Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-0915 |
7.5 (3.1)
|
getnetbyaddr and getnetbyaddr_r leak stack contents to… |
The GNU C Library |
glibc |
2026-01-15T22:08:41.630Z | 2026-01-20T16:03:52.590Z |
| CVE-2025-1722 |
5.9 (3.1)
|
Multiple Vulnerabilities in IBM Concert Software |
IBM |
Concert |
2026-01-20T15:02:41.286Z | 2026-01-20T16:02:13.156Z |
| CVE-2025-9464 |
8.7 (4.0)
|
Rockwell Automation ArmorStart® LT - Multiple Denial-o… |
Rockwell Automation |
ArmorStart® LT |
2026-01-20T13:49:19.480Z | 2026-01-20T16:01:58.321Z |
| CVE-2025-1719 |
5.9 (3.1)
|
Multiple Vulnerabilities in IBM Concert Software |
IBM |
Concert |
2026-01-20T15:01:08.887Z | 2026-01-20T16:00:34.111Z |
| CVE-2011-10041 |
9.3 (4.0)
|
Uploadify <= 1.0 Unauthenticated Arbitrary File Upload |
Steven |
Uploadify |
2026-01-15T21:44:33.566Z | 2026-01-20T15:56:51.308Z |
| CVE-2025-36059 |
4.7 (3.1)
|
Multiple security vulnerabilities are addressed in IBM… |
IBM |
Business Automation Workflow containers |
2026-01-20T15:07:46.448Z | 2026-01-20T15:54:41.357Z |
| CVE-2026-23849 |
5.3 (3.1)
|
File Browser vulnerable to Username Enumeration via Ti… |
filebrowser |
filebrowser |
2026-01-19T20:37:29.716Z | 2026-01-20T15:54:36.499Z |
| CVE-2026-23844 |
4.9 (4.0)
|
Whisper Money has IDOR Vulnerability on sync/balances … |
whisper-money |
whisper-money |
2026-01-19T20:43:29.212Z | 2026-01-20T15:54:02.974Z |
| CVE-2025-36058 |
5.5 (3.1)
|
Multiple security vulnerabilities are addressed in IBM… |
IBM |
Business Automation Workflow containers |
2026-01-20T15:09:07.082Z | 2026-01-20T15:53:20.326Z |
| CVE-2025-36115 |
6.3 (3.1)
|
Multiple vulnerabilities were addressed in IBM Sterlin… |
IBM |
Sterling Connect:Express Adapter for Sterling B2B Integrator 5.2.0 |
2026-01-20T15:18:17.680Z | 2026-01-20T15:51:47.539Z |
| CVE-2025-61684 |
7.5 (3.1)
|
Quicly has assertion failures |
h2o |
quicly |
2026-01-19T15:18:11.398Z | 2026-01-20T15:49:59.004Z |
| CVE-2025-36396 |
5.4 (3.1)
|
Security vulnerabilities have been found in IBM Applic… |
IBM |
Application Gateway |
2026-01-20T15:22:11.780Z | 2026-01-20T15:48:51.751Z |
| CVE-2025-36397 |
5.4 (3.1)
|
Security vulnerabilities have been found in IBM Applic… |
IBM |
Application Gateway |
2026-01-20T15:23:30.652Z | 2026-01-20T15:47:24.284Z |
| CVE-2025-68616 |
7.5 (3.1)
|
WeasyPrint Vulnerable to Server-Side Request Forgery (… |
Kozea |
WeasyPrint |
2026-01-19T15:20:23.702Z | 2026-01-20T15:42:46.352Z |
| CVE-2025-13925 |
4.9 (3.1)
|
Multiple vulnerabilities in IBM Aspera Console |
IBM |
Aspera Console |
2026-01-20T14:56:30.671Z | 2026-01-20T15:41:38.943Z |
| CVE-2025-49925 |
7.3 (3.1)
|
WordPress WPLMS plugin <= 1.9.9.7 - Broken Access Cont… |
VibeThemes |
WPLMS |
2025-10-22T14:32:14.033Z | 2026-01-20T15:39:46.393Z |
| CVE-2025-36063 |
6.3 (3.1)
|
Multiple vulnerabilities were addressed in IBM Sterlin… |
IBM |
Sterling Connect:Express Adapter for Sterling B2B Integrator 5.2.0 |
2026-01-20T15:10:57.747Z | 2026-01-20T15:39:45.384Z |
| CVE-2025-49924 |
7.3 (3.1)
|
WordPress Wholesale Suite plugin <= 2.2.4.2 - Privileg… |
Josh Kohlbach |
Wholesale Suite |
2025-10-22T14:32:13.804Z | 2026-01-20T15:39:21.024Z |
| CVE-2025-49923 |
6.1 (3.1)
|
WordPress Seriously Simple Podcasting plugin <= 3.11.1… |
Craig Hewitt |
Seriously Simple Podcasting |
2025-10-22T14:32:13.596Z | 2026-01-20T15:38:59.264Z |
| CVE-2025-49922 |
4.3 (3.1)
|
WordPress WPeMatico RSS Feed Fetcher plugin <= 2.8.3 -… |
etruel |
WPeMatico RSS Feed Fetcher |
2025-10-22T14:32:13.367Z | 2026-01-20T15:38:36.695Z |
| CVE-2025-49921 |
7.3 (3.1)
|
WordPress JetReviews plugin <= 3.0.0 - Local File Incl… |
CrocoBlock |
JetReviews |
2025-10-22T14:32:13.059Z | 2026-01-20T15:38:14.568Z |
| CVE-2025-36065 |
6.3 (3.1)
|
Multiple vulnerabilities were addressed in IBM Sterlin… |
IBM |
Sterling Connect:Express Adapter for Sterling B2B Integrator 5.2.0 |
2026-01-20T15:12:47.078Z | 2026-01-20T15:38:07.346Z |
| CVE-2025-24022 |
8.6 (3.1)
|
iTop server vulnerable to portal code injection |
Combodo |
iTop |
2025-05-14T14:57:37.960Z | 2026-01-20T15:37:55.868Z |
| CVE-2025-36066 |
6.1 (3.1)
|
Multiple vulnerabilities were addressed in IBM Sterlin… |
IBM |
Sterling Connect:Express Adapter for Sterling B2B Integrator 5.2.0 |
2026-01-20T15:14:03.557Z | 2026-01-20T15:36:00.574Z |
| CVE-2026-23732 |
5.5 (4.0)
|
FreeRDP has heap-buffer-overflow in Glyph_Alloc |
FreeRDP |
FreeRDP |
2026-01-19T17:12:57.772Z | 2026-01-20T15:34:21.309Z |
| CVE-2025-36113 |
5.4 (3.1)
|
Multiple vulnerabilities were addressed in IBM Sterlin… |
IBM |
Sterling Connect:Express Adapter for Sterling B2B Integrator 5.2.0 |
2026-01-20T15:15:55.890Z | 2026-01-20T15:34:16.414Z |
| CVE-2026-23875 |
5.7 (4.0)
|
CrawlChat's Discord Bot has a Knowledge Permission vul… |
crawlchat |
crawlchat |
2026-01-19T20:47:57.518Z | 2026-01-20T15:33:08.209Z |
| CVE-2026-23883 |
7.7 (4.0)
|
Heap-use-after-free in update_pointer_new |
FreeRDP |
FreeRDP |
2026-01-19T17:15:55.735Z | 2026-01-20T15:30:10.352Z |
| CVE-2026-0902 |
8.8 (3.1)
|
Inappropriate implementation in V8 in Google Chro… |
Google |
Chrome |
2026-01-20T04:14:15.404Z | 2026-01-20T15:29:39.657Z |
| CVE-2025-43904 |
4.2 (3.1)
|
In SchedMD Slurm before 24.11.5, 24.05.8, and 23.… |
SchedMD |
Slurm |
2026-01-16T00:00:00.000Z | 2026-01-20T15:29:05.323Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2023-53499 |
N/A
|
virtio_net: Fix error unwinding of XDP initialization |
Linux |
Linux |
2025-10-01T11:45:50.367Z | 2025-10-01T11:45:50.367Z |
| CVE-2023-53498 |
N/A
|
drm/amd/display: Fix potential null dereference |
Linux |
Linux |
2025-10-01T11:45:49.549Z | 2025-10-29T13:18:51.888Z |
| CVE-2023-53497 |
N/A
|
media: vsp1: Replace vb2_is_streaming() with vb2_start… |
Linux |
Linux |
2025-10-01T11:45:48.728Z | 2025-10-01T11:45:48.728Z |
| CVE-2023-53496 |
N/A
|
x86/platform/uv: Use alternate source for socket to no… |
Linux |
Linux |
2025-10-01T11:45:47.807Z | 2025-10-01T11:45:47.807Z |
| CVE-2023-53495 |
N/A
|
net: ethernet: mvpp2_main: fix possible OOB write in m… |
Linux |
Linux |
2025-10-01T11:45:46.877Z | 2025-10-01T11:45:46.877Z |
| CVE-2023-53494 |
N/A
|
crypto: xts - Handle EBUSY correctly |
Linux |
Linux |
2025-10-01T11:45:45.773Z | 2025-10-01T11:45:45.773Z |
| CVE-2023-53493 |
N/A
|
accel/qaic: tighten bounds checking in decode_message() |
Linux |
Linux |
2025-10-01T11:45:44.939Z | 2025-10-01T11:45:44.939Z |
| CVE-2023-53492 |
N/A
|
netfilter: nf_tables: do not ignore genmask when looki… |
Linux |
Linux |
2025-10-01T11:45:44.019Z | 2025-10-01T11:45:44.019Z |
| CVE-2023-53490 |
N/A
|
mptcp: fix disconnect vs accept race |
Linux |
Linux |
2025-10-01T11:45:42.182Z | 2025-10-01T11:45:42.182Z |
| CVE-2025-39823 |
N/A
|
KVM: x86: use array_index_nospec with indices that com… |
Linux |
Linux |
2025-09-16T13:00:22.298Z | 2025-11-03T17:43:43.272Z |
| CVE-2025-39824 |
N/A
|
HID: asus: fix UAF via HID_CLAIMED_INPUT validation |
