01-19T13:16:08.953 |
| fkie_cve-2025-40256 | In the Linux kernel, the following vulnerability has been resolved: xfrm: also call xfrm_state_del… | 2025-12-04T16:16:19.367 | 2026-01-19T13:16:08.850 |
| fkie_cve-2025-40215 | In the Linux kernel, the following vulnerability has been resolved: xfrm: delete x->tunnel as we d… | 2025-12-04T13:15:48.473 | 2026-01-19T13:16:08.747 |
| fkie_cve-2025-40110 | In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix a null-ptr acc… | 2025-11-12T02:15:32.900 | 2026-01-19T13:16:08.643 |
| fkie_cve-2025-38556 | In the Linux kernel, the following vulnerability has been resolved: HID: core: Harden s32ton() aga… | 2025-08-19T17:15:31.817 | 2026-01-19T13:16:08.517 |
| fkie_cve-2025-38129 | In the Linux kernel, the following vulnerability has been resolved: page_pool: Fix use-after-free … | 2025-07-03T09:15:27.170 | 2026-01-19T13:16:08.397 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-qvmc-92vg-6r35 |
7.2 (3.1)
|
Mattermost with Jira plugin enabled has Incorrect Implementation of Authentication Algorithm | 2025-12-22T12:30:21Z | 2026-01-02T15:34:07Z |
| ghsa-8v28-3j53-xvq8 |
4.7 (3.1)
2.0 (4.0)
|
A vulnerability was determined in PluXml up to 5.8.22. Affected is the function FileCookieJar::__de… | 2026-01-02T15:30:29Z | 2026-01-02T15:30:29Z |
| ghsa-j4mr-6qvv-6q4w |
5.3 (3.1)
|
The Ultimate Post Kit Addons for Elementor WordPress plugin before 4.0.16 exposes multiple AJAX “lo… | 2025-12-31T06:30:17Z | 2026-01-02T15:30:28Z |
| ghsa-3g65-26q9-22q3 |
7.3 (3.1)
5.5 (4.0)
|
A weakness has been identified in code-projects Content Management System 1.0. This issue affects s… | 2026-01-02T15:30:28Z | 2026-01-02T15:30:28Z |
| ghsa-4xqm-hx6r-2gp8 |
7.5 (3.1)
|
The Knowband Mobile App Builder WordPress plugin before 3.0.0 does not have authorisation when dele… | 2025-12-31T06:30:17Z | 2026-01-02T15:30:27Z |
| ghsa-wgr2-qr2w-94qw |
9.8 (3.1)
|
givanz VvvebJs 1.7.2 suffers from a File Upload vulnerability via save.php. | 2025-12-29T21:30:25Z | 2026-01-02T15:30:25Z |
| ghsa-wc9p-rvp2-mc4r |
7.3 (3.1)
|
A Stored Cross-Site Scripting (XSS) vulnerability exists in the Meeting location field of the Creat… | 2025-12-30T21:30:32Z | 2026-01-02T15:30:25Z |
| ghsa-vrjf-962m-57c2 |
7.1 (3.1)
|
TrueConf Client 8.5.2 is vulnerable to DLL hijacking via crafted wfapi.dll allowing local attackers… | 2025-12-30T21:30:32Z | 2026-01-02T15:30:25Z |
| ghsa-q2hc-2xvc-9p5c |
8.8 (3.1)
8.7 (4.0)
|
Screen SFT DAB 1.9.3 contains an authentication bypass vulnerability that allows attackers to explo… | 2025-12-11T00:30:32Z | 2026-01-02T15:30:25Z |
| ghsa-j3gq-w4jw-w88g |
6.5 (3.1)
|
An issue was discovered in Zeroheight (SaaS) prior to 2025-06-13. A legacy user creation API pathwa… | 2025-12-30T18:30:19Z | 2026-01-02T15:30:25Z |
| ghsa-86hp-crvx-3qvr |
3.5 (3.1)
|
An HTML Injection vulnerability in TrueConf server 5.5.2.10813 in the conference description field … | 2025-12-30T21:30:33Z | 2026-01-02T15:30:25Z |
| ghsa-5vw2-j3g7-v489 |
7.3 (3.1)
|
A CSV Formula Injection vulnerability in TrueConf Server v5.5.2.10813 allows a normal user to injec… | 2025-12-30T21:30:32Z | 2026-01-02T15:30:25Z |
| ghsa-2rqx-6v8j-7xmq |
9.8 (3.1)
|
givanz VvvebJs 1.7.2 is vulnerable to Insecure File Upload. | 2025-12-29T21:30:25Z | 2026-01-02T15:30:25Z |
| ghsa-vmpx-5rfc-fgm5 |
7.2 (3.1)
|
Comtech Stampede FX-1010 7.4.3 devices allow remote authenticated administrators to achieve remote … | 2022-05-24T17:06:56Z | 2026-01-02T15:30:24Z |
| ghsa-qjp3-3g79-p4v7 |
7.2 (3.1)
|
Comtech Stampede FX-1010 7.4.3 devices allow remote authenticated administrators to achieve remote … | 2022-05-24T17:06:56Z | 2026-01-02T15:30:24Z |
| ghsa-hrj6-9mp8-vxmq |
6.5 (3.1)
7.1 (4.0)
|
Screen SFT DAB 1.9.3 contains an authentication bypass vulnerability that allows attackers to chang… | 2025-12-11T00:30:33Z | 2026-01-02T15:30:24Z |
| ghsa-39xw-g82r-qfvq |
7.2 (3.1)
|
Comtech Stampede FX-1010 7.4.3 devices allow remote authenticated administrators to achieve remote … | 2022-05-24T17:06:56Z | 2026-01-02T15:30:24Z |
| ghsa-33mg-r278-fh2j |
7.2 (3.1)
|
Comtech Stampede FX-1010 7.4.3 devices allow remote authenticated administrators to execute arbitra… | 2022-05-24T17:05:30Z | 2026-01-02T15:30:24Z |
| ghsa-fq56-hvg6-wvm5 |
9.1 (3.1)
|
Signal K Server vulnerable to JWT Token Theft via WebSocket Enumeration and Unauthenticated Polling | 2026-01-02T15:28:54Z | 2026-01-02T15:28:55Z |
| ghsa-vfrf-vcj7-wvr8 |
6.3 (3.1)
|
Signal K Server Vulnerable to Access Request Spoofing | 2026-01-02T15:26:11Z | 2026-01-02T15:26:11Z |
| ghsa-fpf5-w967-rr2m |
5.3 (3.1)
|
