Recent vulnerabilities
| ID | Description | Published | Updated |
|---|---|---|---|
| ghsa-q4wg-4r43-jqjx | Radiometrics VizAir is vulnerable to any remote attacker via access to the admin panel of the VizAi… | 2025-11-04T18:31:58Z | 2025-11-04T18:31:58Z |
| ghsa-p4q9-wr86-5gjc | Radiometrics VizAir is vulnerable to exposure of the system's REST API key through a publicly acces… | 2025-11-04T18:31:58Z | 2025-11-04T18:31:58Z |
| ghsa-j7wh-wg9r-4cm7 | An issue was discovered in NPU in Samsung Mobile Processor Exynos through July 2025. There is an Ou… | 2025-11-04T18:31:58Z | 2025-11-04T18:31:58Z |
| ghsa-c9f7-5jg4-r3jr | codeshare v1.0.0 was discovered to contain an information leakage vulnerability. | 2025-11-04T18:31:58Z | 2025-11-04T18:31:58Z |
| ghsa-88pr-7pr7-5qgq | An issue was discovered in NPU in Samsung Mobile Processor Exynos through July 2025. There is an Un… | 2025-11-04T18:31:58Z | 2025-11-04T21:31:34Z |
| ghsa-7m2c-j2fg-jh79 | An issue was discovered in NPU in Samsung Mobile Processor Exynos through July 2025. There is an In… | 2025-11-04T18:31:58Z | 2025-11-04T21:31:34Z |
| ghsa-667f-v95m-q2xp | WorkDo HRM SaaS HR and Payroll Tool 8.1 is affected vulnerable to Insecure Permissions. An authenti… | 2025-11-04T18:31:58Z | 2025-11-04T18:31:58Z |
| ghsa-5mh8-jp8g-gm6g | An issue was discovered in NPU in Samsung Mobile Processor Exynos through July 2025. There is a NUL… | 2025-11-04T18:31:58Z | 2025-11-04T21:31:34Z |
| ghsa-4q9x-qfvm-p5xc | An issue was discovered in NAS in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 98… | 2025-11-04T18:31:58Z | 2025-11-04T18:31:58Z |
| ghsa-4p8r-c649-4cgv | Radiometrics VizAir is vulnerable to a lack of authentication mechanisms for critical functions, su… | 2025-11-04T18:31:58Z | 2025-11-04T18:31:58Z |
| ghsa-434w-5hh5-c4p5 | An issue was discovered in VTS in Samsung Mobile Processor and Wearable Processor Exynos 1080, 1280… | 2025-11-04T18:31:58Z | 2025-11-04T21:31:34Z |
| ghsa-j2pc-v64r-mv4f | Protobuf Maven Plugin protocDigest is ignored when using protoc from PATH | 2025-11-04T15:48:09Z | 2025-11-04T15:48:09Z |
| ghsa-gf93-xccm-5g6j | MARIN3R: Cross-Namespace Vulnerability in the Operator | 2025-11-04T15:43:52Z | 2025-11-06T15:30:15Z |
| ghsa-crvm-xjhm-9h29 | OctoPrint vulnerable to XSS in Action Commands Notification and Prompt | 2025-11-04T15:42:48Z | 2025-11-07T16:42:35Z |
| ghsa-4vcx-3pj3-44m7 | Dosage vulnerable to a Directory Traversal through crafted HTTP responses | 2025-11-04T15:31:48Z | 2025-11-07T16:42:26Z |
| ghsa-rcw6-v8gj-mx3j | A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability al… | 2025-11-04T15:31:37Z | 2025-11-05T17:48:28Z |
| ghsa-p84g-rm2j-x53m | The MeetingList plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin setting… | 2025-11-04T15:31:37Z | 2025-11-04T15:31:37Z |
| ghsa-fv8j-cx98-q9cc | A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability al… | 2025-11-04T15:31:37Z | 2025-11-05T17:48:28Z |
| ghsa-xr9h-fv82-7r7g | A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability al… | 2025-11-04T15:31:36Z | 2025-11-05T17:48:27Z |
| ghsa-xhrv-87p6-f9gg | A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability al… | 2025-11-04T15:31:36Z | 2025-11-05T17:48:28Z |
| ghsa-pmmx-xx77-vm2j | A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability al… | 2025-11-04T15:31:36Z | 2025-11-05T17:48:28Z |
| ghsa-h38q-9wpm-3743 | A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability al… | 2025-11-04T15:31:36Z | 2025-11-05T17:48:27Z |
| ghsa-9c27-692h-jwpm | A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability al… | 2025-11-04T15:31:36Z | 2025-11-05T17:48:27Z |
| ghsa-4frp-8mr2-877w | A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability al… | 2025-11-04T15:31:36Z | 2025-11-05T17:48:27Z |
| ghsa-2whq-82v3-86j7 | A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability al… | 2025-11-04T15:31:36Z | 2025-11-05T17:48:27Z |