Linux |
Linux |
2025-09-16T13:00:23.135Z | 2025-11-03T17:43:45.289Z |
| CVE-2025-39825 |
N/A
|
smb: client: fix race with concurrent opens in rename(2) |
Linux |
Linux |
2025-09-16T13:00:23.897Z | 2026-01-02T15:32:35.968Z |
| CVE-2025-39826 |
N/A
|
net: rose: convert 'use' field to refcount_t |
Linux |
Linux |
2025-09-16T13:00:24.618Z | 2025-11-03T17:43:47.184Z |
| CVE-2025-39827 |
N/A
|
net: rose: include node references in rose_neigh refcount |
Linux |
Linux |
2025-09-16T13:00:25.555Z | 2025-11-03T17:43:48.138Z |
| CVE-2025-11965 |
6.3 (4.0)
|
In Eclipse Vert.x versions [4.0.0, 4.5.21] and [5… |
Eclipse Foundation |
Vert.x |
2025-10-22T14:50:07.602Z | 2025-10-22T15:56:08.021Z |
| CVE-2025-39828 |
N/A
|
atm: atmtcp: Prevent arbitrary write in atmtcp_recv_co… |
Linux |
Linux |
2025-09-16T13:00:26.433Z | 2025-11-03T17:43:50.044Z |
| CVE-2025-39835 |
N/A
|
xfs: do not propagate ENODATA disk errors into xattr code |
Linux |
Linux |
2025-09-16T13:08:51.599Z | 2025-11-03T17:43:51.920Z |
| CVE-2025-40300 |
N/A
|
x86/vmscape: Add conditional IBPB mitigation |
Linux |
Linux |
2025-09-11T16:49:24.809Z | 2026-01-02T15:33:23.260Z |
| CVE-2025-39790 |
N/A
|
bus: mhi: host: Detect events pointing to unexpected TREs |
Linux |
Linux |
2025-09-11T16:56:38.643Z | 2025-11-03T17:43:24.145Z |
| CVE-2025-39788 |
N/A
|
scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE |
Linux |
Linux |
2025-09-11T16:56:37.173Z | 2025-11-03T17:43:23.201Z |
| CVE-2025-39787 |
N/A
|
soc: qcom: mdt_loader: Ensure we don't read past the E… |
Linux |
Linux |
2025-09-11T16:56:36.426Z | 2025-11-03T17:43:21.316Z |
| CVE-2025-39783 |
N/A
|
PCI: endpoint: Fix configfs group list head handling |
Linux |
Linux |
2025-09-11T16:56:33.376Z | 2025-11-03T17:43:19.404Z |
| CVE-2025-39782 |
N/A
|
jbd2: prevent softlockup in jbd2_log_do_checkpoint() |
Linux |
Linux |
2025-09-11T16:56:32.616Z | 2026-01-02T15:32:20.233Z |
| CVE-2025-39776 |
N/A
|
mm/debug_vm_pgtable: clear page table entries at destr… |
Linux |
Linux |
2025-09-11T16:56:28.936Z | 2025-11-03T17:43:15.627Z |
| CVE-2025-26513 |
7 (3.1)
|
The installer for SAN Host Utilities for Windows … |
NetApp |
SAN Host Utilities for Windows |
2025-08-07T20:29:07.044Z | 2026-02-26T17:49:49.864Z |
| CVE-2025-39773 |
N/A
|
net: bridge: fix soft lockup in br_multicast_query_expired() |
Linux |
Linux |
2025-09-11T16:56:26.820Z | 2025-11-03T17:43:14.694Z |
| CVE-2025-39772 |
N/A
|
drm/hisilicon/hibmc: fix the hibmc loaded failed bug |
Linux |
Linux |
2025-09-11T16:56:26.130Z | 2025-11-03T17:43:13.756Z |
| CVE-2025-39770 |
N/A
|
net: gso: Forbid IPv6 TSO with extensions on devices w… |
Linux |
Linux |
2025-09-11T16:56:24.446Z | 2025-11-03T17:43:12.813Z |
| CVE-2025-12383 |
9.4 (4.0)
|
Race Condition allows Bypass of Trust Restrictions |
Eclipse Foundation |
Jersey |
2025-11-18T15:14:37.765Z | 2025-11-18T21:34:35.027Z |
| CVE-2025-39819 |
N/A
|
fs/smb: Fix inconsistent refcnt update |
Linux |
Linux |
2025-09-16T13:00:19.320Z | 2026-01-02T15:32:29.503Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2023-53495 | In the Linux kernel, the following vulnerability has been resolved: net: ethernet: mvpp2_main: fix… | 2025-10-01T12:15:52.803 | 2026-01-16T20:46:37.340 |
| fkie_cve-2023-53494 | In the Linux kernel, the following vulnerability has been resolved: crypto: xts - Handle EBUSY cor… | 2025-10-01T12:15:52.673 | 2026-01-16T20:45:58.230 |
| fkie_cve-2023-53493 | In the Linux kernel, the following vulnerability has been resolved: accel/qaic: tighten bounds che… | 2025-10-01T12:15:52.540 | 2026-01-16T20:45:18.710 |
| fkie_cve-2023-53492 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: do not i… | 2025-10-01T12:15:52.390 | 2026-01-16T20:42:40.380 |
| fkie_cve-2023-53490 | In the Linux kernel, the following vulnerability has been resolved: mptcp: fix disconnect vs accep… | 2025-10-01T12:15:52.107 | 2026-01-16T20:40:48.793 |
| fkie_cve-2025-39823 | In the Linux kernel, the following vulnerability has been resolved: KVM: x86: use array_index_nosp… | 2025-09-16T13:16:00.397 | 2026-01-16T20:38:07.723 |
| fkie_cve-2025-39824 | In the Linux kernel, the following vulnerability has been resolved: HID: asus: fix UAF via HID_CLA… | 2025-09-16T13:16:01.050 | 2026-01-16T20:37:49.810 |
| fkie_cve-2025-39825 | In the Linux kernel, the following vulnerability has been resolved: smb: client: fix race with con… | 2025-09-16T13:16:01.780 | 2026-01-16T20:37:11.190 |
| fkie_cve-2025-39826 | In the Linux kernel, the following vulnerability has been resolved: net: rose: convert 'use' field… | 2025-09-16T13:16:02.290 | 2026-01-16T20:36:13.207 |
| fkie_cve-2025-39827 | In the Linux kernel, the following vulnerability has been resolved: net: rose: include node refere… | 2025-09-16T13:16:02.873 | 2026-01-16T20:35:06.037 |
| fkie_cve-2025-11965 | In Eclipse Vert.x versions [4.0.0, 4.5.21] and [5.0.0, 5.0.4], a StaticHandler configuration for re… | 2025-10-22T15:15:31.590 | 2026-01-16T20:34:16.370 |
| fkie_cve-2025-39828 | In the Linux kernel, the following vulnerability has been resolved: atm: atmtcp: Prevent arbitrary… | 2025-09-16T13:16:03.373 | 2026-01-16T20:32:37.030 |
| fkie_cve-2025-39835 | In the Linux kernel, the following vulnerability has been resolved: xfs: do not propagate ENODATA … | 2025-09-16T14:15:51.850 | 2026-01-16T20:30:16.260 |
| fkie_cve-2025-40300 | In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional I… | 2025-09-11T17:15:45.680 | 2026-01-16T20:25:45.940 |
| fkie_cve-2025-39790 | In the Linux kernel, the following vulnerability has been resolved: bus: mhi: host: Detect events … | 2025-09-11T17:15:45.360 | 2026-01-16T20:25:39.967 |
| fkie_cve-2025-39788 | In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: exynos: Fix program… | 2025-09-11T17:15:45.070 | 2026-01-16T20:25:34.853 |
| fkie_cve-2025-39787 | In the Linux kernel, the following vulnerability has been resolved: soc: qcom: mdt_loader: Ensure … | 2025-09-11T17:15:44.907 | 2026-01-16T20:25:29.447 |
| fkie_cve-2025-39783 | In the Linux kernel, the following vulnerability has been resolved: PCI: endpoint: Fix configfs gr… | 2025-09-11T17:15:44.330 | 2026-01-16T20:24:08.707 |
| fkie_cve-2025-39782 | In the Linux kernel, the following vulnerability has been resolved: jbd2: prevent softlockup in jb… | 2025-09-11T17:15:44.173 | 2026-01-16T20:24:03.150 |
| fkie_cve-2025-39776 | In the Linux kernel, the following vulnerability has been resolved: mm/debug_vm_pgtable: clear pag… | 2025-09-11T17:15:43.457 | 2026-01-16T20:12:02.050 |
| fkie_cve-2025-26513 | The installer for SAN Host Utilities for Windows versions prior to 8.0 is susceptible to a vulnerab… | 2025-08-07T21:15:27.413 | 2026-01-16T20:11:54.600 |
| fkie_cve-2025-39773 | In the Linux kernel, the following vulnerability has been resolved: net: bridge: fix soft lockup i… | 2025-09-11T17:15:43.010 | 2026-01-16T20:11:53.433 |
