Recent vulnerabilities
| ID | Description | Published | Updated |
|---|---|---|---|
| ghsa-vhqc-4wgw-frfj | Dell CloudLink, versions prior 8.1.1, contain a Command Injection vulnerability which can be exploi… | 2025-11-05T17:48:29Z | 2025-11-05T17:48:29Z |
| ghsa-vcvf-6gw2-rm4v | A vulnerability in the web UI of Cisco Unified CCX could allow an authenticated, remote attacker to… | 2025-11-05T17:48:29Z | 2025-11-05T17:48:29Z |
| ghsa-v789-p96v-5f4v | Dell CloudLink, versions prior to 8.2, contain a vulnerability where a privileged user with known p… | 2025-11-05T17:48:29Z | 2025-11-05T17:48:29Z |
| ghsa-qwqm-p386-7vch | Dell Command Monitor (DCM), versions prior to 10.12.3.28, contains an Execution with Unnecessary Pr… | 2025-11-05T17:48:29Z | 2025-11-05T17:48:29Z |
| ghsa-qf98-5p3c-j3vc | DWSurvey 6.14.0 is vulnerable to Incorrect Access Control. When deleting a questionnaire, replacing… | 2025-11-05T17:48:29Z | 2025-11-05T21:31:01Z |
| ghsa-mhhg-8h3j-q9xm | Dell CloudLink, versions prior to 8.2, contain use of a Cryptographic Primitive with a Risky Implem… | 2025-11-05T17:48:29Z | 2025-11-05T17:48:29Z |
| ghsa-j6fc-gfmx-7g9v | Dell CloudLink, versions prior to 8.2, contain a vulnerability where a privileged user with known p… | 2025-11-05T17:48:29Z | 2025-11-05T17:48:29Z |
| ghsa-gqj5-fpvg-f47f | OpenKM Community Edition 6.3.12 is vulnerable to stored cross-site scripting (XSS) in the user acco… | 2025-11-05T17:48:29Z | 2025-11-05T21:31:01Z |
| ghsa-cwm4-q4jj-2w4v | Dell CloudLink, versions prior to 8.1.1, contain a vulnerability where a privileged user may exploi… | 2025-11-05T17:48:29Z | 2025-11-05T17:48:29Z |
| ghsa-cgv7-rqxr-q664 | Dell CloudLink, versions prior to 8.1.1, contain a vulnerability where a privileged user with known… | 2025-11-05T17:48:29Z | 2025-11-05T17:48:29Z |
| ghsa-967j-jc6x-3jm4 | ownCloud Guests before 0.12.5 allows unauthenticated user enumeration via the /apps/guests/register… | 2025-11-05T17:48:29Z | 2025-11-05T21:31:01Z |
| ghsa-79m5-m533-xq7v | Dell CloudLink, versions 8.0 through 8.1.2, contain vulnerability on restricted shell. A Privileged… | 2025-11-05T17:48:29Z | 2025-11-05T17:48:29Z |
| ghsa-46m8-44h2-g6m9 | A vulnerability in the API subsystem of Cisco Unified Intelligence Center could allow an authentica… | 2025-11-05T17:48:29Z | 2025-11-05T17:48:29Z |
| ghsa-xc2m-hmp7-hc44 | An Incorrect Access Control vulnerability in the user management component of ZwiiCMS up to v13.6.0… | 2025-11-05T17:48:28Z | 2025-11-05T17:48:28Z |
| ghsa-w3hc-3vf9-xjj9 | A vulnerability in the Contact Center Express (CCX) Editor application of Cisco Unified CCX could a… | 2025-11-05T17:48:28Z | 2025-11-05T17:48:28Z |
| ghsa-qm3h-46xc-w7w4 | An issue was discovered in libarchive bsdtar before version 3.8.1 in function apply_substitution in… | 2025-11-05T17:48:28Z | 2025-11-05T17:48:28Z |
| ghsa-px5r-4v6x-q5mv | A vulnerability in the Java Remote Method Invocation (RMI) process of Cisco Unified CCX could allow… | 2025-11-05T17:48:28Z | 2025-11-05T17:48:28Z |
| ghsa-mvgf-2h8p-jh4x | Multiple vulnerabilities in the web-based management interface of Cisco ISE and Cisco ISE-PIC could… | 2025-11-05T17:48:28Z | 2025-11-05T17:48:28Z |
| ghsa-jpv8-hv7x-q4mr | Multiple vulnerabilities in the web-based management interface of Cisco ISE and Cisco ISE-PIC could… | 2025-11-05T17:48:28Z | 2025-11-05T17:48:28Z |
| ghsa-j75f-w639-68hc | Snipe-IT before version 8.3.3 contains a remote code execution vulnerability that allows an authent… | 2025-11-05T17:48:28Z | 2025-11-10T18:30:33Z |
| ghsa-gp2g-3xx9-59fw | A vulnerability in the web UI of Cisco Unified CCX could allow an authenticated, remote attacker to… | 2025-11-05T17:48:28Z | 2025-11-05T17:48:28Z |
| ghsa-g7hc-wvj4-v52x | A vulnerability in the web-based management interface of Cisco ISE could allow an authenticated, re… | 2025-11-05T17:48:28Z | 2025-11-05T17:48:28Z |