| ghsa-xxx3-p74m-7mjp | A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability al… | 2025-11-04T15:31:35Z | 2025-11-05T17:48:27Z |
| ghsa-vvw2-h478-xwr3 | DSPy does not properly restrict file reads | 2025-11-04T15:31:35Z | 2025-11-04T17:05:45Z |
| ghsa-qcwf-hqpf-pxgv | A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability al… | 2025-11-04T15:31:35Z | 2025-11-05T17:48:27Z |
| ghsa-px6m-86cf-7h5m | A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability al… | 2025-11-04T15:31:35Z | 2025-11-05T17:48:27Z |
| ghsa-gqhv-vchr-9qq9 | A lack of authorisation vulnerability has been detected in CanalDenuncia.app. This vulnerability al… | 2025-11-04T15:31:35Z | 2025-11-05T17:48:27Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2025-57130 | An Incorrect Access Control vulnerability in the … |
n/a |
n/a |
2025-11-05T00:00:00.000Z | 2025-11-05T16:20:49.984Z | |
| cve-2025-56232 | N/A | GOG Galaxy 2.0.0.2 suffers from Missing SSL Certi… |
n/a |
n/a |
2025-11-05T00:00:00.000Z | 2025-11-06T21:22:57.293Z |
| cve-2025-56231 | N/A | Tonec Internet Download Manager 6.42.41.1 and ear… |
n/a |
n/a |
2025-11-05T00:00:00.000Z | 2025-11-05T20:24:57.560Z |
| cve-2025-55343 | N/A | Quipux 4.0.1 through e1774ac allows authenticated… |
n/a |
n/a |
2025-11-05T00:00:00.000Z | 2025-11-05T19:20:45.969Z |
| cve-2025-55342 | N/A | Quipux 4.0.1 through e1774ac allows enumeration o… |
n/a |
n/a |
2025-11-05T00:00:00.000Z | 2025-11-06T17:01:19.835Z |
| cve-2025-55341 | N/A | Cross Site Scripting vulnerability in Quipux 4.0.… |
n/a |
n/a |
2025-11-05T00:00:00.000Z | 2025-11-06T17:03:33.164Z |
| cve-2025-64110 | Cursor: Authentication Bypass Possible via New Cursori… |
cursor |
cursor |
2025-11-04T23:24:46.313Z | 2025-11-07T14:26:39.262Z | |
| cve-2025-64109 | Cursor CLI Beta: Command Injection via Untrusted MCP C… |
cursor |
cursor |
2025-11-04T23:09:49.147Z | 2025-11-07T14:26:45.734Z | |
| cve-2025-64108 | Cursor's Sensitive File Modification can Lead to NTFS … |
cursor |
cursor |
2025-11-04T22:58:53.745Z | 2025-11-07T14:26:51.902Z | |
| cve-2025-64107 | Cursor is Vulnerable to Path Manipulation Using Backsl… |
cursor |
cursor |
2025-11-04T22:51:42.609Z | 2025-11-07T14:26:57.543Z | |
| cve-2025-59596 | 6 (v4.0) | CVE-2025-59596 is a denial-of-service vulnerabili… |
Absolute Security |
Secure Access |
2025-11-04T22:51:31.244Z | 2025-11-05T14:18:58.843Z |
| cve-2025-64106 | Cursor: Speedbump Modal Bypass in MCP Server Deep-Link |
cursor |
cursor |
2025-11-04T22:48:14.832Z | 2025-11-05T18:47:55.509Z | |
| cve-2025-59595 | 8.2 (v4.0) | CVE-2025-59595 is an internally discovered denial… |
Absolute |
Secure Access |
2025-11-04T22:46:38.884Z | 2025-11-04T22:57:45.870Z |
| cve-2025-62722 | LinkAce: Stored XSS Vulnerability in Link Title Field … |
Kovah |
LinkAce |
2025-11-04T22:31:46.582Z | 2025-11-05T18:48:01.239Z | |
| cve-2025-62721 | LinkAce: Authorization Bypass Allows Unauthorized Acce… |
Kovah |
LinkAce |
2025-11-04T22:07:09.103Z | 2025-11-05T18:48:07.596Z | |
| cve-2025-62720 | LinkAce: Data Exfiltration via Export Functions Allow … |
Kovah |
LinkAce |
2025-11-04T22:03:09.147Z | 2025-11-05T18:48:12.856Z | |
| cve-2025-62719 | LinkAce: Limited Server-Side Request Forgery (SSRF) in… |
Kovah |
LinkAce |
2025-11-04T21:57:15.828Z | 2025-11-05T18:48:18.084Z | |
| cve-2025-54526 | 7.8 (v3.1) 8.4 (v4.0) | Fuji Electric Monitouch V-SFT-6 Stack-based Buffer Overflow |
Fuji Electric |
Monitouch V-SFT-6 |
2025-11-04T21:37:56.067Z | 2025-11-04T21:46:06.843Z |
| cve-2025-62715 | ClipBucket v5: Stored XSS via Collection Tags |
MacWarrior |
clipbucket-v5 |
2025-11-04T21:37:32.650Z | 2025-11-04T21:45:26.091Z | |
| cve-2025-54496 | 7.8 (v3.1) 8.4 (v4.0) | Fuji Electric Monitouch V-SFT-6 Heap-based Buffer Overflow |
Fuji Electric |
Monitouch V-SFT-6 |
2025-11-04T21:36:46.018Z | 2025-11-04T21:46:35.254Z |
