Recent vulnerabilities
| ID | Description | Published | Updated |
|---|---|---|---|
| ghsa-99xh-3c2q-rwgv | In the Linux kernel, the following vulnerability has been resolved: drm/fbdev-generic: prohibit po… | 2025-12-24T15:30:38Z | 2025-12-24T15:30:38Z |
| ghsa-8482-4rvj-5h62 | In the Linux kernel, the following vulnerability has been resolved: btrfs: fix incorrect splitting… | 2025-12-24T15:30:38Z | 2025-12-24T15:30:38Z |
| ghsa-74cv-3gqc-87fm | In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: Add check for cst… | 2025-12-24T15:30:38Z | 2025-12-24T15:30:38Z |
| ghsa-732j-jg49-j2pr | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix race condition … | 2025-12-24T15:30:38Z | 2025-12-24T15:30:38Z |
| ghsa-7223-2xhw-36wm | In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Return error for inc… | 2025-12-24T15:30:38Z | 2025-12-24T15:30:38Z |
| ghsa-4mrm-9mrj-crwx | In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: dropping parent re… | 2025-12-24T15:30:38Z | 2025-12-24T15:30:38Z |
| ghsa-2f8x-cwx7-q35r | In the Linux kernel, the following vulnerability has been resolved: kcm: Fix memory leak in error … | 2025-12-24T15:30:38Z | 2025-12-24T15:30:38Z |
| ghsa-2c4h-2ghg-m6fj | In the Linux kernel, the following vulnerability has been resolved: net/mlx5: fix potential memory… | 2025-12-24T15:30:38Z | 2025-12-24T15:30:38Z |
| ghsa-x4pm-f62g-mp4x | In the Linux kernel, the following vulnerability has been resolved: xen: speed up grant-table recl… | 2025-12-24T15:30:37Z | 2025-12-24T15:30:37Z |
| ghsa-w3g9-f95x-pwmf | In the Linux kernel, the following vulnerability has been resolved: media: mtk-jpeg: Fix use after… | 2025-12-24T15:30:37Z | 2025-12-24T15:30:38Z |
| ghsa-vwq3-xpg9-vpx4 | In the Linux kernel, the following vulnerability has been resolved: fs: Protect reconfiguration of… | 2025-12-24T15:30:37Z | 2025-12-24T15:30:37Z |
| ghsa-vqg2-rjjw-jc84 | In the Linux kernel, the following vulnerability has been resolved: scsi: qedi: Fix use after free… | 2025-12-24T15:30:37Z | 2025-12-24T15:30:37Z |
| ghsa-vmmw-67m5-v7rp | In the Linux kernel, the following vulnerability has been resolved: btrfs: zoned: skip splitting a… | 2025-12-24T15:30:37Z | 2025-12-24T15:30:37Z |
| ghsa-vfv6-vxgw-2mv8 | In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: hold queue_lock wh… | 2025-12-24T15:30:37Z | 2025-12-24T15:30:37Z |
| ghsa-vfj6-525r-34p4 | In the Linux kernel, the following vulnerability has been resolved: ixgbe: Fix panic during XDP_TX… | 2025-12-24T15:30:37Z | 2025-12-24T15:30:37Z |
| ghsa-v2v9-hx36-32x2 | In the Linux kernel, the following vulnerability has been resolved: virtio_pmem: add the missing R… | 2025-12-24T15:30:37Z | 2025-12-24T15:30:37Z |
| ghsa-qr7q-qr63-44c5 | In the Linux kernel, the following vulnerability has been resolved: soundwire: fix enumeration com… | 2025-12-24T15:30:37Z | 2025-12-24T15:30:37Z |
| ghsa-qhvp-r58q-c426 | In the Linux kernel, the following vulnerability has been resolved: regulator: stm32-pwr: fix of_i… | 2025-12-24T15:30:37Z | 2025-12-24T15:30:37Z |
| ghsa-mr7q-47cq-r2xm | In the Linux kernel, the following vulnerability has been resolved: phy: tegra: xusb: Clear the dr… | 2025-12-24T15:30:37Z | 2025-12-24T15:30:37Z |
| ghsa-hpjg-jc89-xqgf | In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Prevent lpfc_debug… | 2025-12-24T15:30:37Z | 2025-12-24T15:30:37Z |
| ghsa-h3h4-ggmf-jjqx | In the Linux kernel, the following vulnerability has been resolved: ALSA: firewire-digi00x: preven… | 2025-12-24T15:30:37Z | 2025-12-24T15:30:37Z |
| ghsa-h228-354g-ppq4 | In the Linux kernel, the following vulnerability has been resolved: drm/client: Fix memory leak in… | 2025-12-24T15:30:37Z | 2025-12-24T15:30:37Z |
| ghsa-gmfg-4jjj-q47r | In the Linux kernel, the following vulnerability has been resolved: power: supply: bq27xxx: Fix po… | 2025-12-24T15:30:37Z | 2025-12-24T15:30:37Z |
| ghsa-ggff-5vp9-rcr3 | In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix null-ptr-deref in… | 2025-12-24T15:30:37Z | 2025-12-24T15:30:37Z |