Signal K Server Vulnerable to Unauthenticated Information Disclosure via Exposed Endpoints | 2026-01-02T15:22:11Z | 2026-01-02T15:22:11Z |
| ghsa-7rqc-ff8m-7j23 |
7.5 (3.1)
|
Signal K Server Vulnerable to Denial of Service via Unrestricted Access Request Flooding | 2026-01-02T15:20:05Z | 2026-01-02T15:20:05Z |
| ghsa-w3x5-7c4c-66p9 |
9.6 (3.1)
|
Signal K Server has Unauthenticated State Pollution leading to Remote Code Execution (RCE) | 2026-01-02T15:11:49Z | 2026-01-02T15:11:50Z |
| ghsa-8wf8-frjg-xv74 |
6.3 (3.1)
5.3 (4.0)
|
lsFusion Server is vulnerable to Path Traversal through its unpackFile function | 2025-11-17T06:30:15Z | 2026-01-02T14:39:16Z |
| ghsa-xg6j-v8rf-4p7v |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was found in PHPGurukul Online Course Registration up to 3.1. This issue affects so… | 2026-01-02T12:30:28Z | 2026-01-02T12:30:28Z |
| ghsa-rv99-x6rg-jm7h |
7.3 (3.1)
5.5 (4.0)
|
A flaw has been found in Yonyou KSOA 9.0. Affected by this vulnerability is an unknown functionalit… | 2026-01-02T09:30:27Z | 2026-01-02T09:30:27Z |
| ghsa-cmfj-6f7f-3rg9 |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was detected in Yonyou KSOA 9.0. Affected is an unknown function of the file /kp/Pr… | 2026-01-02T09:30:27Z | 2026-01-02T09:30:27Z |
| ghsa-3q7v-j28r-j6hx |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was determined in code-projects Content Management System 1.0. This impacts an unkn… | 2026-01-02T09:30:27Z | 2026-01-02T09:30:27Z |
| ghsa-23rv-9x82-j4fq |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability has been found in Yonyou KSOA 9.0. Affected by this issue is some unknown functiona… | 2026-01-02T09:30:27Z | 2026-01-02T09:30:27Z |
| ghsa-r356-8ggm-5wj2 |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was identified in jackying H-ui.admin up to 3.1. This affects an unknown function i… | 2026-01-02T06:30:26Z | 2026-01-02T06:30:26Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-25444 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.033430Z |
| gsd-2024-25454 | Bento4 v1.6.0-640 was discovered to contain a NULL pointer dereference via the AP4_Descri… | 2024-02-08T06:02:25.032857Z |
| gsd-2024-25504 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.032565Z |
| gsd-2024-25175 | An issue in Kickdler before v1.107.0 allows attackers to provide an XSS payload via a HTT… | 2024-02-08T06:02:25.032004Z |
| gsd-2024-25555 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.031715Z |
| gsd-2024-25416 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.031321Z |
| gsd-2024-25494 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.030409Z |
| gsd-2024-25260 | elfutils v0.189 was discovered to contain a NULL pointer dereference via the handle_verde… | 2024-02-08T06:02:25.030025Z |
| gsd-2024-25195 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.029188Z |
| gsd-2024-25531 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.028801Z |
| gsd-2024-25505 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.028521Z |
| gsd-2024-25185 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.028220Z |
| gsd-2024-25473 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.027732Z |
| gsd-2024-25535 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.027446Z |
| gsd-2024-25400 | Subrion CMS 4.2.1 is vulnerable to SQL Injection via ia.core.mysqli.php. | 2024-02-08T06:02:25.027216Z |
| gsd-2024-25162 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.026930Z |
| gsd-2024-25534 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.026638Z |
| gsd-2024-25200 | Espruino 2v20 (commit fcc9ba4) was discovered to contain a Stack Overflow via the jspeFac… | 2024-02-08T06:02:25.025646Z |
| gsd-2024-25373 | Tenda AC10V4.0 V16.03.10.20 was discovered to contain a stack overflow via the page param… | 2024-02-08T06:02:25.025275Z |
| gsd-2024-25468 | An issue in TOTOLINK X5000R V.9.1.0u.6369_B20230113 allows a remote attacker to cause a d… | 2024-02-08T06:02:25.024926Z |
| gsd-2024-25170 | An issue in Mezzanine v6.0.0 allows attackers to bypass access controls via manipulating … | 2024-02-08T06:02:25.024558Z |
| gsd-2024-25347 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.023970Z |
| gsd-2024-25359 | An issue in zuoxingdong lagom v.0.1.2 allows a local attacker to execute arbitrary code v… | 2024-02-08T06:02:25.022383Z |
| gsd-2024-25433 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.021874Z |
| gsd-2024-25285 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.021300Z |
| gsd-2024-25532 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.021053Z |
| gsd-2024-25369 | A reflected Cross-Site Scripting (XSS) vulnerability in FUEL CMS 1.5.2allows attackers to… | 2024-02-08T06:02:25.020482Z |