| ghsa-cfwq-p5hw-9v6p | A vulnerability in the RADIUS setting Reject RADIUS requests from clients with repeated failures on… | 2025-11-05T17:48:28Z | 2025-11-05T17:48:28Z |
| ghsa-97fq-qprm-p8vj | Multiple vulnerabilities in the web-based management interface of Cisco ISE and Cisco ISE-PIC could… | 2025-11-05T17:48:28Z | 2025-11-05T17:48:28Z |
| ghsa-7c9g-mrww-7986 | OS command injection vulnerability in Dynatrace ActiveGate ping extension up to 1.016 via crafted i… | 2025-11-05T17:48:28Z | 2025-11-05T21:31:01Z |
| ghsa-qw9x-cqr3-wc7r | runc container escape with malicious config due to /dev/console mount and related races | 2025-11-05T17:34:49Z | 2025-11-06T23:12:51Z |
| ghsa-9493-h29p-rfm2 | runc container escape via "masked path" abuse due to mount race conditions | 2025-11-05T16:37:15Z | 2025-11-06T23:12:38Z |
| ghsa-x43x-2mp4-28j4 | MDaemon Mail Server 23.5.2 validates SPF, DKIM, and DMARC using the email enclosed in angle bracket… | 2025-11-05T15:31:07Z | 2025-11-05T17:48:28Z |
| ghsa-qw25-v68c-qjf3 | Django has a denial-of-service vulnerability in HttpResponseRedirect and HttpResponsePermanentRedir… | 2025-11-05T15:31:07Z | 2025-11-05T19:55:37Z |
| ghsa-j793-63pp-pmv8 | HCL BigFix Query is affected by a sensitive information disclosure in the WebUI Query application. … | 2025-11-05T15:31:07Z | 2025-11-05T15:31:07Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2025-10691 | Easy Email Subscription <= 1.3 - Cross-Site Request Fo… |
yudiz |
Easy Email Subscription |
2025-11-06T03:27:01.882Z | 2025-11-06T17:02:19.997Z | |
| cve-2025-10683 | Easy Email Subscription <= 1.3 - Authenticated (Admin+… |
yudiz |
Easy Email Subscription |
2025-11-06T02:31:05.341Z | 2025-11-06T16:54:25.147Z | |
| cve-2025-64171 | MARIN3R: Cross-Namespace Vulnerability in the Operator |
3scale-sre |
marin3r |
2025-11-06T00:23:48.695Z | 2025-11-06T21:17:02.114Z | |
| cve-2025-64164 | DataEase is vulnerable to Oracle JNDI Injection |
dataease |
dataease |
2025-11-06T00:07:58.592Z | 2025-11-06T21:17:41.345Z | |
| cve-2025-63589 | N/A | A reflected XSS vulnerability exists in CMSimple_… |
n/a |
n/a |
2025-11-06T00:00:00.000Z | 2025-11-06T19:12:48.998Z |
| cve-2025-63588 | N/A | An unauthenticated reflected cross-site scripting… |
n/a |
n/a |
2025-11-06T00:00:00.000Z | 2025-11-06T19:10:56.777Z |
| cve-2025-63560 | N/A | An issue in KiloView Dual Channel 4k HDMI & 3G-SD… |
n/a |
n/a |
2025-11-06T00:00:00.000Z | 2025-11-10T17:04:00.611Z |
| cve-2025-63551 | N/A | A Server-Side Request Forgery (SSRF) vulnerabilit… |
n/a |
n/a |
2025-11-06T00:00:00.000Z | 2025-11-07T15:11:56.765Z |
| cve-2025-63307 | N/A | alexusmai laravel-file-manager 3.3.1 is vulnerabl… |
n/a |
n/a |
2025-11-06T00:00:00.000Z | 2025-11-06T19:08:37.837Z |
| cve-2025-60541 | N/A | A Server-Side Request Forgery (SSRF) in the /api/… |
n/a |
n/a |
2025-11-06T00:00:00.000Z | 2025-11-07T15:20:19.324Z |
| cve-2025-59396 | N/A | {'rejectedReasons': [{'lang': 'en', 'value': 'Not a security vulnerability'}], 'providerMetadata': {'orgId': '5d1c2695-1a31-4499-88ae-e847036fd7e3', 'shortName': 'WatchGuard', 'dateUpdated': '2025-11-10T22:50:06.864Z'}, 'x_generator': {'engine': 'cveClient/1.0.15'}} | N/A | N/A | 2025-11-06T00:00:00.000Z | 2025-11-10T22:50:06.864Z |
| cve-2025-59392 | N/A | On Elspec G5 devices through 1.2.2.19, a person w… |
n/a |
n/a |
2025-11-06T00:00:00.000Z | 2025-11-06T16:38:10.176Z |
| cve-2025-27919 | N/A | An issue was discovered in AnyDesk through 9.0.4.… |
n/a |
n/a |
2025-11-06T00:00:00.000Z | 2025-11-06T17:09:39.979Z |
| cve-2025-27918 | N/A | An issue was discovered in AnyDesk before 9.0.0. … |
n/a |
n/a |
2025-11-06T00:00:00.000Z | 2025-11-06T17:08:56.573Z |
| cve-2025-27917 | N/A | An issue was discovered in AnyDesk through 9.0.4.… |
n/a |
n/a |
2025-11-06T00:00:00.000Z | 2025-11-10T20:51:39.798Z |
| cve-2025-27916 | N/A | An issue was discovered in AnyDesk through 9.0.4.… |
n/a |
n/a |
2025-11-06T00:00:00.000Z | 2025-11-10T19:49:52.216Z |