| ghsa-gg3g-2q75-6v65 | In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Fix memory leak if n… | 2025-12-24T15:30:37Z | 2025-12-24T15:30:37Z |
| ghsa-g59x-v7cp-wpr9 | In the Linux kernel, the following vulnerability has been resolved: KVM: s390: pv: fix index value… | 2025-12-24T15:30:37Z | 2025-12-24T15:30:37Z |
| ghsa-fm2q-hj9m-hx9r | In the Linux kernel, the following vulnerability has been resolved: smb: client: fix missed ses re… | 2025-12-24T15:30:37Z | 2025-12-24T15:30:37Z |
| ghsa-9w7w-3xjc-3wgw | In the Linux kernel, the following vulnerability has been resolved: ubi: Fix possible null-ptr-der… | 2025-12-24T15:30:37Z | 2025-12-24T15:30:37Z |
| ghsa-92ww-qwf4-vf35 | In the Linux kernel, the following vulnerability has been resolved: driver: soc: xilinx: use _safe… | 2025-12-24T15:30:37Z | 2025-12-24T15:30:37Z |
| ghsa-73pg-78qv-48m9 | In the Linux kernel, the following vulnerability has been resolved: bpf: Add preempt_count_{sub,ad… | 2025-12-24T15:30:37Z | 2025-12-24T15:30:37Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2023-54081 | N/A | xen: speed up grant-table reclaim |
Linux |
Linux |
2025-12-24T13:06:13.316Z | 2025-12-24T13:06:13.316Z |
| cve-2023-54080 | N/A | btrfs: zoned: skip splitting and logical rewriting on … |
Linux |
Linux |
2025-12-24T13:06:12.625Z | 2025-12-24T13:06:12.625Z |
| cve-2023-54079 | N/A | power: supply: bq27xxx: Fix poll_interval handling and… |
Linux |
Linux |
2025-12-24T13:06:11.956Z | 2025-12-24T13:06:11.956Z |
| cve-2023-54078 | N/A | media: max9286: Free control handler |
Linux |
Linux |
2025-12-24T13:06:11.282Z | 2025-12-24T13:06:11.282Z |
| cve-2022-50783 | N/A | mptcp: use proper req destructor for IPv6 |
Linux |
Linux |
2025-12-24T13:06:10.602Z | 2025-12-24T13:06:10.602Z |
| cve-2022-50782 | N/A | ext4: fix bug_on in __es_tree_search caused by bad quo… |
Linux |
Linux |
2025-12-24T13:06:09.914Z | 2025-12-24T13:06:09.914Z |
| cve-2022-50781 | N/A | amdgpu/pm: prevent array underflow in vega20_odn_edit_… |
Linux |
Linux |
2025-12-24T13:06:09.238Z | 2025-12-24T13:06:09.238Z |
| cve-2022-50780 | N/A | net: fix UAF issue in nfqnl_nf_hook_drop() when ops_in… |
Linux |
Linux |
2025-12-24T13:06:08.552Z | 2025-12-24T13:06:08.552Z |
| cve-2022-50779 | N/A | orangefs: Fix kmemleak in orangefs_prepare_debugfs_hel… |
Linux |
Linux |
2025-12-24T13:06:07.873Z | 2025-12-24T13:06:07.873Z |
| cve-2022-50778 | N/A | fortify: Fix __compiletime_strlen() under UBSAN_BOUNDS_LOCAL |
Linux |
Linux |
2025-12-24T13:06:07.182Z | 2025-12-24T13:06:07.182Z |
| cve-2022-50777 | N/A | net: phy: xgmiitorgmii: Fix refcount leak in xgmiitorg… |
Linux |
Linux |
2025-12-24T13:06:06.511Z | 2025-12-24T13:06:06.511Z |
| cve-2022-50776 | N/A | clk: st: Fix memory leak in st_of_quadfs_setup() |
Linux |
Linux |
2025-12-24T13:06:05.804Z | 2025-12-24T13:06:05.804Z |
| cve-2022-50775 | N/A | RDMA/hns: Fix refcount leak in hns_roce_mmap |
Linux |
Linux |
2025-12-24T13:06:05.074Z | 2025-12-24T13:06:05.074Z |
| cve-2022-50774 | N/A | crypto: qat - fix DMA transfer direction |
Linux |
Linux |
2025-12-24T13:06:04.391Z | 2025-12-24T13:06:04.391Z |
| cve-2022-50773 | N/A | ALSA: mts64: fix possible null-ptr-defer in snd_mts64_… |
Linux |
Linux |
2025-12-24T13:06:03.533Z | 2025-12-24T13:06:03.533Z |
| cve-2022-50772 | N/A | netdevsim: fix memory leak in nsim_bus_dev_new() |
Linux |
Linux |
2025-12-24T13:06:01.170Z | 2025-12-24T13:06:01.170Z |
| cve-2022-50771 | N/A | rcu: Fix __this_cpu_read() lockdep warning in rcu_forc… |
Linux |
Linux |
2025-12-24T13:06:00.412Z | 2025-12-24T13:06:00.412Z |
| cve-2022-50770 | N/A | ocfs2: fix memory leak in ocfs2_mount_volume() |
Linux |
Linux |
2025-12-24T13:05:59.700Z | 2025-12-24T13:05:59.700Z |
| cve-2022-50769 | N/A | mmc: mxcmmc: fix return value check of mmc_add_host() |
Linux |
Linux |
2025-12-24T13:05:58.994Z | 2025-12-24T13:05:58.994Z |
| cve-2022-50768 | N/A | scsi: smartpqi: Correct device removal for multi-actua… |
Linux |
Linux |