| gsd-2024-25389 | RT-Thread through 5.0.2 generates random numbers with a weak algorithm of "seed = 214013L… | 2024-02-08T06:02:25.020171Z |
| gsd-2024-25395 | A buffer overflow occurs in utilities/rt-link/src/rtlink.c in RT-Thread through 5.0.2. | 2024-02-08T06:02:25.018069Z |
| gsd-2024-25487 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.017791Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-183490 | Malicious code in lobac-ubib-gafugyfaifdagab (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183489 | Malicious code in lobac-ubib-gafugyfaidagab (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183488 | Malicious code in lobac-ubib-gafugyfagab (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183487 | Malicious code in lobac-ubib-gafugyfadagab (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183486 | Malicious code in lobac-ubib-gafugyfaagab (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183485 | Malicious code in lobac-ubib-gafufunfab (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183484 | Malicious code in lobac-ubib-gafufunb (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183483 | Malicious code in lobac-ubib-gafufufab (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183482 | Malicious code in lobac-ubib-gafub (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183481 | Malicious code in lobac-ubib-gafiufuufufaub (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183480 | Malicious code in lobac-ubib-gafiufuuffaub (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183479 | Malicious code in lobac-ubib-gafiufuufaub (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183478 | Malicious code in lobac-ubg-afe (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183477 | Malicious code in lobac-ubg-afdmafdaeu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183476 | Malicious code in lobac-ubg-afdmafdaceu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183475 | Malicious code in lobac-ubg-afdmafdacatfeu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183474 | Malicious code in lobac-ubg-afdmafdacateu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183473 | Malicious code in lobac-ubg-afdmafaeu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183472 | Malicious code in lobac-ubg-afdmaeu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183471 | Malicious code in lobac-ubg-afdmaaeu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183470 | Malicious code in lobac-ubg-afdeu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183469 | Malicious code in lobac-ubg-afde (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183468 | Malicious code in lobac-ubg-afdaeu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183467 | Malicious code in lobac-ubg-ae (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183466 | Malicious code in lobac-ubg-abufe (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183465 | Malicious code in lobac-ubg-abufavigaute (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183464 | Malicious code in lobac-ubg-abufavigaaute (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183463 | Malicious code in lobac-ubg-abufave (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183462 | Malicious code in lobac-ubg-abufavaute (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183461 | Malicious code in lobac-ubg-abufae (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2023:4953 | Red Hat Security Advisory: thunderbird security update | 2023-09-04T16:01:04+00:00 | 2025-11-21T18:44:22+00:00 |
| rhsa-2023:4952 | Red Hat Security Advisory: firefox security update | 2023-09-04T16:03:55+00:00 | 2025-11-21T18:44:21+00:00 |
| rhsa-2023:4951 | Red Hat Security Advisory: firefox security update | 2023-09-04T15:52:41+00:00 | 2025-11-21T18:44:20+00:00 |
| rhsa-2023:4950 | Red Hat Security Advisory: firefox security update | 2023-09-04T15:52:35+00:00 | 2025-11-21T18:44:20+00:00 |
| rhsa-2023:4949 | Red Hat Security Advisory: firefox security update | 2023-09-04T15:54:06+00:00 | 2025-11-21T18:44:20+00:00 |
| rhsa-2023:4948 | Red Hat Security Advisory: thunderbird security update | 2023-09-04T15:53:39+00:00 | 2025-11-21T18:44:19+00:00 |
| rhsa-2023:4947 | Red Hat Security Advisory: thunderbird security update | 2023-09-04T15:52:38+00:00 | 2025-11-21T18:44:19+00:00 |
| rhsa-2023:4946 | Red Hat Security Advisory: thunderbird security update | 2023-09-04T15:52:56+00:00 | 2025-11-21T18:44:18+00:00 |
| rhsa-2023:4945 | Red Hat Security Advisory: thunderbird security update | 2023-09-04T15:57:43+00:00 | 2025-11-21T18:44:17+00:00 |
