Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-23710 |
N/A
|
Not used | N/A | N/A | 2026-01-16T03:55:06.646Z | |
| CVE-2026-23711 |
N/A
|
Not used | N/A | N/A | 2026-01-16T03:55:06.197Z | |
| CVE-2026-23712 |
N/A
|
Not used | N/A | N/A | 2026-01-16T03:55:05.700Z | |
| CVE-2026-23713 |
N/A
|
Not used | N/A | N/A | 2026-01-16T03:55:05.231Z | |
| CVE-2026-23714 |
N/A
|
Not used | N/A | N/A | 2026-01-16T03:55:04.715Z | |
| CVE-2026-0855 |
8.7 (4.0)
8.8 (3.1)
|
Merit LILIN|IP Camera - OS Command Injection |
Merit LILIN |
P2 |
2026-01-12T06:44:40.227Z | 2026-01-16T02:09:56.328Z |
| CVE-2025-9904 |
5.3 (3.1)
6.9 (4.0)
|
Unallocated memory access vulnerability in print … |
Canon Inc. |
Generic Plus PCL6 Printer Driver |
2025-09-29T00:46:03.660Z | 2026-01-16T00:10:23.476Z |
| CVE-2025-9903 |
5.9 (3.1)
5.9 (4.0)
|
Out-of-bounds write vulnerabilities in print proc… |
Canon Inc. |
Generic Plus PCL6 Printer Driver |
2025-09-29T00:44:55.506Z | 2026-01-16T00:02:54.676Z |
| CVE-2025-7698 |
5.9 (3.1)
5.9 (4.0)
|
Out-of-bounds read vulnerabilities in print proce… |
Canon Inc. |
Generic Plus PCL6 Printer Driver |
2025-09-29T00:47:02.910Z | 2026-01-15T23:59:37.174Z |
| CVE-2026-1012 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage. | N/A | N/A | 2026-01-15T22:55:03.432Z | |
| CVE-2020-36917 |
8.6 (4.0)
7.5 (3.1)
|
iDS6 DSSPro Digital Signage System 6.2 Cleartext Passw… |
Guangzhou Yeroo Tech Co., Ltd. |
iDS6 DSSPro Digital Signage System |
2026-01-06T15:53:23.292Z | 2026-01-15T21:37:30.416Z |
| CVE-2026-23622 |
7.4 (4.0)
|
CSRF Protection Bypass: Sensitive endpoints accept GET… |
alextselegidis |
easyappointments |
2026-01-15T19:28:58.369Z | 2026-01-15T21:34:43.098Z |
| CVE-2025-70892 |
9.8 (3.1)
|
Phpgurukul Cyber Cafe Management System v1.0 cont… |
n/a |
n/a |
2026-01-15T00:00:00.000Z | 2026-01-15T21:25:50.687Z |
| CVE-2025-70893 |
8.8 (3.1)
|
A time-based blind SQL Injection vulnerability ex… |
n/a |
n/a |
2026-01-15T00:00:00.000Z | 2026-01-15T21:22:19.718Z |
| CVE-2026-21918 |
7.5 (3.1)
8.7 (4.0)
|
Junos OS: SRX and MX Series: When TCP packets occur in… |
Juniper Networks |
Junos OS |
2026-01-15T20:27:54.743Z | 2026-01-15T21:13:00.740Z |
| CVE-2026-21917 |
7.5 (3.1)
8.7 (4.0)
|
Junos OS: SRX Series: Specifically malformed SSL packe… |
Juniper Networks |
Junos OS |
2026-01-15T20:27:11.214Z | 2026-01-15T21:12:37.455Z |
| CVE-2026-21907 |
5.9 (3.1)
8.2 (4.0)
|
Junos Space: TLS/SSL server supports use of static key… |
Juniper Networks |
Junos Space |
2026-01-15T20:21:11.010Z | 2026-01-15T21:12:31.198Z |
| CVE-2026-21903 |
6.5 (3.1)
7.1 (4.0)
|
Junos OS: Subscribing to telemetry sensors at scale ca… |
Juniper Networks |
Junos OS |
2026-01-15T20:18:36.767Z | 2026-01-15T21:12:08.631Z |
| CVE-2026-0203 |
6.5 (3.1)
7.1 (4.0)
|
Junos OS: Receipt of a specifically malformed ICMP pac… |
Juniper Networks |
Junos OS |
2026-01-15T20:17:24.552Z | 2026-01-15T21:11:32.119Z |
| CVE-2025-60011 |
5.8 (3.1)
6.9 (4.0)
|
Junos OS and Junos OS Evolved: Optional transitive BGP… |
Juniper Networks |
Junos OS |
2026-01-15T20:16:47.459Z | 2026-01-15T21:10:58.766Z |
| CVE-2025-60007 |
5.5 (3.1)
6.8 (4.0)
|
Junos OS: A specifically crafted 'show chassis' comman… |
Juniper Networks |
Junos OS |
2026-01-15T20:16:22.617Z | 2026-01-15T21:10:13.435Z |
| CVE-2026-1002 |
6.9 (4.0)
|
Eclipse Vert.x Web static handler file access denial |
Eclipse Vert.x |
Eclipse Vert.x |
2026-01-15T20:50:25.642Z | 2026-01-15T21:09:22.172Z |
| CVE-2025-60003 |
7.5 (3.1)
8.7 (4.0)
|
Junos OS and Junos OS Evolved: BGP update with a set o… |
Juniper Networks |
Junos OS |
2026-01-15T20:15:04.828Z | 2026-01-15T21:09:19.309Z |
| CVE-2025-59961 |
5.5 (3.1)
6.8 (4.0)
|
Junos OS and Junos OS Evolved: Unix socket used to con… |
Juniper Networks |
Junos OS |
2026-01-15T20:14:43.508Z | 2026-01-15T21:08:37.387Z |
| CVE-2025-67025 |
6.1 (3.1)
|
Cross Site Scripting vulnerability in Anycomment … |
n/a |
n/a |
2026-01-15T00:00:00.000Z | 2026-01-15T21:07:24.240Z |
| CVE-2025-70891 |
6.1 (3.1)
|
A stored cross-site scripting (XSS) vulnerability… |
n/a |
n/a |
2026-01-15T00:00:00.000Z | 2026-01-15T21:06:05.340Z |
| CVE-2025-70890 |
6.1 (3.1)
|
A stored cross-site scripting (XSS) vulnerability… |
n/a |
n/a |
2026-01-15T00:00:00.000Z | 2026-01-15T21:04:49.118Z |
| CVE-2025-65368 |
6.1 (3.1)
|
SparkyFitness v0.15.8.2 is vulnerable to Cross Si… |
n/a |
n/a |
2026-01-15T00:00:00.000Z | 2026-01-15T21:03:15.128Z |
| CVE-2026-21920 |
7.5 (3.1)
8.7 (4.0)
|
Junos OS: SRX Series: If a specific request is process… |
Juniper Networks |
Junos OS |
2026-01-15T20:28:10.526Z | 2026-01-15T20:59:21.070Z |
| CVE-2026-21921 |
6.5 (3.1)
7.1 (4.0)
|
Junos OS and Junos OS Evolved: When telemetry collecto… |
Juniper Networks |
Junos OS |
2026-01-15T20:28:29.656Z | 2026-01-15T20:55:25.182Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-21891 |
9.4 (3.1)
|
ZimaOS has Authentication Bypass via System-Level Username |
IceWhaleTech |
ZimaOS |
2026-01-08T14:00:14.578Z | 2026-01-08T15:55:23.245Z |
| CVE-2025-1885 |
5.4 (3.1)
|
Open Redirect in Restajet's Online Food Delivery System |
Restajet Information Technologies Inc. |
Online Food Delivery System |
2025-12-19T11:47:32.340Z | 2025-12-19T13:55:34.472Z |
| CVE-2025-1927 |
7.1 (3.1)
|
CSRF in Restajet's Online Food Delivery System |
Restajet Information Technologies Inc. |
Online Food Delivery System |
2025-12-19T12:01:03.912Z | 2025-12-19T13:54:57.242Z |
| CVE-2025-1928 |
9.1 (3.1)
|
Improper Authentication in Restajet's Online Food Deli… |
Restajet Information Technologies Inc. |
Online Food Delivery System |
2025-12-19T12:08:35.180Z | 2025-12-19T13:53:52.828Z |
| CVE-2025-14910 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
Edimax BR-6208AC FTP Daemon Service handle_retr path t… |
Edimax |
BR-6208AC |
