Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-14478 |
7.5 (3.1)
|
Demo Importer Plus <= 2.0.9 - Authenticated (Author+) … |
kraftplugins |
Demo Importer Plus |
2026-01-17T07:27:37.627Z | 2026-01-20T19:23:29.088Z |
| CVE-2025-10484 |
9.8 (3.1)
|
Registration & Login with Mobile Phone Number for WooC… |
FmeAddons |
Registration & Login with Mobile Phone Number for WooCommerce |
2026-01-17T08:24:30.759Z | 2026-01-20T19:23:24.113Z |
| CVE-2026-0725 |
4.4 (3.1)
|
Integrate Dynamics 365 CRM <= 1.1.1 - Authenticated (A… |
cyberlord92 |
Integrate Dynamics 365 CRM |
2026-01-17T08:24:31.355Z | 2026-01-20T19:23:19.234Z |
| CVE-2025-14078 |
5.3 (3.1)
|
PAYGENT for WooCommerce <= 2.4.6 - Missing Authorizati… |
shoheitanaka |
PAYGENT for WooCommerce |
2026-01-17T08:24:31.760Z | 2026-01-20T19:23:14.231Z |
| CVE-2025-8615 |
6.4 (3.1)
|
CubeWP <= 1.1.26 - Authenticated (Contributor+) Stored… |
cubewp1211 |
CubeWP Framework |
2026-01-17T08:24:32.192Z | 2026-01-20T19:23:09.481Z |
| CVE-2025-23203 |
5.5 (3.1)
|
Icinga has rest API endpoints accessible to restricted users |
Icinga |
icingaweb2-module-director |
2025-03-26T13:44:58.110Z | 2026-01-20T19:13:43.844Z |
| CVE-2025-67263 |
6.1 (3.1)
|
Abacre Retail Point of Sale 14.0.0.396 is affecte… |
n/a |
n/a |
2026-01-20T00:00:00.000Z | 2026-01-20T18:53:28.009Z |
| CVE-2025-40679 |
5.1 (4.0)
|
HTML injection in Isshue from Bdtask |
Bdtask |
Isshue |
2026-01-20T11:53:39.846Z | 2026-01-20T18:50:40.146Z |
| CVE-2025-33233 |
7.8 (3.1)
|
NVIDIA Merlin Transformers4Rec for all platforms … |
NVIDIA |
Merlin Transformers4Rec |
2026-01-20T17:43:38.169Z | 2026-01-20T18:47:17.434Z |
| CVE-2025-45731 |
6.5 (3.1)
|
A group deletion race condition in 2FAuth v5.5.0 … |
n/a |
n/a |
2025-07-24T00:00:00.000Z | 2026-01-20T18:43:16.863Z |
| CVE-2026-22219 |
8.3 (4.0)
|
Chainlit < 2.9.4 SQLAlchemy Data Layer SSRF via /proje… |
Chainlit |
Chainlit |
2026-01-19T23:15:08.897Z | 2026-01-20T18:41:46.632Z |
| CVE-2026-0519 |
4.6 (4.0)
|
Information Disclosure in Secure Access Between 12.70 … |
Absolute Security |
Secure Access |
2026-01-17T01:13:59.183Z | 2026-01-20T18:39:13.845Z |
| CVE-2026-0518 |
4.8 (4.0)
|
XSS in Secure Access Consoles prior to 14.20 |
Absolute Security |
Secure Access |
2026-01-17T01:09:29.268Z | 2026-01-20T18:37:15.079Z |
| CVE-2026-22787 |
8.7 (4.0)
|
html2pdf.js has a cross-site scripting vulnerability |
eKoopmans |
html2pdf.js |
2026-01-14T16:52:38.372Z | 2026-01-20T18:37:09.279Z |
| CVE-2025-12825 |
5.3 (3.1)
|
User Registration Using Contact Form 7 <= 2.5 - Authen… |
zealopensource |
User Registration Using Contact Form 7 |
2026-01-17T04:34:02.212Z | 2026-01-20T18:34:56.055Z |
| CVE-2026-0517 |
6 (4.0)
|
Denial of Service in Secure Access Servers Prior to 14.20. |
Absolute Security |
Secure Access |
2026-01-17T01:04:55.634Z | 2026-01-20T18:34:14.258Z |
| CVE-2025-66019 |
6.6 (4.0)
|
pypdf manipulated LZWDecode streams can exhaust RAM |
py-pdf |
pypdf |
2025-11-25T23:38:12.473Z | 2026-01-20T18:33:02.928Z |
| CVE-2025-12168 |
4.3 (3.1)
|
Phrase TMS Integration for WordPress <= 4.7.5 - Missin… |
memsource |
Phrase TMS Integration for WordPress |
2026-01-17T04:34:01.207Z | 2026-01-20T18:32:40.697Z |
| CVE-2025-14029 |
5.3 (3.1)
|
Community Events <= 1.5.6 - Missing Authorization to U… |
jackdewey |
Community Events |
2026-01-17T04:34:00.530Z | 2026-01-20T18:31:08.439Z |
| CVE-2025-41025 |
5.1 (4.0)
|
Stored Cross-Site Scripting in Poultry Farm Management… |
Poultry Farm Management System |
Poultry Farm Management System |
2026-01-20T12:04:05.614Z | 2026-01-20T18:29:13.214Z |
| CVE-2026-0691 |
4.4 (3.1)
|
CM E-Mail Blacklist <= 1.6.2 - Authenticated (Administ… |
creativemindssolutions |
CM E-Mail Blacklist – Simple email filtering for safer registration |
2026-01-17T06:42:20.210Z | 2026-01-20T18:28:47.071Z |
| CVE-2026-0808 |
5.3 (3.1)
|
Spin Wheel <= 2.1.0 - Unauthenticated Client-Side Priz… |
bdthemes |
Spin Wheel – Interactive spinning wheel that offers coupons |
2026-01-17T06:42:20.697Z | 2026-01-20T18:27:18.935Z |
| CVE-2026-1222 |
8.6 (4.0)
7.2 (3.1)
|
BROWAN COMMUNICATIONS |PrismX MX100 AP controller - Ar… |
BROWAN COMMUNICATIONS |
PrismX MX100 AP controller |
2026-01-20T06:30:52.946Z | 2026-01-20T18:26:15.271Z |
| CVE-2026-1223 |
6.9 (4.0)
4.9 (3.1)
|
BROWAN COMMUNICATIONS |PrismX MX100 AP controller - In… |
BROWAN COMMUNICATIONS |
PrismX MX100 AP controller |
2026-01-20T06:35:17.742Z | 2026-01-20T18:24:10.328Z |
| CVE-2025-66523 |
6.1 (3.1)
|
Reflected Cross-Site Scripting (XSS) Vulnerability in … |
Foxit Software Inc. |
na1.foxitesign.foxit.com |
2026-01-20T06:51:34.771Z | 2026-01-20T18:08:07.692Z |
| CVE-2026-0895 |
5.2 (4.0)
|
Insecure Deserialization in extension "Mailqueue" (mai… |
TYPO3 |
Extension "Mailqueue" |
2026-01-20T07:19:00.786Z | 2026-01-20T18:07:10.983Z |
| CVE-2025-6035 |
6.1 (3.1)
|
Gimp: gimp integer overflow |
|
|
2025-06-13T15:21:17.439Z | 2026-01-20T17:56:26.216Z |
| CVE-2026-1183 |
5.1 (4.0)
|
HTML injection in multiple Botble products |
Botble |
TransP |
2026-01-20T12:09:05.269Z | 2026-01-20T17:51:26.528Z |
| CVE-2025-51602 |
4.8 (3.1)
|
mmstu.c in VideoLAN VLC media player before 3.0.2… |
VideoLAN |
VLC media player |
2026-01-16T00:00:00.000Z | 2026-01-20T17:35:37.090Z |
| CVE-2026-0625 |
9.3 (4.0)
|
D-Link DSL/DIR/DNS Command Injection via DNS Configura… |
D-Link |
DSL-2640B |
2026-01-05T21:14:48.992Z | 2026-01-20T17:34:41.776Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2024-49968 |
N/A
|
ext4: filesystems without casefold feature cannot be m… |
Linux |
Linux |
2024-10-21T18:02:18.369Z | 2026-01-19T12:17:51.927Z |
| CVE-2024-46830 |
N/A
|
KVM: x86: Acquire kvm->srcu when handling KVM_SET_VCPU… |
Linux |
Linux |
2024-09-27T12:39:28.396Z | 2026-01-19T12:17:50.664Z |
| CVE-2024-40928 |
N/A
|
net: ethtool: fix the error condition in ethtool_get_p… |
Linux |
Linux |
2024-07-12T12:25:07.769Z | 2026-01-19T12:17:49.472Z |
| CVE-2024-36927 |
N/A
|
ipv4: Fix uninit-value access in __ip_make_skb() |
Linux |
Linux |
2024-05-30T15:29:20.275Z | 2026-01-19T12:17:47.098Z |
| CVE-2024-36903 |
N/A
|
ipv6: Fix potential uninit-value access in __ip6_make_skb() |
Linux |
Linux |
2024-05-30T15:29:04.866Z | 2026-01-19T12:17:45.894Z |
| CVE-2023-52975 |
7.8 (3.1)
|
scsi: iscsi_tcp: Fix UAF during logout when accessing … |
Linux |
Linux |
2025-03-27T16:43:15.322Z | 2026-01-19T12:17:43.562Z |
| CVE-2022-49743 |
N/A
|
ovl: Use "buf" flexible array for memcpy() destination |
Linux |
Linux |
2025-03-27T16:42:54.289Z | 2026-01-19T12:17:42.348Z |