| fkie_cve-2025-39772 | In the Linux kernel, the following vulnerability has been resolved: drm/hisilicon/hibmc: fix the h… | 2025-09-11T17:15:42.837 | 2026-01-16T20:11:44.473 |
| fkie_cve-2025-39770 | In the Linux kernel, the following vulnerability has been resolved: net: gso: Forbid IPv6 TSO with… | 2025-09-11T17:15:42.530 | 2026-01-16T20:11:39.663 |
| fkie_cve-2025-12383 | In Eclipse Jersey versions 2.45, 3.0.16, 3.1.9 a race condition can cause ignoring of critical SSL … | 2025-11-18T16:15:42.867 | 2026-01-16T20:09:26.027 |
| fkie_cve-2025-39819 | In the Linux kernel, the following vulnerability has been resolved: fs/smb: Fix inconsistent refcn… | 2025-09-16T13:15:58.260 | 2026-01-16T20:09:10.520 |
| fkie_cve-2025-39817 | In the Linux kernel, the following vulnerability has been resolved: efivarfs: Fix slab-out-of-boun… | 2025-09-16T13:15:57.187 | 2026-01-16T20:08:25.680 |
| fkie_cve-2025-39813 | In the Linux kernel, the following vulnerability has been resolved: ftrace: Fix potential warning … | 2025-09-16T13:15:55.150 | 2026-01-16T20:08:18.040 |
| fkie_cve-2025-39812 | In the Linux kernel, the following vulnerability has been resolved: sctp: initialize more fields i… | 2025-09-16T13:15:54.537 | 2026-01-16T20:08:08.323 |
| fkie_cve-2025-39808 | In the Linux kernel, the following vulnerability has been resolved: HID: hid-ntrig: fix unable to … | 2025-09-16T13:15:52.343 | 2026-01-16T20:07:52.930 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-6f5x-35qc-g7mg |
6.3 (3.1)
2.1 (4.0)
|
A weakness has been identified in D-Link DIR-806A 100CNb11. Affected is the function ssdpcgi_main o… | 2025-12-31T18:30:25Z | 2025-12-31T18:30:25Z |
| ghsa-4r7h-4fx4-6prf |
6.3 (3.1)
2.1 (4.0)
|
A weakness has been identified in Kohana KodiCMS up to 13.82.135. This affects the function like of… | 2025-12-31T18:30:25Z | 2025-12-31T18:30:25Z |
| ghsa-m9g9-vq6h-h27p |
3.5 (3.1)
5.1 (4.0)
|
A security vulnerability has been detected in elinicksic Razgover up to db37dfc5c82f023a40f2f7834de… | 2025-12-31T18:30:24Z | 2025-12-31T18:30:24Z |
| ghsa-vq3f-wjq8-v437 |
6.3 (3.1)
2.1 (4.0)
|
A security flaw has been discovered in PHPGurukul Small CRM 4.0. This impacts an unknown function o… | 2025-12-31T18:30:23Z | 2025-12-31T18:30:23Z |
| ghsa-rhh9-qf7p-wfgf |
9.1 (3.1)
|
Whale browser before 4.35.351.12 allows an attacker to escape the iframe sandbox in a sidebar envir… | 2025-12-30T03:30:16Z | 2025-12-31T18:30:23Z |
| ghsa-r326-pp3g-7cq4 |
2.5 (3.1)
|
An issue was discovered in function d_unqualified_name in file cp-demangle.c in BinUtils 2.26 allow… | 2025-12-29T18:30:55Z | 2025-12-31T18:30:23Z |
| ghsa-q38m-7hwc-v39w |
8.8 (3.1)
|
DedeCMS v5.7 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /src/d… | 2025-12-29T21:30:25Z | 2025-12-31T18:30:23Z |
| ghsa-mwfx-853j-whj2 |
7.5 (3.1)
|
NagiosXI 2026R1.0.1 build 1762361101 is vulnerable to Directory Traversal in /admin/coreconfigsnaps… | 2025-12-29T21:30:24Z | 2025-12-31T18:30:23Z |
| ghsa-frgf-2qjw-vqvw |
9.8 (3.1)
|
A stack-based buffer overflow exists in the GoAhead-Webs HTTP daemon on KuWFi 4G LTE AC900 devices … | 2025-12-29T21:30:25Z | 2025-12-31T18:30:23Z |
| ghsa-5x99-r8pc-wjj3 |
7.5 (3.1)
|
Whale browser before 4.35.351.12 allows an attacker to bypass the Same-Origin Policy in a sidebar e… | 2025-12-30T03:30:16Z | 2025-12-31T18:30:23Z |
| ghsa-2wcx-prwg-mc24 |
8.8 (3.1)
|
In NagiosXI 2026R1.0.1 build 1762361101, Dashboard parameters lack proper filtering, allowing any a… | 2025-12-29T21:30:24Z | 2025-12-31T18:30:23Z |
| ghsa-r6xg-3mr4-3226 |
9.8 (3.1)
|
A type confusion in jsish 2.0 allows incorrect control flow during execution of the OP_NEXT opcode.… | 2025-12-29T15:30:22Z | 2025-12-31T18:30:22Z |
| ghsa-pg74-76w3-h2pm |
9.8 (3.1)
|
File upload vulnerability in machsol machpanel 8.0.32 allows attacker to gain a webshell. | 2025-12-29T15:30:21Z | 2025-12-31T18:30:22Z |
| ghsa-cj5p-mv79-727v |
9.8 (3.1)
|
An issue in Fossorial fosrl/pangolin v.1.6.2 and before allows a remote attacker to escalate privil… | 2025-12-29T18:30:54Z | 2025-12-31T18:30:22Z |
| ghsa-8qj4-vcg9-jq63 |
7.8 (3.1)
6.9 (4.0)
|
rofl0r/proxychains-ng versions up to and including 4.17 and prior to commit cc005b7 contain a stack… | 2025-12-19T00:31:42Z | 2025-12-31T18:30:19Z |
| ghsa-mc4p-3xcw-5f46 |
8.8 (3.1)
8.6 (4.0)
|
CMSimple 5.15 contains a remote command execution vulnerability that allows authenticated attackers… | 2025-12-11T00:30:33Z | 2025-12-31T18:30:18Z |
| ghsa-h7qg-49w9-4cpx |
7.8 (3.1)
6.9 (4.0)
|
merbanan/rtl_433 versions up to and including 25.02 and prior to commit 25e47f8 contain a stack-bas… | 2025-12-19T00:31:42Z | 2025-12-31T18:30:18Z |
| ghsa-9q3m-rvj5-q6fv |
9.8 (3.1)
10.0 (4.0)
|
AMTT Hotel Broadband Operation System (HiBOS) contains an unauthenticated command injection vulnera… | 2025-10-22T15:31:12Z | 2025-12-31T15:30:23Z |
| ghsa-wm5f-5px7-g28v |
8.8 (3.1)
8.7 (4.0)
|
VPN Firewall developed by QNO Technology has an OS Command Injection vulnerability, allowing authen… | 2025-12-31T12:31:20Z | 2025-12-31T12:31:20Z |
| ghsa-x7hg-qr55-cgh5 |
7.7 (4.0)
|
The NPort 6100-G2/6200-G2 Series is affected by an execution with unnecessary privileges vulnerabil… | 2025-12-31T09:30:19Z | 2025-12-31T09:30:19Z |
| ghsa-vvhf-47gr-69vm |
8.8 (3.1)
8.7 (4.0)
|
VPN Firewall developed by QNO Technology has a Insufficient Entropy vulnerability, allowing unauthe… | 2025-12-31T09:30:19Z | 2025-12-31T09:30:19Z |
| ghsa-r3r9-v3q6-hv5j |
7.0 (4.0)
|
A vulnerability exists in serial device servers where active debug code remains enabled in the UART… | 2025-12-31T09:30:19Z | 2025-12-31T09:30:19Z |
| ghsa-qx67-x2fg-4q4f |
8.8 (3.1)
8.7 (4.0)
|
VPN Firewall developed by QNO Technology has an OS Command Injection vulnerability, allowing authen… | 2025-12-31T09:30:19Z | 2025-12-31T09:30:19Z |
| ghsa-grcr-j565-jxh5 |
7.8 (3.1)
|
FontForge GUtils XBM File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulner… | 2025-12-31T09:30:18Z | 2025-12-31T09:30:19Z |
| ghsa-cgxg-jvf2-h7v5 |
7.8 (3.1)
|
FontForge GUtils BMP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. T… | 2025-12-31T09:30:18Z | 2025-12-31T09:30:19Z |
| ghsa-9hg6-8r8x-q6q6 |
8.8 (3.1)
|
FontForge SFD File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability a… | 2025-12-31T09:30:18Z | 2025-12-31T09:30:19Z |
| ghsa-5vwc-hh96-8x8g |
7.1 (4.0)
|
The NPort 6100-G2/6200-G2 Series is affected by a high-severity vulnerability (CVE-2025-2026) that … | 2025-12-31T09:30:19Z | 2025-12-31T09:30:19Z |
| ghsa-364x-6pf8-6vwj |
7.8 (3.1)
|
FontForge GUtils SGI File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. T… | 2025-12-31T09:30:18Z | 2025-12-31T09:30:19Z |
| ghsa-w327-296g-78wc |
8.8 (3.1)
|
FontForge PFB File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vu… | 2025-12-31T09:30:18Z | 2025-12-31T09:30:18Z |
| ghsa-mv95-mmh4-gvp6 |
7.8 (3.1)
|