2025-12-19T01:32:06.853Z | 2026-02-24T05:55:44.183Z |
| CVE-2026-21885 |
6.5 (3.1)
|
Miniflux Media Proxy SSRF via /proxy endpoint allows a… |
miniflux |
v2 |
2026-01-08T13:57:25.445Z | 2026-01-08T15:55:28.121Z |
| CVE-2025-35010 |
7.1 (3.1)
|
Microhard Bullet-LTE and IPn4Gii AT+MNPINGTM Argument … |
Microhard |
IPn4Gii / Bullet-LTE Firmware |
2025-06-08T21:06:16.368Z | 2025-06-09T03:16:04.477Z |
| CVE-2025-35009 |
7.1 (3.1)
|
Microhard Bullet-LTE and IPn4Gii AT+MNNETSP Argument I… |
Microhard |
IPn4Gii / Bullet-LTE Firmware |
2025-06-08T21:06:05.426Z | 2025-06-09T03:17:10.831Z |
| CVE-2025-35008 |
7.1 (3.1)
|
Microhard Bullet-LTE and IPn4Gii AT+MMNAME Argument In… |
Microhard |
IPn4Gii / Bullet-LTE Firmware |
2025-06-08T21:05:52.090Z | 2025-06-09T03:18:02.029Z |
| CVE-2025-35007 |
7.1 (3.1)
|
Microhard Bullet-LTE and IPn4Gii AT+MFRULE Argument In… |
Microhard |
IPn4Gii / Bullet-LTE Firmware |
2025-06-08T21:05:38.698Z | 2025-06-09T03:18:53.105Z |
| CVE-2025-35006 |
7.1 (3.1)
|
Microhard Bullet-LTE and IPn4Gii AT+MFPORTFWD Argument… |
Microhard |
IPn4Gii / Bullet-LTE Firmware |
2025-06-08T21:05:25.706Z | 2025-06-09T03:19:46.712Z |
| CVE-2025-35005 |
7.1 (3.1)
|
Microhard Bullet-LTE and IPn4Gii AT+MFMAC Argument Injection |
Microhard |
IPn4Gii / Bullet-LTE Firmware |
2025-06-08T21:05:15.936Z | 2025-06-09T03:20:54.997Z |
| CVE-2025-35004 |
7.1 (3.1)
|
Microhard Bullet-LTE and IPn4Gii AT+MFIP Argument Injection |
Microhard |
IPn4Gii / Bullet-LTE Firmware |
2025-06-08T21:05:01.219Z | 2025-06-09T03:22:14.184Z |
| CVE-2025-35027 |
7.3 (3.1)
|
Unitree Multiple Robotic Products Command Injection |
Unitree |
Go2 |
2025-09-26T06:53:49.585Z | 2025-10-07T21:10:12.489Z |
| CVE-2026-0628 |
8.8 (3.1)
|
Insufficient policy enforcement in WebView tag in… |
Google |
Chrome |
2026-01-06T23:57:00.488Z | 2026-02-26T15:04:55.900Z |
| CVE-2025-55125 |
7.8 (3.1)
|
This vulnerability allows a Backup or Tape Operat… |
Veeam |
Backup And Recovery |
2026-01-08T16:18:20.398Z | 2026-01-08T17:33:26.470Z |
| CVE-2026-22242 |
4.9 (3.1)
|
CoreShop Vulnerable to SQL Injection via Admin Reports |
coreshop |
CoreShop |
2026-01-08T09:59:24.849Z | 2026-01-08T14:26:19.902Z |
| CVE-2025-11941 |
5.3 (4.0)
5.4 (3.1)
5.4 (3.0)
|
e107 CMS Avatar image.php path traversal |
e107 |
CMS |
2025-10-19T15:32:10.388Z | 2025-10-20T19:04:24.380Z |
| CVE-2025-61505 |
6.5 (3.1)
|
e107 CMS thru 2.3.3 are vulnerable to insecure de… |
n/a |
n/a |
2025-10-10T00:00:00.000Z | 2026-02-03T17:40:08.418Z |
| CVE-2026-21505 |
5.5 (3.1)
|
iccDEV has Undefined Behavior (UB) - Invalid Enum Value |
InternationalColorConsortium |
iccDEV |
2026-01-07T17:10:51.496Z | 2026-01-08T19:18:19.744Z |
| CVE-2025-7073 |
8.8 (4.0)
|
Local Privilege Escalation via Arbitrary File Operatio… |
Bitdefender |
Total Security |
2025-12-10T09:46:40.263Z | 2026-02-26T16:21:06.522Z |
| CVE-2026-0581 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Tenda AC1206 httpd BehaviorManager formBehaviorManager… |
Tenda |
AC1206 |
2026-01-05T08:02:08.449Z | 2026-02-23T08:13:25.661Z |
| CVE-2024-20139 |
6.5 (3.1)
|
In Bluetooth firmware, there is a possible firmwa… |
MediaTek, Inc. |
MT2737, MT3605, MT6985, MT6989, MT6990, MT7925, MT7927, MT8518S, MT8532, MT8678 |
2024-12-02T03:07:17.028Z | 2024-12-02T15:47:09.716Z |
| CVE-2025-45467 |
7.1 (3.1)
|
Unitree Go1 <= Go1_2022_05_11 is vulnerable to In… |
n/a |
n/a |
2025-07-25T00:00:00.000Z | 2025-07-25T20:19:40.305Z |
| CVE-2025-45466 |
8.8 (3.1)
|
Unitree Go1 <= Go1_2022_05_11 is vulnerale to Inc… |
n/a |
n/a |
2025-07-25T00:00:00.000Z | 2025-07-25T15:31:59.738Z |
| CVE-2024-20149 |
7.5 (3.1)
|
In Modem, there is a possible system crash due to… |
MediaTek, Inc. |
MT2735, MT2737, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6779, MT6781, MT6783, MT6785, MT6785T, MT6785U, MT6789, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6880T, MT6880U, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8788E, MT8789, MT8791T, MT8795T, MT8797, MT8798, MT8863 |
2025-01-06T03:17:54.848Z | 2025-01-06T14:14:31.982Z |
| CVE-2024-20153 |
7.5 (3.1)
|
In wlan STA, there is a possible way to trick a c… |
MediaTek, Inc. |
MT2737, MT6989, MT6991, MT7925, MT8365, MT8518S, MT8532, MT8666, MT8667, MT8673, MT8676, MT8678, MT8755, MT8766, MT8768, MT8775, MT8781, MT8786, MT8788, MT8796, MT8798, MT8893 |
2025-01-06T03:18:01.542Z | 2025-01-06T14:11:35.078Z |
| CVE-2025-63221 |
9.1 (3.1)
|
The Axel Technology puma devices (firmware versio… |
n/a |
n/a |
2025-11-19T00:00:00.000Z | 2025-12-17T22:15:59.502Z |
| CVE-2023-4785 |
7.5 (3.1)
|
Denial of Service in gRPC Core |
Google |
gRPC |
2023-09-13T16:31:55.664Z | 2026-01-12T15:34:12.725Z |
| CVE-2024-58289 |
5.3 (4.0)
|
Microweber 2.0.15 Stored Cross-Site Scripting via User… |
microweber |
Microweber |
2025-12-11T21:34:21.705Z | 2025-12-18T19:44:47.405Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-21885 | Miniflux 2 is an open source feed reader. Prior to version 2.2.16, Miniflux's media proxy endpoint … | 2026-01-08T14:15:57.257 | 2026-01-12T16:55:42.353 |
| fkie_cve-2025-35010 | Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-auth… | 2025-06-08T21:15:32.633 | 2026-01-12T16:55:05.630 |
| fkie_cve-2025-35009 | Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-auth… | 2025-06-08T21:15:32.500 | 2026-01-12T16:55:01.207 |
| fkie_cve-2025-35008 | Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-auth… | 2025-06-08T21:15:32.363 | 2026-01-12T16:54:57.603 |
| fkie_cve-2025-35007 | Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-auth… | 2025-06-08T21:15:32.227 | 2026-01-12T16:54:54.490 |
| fkie_cve-2025-35006 | Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-auth… | 2025-06-08T21:15:32.087 | 2026-01-12T16:54:46.893 |
| fkie_cve-2025-35005 | Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-auth… | 2025-06-08T21:15:31.947 | 2026-01-12T16:54:39.903 |