| cve-2025-62520 | MantisBT unauthorized disclosure of private project co… |
mantisbt |
mantisbt |
2025-11-04T21:31:13.261Z | 2025-11-04T21:48:13.191Z | |
| cve-2025-62507 | Redis: Bug in XACKDEL may lead to stack overflow and p… |
redis |
redis |
2025-11-04T21:24:44.802Z | 2025-11-06T04:55:34.815Z | |
| cve-2025-62369 | Xibo CMS: Remote Code Execution through module templates |
xibosignage |
xibo-cms |
2025-11-04T21:18:38.880Z | 2025-11-05T14:29:33.887Z | |
| cve-2025-55155 | MantisBT: Authentication bypass for some passwords due… |
mantisbt |
mantisbt |
2025-11-04T20:48:03.428Z | 2025-11-04T21:03:12.088Z | |
| cve-2025-48884 | Galette is vulnerable to XSS through Document Type |
galette |
galette |
2025-11-04T20:44:29.193Z | 2025-11-04T21:03:39.940Z | |
| cve-2025-48076 | Galette is vulnerable to Cross-site Scripting |
galette |
galette |
2025-11-04T20:40:09.121Z | 2025-11-04T21:04:06.991Z | |
| cve-2025-47776 | MantisBT: Authentication bypass for some passwords due… |
mantisbt |
mantisbt |
2025-11-04T20:31:01.759Z | 2025-11-05T18:48:23.378Z | |
| cve-2025-32786 | GLPI Inventory Plugin is Vulnerable to Unauthenticated… |
glpi-project |
glpi-inventory-plugin |
2025-11-04T20:18:43.581Z | 2025-11-05T18:48:29.572Z | |
| cve-2025-23358 | 8.2 (v3.1) | NVIDIA NVApp for Windows contains a vulnerability… |
NVIDIA |
NVApp |
2025-11-04T19:47:35.156Z | 2025-11-05T04:55:51.900Z |
| cve-2025-33176 | 6.2 (v3.1) | NVIDIA RunAI for all platforms contains a vulnera… |
NVIDIA |
RunAI |
2025-11-04T19:46:41.310Z | 2025-11-04T20:10:14.826Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2025-21079 | 7.1 (v3.1) | Improper input validation in Samsung Members prio… |
Samsung Mobile |
Samsung Members |
2025-11-05T05:41:01.576Z | 2025-11-05T17:09:18.091Z |
| cve-2025-21078 | 8.8 (v3.1) | Use of insufficiently random value of secretKey i… |
Samsung Mobile |
Smart Switch |
2025-11-05T05:41:00.294Z | 2025-11-06T04:55:33.954Z |
| cve-2025-21077 | 3.3 (v3.1) | Improper input validation in Samsung Email prior … |
Samsung Mobile |
Samsung Email |
2025-11-05T05:40:58.968Z | 2025-11-07T14:26:08.837Z |
| cve-2025-21076 | 5.5 (v3.1) | Improper handling of insufficient permissions or … |
Samsung Mobile |
Samsung Account |
2025-11-05T05:40:57.790Z | 2025-11-07T14:26:14.798Z |
| cve-2025-21075 | 4.3 (v3.1) | Out-of-bounds write in libimagecodec.quram.so pri… |
Samsung Mobile |
Samsung Mobile Devices |
2025-11-05T05:40:55.557Z | 2025-11-07T14:26:20.469Z |
| cve-2025-21074 | 4.3 (v3.1) | Out-of-bounds read in libimagecodec.quram.so prio… |
Samsung Mobile |
Samsung Mobile Devices |
2025-11-05T05:40:54.365Z | 2025-11-05T05:40:54.365Z |
| cve-2025-21073 | 6.8 (v3.1) | Insecure default configuration in USB connection … |
Samsung Mobile |
Samsung Mobile Devices |
2025-11-05T05:40:53.213Z | 2025-11-05T05:40:53.213Z |
| cve-2025-21071 | 5.7 (v3.1) | Out-of-bounds write in handling opcode in fingerp… |
Samsung Mobile |
Samsung Mobile Devices |
2025-11-05T05:40:51.956Z | 2025-11-06T04:55:33.154Z |
| cve-2025-11749 | AI Engine <= 3.1.3 - Unauthenticated Sensitive Informa… |
tigroumeow |
AI Engine |
2025-11-05T05:31:25.156Z | 2025-11-05T14:39:43.748Z | |
| cve-2025-11072 | N/A | Download Counter Button <= 1.8.6.7 - Unauthenticated A… |
Unknown |
MelAbu WP Download Counter Button |
2025-11-05T06:00:07.091Z | 2025-11-05T18:36:44.703Z |
| cve-2025-10873 | N/A | Elementinvader Addons for Elementor < 1.4.1 – Unauthen… |
Unknown |
ElementInvader Addons for Elementor |
2025-11-05T06:00:06.600Z | 2025-11-05T18:38:43.461Z |
| cve-2025-10567 | N/A | FunnelKit < 3.12.0.1 - Reflected XSS |
Unknown |
FunnelKit |
2025-11-05T06:00:02.503Z | 2025-11-05T18:45:38.517Z |
| cve-2025-12197 | The Events Calendar 6.15.1.1 - 6.15.9 - Unauthenticate… |
stellarwp |
The Events Calendar |
2025-11-05T04:36:58.788Z | 2025-11-05T14:39:57.142Z | |
| cve-2025-11162 | Spectra <= 2.19.14 - Authenticated (Contributor+) Stor… |
brainstormforce |