FontForge SFD File Parsing Deserialization of Untrusted Data Remote Code Execution Vulnerability. T… | 2025-12-31T09:30:18Z | 2025-12-31T09:30:18Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-25539 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:24.938500Z |
| gsd-2024-25323 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:24.938205Z |
| gsd-2024-25547 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:24.937883Z |
| gsd-2024-25310 | Code-projects Simple School Managment System 1.0 allows SQL Injection via the 'id' parame… | 2024-02-08T06:02:24.937294Z |
| gsd-2024-25229 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:24.936945Z |
| gsd-2024-25382 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:24.936304Z |
| gsd-2024-25249 | An issue in He3 App for macOS version 2.0.17, allows remote attackers to execute arbitrar… | 2024-02-08T06:02:24.936039Z |
| gsd-2024-25184 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:24.935760Z |
| gsd-2024-25237 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:24.935477Z |
| gsd-2024-25204 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:24.935198Z |
| gsd-2024-25461 | Directory Traversal vulnerability in Terrasoft, Creatio Terrasoft CRM v.7.18.4.1532 allow… | 2024-02-08T06:02:24.934452Z |
| gsd-2024-25353 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:24.934168Z |
| gsd-2024-25467 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:24.933227Z |
| gsd-2024-25336 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:24.931839Z |
| gsd-2024-25372 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:24.931560Z |
| gsd-2024-25208 | Barangay Population Monitoring System v1.0 was discovered to contain a cross-site scripti… | 2024-02-08T06:02:24.931292Z |
| gsd-2024-25255 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:24.930760Z |
| gsd-2024-25180 | An issue discovered in pdfmake 0.2.9 allows remote attackers to run arbitrary code via cr… | 2024-02-08T06:02:24.930477Z |
| gsd-2024-25549 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:24.929486Z |
| gsd-2024-25384 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:24.929092Z |
| gsd-2024-25421 | An issue in Ignite Realtime Openfire v.4.9.0 and before allows a remote attacker to escal… | 2024-02-08T06:02:24.928636Z |
| gsd-2024-25481 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:24.928269Z |
| gsd-2024-25246 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-08T06:02:24.927640Z |
| gsd-2023-7245 | The nodejs framework in OpenVPN Connect 3.0 through 3.4.3 (Windows)/3.4.7 (macOS) was not… | 2024-02-08T06:01:26.256880Z |
| gsd-2024-1257 | A vulnerability was found in Jspxcms 10.2.0. It has been classified as problematic. Affec… | 2024-02-07T06:03:41.798036Z |
| gsd-2024-1258 | A vulnerability was found in Juanpao JPShop up to 1.5.02. It has been declared as problem… | 2024-02-07T06:03:41.792516Z |
| gsd-2024-1278 | The Easy Social Feed – Social Photos Gallery – Post Feed – Like Box plugin for WordPress … | 2024-02-07T06:03:41.789516Z |
| gsd-2024-1289 | The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to Insecure Dire… | 2024-02-07T06:03:41.788777Z |
| gsd-2024-1255 | A vulnerability has been found in sepidz SepidzDigitalMenu up to 7.1.0728.1 and classifie… | 2024-02-07T06:03:41.787748Z |
| gsd-2024-1271 | The format of the source doesn't require a description, click on the link for more details. | 2024-02-07T06:03:41.775998Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-183298 | Malicious code in kiudt-acog-efag (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183297 | Malicious code in kiudt-acavog-fafiug (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183296 | Malicious code in kiudt-acavog-fafiufug (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183295 | Malicious code in kiudt-acavog-fafikufug (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183294 | Malicious code in kiudt-acavog-fafifug (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183293 | Malicious code in kiudt-acavog-aug (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183292 | Malicious code in kiudt-acavog-aguu (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183291 | Malicious code in kiudt-acavog-agiucua (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183290 | Malicious code in kiudt-acavog-agicua (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183289 | Malicious code in kiudt-acavog-agica (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183288 | Malicious code in kiudt-acavog-agi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183287 | Malicious code in kiudt-acavog-agaiucua (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183286 | Malicious code in kiudt-acavog-agaicua (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183285 | Malicious code in kiudt-acavog-ag (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183284 | Malicious code in kiudt-acavog-afiug (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183283 | Malicious code in kisut-diug-dmoa (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183282 | Malicious code in kisut-diug-danugamifoa (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183281 | Malicious code in kisut-diug-danugamicfuifoa (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183280 | Malicious code in kisut-diug-danugamicfufoa (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183279 | Malicious code in kisut-diug-danugamicfoa (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183278 | Malicious code in kisut-diug-danugamicffoa (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183277 | Malicious code in kisut-diug-danugamicafoa (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183276 | Malicious code in kisut-diug-danuamifoa (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183275 | Malicious code in kisut-diug-danmifoa (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183274 | Malicious code in kisut-diug-danamifoa (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183273 | Malicious code in kisut-diug-damoa (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183272 | Malicious code in kisut-diug-damifoa (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183271 | Malicious code in kisut-diug-damfoa (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183270 | Malicious code in kisut-diufg-dv (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-183269 | Malicious code in kisut-diufg-doa (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2023:4020 | Red Hat Security Advisory: kernel security and bug fix update | 2023-07-11T07:52:37+00:00 | 2025-11-21T18:42:00+00:00 |
| rhsa-2023:4008 | Red Hat Security Advisory: python38:3.8 and python38-devel:3.8 security update | 2023-07-10T12:28:17+00:00 | 2025-11-21T18:42:00+00:00 |
| rhsa-2023:4005 | Red Hat Security Advisory: bind security update | 2023-07-10T16:13:52+00:00 | 2025-11-21T18:42:00+00:00 |