| CVE-2022-49267 |
N/A
|
mmc: core: use sysfs_emit() instead of sprintf() |
Linux |
Linux |
2025-02-26T01:56:16.211Z | 2026-01-19T12:17:38.477Z |
| CVE-2025-46397 |
7.8 (3.1)
|
Xfig: xfig: stack-overflow allows possible code execut… |
|
|
2025-04-23T20:55:09.795Z | 2026-01-19T03:55:40.389Z |
| CVE-2024-7885 |
7.5 (3.1)
|
Undertow: improper state management in proxy protocol … |
|
|
2024-08-21T14:13:36.579Z | 2026-01-19T03:51:37.166Z |
| CVE-2025-40920 |
8.6 (3.1)
|
Catalyst::Authentication::Credential::HTTP versions 1.… |
ETHER |
Catalyst::Authentication::Credential::HTTP |
2025-08-11T20:19:57.516Z | 2026-01-17T20:23:09.178Z |
| CVE-2025-68792 |
N/A
|
tpm2-sessions: Fix out of range indexing in name_size |
Linux |
Linux |
2026-01-13T15:29:04.226Z | 2026-02-09T08:33:39.373Z |
| CVE-2025-5489 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-01-16T22:19:09.219Z | |
| CVE-2025-5102 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-01-16T22:19:09.061Z | |
| CVE-2024-8506 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-01-16T22:19:08.895Z | |
| CVE-2024-8491 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-01-16T22:19:08.586Z | |
| CVE-2025-15456 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
bg5sbk MiniCMS Publish page-edit.php improper authentication |
bg5sbk |
MiniCMS |
2026-01-05T04:02:06.770Z | 2026-02-23T08:16:46.676Z |
| CVE-2022-50443 |
N/A
|
drm/rockchip: lvds: fix PM usage counter unbalance in … |
Linux |
Linux |
2025-10-01T11:42:18.900Z | 2025-10-01T11:42:18.900Z |
| CVE-2023-53461 |
N/A
|
io_uring: wait interruptibly for request completions on exit |
Linux |
Linux |
2025-10-01T11:42:32.525Z | 2025-10-02T07:04:22.533Z |
| CVE-2023-53462 |
N/A
|
hsr: Fix uninit-value access in fill_frame_info() |
Linux |
Linux |
2025-10-01T11:42:33.434Z | 2025-10-01T11:42:33.434Z |
| CVE-2023-53463 |
N/A
|
ibmvnic: Do not reset dql stats on NON_FATAL err |
Linux |
Linux |
2025-10-01T11:42:34.308Z | 2025-10-01T11:42:34.308Z |
| CVE-2025-61246 |
9.8 (3.1)
|
indieka900 online-shopping-system-php 1.0 is vuln… |
n/a |
n/a |
2026-01-08T00:00:00.000Z | 2026-01-08T19:37:53.508Z |
| CVE-2023-53448 |
N/A
|
fbdev: imxfb: Removed unneeded release_mem_region |
Linux |
Linux |
2025-10-01T11:42:20.557Z | 2025-10-01T11:42:20.557Z |
| CVE-2025-67091 |
6.5 (3.1)
|
An issue in GL Inet GL.Inet AX1800 Version 4.6.4 … |
n/a |
n/a |
2026-01-08T00:00:00.000Z | 2026-01-08T16:10:44.603Z |
| CVE-2025-67090 |
5.1 (3.1)
|
The LuCI web interface on Gl Inet GL.Inet AX1800 … |
n/a |
n/a |
2026-01-08T00:00:00.000Z | 2026-01-08T16:51:52.244Z |
| CVE-2025-67089 |
8.1 (3.1)
|
A command injection vulnerability exists in the G… |
n/a |
n/a |
2026-01-08T00:00:00.000Z | 2026-01-08T16:52:24.897Z |
| CVE-2023-53449 |
N/A
|
s390/dasd: Fix potential memleak in dasd_eckd_init() |
Linux |
Linux |
2025-10-01T11:42:21.371Z | 2025-10-01T11:42:21.371Z |
| CVE-2023-53451 |
N/A
|
scsi: qla2xxx: Fix potential NULL pointer dereference |
Linux |
Linux |
2025-10-01T11:42:22.857Z | 2026-01-05T10:20:37.445Z |
| CVE-2023-53452 |
N/A
|
wifi: rtw89: fix potential race condition between napi… |
Linux |
Linux |
2025-10-01T11:42:23.831Z | 2025-10-01T11:42:23.831Z |
| CVE-2025-63916 |
8.1 (3.1)
|
MyScreenTools v2.2.1.0 contains a critical OS com… |
n/a |
n/a |
2025-11-17T00:00:00.000Z | 2025-11-17T19:00:52.724Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2022-49267 | In the Linux kernel, the following vulnerability has been resolved: mmc: core: use sysfs_emit() in… | 2025-02-26T07:01:03.620 | 2026-01-19T13:16:05.963 |
| fkie_cve-2025-46397 | A flaw was found in xfig. This vulnerability allows possible code execution via local input manipul… | 2025-04-23T21:15:16.807 | 2026-01-19T04:15:58.400 |
| fkie_cve-2024-7885 | A vulnerability was found in Undertow where the ProxyProtocolReadListener reuses the same StringBui… | 2024-08-21T14:15:09.500 | 2026-01-19T04:15:58.173 |
| fkie_cve-2025-40920 | Catalyst::Authentication::Credential::HTTP versions 1.018 and earlier for Perl generate nonces usin… | 2025-08-11T21:15:28.087 | 2026-01-17T21:15:48.750 |
| fkie_cve-2025-68792 | In the Linux kernel, the following vulnerability has been resolved: tpm2-sessions: Fix out of rang… | 2026-01-13T16:16:01.090 | 2026-01-17T16:16:05.827 |
| fkie_cve-2025-5489 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2026-01-16T23:15:49.150 | 2026-01-16T23:15:49.150 |
| fkie_cve-2025-5102 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2026-01-16T23:15:49.090 | 2026-01-16T23:15:49.090 |
| fkie_cve-2024-8506 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2026-01-16T23:15:49.017 | 2026-01-16T23:15:49.017 |
| fkie_cve-2024-8491 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2026-01-16T23:15:48.460 | 2026-01-16T23:15:48.460 |
| fkie_cve-2025-15456 | A vulnerability has been found in bg5sbk MiniCMS up to 1.8. The affected element is an unknown func… | 2026-01-05T05:15:53.007 | 2026-01-16T21:35:03.127 |
| fkie_cve-2022-50443 | In the Linux kernel, the following vulnerability has been resolved: drm/rockchip: lvds: fix PM usa… | 2025-10-01T12:15:36.590 | 2026-01-16T21:34:09.787 |
| fkie_cve-2023-53461 | In the Linux kernel, the following vulnerability has been resolved: io_uring: wait interruptibly f… | 2025-10-01T12:15:47.723 | 2026-01-16T21:33:19.060 |
| fkie_cve-2023-53462 | In the Linux kernel, the following vulnerability has been resolved: hsr: Fix uninit-value access i… | 2025-10-01T12:15:47.887 | 2026-01-16T21:32:20.620 |
| fkie_cve-2023-53463 | In the Linux kernel, the following vulnerability has been resolved: ibmvnic: Do not reset dql stat… | 2025-10-01T12:15:48.120 | 2026-01-16T21:31:26.387 |
| fkie_cve-2025-61246 | indieka900 online-shopping-system-php 1.0 is vulnerable to SQL Injection in master/review_action.ph… | 2026-01-08T17:15:48.400 | 2026-01-16T21:31:24.953 |
| fkie_cve-2023-53448 | In the Linux kernel, the following vulnerability has been resolved: fbdev: imxfb: Removed unneeded… | 2025-10-01T12:15:41.033 | 2026-01-16T21:28:52.693 |
| fkie_cve-2025-67091 | An issue in GL Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulnerable. GL.Inet AX1800 Version 4.6… | 2026-01-08T16:15:45.577 | 2026-01-16T21:28:39.047 |
| fkie_cve-2025-67090 | The LuCI web interface on Gl Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulnerable. Fix availabl… | 2026-01-08T16:15:45.470 | 2026-01-16T21:28:08.207 |
| fkie_cve-2025-67089 | A command injection vulnerability exists in the GL-iNet GL-AXT1800 router firmware v4.6.8. The vuln… | 2026-01-08T16:15:45.333 | 2026-01-16T21:26:11.910 |