2025-12-24T13:05:58.304Z | 2025-12-24T13:05:58.304Z |
| cve-2022-50767 | N/A | fbdev: smscufx: Fix several use-after-free bugs |
Linux |
Linux |
2025-12-24T13:05:57.569Z | 2025-12-24T13:05:57.569Z |
| cve-2022-50766 | N/A | btrfs: set generation before calling btrfs_clean_tree_… |
Linux |
Linux |
2025-12-24T13:05:56.873Z | 2025-12-24T13:05:56.873Z |
| cve-2022-50765 | N/A | RISC-V: kexec: Fix memory leak of elf header buffer |
Linux |
Linux |
2025-12-24T13:05:56.123Z | 2025-12-24T13:05:56.123Z |
| cve-2022-50764 | N/A | ipv6/sit: use DEV_STATS_INC() to avoid data-races |
Linux |
Linux |
2025-12-24T13:05:55.423Z | 2025-12-24T13:05:55.423Z |
| cve-2022-50763 | N/A | crypto: marvell/octeontx - prevent integer overflows |
Linux |
Linux |
2025-12-24T13:05:54.704Z | 2025-12-24T13:05:54.704Z |
| cve-2022-50762 | N/A | fs/ntfs3: Avoid UBSAN error on true_sectors_per_clst() |
Linux |
Linux |
2025-12-24T13:05:54.020Z | 2025-12-24T13:05:54.020Z |
| cve-2022-50761 | N/A | x86/xen: Fix memory leak in xen_init_lock_cpu() |
Linux |
Linux |
2025-12-24T13:05:53.312Z | 2025-12-24T13:05:53.312Z |
| cve-2022-50760 | N/A | drm/amdgpu: Fix PCI device refcount leak in amdgpu_atr… |
Linux |
Linux |
2025-12-24T13:05:52.582Z | 2025-12-24T13:05:52.582Z |
| cve-2022-50759 | N/A | media: i2c: ov5648: Free V4L2 fwnode data on unbind |
Linux |
Linux |
2025-12-24T13:05:51.895Z | 2025-12-24T13:05:51.895Z |
| cve-2022-50758 | N/A | staging: vt6655: fix potential memory leak |
Linux |
Linux |
2025-12-24T13:05:51.159Z | 2025-12-24T13:05:51.159Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2023-54131 | N/A | wifi: rt2x00: Fix memory leak when handling surveys |
Linux |
Linux |
2025-12-24T13:06:48.227Z | 2025-12-24T13:06:48.227Z |
| cve-2023-54130 | N/A | hfs/hfsplus: avoid WARN_ON() for sanity check, use pro… |
Linux |
Linux |
2025-12-24T13:06:47.502Z | 2025-12-24T13:06:47.502Z |
| cve-2023-54129 | N/A | octeontx2-af: Add validation for lmac type |
Linux |
Linux |
2025-12-24T13:06:46.817Z | 2025-12-24T13:06:46.817Z |
| cve-2023-54128 | N/A | fs: drop peer group ids under namespace lock |
Linux |
Linux |
2025-12-24T13:06:46.056Z | 2025-12-24T13:06:46.056Z |
| cve-2023-54127 | N/A | fs/jfs: prevent double-free in dbUnmount() after faile… |
Linux |
Linux |
2025-12-24T13:06:45.380Z | 2025-12-24T13:06:45.380Z |
| cve-2023-54126 | N/A | crypto: safexcel - Cleanup ring IRQ workqueues on load… |
Linux |
Linux |
2025-12-24T13:06:44.687Z | 2025-12-24T13:06:44.687Z |
| cve-2023-54125 | N/A | fs/ntfs3: Return error for inconsistent extended attributes |
Linux |
Linux |
2025-12-24T13:06:43.977Z | 2025-12-24T13:06:43.977Z |
| cve-2023-54124 | N/A | f2fs: fix to drop all dirty pages during umount() if c… |
Linux |
Linux |
2025-12-24T13:06:43.290Z | 2025-12-24T13:06:43.290Z |
| cve-2023-54123 | N/A | md/raid10: fix memleak for 'conf->bio_split' |
Linux |
Linux |
2025-12-24T13:06:42.588Z | 2025-12-24T13:06:42.588Z |
| cve-2023-54122 | N/A | drm/msm/dpu: Add check for cstate |
Linux |
Linux |
2025-12-24T13:06:41.900Z | 2025-12-24T13:06:41.900Z |
| cve-2023-54121 | N/A | btrfs: fix incorrect splitting in btrfs_drop_extent_ma… |
Linux |
Linux |
2025-12-24T13:06:41.185Z | 2025-12-24T13:06:41.185Z |
| cve-2023-54120 | N/A | Bluetooth: Fix race condition in hidp_session_thread |
Linux |
Linux |
2025-12-24T13:06:40.420Z | 2025-12-24T13:06:40.420Z |
| cve-2023-54119 | N/A | inotify: Avoid reporting event with invalid wd |
Linux |
Linux |
2025-12-24T13:06:39.692Z | 2025-12-24T13:06:39.692Z |
| cve-2023-54118 | N/A | serial: sc16is7xx: setup GPIO controller later in probe |
Linux |
Linux |
2025-12-24T13:06:38.998Z | 2025-12-24T13:06:38.998Z |
| cve-2023-54117 | N/A | s390/dcssblk: fix kernel crash with list_add corruption |
Linux |
Linux |
2025-12-24T13:06:38.311Z | 2025-12-24T13:06:38.311Z |
| cve-2023-54116 | N/A | drm/fbdev-generic: prohibit potential out-of-bounds access |
Linux |
Linux |
2025-12-24T13:06:37.591Z | 2025-12-24T13:06:37.591Z |
| cve-2023-54115 | N/A | pcmcia: rsrc_nonstatic: Fix memory leak in nonstatic_r… |