| rhsa-2023:4933 | Red Hat Security Advisory: Logging Subsystem 5.7.6 - Red Hat OpenShift security update | 2023-09-13T14:01:26+00:00 | 2025-11-21T18:44:17+00:00 |
| rhsa-2023:4910 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.4 release and security update | 2023-09-04T12:24:13+00:00 | 2025-11-21T18:44:13+00:00 |
| rhsa-2023:4909 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.7.4 release and security update | 2023-09-04T12:19:35+00:00 | 2025-11-21T18:44:13+00:00 |
| rhsa-2023:4889 | Red Hat Security Advisory: DevWorkspace Operator 0.22 release | 2023-08-30T21:20:44+00:00 | 2025-11-21T18:44:12+00:00 |
| rhsa-2023:4888 | Red Hat Security Advisory: kpatch-patch security update | 2023-08-30T22:06:07+00:00 | 2025-11-21T18:44:11+00:00 |
| rhsa-2023:4877 | Red Hat Security Advisory: java-1.8.0-ibm security update | 2023-08-30T13:46:23+00:00 | 2025-11-21T18:44:10+00:00 |
| rhsa-2023:4876 | Red Hat Security Advisory: java-1.8.0-ibm security update | 2023-08-30T13:46:09+00:00 | 2025-11-21T18:44:10+00:00 |
| rhsa-2023:4838 | Red Hat Security Advisory: cups security update | 2023-08-29T13:07:14+00:00 | 2025-11-21T18:44:10+00:00 |
| rhsa-2023:4864 | Red Hat Security Advisory: cups security update | 2023-08-29T18:17:03+00:00 | 2025-11-21T18:44:08+00:00 |
| rhsa-2023:4834 | Red Hat Security Advisory: kpatch-patch security update | 2023-08-29T09:34:16+00:00 | 2025-11-21T18:44:07+00:00 |
| rhsa-2023:4829 | Red Hat Security Advisory: kpatch-patch security update | 2023-08-29T09:26:31+00:00 | 2025-11-21T18:44:06+00:00 |
| rhsa-2023:4828 | Red Hat Security Advisory: kpatch-patch security update | 2023-08-29T09:26:24+00:00 | 2025-11-21T18:44:06+00:00 |
| rhsa-2023:4817 | Red Hat Security Advisory: kernel-rt security and bug fix update | 2023-08-29T09:25:23+00:00 | 2025-11-21T18:44:03+00:00 |
| rhsa-2023:4815 | Red Hat Security Advisory: kernel security and bug fix update | 2023-08-29T10:04:22+00:00 | 2025-11-21T18:44:03+00:00 |
| rhsa-2023:4809 | Red Hat Security Advisory: librsvg2 security update | 2023-08-29T09:23:41+00:00 | 2025-11-21T18:44:01+00:00 |
| rhsa-2023:4799 | Red Hat Security Advisory: virt:rhel and virt-devel:rhel security and bug fix update | 2023-08-29T09:21:20+00:00 | 2025-11-21T18:43:59+00:00 |
| rhsa-2023:4771 | Red Hat Security Advisory: cups security update | 2023-08-28T13:13:35+00:00 | 2025-11-21T18:43:57+00:00 |
| rhsa-2023:4770 | Red Hat Security Advisory: cups security update | 2023-08-28T13:17:16+00:00 | 2025-11-21T18:43:56+00:00 |
| rhsa-2023:4769 | Red Hat Security Advisory: cups security update | 2023-08-28T13:14:09+00:00 | 2025-11-21T18:43:55+00:00 |
| rhsa-2023:4768 | Red Hat Security Advisory: cups security update | 2023-08-28T13:14:08+00:00 | 2025-11-21T18:43:55+00:00 |
| rhsa-2023:4766 | Red Hat Security Advisory: cups security update | 2023-08-28T12:58:10+00:00 | 2025-11-21T18:43:52+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2021-2060 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.50 and prior 5.7.32 and prior and 8.0.22 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-01-02T00:00:00.000Z | 2021-01-23T00:00:00.000Z |
| msrc_cve-2021-2058 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Locking). Supported versions that are affected are 8.0.22 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-01-02T00:00:00.000Z | 2021-01-23T00:00:00.000Z |
| msrc_cve-2021-2056 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.22 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-01-02T00:00:00.000Z | 2021-01-23T00:00:00.000Z |
| msrc_cve-2021-2048 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.22 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.0 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H). | 2021-01-02T00:00:00.000Z | 2021-01-23T00:00:00.000Z |
| msrc_cve-2021-2046 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.22 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.8 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H). | 2021-01-02T00:00:00.000Z | 2021-01-23T00:00:00.000Z |
| msrc_cve-2021-2038 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services). Supported versions that are affected are 8.0.22 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-01-02T00:00:00.000Z | 2021-01-23T00:00:00.000Z |
| msrc_cve-2021-2036 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.22 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-01-02T00:00:00.000Z | 2021-01-23T00:00:00.000Z |
| msrc_cve-2021-2032 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Information Schema). Supported versions that are affected are 5.7.32 and prior and 8.0.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). | 2021-01-02T00:00:00.000Z | 2021-01-23T00:00:00.000Z |