| fkie_cve-2023-53449 | In the Linux kernel, the following vulnerability has been resolved: s390/dasd: Fix potential memle… | 2025-10-01T12:15:41.250 | 2026-01-16T21:25:30.833 |
| fkie_cve-2023-53451 | In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix potential N… | 2025-10-01T12:15:43.413 | 2026-01-16T21:24:42.710 |
| fkie_cve-2023-53452 | In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: fix potential rac… | 2025-10-01T12:15:43.600 | 2026-01-16T21:23:45.690 |
| fkie_cve-2025-63916 | MyScreenTools v2.2.1.0 contains a critical OS command injection vulnerability in the GIF compressio… | 2025-11-17T16:15:50.700 | 2026-01-16T21:23:35.787 |
| fkie_cve-2023-53453 | In the Linux kernel, the following vulnerability has been resolved: drm/radeon: free iio for atomb… | 2025-10-01T12:15:43.787 | 2026-01-16T21:22:30.527 |
| fkie_cve-2025-10543 | In Eclipse Paho Go MQTT v3.1 library (paho.mqtt.golang) versions <=1.5.0 UTF-8 encoded strings, pas… | 2025-12-02T09:15:46.127 | 2026-01-16T21:22:24.750 |
| fkie_cve-2023-53454 | In the Linux kernel, the following vulnerability has been resolved: HID: multitouch: Correct devm … | 2025-10-01T12:15:43.953 | 2026-01-16T21:21:16.260 |
| fkie_cve-2023-53460 | In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: fix memory leak i… | 2025-10-01T12:15:47.570 | 2026-01-16T21:19:46.060 |
| fkie_cve-2025-46603 | Dell CloudBoost Virtual Appliance, versions 19.13.0.0 and prior, contains an Improper Restriction o… | 2025-12-05T19:15:48.233 | 2026-01-16T21:18:14.583 |
| fkie_cve-2025-34291 | Langflow versions up to and including 1.6.9 contain a chained vulnerability that enables account ta… | 2025-12-05T23:15:47.433 | 2026-01-16T21:17:02.097 |
| fkie_cve-2023-53455 | In the Linux kernel, the following vulnerability has been resolved: drm/vc4: drop all currently he… | 2025-10-01T12:15:44.910 | 2026-01-16T21:15:53.820 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-h8mg-wf4c-mjw7 |
4.3 (3.1)
|
The All-in-one Sticky Floating Contact Form, Call, Click to Chat, and 50+ Social Icon Tabs - My Sti… | 2026-01-01T18:30:27Z | 2026-01-01T18:30:27Z |
| ghsa-x8m4-6wf8-65hj |
4.3 (3.1)
5.3 (4.0)
|
A vulnerability was detected in PHPEMS up to 11.0. The impacted element is an unknown function. The… | 2026-01-01T15:30:26Z | 2026-01-01T15:30:26Z |
| ghsa-m3g8-r3rh-3qwc |
6.3 (3.1)
2.1 (4.0)
|
A security vulnerability has been detected in campcodes School File Management System 1.0. The affe… | 2026-01-01T15:30:26Z | 2026-01-01T15:30:26Z |
| ghsa-fpmp-qj84-cqfg |
7.3 (3.1)
5.5 (4.0)
|
A security flaw has been discovered in itsourcecode School Management System 1.0. This affects an u… | 2026-01-01T09:30:15Z | 2026-01-01T09:30:15Z |
| ghsa-cf34-5r96-m2mj |
2.4 (3.1)
1.9 (4.0)
|
A vulnerability was found in Campcodes Park Ticketing System 1.0. The impacted element is the funct… | 2025-12-30T03:30:16Z | 2026-01-01T09:30:14Z |
| ghsa-wwqj-qcq5-6fgq |
|
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it… | 2026-01-01T03:30:26Z | 2026-01-01T03:30:26Z |
| ghsa-vcxv-wr59-826x |
|
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it… | 2026-01-01T03:30:26Z | 2026-01-01T03:30:26Z |
| ghsa-v49g-2gm8-p7f9 |
|
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it… | 2026-01-01T03:30:26Z | 2026-01-01T03:30:26Z |
| ghsa-rcv9-w9gr-jwgx |
|
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it… | 2026-01-01T03:30:26Z | 2026-01-01T03:30:26Z |
| ghsa-m47c-hm3x-4xfv |
|
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it… | 2026-01-01T03:30:26Z | 2026-01-01T03:30:26Z |
| ghsa-cc96-8m79-fpqc |
|
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it… | 2026-01-01T03:30:26Z | 2026-01-01T03:30:26Z |
| ghsa-5fr3-hhp7-wq4m |
|
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it… | 2026-01-01T03:30:26Z | 2026-01-01T03:30:26Z |
| ghsa-49xh-83cw-6wmf |
|
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it… | 2026-01-01T03:30:26Z | 2026-01-01T03:30:26Z |
| ghsa-45hw-4ch3-chfw |
|
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it… | 2026-01-01T03:30:26Z | 2026-01-01T03:30:26Z |
| ghsa-3q8x-6r83-jhqw |
|
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it… | 2026-01-01T03:30:26Z | 2026-01-01T03:30:26Z |
| ghsa-38qh-wjxp-9443 |
|
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it… | 2026-01-01T03:30:26Z | 2026-01-01T03:30:26Z |
| ghsa-2p65-4wj7-rfxw |
|
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it… | 2026-01-01T03:30:26Z | 2026-01-01T03:30:26Z |
| ghsa-24v7-j54g-w8p7 |
|
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it… | 2026-01-01T03:30:26Z | 2026-01-01T03:30:26Z |
| ghsa-x7r7-qgpr-8xq7 |
|
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it… | 2026-01-01T03:30:25Z | 2026-01-01T03:30:25Z |
| ghsa-v6h4-h294-v39r |
|
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it… | 2026-01-01T03:30:25Z | 2026-01-01T03:30:25Z |
| ghsa-v2pw-fhhq-h8hr |
|
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it… | 2026-01-01T03:30:25Z | 2026-01-01T03:30:25Z |
| ghsa-q8mx-26vf-pwm7 |
|
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it… | 2026-01-01T03:30:25Z | 2026-01-01T03:30:25Z |
| ghsa-mqxx-jgfc-rwj6 |
|
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it… | 2026-01-01T03:30:25Z | 2026-01-01T03:30:25Z |
| ghsa-gr46-whc3-j78v |
|
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it… | 2026-01-01T03:30:25Z | 2026-01-01T03:30:25Z |
| ghsa-c3pq-8g5g-cppr |
|
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it… | 2026-01-01T03:30:25Z | 2026-01-01T03:30:25Z |
| ghsa-9pqg-5fj8-q9hp |
|
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it… | 2026-01-01T03:30:25Z | 2026-01-01T03:30:25Z |
| ghsa-9cr2-mcww-ph38 |
|
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it… | 2026-01-01T03:30:25Z | 2026-01-01T03:30:25Z |
| ghsa-955v-fhgv-r5mc |
|
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it… | 2026-01-01T03:30:25Z | 2026-01-01T03:30:25Z |
| ghsa-8c8m-9q8w-x9qv |
|
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it… | 2026-01-01T03:30:25Z | 2026-01-01T03:30:25Z |
| ghsa-7r6g-8p54-4xm6 |
|
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it… | 2026-01-01T03:30:25Z | 2026-01-01T03:30:25Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-25328 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.004155Z |
| gsd-2024-25309 | Code-projects Simple School Managment System 1.0 allows SQL Injection via the 'pass' para… | 2024-02-08T06:02:25.003595Z |
| gsd-2024-25533 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.003252Z |