| fkie_cve-2025-35004 | Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-auth… | 2025-06-08T21:15:31.807 | 2026-01-12T16:54:35.330 |
| fkie_cve-2025-35027 | Multiple robotic products by Unitree sharing a common firmware, including the Go2, G1, H1, and B2 d… | 2025-09-26T07:15:41.413 | 2026-01-12T16:54:07.000 |
| fkie_cve-2026-0628 | Insufficient policy enforcement in WebView tag in Google Chrome prior to 143.0.7499.192 allowed an … | 2026-01-07T12:17:07.093 | 2026-01-12T16:48:33.560 |
| fkie_cve-2025-55125 | This vulnerability allows a Backup or Tape Operator to perform remote code execution (RCE) as root … | 2026-01-08T17:15:47.730 | 2026-01-12T16:44:01.677 |
| fkie_cve-2026-22242 | CoreShop is a Pimcore enhanced eCommerce solution. Prior to version 4.1.8, a blind SQL injection vu… | 2026-01-08T10:15:56.127 | 2026-01-12T16:42:51.783 |
| fkie_cve-2025-11941 | A vulnerability was detected in e107 CMS up to 2.3.3. This impacts an unknown function of the file … | 2025-10-19T16:15:35.540 | 2026-01-12T16:42:12.797 |
| fkie_cve-2025-61505 | e107 CMS thru 2.3.3 are vulnerable to insecure deserialization in the `install.php` script. The scr… | 2025-10-10T19:15:38.257 | 2026-01-12T16:36:43.003 |
| fkie_cve-2026-21505 | iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and appl… | 2026-01-07T18:15:54.700 | 2026-01-12T16:35:08.800 |
| fkie_cve-2025-7073 | A local privilege escalation vulnerability in Bitdefender Total Security 27.0.46.231 allows low-pri… | 2025-12-10T10:16:02.330 | 2026-01-12T16:31:35.213 |
| fkie_cve-2026-0581 | A vulnerability was determined in Tenda AC1206 15.03.06.23. Affected by this issue is the function … | 2026-01-05T09:15:54.867 | 2026-01-12T16:31:00.163 |
| fkie_cve-2024-20139 | In Bluetooth firmware, there is a possible firmware asssert due to improper handling of exceptional… | 2024-12-02T04:15:06.247 | 2026-01-12T16:29:10.870 |
| fkie_cve-2025-45467 | Unitree Go1 <= Go1_2022_05_11 is vulnerable to Insecure Permissions as the firmware update function… | 2025-07-25T15:15:29.283 | 2026-01-12T16:28:20.463 |
| fkie_cve-2025-45466 | Unitree Go1 <= Go1_2022_05_11 is vulnerale to Incorrect Access Control due to authentication creden… | 2025-07-25T16:15:33.737 | 2026-01-12T16:26:37.180 |
| fkie_cve-2024-20149 | In Modem, there is a possible system crash due to improper input validation. This could lead to rem… | 2025-01-06T04:15:07.193 | 2026-01-12T16:23:30.287 |
| fkie_cve-2024-20153 | In wlan STA, there is a possible way to trick a client to connect to an AP with spoofed SSID. This … | 2025-01-06T04:15:07.647 | 2026-01-12T16:20:48.680 |
| fkie_cve-2025-63221 | The Axel Technology puma devices (firmware versions 0.8.5 to 1.0.3) are vulnerable to Broken Access… | 2025-11-19T16:15:48.177 | 2026-01-12T16:16:58.780 |
| fkie_cve-2023-4785 | Lack of error handling in the TCP server in Google's gRPC starting version 1.23 on posix-compatible… | 2023-09-13T17:15:10.227 | 2026-01-12T16:16:03.493 |
| fkie_cve-2024-58289 | Microweber 2.0.15 contains a stored cross-site scripting vulnerability that allows authenticated at… | 2025-12-11T22:15:49.557 | 2026-01-12T16:15:36.397 |
| fkie_cve-2025-63243 | A reflected cross-site scripting (XSS) vulnerability exists in the password change functionality of… | 2025-11-19T15:15:50.743 | 2026-01-12T16:12:01.993 |
| fkie_cve-2025-2894 | The Go1 also known as "The World's First Intelligence Bionic Quadruped Robot Companion of Consumer … | 2025-03-28T03:15:18.780 | 2026-01-12T16:10:59.043 |
| fkie_cve-2026-0606 | A vulnerability was detected in code-projects Online Music Site 1.0. Affected by this issue is some… | 2026-01-05T23:15:41.180 | 2026-01-12T16:09:56.360 |
| fkie_cve-2025-63219 | The ITEL ISO FM SFN Adapter (firmware ISO2 2.0.0.0, WebServer 2.0) is vulnerable to session hijacki… | 2025-11-19T15:15:50.600 | 2026-01-12T16:04:30.650 |
| fkie_cve-2025-63218 | The Axel Technology WOLF1MS and WOLF2MS devices (firmware versions 0.8.5 to 1.0.3) are vulnerable t… | 2025-11-19T15:15:50.453 | 2026-01-12T16:01:06.177 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-j3jh-q3x5-x5r6 |
4.7 (3.1)
2.0 (4.0)
|
A vulnerability was identified in CodeAstro Real Estate Management System 1.0. The impacted element… | 2025-12-19T00:31:43Z | 2025-12-19T00:31:43Z |
| ghsa-9wj5-h55f-x58h |
4.7 (3.1)
2.0 (4.0)
|
A security flaw has been discovered in CodeAstro Real Estate Management System 1.0. This affects an… | 2025-12-19T00:31:43Z | 2025-12-19T00:31:43Z |
| ghsa-8jc6-8757-hm2h |
8.3 (3.1)
|
Improper neutralization of input during web page generation ('cross-site scripting') in Azure Cosmo… | 2025-12-19T00:31:43Z | 2025-12-19T00:31:43Z |
| ghsa-4rxh-p69j-7rxg |
6.1 (3.1)
|
Improper neutralization of input during web page generation ('Cross-site Scripting') (CWE-79) allow… | 2025-12-19T00:31:43Z | 2025-12-19T00:31:43Z |
| ghsa-xh25-gx5f-4hqg |
4.3 (3.1)
|
Improper Authorization (CWE-285) in Kibana can lead to privilege escalation (CAPEC-233) by allowing… | 2025-12-19T00:31:42Z | 2025-12-19T00:31:42Z |
| ghsa-x89f-99hf-gmr7 |
7.2 (3.1)
|
Improper neutralization of input during web page generation ('Cross-site Scripting') (CWE-79) allow… | 2025-12-19T00:31:42Z | 2025-12-19T00:31:42Z |
| ghsa-v7q8-5286-xfvf |
4.3 (3.1)
|
Improper Authorization (CWE-285) in Kibana can lead to privilege escalation (CAPEC-233) by allowing… | 2025-12-19T00:31:42Z | 2025-12-19T00:31:42Z |
| ghsa-pqm3-5mc5-3xcm |
6.5 (3.1)
|
Allocation of Resources Without Limits or Throttling (CWE-770) in Kibana can allow a low-privileged… | 2025-12-19T00:31:42Z | 2025-12-19T00:31:42Z |
| ghsa-p5gx-f9rx-95rw |
6.9 (4.0)
|
An authentication bypass vulnerability in Google Cloud Dialogflow CX Messenger allowed unauthentica… | 2025-12-19T00:31:42Z | 2025-12-19T00:31:42Z |
