Recent vulnerabilities
| ID | Description | Published | Updated |
|---|---|---|---|
| ghsa-rwm7-f4gh-jc36 | IBM Db2 10.5.0 through 10.5.11, 11.1.0 through 11.1.4.7, 11.5.0 through 11.5.9, and 12.1.0 through … | 2025-11-07T21:31:20Z | 2025-11-07T21:31:20Z |
| ghsa-r6qj-9qxh-457g | IBM Db2 12.1.0 through 12.1.3 for Linux, UNIX and Windows (includes Db2 Connect Server) under speci… | 2025-11-07T21:31:20Z | 2025-11-07T21:31:20Z |
| ghsa-pwp3-72qh-5c9p | TechStore 1.0 is vulnerable to Cross Site Scripting (XSS) in the /search_results endpoint via the q… | 2025-11-07T21:31:20Z | 2025-11-07T21:31:20Z |
| ghsa-pp8v-2qr4-vr68 | IBM Db2 11.1.0 through 11.1.4.7, 11.5.0 through 11.5.9, and 12.1.0 through 12.1.3 for Linux, UNIX a… | 2025-11-07T21:31:20Z | 2025-11-07T21:31:20Z |
| ghsa-ghg3-c9m4-3hc2 | The chat feature in the application Sourcecodester FAQ Bot with AI Assistant v1.0 is vulnerable to … | 2025-11-07T21:31:20Z | 2025-11-07T21:31:21Z |
| ghsa-g439-3qrh-m8h2 | Improper resource management in firmware of some Solidigm DC Products may allow an attacker with lo… | 2025-11-07T21:31:20Z | 2025-11-07T21:31:20Z |
| ghsa-fw46-chhq-69jm | TechStore 1.0 is vulnerable to Cross Site Scripting (XSS) in /order_notes via the id parameter. | 2025-11-07T21:31:20Z | 2025-11-07T21:31:21Z |
| ghsa-fp6w-96c2-m2mg | IBM Db2 11.5.0 through 11.5.9, and 12.1.0 through 12.1.3 for Linux, UNIX and Windows (includes Db2 … | 2025-11-07T21:31:20Z | 2025-11-07T21:31:20Z |
| ghsa-fgjg-3fmq-57hw | IBM Db2 10.5.0 through 10.5.11, 11.1.0 through 11.1.4.7, 11.5.0 through 11.5.9, and 12.1.0 through … | 2025-11-07T21:31:20Z | 2025-11-07T21:31:20Z |
| ghsa-f857-pgq5-x3mc | IBM Db2 11.5.0 through 11.5.9, and 12.1.0 through 12.1.3 for Linux, UNIX and Windows (includes DB2 … | 2025-11-07T21:31:20Z | 2025-11-07T21:31:20Z |
| ghsa-cwqg-7p33-9wgx | IBM Db2 10.5.0 through 10.5.11, 11.1.0 through 11.1.4.7, 11.5.0 through 11.5.9, and 12.1.0 through … | 2025-11-07T21:31:20Z | 2025-11-07T21:31:20Z |
| ghsa-9fwq-22j4-xfwr | A flaw was found in the xmlSetTreeDoc() function of the libxml2 XML parsing library. This function … | 2025-11-07T21:31:20Z | 2025-11-07T21:31:21Z |
| ghsa-963h-5r4q-9xjw | IBM Db2 12.1.0 through 12.1.2 for Linux, UNIX and Windows (includes Db2 Connect Server) could allow… | 2025-11-07T21:31:20Z | 2025-11-07T21:31:20Z |
| ghsa-8qh7-rvp7-2455 | Sourcecodester Medicine Reminder App v1.0 is vulnerable to Cross-Site Scripting (XSS) in the "Medic… | 2025-11-07T21:31:20Z | 2025-11-07T21:31:21Z |
| ghsa-5p6v-m5fx-288c | IBM Db2 11.1.0 through 11.1.4.7, 11.5.0 through 11.5.9, and 12.1.0 through 12.1.3 for Linux, UNIX a… | 2025-11-07T21:31:20Z | 2025-11-07T21:31:20Z |
| ghsa-wf5f-4jwr-ppcp | Arbitrary Code Execution in pdfminer.six via Crafted PDF Input | 2025-11-07T20:52:24Z | 2025-11-07T20:52:24Z |
| ghsa-46xp-26xh-hpqh | KubeVirt Vulnerable to Arbitrary Host File Read and Write | 2025-11-07T18:46:09Z | 2025-11-07T18:46:09Z |
| ghsa-w24c-cvfw-wmxx | Cross-Site Scripting (XSS) vulnerability in SourceCodester User Account Generator 1.0 allows remote… | 2025-11-07T18:30:31Z | 2025-11-07T18:30:31Z |
| ghsa-vm2f-46xc-5jc3 | AstrBot has an arbitrary file read vulnerability in function _encode_image_bs64 | 2025-11-07T18:30:31Z | 2025-11-07T20:50:54Z |
| ghsa-rhj9-2v59-8ccx | The SourceCodester Leads Manager Tool v1.0 is vulnerable to Cross-Site Request Forgery (CSRF) attac… | 2025-11-07T18:30:31Z | 2025-11-07T18:30:31Z |