| cve-2025-64163 | DataEase's DB2 is vulnerable to SSRF |
dataease |
dataease |
2025-11-05T23:52:05.196Z | 2025-11-06T21:18:12.403Z | |
| cve-2025-64114 | ClipBucket v5: SQL Injection possible through ClipBuck… |
MacWarrior |
clipbucket-v5 |
2025-11-05T23:30:59.120Z | 2025-11-06T21:19:38.854Z | |
| cve-2025-62596 | youki container escape and denial of service due to ar… |
youki-dev |
youki |
2025-11-05T23:14:37.167Z | 2025-11-06T16:54:15.942Z | |
| cve-2025-62161 | youki container escape via "masked path" abuse due to … |
youki-dev |
youki |
2025-11-05T23:09:09.014Z | 2025-11-06T21:20:19.865Z | |
| cve-2025-55278 | 8.1 (v3.1) | HCL DevOps Loop is susceptible to an improper authenti… |
HCL Software |
DevOps Loop |
2025-11-05T22:44:17.256Z | 2025-11-06T21:20:55.355Z |
| cve-2025-12779 | 8.8 (v4.0) 8.8 (v3.1) | Improper handling of the authentication token in … |
Amazon |
Amazon WorkSpaces |
2025-11-05T21:20:51.567Z | 2025-11-10T18:52:51.286Z |
| cve-2025-10853 | 5.2 (v3.1) | Reflected Cross-Site Scripting (XSS) in Management Con… |
WSO2 |
WSO2 Open Banking IAM |
2025-11-05T19:21:32.971Z | 2025-11-05T19:58:21.875Z |
| cve-2025-5770 | 6.1 (v3.1) | Reflected Cross-Site Scripting (XSS) in Authentication… |
WSO2 |
WSO2 Identity Server |
2025-11-05T19:02:48.434Z | 2025-11-05T20:13:05.330Z |
| cve-2025-43418 | N/A | This issue was addressed by restricting options o… |
Apple |
iOS and iPadOS |
2025-11-05T18:33:35.485Z | 2025-11-05T18:50:52.441Z |
| cve-2023-43000 | N/A | A use-after-free issue was addressed with improve… |
Apple |
macOS |
2025-11-05T18:33:23.777Z | 2025-11-06T04:55:46.892Z |
| cve-2025-12745 | QuickJS quickjs.c js_array_buffer_slice buffer over-read |
n/a |
QuickJS |
2025-11-05T18:32:07.580Z | 2025-11-05T19:26:04.149Z | |
| cve-2025-11093 | 8.4 (v3.1) | Arbitrary Code Execution with higher privileged users … |
WSO2 |
WSO2 Micro Integrator |
2025-11-05T18:31:17.873Z | 2025-11-05T19:39:15.696Z |
| cve-2025-31954 | 5.4 (v3.1) | HCL iAutomate is susceptible to a sensitive informatio… |
HCL Software |
iAutomate |
2025-11-05T18:23:21.019Z | 2025-11-05T18:46:53.781Z |
| cve-2025-10907 | 8.4 (v3.1) | Authenticated Arbitrary File Upload in Multiple WSO2 P… |
WSO2 |
WSO2 API Manager |
2025-11-05T18:03:49.831Z | 2025-11-05T18:49:44.604Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2025-28953 | N/A | WordPress smart SEO plugin <= 4.0 - SQL Injection Vuln… |
axiomthemes |
smart SEO |
2025-11-06T15:53:18.852Z | 2025-11-10T16:16:55.832Z |
| cve-2025-22288 | N/A | WordPress Smush Image Compression and Optimization plu… |
WPMU DEV - Your All-in-One WordPress Platform |
Smush Image Compression and Optimization |
2025-11-06T15:53:18.126Z | 2025-11-07T20:32:23.564Z |
| cve-2025-12556 | 8.7 (v4.0) 8.8 (v3.1) | IDIS ICM Viewer Argument Injection |
IDIS |
ICM Viewer |
2025-11-06T15:35:58.447Z | 2025-11-06T15:47:08.878Z |
| cve-2025-37735 | 7 (v3.1) | Improper preservation of permissions in Elastic D… |
Elastic |
Kibana |
2025-11-06T14:27:26.235Z | 2025-11-07T04:56:11.390Z |
| cve-2025-36054 | 6.1 (v3.1) | Cross-site scripting vulnerability affect IBM Business… |
IBM |
Business Automation Workflow containers |
2025-11-06T14:11:49.396Z | 2025-11-06T14:32:53.254Z |
| cve-2025-11956 | 8.9 (v3.1) | XSS in Proliz's OBS |
Proliz Software Ltd. Co. |
OBS (Student Affairs Information System) |
2025-11-06T14:51:51.292Z | 2025-11-06T15:07:43.302Z |
| cve-2025-10955 | 6.1 (v3.1) | HTML Injection in Netcad Software's Netigma |
Netcad Software Inc. |
Netigma |
2025-11-06T14:46:09.596Z | 2025-11-07T08:38:36.099Z |
| cve-2025-11268 | Strong Testimonials <= 3.2.16 - Unauthenticated Arbitr… |
wpchill |
Strong Testimonials |
2025-11-06T08:26:27.860Z | 2025-11-06T14:46:59.939Z | |
| cve-2025-12360 | Better Find and Replace <= 1.7.7 - Missing Authorization |
codesolz |
Better Find and Replace – AI-Powered Suggestions |
2025-11-06T07:27:05.431Z | 2025-11-06T14:51:40.221Z | |