| ghsa-m83f-269m-j6x3 |
10.0 (3.1)
|
Improper authorization in Microsoft Partner Center allows an unauthorized attacker to elevate privi… | 2025-12-19T00:31:42Z | 2025-12-19T00:31:42Z |
| ghsa-gc65-6wv6-qhxp |
10.0 (3.1)
|
Improper control of generation of code ('code injection') in Azure Container Apps allows an unautho… | 2025-12-19T00:31:42Z | 2025-12-19T00:31:42Z |
| ghsa-fqmf-ww2c-42f2 |
8.7 (4.0)
|
Streama versions 1.10.0 through 1.10.5 and prior to commit b7c8767 contain a combination of path tr… | 2025-12-19T00:31:42Z | 2025-12-19T00:31:42Z |
| ghsa-f5q7-q5c3-56h8 |
9.9 (3.1)
|
Custom Question Answering Elevation of Privilege Vulnerability | 2025-12-19T00:31:42Z | 2025-12-19T00:31:42Z |
| ghsa-f3fv-24f6-354v |
6.5 (3.1)
|
Out-of-bounds read (CWE-125) allows an unauthenticated remote attacker to perform a buffer overflow… | 2025-12-19T00:31:42Z | 2025-12-19T00:31:42Z |
| ghsa-9w8v-28f9-xxx3 |
7.2 (3.1)
|
'.../...//' in Microsoft Purview allows an authorized attacker to execute code over a network. | 2025-12-19T00:31:42Z | 2025-12-19T00:31:42Z |
| ghsa-9gqx-7h84-8hg2 |
6.5 (3.1)
|
Improper Bounds Check (CWE-787) in Packetbeat can allow a remote unauthenticated attacker to exploi… | 2025-12-19T00:31:42Z | 2025-12-19T00:31:42Z |
| ghsa-7365-jmqc-qf8w |
3.1 (3.1)
|
Microsoft Edge (Chromium-based) Spoofing Vulnerability | 2025-12-19T00:31:42Z | 2025-12-19T00:31:42Z |
| ghsa-589g-82vw-vxfr |
8.2 (3.1)
|
Improper neutralization of input during web page generation ('cross-site scripting') in Office Out-… | 2025-12-19T00:31:42Z | 2025-12-19T00:31:42Z |
| ghsa-m8m6-q237-vh9r |
5.5 (3.1)
6.7 (4.0)
|
NVClient 5.0 contains a stack buffer overflow vulnerability in the user configuration contact field… | 2025-12-15T21:30:32Z | 2025-12-19T00:31:41Z |
| ghsa-m394-x673-978p |
7.2 (3.1)
8.6 (4.0)
|
Webutler v3.2 contains a remote code execution vulnerability that allows authenticated administrato… | 2025-12-15T21:30:32Z | 2025-12-19T00:31:41Z |
| ghsa-j5m3-4q76-pf42 |
5.4 (3.1)
5.1 (4.0)
|
Perch CMS 3.2 contains a stored cross-site scripting vulnerability that allows authenticated users … | 2025-12-15T21:30:32Z | 2025-12-19T00:31:41Z |
| ghsa-hxpr-5v98-mw59 |
7.5 (3.1)
5.1 (4.0)
|
Xlight FTP Server 3.9.3.6 contains a stack buffer overflow vulnerability in the 'Execute Program' c… | 2025-12-15T21:30:32Z | 2025-12-19T00:31:41Z |
| ghsa-h8hg-357g-gr7f |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net: pktgen: fix access outsid… | 2025-06-18T12:30:33Z | 2025-12-19T00:31:41Z |
| ghsa-h848-297q-7v3g |
7.5 (3.1)
|
An insecure deserialization vulnerability exists in the download.php script of the to3k Twittodon a… | 2025-12-18T21:31:44Z | 2025-12-19T00:31:41Z |
| ghsa-gvhr-6xq2-2p5f |
7.2 (3.1)
8.6 (4.0)
|
Perch CMS 3.2 contains a remote code execution vulnerability that allows authenticated administrato… | 2025-12-15T21:30:32Z | 2025-12-19T00:31:41Z |
| ghsa-c39h-f8c8-g26x |
9.8 (3.1)
6.7 (4.0)
|
GOM Player 2.3.90.5360 contains a buffer overflow vulnerability in the equalizer preset name input … | 2025-12-15T21:30:32Z | 2025-12-19T00:31:41Z |
| ghsa-89cc-v8rr-9h8w |
8.8 (3.1)
8.7 (4.0)
|
Coppermine Gallery 1.6.25 contains a remote code execution vulnerability that allows authenticated … | 2025-12-15T21:30:31Z | 2025-12-19T00:31:41Z |
| ghsa-836w-96v8-44pm |
8.1 (3.1)
9.2 (4.0)
|
ReyeeOS 1.204.1614 contains an unencrypted CWMP communication vulnerability that allows attackers t… | 2025-12-15T21:30:32Z | 2025-12-19T00:31:41Z |
| ghsa-6qxw-x3vc-phrg |
6.4 (3.1)
|
Exim before 4.99.1 allows remote heap corruption that will be further described on 2025-12-18. | 2025-12-14T06:30:23Z | 2025-12-19T00:31:41Z |
| ghsa-6gcc-4rgq-w22g |
5.4 (3.1)
5.1 (4.0)
|
Academy LMS 6.1 contains a file upload vulnerability that allows authenticated users to upload mali… | 2025-12-15T21:30:32Z | 2025-12-19T00:31:41Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2023-52356 | A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a cra… | 2024-01-25T06:02:30.561300Z |
| gsd-2024-23905 | Jenkins Red Hat Dependency Analytics Plugin 0.7.1 and earlier programmatically disables C… | 2024-01-24T06:02:25.289039Z |
| gsd-2024-23937 | The format of the source doesn't require a description, click on the link for more details. | 2024-01-24T06:02:25.286269Z |
| gsd-2024-23914 | The format of the source doesn't require a description, click on the link for more details. | 2024-01-24T06:02:25.280612Z |
| gsd-2024-23879 | A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, where… | 2024-01-24T06:02:25.280285Z |
| gsd-2024-23865 | A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, where… | 2024-01-24T06:02:25.274421Z |
| gsd-2024-23913 | The format of the source doesn't require a description, click on the link for more details. | 2024-01-24T06:02:25.272474Z |
| gsd-2024-23861 | A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, where… | 2024-01-24T06:02:25.269806Z |
| gsd-2024-23934 | The format of the source doesn't require a description, click on the link for more details. | 2024-01-24T06:02:25.266512Z |
| gsd-2024-23883 | A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, where… | 2024-01-24T06:02:25.263853Z |
| gsd-2024-23857 | A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, where… | 2024-01-24T06:02:25.262792Z |
| gsd-2024-23310 | A use-after-free vulnerability exists in the sopen_FAMOS_read functionality of The Biosig… | 2024-01-24T06:02:25.261114Z |
| gsd-2024-23855 | A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, where… | 2024-01-24T06:02:25.257918Z |
| gsd-2024-23904 | Jenkins Log Command Plugin 1.0.2 and earlier does not disable a feature of its command pa… | 2024-01-24T06:02:25.253083Z |
| gsd-2024-23893 | A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, where… | 2024-01-24T06:02:25.248055Z |