| ghsa-ggfg-472r-q46h | Cross-Site Scripting (XSS) vulnerability in SourceCodester "MatchMaster" 1.0 allows remote attacker… | 2025-11-07T18:30:31Z | 2025-11-07T18:30:31Z |
| ghsa-g79x-4qm3-4xp7 | A security flaw has been discovered in Campcodes School File Management 1.0. This affects an unknow… | 2025-11-07T18:30:31Z | 2025-11-07T18:30:31Z |
| ghsa-745r-657p-6h6w | A SQL injection vulnerability exists in the SourceCodester PQMS (Patient Queue Management System) 1… | 2025-11-07T18:30:31Z | 2025-11-07T18:30:31Z |
| ghsa-49f9-rcrj-v5wp | A maliciously crafted PRT file, when parsed through certain Autodesk products, can force a Memory C… | 2025-11-07T18:30:31Z | 2025-11-07T18:30:31Z |
| ghsa-xrj9-mw57-j34v | AstrBot contains a directory traversal vulnerability | 2025-11-07T18:30:30Z | 2025-11-07T20:49:17Z |
| ghsa-xqj2-5wmj-m7c5 | In pig-mesh In Pig version 3.8.2 and below, within the Token Management function under the System M… | 2025-11-07T18:30:30Z | 2025-11-07T21:31:20Z |
| ghsa-x34q-4vc5-pwfp | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in GE … | 2025-11-07T18:30:30Z | 2025-11-07T18:30:31Z |
| ghsa-rmvm-jpvw-wv6p | A cross-site request forgery (CSRF) vulnerability has been reported to affect QuLog Center. The rem… | 2025-11-07T18:30:30Z | 2025-11-07T18:30:30Z |
| ghsa-r4cg-5xmx-26h7 | An Open Redirect vulnerability exists in the OAuth callback handler in file onlook/apps/web/client/… | 2025-11-07T18:30:30Z | 2025-11-07T18:30:30Z |
| ghsa-pqvw-whxm-qq5j | A path traversal vulnerability has been reported to affect Qsync Central. If a remote attacker gain… | 2025-11-07T18:30:30Z | 2025-11-07T18:30:30Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2025-64433 | KubeVirt Arbitrary Container File Read |
kubevirt |
kubevirt |
2025-11-07T23:07:31.434Z | 2025-11-07T23:07:31.434Z | |
| cve-2025-64437 | KubeVirt Isolation Detection Flaw Allows Arbitrary Fil… |
kubevirt |
kubevirt |
2025-11-07T23:04:10.913Z | 2025-11-07T23:04:10.913Z | |
| cve-2025-64436 | KubeVirt Excessive Role Permissions Could Enable Unaut… |
kubevirt |
kubevirt |
2025-11-07T22:59:47.228Z | 2025-11-07T22:59:47.228Z | |
| cve-2025-64435 | KubeVirt VMI Denial-of-Service (DoS) Using Pod Impersonation |
kubevirt |
kubevirt |
2025-11-07T22:57:02.600Z | 2025-11-07T22:57:02.600Z | |
| cve-2025-64434 | KubeVirt Improper TLS Certificate Management Handling … |
kubevirt |
kubevirt |
2025-11-07T22:54:04.772Z | 2025-11-07T22:54:04.772Z | |
| cve-2025-37736 | 8.8 (v3.1) | Elastic Cloud Enterprise Improper Authorization |
Elastic |
Elastic Cloud Enterprise (ECE) |
2025-11-07T22:08:11.891Z | 2025-11-07T22:17:25.666Z |
| cve-2020-36870 | 9.2 (v4.0) | Ruijie Gateway EG & NBR Models v11.1(6)B9P1 - 11.9(4)B… |
Beijing Star-Net Ruijie Network Technology Co., Ltd. |
RG-EG1000C |
2025-11-07T21:52:55.227Z | 2025-11-07T21:52:55.227Z |
| cve-2025-12418 | 5.6 (v4.0) | Potential Denial of Service in Supported Versions of R… |
Revenera |
InstallShield |
2025-11-07T21:27:04.650Z | 2025-11-07T21:27:04.650Z |
| cve-2025-12863 | 7.5 (v3.1) | Libxml2: namespace use-after-free in xmlsettreedoc() f… |
Red Hat |
Red Hat Enterprise Linux 10 |
2025-11-07T20:59:35.021Z | 2025-11-07T21:24:25.515Z |
| cve-2025-64481 | Open redirect endpoint in Datasette |
simonw |
datasette |
2025-11-07T20:35:39.827Z | 2025-11-07T20:35:39.827Z | |