| cve-2025-10259 | 5.3 (v3.1) | Denial-of-Service(DoS) Vulnerability in TCP Communicat… |
Mitsubishi Electric Corporation |
MELSEC iQ-F Series FX5U-32MT/ES |
2025-11-06T07:12:24.252Z | 2025-11-06T15:22:22.596Z |
| cve-2025-12471 | Hubbub Lite <= 1.36.0 - Reflected Cross-Site Scripting |
nerdpressteam |
Hubbub Lite – Fast, free social sharing and follow buttons |
2025-11-06T06:45:20.224Z | 2025-11-06T15:28:04.500Z | |
| cve-2025-9338 | 7.3 (v4.0) | A improper restriction of operations within the b… |
ASUS |
Armoury Crate |
2025-11-06T06:02:48.738Z | 2025-11-06T15:37:38.417Z |
| cve-2025-12560 | Blog2Social: Social Media Auto Post & Scheduler <= 8.6… |
pr-gateway |
Blog2Social: Social Media Auto Post & Scheduler |
2025-11-06T05:31:24.932Z | 2025-11-06T15:40:57.868Z | |
| cve-2025-61994 | 5.4 (v3.0) 4.8 (v4.0) | Cross-site scripting vulnerability exists in GROW… |
GROWI, Inc. |
GROWI |
2025-11-06T04:14:30.106Z | 2025-11-06T14:09:38.630Z |
| cve-2025-12563 | Blog2Social: Social Media Auto Post & Scheduler <= 8.6… |
pr-gateway |
Blog2Social: Social Media Auto Post & Scheduler |
2025-11-06T04:36:21.892Z | 2025-11-06T14:08:53.571Z | |
| cve-2025-11271 | Easy Digital Download <= 3.5.2 - Insufficient Verifica… |
smub |
Easy Digital Downloads – eCommerce Payments and Subscriptions made easy |
2025-11-06T04:36:22.463Z | 2025-11-06T15:50:35.023Z | |
| cve-2025-64480 | N/A | {'providerMetadata': {'orgId': '6abe59d8-c742-4dff-8ce8-9b0ca1073da8', 'shortName': 'fortinet', 'dateUpdated': '2025-11-06T03:55:05.652Z'}, 'rejectedReasons': [{'lang': 'en', 'value': 'Not used'}]} | N/A | N/A | 2025-11-06T03:55:05.652Z | |
| cve-2025-64479 | N/A | {'providerMetadata': {'orgId': '6abe59d8-c742-4dff-8ce8-9b0ca1073da8', 'shortName': 'fortinet', 'dateUpdated': '2025-11-06T03:55:06.294Z'}, 'rejectedReasons': [{'lang': 'en', 'value': 'Not used'}]} | N/A | N/A | 2025-11-06T03:55:06.294Z | |
| cve-2025-64478 | N/A | {'providerMetadata': {'orgId': '6abe59d8-c742-4dff-8ce8-9b0ca1073da8', 'shortName': 'fortinet', 'dateUpdated': '2025-11-06T03:55:06.796Z'}, 'rejectedReasons': [{'lang': 'en', 'value': 'Not used'}]} | N/A | N/A | 2025-11-06T03:55:06.796Z | |
| cve-2025-64477 | N/A | {'providerMetadata': {'orgId': '6abe59d8-c742-4dff-8ce8-9b0ca1073da8', 'shortName': 'fortinet', 'dateUpdated': '2025-11-06T03:55:07.255Z'}, 'rejectedReasons': [{'lang': 'en', 'value': 'Not used'}]} | N/A | N/A | 2025-11-06T03:55:07.255Z | |
| cve-2025-64476 | N/A | {'providerMetadata': {'orgId': '6abe59d8-c742-4dff-8ce8-9b0ca1073da8', 'shortName': 'fortinet', 'dateUpdated': '2025-11-06T03:55:07.823Z'}, 'rejectedReasons': [{'lang': 'en', 'value': 'Not used'}]} | N/A | N/A | 2025-11-06T03:55:07.823Z | |
| cve-2025-64475 | N/A | {'providerMetadata': {'orgId': '6abe59d8-c742-4dff-8ce8-9b0ca1073da8', 'shortName': 'fortinet', 'dateUpdated': '2025-11-06T03:55:08.310Z'}, 'rejectedReasons': [{'lang': 'en', 'value': 'Not used'}]} | N/A | N/A | 2025-11-06T03:55:08.310Z | |
| cve-2025-64474 | N/A | {'providerMetadata': {'orgId': '6abe59d8-c742-4dff-8ce8-9b0ca1073da8', 'shortName': 'fortinet', 'dateUpdated': '2025-11-06T03:55:08.778Z'}, 'rejectedReasons': [{'lang': 'en', 'value': 'Not used'}]} | N/A | N/A | 2025-11-06T03:55:08.778Z | |
| cve-2025-64473 | N/A | {'providerMetadata': {'orgId': '6abe59d8-c742-4dff-8ce8-9b0ca1073da8', 'shortName': 'fortinet', 'dateUpdated': '2025-11-06T03:55:09.228Z'}, 'rejectedReasons': [{'lang': 'en', 'value': 'Not used'}]} | N/A | N/A | 2025-11-06T03:55:09.228Z | |
| cve-2025-64472 | N/A | {'providerMetadata': {'orgId': '6abe59d8-c742-4dff-8ce8-9b0ca1073da8', 'shortName': 'fortinet', 'dateUpdated': '2025-11-06T03:55:09.707Z'}, 'rejectedReasons': [{'lang': 'en', 'value': 'Not used'}]} | N/A | N/A | 2025-11-06T03:55:09.707Z | |
| cve-2025-10691 | Easy Email Subscription <= 1.3 - Cross-Site Request Fo… |
yudiz |
Easy Email Subscription |
2025-11-06T03:27:01.882Z | 2025-11-06T17:02:19.997Z | |
| cve-2025-10683 | Easy Email Subscription <= 1.3 - Authenticated (Admin+… |