| gsd-2024-25173 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.002952Z |
| gsd-2024-25471 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.002378Z |
| gsd-2024-25480 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.002065Z |
| gsd-2024-25405 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.001768Z |
| gsd-2024-25492 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.001476Z |
| gsd-2024-25179 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.000825Z |
| gsd-2024-25172 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.000543Z |
| gsd-2024-25158 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:25.000267Z |
| gsd-2024-25459 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:24.999984Z |
| gsd-2024-25286 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:24.999706Z |
| gsd-2024-25548 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:24.999375Z |
| gsd-2024-25552 | A local attacker can gain administrative privileges by inserting an executable file in th… | 2024-02-08T06:02:24.999098Z |
| gsd-2024-25486 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:24.998799Z |
| gsd-2024-25386 | Directory Traversal vulnerability in DICOM® Connectivity Framework by laurelbridge before… | 2024-02-08T06:02:24.998224Z |
| gsd-2024-25392 | An out-of-bounds access occurs in utilities/var_export/var_export.c in RT-Thread through 5.0.2. | 2024-02-08T06:02:24.997947Z |
| gsd-2024-25513 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:24.997642Z |
| gsd-2024-25489 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:24.997323Z |
| gsd-2024-25339 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:24.997025Z |
| gsd-2024-25377 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:24.996710Z |
| gsd-2024-25312 | Code-projects Simple School Managment System 1.0 allows SQL Injection via the 'id' parame… | 2024-02-08T06:02:24.996415Z |
| gsd-2024-25478 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:24.995751Z |
| gsd-2024-25252 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:24.994850Z |
| gsd-2024-25287 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:24.994558Z |
| gsd-2024-25241 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:24.994215Z |
| gsd-2024-25346 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:24.993768Z |
| gsd-2024-25326 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:24.992557Z |
| gsd-2024-25302 | Sourcecodester Event Student Attendance System 1.0, allows SQL Injection via the 'student… | 2024-02-08T06:02:24.992247Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-183437 | Malicious code in lobac-ubb-ga (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183436 | Malicious code in lobac-ubb-badi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183435 | Malicious code in lobac-ubb-badadivudcauagafu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183434 | Malicious code in lobac-ubb-badadivudcagafu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183433 | Malicious code in lobac-ubb-badadivucgafu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183432 | Malicious code in lobac-ubb-badadivcgafu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183431 | Malicious code in lobac-ubb-badadigafu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183430 | Malicious code in lobac-ubb-badadiafu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183429 | Malicious code in lobac-ubb-badadfu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183428 | Malicious code in lobac-ubb-badad (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183427 | Malicious code in lobac-ubb-bad (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183426 | Malicious code in lobac-ubb-avu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183425 | Malicious code in lobac-ubb-avigyagu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183424 | Malicious code in lobac-ubb-avigu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183423 | Malicious code in lobac-ubb-avigiyfagu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183422 | Malicious code in lobac-ubb-avigiyagu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183421 | Malicious code in lobac-ubb-avigiyafagu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183420 | Malicious code in lobac-ubb-avigiyafacbagu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183419 | Malicious code in lobac-ubb-avigiyacbagu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183418 | Malicious code in lobac-ubb-avigifagu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183417 | Malicious code in lobac-ubb-aviggu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183416 | Malicious code in lobac-ubb-avigfagu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183415 | Malicious code in lobac-ubb-avigagu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183414 | Malicious code in lobac-ubb-au (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183413 | Malicious code in lobac-ubb-anu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183412 | Malicious code in lobac-ubb-afyganu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183411 | Malicious code in lobac-ubb-afyanu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183410 | Malicious code in lobac-ubb-afnu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183409 | Malicious code in lobac-ubb-afayoruaganu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183408 | Malicious code in lobac-ubb-afayorgugu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2023:4570 | Red Hat Security Advisory: iperf3 security update | 2023-08-08T15:43:54+00:00 | 2025-11-21T18:43:25+00:00 |
| rhsa-2023:4569 | Red Hat Security Advisory: dbus security update | 2023-08-08T15:17:37+00:00 | 2025-11-21T18:43:24+00:00 |
| rhsa-2023:4541 | Red Hat Security Advisory: kernel-rt security and bug fix update | 2023-08-08T07:58:32+00:00 | 2025-11-21T18:43:24+00:00 |
| rhsa-2023:4537 | Red Hat Security Advisory: nodejs:16 security, bug fix, and enhancement update | 2023-08-08T08:46:19+00:00 | 2025-11-21T18:43:23+00:00 |
| rhsa-2023:4529 | Red Hat Security Advisory: libxml2 security update | 2023-08-08T08:30:46+00:00 | 2025-11-21T18:43:23+00:00 |
| rhsa-2023:4536 | Red Hat Security Advisory: nodejs:18 security, bug fix, and enhancement update | 2023-08-08T08:45:34+00:00 | 2025-11-21T18:43:22+00:00 |
| rhsa-2023:4531 | Red Hat Security Advisory: kpatch-patch security update | 2023-08-08T08:27:02+00:00 | 2025-11-21T18:43:22+00:00 |