Linux |
Linux |
2025-12-24T13:06:36.892Z | 2025-12-24T13:06:36.892Z |
| cve-2023-54114 | N/A | net: nsh: Use correct mac_offset to unwind gso skb in … |
Linux |
Linux |
2025-12-24T13:06:36.214Z | 2025-12-24T13:06:36.214Z |
| cve-2023-54113 | N/A | rcu: dump vmalloc memory info safely |
Linux |
Linux |
2025-12-24T13:06:35.514Z | 2025-12-24T13:06:35.514Z |
| cve-2023-54112 | N/A | kcm: Fix memory leak in error path of kcm_sendmsg() |
Linux |
Linux |
2025-12-24T13:06:34.854Z | 2025-12-24T13:06:34.854Z |
| cve-2023-54111 | N/A | pinctrl: rockchip: Fix refcount leak in rockchip_pinct… |
Linux |
Linux |
2025-12-24T13:06:34.187Z | 2025-12-24T13:06:34.187Z |
| cve-2023-54110 | N/A | usb: rndis_host: Secure rndis_query check against int … |
Linux |
Linux |
2025-12-24T13:06:33.495Z | 2025-12-24T13:06:33.495Z |
| cve-2023-54109 | N/A | media: rcar_fdp1: Fix refcount leak in probe and remov… |
Linux |
Linux |
2025-12-24T13:06:32.836Z | 2025-12-24T13:06:32.836Z |
| cve-2023-54108 | N/A | scsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests |
Linux |
Linux |
2025-12-24T13:06:32.184Z | 2025-12-24T13:06:32.184Z |
| cve-2023-54107 | N/A | blk-cgroup: dropping parent refcount after pd_free_fn(… |
Linux |
Linux |
2025-12-24T13:06:31.505Z | 2025-12-24T13:06:31.505Z |
| cve-2023-54106 | N/A | net/mlx5: fix potential memory leak in mlx5e_init_rep_rx |
Linux |
Linux |
2025-12-24T13:06:30.829Z | 2025-12-24T13:06:30.829Z |
| cve-2023-54105 | N/A | can: isotp: check CAN address family in isotp_bind() |
Linux |
Linux |
2025-12-24T13:06:30.053Z | 2025-12-24T13:06:30.053Z |
| cve-2023-54104 | N/A | mtd: rawnand: fsl_upm: Fix an off-by one test in fun_e… |
Linux |
Linux |
2025-12-24T13:06:29.354Z | 2025-12-24T13:06:29.354Z |
| cve-2023-54103 | N/A | media: mtk-jpeg: Fix use after free bug due to uncance… |
Linux |
Linux |
2025-12-24T13:06:28.654Z | 2025-12-24T13:06:28.654Z |
| cve-2023-54102 | N/A | scsi: lpfc: Prevent lpfc_debugfs_lockstat_write() buff… |
Linux |
Linux |
2025-12-24T13:06:27.915Z | 2025-12-24T13:06:27.915Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-192579 | Malicious code in smtblib (PyPI) | 2025-12-15T15:24:47Z | 2025-12-29T11:08:56Z |
| mal-2025-192578 | Malicious code in xboxlive-auth (npm) | 2025-12-15T07:43:52Z | 2025-12-22T21:38:15Z |
| mal-2025-192574 | Malicious code in bignumex (npm) | 2025-12-15T07:43:03Z | 2025-12-23T16:10:05Z |
| mal-2025-192575 | Malicious code in polygon-src (npm) | 2025-12-15T07:40:32Z | 2025-12-22T21:38:13Z |
| mal-2025-192573 | Malicious code in @revvity-signals/chemdraw-js (npm) | 2025-12-15T07:34:01Z | 2025-12-23T15:41:17Z |
| mal-2025-192577 | Malicious code in sd-skbms (npm) | 2025-12-15T07:33:11Z | 2025-12-24T10:09:30Z |
| mal-2025-192576 | Malicious code in sd-security (npm) | 2025-12-15T07:33:11Z | 2025-12-24T10:09:30Z |
| mal-2025-192572 | Malicious code in phx-core (npm) | 2025-12-15T06:02:42Z | 2025-12-22T21:38:13Z |
| mal-2025-192571 | Malicious code in paypal-scripts-server-utils (npm) | 2025-12-15T05:39:09Z | 2025-12-22T21:38:13Z |
| mal-2025-192570 | Malicious code in @mohamed1687/iut-encrypt (npm) | 2025-12-15T04:50:36Z | 2025-12-22T21:38:09Z |
| mal-0000-ossf-package-analysis-10cb4544e5ccc9bc | Malicious code in stitch-ui-toolbox (npm) | 2025-12-15T01:26:07Z | 2025-12-15T01:26:07Z |
| mal-0000-ossf-package-analysis-f77b546bc36b17b6 | Malicious code in @ikarem/telemetry (npm) | 2025-12-14T05:39:54Z | 2025-12-14T05:39:54Z |
| mal-0000-ossf-package-analysis-0bdd063a8851ad4a | Malicious code in @ikarem/telemetry (npm) | 2025-12-14T05:20:40Z | 2025-12-14T05:20:40Z |
| mal-0000-ossf-package-analysis-c075254afb72ad18 | Malicious code in @ikarem/telemetry (npm) | 2025-12-14T05:15:54Z | 2025-12-14T05:15:54Z |
| mal-0000-ossf-package-analysis-74f76e276cfff1c1 | Malicious code in @ikarem/telemetry (npm) | 2025-12-14T05:08:54Z | 2025-12-14T05:08:54Z |
| mal-2025-192569 | Malicious code in @ikarem/telemetry (npm) | 2025-12-14T05:03:06Z | 2025-12-22T21:38:09Z |