Spectra Gutenberg Blocks – Website Builder for the Block Editor |
2025-11-05T04:36:58.130Z | 2025-11-05T18:47:49.874Z | |
| cve-2025-64455 | N/A | {'providerMetadata': {'orgId': '6abe59d8-c742-4dff-8ce8-9b0ca1073da8', 'shortName': 'fortinet', 'dateUpdated': '2025-11-05T03:55:05.246Z'}, 'rejectedReasons': [{'lang': 'en', 'value': 'Not used'}]} | N/A | N/A | 2025-11-05T03:55:05.246Z | |
| cve-2025-64454 | N/A | {'providerMetadata': {'orgId': '6abe59d8-c742-4dff-8ce8-9b0ca1073da8', 'shortName': 'fortinet', 'dateUpdated': '2025-11-05T03:55:05.883Z'}, 'rejectedReasons': [{'lang': 'en', 'value': 'Not used'}]} | N/A | N/A | 2025-11-05T03:55:05.883Z | |
| cve-2025-64453 | N/A | {'providerMetadata': {'orgId': '6abe59d8-c742-4dff-8ce8-9b0ca1073da8', 'shortName': 'fortinet', 'dateUpdated': '2025-11-05T03:55:06.364Z'}, 'rejectedReasons': [{'lang': 'en', 'value': 'Not used'}]} | N/A | N/A | 2025-11-05T03:55:06.364Z | |
| cve-2025-64452 | N/A | {'providerMetadata': {'orgId': '6abe59d8-c742-4dff-8ce8-9b0ca1073da8', 'shortName': 'fortinet', 'dateUpdated': '2025-11-05T03:55:06.849Z'}, 'rejectedReasons': [{'lang': 'en', 'value': 'Not used'}]} | N/A | N/A | 2025-11-05T03:55:06.849Z | |
| cve-2025-64451 | N/A | {'providerMetadata': {'orgId': '6abe59d8-c742-4dff-8ce8-9b0ca1073da8', 'shortName': 'fortinet', 'dateUpdated': '2025-11-05T03:55:07.339Z'}, 'rejectedReasons': [{'lang': 'en', 'value': 'Not used'}]} | N/A | N/A | 2025-11-05T03:55:07.339Z | |
| cve-2025-64450 | N/A | {'providerMetadata': {'orgId': '6abe59d8-c742-4dff-8ce8-9b0ca1073da8', 'shortName': 'fortinet', 'dateUpdated': '2025-11-05T03:55:07.816Z'}, 'rejectedReasons': [{'lang': 'en', 'value': 'Not used'}]} | N/A | N/A | 2025-11-05T03:55:07.816Z | |
| cve-2025-64449 | N/A | {'providerMetadata': {'orgId': '6abe59d8-c742-4dff-8ce8-9b0ca1073da8', 'shortName': 'fortinet', 'dateUpdated': '2025-11-05T03:55:08.291Z'}, 'rejectedReasons': [{'lang': 'en', 'value': 'Not used'}]} | N/A | N/A | 2025-11-05T03:55:08.291Z | |
| cve-2025-64448 | N/A | {'providerMetadata': {'orgId': '6abe59d8-c742-4dff-8ce8-9b0ca1073da8', 'shortName': 'fortinet', 'dateUpdated': '2025-11-05T03:55:08.764Z'}, 'rejectedReasons': [{'lang': 'en', 'value': 'Not used'}]} | N/A | N/A | 2025-11-05T03:55:08.764Z | |
| cve-2025-12580 | SMS for WordPress <= 1.1.8 - Reflected Cross-Site Scripting |
stanleychoi |
SMS for WordPress |
2025-11-05T03:27:56.949Z | 2025-11-07T14:26:33.712Z | |
| cve-2025-11835 | Paid Membership Subscriptions – Effortless Memberships… |
cozmoslabs |
Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction |
2025-11-05T03:27:57.526Z | 2025-11-07T14:26:27.092Z | |
| cve-2025-8871 | Everest Forms (Pro) <= 1.9.7 - Unauthenticated PHP Obj… |
WPEverest |
Everest Forms Pro |
2025-11-05T02:25:52.044Z | 2025-11-05T18:56:40.395Z | |
| cve-2025-12582 | Features <= 0.0.2 - Missing Authorization to Authentic… |
klicher |
Features |
2025-11-05T02:25:52.638Z | 2025-11-05T18:57:22.260Z | |
| cve-2025-12735 | CVE-2025-12735 |
silentmatt |
expr-eval |
2025-11-05T00:22:55.297Z | 2025-11-10T14:07:11.995Z | |
| cve-2025-64110 | Cursor: Authentication Bypass Possible via New Cursori… |
cursor |
cursor |
2025-11-04T23:24:46.313Z | 2025-11-07T14:26:39.262Z | |
| cve-2025-64109 | Cursor CLI Beta: Command Injection via Untrusted MCP C… |
cursor |
cursor |
2025-11-04T23:09:49.147Z | 2025-11-07T14:26:45.734Z | |
| cve-2025-64108 | Cursor's Sensitive File Modification can Lead to NTFS … |
cursor |
cursor |
2025-11-04T22:58:53.745Z | 2025-11-07T14:26:51.902Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-148998 | Malicious code in update-kinetic-comet-chariklo (npm) | 2025-11-12T04:29:11Z | 2025-11-12T04:29:11Z |
| mal-2025-148997 | Malicious code in update-halley-framework-auriga (npm) | 2025-11-12T04:29:11Z | 2025-11-12T04:29:11Z |
| mal-2025-148996 | Malicious code in update-ganymede-typeorm-nextjs (npm) | 2025-11-12T04:29:11Z | 2025-11-12T04:29:11Z |