yudiz |
Easy Email Subscription |
2025-11-06T02:31:05.341Z | 2025-11-06T16:54:25.147Z | |
| cve-2025-64171 | MARIN3R: Cross-Namespace Vulnerability in the Operator |
3scale-sre |
marin3r |
2025-11-06T00:23:48.695Z | 2025-11-06T21:17:02.114Z | |
| cve-2025-64164 | DataEase is vulnerable to Oracle JNDI Injection |
dataease |
dataease |
2025-11-06T00:07:58.592Z | 2025-11-06T21:17:41.345Z | |
| cve-2025-64163 | DataEase's DB2 is vulnerable to SSRF |
dataease |
dataease |
2025-11-05T23:52:05.196Z | 2025-11-06T21:18:12.403Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-137736 | Malicious code in vera-semur4-sluey (npm) | 2025-11-11T22:56:38Z | 2025-11-11T22:56:38Z |
| mal-2025-137735 | Malicious code in vera-sate98-sluey (npm) | 2025-11-11T22:56:38Z | 2025-11-11T22:56:38Z |
| mal-2025-137734 | Malicious code in vera-sambel53-sluey (npm) | 2025-11-11T22:56:38Z | 2025-11-11T22:56:38Z |
| mal-2025-137733 | Malicious code in vera-sambel20-sluey (npm) | 2025-11-11T22:56:38Z | 2025-11-11T22:56:38Z |
| mal-2025-137732 | Malicious code in vera-sambalado17-sluey (npm) | 2025-11-11T22:56:38Z | 2025-11-11T22:56:38Z |
| mal-2025-137731 | Malicious code in vera-saguer63-sluey (npm) | 2025-11-11T22:56:38Z | 2025-11-11T22:56:38Z |
| mal-2025-137730 | Malicious code in vera-ruwet83-sluey (npm) | 2025-11-11T22:56:38Z | 2025-11-11T22:56:38Z |
| mal-2025-137729 | Malicious code in vera-ruwet47-sumpek (npm) | 2025-11-11T22:56:38Z | 2025-11-11T22:56:38Z |
| mal-2025-137728 | Malicious code in vera-rujak23-sluey (npm) | 2025-11-11T22:56:38Z | 2025-11-11T22:56:38Z |
| mal-2025-137727 | Malicious code in vera-rendang98-sluey (npm) | 2025-11-11T22:56:38Z | 2025-11-11T22:56:38Z |
| mal-2025-137726 | Malicious code in vera-rawon96-sluey (npm) | 2025-11-11T22:56:38Z | 2025-11-11T22:56:38Z |
| mal-2025-137725 | Malicious code in vera-rawon10-sluey (npm) | 2025-11-11T22:56:38Z | 2025-11-11T22:56:38Z |
| mal-2025-137724 | Malicious code in vera-rangi80-sluey (npm) | 2025-11-11T22:56:38Z | 2025-11-11T22:56:38Z |
| mal-2025-137723 | Malicious code in vera-ragi72-sluey (npm) | 2025-11-11T22:56:38Z | 2025-11-11T22:56:38Z |
| mal-2025-137722 | Malicious code in vera-peyek5-sluey (npm) | 2025-11-11T22:56:38Z | 2025-11-11T22:56:38Z |
| mal-2025-137721 | Malicious code in vera-otak-otak25-sluey (npm) | 2025-11-11T22:56:38Z | 2025-11-11T22:56:38Z |
| mal-2025-137720 | Malicious code in vera-nasipecel86-sluey (npm) | 2025-11-11T22:56:38Z | 2025-11-11T22:56:38Z |
| mal-2025-137719 | Malicious code in vera-nasi97-sluey (npm) | 2025-11-11T22:56:38Z | 2025-11-11T22:56:38Z |
| mal-2025-137718 | Malicious code in vera-nasi48-sluey (npm) | 2025-11-11T22:56:38Z | 2025-11-11T22:56:38Z |
| mal-2025-137717 | Malicious code in vera-nasi14-sluey (npm) | 2025-11-11T22:56:38Z | 2025-11-11T22:56:38Z |
| mal-2025-137716 | Malicious code in vera-naget47-sluey (npm) | 2025-11-11T22:56:38Z | 2025-11-11T22:56:38Z |
| mal-2025-137715 | Malicious code in vera-moci47-sluey (npm) | 2025-11-11T22:56:38Z | 2025-11-11T22:56:38Z |
| mal-2025-137714 | Malicious code in vera-miemee55-sluey (npm) | 2025-11-11T22:56:38Z | 2025-11-11T22:56:38Z |
| mal-2025-137713 | Malicious code in vera-miebogor61-sluey (npm) | 2025-11-11T22:56:38Z | 2025-11-11T22:56:38Z |
| mal-2025-137712 | Malicious code in vera-lapis78-sluey (npm) | 2025-11-11T22:56:38Z | 2025-11-11T22:56:38Z |
| mal-2025-137711 | Malicious code in vera-kupang100-sluey (npm) | 2025-11-11T22:56:38Z | 2025-11-11T22:56:38Z |
| mal-2025-137710 | Malicious code in vera-kue36-sluey (npm) | 2025-11-11T22:56:38Z | 2025-11-11T22:56:38Z |
| mal-2025-137709 | Malicious code in vera-kripik87-sluey (npm) | 2025-11-11T22:56:38Z | 2025-11-11T22:56:38Z |
| mal-2025-137708 | Malicious code in vera-kolak42-sluey (npm) | 2025-11-11T22:56:38Z | 2025-11-11T22:56:38Z |