| mal-0000-ossf-package-analysis-43ab3fc889bb1c1c | Malicious code in @ikarem/telemetry (npm) | 2025-12-14T05:03:06Z | 2025-12-14T05:03:06Z |
| mal-2025-192560 | Malicious code in kashif-mallah-fca (npm) | 2025-12-12T06:36:00Z | 2025-12-22T21:38:11Z |
| mal-2025-192559 | Malicious code in iraza2-fca (npm) | 2025-12-12T06:35:59Z | 2025-12-22T21:38:11Z |
| mal-2025-192567 | Malicious code in uba-plugins (npm) | 2025-12-12T06:34:06Z | 2025-12-22T21:38:14Z |
| mal-2025-192563 | Malicious code in sd-pay-ts (npm) | 2025-12-12T06:34:06Z | 2025-12-24T10:09:30Z |
| mal-2025-192562 | Malicious code in sd-pay (npm) | 2025-12-12T06:34:06Z | 2025-12-24T10:09:30Z |
| mal-2025-192561 | Malicious code in pp-js-lib (npm) | 2025-12-12T06:34:06Z | 2025-12-22T21:38:13Z |
| mal-2025-192558 | Malicious code in eslint-config-zoo (npm) | 2025-12-12T06:34:06Z | 2025-12-22T21:38:10Z |
| mal-2025-192556 | Malicious code in cms_comp_static (npm) | 2025-12-12T06:34:06Z | 2025-12-22T21:38:10Z |
| mal-2025-192555 | Malicious code in cms_comp (npm) | 2025-12-12T06:34:06Z | 2025-12-23T16:10:05Z |
| mal-2025-192554 | Malicious code in camscanner-seo (npm) | 2025-12-12T06:34:06Z | 2025-12-23T16:10:05Z |
| mal-2025-192565 | Malicious code in sdbao-content-sems (npm) | 2025-12-12T06:34:05Z | 2025-12-24T10:09:30Z |
| mal-2025-192564 | Malicious code in sdbao-content-report (npm) | 2025-12-12T06:34:05Z | 2025-12-24T10:09:30Z |
| mal-2025-192557 | Malicious code in cos-js-sdk-v6 (npm) | 2025-12-12T06:34:05Z | 2025-12-23T16:45:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2022-1792 | Linux Kernel: Mehrere Schwachstellen | 2022-10-18T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2022-1374 | Linux Kernel: Mehrere Schwachstellen | 2022-09-11T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2022-1186 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2022-08-24T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2022-0782 | Apple iOS: Mehrere Schwachstellen | 2022-07-20T22:00:00.000+00:00 | 2025-10-20T22:00:00.000+00:00 |
| wid-sec-w-2022-0778 | Apple macOS: Mehrere Schwachstellen | 2022-07-20T22:00:00.000+00:00 | 2025-10-20T22:00:00.000+00:00 |
| wid-sec-w-2022-0969 | Internet Systems Consortium BIND: Mehrere Schwachstellen | 2022-03-16T23:00:00.000+00:00 | 2025-11-20T23:00:00.000+00:00 |
| wid-sec-w-2022-0047 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2021-12-01T23:00:00.000+00:00 | 2025-11-24T23:00:00.000+00:00 |
| wid-sec-w-2022-1197 | git: Schwachstelle ermöglicht Codeausführung | 2021-05-13T22:00:00.000+00:00 | 2025-11-04T23:00:00.000+00:00 |
| wid-sec-w-2022-1354 | Red Hat Enterprise Linux: Mehrere Schwachstellen | 2021-05-04T22:00:00.000+00:00 | 2025-12-21T23:00:00.000+00:00 |
| wid-sec-w-2025-2548 | Red Hat Enterprise Linux: Mehrere Schwachstellen | 2020-03-31T22:00:00.000+00:00 | 2025-11-24T23:00:00.000+00:00 |
| wid-sec-w-2025-2440 | Red Hat JBoss Enterprise Application Platform: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes | 2015-11-22T23:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:18242 | Red Hat Security Advisory: OpenShift Container Platform 4.13.61 security and extras update | 2025-10-23T02:52:48+00:00 | 2025-11-29T06:53:19+00:00 |
| rhsa-2025:18814 | Red Hat Security Advisory: java-1.8.0-openjdk security update | 2025-10-22T22:15:50+00:00 | 2025-11-21T19:29:37+00:00 |
| rhsa-2025:18824 | Red Hat Security Advisory: java-21-openjdk security update | 2025-10-22T20:28:30+00:00 | 2025-11-26T15:07:56+00:00 |
| rhsa-2025:18821 | Red Hat Security Advisory: java-17-openjdk security update | 2025-10-22T20:08:41+00:00 | 2025-11-21T19:29:39+00:00 |
| rhsa-2025:18983 | Red Hat Security Advisory: thunderbird security update | 2025-10-22T19:56:34+00:00 | 2025-11-21T19:29:48+00:00 |
| rhsa-2025:18823 | Red Hat Security Advisory: OpenJDK 17.0.17 Security Update for Windows Builds | 2025-10-22T19:49:16+00:00 | 2025-11-21T19:29:41+00:00 |
| rhsa-2025:18822 | Red Hat Security Advisory: OpenJDK 17.0.17 Security Update for Portable Linux Builds | 2025-10-22T19:48:16+00:00 | 2025-11-21T19:29:43+00:00 |