| mal-2025-148995 | Malicious code in update-dynamo-cypress-karma (npm) | 2025-11-12T04:29:11Z | 2025-11-12T04:29:11Z |
| mal-2025-148994 | Malicious code in update-config-mui-corvus (npm) | 2025-11-12T04:29:11Z | 2025-11-12T04:29:11Z |
| mal-2025-148993 | Malicious code in update-child-process-xerxes-postcss (npm) | 2025-11-12T04:29:11Z | 2025-11-12T04:29:11Z |
| mal-2025-148992 | Malicious code in update-chai-non-blocking-jwt (npm) | 2025-11-12T04:29:11Z | 2025-11-12T04:29:11Z |
| mal-2025-148991 | Malicious code in update-blitz-karma-auth (npm) | 2025-11-12T04:29:11Z | 2025-11-12T04:29:11Z |
| mal-2025-148990 | Malicious code in update-await-uninstall-testcafe (npm) | 2025-11-12T04:29:11Z | 2025-11-12T04:29:11Z |
| mal-2025-148989 | Malicious code in update-airbnb-dione-superagent (npm) | 2025-11-12T04:29:11Z | 2025-11-12T04:29:11Z |
| mal-2025-148988 | Malicious code in unuk-vuepress-sagitta-taurus (npm) | 2025-11-12T04:29:11Z | 2025-11-12T04:29:11Z |
| mal-2025-148987 | Malicious code in unuk-sirius-quantum-process (npm) | 2025-11-12T04:29:11Z | 2025-11-12T04:29:11Z |
| mal-2025-148986 | Malicious code in unuk-sedna-cross-env-xanadu (npm) | 2025-11-12T04:29:11Z | 2025-11-12T04:29:11Z |
| mal-2025-148985 | Malicious code in unuk-schema-cross-env-browserify (npm) | 2025-11-12T04:29:11Z | 2025-11-12T04:29:11Z |
| mal-2025-148984 | Malicious code in unuk-sass-loader-nuxtjs-buffer (npm) | 2025-11-12T04:29:11Z | 2025-11-12T04:29:11Z |
| mal-2025-148983 | Malicious code in unuk-parcel-antd-elektra (npm) | 2025-11-12T04:29:11Z | 2025-11-12T04:29:11Z |
| mal-2025-148982 | Malicious code in unuk-nightwatch-levels-neptune (npm) | 2025-11-12T04:29:11Z | 2025-11-12T04:29:11Z |
| mal-2025-148981 | Malicious code in unuk-iota-zenith-html-webpack-plugin (npm) | 2025-11-12T04:29:11Z | 2025-11-12T04:29:11Z |
| mal-2025-148980 | Malicious code in unuk-halley-taurus-yakutsk (npm) | 2025-11-12T04:29:11Z | 2025-11-12T04:29:11Z |
| mal-2025-148979 | Malicious code in unuk-despina-webdriver-manager-markdown-pdf (npm) | 2025-11-12T04:29:11Z | 2025-11-12T04:29:11Z |
| mal-2025-148978 | Malicious code in unuk-deneb-meteor-quantum (npm) | 2025-11-12T04:29:11Z | 2025-11-12T04:29:11Z |
| mal-2025-148977 | Malicious code in unuk-chariklo-pm2-tool (npm) | 2025-11-12T04:29:11Z | 2025-11-12T04:29:11Z |
| mal-2025-148976 | Malicious code in unuk-avior-hugo-perseus (npm) | 2025-11-12T04:29:11Z | 2025-11-12T04:29:11Z |
| mal-2025-148975 | Malicious code in unuk-apollo-spectron-webdriver-izar (npm) | 2025-11-12T04:29:11Z | 2025-11-12T04:29:11Z |
| mal-2025-148974 | Malicious code in uninstall-zephyr-publish-aether (npm) | 2025-11-12T04:29:11Z | 2025-11-12T04:29:11Z |
| mal-2025-148973 | Malicious code in uninstall-yildun-corvus-hermes (npm) | 2025-11-12T04:29:11Z | 2025-11-12T04:29:11Z |
| mal-2025-148972 | Malicious code in uninstall-xanadu-weywot-hapi (npm) | 2025-11-12T04:29:11Z | 2025-11-12T04:29:11Z |
| mal-2025-148971 | Malicious code in uninstall-sync-apex-event (npm) | 2025-11-12T04:29:11Z | 2025-11-12T04:29:11Z |
| mal-2025-148970 | Malicious code in uninstall-sedna-config-helios (npm) | 2025-11-12T04:29:11Z | 2025-11-12T04:29:11Z |
| mal-2025-148969 | Malicious code in uninstall-sass-loader-pegasus-weywot (npm) | 2025-11-12T04:29:11Z | 2025-11-12T04:29:11Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:13274 | Red Hat Security Advisory: Red Hat AMQ Broker 7.13.1 release and security update | 2025-08-06T16:17:31+00:00 | 2025-11-11T16:22:30+00:00 |
| rhsa-2025:13267 | Red Hat Security Advisory: A Subscription Management tool for finding and reporting Red Hat product usage | 2025-08-06T15:26:03+00:00 | 2025-11-11T16:23:02+00:00 |
| rhsa-2025:13240 | Red Hat Security Advisory: glibc security update | 2025-08-06T13:49:57+00:00 | 2025-11-06T23:41:56+00:00 |