| gsd-2024-23876 | A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, where… | 2024-01-24T06:02:25.239543Z |
| gsd-2024-23868 | A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, where… | 2024-01-24T06:02:25.227566Z |
| gsd-2024-23938 | The format of the source doesn't require a description, click on the link for more details. | 2024-01-24T06:02:25.224472Z |
| gsd-2024-23889 | A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, where… | 2024-01-24T06:02:25.222420Z |
| gsd-2024-23929 | The format of the source doesn't require a description, click on the link for more details. | 2024-01-24T06:02:25.216880Z |
| gsd-2024-23935 | The format of the source doesn't require a description, click on the link for more details. | 2024-01-24T06:02:25.213813Z |
| gsd-2024-23873 | A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, where… | 2024-01-24T06:02:25.211058Z |
| gsd-2024-23853 | The format of the source doesn't require a description, click on the link for more details. | 2024-01-24T06:02:25.208958Z |
| gsd-2024-23923 | The format of the source doesn't require a description, click on the link for more details. | 2024-01-24T06:02:25.207295Z |
| gsd-2024-23875 | A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, where… | 2024-01-24T06:02:25.202024Z |
| gsd-2024-23896 | A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, where… | 2024-01-24T06:02:25.199920Z |
| gsd-2024-23872 | A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, where… | 2024-01-24T06:02:25.195123Z |
| gsd-2024-23878 | A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, where… | 2024-01-24T06:02:25.194176Z |
| gsd-2024-23866 | A vulnerability has been reported in Cups Easy (Purchase & Inventory), version 1.0, where… | 2024-01-24T06:02:25.189966Z |
| gsd-2024-23852 | The format of the source doesn't require a description, click on the link for more details. | 2024-01-24T06:02:25.188364Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-181560 | Malicious code in roti50 (npm) | 2025-11-12T21:45:37Z | 2025-11-12T21:45:37Z |
| mal-2025-181559 | Malicious code in roti5 (npm) | 2025-11-12T21:45:37Z | 2025-11-12T21:45:37Z |
| mal-2025-181558 | Malicious code in roti49 (npm) | 2025-11-12T21:45:37Z | 2025-11-12T21:45:37Z |
| mal-2025-181557 | Malicious code in roti48 (npm) | 2025-11-12T21:45:37Z | 2025-11-12T21:45:37Z |
| mal-2025-181556 | Malicious code in roti47 (npm) | 2025-11-12T21:45:37Z | 2025-11-12T21:45:37Z |
| mal-2025-181555 | Malicious code in roti46 (npm) | 2025-11-12T21:45:37Z | 2025-11-12T21:45:37Z |
| mal-2025-181554 | Malicious code in roti45 (npm) | 2025-11-12T21:45:37Z | 2025-11-12T21:45:37Z |
| mal-2025-181553 | Malicious code in roti44 (npm) | 2025-11-12T21:45:37Z | 2025-11-12T21:45:37Z |
| mal-2025-181552 | Malicious code in roti43 (npm) | 2025-11-12T21:45:37Z | 2025-11-12T21:45:37Z |
| mal-2025-181551 | Malicious code in roti42 (npm) | 2025-11-12T21:45:37Z | 2025-11-12T21:45:37Z |
| mal-2025-181550 | Malicious code in roti41 (npm) | 2025-11-12T21:45:37Z | 2025-11-12T21:45:37Z |
| mal-2025-181549 | Malicious code in roti40 (npm) | 2025-11-12T21:45:37Z | 2025-11-12T21:45:37Z |
| mal-2025-181548 | Malicious code in roti4 (npm) | 2025-11-12T21:45:37Z | 2025-11-12T21:45:37Z |
| mal-2025-181547 | Malicious code in roti39 (npm) | 2025-11-12T21:45:37Z | 2025-11-12T21:45:37Z |
| mal-2025-181546 | Malicious code in roti38 (npm) | 2025-11-12T21:45:37Z | 2025-11-12T21:45:37Z |
| mal-2025-181545 | Malicious code in roti37 (npm) | 2025-11-12T21:45:37Z | 2025-11-12T21:45:37Z |
| mal-2025-181544 | Malicious code in roti36 (npm) | 2025-11-12T21:45:37Z | 2025-11-12T21:45:37Z |
| mal-2025-181543 | Malicious code in roti35 (npm) | 2025-11-12T21:45:37Z | 2025-11-12T21:45:37Z |
| mal-2025-181542 | Malicious code in roti34 (npm) | 2025-11-12T21:45:37Z | 2025-11-12T21:45:37Z |
| mal-2025-181541 | Malicious code in roti33 (npm) | 2025-11-12T21:45:37Z | 2025-11-12T21:45:37Z |
| mal-2025-181540 | Malicious code in roti32 (npm) | 2025-11-12T21:45:37Z | 2025-11-12T21:45:37Z |
| mal-2025-181539 | Malicious code in roti31 (npm) | 2025-11-12T21:45:37Z | 2025-11-12T21:45:37Z |
| mal-2025-181538 | Malicious code in roti30 (npm) | 2025-11-12T21:45:37Z | 2025-11-12T21:45:37Z |
| mal-2025-181537 | Malicious code in roti3 (npm) | 2025-11-12T21:45:37Z | 2025-11-12T21:45:37Z |
| mal-2025-181536 | Malicious code in roti29 (npm) | 2025-11-12T21:45:37Z | 2025-11-12T21:45:37Z |
| mal-2025-181535 | Malicious code in roti28 (npm) | 2025-11-12T21:45:37Z | 2025-11-12T21:45:37Z |
| mal-2025-181534 | Malicious code in roti27 (npm) | 2025-11-12T21:45:37Z | 2025-11-12T21:45:37Z |
| mal-2025-181533 | Malicious code in roti26 (npm) | 2025-11-12T21:45:37Z | 2025-11-12T21:45:37Z |
| mal-2025-181532 | Malicious code in roti25 (npm) | 2025-11-12T21:45:37Z | 2025-11-12T21:45:37Z |
| mal-2025-181531 | Malicious code in roti24 (npm) | 2025-11-12T21:45:37Z | 2025-11-12T21:45:37Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2021:4382 | Red Hat Security Advisory: json-c security and bug fix update | 2021-11-09T17:31:39+00:00 | 2025-11-21T18:26:29+00:00 |
| rhsa-2021:4374 | Red Hat Security Advisory: file security update | 2021-11-09T18:13:37+00:00 | 2025-11-21T18:26:28+00:00 |
| rhsa-2021:4361 | Red Hat Security Advisory: NetworkManager security, bug fix, and enhancement update | 2021-11-09T18:13:36+00:00 | 2025-11-21T18:26:27+00:00 |
| rhsa-2021:4339 | Red Hat Security Advisory: grilo security update | 2021-11-09T18:32:48+00:00 | 2025-11-21T18:26:26+00:00 |
| rhsa-2021:4325 | Red Hat Security Advisory: lasso security and enhancement update | 2021-11-09T18:12:42+00:00 | 2025-11-21T18:26:26+00:00 |
| rhsa-2021:4324 | Red Hat Security Advisory: python-psutil security update | 2021-11-09T17:57:23+00:00 | 2025-11-21T18:26:26+00:00 |