| msrc_cve-2021-2031 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.22 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-01-02T00:00:00.000Z | 2021-01-23T00:00:00.000Z |
| msrc_cve-2021-2024 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2021-01-02T00:00:00.000Z | 2021-01-23T00:00:00.000Z |
| msrc_cve-2021-2022 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.6.50 and prior 5.7.32 and prior and 8.0.22 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-01-02T00:00:00.000Z | 2021-01-23T00:00:00.000Z |
| msrc_cve-2021-2021 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.22 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-01-02T00:00:00.000Z | 2021-01-23T00:00:00.000Z |
| msrc_cve-2021-2011 | Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.7.32 and prior and 8.0.22 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H). | 2021-01-02T00:00:00.000Z | 2021-01-23T00:00:00.000Z |
| msrc_cve-2021-2010 | Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.50 and prior 5.7.32 and prior and 8.0.22 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of MySQL Client accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Client. CVSS 3.1 Base Score 4.2 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L). | 2021-01-02T00:00:00.000Z | 2021-01-23T00:00:00.000Z |
| msrc_cve-2021-2002 | MySQL Server Replication Vulnerability Allows High-Privileged Remote Attackers to Cause Denial of Service (DoS) in Versions 8.0.22 and Earlier | 2021-01-02T00:00:00.000Z | 2021-01-23T00:00:00.000Z |
| msrc_cve-2021-23239 | The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path. | 2021-01-02T00:00:00.000Z | 2021-01-20T00:00:00.000Z |
| msrc_cve-2020-28374 | In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7 insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request aka CID-2896c93811e3. For example an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore. | 2021-01-02T00:00:00.000Z | 2021-01-20T00:00:00.000Z |
| msrc_cve-2020-25659 | python-cryptography 3.2 is vulnerable to Bleichenbacher timing attacks in the RSA decryption API via timed processing of valid PKCS#1 v1.5 ciphertext. | 2021-01-02T00:00:00.000Z | 2021-01-20T00:00:00.000Z |
| msrc_cve-2021-23240 | selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable. | 2021-01-02T00:00:00.000Z | 2021-01-15T00:00:00.000Z |
| msrc_cve-2019-5188 | A code execution vulnerability exists in the directory rehashing functionality of E2fsprogs e2fsck 1.45.4. A specially crafted ext4 directory can cause an out-of-bounds write on the stack resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability. | 2020-01-02T00:00:00.000Z | 2021-01-13T00:00:00.000Z |
| msrc_cve-2019-5094 | An exploitable code execution vulnerability exists in the quota file functionality of E2fsprogs 1.45.3. A specially crafted ext4 partition can cause an out-of-bounds write on the heap resulting in code execution. An attacker can corrupt a partition to trigger this vulnerability. | 2019-09-02T00:00:00.000Z | 2021-01-12T00:00:00.000Z |
| msrc_cve-2020-36158 | mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value aka CID-5c455c5ab332. | 2021-01-02T00:00:00.000Z | 2021-01-09T00:00:00.000Z |
| msrc_cve-2020-35507 | There's a flaw in bfd_pef_parse_function_stubs of bfd/pef.c in binutils in versions prior to 2.34 which could allow an attacker who is able to submit a crafted file to be processed by objdump to cause a NULL pointer dereference. The greatest threat of this flaw is to application availability. | 2021-01-02T00:00:00.000Z | 2021-01-07T00:00:00.000Z |
| msrc_cve-2020-35496 | There's a flaw in bfd_pef_scan_start_address() of bfd/pef.c in binutils which could allow an attacker who is able to submit a crafted file to be processed by objdump to cause a NULL pointer dereference. The greatest threat of this flaw is to application availability. This flaw affects binutils versions prior to 2.34. | 2021-01-02T00:00:00.000Z | 2021-01-07T00:00:00.000Z |
| msrc_cve-2020-35495 | There's a flaw in binutils /bfd/pef.c. An attacker who is able to submit a crafted input file to be processed by the objdump program could cause a null pointer dereference. The greatest threat from this flaw is to application availability. This flaw affects binutils versions prior to 2.34. | 2021-01-02T00:00:00.000Z | 2021-01-07T00:00:00.000Z |
| msrc_cve-2020-35494 | There's a flaw in binutils /opcodes/tic4x-dis.c. An attacker who is able to submit a crafted input file to be processed by binutils could cause usage of uninitialized memory. The highest threat is to application availability with a lower threat to data confidentiality. This flaw affects binutils versions prior to 2.34. | 2021-01-02T00:00:00.000Z | 2021-01-07T00:00:00.000Z |