| rhsa-2025:13241 | Red Hat Security Advisory: Production - Logging for Red Hat OpenShift | 2025-08-06T13:12:09+00:00 | 2025-11-11T20:38:56+00:00 |
| rhsa-2025:13234 | Red Hat Security Advisory: python-requests security update | 2025-08-06T12:39:07+00:00 | 2025-11-11T13:20:48+00:00 |
| rhsa-2025:13203 | Red Hat Security Advisory: libxml2 security update | 2025-08-06T11:45:18+00:00 | 2025-11-06T23:14:37+00:00 |
| rhsa-2025:13135 | Red Hat Security Advisory: kernel security update | 2025-08-06T08:01:36+00:00 | 2025-11-11T11:27:23+00:00 |
| rhsa-2025:13120 | Red Hat Security Advisory: kernel security update | 2025-08-06T05:19:46+00:00 | 2025-11-11T11:27:20+00:00 |
| rhsa-2025:13104 | Red Hat Security Advisory: python-cryptography security update | 2025-08-06T00:50:00+00:00 | 2025-11-06T23:05:40+00:00 |
| rhsa-2025:13099 | Red Hat Security Advisory: kernel security update | 2025-08-06T00:46:00+00:00 | 2025-11-06T23:14:36+00:00 |
| rhsa-2025:13103 | Red Hat Security Advisory: python-cryptography security update | 2025-08-06T00:44:36+00:00 | 2025-11-06T23:05:40+00:00 |
| rhsa-2025:13100 | Red Hat Security Advisory: python-cryptography security update | 2025-08-06T00:41:10+00:00 | 2025-11-06T23:05:39+00:00 |
| rhsa-2025:13101 | Red Hat Security Advisory: python-cryptography security update | 2025-08-06T00:40:36+00:00 | 2025-11-06T23:05:39+00:00 |
| rhsa-2025:13102 | Red Hat Security Advisory: python-cryptography security update | 2025-08-06T00:30:05+00:00 | 2025-11-06T23:05:45+00:00 |
| rhsa-2025:13098 | Red Hat Security Advisory: python-cryptography security update | 2025-08-06T00:27:56+00:00 | 2025-11-06T23:05:39+00:00 |
| rhsa-2025:13061 | Red Hat Security Advisory: kernel security update | 2025-08-05T18:01:14+00:00 | 2025-11-11T11:27:20+00:00 |
| rhsa-2025:13030 | Red Hat Security Advisory: kernel security update | 2025-08-05T15:58:14+00:00 | 2025-11-11T11:27:20+00:00 |
| rhsa-2025:13029 | Red Hat Security Advisory: kernel-rt security update | 2025-08-05T15:50:24+00:00 | 2025-11-11T11:27:19+00:00 |
| rhsa-2025:12980 | Red Hat Security Advisory: glibc security update | 2025-08-05T11:30:34+00:00 | 2025-11-06T23:41:55+00:00 |
| rhsa-2025:12976 | Red Hat Security Advisory: kpatch-patch-5_14_0-570_17_1 security update | 2025-08-05T11:17:29+00:00 | 2025-11-11T08:42:59+00:00 |
| rhsa-2025:12977 | Red Hat Security Advisory: kpatch-patch-5_14_0-427_13_1, kpatch-patch-5_14_0-427_31_1, kpatch-patch-5_14_0-427_44_1, kpatch-patch-5_14_0-427_55_1, and kpatch-patch-5_14_0-427_68_2 security update | 2025-08-05T11:01:54+00:00 | 2025-11-11T08:43:01+00:00 |
| rhsa-2025:12929 | Red Hat Security Advisory: unbound security update | 2025-08-05T08:17:28+00:00 | 2025-11-06T23:41:55+00:00 |
| rhsa-2025:12904 | Red Hat Security Advisory: sqlite security update | 2025-08-05T07:29:23+00:00 | 2025-11-12T02:19:23+00:00 |
| rhsa-2025:12905 | Red Hat Security Advisory: sqlite security update | 2025-08-05T06:51:48+00:00 | 2025-11-12T02:19:22+00:00 |
| rhsa-2025:12901 | Red Hat Security Advisory: sqlite security update | 2025-08-05T06:41:18+00:00 | 2025-11-12T02:19:23+00:00 |
| rhsa-2025:12876 | Red Hat Security Advisory: ncurses security update | 2025-08-05T06:37:33+00:00 | 2025-11-11T11:41:38+00:00 |
| rhsa-2025:12892 | Red Hat Security Advisory: redis:7 security update | 2025-08-05T06:37:08+00:00 | 2025-11-11T16:23:00+00:00 |
| rhba-2025:12877 | Red Hat Bug Fix Advisory: linux-firmware bug fix and enhancement update | 2025-08-05T05:31:58+00:00 | 2025-11-11T16:17:35+00:00 |
| rhsa-2025:12838 | Red Hat Security Advisory: mod_security security update | 2025-08-05T05:10:38+00:00 | 2025-11-08T07:16:55+00:00 |
| rhsa-2025:12841 | Red Hat Security Advisory: gdk-pixbuf2 security update | 2025-08-05T04:29:12+00:00 | 2025-11-07T18:35:42+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-38131 | coresight: prevent deactivate active config while enabling the config | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38129 | page_pool: Fix use-after-free in page_pool_recycle_in_ring | 2025-07-02T00:00:00.000Z | 2025-09-04T00:59:07.000Z |