| rhsa-2021:4321 | Red Hat Security Advisory: linuxptp security, bug fix, and enhancement update | 2021-11-09T17:52:05+00:00 | 2025-11-21T18:26:26+00:00 |
| rhsa-2021:4319 | Red Hat Security Advisory: compat-exiv2-026 security update | 2021-11-09T18:31:58+00:00 | 2025-11-21T18:26:26+00:00 |
| rhsa-2021:4316 | Red Hat Security Advisory: zziplib security update | 2021-11-09T18:23:56+00:00 | 2025-11-21T18:26:24+00:00 |
| rhsa-2021:4315 | Red Hat Security Advisory: spamassassin security update | 2021-11-09T18:26:12+00:00 | 2025-11-21T18:26:24+00:00 |
| rhsa-2021:4292 | Red Hat Security Advisory: squid:4 security, bug fix, and enhancement update | 2021-11-09T17:37:45+00:00 | 2025-11-21T18:26:24+00:00 |
| rhsa-2021:4288 | Red Hat Security Advisory: libjpeg-turbo security and bug fix update | 2021-11-09T17:48:14+00:00 | 2025-11-21T18:26:24+00:00 |
| rhsa-2021:4270 | Red Hat Security Advisory: rust-toolset:rhel8 security, bug fix, and enhancement update | 2021-11-09T17:37:27+00:00 | 2025-11-21T18:26:23+00:00 |
| rhsa-2021:4257 | Red Hat Security Advisory: httpd:2.4 security, bug fix, and enhancement update | 2021-11-09T17:26:41+00:00 | 2025-11-21T18:26:23+00:00 |
| rhsa-2021:4256 | Red Hat Security Advisory: graphviz security update | 2021-11-09T17:35:02+00:00 | 2025-11-21T18:26:23+00:00 |
| rhsa-2021:4241 | Red Hat Security Advisory: libtiff security and bug fix update | 2021-11-09T17:36:56+00:00 | 2025-11-21T18:26:22+00:00 |
| rhsa-2021:4236 | Red Hat Security Advisory: tcpdump security and bug fix update | 2021-11-09T18:45:55+00:00 | 2025-11-21T18:26:22+00:00 |
| rhsa-2021:4235 | Red Hat Security Advisory: jasper security update | 2021-11-09T18:46:05+00:00 | 2025-11-21T18:26:21+00:00 |
| rhsa-2021:4231 | Red Hat Security Advisory: libwebp security update | 2021-11-09T18:44:17+00:00 | 2025-11-21T18:26:20+00:00 |
| rhsa-2021:4222 | Red Hat Security Advisory: container-tools:3.0 security and bug fix update | 2021-11-09T18:42:48+00:00 | 2025-11-21T18:26:20+00:00 |
| rhsa-2021:4221 | Red Hat Security Advisory: container-tools:2.0 security update | 2021-11-09T18:43:38+00:00 | 2025-11-21T18:26:18+00:00 |
| rhsa-2021:4201 | Red Hat Security Advisory: babel security and bug fix update | 2021-11-09T18:35:26+00:00 | 2025-11-21T18:26:17+00:00 |
| rhsa-2021:4173 | Red Hat Security Advisory: exiv2 security, bug fix, and enhancement update | 2021-11-09T18:14:35+00:00 | 2025-11-21T18:26:17+00:00 |
| rhsa-2021:4191 | Red Hat Security Advisory: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update | 2021-11-09T18:27:17+00:00 | 2025-11-21T18:26:16+00:00 |
| rhsa-2021:4181 | Red Hat Security Advisory: mutt security, bug fix, and enhancement update | 2021-11-09T18:10:01+00:00 | 2025-11-21T18:26:16+00:00 |
| rhsa-2021:4179 | Red Hat Security Advisory: file-roller security update | 2021-11-09T18:30:11+00:00 | 2025-11-21T18:26:15+00:00 |
| rhsa-2021:4172 | Red Hat Security Advisory: qt5 security, bug fix, and enhancement update | 2021-11-09T18:32:45+00:00 | 2025-11-21T18:26:15+00:00 |
| rhsa-2021:4161 | Red Hat Security Advisory: python-jinja2 security update | 2021-11-09T18:22:34+00:00 | 2025-11-21T18:26:14+00:00 |
| rhsa-2021:4150 | Red Hat Security Advisory: python36:3.6 security and bug fix update | 2021-11-09T17:44:21+00:00 | 2025-11-21T18:26:11+00:00 |
| rhsa-2021:4149 | Red Hat Security Advisory: python-pillow security update | 2021-11-09T17:42:23+00:00 | 2025-11-21T18:26:10+00:00 |
| ID | Description | Updated |
|---|---|---|
| var-201601-0434 | Memory leak in Huawei eSpace 8950 IP phones with software before V200R003C00SPC300 allows… | 2025-04-12T23:12:58.505000Z |
| var-201602-0046 | Cross-site scripting (XSS) vulnerability in Cisco Application Policy Infrastructure Contr… | 2025-04-12T23:12:57.975000Z |
| var-201605-0207 | Buffer overflow in the Wi-Fi driver in Huawei Mate 8 NXT-AL before NXT-AL10C00B182, NXT-C… | 2025-04-12T23:12:52.064000Z |
| var-201605-0208 | Buffer overflow in the Wi-Fi driver in Huawei Mate 8 NXT-AL before NXT-AL10C00B182, NXT-C… | 2025-04-12T23:12:52.029000Z |
| var-201606-0245 | KMC Controls BAC-5051E devices with firmware before E0.2.0.2 allow remote attackers to by… | 2025-04-12T23:12:51.248000Z |
| var-201606-0244 | Cross-site request forgery (CSRF) vulnerability on KMC Controls BAC-5051E devices with fi… | 2025-04-12T23:12:51.213000Z |
| var-201606-0287 | Cisco AsyncOS 9.7.0-125 on Email Security Appliance (ESA) devices allows remote attackers… | 2025-04-12T23:12:51.150000Z |
| var-201608-0034 | Buffer overflow in the Wi-Fi driver in Huawei P8 smartphones with software before GRA-CL0… | 2025-04-12T23:12:50.546000Z |
| var-201502-0202 | Stack-based buffer overflow in the DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.… | 2025-04-12T23:12:39.252000Z |
| var-202410-2652 | DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction… | 2025-04-12T23:12:30.393000Z |
| var-201404-0049 | The router advertisement daemon (radvd) before 1.8.2 does not properly handle errors in t… | 2025-04-12T23:09:32.600000Z |
| var-201408-0145 | The Pilot Below Deck Equipment (BDE) and OpenPort implementations on Iridium satellite te… | 2025-04-12T23:09:22.044000Z |
| var-201408-0146 | The Terminal Upgrade Tool in the Pilot Below Deck Equipment (BDE) and OpenPort implementa… | 2025-04-12T23:09:22.010000Z |
| var-201410-0065 | Cisco IOS XE enables the IPv6 Routing Protocol for Low-Power and Lossy Networks (aka RPL)… | 2025-04-12T23:09:21.282000Z |
| var-201412-0306 | The API in the Guest Server in Cisco Jabber, when the HTML5 CORS feature is used, allows … | 2025-04-12T23:09:18.121000Z |
| var-201412-0350 | The IBM WebSphere DataPower XC10 appliance 2.1 and 2.5 before FP4 allows remote authentic… | 2025-04-12T23:09:18.090000Z |