| cve-2025-12875 | mruby array.c ary_fill_exec out-of-bounds write |
n/a |
mruby |
2025-11-07T20:32:07.100Z | 2025-11-07T20:32:07.100Z | |
| cve-2025-64442 | HumHub is vulnerable to XSS through its Meta Search co… |
humhub |
humhub |
2025-11-07T20:28:20.962Z | 2025-11-07T20:44:02.514Z | |
| cve-2025-12896 | 4.4 (v3.1) | Improper resource management in firmware of some … |
Solidigm™ |
D5-P5316, D7-P5510, D7-P5520/D7-P5620, D5-P5430, D5-P5336 |
2025-11-07T20:24:11.186Z | 2025-11-07T20:40:07.108Z |
| cve-2025-12902 | 4.4 (v3.1) | Improper resource management in firmware of some … |
Solidigm™ |
D5-P5316, D5-P5430, D7-P5520/D7-P5620, D5-P5336 |
2025-11-07T20:18:02.836Z | 2025-11-07T20:41:26.017Z |
| cve-2025-64439 | LangGraph Checkpoint affected by RCE in "json" mode of… |
langchain-ai |
langgraph |
2025-11-07T20:15:21.710Z | 2025-11-07T20:21:52.610Z | |
| cve-2025-10230 | 10 (v3.1) | Samba: command injection in wins server hook script |
|
|
2025-11-07T19:42:06.624Z | 2025-11-08T04:55:22.163Z |
| cve-2025-36006 | 6.5 (v3.1) | IBM Db2 denial of service |
IBM |
Db2 |
2025-11-07T19:04:05.595Z | 2025-11-07T19:15:29.778Z |
| cve-2025-7700 | 5.3 (v3.1) | Ffmpeg: null pointer dereference in ffmpeg als decoder… |
|
|
2025-11-07T18:59:28.962Z | 2025-11-07T19:08:06.222Z |
| cve-2025-36008 | 6.5 (v3.1) | IBM Db2 denial of service |
IBM |
Db2 |
2025-11-07T18:57:09.615Z | 2025-11-07T19:10:03.557Z |
| cve-2025-36131 | 4.6 (v3.1) | IBM Db2 information disclosure |
IBM |
Db2 |
2025-11-07T18:53:45.472Z | 2025-11-07T19:06:54.110Z |
| cve-2025-36136 | 5.1 (v3.1) | IBM denial of service |
IBM |
Db2 |
2025-11-07T18:45:46.550Z | 2025-11-07T18:53:53.234Z |
| cve-2025-36185 | 6.2 (v3.1) | IBM Db2 denial of service |
IBM |
Db2 |
2025-11-07T18:40:59.591Z | 2025-11-07T18:52:26.052Z |
| cve-2025-12890 | 6.5 (v3.1) | Bluetooth: peripheral: Invalid handling of malformed c… |
zephyrproject-rtos |
Zephyr |
2025-11-07T18:40:56.266Z | 2025-11-07T18:40:56.266Z |
| cve-2025-36186 | 7.4 (v3.1) | IBM Db2 privilege escalation |
IBM |
Db2 |
2025-11-07T18:40:32.478Z | 2025-11-08T04:55:21.393Z |
| cve-2025-64432 | KubeVirt Affected by an Authentication Bypass in Kuber… |
kubevirt |
kubevirt |
2025-11-07T18:38:33.246Z | 2025-11-07T18:54:46.779Z | |
| cve-2025-33012 | 6.3 (v3.1) | IBM Db2 improper account lockout |
IBM |
Db2 |
2025-11-07T18:38:29.123Z | 2025-11-07T18:56:16.588Z |
| cve-2025-2534 | 5.3 (v3.1) | IBM Db2 denial of service |
IBM |
Db2 |
2025-11-07T18:36:49.488Z | 2025-11-07T18:56:31.224Z |
| cve-2025-36135 | 5.4 (v3.1) | IBM Sterling B2B Integrator and IBM Sterling File Gate… |
IBM |
Sterling B2B Integrator |
2025-11-07T18:26:57.845Z | 2025-11-07T18:47:27.813Z |
| cve-2024-47118 | 6.5 (v3.1) | IBM Db2 is vulnerable to a denial of service as the se… |
IBM |
Db2 |
2025-11-07T18:23:07.665Z | 2025-11-07T18:48:16.332Z |
| cve-2025-64431 | IDOR Vulnerabilities in ZITADEL's Organization API all… |
zitadel |
zitadel |
2025-11-07T18:09:25.466Z | 2025-11-07T18:29:24.551Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2025-64435 | KubeVirt VMI Denial-of-Service (DoS) Using Pod Impersonation |
kubevirt |
kubevirt |
2025-11-07T22:57:02.600Z | 2025-11-07T22:57:02.600Z | |
| cve-2025-64434 | KubeVirt Improper TLS Certificate Management Handling … |
kubevirt |
kubevirt |
2025-11-07T22:54:04.772Z | 2025-11-07T22:54:04.772Z | |