| msrc_cve-2025-38127 | ice: fix Tx scheduler error handling in XDP callback | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38126 | net: stmmac: make sure that ptp_rate is not 0 before configuring timestamping | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38125 | net: stmmac: make sure that ptp_rate is not 0 before configuring EST | 2025-07-02T00:00:00.000Z | 2025-09-04T00:50:18.000Z |
| msrc_cve-2025-38123 | net: wwan: t7xx: Fix napi rx poll issue | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38122 | gve: add missing NULL check for gve_alloc_pending_packet() in TX DQO | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38119 | scsi: core: ufs: Fix a hang in the error handler | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38118 | Bluetooth: MGMT: Fix UAF on mgmt_remove_adv_monitor_complete | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38117 | Bluetooth: MGMT: Protect mgmt_pending list with its own lock | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38115 | net_sched: sch_sfq: fix a potential crash on gso_skb handling | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38113 | ACPI: CPPC: Fix NULL pointer dereference when nosmp is used | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38112 | net: Fix TOCTOU issue in sk_is_readable() | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38111 | net/mdiobus: Fix potential out-of-bounds read/write access | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38110 | net/mdiobus: Fix potential out-of-bounds clause 45 read/write access | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38109 | net/mlx5: Fix ECVF vports unload on shutdown flow | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38108 | net_sched: red: fix a race in __red_change() | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38107 | net_sched: ets: fix a race in ets_qdisc_change() | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38105 | ALSA: usb-audio: Kill timer properly at removal | 2025-07-02T00:00:00.000Z | 2025-09-04T00:27:31.000Z |
| msrc_cve-2025-38103 | HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse() | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38102 | VMCI: fix race between vmci_host_setup_notify and vmci_ctx_unset_notify | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38100 | x86/iopl: Cure TIF_IO_BITMAP inconsistencies | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38099 | Bluetooth: Disable SCO support if READ_VOICE_SETTING is unsupported/broken | 2025-07-02T00:00:00.000Z | 2025-09-04T00:22:06.000Z |
| msrc_cve-2025-38098 | drm/amd/display: Don't treat wb connector as physical in create_validate_stream_for_sink | 2025-07-02T00:00:00.000Z | 2025-09-04T00:15:29.000Z |
| msrc_cve-2025-38097 | espintcp: remove encap socket caching to avoid reference leak | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38096 | wifi: iwlwifi: don't warn when if there is a FW error | 2025-07-02T00:00:00.000Z | 2025-09-04T02:15:10.000Z |
| msrc_cve-2025-38092 | ksmbd: use list_first_entry_or_null for opinfo_get_list() | 2025-07-02T00:00:00.000Z | 2025-08-07T00:00:00.000Z |
| msrc_cve-2025-38091 | drm/amd/display: check stream id dml21 wrapper to get plane_id | 2025-07-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-32990 | Gnutls: vulnerability in gnutls certtool template parsing | 2025-07-02T00:00:00.000Z | 2025-08-15T00:00:00.000Z |
| msrc_cve-2025-32989 | Gnutls: vulnerability in gnutls sct extension parsing | 2025-07-02T00:00:00.000Z | 2025-07-25T00:00:00.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2020-000029 | PALLET CONTROL vulnerable to arbitrary code execution | 2020-05-11T15:16+09:00 | 2020-05-11T15:16+09:00 |
| jvndb-2020-000028 | Sales Force Assistant vulnerable to cross-site scripting | 2020-04-28T15:49+09:00 | 2020-04-28T15:49+09:00 |