| rhsa-2025:18825 | Red Hat Security Advisory: OpenJDK 21.0.9 Security Update for Portable Linux Builds | 2025-10-22T19:48:10+00:00 | 2025-11-26T15:07:57+00:00 |
| rhsa-2025:18826 | Red Hat Security Advisory: OpenJDK 21.0.9 Security Update for Windows Builds | 2025-10-22T19:46:43+00:00 | 2025-11-26T15:07:59+00:00 |
| rhsa-2025:18816 | Red Hat Security Advisory: OpenJDK 8u472 Security Update for Portable Linux Builds | 2025-10-22T19:45:52+00:00 | 2025-11-21T19:29:37+00:00 |
| rhsa-2025:18817 | Red Hat Security Advisory: OpenJDK 8u472 Windows Security Update | 2025-10-22T19:45:40+00:00 | 2025-11-21T19:29:42+00:00 |
| rhsa-2025:18984 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Container Release Update | 2025-10-22T16:41:24+00:00 | 2025-11-24T14:24:12+00:00 |
| rhsa-2025:18989 | Red Hat Security Advisory: RHOAI 2.25.0 - Red Hat OpenShift AI | 2025-10-22T16:01:19+00:00 | 2025-11-21T19:38:50+00:00 |
| rhsa-2025:18979 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Product Security and Bug Fix Update | 2025-10-22T13:21:59+00:00 | 2025-11-27T12:47:14+00:00 |
| rhsa-2025:18217 | Red Hat Security Advisory: OpenShift Container Platform 4.19.17 bug fix and security update | 2025-10-22T06:20:41+00:00 | 2025-11-24T21:04:19+00:00 |
| rhsa-2025:18218 | Red Hat Security Advisory: OpenShift Container Platform 4.17.42 bug fix and security update | 2025-10-22T05:09:35+00:00 | 2025-11-24T21:04:19+00:00 |
| rhsa-2025:18932 | Red Hat Security Advisory: kernel security update | 2025-10-22T00:27:35+00:00 | 2025-11-25T21:27:20+00:00 |
| rhsa-2025:18931 | Red Hat Security Advisory: redis:7 security update | 2025-10-21T23:58:45+00:00 | 2025-11-28T11:32:32+00:00 |
| rhsa-2025:18890 | Red Hat Security Advisory: Red Hat build of Keycloak 26.2.10 Security Update | 2025-10-21T17:13:31+00:00 | 2025-11-21T19:29:46+00:00 |
| rhsa-2025:18889 | Red Hat Security Advisory: Red Hat build of Keycloak 26.2.10 Images Security Update | 2025-10-21T17:09:36+00:00 | 2025-11-21T19:29:46+00:00 |
| rhsa-2025:15397 | Red Hat Security Advisory: OpenShift Container Platform 4.20.0 bug fix and security update | 2025-10-21T14:50:28+00:00 | 2025-11-29T00:08:27+00:00 |
| rhsa-2025:18233 | Red Hat Security Advisory: OpenShift Container Platform 4.19.17 bug fix and security update | 2025-10-21T13:18:19+00:00 | 2025-11-21T19:38:47+00:00 |
| rhsa-2025:18715 | Red Hat Security Advisory: yelp security update from RHEL | 2025-10-21T04:48:16+00:00 | 2025-11-21T19:29:36+00:00 |
| rhsa-2025:18714 | Red Hat Security Advisory: osbuild-composer security update from RHEL | 2025-10-21T04:46:31+00:00 | 2025-11-21T19:29:36+00:00 |
| rhsa-2025:18703 | Red Hat Security Advisory: xterm security update from RHEL | 2025-10-21T04:43:21+00:00 | 2025-11-21T19:29:35+00:00 |
| rhsa-2025:18704 | Red Hat Security Advisory: firefox security update from RHEL | 2025-10-21T04:42:31+00:00 | 2025-11-21T19:29:35+00:00 |
| rhsa-2025:18440 | Red Hat Security Advisory: python3.9 security update from RHEL | 2025-10-21T04:16:36+00:00 | 2025-11-21T19:29:21+00:00 |
| rhsa-2025:18698 | Red Hat Security Advisory: podman security update from RHEL | 2025-10-21T04:16:19+00:00 | 2025-11-21T19:29:35+00:00 |
| rhsa-2025:18695 | Red Hat Security Advisory: gvisor-tap-vsock security update from RHEL | 2025-10-21T04:16:01+00:00 | 2025-11-21T19:29:35+00:00 |
| rhsa-2025:18697 | Red Hat Security Advisory: buildah security update from RHEL | 2025-10-21T04:15:11+00:00 | 2025-11-21T19:29:35+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-40210 | Revert "NFSD: Remove the cap on number of operations per NFSv4 COMPOUND" | 2025-11-02T00:00:00.000Z | 2025-11-25T01:39:58.000Z |
| msrc_cve-2025-40207 | media: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try() | 2025-11-02T00:00:00.000Z | 2025-12-07T01:51:24.000Z |
| msrc_cve-2025-40206 | netfilter: nft_objref: validate objref and objrefmap expressions | 2025-11-02T00:00:00.000Z | 2025-12-07T01:52:17.000Z |