| cve-2025-64433 | KubeVirt Arbitrary Container File Read |
kubevirt |
kubevirt |
2025-11-07T23:07:31.434Z | 2025-11-07T23:07:31.434Z | |
| cve-2025-37736 | 8.8 (v3.1) | Elastic Cloud Enterprise Improper Authorization |
Elastic |
Elastic Cloud Enterprise (ECE) |
2025-11-07T22:08:11.891Z | 2025-11-07T22:17:25.666Z |
| cve-2025-63420 | N/A | A stored cross-site scripting (XSS) vulnerability… |
n/a |
n/a |
2025-11-07T00:00:00.000Z | 2025-11-07T21:20:04.341Z |
| cve-2025-60574 | N/A | A Local File Inclusion (LFI) vulnerability has be… |
n/a |
n/a |
2025-11-07T00:00:00.000Z | 2025-11-07T21:21:43.767Z |
| cve-2025-12418 | 5.6 (v4.0) | Potential Denial of Service in Supported Versions of R… |
Revenera |
InstallShield |
2025-11-07T21:27:04.650Z | 2025-11-07T21:27:04.650Z |
| cve-2020-36870 | 9.2 (v4.0) | Ruijie Gateway EG & NBR Models v11.1(6)B9P1 - 11.9(4)B… |
Beijing Star-Net Ruijie Network Technology Co., Ltd. |
RG-EG1000C |
2025-11-07T21:52:55.227Z | 2025-11-07T21:52:55.227Z |
| cve-2025-64481 | Open redirect endpoint in Datasette |
simonw |
datasette |
2025-11-07T20:35:39.827Z | 2025-11-07T20:35:39.827Z | |
| cve-2025-64442 | HumHub is vulnerable to XSS through its Meta Search co… |
humhub |
humhub |
2025-11-07T20:28:20.962Z | 2025-11-07T20:44:02.514Z | |
| cve-2025-64439 | LangGraph Checkpoint affected by RCE in "json" mode of… |
langchain-ai |
langgraph |
2025-11-07T20:15:21.710Z | 2025-11-07T20:21:52.610Z | |
| cve-2025-63544 | N/A | TechStore 1.0 is vulnerable to Cross Site Scripti… |
n/a |
n/a |
2025-11-07T00:00:00.000Z | 2025-11-07T20:28:22.998Z |
| cve-2025-63543 | N/A | TechStore 1.0 is vulnerable to Cross Site Scripti… |
n/a |
n/a |
2025-11-07T00:00:00.000Z | 2025-11-07T20:26:49.557Z |
| cve-2025-12902 | 4.4 (v3.1) | Improper resource management in firmware of some … |
Solidigm™ |
D5-P5316, D5-P5430, D7-P5520/D7-P5620, D5-P5336 |
2025-11-07T20:18:02.836Z | 2025-11-07T20:41:26.017Z |
| cve-2025-12896 | 4.4 (v3.1) | Improper resource management in firmware of some … |
Solidigm™ |
D5-P5316, D7-P5510, D7-P5520/D7-P5620, D5-P5430, D5-P5336 |
2025-11-07T20:24:11.186Z | 2025-11-07T20:40:07.108Z |
| cve-2025-12875 | mruby array.c ary_fill_exec out-of-bounds write |
n/a |
mruby |
2025-11-07T20:32:07.100Z | 2025-11-07T20:32:07.100Z | |
| cve-2025-12863 | 7.5 (v3.1) | Libxml2: namespace use-after-free in xmlsettreedoc() f… |
Red Hat |
Red Hat Enterprise Linux 10 |
2025-11-07T20:59:35.021Z | 2025-11-07T21:24:25.515Z |
| cve-2025-63640 | N/A | Sourcecodester Medicine Reminder App v1.0 is vuln… |
n/a |
n/a |
2025-11-07T00:00:00.000Z | 2025-11-07T20:04:03.155Z |
| cve-2025-63639 | N/A | The chat feature in the application Sourcecodeste… |
n/a |
n/a |
2025-11-07T00:00:00.000Z | 2025-11-07T20:05:36.270Z |
| cve-2025-63638 | N/A | Sourcecodester AI-Powered To-Do List App v1.0 is … |
n/a |
n/a |
2025-11-07T00:00:00.000Z | 2025-11-07T19:51:24.031Z |
| cve-2025-10230 | 10 (v3.1) | Samba: command injection in wins server hook script |
|
|
2025-11-07T19:42:06.624Z | 2025-11-08T04:55:22.163Z |
| cve-2025-7700 | 5.3 (v3.1) | Ffmpeg: null pointer dereference in ffmpeg als decoder… |
|
|
2025-11-07T18:59:28.962Z | 2025-11-07T19:08:06.222Z |
| cve-2025-64432 | KubeVirt Affected by an Authentication Bypass in Kuber… |
kubevirt |
kubevirt |
2025-11-07T18:38:33.246Z | 2025-11-07T18:54:46.779Z | |
| cve-2025-64431 | IDOR Vulnerabilities in ZITADEL's Organization API all… |