| msrc_cve-2020-35493 | A flaw exists in binutils in bfd/pef.c. An attacker who is able to submit a crafted PEF file to be parsed by objdump could cause a heap buffer overflow -> out-of-bounds read that could lead to an impact to application availability. This flaw affects binutils versions prior to 2.34. | 2021-01-02T00:00:00.000Z | 2021-01-07T00:00:00.000Z |
| msrc_cve-2019-25013 | The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32 when processing invalid multi-byte input sequences in the EUC-KR encoding may have a buffer over-read. | 2021-01-02T00:00:00.000Z | 2021-01-07T00:00:00.000Z |
| msrc_cve-2020-29396 | A sandboxing issue in Odoo Community 11.0 through 13.0 and Odoo Enterprise 11.0 through 13.0 when running with Python 3.6 or later allows remote authenticated users to execute arbitrary code leading to privilege escalation. | 2020-12-02T00:00:00.000Z | 2020-12-24T00:00:00.000Z |
| msrc_cve-2020-29363 | An issue was discovered in p11-kit 0.23.6 through 0.23.21. A heap-based buffer overflow has been discovered in the RPC protocol used by p11-kit server/remote commands and the client library. When the remote entity supplies a serialized byte array in a CK_ATTRIBUTE the receiving entity may not allocate sufficient length for the buffer to store the deserialized value. | 2020-12-02T00:00:00.000Z | 2020-12-24T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-201610-0418 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:02:09.222000Z |
| var-201610-0446 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:02:09.183000Z |
| var-201610-0440 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:02:09.143000Z |
| var-201610-0481 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:02:09.106000Z |
| var-201610-0444 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:02:09.068000Z |
| var-201610-0477 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:02:09.034000Z |
| var-201610-0457 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:02:08.997000Z |
| var-201610-0135 | Windows and Mac OS X Run on Adobe Reader and Acrobat Any code that could be executed or s… | 2025-04-13T23:02:08.957000Z |
| var-201610-0455 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:02:08.816000Z |
| var-201610-0450 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:02:08.777000Z |
| var-201610-0433 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:02:08.737000Z |
| var-201610-0482 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:02:08.695000Z |
| var-201610-0141 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.18, Acrobat and Acro… | 2025-04-13T23:02:08.660000Z |
| var-201610-0432 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:02:08.627000Z |
| var-201610-0453 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:02:08.588000Z |
| var-201610-0421 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:02:08.553000Z |
| var-201610-0468 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.18, Acrobat and Acro… | 2025-04-13T23:02:08.506000Z |
| var-201610-0413 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:02:04.919000Z |
| var-201610-0424 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.18, Acrobat and Acro… | 2025-04-13T23:02:04.882000Z |
| var-201610-0419 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:02:04.844000Z |
| var-201610-0479 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:02:04.804000Z |
| var-201610-0443 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:02:04.772000Z |
| var-201610-0142 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.18, Acrobat and Acro… | 2025-04-13T23:02:04.733000Z |
| var-201610-0435 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:02:04.700000Z |
| var-201610-0417 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:02:04.665000Z |
| var-201610-0459 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.18, Acrobat and Acro… | 2025-04-13T23:02:04.622000Z |
| var-201610-0449 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.18, Acrobat and Acro… | 2025-04-13T23:02:04.583000Z |
| var-201610-0415 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:02:04.550000Z |
| var-201610-0420 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:02:04.517000Z |
| var-201610-0441 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:02:04.473000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2020:2718-1 | Security update for pdns | 2020-09-23T07:49:01Z | 2020-09-23T07:49:01Z |
| suse-su-2020:2715-1 | Security update for grafana | 2020-09-22T15:11:19Z | 2020-09-22T15:11:19Z |