| rhsa-2023:4523 | Red Hat Security Advisory: curl security update | 2023-08-08T08:28:10+00:00 | 2025-11-21T18:43:20+00:00 |
| rhsa-2023:4520 | Red Hat Security Advisory: python-requests security update | 2023-08-08T08:26:32+00:00 | 2025-11-21T18:43:19+00:00 |
| rhsa-2023:4516 | Red Hat Security Advisory: kpatch-patch security update | 2023-08-08T07:26:17+00:00 | 2025-11-21T18:43:18+00:00 |
| rhsa-2023:4515 | Red Hat Security Advisory: kernel security update | 2023-08-08T07:26:27+00:00 | 2025-11-21T18:43:17+00:00 |
| rhsa-2023:4500 | Red Hat Security Advisory: thunderbird security update | 2023-08-07T08:48:33+00:00 | 2025-11-21T18:43:15+00:00 |
| rhsa-2023:4499 | Red Hat Security Advisory: thunderbird security update | 2023-08-07T08:44:25+00:00 | 2025-11-21T18:43:14+00:00 |
| rhsa-2023:4498 | Red Hat Security Advisory: dbus security update | 2023-08-07T08:59:08+00:00 | 2025-11-21T18:43:14+00:00 |
| rhsa-2023:4497 | Red Hat Security Advisory: thunderbird security update | 2023-08-07T08:46:35+00:00 | 2025-11-21T18:43:13+00:00 |
| rhsa-2023:4496 | Red Hat Security Advisory: thunderbird security update | 2023-08-07T08:41:05+00:00 | 2025-11-21T18:43:13+00:00 |
| rhsa-2023:4495 | Red Hat Security Advisory: thunderbird security update | 2023-08-07T08:41:38+00:00 | 2025-11-21T18:43:12+00:00 |
| rhsa-2023:4494 | Red Hat Security Advisory: thunderbird security update | 2023-08-07T08:26:53+00:00 | 2025-11-21T18:43:11+00:00 |
| rhsa-2023:4493 | Red Hat Security Advisory: thunderbird security update | 2023-08-07T08:30:15+00:00 | 2025-11-21T18:43:11+00:00 |
| rhsa-2023:4492 | Red Hat Security Advisory: thunderbird security update | 2023-08-07T08:12:53+00:00 | 2025-11-21T18:43:11+00:00 |
| rhsa-2023:4465 | Red Hat Security Advisory: firefox security update | 2023-08-03T13:02:42+00:00 | 2025-11-21T18:43:11+00:00 |
| rhsa-2023:4469 | Red Hat Security Advisory: firefox security update | 2023-08-03T13:49:16+00:00 | 2025-11-21T18:43:08+00:00 |
| rhsa-2023:4468 | Red Hat Security Advisory: firefox security update | 2023-08-03T13:57:45+00:00 | 2025-11-21T18:43:07+00:00 |
| rhsa-2023:4464 | Red Hat Security Advisory: firefox security update | 2023-08-03T13:00:55+00:00 | 2025-11-21T18:43:05+00:00 |
| rhsa-2023:4463 | Red Hat Security Advisory: firefox security update | 2023-08-03T13:03:28+00:00 | 2025-11-21T18:43:05+00:00 |
| rhsa-2023:4462 | Red Hat Security Advisory: firefox security update | 2023-08-03T13:00:45+00:00 | 2025-11-21T18:43:04+00:00 |
| rhsa-2023:4461 | Red Hat Security Advisory: firefox security update | 2023-08-03T13:04:10+00:00 | 2025-11-21T18:43:04+00:00 |
| rhsa-2023:4460 | Red Hat Security Advisory: firefox security update | 2023-08-03T12:39:42+00:00 | 2025-11-21T18:43:03+00:00 |
| rhsa-2023:4448 | Red Hat Security Advisory: .NET 6.0 security update | 2023-08-03T07:58:53+00:00 | 2025-11-21T18:43:01+00:00 |
| rhsa-2023:4449 | Red Hat Security Advisory: .NET 6.0 security update | 2023-08-03T07:57:34+00:00 | 2025-11-21T18:43:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2020-29371 | An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace aka CID-bcf85fcedfdd. | 2020-11-02T00:00:00.000Z | 2020-12-03T00:00:00.000Z |
| msrc_cve-2020-29370 | An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment aka CID-fd4d9c7d0c71. | 2020-11-02T00:00:00.000Z | 2020-12-03T00:00:00.000Z |
| msrc_cve-2020-29369 | An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call aka CID-246c320a8cfe. | 2020-11-02T00:00:00.000Z | 2020-12-03T00:00:00.000Z |
| msrc_cve-2020-29368 | An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check aka CID-c444eb564fb1. | 2020-11-02T00:00:00.000Z | 2020-12-03T00:00:00.000Z |
| msrc_cve-2020-28941 | An issue was discovered in drivers/accessibility/speakup/spk_ttyio.c in the Linux kernel through 5.9.9. Local attackers on systems with the speakup driver could cause a local denial of service attack aka CID-d41227544427. This occurs because of an invalid free when the line discipline is used more than once. | 2020-11-02T00:00:00.000Z | 2020-12-03T00:00:00.000Z |
| msrc_cve-2020-28915 | A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory aka CID-6735b4632def. | 2020-11-02T00:00:00.000Z | 2020-12-03T00:00:00.000Z |
| msrc_cve-2020-25705 | A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4 SCALANCE M-800: All versions between v5.0 and v6.4 SCALANCE S615: All versions between v5.0 and v6.4 SCALANCE SC-600: All versions prior to v2.1.3 SCALANCE W1750D: v8.3.0.1 v8.6.0 and v8.7.0 SIMATIC Cloud Connect 7: All versions SIMATIC MV500 Family: All versions SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later SIMATIC NET CP 1243-7 LTE EU: Version | 2020-11-02T00:00:00.000Z | 2020-12-03T00:00:00.000Z |
| msrc_cve-2020-15437 | The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p->serial_in pointer which uninitialized. | 2020-11-02T00:00:00.000Z | 2020-12-03T00:00:00.000Z |
| msrc_cve-2020-15436 | Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field. | 2020-11-02T00:00:00.000Z | 2020-12-03T00:00:00.000Z |
| msrc_cve-2020-28974 | A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height. | 2020-11-02T00:00:00.000Z | 2020-12-02T00:00:00.000Z |
| msrc_cve-2020-25695 | A flaw was found in PostgreSQL versions before 13.1 before 12.5 before 11.10 before 10.15 before 9.6.20 and before 9.5.24. An attacker having permission to create non-temporary objects in at least one schema can execute arbitrary SQL functions under the identity of a superuser. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | 2020-11-02T00:00:00.000Z | 2020-11-20T00:00:00.000Z |
| msrc_cve-2020-25694 | A flaw was found in PostgreSQL versions before 13.1 before 12.5 before 11.10 before 10.15 before 9.6.20 and before 9.5.24. If a client application that creates additional database connections only reuses the basic connection parameters while dropping security-relevant parameters an opportunity for a man-in-the-middle attack or the ability to observe clear-text transmissions could exist. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | 2020-11-02T00:00:00.000Z | 2020-11-20T00:00:00.000Z |
| msrc_cve-2020-27152 | An issue was discovered in ioapic_lazy_update_eoi in arch/x86/kvm/ioapic.c in the Linux kernel before 5.9.2. It has an infinite loop related to improper interaction between a resampler and edge triggering aka CID-77377064c3a9. | 2020-11-02T00:00:00.000Z | 2020-11-17T00:00:00.000Z |