| rhsa-2023:4004 | Red Hat Security Advisory: python39:3.9 and python39-devel:3.9 security update | 2023-07-10T09:02:22+00:00 | 2025-11-21T18:41:59+00:00 |
| rhsa-2023:3950 | Red Hat Security Advisory: open-vm-tools security update | 2023-06-29T15:22:12+00:00 | 2025-11-21T18:41:58+00:00 |
| rhsa-2023:3949 | Red Hat Security Advisory: open-vm-tools security update | 2023-06-29T15:18:33+00:00 | 2025-11-21T18:41:58+00:00 |
| rhsa-2023:3948 | Red Hat Security Advisory: open-vm-tools security update | 2023-06-29T15:12:37+00:00 | 2025-11-21T18:41:57+00:00 |
| rhsa-2023:3947 | Red Hat Security Advisory: open-vm-tools security update | 2023-06-29T15:05:58+00:00 | 2025-11-21T18:41:57+00:00 |
| rhsa-2023:3946 | Red Hat Security Advisory: open-vm-tools security update | 2023-06-29T15:07:16+00:00 | 2025-11-21T18:41:57+00:00 |
| rhsa-2023:3945 | Red Hat Security Advisory: open-vm-tools security update | 2023-06-29T15:05:46+00:00 | 2025-11-21T18:41:56+00:00 |
| rhsa-2023:3944 | Red Hat Security Advisory: open-vm-tools security and bug fix update | 2023-06-29T15:15:04+00:00 | 2025-11-21T18:41:56+00:00 |
| rhsa-2023:3936 | Red Hat Security Advisory: python3 security update | 2023-06-29T13:05:06+00:00 | 2025-11-21T18:41:55+00:00 |
| rhsa-2023:3935 | Red Hat Security Advisory: python3 security update | 2023-06-29T12:49:36+00:00 | 2025-11-21T18:41:54+00:00 |
| rhsa-2023:3934 | Red Hat Security Advisory: python3 security update | 2023-06-29T12:34:49+00:00 | 2025-11-21T18:41:54+00:00 |
| rhsa-2023:3932 | Red Hat Security Advisory: python27:2.7 security update | 2023-06-29T12:12:58+00:00 | 2025-11-21T18:41:54+00:00 |
| rhsa-2023:3931 | Red Hat Security Advisory: python27:2.7 security update | 2023-06-29T11:39:20+00:00 | 2025-11-21T18:41:53+00:00 |
| rhsa-2023:3923 | Red Hat Security Advisory: go-toolset and golang security update | 2023-06-29T09:49:22+00:00 | 2025-11-21T18:41:53+00:00 |
| rhsa-2023:3853 | Red Hat Security Advisory: kpatch-patch security update | 2023-06-27T14:07:36+00:00 | 2025-11-21T18:41:52+00:00 |
| rhsa-2023:3922 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2023-06-29T09:14:53+00:00 | 2025-11-21T18:41:51+00:00 |
| rhsa-2023:3920 | Red Hat Security Advisory: go-toolset-1.19 and go-toolset-1.19-golang security update | 2023-06-29T05:33:42+00:00 | 2025-11-21T18:41:51+00:00 |
| rhsa-2023:3892 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.4 security update | 2023-06-27T18:53:45+00:00 | 2025-11-21T18:41:48+00:00 |
| rhsa-2023:3888 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.4 for OpenShift image security enhancement update | 2023-06-27T18:49:47+00:00 | 2025-11-21T18:41:48+00:00 |
| rhsa-2023:3885 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.4 security update on RHEL 9 | 2023-06-27T18:52:42+00:00 | 2025-11-21T18:41:47+00:00 |
| rhsa-2023:3884 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.4 security update on RHEL 8 | 2023-06-27T18:52:46+00:00 | 2025-11-21T18:41:47+00:00 |
| rhsa-2023:3883 | Red Hat Security Advisory: Red Hat Single Sign-On 7.6.4 security update on RHEL 7 | 2023-06-27T19:02:06+00:00 | 2025-11-21T18:41:47+00:00 |
| rhsa-2023:3852 | Red Hat Security Advisory: kernel security and bug fix update | 2023-06-27T14:07:22+00:00 | 2025-11-21T18:41:47+00:00 |
| rhsa-2023:3847 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | 2023-06-27T15:10:21+00:00 | 2025-11-21T18:41:46+00:00 |
| rhsa-2023:3840 | Red Hat Security Advisory: sqlite security update | 2023-06-27T15:07:51+00:00 | 2025-11-21T18:41:46+00:00 |
| rhsa-2023:3827 | Red Hat Security Advisory: libtiff security update | 2023-06-27T15:14:12+00:00 | 2025-11-21T18:41:45+00:00 |
| rhsa-2023:3822 | Red Hat Security Advisory: virt:rhel and virt-devel:rhel security and bug fix update | 2023-06-27T15:18:58+00:00 | 2025-11-21T18:41:44+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2019-15845 | Ruby through 2.4.7 2.5.x through 2.5.6 and 2.6.x through 2.6.4 mishandles path checking within File.fnmatch functions. | 2019-11-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2019-12735 | getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline as demonstrated by execute in Vim and assert_fails or nvim_input in Neovim. | 2019-06-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2019-1010180 | GNU gdb All versions is affected by: Buffer Overflow - Out of bound memory access. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution. The component is: The main gdb module. The attack vector is: Open an ELF for debugging. The fixed version is: Not fixed yet. | 2019-07-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2019-1003010 | A cross-site request forgery vulnerability exists in Jenkins Git Plugin 3.9.1 and earlier | 2019-02-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2018-21029 | systemd 239 through 245 accepts any certificate signed by a trusted certificate authority for DNS Over TLS. Server Name Indication (SNI) is not sent and there is no hostname validation with the GnuTLS backend. NOTE: This has been disputed by the developer as not a vulnerability since hostname validation does not have anything to do with this issue (i.e. there is no hostname to be sent) | 2019-10-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2018-16395 | An issue was discovered in the OpenSSL library in Ruby before 2.3.8 2.4.x before 2.4.5 2.5.x before 2.5.2 and 2.6.x before 2.6.0-preview3. When two OpenSSL::X509::Name objects are compared using == depending on the ordering non-equal objects may return true. When the first argument is one character longer than the second or the second argument contains a character that is one less than a character in the same position of the first argument the result of == will be true. This could be leveraged to create an illegitimate certificate that may be accepted as legitimate and then used in signing or encryption operations. | 2018-11-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2018-1000182 | A server-side request forgery vulnerability exists in Jenkins Git Plugin 3.9.0 and older in AssemblaWeb.java, GitBlitRepositoryBrowser.java, Gitiles.java, TFS2013GitRepositoryBrowser.java, ViewGitWeb.java that allows attackers with Overall/Read access to cause Jenkins to send a GET request to a specified URL. | 2018-06-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2018-1000110 | An improper authorization vulnerability exists in Jenkins Git Plugin version 3.7.0 and earlier in GitStatus.java that allows an attacker with network access to obtain a list of nodes and users. | 2018-03-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2017-8246 | In function msm_pcm_playback_close() in all Android releases from CAF using the Linux kernel prtd is assigned substream->runtime->private_data. Later prtd is freed. However prtd is not sanitized and set