zitadel |
zitadel |
2025-11-07T18:09:25.466Z | 2025-11-07T18:29:24.551Z | |
| cve-2025-63717 | N/A | The change password functionality at /pet_groomin… |
n/a |
n/a |
2025-11-07T00:00:00.000Z | 2025-11-07T18:07:27.624Z |
| cve-2025-61261 | N/A | A reflected cross-site scripting (XSS) vulnerabil… |
n/a |
n/a |
2025-11-07T00:00:00.000Z | 2025-11-07T19:28:12.951Z |
| cve-2025-36186 | 7.4 (v3.1) | IBM Db2 privilege escalation |
IBM |
Db2 |
2025-11-07T18:40:32.478Z | 2025-11-08T04:55:21.393Z |
| cve-2025-36185 | 6.2 (v3.1) | IBM Db2 denial of service |
IBM |
Db2 |
2025-11-07T18:40:59.591Z | 2025-11-07T18:52:26.052Z |
| cve-2025-36136 | 5.1 (v3.1) | IBM denial of service |
IBM |
Db2 |
2025-11-07T18:45:46.550Z | 2025-11-07T18:53:53.234Z |
| cve-2025-36135 | 5.4 (v3.1) | IBM Sterling B2B Integrator and IBM Sterling File Gate… |
IBM |
Sterling B2B Integrator |
2025-11-07T18:26:57.845Z | 2025-11-07T18:47:27.813Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-49668 | Malicious code in yanti-rangi7-breki (npm) | 2025-11-09T18:30:25Z | 2025-11-09T18:30:25Z |
| mal-2025-49667 | Malicious code in yanti-pisang18-breki (npm) | 2025-11-09T18:30:25Z | 2025-11-09T18:30:25Z |
| mal-2025-49666 | Malicious code in yanti-papeda76-ruro (npm) | 2025-11-09T18:30:25Z | 2025-11-09T18:30:25Z |
| mal-2025-49665 | Malicious code in yanti-ongol-ongol16-riris (npm) | 2025-11-09T18:30:25Z | 2025-11-09T18:30:25Z |
| mal-2025-49664 | Malicious code in yanti-oblok54-sluey (npm) | 2025-11-09T18:30:25Z | 2025-11-09T18:30:25Z |
| mal-2025-49663 | Malicious code in yanti-nasiuduk44-sukiwir (npm) | 2025-11-09T18:30:25Z | 2025-11-09T18:30:25Z |
| mal-2025-49662 | Malicious code in yanti-nasi86-miaww (npm) | 2025-11-09T18:30:25Z | 2025-11-09T18:30:25Z |
| mal-2025-49661 | Malicious code in yanti-naget91-miaww (npm) | 2025-11-09T18:30:25Z | 2025-11-09T18:30:25Z |
| mal-2025-49660 | Malicious code in yanti-mie5-ruro (npm) | 2025-11-09T18:30:25Z | 2025-11-09T18:30:25Z |
| mal-2025-49659 | Malicious code in yanti-menjes75-sukiwir (npm) | 2025-11-09T18:30:25Z | 2025-11-09T18:30:25Z |
| mal-2025-49658 | Malicious code in yanti-menjes54-devapp (npm) | 2025-11-09T18:30:25Z | 2025-11-09T18:30:25Z |
| mal-2025-49657 | Malicious code in yanti-menjes32-sukiwir (npm) | 2025-11-09T18:30:25Z | 2025-11-09T18:30:25Z |
| mal-2025-49656 | Malicious code in yanti-menjes12-breki (npm) | 2025-11-09T18:30:25Z | 2025-11-09T18:30:25Z |
| mal-2025-49655 | Malicious code in yanti-mendut80-miaww (npm) | 2025-11-09T18:30:25Z | 2025-11-09T18:30:25Z |
| mal-2025-49654 | Malicious code in yanti-martabak53-breki (npm) | 2025-11-09T18:30:25Z | 2025-11-09T18:30:25Z |
| mal-2025-49653 | Malicious code in yanti-mangga91-remi (npm) | 2025-11-09T18:30:25Z | 2025-11-09T18:30:25Z |
| mal-2025-49652 | Malicious code in yanti-lumpur18-sukiwir (npm) | 2025-11-09T18:30:25Z | 2025-11-09T18:30:25Z |
| mal-2025-49651 | Malicious code in yanti-lontong53-sukiwir (npm) | 2025-11-09T18:30:25Z | 2025-11-09T18:30:25Z |
| mal-2025-49650 | Malicious code in yanti-lontong48-breki (npm) | 2025-11-09T18:30:25Z | 2025-11-09T18:30:25Z |
| mal-2025-49649 | Malicious code in yanti-lepet55-sluey (npm) | 2025-11-09T18:30:25Z | 2025-11-09T18:30:25Z |
| mal-2025-49648 | Malicious code in yanti-lengko23-riris (npm) | 2025-11-09T18:30:25Z | 2025-11-09T18:30:25Z |