| msrc_cve-2009-4487 | nginx 0.7.64 writes data to a log file without sanitizing non-printable characters which might allow remote attackers to modify a window's title or possibly execute arbitrary commands or overwrite files via an HTTP request containing an escape sequence for a terminal emulator. | 2010-01-02T00:00:00.000Z | 2020-11-17T00:00:00.000Z |
| msrc_cve-2019-9516 | Some HTTP/2 implementations are vulnerable to a header leak potentially leading to a denial of service | 2019-08-02T00:00:00.000Z | 2020-11-11T00:00:00.000Z |
| msrc_cve-2020-8992 | ext4_protect_reserved_inode in fs/ext4/block_validity.c in the Linux kernel through 5.5.3 allows attackers to cause a denial of service (soft lockup) via a crafted journal size. | 2020-02-02T00:00:00.000Z | 2020-11-10T00:00:00.000Z |
| msrc_cve-2020-7039 | tcp_emu in tcp_subr.c in libslirp 4.1.0 as used in QEMU 4.2.0 mismanages memory as demonstrated by IRC DCC commands in EMU_IRC. This can cause a heap-based buffer overflow or other out-of-bounds access which can lead to a DoS or potential execute arbitrary code. | 2020-01-02T00:00:00.000Z | 2020-11-10T00:00:00.000Z |
| msrc_cve-2020-27619 | In Python 3 through 3.9.0 the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP. | 2020-10-02T00:00:00.000Z | 2020-11-10T00:00:00.000Z |
| msrc_cve-2020-26116 | http.client in Python 3.x before 3.5.10 3.6.x before 3.6.12 3.7.x before 3.7.9 and 3.8.x before 3.8.5 allows CRLF injection if the attacker controls the HTTP request method as demonstrated by inserting CR and LF control characters in the first argument of HTTPConnection.request. | 2020-09-02T00:00:00.000Z | 2020-11-10T00:00:00.000Z |
| msrc_cve-2020-14422 | Lib/ipaddress.py in Python through 3.8.3 improperly computes hash values in the IPv4Interface and IPv6Interface classes which might allow a remote attacker to cause a denial of service if an application is affected by the performance of a dictionary containing IPv4Interface or IPv6Interface objects and this attacker can cause many dictionary entries to be created. This is fixed in: v3.5.10 v3.5.10rc1; v3.6.12; v3.7.9; v3.8.4 v3.8.4rc1 v3.8.5 v3.8.6 v3.8.6rc1; v3.9.0 v3.9.0b4 v3.9.0b5 v3.9.0rc1 v3.9.0rc2. | 2020-06-02T00:00:00.000Z | 2020-11-10T00:00:00.000Z |
| msrc_cve-2020-14352 | A flaw was found in librepo in versions before 1.12.1. A directory traversal vulnerability was found where it failed to sanitize paths in remote repository metadata. An attacker controlling a remote repository may be able to copy files outside of the destination directory on the targeted system via path traversal. This flaw could potentially result in system compromise via the overwriting of critical system files. The highest threat from this flaw is to users that make use of untrusted third-party repositories. | 2020-08-02T00:00:00.000Z | 2020-11-10T00:00:00.000Z |
| msrc_cve-2020-13143 | gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal '\0' value which allows attackers to trigger an out-of-bounds read aka CID-15753588bcd4. | 2020-05-02T00:00:00.000Z | 2020-11-10T00:00:00.000Z |
| msrc_cve-2020-12770 | An issue was discovered in the Linux kernel through 5.6.11. sg_write lacks an sg_remove_request call in a certain failure case aka CID-83c6f2390040. | 2020-05-02T00:00:00.000Z | 2020-11-10T00:00:00.000Z |
| msrc_cve-2020-11884 | In the Linux kernel 4.19 through 5.6.7 on the s390 platform code execution may occur because of a race condition as demonstrated by code in enable_sacf_uaccess in arch/s390/lib/uaccess.c that fails to protect against a concurrent page table upgrade aka CID-3f777e19d171. A crash could also occur. | 2020-04-02T00:00:00.000Z | 2020-11-10T00:00:00.000Z |
| msrc_cve-2019-18348 | An issue was discovered in urllib2 in Python 2.x through 2.7.17 and urllib in Python 3.x through 3.8.0. CRLF injection is possible if the attacker controls a url parameter as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the host component of a URL) followed by an HTTP header. This is similar to the CVE-2019-9740 query string issue and the CVE-2019-9947 path string issue. (This is not exploitable when glibc has CVE-2016-10739 fixed.). This is fixed in: v2.7.18 v2.7.18rc1; v3.5.10 v3.5.10rc1; v3.6.11 v3.6.11rc1 v3.6.12; v3.7.8 v3.7.8rc1 v3.7.9; v3.8.3 v3.8.3rc1 v3.8.4 v3.8.4rc1 v3.8.5 v3.8.6 v3.8.6rc1. | 2019-10-02T00:00:00.000Z | 2020-11-10T00:00:00.000Z |
| msrc_cve-2020-27675 | An issue was discovered in the Linux kernel through 5.9.1 as used with Xen through 4.14.x. drivers/xen/events/events_base.c allows event-channel removal during the event-handling loop (a race condition). This can cause a use-after-free or NULL pointer dereference as demonstrated by a dom0 crash via events for an in-reconfiguration paravirtualized device aka CID-073d0552ead5. | 2020-10-02T00:00:00.000Z | 2020-11-04T00:00:00.000Z |
| msrc_cve-2020-27194 | An issue was discovered in the Linux kernel before 5.8.15. scalar32_min_max_or in kernel/bpf/verifier.c mishandles bounds tracking during use of 64-bit values aka CID-5b9fbeb75b6a. | 2020-10-02T00:00:00.000Z | 2020-11-02T00:00:00.000Z |
| msrc_cve-2020-24352 | An issue was discovered in QEMU through 5.1.0. An out-of-bounds memory access was found in the ATI VGA device implementation. This flaw occurs in the ati_2d_blt() routine in hw/display/ati_2d.c while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could use this flaw to crash the QEMU process on the host resulting in a denial of service. | 2020-10-02T00:00:00.000Z | 2020-11-02T00:00:00.000Z |
| msrc_cve-2020-14868 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-11-02T00:00:00.000Z |
| msrc_cve-2020-14867 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 5.6.49 and prior 5.7.31 and prior and 8.0.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-11-02T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-201610-0645 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:02:02.392000Z |
| var-201610-0137 | Windows and Mac OS X Run on Adobe Reader and Acrobat Any code that could be executed or s… | 2025-04-13T23:02:02.348000Z |
| var-201610-0478 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:02:02.315000Z |
| var-201610-0416 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:02:02.277000Z |
| var-201610-0484 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.18, Acrobat and Acro… | 2025-04-13T23:02:02.235000Z |
| var-201610-0483 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.18, Acrobat and Acro… | 2025-04-13T23:02:02.196000Z |
| var-201610-0473 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:02:02.154000Z |