| msrc_cve-2025-40205 | btrfs: avoid potential out-of-bounds in btrfs_encode_fh() | 2025-11-02T00:00:00.000Z | 2025-12-07T01:52:11.000Z |
| msrc_cve-2025-40204 | sctp: Fix MAC comparison to be constant-time | 2025-11-02T00:00:00.000Z | 2025-12-07T01:35:42.000Z |
| msrc_cve-2025-40202 | ipmi: Rework user message limit handling | 2025-11-02T00:00:00.000Z | 2025-12-07T01:35:54.000Z |
| msrc_cve-2025-40201 | kernel/sys.c: fix the racy usage of task_lock(tsk->group_leader) in sys_prlimit64() paths | 2025-11-02T00:00:00.000Z | 2025-12-07T01:51:54.000Z |
| msrc_cve-2025-40200 | Squashfs: reject negative file sizes in squashfs_read_inode() | 2025-11-02T00:00:00.000Z | 2025-12-07T01:51:30.000Z |
| msrc_cve-2025-40198 | ext4: avoid potential buffer over-read in parse_apply_sb_mount_options() | 2025-11-02T00:00:00.000Z | 2025-12-07T01:51:18.000Z |
| msrc_cve-2025-40197 | media: mc: Clear minor number before put device | 2025-11-02T00:00:00.000Z | 2025-12-07T01:52:22.000Z |
| msrc_cve-2025-40195 | mount: handle NULL values in mnt_ns_release() | 2025-11-02T00:00:00.000Z | 2025-12-07T01:51:37.000Z |
| msrc_cve-2025-40194 | cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request() | 2025-11-02T00:00:00.000Z | 2025-12-07T01:52:05.000Z |
| msrc_cve-2025-40193 | xtensa: simdisk: add input size check in proc_write_simdisk | 2025-11-02T00:00:00.000Z | 2025-12-07T01:35:30.000Z |
| msrc_cve-2025-40192 | Revert "ipmi: fix msg stack when IPMI is disconnected" | 2025-11-02T00:00:00.000Z | 2025-12-07T01:52:27.000Z |
| msrc_cve-2025-40190 | ext4: guard against EA inode refcount underflow in xattr update | 2025-11-02T00:00:00.000Z | 2025-12-07T01:52:00.000Z |
| msrc_cve-2025-40188 | pwm: berlin: Fix wrong register in suspend/resume | 2025-11-02T00:00:00.000Z | 2025-11-25T01:41:17.000Z |
| msrc_cve-2025-40187 | net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce() | 2025-11-02T00:00:00.000Z | 2025-12-07T01:51:43.000Z |
| msrc_cve-2025-40180 | mailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop | 2025-11-02T00:00:00.000Z | 2025-12-07T01:51:11.000Z |
| msrc_cve-2025-40179 | ext4: verify orphan file size is not too big | 2025-11-02T00:00:00.000Z | 2025-12-07T01:51:03.000Z |
| msrc_cve-2025-40178 | pid: Add a judgment for ns null in pid_nr_ns | 2025-11-02T00:00:00.000Z | 2025-12-07T01:51:49.000Z |
| msrc_cve-2025-40176 | tls: wait for pending async decryptions if tls_strp_msg_hold fails | 2025-11-02T00:00:00.000Z | 2025-12-07T01:50:46.000Z |
| msrc_cve-2025-40173 | net/ip6_tunnel: Prevent perpetual tunnel growth | 2025-11-02T00:00:00.000Z | 2025-12-07T01:50:19.000Z |
| msrc_cve-2025-40172 | accel/qaic: Treat remaining == 0 as error in find_and_map_user_pages() | 2025-11-02T00:00:00.000Z | 2025-11-13T01:02:30.000Z |
| msrc_cve-2025-40170 | net: use dst_dev_rcu() in sk_setup_caps() | 2025-11-02T00:00:00.000Z | 2025-12-07T01:50:27.000Z |
| msrc_cve-2025-40168 | smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match(). | 2025-11-02T00:00:00.000Z | 2025-12-07T01:50:11.000Z |
| msrc_cve-2025-40167 | ext4: detect invalid INLINE_DATA + EXTENTS flag combination | 2025-11-02T00:00:00.000Z | 2025-12-07T01:49:17.000Z |
| msrc_cve-2025-40165 | media: nxp: imx8-isi: m2m: Fix streaming cleanup on release | 2025-11-02T00:00:00.000Z | 2025-11-13T01:02:47.000Z |
| msrc_cve-2025-40164 | usbnet: Fix using smp_processor_id() in preemptible code warnings | 2025-11-02T00:00:00.000Z | 2025-12-07T01:49:59.000Z |
| msrc_cve-2025-40158 | ipv6: use RCU in ip6_output() | 2025-11-02T00:00:00.000Z | 2025-12-07T01:50:36.000Z |
| msrc_cve-2025-40149 | tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock(). | 2025-11-02T00:00:00.000Z | 2025-12-07T01:49:42.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2023-000111 | Remarshal unlimitedly expanding YAML alias nodes | 2023-11-10T14:41+09:00 | 2024-05-08T17:53+09:00 |
| jvndb-2023-000107 | EC-CUBE 3 series and 4 series vulnerable to arbitrary code execution | 2023-11-07T13:47+09:00 | 2024-05-09T17:17+09:00 |