| mal-2025-49647 | Malicious code in yanti-lapis61-breki (npm) | 2025-11-09T18:30:25Z | 2025-11-09T18:30:25Z |
| mal-2025-49646 | Malicious code in yanti-lapis43-ruro (npm) | 2025-11-09T18:30:25Z | 2025-11-09T18:30:25Z |
| mal-2025-49645 | Malicious code in yanti-kue90-riris (npm) | 2025-11-09T18:30:25Z | 2025-11-09T18:30:25Z |
| mal-2025-49644 | Malicious code in yanti-kue84-ruro (npm) | 2025-11-09T18:30:25Z | 2025-11-09T18:30:25Z |
| mal-2025-49643 | Malicious code in yanti-kue69-sukiwir (npm) | 2025-11-09T18:30:25Z | 2025-11-09T18:30:25Z |
| mal-2025-49642 | Malicious code in yanti-kue62-sumpek (npm) | 2025-11-09T18:30:25Z | 2025-11-09T18:30:25Z |
| mal-2025-49641 | Malicious code in yanti-kue1-sluey (npm) | 2025-11-09T18:30:25Z | 2025-11-09T18:30:25Z |
| mal-2025-49640 | Malicious code in yanti-kolak3-sukiwir (npm) | 2025-11-09T18:30:25Z | 2025-11-09T18:30:25Z |
| mal-2025-49639 | Malicious code in yanti-keripik28-breki (npm) | 2025-11-09T18:30:25Z | 2025-11-09T18:30:25Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2087 | Linux Kernel: Mehrere Schwachstellen | 2025-09-17T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2078 | Red Hat Enterprise Linux (Developer Hub): Mehrere Schwachstellen | 2025-09-16T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2077 | Linux Kernel: Mehrere Schwachstellen | 2025-09-16T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2058 | Apple Safari: Mehrere Schwachstellen | 2025-09-15T22:00:00.000+00:00 | 2025-11-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2053 | Linux Kernel: Mehrere Schwachstellen | 2025-09-15T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2051 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-09-14T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2045 | expat: Schwachstelle ermöglicht Denial of Service | 2025-09-14T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2040 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-09-11T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2039 | CUPS: Mehrere Schwachstellen | 2025-09-11T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2036 | IBM WebSphere Application Server: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-09-10T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2034 | Erlang/OTP: Mehrere Schwachstellen | 2025-09-10T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2028 | Red Hat OpenShift Container Platform: Schwachstelle ermöglicht Codeausführung | 2025-09-10T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2026 | ffmpeg: Schwachstelle ermöglicht Denial of Service | 2025-09-10T22:00:00.000+00:00 | 2025-10-21T22:00:00.000+00:00 |
| wid-sec-w-2025-2023 | cURL: Mehrere Schwachstellen ermöglichen Manipulation von Dateien | 2025-09-09T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2002 | libssh: Schwachstelle ermöglicht Denial of Service | 2025-09-09T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-1999 | Adobe Magento SessionReaper: Schwachstelle ermöglicht Umgehung von Sicherheitsmaßnahmen | 2025-09-08T22:00:00.000+00:00 | 2025-10-22T22:00:00.000+00:00 |
| wid-sec-w-2025-1998 | ffmpeg: Schwachstelle ermöglicht Codeausführung und potenziell Denial of Service | 2025-09-08T22:00:00.000+00:00 | 2025-10-21T22:00:00.000+00:00 |