to NULL resulting in a dangling pointer. There are other functions that access the same memory (substream->runtime->private_data) with a NULL check such as msm_pcm_volume_ctl_put() which means this freed memory could be used. | 2017-05-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2017-8245 | In all Android releases from CAF using the Linux kernel while processing a voice SVC request which is nonstandard by specifying a payload size that will overflow its own declared size an out of bounds memory copy occurs. | 2017-05-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2017-8244 | In core_info_read and inst_info_read in all Android releases from CAF using the Linux kernel variable "dbg_buf" "dbg_buf->curr" and "dbg_buf->filled_size" could be modified by different threads at the same time but they are not protected with mutex or locks. Buffer overflow is possible on race conditions. "buffer->curr" itself could also be overwritten which means that it may point to anywhere of kernel memory (for write). | 2017-05-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2017-5931 | Integer overflow in hw/virtio/virtio-crypto.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code on the host via a crafted virtio-crypto request which triggers a heap-based buffer overflow. | 2017-03-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2017-16046 | `mariadb` was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm. | 2018-06-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2017-14167 | Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values which trigger an out-of-bounds write. | 2017-09-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2017-1000256 | libvirt version 2.3.0 and later is vulnerable to a bad default configuration of "verify-peer=no" passed to QEMU by libvirt resulting in a failure to validate SSL/TLS certificates by default. | 2017-10-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2017-1000118 | Akka HTTP versions <= 10.0.5 Illegal Media Range in Accept Header Causes StackOverflowError Leading to Denial of Service | 2017-10-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2016-7798 | The openssl gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key which makes it easier for context-dependent attackers to bypass the encryption protection mechanism. | 2017-01-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2016-7161 | Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on the QEMU host via a large ethlite packet. | 2016-10-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2016-6664 | mysqld_safe in Oracle MySQL through 5.5.51 5.6.x through 5.6.32 and 5.7.x through 5.7.14; MariaDB; Percona Server before 5.5.51-38.2 5.6.x before 5.6.32-78-1 and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0 5.6.x before 5.6.32-25.17 and 5.7.x before 5.7.14-26.17 when using file-based logging allows local users with access to the mysql account to gain root privileges via a symlink attack on error logs and possibly other files. | 2016-12-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2015-7504 | Heap-based buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU allows guest OS administrators to cause a denial of service (instance crash) or possibly execute arbitrary code via a series of packets in loopback mode. | 2017-10-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2015-5738 | The RSA-CRT implementation in the Cavium Software Development Kit (SDK) 2.x when used on OCTEON II CN6xxx Hardware on Linux to support TLS with Perfect Forward Secrecy (PFS) makes it easier for remote attackers to obtain private RSA keys by conducting a Lenstra side-channel attack. | 2016-07-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2015-3717 | Multiple buffer overflows in the printf functionality in SQLite as used in Apple iOS before 8.4 and OS X before 10.10.4 allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors. | 2015-07-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2013-0223 | The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command when using the -i switch which triggers a stack-based buffer overflow in the alloca function. | 2013-11-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2013-0222 | The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the uniq command which triggers a stack-based buffer overflow in the alloca function. | 2013-11-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2013-0221 | The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command when using the (1) -d or (2) -M switch which triggers a stack-based buffer overflow in the alloca function. | 2013-11-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2012-4575 | The add_database function in objects.c in the pgbouncer pooler 1.5.2 for PostgreSQL allows remote attackers to cause a denial of service (daemon outage) via a long database name in a request. | 2012-11-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2011-2519 | Xen in the Linux kernel when running a guest on a host without hardware assisted paging (HAP) allows guest users to cause a denial of service (invalid pointer dereference and hypervisor crash) via the SAHF instruction. | 2013-12-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2010-3865 | Integer overflow in the rds_rdma_pages function in net/rds/rdma.c in the Linux kernel allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted iovec struct in a Reliable Datagram Sockets (RDS) request which triggers a buffer overflow. | 2011-01-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2010-2542 | Stack-based buffer overflow in the is_git_directory function in setup.c in Git before 1.7.2.1 allows local users to gain privileges via a long gitdir: field in a .git file in a working copy. | 2010-08-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2009-4484 | Multiple stack-based buffer overflows in the CertDecoder::GetName function in src/asn.cpp in TaoCrypt in yaSSL before 1.9.9 as used in mysqld in MySQL 5.0.x before 5.0.90 MySQL 5.1.x before 5.1.43 MySQL 5.5.x through 5.5.0-m2 and other products allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption and daemon crash) by establishing an SSL connection and sending an X.509 client certificate with a crafted name field as demonstrated by mysql_overflow1.py and the vd_mysql5 module in VulnDisco Pack Professional 8.11. NOTE: this was originally reported for MySQL 5.0.51a. | 2009-12-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-201602-0209 | syslog in Apple iOS before 9.2.1, OS X before 10.11.3, and tvOS before 9.1.1 allows local… | 2025-04-13T22:41:21.622000Z |
| var-201408-0063 | Use-after-free vulnerability in Adobe Flash Player before 13.0.0.241 and 14.x before 14.0… | 2025-04-13T22:41:21.123000Z |
| var-201510-0089 | IOAudioFamily in Apple OS X before 10.11 allows local users to obtain sensitive kernel me… | 2025-04-13T22:41:20.845000Z |