| mal-2025-137707 | Malicious code in vera-klipo96-sluey (npm) | 2025-11-11T22:56:38Z | 2025-11-11T22:56:38Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:13933 | Red Hat Security Advisory: OpenShift Container Platform 4.19.9 bug fix and security update | 2025-08-20T07:12:19+00:00 | 2025-11-06T23:42:03+00:00 |
| rhsa-2025:14130 | Red Hat Security Advisory: libarchive security update | 2025-08-20T06:37:09+00:00 | 2025-11-11T16:23:06+00:00 |
| rhsa-2025:14127 | Red Hat Security Advisory: pki-deps:10.6 security update | 2025-08-20T04:16:28+00:00 | 2025-11-07T20:55:52+00:00 |
| rhsa-2025:14126 | Red Hat Security Advisory: pki-deps:10.6 security update | 2025-08-20T02:02:58+00:00 | 2025-11-07T20:55:51+00:00 |
| rhsa-2025:14118 | Red Hat Security Advisory: pki-deps:10.6 security update | 2025-08-20T00:25:33+00:00 | 2025-11-07T20:55:51+00:00 |
| rhsa-2025:14117 | Red Hat Security Advisory: pki-deps:10.6 security update | 2025-08-20T00:22:33+00:00 | 2025-11-07T20:55:54+00:00 |
| rhsa-2025:14116 | Red Hat Security Advisory: pki-deps:10.6 security update | 2025-08-20T00:18:41+00:00 | 2025-11-07T20:55:51+00:00 |
| rhsa-2025:13848 | Red Hat Security Advisory: OpenShift Container Platform 4.19.9 bug fix and security update | 2025-08-19T18:53:28+00:00 | 2025-11-11T20:39:00+00:00 |
| rhsa-2025:13849 | Red Hat Security Advisory: OpenShift Container Platform 4.19.9 security and extras update | 2025-08-19T18:04:34+00:00 | 2025-11-06T22:56:26+00:00 |
| rhsa-2025:14101 | Red Hat Security Advisory: mingw-sqlite security update | 2025-08-19T15:29:57+00:00 | 2025-11-11T20:30:05+00:00 |
| rhsa-2025:14008 | Red Hat Security Advisory: Red Hat build of Quarkus 3.20.2.SP1 security update | 2025-08-19T13:50:46+00:00 | 2025-11-07T20:55:50+00:00 |
| rhsa-2025:14004 | Red Hat Security Advisory: Red Hat build of Quarkus 3.15.6.SP1 security update | 2025-08-19T13:50:26+00:00 | 2025-11-07T20:55:50+00:00 |
| rhsa-2025:14093 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2025-08-19T13:27:32+00:00 | 2025-11-06T23:42:05+00:00 |
| rhsa-2025:14094 | Red Hat Security Advisory: kernel-rt security update | 2025-08-19T13:19:03+00:00 | 2025-11-11T20:29:55+00:00 |
| rhsa-2025:14090 | Red Hat Security Advisory: Red Hat Developer Hub 1.7.0 release. | 2025-08-19T11:33:06+00:00 | 2025-11-11T20:39:02+00:00 |
| rhsa-2025:14082 | Red Hat Security Advisory: kernel security update | 2025-08-19T09:59:36+00:00 | 2025-11-11T16:23:06+00:00 |
| rhsa-2025:14054 | Red Hat Security Advisory: kernel security update | 2025-08-19T00:21:45+00:00 | 2025-11-11T20:29:58+00:00 |
| rhsa-2025:14048 | Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 10.19 product release | 2025-08-18T21:34:48+00:00 | 2025-11-11T20:39:01+00:00 |
| rhsa-2025:13962 | Red Hat Security Advisory: kernel security update | 2025-08-18T15:01:34+00:00 | 2025-11-11T16:17:43+00:00 |
| rhsa-2025:14009 | Red Hat Security Advisory: kernel security update | 2025-08-18T14:11:49+00:00 | 2025-11-11T11:27:22+00:00 |
| rhsa-2025:14005 | Red Hat Security Advisory: kernel-rt security update | 2025-08-18T12:14:54+00:00 | 2025-11-11T20:30:05+00:00 |
| rhsa-2025:14003 | Red Hat Security Advisory: kernel security update | 2025-08-18T12:00:00+00:00 | 2025-11-11T20:31:17+00:00 |
| rhsa-2025:13960 | Red Hat Security Advisory: kernel security update | 2025-08-18T02:54:38+00:00 | 2025-11-11T12:54:43+00:00 |
| rhsa-2025:13961 | Red Hat Security Advisory: kernel-rt security update | 2025-08-18T02:50:08+00:00 | 2025-11-11T12:54:43+00:00 |
| rhsa-2025:13946 | Red Hat Security Advisory: kernel security update | 2025-08-18T01:48:53+00:00 | 2025-11-11T20:30:04+00:00 |
| rhsa-2025:13947 | Red Hat Security Advisory: rsync security update | 2025-08-18T01:20:03+00:00 | 2025-11-08T04:24:27+00:00 |
| rhsa-2025:13935 | Red Hat Security Advisory: golang security update | 2025-08-18T00:53:52+00:00 | 2025-11-11T20:38:59+00:00 |
| rhsa-2025:13940 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2025-08-18T00:52:32+00:00 | 2025-11-06T23:42:04+00:00 |