| wid-sec-w-2025-1988 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-09-07T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-1976 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-09-04T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-1974 | Podman: Schwachstelle ermöglicht Manipulation von Dateien | 2025-09-04T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-1965 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-09-03T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-1954 | Drupal: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-09-03T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-1928 | Linux UDisks Daemon: Schwachstelle ermöglicht Privilegieneskalation | 2025-08-28T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-1925 | Hashicorp Vault: Schwachstelle ermöglicht Denial of Service | 2025-08-28T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1921 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-08-27T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-1914 | Linux Kernel: Schwachstelle ermöglicht Codeausführung | 2025-08-26T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-1898 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-08-24T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-1869 | Linux Kernel: Mehrere Schwachstellen | 2025-08-19T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-1866 | Mozilla Firefox und Thunderbird: Mehrere Schwachstellen | 2025-08-19T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1862 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-08-18T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:19529 | Red Hat Security Advisory: Red Hat Developer Hub 1.7.2 release. | 2025-11-03T21:56:14+00:00 | 2025-11-07T16:34:43+00:00 |
| rhsa-2025:19512 | Red Hat Security Advisory: pcs security update | 2025-11-03T20:27:49+00:00 | 2025-11-06T23:42:47+00:00 |
| rhsa-2025:19513 | Red Hat Security Advisory: pcs security update | 2025-11-03T20:18:29+00:00 | 2025-11-06T23:42:47+00:00 |
| rhsa-2025:19489 | Red Hat Security Advisory: tigervnc security update | 2025-11-03T16:00:24+00:00 | 2025-11-06T23:42:47+00:00 |
| rhsa-2025:19492 | Red Hat Security Advisory: kernel security update | 2025-11-03T16:00:14+00:00 | 2025-11-06T22:02:30+00:00 |
| rhsa-2025:19472 | Red Hat Security Advisory: libssh security update | 2025-11-03T12:20:18+00:00 | 2025-11-06T23:42:46+00:00 |
| rhsa-2025:19470 | Red Hat Security Advisory: libssh security update | 2025-11-03T12:14:23+00:00 | 2025-11-06T23:42:46+00:00 |
| rhsa-2025:19469 | Red Hat Security Advisory: kernel security update | 2025-11-03T12:08:33+00:00 | 2025-11-06T23:15:13+00:00 |
| rhsa-2025:19447 | Red Hat Security Advisory: kernel security update | 2025-11-03T09:44:18+00:00 | 2025-11-07T15:56:00+00:00 |
| rhsa-2025:19433 | Red Hat Security Advisory: xorg-x11-server update | 2025-11-03T09:11:58+00:00 | 2025-11-06T23:42:46+00:00 |
| rhsa-2025:19434 | Red Hat Security Advisory: xorg-x11-server security update | 2025-11-03T09:11:23+00:00 | 2025-11-06T23:42:51+00:00 |
| rhsa-2025:19440 | Red Hat Security Advisory: kernel-rt security update | 2025-11-03T09:06:28+00:00 | 2025-11-06T22:02:28+00:00 |
| rhsa-2025:19435 | Red Hat Security Advisory: xorg-x11-server-Xwayland security update | 2025-11-03T08:53:44+00:00 | 2025-11-06T23:42:46+00:00 |
| rhsa-2025:19432 | Red Hat Security Advisory: xorg-x11-server-Xwayland security update | 2025-11-03T08:51:43+00:00 | 2025-11-06T23:42:46+00:00 |