| var-201412-0559 | Buffer overflow in an ActiveX control in MDraw30.ocx in Schneider Electric ProClima befor… | 2025-04-12T23:09:14.029000Z |
| var-201412-0558 | Buffer overflow in an ActiveX control in Atx45.ocx in Schneider Electric ProClima before … | 2025-04-12T23:09:13.985000Z |
| var-201412-0557 | Buffer overflow in an ActiveX control in Atx45.ocx in Schneider Electric ProClima before … | 2025-04-12T23:09:13.893000Z |
| var-201503-0009 | Siemens SPC controllers SPC4000, SPC5000, and SPC6000 before 3.6.0 allow remote attackers… | 2025-04-12T23:09:10.308000Z |
| var-201506-0245 | The anti-spam scanner on Cisco Email Security Appliance (ESA) devices 3.3.1-09, 7.5.1-gpl… | 2025-04-12T23:09:07.505000Z |
| var-201508-0306 | Cross-site scripting (XSS) vulnerability in Softing FG-100 PROFIBUS Single Channel (FG-10… | 2025-04-12T23:09:03.046000Z |
| var-201508-0497 | Cisco Prime Infrastructure (PI) 1.4(0.45) and earlier, when AAA authentication is used, a… | 2025-04-12T23:09:02.736000Z |
| var-201508-0602 | Sierra Wireless ALEOS before 4.4.2 on AirLink ES, GX, and LS devices has hardcoded root a… | 2025-04-12T23:09:02.495000Z |
| var-201511-0214 | Multiple cross-site scripting (XSS) vulnerabilities in the web framework in Cisco FireSIG… | 2025-04-12T23:08:59.767000Z |
| var-201512-0010 | LOYTEC LIP-3ECTB 6.0.1, LINX-100, LVIS-3E100, and LIP-ME201 devices allow remote attacker… | 2025-04-12T23:08:59.574000Z |
| var-201512-0074 | The web management interface on Belkin F9K1102 2 devices with firmware 2.10.17 has a blan… | 2025-04-12T23:08:59.541000Z |
| var-201512-0073 | Belkin F9K1102 2 devices with firmware 2.10.17 use an improper algorithm for selecting th… | 2025-04-12T23:08:59.510000Z |
| var-201512-0076 | Cross-site request forgery (CSRF) vulnerability on Belkin F9K1102 2 devices with firmware… | 2025-04-12T23:08:59.476000Z |
| var-201512-0075 | Belkin F9K1102 2 devices with firmware 2.10.17 rely on client-side JavaScript code for au… | 2025-04-12T23:08:59.444000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2019:0655-1 | Security update for libssh2_org | 2019-03-20T09:31:34Z | 2019-03-20T09:31:34Z |
| suse-su-2019:0654-1 | Security update for openwsman | 2019-03-20T09:29:19Z | 2019-03-20T09:29:19Z |
| suse-su-2019:0645-1 | Security update for the Linux Kernel (Live Patch 34 for SLE 12) | 2019-03-19T14:34:19Z | 2019-03-19T14:34:19Z |
| suse-su-2019:0643-1 | Security update for lftp | 2019-03-19T14:14:58Z | 2019-03-19T14:14:58Z |
| suse-su-2019:0642-1 | Security update for lftp | 2019-03-19T13:28:13Z | 2019-03-19T13:28:13Z |
| suse-su-2019:0639-1 | Security update for ldb | 2019-03-19T12:06:26Z | 2019-03-19T12:06:26Z |
| suse-su-2019:13982-1 | Security update for libssh2_org | 2019-03-19T10:42:39Z | 2019-03-19T10:42:39Z |
| suse-su-2019:0636-1 | Security update for nodejs10 | 2019-03-19T08:16:25Z | 2019-03-19T08:16:25Z |
| suse-su-2019:0635-1 | Security update for nodejs8 | 2019-03-19T08:15:58Z | 2019-03-19T08:15:58Z |
| suse-su-2019:13981-1 | Security update for openwsman | 2019-03-18T10:44:47Z | 2019-03-18T10:44:47Z |
| suse-su-2019:0629-1 | Security update for yast2-rmt | 2019-03-18T10:20:42Z | 2019-03-18T10:20:42Z |
| suse-su-2019:0628-1 | Security update for galera-3, mariadb, mariadb-connector-c | 2019-03-18T10:19:44Z | 2019-03-18T10:19:44Z |
| suse-su-2019:0627-1 | Security update for nodejs10 | 2019-03-18T10:17:56Z | 2019-03-18T10:17:56Z |
| suse-su-2019:0619-1 | Security update for wireshark | 2019-03-15T14:38:43Z | 2019-03-15T14:38:43Z |
| suse-su-2019:13979-1 | Security update for the Linux Kernel | 2019-03-15T13:49:28Z | 2019-03-15T13:49:28Z |
| suse-su-2019:0617-1 | Security update for java-1_8_0-ibm | 2019-03-15T12:14:42Z | 2019-03-15T12:14:42Z |
| suse-su-2019:13978-1 | Security update for java-1_7_1-ibm | 2019-03-14T09:38:52Z | 2019-03-14T09:38:52Z |
| suse-su-2019:0609-1 | Security update for mariadb | 2019-03-13T17:48:13Z | 2019-03-13T17:48:13Z |
| suse-su-2019:0604-1 | Security update for java-1_7_1-ibm | 2019-03-13T09:45:05Z | 2019-03-13T09:45:05Z |
| suse-su-2019:0603-1 | Security update for python-azure-agent | 2019-03-13T09:08:38Z | 2019-03-13T09:08:38Z |
| suse-su-2019:13977-1 | Security update for python-numpy | 2019-03-12T17:41:20Z | 2019-03-12T17:41:20Z |
| suse-su-2019:13976-1 | Security update for supportutils | 2019-03-12T17:40:58Z | 2019-03-12T17:40:58Z |
| suse-su-2019:0600-1 | Security update for openssl-1_0_0 | 2019-03-12T17:40:27Z | 2019-03-12T17:40:27Z |
| suse-su-2019:13975-1 | Security update for java-1_7_0-ibm | 2019-03-12T17:39:36Z | 2019-03-12T17:39:36Z |
| suse-su-2019:0586-1 | Security update for ceph | 2019-03-12T12:00:39Z | 2019-03-12T12:00:39Z |
| suse-su-2019:0585-1 | Security update for java-1_8_0-ibm | 2019-03-12T11:59:13Z | 2019-03-12T11:59:13Z |
| suse-su-2019:0582-1 | Security update for qemu | 2019-03-11T17:34:20Z | 2019-03-11T17:34:20Z |
| suse-su-2019:0581-1 | Security update for ovmf | 2019-03-11T12:57:45Z | 2019-03-11T12:57:45Z |
| suse-su-2019:0580-1 | Security update for ovmf | 2019-03-11T12:06:24Z | 2019-03-11T12:06:24Z |
| suse-su-2019:0579-1 | Security update for ovmf | 2019-03-11T12:06:05Z | 2019-03-11T12:06:05Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2024-26464 | WordPress Hide My WP Ghost plugin访问控制错误漏洞 | 2024-06-07 | 2024-06-07 |
| cnvd-2024-26463 | WordPress Captcha/Honeypot for Contact Form plugin访问控制错误漏洞 | 2024-06-07 | 2024-06-07 |
| cnvd-2024-26462 | WordPress Captcha Code plugin访问控制错误漏洞 | 2024-06-07 | 2024-06-07 |
| cnvd-2024-26461 | WordPress Brave Popup Builder plugin跨站脚本漏洞 | 2024-06-07 | 2024-06-07 |
| cnvd-2024-26460 | WordPress Weaver Xtreme Theme Support plugin跨站脚本漏洞(CNVD-2024-26460) | 2024-06-07 | 2024-06-07 |
| cnvd-2024-26459 | WordPress Responsive Addons plugin跨站脚本漏洞 | 2024-06-07 | 2024-06-07 |