| rhsa-2025:13941 | Red Hat Security Advisory: golang security update | 2025-08-18T00:42:23+00:00 | 2025-11-11T20:39:00+00:00 |
| rhsa-2025:13936 | Red Hat Security Advisory: golang security update | 2025-08-18T00:31:32+00:00 | 2025-11-06T23:42:04+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-38331 | net: ethernet: cortina: Use TOE/TSO on all TCP | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38330 | firmware: cs_dsp: Fix OOB memory read access in KUnit test (ctl cache) | 2025-07-02T00:00:00.000Z | 2025-09-04T02:05:31.000Z |
| msrc_cve-2025-38329 | firmware: cs_dsp: Fix OOB memory read access in KUnit test (wmfw info) | 2025-07-02T00:00:00.000Z | 2025-09-04T01:01:28.000Z |
| msrc_cve-2025-38328 | jffs2: check jffs2_prealloc_raw_node_refs() result in few other places | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38326 | aoe: clean device rq_list in aoedev_downdev() | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38324 | mpls: Use rcu_dereference_rtnl() in mpls_route_input_rcu(). | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38323 | net: atm: add lec_mutex | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38321 | smb: Log an error when close_all_cached_dirs fails | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38320 | arm64/ptrace: Fix stack-out-of-bounds read in regs_get_kernel_stack_nth() | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38319 | drm/amd/pp: Fix potential NULL pointer dereference in atomctrl_initialize_mc_reg_table | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38313 | bus: fsl-mc: fix double-free on mc_dev | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38312 | fbdev: core: fbcvt: avoid division by 0 in fb_cvt_hperiod() | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38311 | iavf: get rid of the crit lock | 2025-07-02T00:00:00.000Z | 2025-09-03T21:51:11.000Z |
| msrc_cve-2025-38310 | seg6: Fix validation of nexthop addresses | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38307 | ASoC: Intel: avs: Verify content returned by parse_int_array() | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38305 | ptp: remove ptp->n_vclocks check logic in ptp_vclock_in_use() | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38304 | Bluetooth: Fix NULL pointer deference on eir_get_service_data | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38303 | Bluetooth: eir: Fix possible crashes on eir_create_adv_data | 2025-07-02T00:00:00.000Z | 2025-09-04T01:42:05.000Z |
| msrc_cve-2025-38300 | crypto: sun8i-ce-cipher - fix error handling in sun8i_ce_cipher_prepare() | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38293 | wifi: ath11k: fix node corruption in ar->arvifs list | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38290 | wifi: ath12k: fix node corruption in ar->arvifs list | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38286 | pinctrl: at91: Fix possible out-of-boundary access | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38285 | bpf: Fix WARN() in get_bpf_raw_tp_regs | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38283 | hisi_acc_vfio_pci: bugfix live migration function without VF device driver | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38282 | kernfs: Relax constraint in draining guard | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38280 | bpf: Avoid __bpf_prog_ret0_warn when jit fails | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38279 | bpf: Do not include stack ptr register in precision backtracking bookkeeping | 2025-07-02T00:00:00.000Z | 2025-09-04T02:00:17.000Z |
| msrc_cve-2025-38278 | octeontx2-pf: QOS: Refactor TC_HTB_LEAF_DEL_LAST callback | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38277 | mtd: nand: ecc-mxic: Fix use of uninitialized variable ret | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38275 | phy: qcom-qmp-usb: Fix an NULL vs IS_ERR() bug | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2021-000027 | Multiple vulnerabilities in baserCMS | 2021-03-26T14:25+09:00 | 2021-03-26T14:25+09:00 |