| var-201610-0470 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:02:02.113000Z |
| var-201610-0642 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:02:02.076000Z |
| var-201610-0471 | Use-after-free vulnerability in Adobe Reader and Acrobat before 11.0.18, Acrobat and Acro… | 2025-04-13T23:02:02.037000Z |
| var-201610-0476 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:02:02.001000Z |
| var-201610-0472 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.… | 2025-04-13T23:02:01.959000Z |
| var-201612-0416 | A vulnerability in Siemens SICAM PAS (all versions before V8.09) could allow a remote att… | 2025-04-13T23:02:01.773000Z |
| var-201612-0417 | A vulnerability in Siemens SICAM PAS (all versions before V8.09) could allow a remote att… | 2025-04-13T23:02:01.728000Z |
| var-201506-0385 | SQL injection vulnerability in Cacti before 0.8.8d allows remote attackers to execute arb… | 2025-04-13T23:01:52.772000Z |
| var-201405-0345 | The Agent in Cisco Tidal Enterprise Scheduler (TES) 6.1 and earlier allows local users to… | 2025-04-13T23:01:43.614000Z |
| var-201512-0406 | The Supervisor 1.0.0.0 and 1.0.0.1 in Cisco Integrated Management Controller (IMC) before… | 2025-04-13T23:01:41.912000Z |
| var-201603-0226 | The Profiles component in Apple iOS before 9.3 does not properly validate certificates, w… | 2025-04-13T23:00:09.948000Z |
| var-201607-0341 | QuickTime in Apple OS X before 10.11.6 allows remote attackers to execute arbitrary code … | 2025-04-13T23:00:06.641000Z |
| var-201607-0347 | Web Media in Apple iOS before 9.3.3 allows attackers to bypass the Private Browsing prote… | 2025-04-13T23:00:06.594000Z |
| var-201510-0176 | WebKit, as used in Apple Safari before 9.0.1 and iTunes before 12.3.1, allows remote atta… | 2025-04-13T23:00:05.810000Z |
| var-201607-0351 | libxslt in Apple iOS before 9.3.3, OS X before 10.11.6, iTunes before 12.4.2 on Windows, … | 2025-04-13T23:00:05.758000Z |
| var-201409-0465 | SQL injection vulnerability in Wiki Server in CoreCollaboration in Apple OS X Server befo… | 2025-04-13T23:00:04.018000Z |
| var-201505-0278 | Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows a… | 2025-04-13T23:00:03.774000Z |
| var-201605-0424 | WebKit, as used in Apple iOS before 9.3.2, Safari before 9.1.1, and tvOS before 9.2.1, al… | 2025-04-13T23:00:03.217000Z |
| var-201509-0105 | WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to … | 2025-04-13T23:00:02.250000Z |
| var-201510-0190 | The Apple iWork application before 2.6 for iOS, Apple Keynote before 6.6, Apple Pages bef… | 2025-04-13T23:00:02.093000Z |
| var-201603-0232 | The Top Sites feature in Apple Safari before 9.1 mishandles cookie storage, which makes i… | 2025-04-13T22:59:59.619000Z |
| var-201404-0204 | WebKit, as used in Apple Safari before 6.1.3 and 7.x before 7.0.3, allows remote attacker… | 2025-04-13T22:59:59.569000Z |
| var-201407-0086 | Thunderbolt in Apple OS X before 10.9.4 does not properly restrict IOThunderBoltControlle… | 2025-04-13T22:59:58.519000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2020:2563-1 | Security update for MozillaFirefox | 2020-09-07T15:10:48Z | 2020-09-07T15:10:48Z |
| suse-su-2020:2562-1 | Security update for go1.14 | 2020-09-07T15:10:08Z | 2020-09-07T15:10:08Z |
| suse-su-2020:2552-1 | Security update for MozillaThunderbird | 2020-09-07T09:23:09Z | 2020-09-07T09:23:09Z |
| suse-su-2020:2544-1 | Security update for MozillaFirefox | 2020-09-04T16:12:12Z | 2020-09-04T16:12:12Z |
| suse-su-2020:2541-1 | Security update for the Linux Kernel | 2020-09-04T15:36:19Z | 2020-09-04T15:36:19Z |
| suse-su-2020:2540-1 | Security update for the Linux Kernel | 2020-09-04T15:36:05Z | 2020-09-04T15:36:05Z |
| suse-su-2020:2537-1 | Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP2) | 2020-09-04T11:34:54Z | 2020-09-04T11:34:54Z |
| suse-su-2020:2515-1 | Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP2) | 2020-09-04T11:34:46Z | 2020-09-04T11:34:46Z |
| suse-su-2020:2534-1 | Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP1) | 2020-09-04T11:34:35Z | 2020-09-04T11:34:35Z |
| suse-su-2020:2517-1 | Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP1) | 2020-09-04T11:34:22Z | 2020-09-04T11:34:22Z |
| suse-su-2020:2531-1 | Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP1) | 2020-09-04T11:34:09Z | 2020-09-04T11:34:09Z |
| suse-su-2020:2513-1 | Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP1) | 2020-09-04T11:33:56Z | 2020-09-04T11:33:56Z |
| suse-su-2020:2505-1 | Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP1) | 2020-09-04T11:33:49Z | 2020-09-04T11:33:49Z |
| suse-su-2020:2526-1 | Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP1) | 2020-09-04T11:33:34Z | 2020-09-04T11:33:34Z |
| suse-su-2020:2525-1 | Security update for the Linux Kernel (Live Patch 19 for SLE 15) | 2020-09-04T11:33:27Z | 2020-09-04T11:33:27Z |
| suse-su-2020:2524-1 | Security update for the Linux Kernel (Live Patch 18 for SLE 15) | 2020-09-04T11:33:20Z | 2020-09-04T11:33:20Z |
| suse-su-2020:2506-1 | Security update for the Linux Kernel (Live Patch 1 for SLE 12 SP5) | 2020-09-04T11:31:45Z | 2020-09-04T11:31:45Z |
| suse-su-2020:2509-1 | Security update for the Linux Kernel (Live Patch 14 for SLE 12 SP4) | 2020-09-04T11:31:23Z | 2020-09-04T11:31:23Z |
| suse-su-2020:2508-1 | Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP4) | 2020-09-04T11:31:14Z | 2020-09-04T11:31:14Z |
| suse-su-2020:2507-1 | Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP4) | 2020-09-04T11:31:05Z | 2020-09-04T11:31:05Z |
| suse-su-2020:2502-1 | Security update for the Linux Kernel (Live Patch 34 for SLE 12 SP3) | 2020-09-04T11:30:30Z | 2020-09-04T11:30:30Z |
| suse-su-2020:2499-1 | Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP3) | 2020-09-04T11:29:54Z | 2020-09-04T11:29:54Z |
| suse-su-2020:2498-1 | Security update for the Linux Kernel (Live Patch 30 for SLE 12 SP3) | 2020-09-04T11:29:42Z | 2020-09-04T11:29:42Z |
| suse-su-2020:2497-1 | Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP3) | 2020-09-04T11:29:30Z | 2020-09-04T11:29:30Z |
| suse-su-2020:2491-1 | Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP3) | 2020-09-04T11:29:20Z | 2020-09-04T11:29:20Z |
| suse-su-2020:2492-1 | Security update for the Linux Kernel (Live Patch 33 for SLE 12 SP2) | 2020-09-04T11:28:32Z | 2020-09-04T11:28:32Z |
| suse-su-2020:2487-1 | Security update for the Linux Kernel | 2020-09-04T06:06:02Z | 2020-09-04T06:06:02Z |
| suse-su-2020:2486-1 | Security update for the Linux Kernel | 2020-09-03T18:16:04Z | 2020-09-03T18:16:04Z |