| suse-su-2020:2714-1 | Security update for ovmf | 2020-09-22T15:09:20Z | 2020-09-22T15:09:20Z |
| suse-su-2020:2713-1 | Security update for ovmf | 2020-09-22T15:09:02Z | 2020-09-22T15:09:02Z |
| suse-su-2020:2711-1 | Security update for libmspack | 2020-09-22T15:07:08Z | 2020-09-22T15:07:08Z |
| suse-su-2020:2710-1 | Security update for rubygem-actionpack-5_1 | 2020-09-22T15:06:43Z | 2020-09-22T15:06:43Z |
| suse-su-2020:2699-1 | Security update for python3 | 2020-09-21T15:54:43Z | 2020-09-21T15:54:43Z |
| suse-su-2020:2698-1 | Security update for python-pip | 2020-09-21T15:51:04Z | 2020-09-21T15:51:04Z |
| suse-su-2020:2691-1 | Security update for ovmf | 2020-09-21T09:24:59Z | 2020-09-21T09:24:59Z |
| suse-su-2020:2690-1 | Security update for jasper | 2020-09-21T08:57:10Z | 2020-09-21T08:57:10Z |
| suse-su-2020:2689-1 | Security update for jasper | 2020-09-21T08:56:31Z | 2020-09-21T08:56:31Z |
| suse-su-2020:2687-1 | Security update for less | 2020-09-21T08:55:03Z | 2020-09-21T08:55:03Z |
| suse-su-2020:2686-1 | Security update for rubygem-actionview-4_2 | 2020-09-21T08:54:48Z | 2020-09-21T08:54:48Z |
| suse-su-2020:2678-1 | Security update for rubygem-rack | 2020-09-18T08:50:29Z | 2020-09-18T08:50:29Z |
| suse-su-2020:2673-1 | Security update for samba | 2020-09-17T13:33:18Z | 2020-09-17T13:33:18Z |
| suse-su-2020:2661-1 | Security update for perl-DBI | 2020-09-16T15:02:23Z | 2020-09-16T15:02:23Z |
| suse-su-2020:0079-2 | Security update for libzypp | 2020-09-16T14:17:32Z | 2020-09-16T14:17:32Z |
| suse-su-2020:0079-1 | Security update for libzypp | 2020-09-16T14:17:21Z | 2020-09-16T14:17:21Z |
| suse-su-2020:2660-1 | Security update for libsolv | 2020-09-16T14:15:37Z | 2020-09-16T14:15:37Z |
| suse-su-2020:2650-1 | Security update for SUSE Manager Server 4.0 | 2020-09-16T12:24:27Z | 2020-09-16T12:24:27Z |
| suse-su-2020:2648-1 | Security update for SUSE Manager 3.2 | 2020-09-16T12:23:03Z | 2020-09-16T12:23:03Z |
| suse-su-2020:2647-1 | Security update for for SUSE Manager 4.1 | 2020-09-16T12:22:50Z | 2020-09-16T12:22:50Z |
| suse-su-2020:2646-1 | Security update for perl-DBI | 2020-09-16T10:07:32Z | 2020-09-16T10:07:32Z |
| suse-su-2020:2645-1 | Security update for perl-DBI | 2020-09-16T10:07:18Z | 2020-09-16T10:07:18Z |
| suse-su-2020:14493-1 | Security update for perl-DBI | 2020-09-16T08:47:32Z | 2020-09-16T08:47:32Z |
| suse-su-2020:14491-1 | Security update for openssl | 2020-09-15T09:19:49Z | 2020-09-15T09:19:49Z |
| suse-su-2020:2634-1 | Security update for compat-openssl098 | 2020-09-15T09:19:00Z | 2020-09-15T09:19:00Z |
| suse-su-2020:14490-1 | Security update for shim | 2020-09-15T08:20:58Z | 2020-09-15T08:20:58Z |
| suse-su-2020:14489-1 | Security update for MozillaFirefox | 2020-09-14T16:35:18Z | 2020-09-14T16:35:18Z |
| suse-su-2020:2631-1 | Security update for the Linux Kernel | 2020-09-14T16:34:45Z | 2020-09-14T16:34:45Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2024-39360 | Linux kernel代码问题漏洞(CNVD-2024-39360) | 2024-09-18 | 2024-09-26 |
| cnvd-2024-39359 | Linux kernel代码问题漏洞(CNVD-2024-39359) | 2024-09-18 | 2024-09-26 |
| cnvd-2024-39358 | Linux kernel存在未明漏洞(CNVD-2024-39358) | 2024-09-18 | 2024-09-26 |
| cnvd-2024-39357 | Linux kernel存在未明漏洞(CNVD-2024-39357) | 2024-09-18 | 2024-09-26 |
| cnvd-2024-39354 | Linux kernel存在未明漏洞(CNVD-2024-39354) | 2024-09-18 | 2024-09-26 |
| cnvd-2024-39353 | Linux kernel存在未明漏洞(CNVD-2024-39353) | 2024-09-18 | 2024-09-26 |
| cnvd-2024-39302 | Linux kernel存在未明漏洞(CNVD-2024-39302) | 2024-09-18 | 2024-09-26 |
| cnvd-2024-39301 | Linux kernel存在未明漏洞(CNVD-2024-39301) | 2024-09-18 | 2024-09-26 |
| cnvd-2024-39300 | Linux kernel存在未明漏洞(CNVD-2024-39300) | 2024-09-18 | 2024-09-26 |
| cnvd-2024-39299 | Linux kernel存在未明漏洞(CNVD-2024-39299) | 2024-09-18 | 2024-09-26 |
| cnvd-2024-39298 | Linux kernel存在未明漏洞(CNVD-2024-39298) | 2024-09-20 | 2024-09-26 |
| cnvd-2024-39297 | Linux kernel存在未明漏洞(CNVD-2024-39297) | 2024-09-20 | 2024-09-26 |
| cnvd-2024-39296 | Linux kernel存在未明漏洞(CNVD-2024-39296) | 2024-09-20 | 2024-09-26 |
| cnvd-2024-39295 | Linux kernel存在未明漏洞(CNVD-2024-39295) | 2024-09-20 | 2024-09-26 |
| cnvd-2024-39294 | Linux kernel代码问题漏洞(CNVD-2024-39294) | 2024-09-20 | 2024-09-26 |
| cnvd-2024-39293 | Linux kernel存在未明漏洞(CNVD-2024-39293) | 2024-09-20 | 2024-09-26 |
| cnvd-2024-39287 | Linux kernel存在未明漏洞(CNVD-2024-39287) | 2024-09-20 | 2024-09-26 |
| cnvd-2024-39284 | Linux kernel存在未明漏洞(CNVD-2024-39284) | 2024-09-20 | 2024-09-26 |
| cnvd-2024-39266 | Google Chrome存在未明漏洞(CNVD-2024-39266) | 2024-09-20 | 2024-09-26 |
| cnvd-2024-39262 | Linux kernel存在未明漏洞(CNVD-2024-39262) | 2024-09-20 | 2024-09-26 |