| jvndb-2021-000908 | rNote vulnerable to cross-site scripting | 2021-03-25T18:14+09:00 | 2021-03-25T18:14+09:00 |
| jvndb-2021-000907 | Yomi-Search vulnerable to cross-site scripting | 2021-03-25T18:12+09:00 | 2021-03-25T18:12+09:00 |
| jvndb-2021-000906 | Yomi-Search vulnerable to cross-site scripting | 2021-03-25T18:06+09:00 | 2021-03-25T18:06+09:00 |
| jvndb-2021-000905 | Yomi-Search vulnerable to cross-site scripting | 2021-03-25T18:01+09:00 | 2021-03-25T18:01+09:00 |
| jvndb-2021-000904 | Click Ranker vulnerable to cross-site scripting | 2021-03-25T17:52+09:00 | 2021-03-25T17:52+09:00 |
| jvndb-2021-000903 | Kagemai vulnerable to cross-site request forgery | 2021-03-25T17:50+09:00 | 2021-03-25T17:50+09:00 |
| jvndb-2021-000902 | Kagemai vulnerable to cross-site scripting | 2021-03-25T17:46+09:00 | 2021-03-25T17:46+09:00 |
| jvndb-2021-000901 | Kagemai vulnerable to cross-site scripting | 2021-03-25T17:43+09:00 | 2021-03-25T17:43+09:00 |
| jvndb-2021-000900 | MagazinegerZ vulnerable to cross-site scripting | 2021-03-25T17:32+09:00 | 2021-03-25T17:32+09:00 |
| jvndb-2021-000023 | UNIVERGE Aspire series PBX vulnerable to denial-of-service (DoS) | 2021-03-22T14:57+09:00 | 2021-03-22T14:57+09:00 |
| jvndb-2021-000026 | Fuji Xerox multifunction devices and printers vulnerable to denial-of-service (DoS) | 2021-03-19T15:32+09:00 | 2021-04-12T13:30+09:00 |
| jvndb-2021-000025 | WordPress plugin "Paid Memberships Pro" vulnerable to SQL injection | 2021-03-17T16:24+09:00 | 2021-03-17T16:24+09:00 |
| jvndb-2021-000022 | Multiple vulnerabilities in Cybozu Office | 2021-03-15T15:56+09:00 | 2021-12-17T17:51+09:00 |
| jvndb-2021-000021 | M-System DL8 contains multiple vulnerabilities | 2021-03-12T15:59+09:00 | 2021-03-12T15:59+09:00 |
| jvndb-2021-000020 | Installer of MagicConnect Client program may insecurely load Dynamic Link Libraries | 2021-03-11T14:53+09:00 | 2021-03-11T14:53+09:00 |
| jvndb-2021-000019 | Multiple cross-site scripting vulnerabilities in GROWI | 2021-03-10T16:11+09:00 | 2021-03-10T16:11+09:00 |
| jvndb-2021-001123 | Multiple vulnerabilities in GROWI | 2021-03-09T14:17+09:00 | 2021-09-24T13:34+09:00 |
| jvndb-2021-001122 | Trend Micro Security (Consumer) vulnerable to code injection | 2021-03-08T17:26+09:00 | 2021-03-08T17:26+09:00 |
| jvndb-2021-000018 | The installers of E START products may insecurely load Dynamic Link Libraries | 2021-03-05T17:03+09:00 | 2023-11-16T15:41+09:00 |
| jvndb-2021-000017 | Multiple cross-site scripting vulnerabilities in Movable Type | 2021-02-24T15:20+09:00 | 2021-02-24T15:20+09:00 |
| jvndb-2021-000016 | Multiple vulnerabilities in SolarView Compact | 2021-02-19T16:44+09:00 | 2021-02-25T15:31+09:00 |
| jvndb-2021-001026 | Multiple Vulnerabilities in JP1/Automatic Operation | 2021-02-16T17:23+09:00 | 2021-02-16T17:23+09:00 |
| jvndb-2021-000015 | FileZen vulnerable to OS command injection | 2021-02-16T15:07+09:00 | 2021-03-05T17:31+09:00 |
| jvndb-2021-000014 | Calsos CSDJ fails to restrict access permissions | 2021-02-15T15:52+09:00 | 2021-02-15T15:52+09:00 |
| jvndb-2021-000013 | Wekan vulnerable to cross-site scripting | 2021-02-10T14:01+09:00 | 2021-02-10T14:01+09:00 |
| jvndb-2021-001022 | Cross-site Scripting Vulnerability in Hitachi Application Server Help | 2021-02-09T15:08+09:00 | 2021-02-09T15:08+09:00 |
| jvndb-2021-001021 | Improper access control vulnerability in JP1/IT Desktop Management 2 - Manager and JP1/NETM/Asset Information Manager | 2021-02-09T15:08+09:00 | 2021-02-09T15:08+09:00 |
| jvndb-2021-000012 | WordPress Plugin "Name Directory" vulnerable to cross-site request forgery | 2021-02-05T16:24+09:00 | 2021-02-05T16:24+09:00 |
| jvndb-2021-001017 | Trend Micro HouseCall for Home Networks (Windows Edition) may insecurely load Dynamic Link Libraries | 2021-02-04T15:42+09:00 | 2021-02-04T15:42+09:00 |
| ID | Description | Updated |
|---|