| suse-su-2020:2485-1 | Security update for the Linux Kernel | 2020-09-03T15:40:42Z | 2020-09-03T15:40:42Z |
| suse-su-2020:2482-1 | Security update for java-1_7_1-ibm | 2020-09-03T13:22:26Z | 2020-09-03T13:22:26Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2024-39269 | Wireshark资源管理错误漏洞(CNVD-2024-39269) | 2024-06-14 | 2024-09-25 |
| cnvd-2024-39268 | Adobe Acrobat Reader缓冲区溢出漏洞(CNVD-2024-39268) | 2024-08-16 | 2024-09-25 |
| cnvd-2024-39267 | Adobe Audition存在未明漏洞(CNVD-2024-39267) | 2024-09-13 | 2024-09-25 |
| cnvd-2024-39161 | Apache bRPC输入验证错误漏洞 | 2023-05-10 | 2024-09-25 |
| cnvd-2024-39160 | Apache NiFi远程代码执行漏洞 | 2023-08-10 | 2024-09-25 |
| cnvd-2024-39159 | Apache bRPC环境问题漏洞 | 2024-02-22 | 2024-09-25 |
| cnvd-2024-39158 | Apache DolphinScheduler输入验证错误漏洞(CNVD-2024-39158) | 2024-03-14 | 2024-09-25 |
| cnvd-2024-39157 | Apache Camel反序列化漏洞 | 2024-03-14 | 2024-09-25 |
| cnvd-2024-39156 | Apache Hive代码注入漏洞 | 2024-05-09 | 2024-09-25 |
| cnvd-2024-39155 | Apache Allura跨站脚本漏洞(CNVD-2024-39155) | 2024-06-28 | 2024-09-25 |
| cnvd-2024-39153 | Apache IoTDB服务器端请求伪造漏洞 | 2024-08-14 | 2024-09-25 |
| cnvd-2024-39152 | Apache Airflow访问控制错误漏洞(CNVD-2024-39152) | 2024-08-14 | 2024-09-25 |
| cnvd-2024-39151 | Apache Airflow跨站脚本漏洞(CNVD-2024-39151) | 2024-08-28 | 2024-09-25 |
| cnvd-2024-39150 | Apache OFBiz代码执行漏洞(CNVD-2024-39150) | 2024-09-04 | 2024-09-25 |
| cnvd-2024-39149 | Apache HertzBeat反序列化漏洞 | 2024-09-24 | 2024-09-25 |
| cnvd-2024-39131 | Wireshark存在未明漏洞(CNVD-2024-39131) | 2023-03-09 | 2024-09-25 |
| cnvd-2024-39130 | Wireshark存在未明漏洞(CNVD-2024-39130) | 2024-06-14 | 2024-09-25 |
| cnvd-2024-39129 | Wireshark存在未明漏洞(CNVD-2024-39129) | 2024-06-14 | 2024-09-25 |
| cnvd-2024-39127 | Wireshark存在未明漏洞(CNVD-2024-39127) | 2024-08-30 | 2024-09-25 |
| cnvd-2024-39255 | Wireshark存在拒绝服务漏洞(CNVD-2024-39255) | 2024-09-23 | 2024-09-24 |
| cnvd-2024-38801 | Google Chrome越界读取漏洞(CNVD-2024-38801) | 2024-08-05 | 2024-09-24 |
| cnvd-2024-38800 | Google Chrome跨站脚本漏洞(CNVD-2024-38800) | 2024-09-20 | 2024-09-24 |
| cnvd-2024-38799 | Google Chrome代码执行漏洞(CNVD-2024-38799) | 2024-09-20 | 2024-09-24 |
| cnvd-2024-38777 | Dell EMC AppSync日志信息泄露漏洞 | 2024-02-22 | 2024-09-24 |
| cnvd-2024-38776 | Dell SmartFabric OS10命令执行漏洞 | 2024-09-09 | 2024-09-24 |
| cnvd-2024-38775 | Dell InsightIQ授权问题漏洞 | 2024-09-12 | 2024-09-24 |
| cnvd-2024-38774 | Dell InsightIQ加密问题漏洞(CNVD-2024-38774) | 2024-09-12 | 2024-09-24 |
| cnvd-2024-38773 | Dell InsightIQ访问控制错误漏洞(CNVD-2024-38773) | 2024-09-12 | 2024-09-24 |
| cnvd-2024-38772 | Dell Precision Rack BIOS信息泄露漏洞 | 2024-09-13 | 2024-09-24 |
| cnvd-2024-38771 | Dell Precision Rack BIOS输入验证错误漏洞(CNVD-2024-38771) | 2024-09-13 | 2024-09-24 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2010-avi-193 | Vulnérabilité dans mod_auth_shadow pour Apache | 2010-04-22T00:00:00.000000 | 2010-04-22T00:00:00.000000 |
| certa-2010-avi-192 | Multiples vulnérabilités dans IBM Java | 2010-04-22T00:00:00.000000 | 2010-04-22T00:00:00.000000 |
| certa-2010-avi-191 | Multiples vulnérabilités dans VLC | 2010-04-22T00:00:00.000000 | 2010-04-22T00:00:00.000000 |
| certa-2010-avi-190 | Vulnérabilité de MIT Kerberos | 2010-04-21T00:00:00.000000 | 2010-04-21T00:00:00.000000 |
| certa-2010-avi-189 | Vulnérabilité dans HP Operation Manager pour Windows | 2010-04-21T00:00:00.000000 | 2010-04-21T00:00:00.000000 |
| certa-2010-avi-188 | Multiples vulnérabilités dans Google Chrome | 2010-04-21T00:00:00.000000 | 2010-04-21T00:00:00.000000 |
| certa-2010-avi-187 | Vulnérabilité dans KDM | 2010-04-19T00:00:00.000000 | 2010-04-19T00:00:00.000000 |
| certa-2010-avi-186 | Vulnérabilité des commutateurs 3Com | 2010-04-19T00:00:00.000000 | 2010-04-19T00:00:00.000000 |
| certa-2010-avi-185 | Vulnérabilités dans Oracle Sun Java | 2010-04-16T00:00:00.000000 | 2010-04-16T00:00:00.000000 |
| certa-2010-avi-184 | Vulnérabilité dans IBM BladeCenter Management Module | 2010-04-16T00:00:00.000000 | 2010-04-16T00:00:00.000000 |
| certa-2010-avi-183 | Vulnérabilité dans IBM WebSphere Portal | 2010-04-15T00:00:00.000000 | 2010-04-15T00:00:00.000000 |
| certa-2010-avi-182 | Multiples vulnérabilités dans CUPS | 2010-04-15T00:00:00.000000 | 2010-04-15T00:00:00.000000 |
| certa-2010-avi-181 | Vulnérabilité dans Apple Mac OS X | 2010-04-15T00:00:00.000000 | 2010-04-15T00:00:00.000000 |
| certa-2010-avi-180 | Vulnérabilité dans Cisco Secure Desktop | 2010-04-15T00:00:00.000000 | 2010-04-15T00:00:00.000000 |
| certa-2010-avi-179 | Multiples vulnérabilités dans les produits Oracle | 2010-04-14T00:00:00.000000 | 2010-04-14T00:00:00.000000 |
| certa-2010-avi-178 | Multiples vulnérabilités dans Adobe Reader et Adobe Acrobat | 2010-04-14T00:00:00.000000 | 2010-04-14T00:00:00.000000 |
| certa-2010-avi-177 | Vulnérabilités dans Microsoft Windows ISATAP | 2010-04-14T00:00:00.000000 | 2010-04-14T00:00:00.000000 |
| certa-2010-avi-176 | Multiples vulnérabilités dans Microsoft Visio | 2010-04-14T00:00:00.000000 | 2010-04-14T00:00:00.000000 |
| certa-2010-avi-175 | Vulnérabilité dans Windows Media Player | 2010-04-14T00:00:00.000000 | 2010-04-14T00:00:00.000000 |
| certa-2010-avi-174 | Vulnérabilité du Codec Microsoft MPEG Layer-3 | 2010-04-14T00:00:00.000000 | 2010-04-14T00:00:00.000000 |
| certa-2010-avi-173 | Vulnérabilité dans Microsoft Windows Media Services | 2010-04-14T00:00:00.000000 | 2010-04-14T00:00:00.000000 |
| certa-2010-avi-172 | Multiples vulnérabilités dans Microsoft Exchange et Windows SMTP | 2010-04-14T00:00:00.000000 | 2010-04-14T00:00:00.000000 |
| certa-2010-avi-171 | Vulnérabilité dans Microsoft Office Publisher | 2010-04-14T00:00:00.000000 | 2010-04-14T00:00:00.000000 |
| certa-2010-avi-170 | Vulnérabilité dans Microsoft VBScript | 2010-04-14T00:00:00.000000 | 2010-04-14T00:00:00.000000 |
| certa-2010-avi-169 | Vulnérabilités dans le noyau Windows | 2010-04-14T00:00:00.000000 | 2010-04-14T00:00:00.000000 |
| certa-2010-avi-168 | Vulnérabilités dans le client SMB de Microsoft | 2010-04-14T00:00:00.000000 | 2010-04-14T00:00:00.000000 |
| certa-2010-avi-167 | Vulnérabilités dans Microsoft Windows Authenticode Verification | 2010-04-14T00:00:00.000000 | 2010-04-14T00:00:00.000000 |
| certa-2010-avi-166 | Vulnérabilité dans F-Secure | 2010-04-13T00:00:00.000000 | 2010-04-13T00:00:00.000000 |
| certa-2010-avi-165 | Multiples vulnérabilités dans les produits VMware | 2010-04-13T00:00:00.000000 | 2010-04-13T00:00:00.000000 |
| certa-2010-avi-163 | Vulnérabilité dans TYPO3 | 2010-04-12T00:00:00.000000 | 2010-04-12T00:00:00.000000 |