| cnvd-2024-26458 | WordPress GP Premium plugin跨站脚本漏洞 | 2024-06-07 | 2024-06-07 |
| cnvd-2024-26457 | WordPress Boostify Header Footer Builder for Elementor plugin跨站脚本漏洞 | 2024-06-07 | 2024-06-07 |
| cnvd-2024-26373 | Online Student Enrollment System SQL注入漏洞 | 2024-05-28 | 2024-06-07 |
| cnvd-2024-26372 | Online Student Enrollment System SQL注入漏洞(CNVD-2024-26372) | 2024-05-28 | 2024-06-07 |
| cnvd-2024-26371 | Online Student Enrollment System SQL注入漏洞(CNVD-2024-26371) | 2024-05-28 | 2024-06-07 |
| cnvd-2024-26368 | Online Student Enrollment System SQL注入漏洞(CNVD-2024-26368) | 2024-05-28 | 2024-06-07 |
| cnvd-2024-26367 | Online Student Enrollment System SQL注入漏洞(CNVD-2024-26367) | 2024-05-28 | 2024-06-07 |
| cnvd-2024-26366 | Online Student Enrollment System SQL注入漏洞(CNVD-2024-26366) | 2024-05-28 | 2024-06-07 |
| cnvd-2024-26110 | Mattermost Server拒绝服务漏洞(CNVD-2024-26110) | 2024-03-15 | 2024-06-07 |
| cnvd-2024-26109 | Mattermost Mobile不受控制的资源消耗漏洞 | 2024-03-15 | 2024-06-07 |
| cnvd-2024-26108 | Mattermost Server未控制的资源消耗漏洞 | 2024-04-29 | 2024-06-07 |
| cnvd-2024-26107 | Mattermost Server访问控制错误漏洞(CNVD-2024-26107) | 2024-05-28 | 2024-06-07 |
| cnvd-2024-26106 | Mattermost Server访问控制错误漏洞(CNVD-2024-26106) | 2024-05-28 | 2024-06-07 |
| cnvd-2024-26105 | Mattermost Server访问控制错误漏洞(CNVD-2024-26105) | 2024-05-28 | 2024-06-07 |
| cnvd-2024-26104 | Mattermost Server安全绕过漏洞 | 2024-05-28 | 2024-06-07 |
| cnvd-2024-26103 | Mattermost Server访问控制错误漏洞(CNVD-2024-26103) | 2024-05-28 | 2024-06-07 |
| cnvd-2024-26102 | Mattermost Server访问控制错误漏洞(CNVD-2024-26102) | 2024-05-28 | 2024-06-07 |
| cnvd-2024-26101 | AJ-Report服务器端请求伪造漏洞 | 2023-03-07 | 2024-06-07 |
| cnvd-2024-26100 | AJ-Report 信息泄露漏洞 | 2024-05-28 | 2024-06-07 |
| cnvd-2024-24105 | 北京亚控科技发展有限公司KingH5Stream存在未授权访问漏洞 | 2024-04-23 | 2024-06-07 |
| cnvd-2024-26506 | Fortinet FortiNAC访问控制错误漏洞(CNVD-2024-26506) | 2023-02-20 | 2024-06-06 |
| cnvd-2024-26334 | Tenda FH1202 formQuickIndex方法缓冲区溢出漏洞 | 2024-03-29 | 2024-06-06 |
| cnvd-2024-26333 | Tenda F1203 setSchedWifi方法缓冲区溢出漏洞 | 2024-03-29 | 2024-06-06 |
| cnvd-2024-26332 | Tenda F1203 R7WebsSecurityHandler方法缓冲区溢出漏洞 | 2024-03-29 | 2024-06-06 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2007-avi-028 | Vulnérabilité dans Cisco Unified Contact Center | 2007-01-12T00:00:00.000000 | 2007-01-12T00:00:00.000000 |
| certa-2007-avi-027 | Vulnérabilité dans Cisco IOS | 2007-01-12T00:00:00.000000 | 2007-01-12T00:00:00.000000 |
| certa-2007-avi-026 | Multiples vulnérabilités dans VMware | 2007-01-11T00:00:00.000000 | 2007-01-11T00:00:00.000000 |
| certa-2007-avi-023 | Vulnérabilité de PacketShaper | 2007-01-10T00:00:00.000000 | 2007-01-10T00:00:00.000000 |
| certa-2007-avi-022 | Vulnérabilité dans ColdFusion | 2007-01-10T00:00:00.000000 | 2007-01-10T00:00:00.000000 |
| certa-2007-avi-021 | Vulnérabilité de RPC de Solaris | 2007-01-10T00:00:00.000000 | 2007-01-10T00:00:00.000000 |
| certa-2007-avi-019 | Vulnérabilités dans Kerberos | 2007-01-10T00:00:00.000000 | 2007-01-10T00:00:00.000000 |
| certa-2007-avi-016 | Multiples vulnérabilités de Microsoft Excel | 2007-01-10T00:00:00.000000 | 2007-01-10T00:00:00.000000 |
| certa-2007-avi-015 | Vulnérabilité de Microsoft Office 2003 | 2007-01-10T00:00:00.000000 | 2007-01-10T00:00:00.000000 |
| certa-2007-avi-018 | Vulnérabilité VML du système Microsoft Windows | 2007-01-09T00:00:00.000000 | 2007-01-09T00:00:00.000000 |
| certa-2007-avi-017 | Vulnérabilités de Microsoft Outlook | 2007-01-09T00:00:00.000000 | 2007-01-09T00:00:00.000000 |
| certa-2007-avi-014 | Vulnérabilités de AIX | 2007-01-09T00:00:00.000000 | 2007-01-09T00:00:00.000000 |
| certa-2007-avi-012 | Multiples vulnérabilités de Cisco secure ACS | 2007-01-08T00:00:00.000000 | 2007-01-08T00:00:00.000000 |
| certa-2007-avi-011 | Multiples vulnérabilités dans Drupal | 2007-01-08T00:00:00.000000 | 2007-01-08T00:00:00.000000 |
| certa-2007-avi-010 | Vulnérabilités dans WordPress | 2007-01-08T00:00:00.000000 | 2007-01-08T00:00:00.000000 |
| certa-2007-avi-009 | Vulnérabilité de l'antivirus Kaspersky | 2007-01-08T00:00:00.000000 | 2007-01-08T00:00:00.000000 |
| certa-2007-avi-008 | Vulnérabilité de Eudora Mail Server | 2007-01-08T00:00:00.000000 | 2007-01-08T00:00:00.000000 |
| certa-2007-avi-007 | Vulnérabilité dans Novell Client | 2007-01-08T00:00:00.000000 | 2007-01-08T00:00:00.000000 |
| certa-2007-avi-006 | Vulnérabilité dans OpenBSD | 2007-01-05T00:00:00.000000 | 2007-01-05T00:00:00.000000 |
| certa-2007-avi-005 | Vulnérabilité dans OpenOffice.org | 2007-01-05T00:00:00.000000 | 2007-01-05T00:00:00.000000 |
| certa-2007-avi-004 | Vulnérabilités dans Cisco Clean Access | 2007-01-04T00:00:00.000000 | 2007-01-04T00:00:00.000000 |
| certa-2007-avi-003 | Multiples vulnérabilités du greffon Adobe Acrobat Reader | 2007-01-04T00:00:00.000000 | 2007-01-04T00:00:00.000000 |
| certa-2006-avi-571 | Multiples vulnérabilités sous Novell NetMail | 2006-12-26T00:00:00.000000 | 2006-12-26T00:00:00.000000 |
| certa-2006-avi-570 | Multiples vulnérabilités dans le JRE Java de Sun | 2006-12-22T00:00:00.000000 | 2006-12-22T00:00:00.000000 |
| certa-2006-avi-569 | Vulnérabilité MacOS X Quicktime et Quartz | 2006-12-21T00:00:00.000000 | 2006-12-21T00:00:00.000000 |
| certa-2006-avi-567 | Vulnérabilité dans Computer Associates CleverPath | 2006-12-21T00:00:00.000000 | 2006-12-21T00:00:00.000000 |
| certa-2006-avi-566 | Vulnérabilités dans MailEnable | 2006-12-21T00:00:00.000000 | 2006-12-21T00:00:00.000000 |
| certa-2006-avi-565 | Vulnérabilité dans Typo3 | 2006-12-21T00:00:00.000000 | 2006-12-21T00:00:00.000000 |
| certa-2006-avi-488 | Vulnériabilités dans la bibliothèque imlib2 | 2006-11-09T00:00:00.000000 | 2006-12-21T00:00:00.000000 |
| certa-2006-avi-561 | Vulnérabilité de ProFTPd | 2006-12-18T00:00:00.000000 | 2006-12-20T00:00:00.000000 |