| cnvd-2024-39259 | D-Link DCS-960L存在未明漏洞 | 2024-09-20 | 2024-09-26 |
| cnvd-2024-39258 | FreeImage存在未明漏洞(CNVD-2024-39258) | 2024-09-23 | 2024-09-26 |
| cnvd-2024-39257 | D-Link DAR-7000操作系统命令注入漏洞 | 2024-09-23 | 2024-09-26 |
| cnvd-2024-39256 | 友讯电子设备(上海)有限公司DIR-X4860存在未明漏洞(CNVD-2024-39256) | 2024-09-23 | 2024-09-26 |
| cnvd-2024-39254 | SEMCMS SQL注入漏洞(CNVD-2024-39254) | 2024-09-24 | 2024-09-26 |
| cnvd-2024-39253 | SeaCMS存在未明漏洞(CNVD-2024-39253) | 2024-09-24 | 2024-09-26 |
| cnvd-2024-39252 | DataEase XML外部实体注入漏洞 | 2024-09-24 | 2024-09-26 |
| cnvd-2024-39251 | DataEase远程命令执行漏洞(CNVD-2024-39251) | 2024-09-24 | 2024-09-26 |
| cnvd-2024-39250 | Google Chrome存在未明漏洞(CNVD-2024-39250) | 2024-09-25 | 2024-09-26 |
| cnvd-2024-39249 | Google Chrome存在未明漏洞(CNVD-2024-39249) | 2024-09-25 | 2024-09-26 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2010-avi-246 | Vulnérabilité dans certains contrôles ActiveX | 2010-06-09T00:00:00.000000 | 2010-06-09T00:00:00.000000 |
| certa-2010-avi-245 | Multiples vulnérabilités dans la décompression de fichiers multimédia sous Windows | 2010-06-09T00:00:00.000000 | 2010-06-09T00:00:00.000000 |
| certa-2010-avi-244 | Multiples vulnérabilités dans les pilotes noyaux de Windows | 2010-06-09T00:00:00.000000 | 2010-06-09T00:00:00.000000 |
| certa-2010-avi-243 | Multiples vulnérabilités dans Apple Safari | 2010-06-08T00:00:00.000000 | 2010-06-08T00:00:00.000000 |
| certa-2010-avi-241 | Vulnérabilités dans OpenOffice.org | 2010-06-07T00:00:00.000000 | 2010-06-08T00:00:00.000000 |
| certa-2010-avi-242 | Multiples vulnérabilités dans Novell eDirectory | 2010-06-07T00:00:00.000000 | 2010-06-07T00:00:00.000000 |
| certa-2010-avi-240 | Vulnérabilité dans CA ARCserve Backup | 2010-06-07T00:00:00.000000 | 2010-06-07T00:00:00.000000 |
| certa-2010-avi-239 | Vulnérabilités dans IBM DB2 | 2010-06-04T00:00:00.000000 | 2010-06-04T00:00:00.000000 |
| certa-2010-avi-238 | Multiples vulnérabilités dans MySQL Enterprise Monitor | 2010-06-04T00:00:00.000000 | 2010-06-04T00:00:00.000000 |
| certa-2010-avi-236 | Vulnérabilité dans HP StorageWorks Storage Mirroring | 2010-06-04T00:00:00.000000 | 2010-06-04T00:00:00.000000 |
| certa-2010-avi-235 | Multiples vulnérabilités dans IBM Lotus Connections | 2010-06-03T00:00:00.000000 | 2010-06-03T00:00:00.000000 |
| certa-2010-avi-234 | Vulnérabilité dans Joomla! | 2010-06-03T00:00:00.000000 | 2010-06-03T00:00:00.000000 |
| certa-2010-avi-233 | Multiples vulnérabilités dans FreeBSD | 2010-05-28T00:00:00.000000 | 2010-05-28T00:00:00.000000 |
| certa-2010-avi-232 | Vulnérabilité dans HP MFP Digital Sending Software | 2010-05-28T00:00:00.000000 | 2010-05-28T00:00:00.000000 |
| certa-2010-avi-231 | Vulnérabilité dans IBM Communication Server pour AIX | 2010-05-28T00:00:00.000000 | 2010-05-28T00:00:00.000000 |
| certa-2010-avi-230 | Vulnérabilité dans Adobe Photoshop | 2010-05-27T00:00:00.000000 | 2010-05-27T00:00:00.000000 |
| certa-2010-avi-229 | Multiples vulnérabilités dans Cisco Network Building Mediator | 2010-05-27T00:00:00.000000 | 2010-05-27T00:00:00.000000 |
| certa-2010-avi-228 | Multiples vulnérabilités dans Google Chrome | 2010-05-27T00:00:00.000000 | 2010-05-27T00:00:00.000000 |
| certa-2010-avi-227 | Vulnérabilité dans ClamAV | 2010-05-27T00:00:00.000000 | 2010-05-27T00:00:00.000000 |
| certa-2010-avi-226 | Vulnérabilité dans Foxit Reader | 2010-05-25T00:00:00.000000 | 2010-05-25T00:00:00.000000 |
| certa-2010-avi-225 | Vulnérabilités dans IBM WebSphere Application Server | 2010-05-21T00:00:00.000000 | 2010-05-21T00:00:00.000000 |
| certa-2010-avi-224 | Vulnérabilité dans IBM AIX | 2010-05-21T00:00:00.000000 | 2010-05-21T00:00:00.000000 |
| certa-2010-avi-223 | Multiples vulnérabilités dans MySQL | 2010-05-21T00:00:00.000000 | 2010-05-21T00:00:00.000000 |
| certa-2010-avi-222 | Vulnérabilité dans les produits Palo Alto Networks | 2010-05-20T00:00:00.000000 | 2010-05-20T00:00:00.000000 |
| certa-2010-avi-221 | Vulnérabilité dans HP-UX | 2010-05-20T00:00:00.000000 | 2010-05-20T00:00:00.000000 |
| certa-2010-avi-220 | Multiples vulnérabilités dans HP Performance Manager | 2010-05-20T00:00:00.000000 | 2010-05-20T00:00:00.000000 |
| certa-2010-avi-218 | Vulnérabilités dans HP Insight Control Server Migration | 2010-05-19T00:00:00.000000 | 2010-05-19T00:00:00.000000 |
| certa-2010-avi-217 | Multiples vulnérabilités Java de Mac OS X | 2010-05-19T00:00:00.000000 | 2010-05-19T00:00:00.000000 |
| certa-2010-avi-216 | Multiples vulnérabilités dans Invision Power Board | 2010-05-18T00:00:00.000000 | 2010-05-18T00:00:00.000000 |
| certa-2010-avi-215 | Vulnérabilité dans Pidgin | 2010-05-18T00:00:00.000000 | 2010-05-18T00:00:00.000000 |