| var-201504-0408 | Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows a… | 2025-04-13T22:41:20.793000Z |
| var-201506-0456 | The phar_parse_metadata function in ext/phar/phar.c in PHP before 5.4.40, 5.5.x before 5.… | 2025-04-13T22:41:20.429000Z |
| var-201407-0074 | Lock Screen in Apple iOS before 7.1.2 does not properly enforce the limit on failed passc… | 2025-04-13T22:41:19.992000Z |
| var-201607-0340 | QuickTime in Apple OS X before 10.11.6 allows remote attackers to execute arbitrary code … | 2025-04-13T22:40:48.355000Z |
| var-201512-0114 | Siri in Apple iOS before 9.2 allows physically proximate attackers to bypass an intended … | 2025-04-13T22:40:47.586000Z |
| var-201504-0149 | The sanitize_cookie_path function in cURL and libcurl 7.31.0 through 7.41.0 does not prop… | 2025-04-13T22:40:47.529000Z |
| var-201508-0063 | Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux… | 2025-04-13T22:40:00.807000Z |
| var-201504-0098 | Open Directory Client in Apple OS X before 10.10.3 sends unencrypted password-change requ… | 2025-04-13T22:40:00.213000Z |
| var-201603-0023 | The caching functionality in the TrustManagerImpl class in TrustManagerImpl.java in Consc… | 2025-04-13T22:39:57.492000Z |
| var-201512-0139 | The kernel in Apple iOS before 9.2, OS X before 10.11.2, tvOS before 9.1, and watchOS bef… | 2025-04-13T22:39:56.803000Z |
| var-201608-0006 | The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructur… | 2025-04-13T22:39:54.823000Z |
| var-201409-0467 | Buffer overflow in QT Media Foundation in Apple OS X before 10.9.5 allows remote attacker… | 2025-04-13T22:39:54.047000Z |
| var-201509-0049 | Multiple unspecified vulnerabilities in Twisted in Wiki Server in Apple OS X Server befor… | 2025-04-13T22:39:51.976000Z |
| var-201504-0145 | The private-browsing implementation in WebKit in Apple Safari before 6.2.5, 7.x before 7.… | 2025-04-13T22:39:51.934000Z |
| var-201407-0072 | Settings in Apple iOS before 7.1.2 allows physically proximate attackers to bypass an int… | 2025-04-13T22:39:49.226000Z |
| var-201605-0486 | The kernel in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS… | 2025-04-13T22:39:48.485000Z |
| var-201509-0047 | IDE Xcode Server in Apple Xcode before 7.0 does not properly restrict access to repositor… | 2025-04-13T22:39:42.084000Z |
| var-201501-0272 | The xpc_data_get_bytes function in libxpc in Apple OS X before 10.10.2 does not verify th… | 2025-04-13T22:39:38.534000Z |
| var-201508-0107 | Backup in Apple iOS before 8.4.1 allows attackers to bypass intended restrictions on file… | 2025-04-13T22:39:07.898000Z |
| var-201411-0391 | Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and O… | 2025-04-13T22:39:07.667000Z |
| var-201512-0157 | Apple iOS before 9.2, OS X before 10.11.2, and tvOS before 9.1 improperly validate keycha… | 2025-04-13T22:38:04.504000Z |
| var-201412-0576 | WebKit, as used in Apple Safari before 6.2.1, 7.x before 7.1.1, and 8.x before 8.0.1, all… | 2025-04-13T22:38:03.453000Z |
| var-201504-0397 | Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows a… | 2025-04-13T22:38:02.677000Z |
| var-201509-0071 | SpringBoard in Apple iOS before 9 does not properly restrict access to privileged API cal… | 2025-04-13T22:38:02.084000Z |
| var-201507-0403 | Race condition in kext tools in Apple OS X before 10.10.4 allows local users to bypass in… | 2025-04-13T22:36:59.507000Z |
| var-201603-0228 | QuickTime in Apple OS X before 10.11.4 allows remote attackers to execute arbitrary code … | 2025-04-13T22:36:59.318000Z |
| var-201512-0162 | The kernel loader in EFI in Apple OS X before 10.11.2 allows local users to gain privileg… | 2025-04-13T22:36:55.005000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2020:2117-1 | Security update for libX11 | 2020-08-04T13:15:09Z | 2020-08-04T13:15:09Z |
| suse-su-2020:2116-1 | Security update for libX11 | 2020-08-04T13:13:00Z | 2020-08-04T13:13:00Z |
| suse-su-2020:2109-1 | Security update for python-rtslib-fb | 2020-08-03T14:47:14Z | 2020-08-03T14:47:14Z |
| suse-su-2020:14442-1 | Security update for the Linux Kernel | 2020-08-03T14:46:47Z | 2020-08-03T14:46:47Z |
| suse-su-2020:2107-1 | Security update for the Linux Kernel | 2020-08-03T14:45:27Z | 2020-08-03T14:45:27Z |
| suse-su-2020:2106-1 | Security update for the Linux Kernel | 2020-08-03T14:44:03Z | 2020-08-03T14:44:03Z |
| suse-su-2020:2103-1 | Security update for the Linux Kernel | 2020-08-03T09:31:26Z | 2020-08-03T09:31:26Z |
| suse-su-2020:2102-1 | Security update for the Linux Kernel | 2020-07-31T13:44:06Z | 2020-07-31T13:44:06Z |
| suse-su-2020:2101-1 | Security update for targetcli-fb | 2020-07-31T12:08:34Z | 2020-07-31T12:08:34Z |
| suse-su-2020:2100-1 | Security update for MozillaFirefox | 2020-07-31T12:04:41Z | 2020-07-31T12:04:41Z |
| suse-su-2020:2097-1 | Security update for ghostscript | 2020-07-30T15:11:40Z | 2020-07-30T15:11:40Z |
| suse-su-2020:2095-1 | Security update for ghostscript | 2020-07-30T15:10:49Z | 2020-07-30T15:10:49Z |
| suse-su-2020:2086-1 | Security update for targetcli-fb | 2020-07-30T12:07:07Z | 2020-07-30T12:07:07Z |
| suse-su-2020:2079-1 | Security update for grub2 | 2020-07-29T18:01:45Z | 2020-07-29T18:01:45Z |
| suse-su-2020:2078-1 | Security update for grub2 | 2020-07-29T17:30:07Z | 2020-07-29T17:30:07Z |
| suse-su-2020:2077-1 | Security update for grub2 | 2020-07-29T17:28:46Z | 2020-07-29T17:28:46Z |
| suse-su-2020:2076-1 | Security update for grub2 | 2020-07-29T17:00:59Z | 2020-07-29T17:00:59Z |
| suse-su-2020:14440-1 | Security update for grub2 | 2020-07-29T17:00:01Z | 2020-07-29T17:00:01Z |
| suse-su-2020:2074-1 | Security update for grub2 | 2020-07-29T16:59:53Z | 2020-07-29T16:59:53Z |
| suse-su-2020:2073-1 | Security update for grub2 | 2020-07-29T16:59:34Z | 2020-07-29T16:59:34Z |
| suse-ru-2020:2072-1 | Security update for ansible, crowbar-core, crowbar-ha, crowbar-openstack, etcd, flannel, grafana, keepalived, kibana, memcached, monasca-installer, openstack-dashboard-theme-SUSE, openstack-manila, openstack-neutron-fwaas, openstack-nova, openstack-tempest, python-Django, python-Pillow, python-psql2mysql, python-psutil, python-py, python-pysaml2, python-waitress, rabbitmq-server, release-notes-suse-openstack-cloud, zookeeper | 2020-07-29T14:31:35Z | 2020-07-29T14:31:35Z |
| suse-su-2020:2069-1 | Security update for webkit2gtk3 | 2020-07-29T09:13:22Z | 2020-07-29T09:13:22Z |
| suse-su-2020:2068-1 | Security update for freerdp | 2020-07-29T09:12:47Z | 2020-07-29T09:12:47Z |
| suse-su-2020:2067-1 | Security update for ldb | 2020-07-29T09:11:53Z | 2020-07-29T09:11:53Z |
| suse-su-2020:2066-1 | Security update for samba | 2020-07-29T09:10:17Z | 2020-07-29T09:10:17Z |
| suse-su-2020:2065-1 | Security update for samba | 2020-07-29T09:09:34Z | 2020-07-29T09:09:34Z |
| suse-su-2020:2060-1 | Security update for rubygem-puma | 2020-07-28T15:54:20Z | 2020-07-28T15:54:20Z |