| jvndb-2023-004919 | FUJIFILM Business Innovation Corp. and Xerox Corporation MFPs export Address Books with insufficient encryption strength | 2023-11-02T17:21+09:00 | 2024-05-07T15:25+09:00 |
| jvndb-2023-000110 | Improper restriction of XML external entity references (XXE) in e-Tax software | 2023-11-02T13:38+09:00 | 2024-05-01T18:41+09:00 |
| jvndb-2023-004790 | Multiple Vulnerabilities in Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer | 2023-11-02T12:14+09:00 | 2023-11-02T12:14+09:00 |
| jvndb-2023-004754 | MCL Technologies MCL-Net vulnerable to directory traversal | 2023-11-01T16:49+09:00 | 2023-11-01T16:49+09:00 |
| jvndb-2023-000109 | Cybozu Remote Service vulnerable to uncontrolled resource consumption | 2023-10-31T13:43+09:00 | 2024-05-07T15:51+09:00 |
| jvndb-2023-000108 | Inkdrop vulnerable to code injection | 2023-10-30T13:48+09:00 | 2024-05-07T16:09+09:00 |
| jvndb-2023-004294 | Advanced Micro Devices Windows kernel drivers vulnerable to insufficient access control on its IOCTL | 2023-10-27T16:10+09:00 | 2024-05-20T17:49+09:00 |
| jvndb-2023-000106 | Multiple vulnerabilities in baserCMS | 2023-10-27T14:46+09:00 | 2024-05-07T15:59+09:00 |
| jvndb-2023-000105 | Movable Type vulnerable to cross-site scripting | 2023-10-25T15:18+09:00 | 2024-05-10T17:47+09:00 |
| jvndb-2023-003956 | Improper restriction of XML external entity reference (XXE) vulnerability in OMRON CX-Designer | 2023-10-24T16:11+09:00 | 2024-05-10T17:47+09:00 |
| jvndb-2023-000103 | HP ThinUpdate vulnerable to improper server certificate verification | 2023-10-23T14:26+09:00 | 2023-10-23T14:26+09:00 |
| jvndb-2023-000102 | Multiple vulnerabilities in JustSystems products | 2023-10-19T15:16+09:00 | 2024-05-16T16:44+09:00 |
| jvndb-2023-000104 | Improper restriction of XML external entity references (XXE) in Proself | 2023-10-18T18:00+09:00 | 2024-05-15T17:08+09:00 |
| jvndb-2023-003913 | Multiple vulnerabilities in JTEKT ELECTRONICS OnSinView2 | 2023-10-18T14:13+09:00 | 2024-05-16T17:28+09:00 |
| jvndb-2023-000101 | web2py vulnerable to OS command injection | 2023-10-16T16:11+09:00 | 2024-05-22T17:58+09:00 |
| jvndb-2023-000100 | Scanning evasion issue in Cisco Secure Email Gateway | 2023-10-16T16:11+09:00 | 2023-10-27T15:52+09:00 |
| jvndb-2023-003788 | Out-of-bounds read vulnerability in Keyence KV STUDIO and KV REPLAY VIEWER | 2023-10-11T15:23+09:00 | 2024-05-16T17:09+09:00 |
| jvndb-2023-000098 | e-Gov Client Application fails to restrict custom URL schemes properly | 2023-10-06T14:57+09:00 | 2024-05-17T17:55+09:00 |
| jvndb-2023-003771 | File and Directory Permissions Vulnerability in JP1/Performance Management | 2023-10-04T15:23+09:00 | 2023-10-04T15:23+09:00 |
| jvndb-2023-003770 | DoS Vulnerability in Hitachi Ops Center Common Services | 2023-10-04T15:23+09:00 | 2024-05-22T15:31+09:00 |
| jvndb-2023-003769 | Information Exposure Vulnerability in Hitachi Ops Center Administrator | 2023-10-04T15:23+09:00 | 2024-05-22T15:20+09:00 |
| jvndb-2023-000097 | Citadel WebCit vulnerable to cross-site scripting on Instant Messaging facility | 2023-10-04T14:07+09:00 | 2024-05-21T17:08+09:00 |
| jvndb-2023-003767 | Multiple vulnerabilities in multiple FURUNO SYSTEMS wireless LAN access point devices in ST(Standalone) mode | 2023-10-03T14:26+09:00 | 2024-05-22T18:01+09:00 |
| jvndb-2023-000096 | Improper restriction of XML external entity references (XXE) in FD Application | 2023-10-02T12:36+09:00 | 2024-05-22T15:37+09:00 |
| jvndb-2023-003764 | Multiple vulnerabilities in Panasonic KW Watcher | 2023-09-27T14:44+09:00 | 2023-09-27T14:44+09:00 |
| jvndb-2023-000095 | Shihonkanri Plus vulnerable to relative path traversal | 2023-09-27T13:49+09:00 | 2024-05-21T17:16+09:00 |
| jvndb-2023-003757 | Trend Micro Mobile Security vulnerable to cross-site scripting | 2023-09-26T11:30+09:00 | 2024-03-13T18:07+09:00 |
| jvndb-2023-000094 | Multiple vulnerabilities in WordPress plugin "Welcart e-Commerce" | 2023-09-22T13:51+09:00 | 2024-07-11T16:49+09:00 |
| ID | Description | Updated |
|---|