| jvndb-2020-000027 | Cybozu Garoon contains multiple vulnerabilities | 2020-04-28T14:48+09:00 | 2020-04-28T14:48+09:00 |
| jvndb-2020-003896 | Directory Permission Vulnerability in Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer | 2020-04-28T12:21+09:00 | 2020-04-28T12:21+09:00 |
| jvndb-2020-000026 | Multiple SHARP Android devices vulnerable to information disclosure | 2020-04-24T15:32+09:00 | 2020-04-24T15:32+09:00 |
| jvndb-2020-000025 | Toshiba Electronic Devices & Storage software registers unquoted service paths | 2020-04-20T17:13+09:00 | 2023-11-08T16:44+09:00 |
| jvndb-2020-000022 | Multiple vulnerabilities in EasyBlocks IPv6 | 2020-04-08T16:12+09:00 | 2020-04-08T16:12+09:00 |
| jvndb-2020-000024 | Joomla! plugin "AcyMailing" vulnerable to arbitrary file uploads | 2020-04-07T14:49+09:00 | 2020-04-07T14:49+09:00 |
| jvndb-2020-000021 | Multiple Yamaha network devices vulnerable to denial-of-service (DoS) | 2020-03-31T17:44+09:00 | 2020-04-01T18:38+09:00 |
| jvndb-2020-002958 | Denial-of-service (DoS) vulnerability in Mitsubishi Electric MELSOFT transmission port | 2020-03-31T13:37+09:00 | 2020-04-01T14:45+09:00 |
| jvndb-2020-000907 | WL-Enq (WEB Enquete) vulnerable to OS command injection | 2020-03-25T09:50+09:00 | 2020-03-25T09:50+09:00 |
| jvndb-2020-000906 | WL-Enq (WEB Enquete) vulnerable to cross-site scripting | 2020-03-24T18:29+09:00 | 2023-10-30T17:52+09:00 |
| jvndb-2020-000908 | Keijiban Tsumiki vulnerable to OS command injection | 2020-03-24T18:14+09:00 | 2020-03-24T18:14+09:00 |
| jvndb-2020-000900 | mailform vulnerable to cross-site scripting | 2020-03-24T18:05+09:00 | 2020-03-24T18:05+09:00 |
| jvndb-2020-000901 | mailform vulnerable to PHP code execution | 2020-03-24T17:59+09:00 | 2020-03-24T17:59+09:00 |
| jvndb-2020-000902 | Multiple vulnerabilities in Shihonkanri Plus GOOUT | 2020-03-24T17:53+09:00 | 2020-03-24T17:53+09:00 |
| jvndb-2020-000903 | Shihonkanri Plus GOOUT vulnerable to OS command injection | 2020-03-24T17:47+09:00 | 2020-03-24T17:47+09:00 |
| jvndb-2020-000904 | CuteNews vulnerable to cross-site scripting | 2020-03-24T17:42+09:00 | 2020-03-24T17:42+09:00 |
| jvndb-2020-000905 | Cute News vulnerable to PHP code execution | 2020-03-24T17:40+09:00 | 2020-03-24T17:40+09:00 |
| jvndb-2020-002278 | Cross-site Scripting Vulnerability in JP1/Performance Management - Manager [Web Console] | 2020-03-11T14:16+09:00 | 2020-03-11T14:16+09:00 |
| jvndb-2020-002219 | Multiple Vulnerabilities in Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center | 2020-03-09T11:23+09:00 | 2020-03-09T11:23+09:00 |
| jvndb-2020-002220 | Improper LDAPS Certificate Validation in Hitachi Ops Center Common Services | 2020-03-09T11:21+09:00 | 2020-03-09T11:21+09:00 |
| jvndb-2020-000020 | Multiple vulnerabilities in OpenBlocks IoT VX2 | 2020-03-03T17:50+09:00 | 2020-03-03T17:50+09:00 |
| jvndb-2020-000019 | GRANDIT vulnerable to session management | 2020-03-02T14:39+09:00 | 2020-03-02T14:39+09:00 |
| jvndb-2019-014138 | Improper Authentication Vulnerability in RICOH printers | 2020-02-25T15:47+09:00 | 2020-02-25T15:47+09:00 |
| jvndb-2019-014137 | Improper Access Control Vulnerability in RICOH printers | 2020-02-25T15:44+09:00 | 2020-02-25T15:44+09:00 |
| jvndb-2019-014437 | Privilege escalation vulnerability in multiple RICOH printer drivers | 2020-02-25T15:29+09:00 | 2020-02-25T15:29+09:00 |
| jvndb-2019-014031 | Cross-site Request Forgery Vulnerability in RICOH printers | 2020-02-25T14:06+09:00 | 2020-02-25T14:06+09:00 |
| jvndb-2019-014136 | Information Disclosure Vulnerability in RICOH printers | 2020-02-25T14:02+09:00 | 2020-02-25T14:02+09:00 |
| jvndb-2020-000016 | Multiple OS command injection vulnerabilities in Aterm WF1200C, Aterm WG1200CR, and Aterm WG2600HS | 2020-02-19T14:39+09:00 | 2020-02-19T14:39+09:00 |
| ID | Description | Updated |
|---|