| suse-su-2020:2057-1 | Security update for python-Pillow | 2020-07-27T20:26:47Z | 2020-07-27T20:26:47Z |
| suse-su-2020:2055-1 | Security update for python-Django | 2020-07-27T14:07:25Z | 2020-07-27T14:07:25Z |
| suse-su-2020:2053-1 | Security update for rubygem-excon | 2020-07-27T08:07:54Z | 2020-07-27T08:07:54Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2024-38016 | Siemens Industrial产品空指针解引用漏洞(CNVD-2024-38016) | 2024-09-12 | 2024-09-12 |
| cnvd-2024-38015 | Siemens Industrial产品空指针解引用漏洞(CNVD-2024-38015) | 2024-09-12 | 2024-09-12 |
| cnvd-2024-38014 | Siemens Tecnomatix Plant Simulation堆栈缓冲区溢出漏洞(CNVD-2024-38014) | 2024-09-12 | 2024-09-12 |
| cnvd-2024-37975 | Google Android权限提升漏洞(CNVD-2024-37975) | 2024-07-12 | 2024-09-11 |
| cnvd-2024-37974 | Google Android Framework权限提升漏洞(CNVD-2024-37974) | 2024-07-12 | 2024-09-11 |
| cnvd-2024-37973 | Google Android越界读取漏洞(CNVD-2024-37973) | 2024-08-21 | 2024-09-11 |
| cnvd-2024-37972 | Google Android权限提升漏洞(CNVD-2024-37972) | 2024-08-21 | 2024-09-11 |
| cnvd-2024-37971 | Google Android权限提升漏洞(CNVD-2024-37971) | 2024-08-21 | 2024-09-11 |
| cnvd-2024-37970 | Google Android权限提升漏洞(CNVD-2024-37970) | 2024-08-21 | 2024-09-11 |
| cnvd-2024-37969 | Google Android权限提升漏洞(CNVD-2024-37969) | 2024-08-21 | 2024-09-11 |
| cnvd-2024-37968 | Google Android权限提升漏洞(CNVD-2024-37968) | 2024-08-21 | 2024-09-11 |
| cnvd-2024-37967 | Google Android拒绝服务漏洞(CNVD-2024-37967) | 2024-08-21 | 2024-09-11 |
| cnvd-2024-37966 | Google Android权限提升漏洞(CNVD-2024-37966) | 2024-08-21 | 2024-09-11 |
| cnvd-2024-36506 | 成都天问互联科技有限公司天问物业ERP系统存在任意文件读取漏洞(CNVD-2024-36506) | 2024-07-28 | 2024-09-11 |
| cnvd-2024-37814 | Google Chrome内存错误引用漏洞(CNVD-2024-37814) | 2024-09-04 | 2024-09-10 |
| cnvd-2024-37813 | Google Chrome越界写入漏洞(CNVD-2024-37813) | 2024-09-04 | 2024-09-10 |
| cnvd-2024-37812 | Adobe Acrobat and Reader越界读取漏洞(CNVD-2024-37812) | 2024-08-16 | 2024-09-10 |
| cnvd-2024-37811 | Adobe Experience Manager跨站脚本漏洞(CNVD-2024-37811) | 2024-08-28 | 2024-09-10 |
| cnvd-2024-37810 | Adobe Experience Manager跨站脚本漏洞(CNVD-2024-37810) | 2024-08-28 | 2024-09-10 |
| cnvd-2024-37809 | Adobe Experience Manager跨站脚本漏洞(CNVD-2024-37809) | 2024-08-28 | 2024-09-10 |
| cnvd-2024-37808 | Adobe Experience Manager跨站脚本漏洞(CNVD-2024-37808) | 2024-08-28 | 2024-09-10 |
| cnvd-2024-37807 | Adobe Experience Manager跨站脚本漏洞(CNVD-2024-37807) | 2024-08-28 | 2024-09-10 |
| cnvd-2024-37806 | Adobe Experience Manager跨站脚本漏洞(CNVD-2024-37806) | 2024-08-28 | 2024-09-10 |
| cnvd-2024-37805 | Adobe Experience Manager输入验证错误漏洞(CNVD-2024-37805) | 2024-08-28 | 2024-09-10 |
| cnvd-2024-25534 | 北京亚控科技发展有限公司KingH5Stream系统存在逻辑缺陷漏洞 | 2024-05-20 | 2024-09-10 |
| cnvd-2024-37758 | GTKWave整数溢出漏洞(CNVD-2024-37758) | 2024-01-11 | 2024-09-09 |
| cnvd-2024-37757 | GTKWave整数溢出漏洞(CNVD-2024-37757) | 2024-01-11 | 2024-09-09 |
| cnvd-2024-37756 | GTKWave越界写入漏洞(CNVD-2024-37756) | 2024-01-11 | 2024-09-09 |
| cnvd-2024-37755 | GTKWave不正确数组索引验证漏洞(CNVD-2024-37755) | 2024-01-11 | 2024-09-09 |
| cnvd-2024-37754 | GTKWave不正确数组索引验证漏洞 | 2024-01-11 | 2024-09-09 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2010-avi-041 | Multiples vulnérabilités dans Apache Tomcat | 2010-02-02T00:00:00.000000 | 2010-02-03T00:00:00.000000 |
| certa-2010-avi-043 | Multiples vulnérabilités dans les produits VMware | 2010-02-02T00:00:00.000000 | 2010-02-02T00:00:00.000000 |
| certa-2010-avi-042 | Vulnérabilité dans Cisco Secure Desktop | 2010-02-02T00:00:00.000000 | 2010-02-02T00:00:00.000000 |
| certa-2010-avi-040 | Vulnérabilité dans Symantec Altiris Notification Server | 2010-01-29T00:00:00.000000 | 2010-01-29T00:00:00.000000 |
| certa-2010-avi-039 | Vulnérabilité dans IBM DataPower | 2010-01-29T00:00:00.000000 | 2010-01-29T00:00:00.000000 |
| certa-2010-avi-038 | Vulnérabilité dans Samba | 2010-01-29T00:00:00.000000 | 2010-01-29T00:00:00.000000 |
| certa-2010-avi-037 | Vulnérabilité des produits Hitachi | 2010-01-29T00:00:00.000000 | 2010-01-29T00:00:00.000000 |
| certa-2010-avi-036 | Vulnérabilité dans HP OpenView Storage Data Protector | 2010-01-29T00:00:00.000000 | 2010-01-29T00:00:00.000000 |
| certa-2010-avi-035 | Multiples vulnérabilités dans Wireshark | 2010-01-29T00:00:00.000000 | 2010-01-29T00:00:00.000000 |
| certa-2010-avi-034 | Multiples vulnérabilités dans Cisco Unified MeetingPlace | 2010-01-29T00:00:00.000000 | 2010-01-29T00:00:00.000000 |
| certa-2010-avi-033 | Vulnérabilités dans Sun Java System Web Server | 2010-01-29T00:00:00.000000 | 2010-01-29T00:00:00.000000 |
| certa-2010-avi-032 | Vulnérabilité dans Apache mod_proxy | 2010-01-28T00:00:00.000000 | 2010-01-28T00:00:00.000000 |
| certa-2010-avi-031 | Vulnérabilité dans Citrix XenServer | 2010-01-27T00:00:00.000000 | 2010-01-27T00:00:00.000000 |
| certa-2010-avi-030 | Multiples vulnérabilités dans Google Chrome | 2010-01-27T00:00:00.000000 | 2010-01-27T00:00:00.000000 |
| certa-2010-avi-029 | Vulnérabilité dans CISCO IOS | 2010-01-22T00:00:00.000000 | 2010-01-22T00:00:00.000000 |
| certa-2010-avi-028 | Multiples vulnérabilités dans gzip | 2010-01-22T00:00:00.000000 | 2010-01-22T00:00:00.000000 |
| certa-2010-avi-027 | Multiples vulnérabilités dans HP Power Manager | 2010-01-22T00:00:00.000000 | 2010-01-22T00:00:00.000000 |
| certa-2010-avi-026 | Vulnérabilités des produits SAP | 2010-01-22T00:00:00.000000 | 2010-01-22T00:00:00.000000 |
| certa-2010-avi-025 | Multiples vulnérabilités dans Internet Explorer | 2010-01-22T00:00:00.000000 | 2010-01-22T00:00:00.000000 |
| certa-2010-avi-024 | Multiples vulnérabilités dans Mozilla Thunderbird 3.0 | 2010-01-21T00:00:00.000000 | 2010-01-21T00:00:00.000000 |
| certa-2010-avi-022 | Multiples vulnérabilités dans Apple Mac OS X | 2010-01-20T00:00:00.000000 | 2010-01-20T00:00:00.000000 |
| certa-2010-avi-021 | Vulnérabilités dans Adobe Shockwave Player | 2010-01-20T00:00:00.000000 | 2010-01-20T00:00:00.000000 |
| certa-2010-avi-019 | Vulnérabilité dans TYPO3 | 2010-01-19T00:00:00.000000 | 2010-01-19T00:00:00.000000 |
| certa-2010-avi-018 | Multiples vulnérabilités dans Red Hat Linux | 2010-01-14T00:00:00.000000 | 2010-01-14T00:00:00.000000 |
| certa-2010-avi-017 | Vulnérabilité dans Novell ZENWorks Asset Management | 2010-01-14T00:00:00.000000 | 2010-01-14T00:00:00.000000 |
| certa-2010-avi-016 | Vulnérabilité dans Sun Identity Manager | 2010-01-13T00:00:00.000000 | 2010-01-13T00:00:00.000000 |
| certa-2010-avi-015 | Vulnérabilité dans Solaris Trusted Extensions | 2010-01-13T00:00:00.000000 | 2010-01-13T00:00:00.000000 |
| certa-2010-avi-014 | Vulnérabilité dans Zope | 2010-01-13T00:00:00.000000 | 2010-01-13T00:00:00.000000 |
| certa-2010-avi-013 | Vulnérabilité dans MIT Kerberos | 2010-01-13T00:00:00.000000 | 2010-01-13T00:00:00.000000 |
| certa-2010-avi-012 | Multiples vulnérabilités dans Adobe Reader et Acrobat | 2010-01-13T00:00:00.000000 | 2010-01-13T00:00:00.000000 |