| rhsa-2025:19409 | Red Hat Security Advisory: kernel security update | 2025-11-03T03:14:27+00:00 | 2025-11-10T01:05:51+00:00 |
| rhsa-2025:19403 | Red Hat Security Advisory: expat security update | 2025-11-03T02:00:12+00:00 | 2025-11-07T21:45:04+00:00 |
| rhsa-2025:19398 | Red Hat Security Advisory: squid:4 security update | 2025-11-03T01:48:22+00:00 | 2025-11-06T23:42:44+00:00 |
| rhsa-2025:19397 | Red Hat Security Advisory: golang security update | 2025-11-03T01:42:52+00:00 | 2025-11-06T23:42:44+00:00 |
| rhsa-2025:19399 | Red Hat Security Advisory: redis:6 security update | 2025-11-03T01:42:07+00:00 | 2025-11-06T23:42:44+00:00 |
| rhsa-2025:19401 | Red Hat Security Advisory: libssh security update | 2025-11-03T01:40:22+00:00 | 2025-11-06T23:42:49+00:00 |
| rhsa-2025:19400 | Red Hat Security Advisory: libssh security update | 2025-11-03T01:22:57+00:00 | 2025-11-06T23:42:45+00:00 |
| rhsa-2025:19381 | Red Hat Security Advisory: Assisted Installer RHEL 8 components for Multicluster Engine for Kubernetes 2.9.1 | 2025-10-30T18:49:30+00:00 | 2025-11-07T00:15:00+00:00 |
| rhsa-2025:19380 | Red Hat Security Advisory: Assisted Installer RHEL 9 components for Multicluster Engine for Kubernetes 2.9.1 | 2025-10-30T18:39:47+00:00 | 2025-11-07T00:15:01+00:00 |
| rhsa-2025:19357 | Red Hat Security Advisory: OpenShift Container Platform 4.16.51 CNF IBU extras update | 2025-10-30T15:22:05+00:00 | 2025-11-06T22:56:40+00:00 |
| rhsa-2025:19356 | Red Hat Security Advisory: OpenShift Container Platform 4.14.57 CNF IBU extras update | 2025-10-30T15:20:42+00:00 | 2025-11-07T00:16:19+00:00 |
| rhsa-2025:19352 | Red Hat Security Advisory: webkitgtk4 security update | 2025-10-30T15:11:28+00:00 | 2025-11-06T23:15:13+00:00 |
| rhsa-2025:19345 | Red Hat Security Advisory: redis:7 security update | 2025-10-30T14:18:20+00:00 | 2025-11-06T23:42:44+00:00 |
| rhsa-2025:19335 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes 2.14.1 security update | 2025-10-30T12:58:23+00:00 | 2025-11-10T01:10:37+00:00 |
| rhsa-2025:19332 | Red Hat Security Advisory: multicluster engine for Kubernetes 2.9.1 security update | 2025-10-30T12:27:36+00:00 | 2025-11-10T01:10:36+00:00 |
| rhsa-2025:19318 | Red Hat Security Advisory: redis:6 security update | 2025-10-30T10:22:17+00:00 | 2025-11-06T23:42:44+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-40100 | btrfs: do not assert we found block group item when creating free space tree | 2025-10-02T00:00:00.000Z | 2025-10-31T01:10:04.000Z |
| msrc_cve-2025-40099 | cifs: parse_dfs_referrals: prevent oob on malformed input | 2025-10-02T00:00:00.000Z | 2025-10-31T01:10:42.000Z |
| msrc_cve-2025-40097 | ALSA: hda: Fix missing pointer check in hda_component_manager_init function | 2025-10-02T00:00:00.000Z | 2025-10-31T01:09:31.000Z |
| msrc_cve-2025-40096 | drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies | 2025-10-02T00:00:00.000Z | 2025-10-31T01:09:53.000Z |
| msrc_cve-2025-40095 | usb: gadget: f_rndis: Refactor bind path to use __free() | 2025-10-02T00:00:00.000Z | 2025-10-31T01:09:26.000Z |
| msrc_cve-2025-40094 | usb: gadget: f_acm: Refactor bind path to use __free() | 2025-10-02T00:00:00.000Z | 2025-10-31T01:10:37.000Z |
| msrc_cve-2025-40093 | usb: gadget: f_ecm: Refactor bind path to use __free() | 2025-10-02T00:00:00.000Z | 2025-10-31T01:10:21.000Z |
| msrc_cve-2025-40092 | usb: gadget: f_ncm: Refactor bind path to use __free() | 2025-10-02T00:00:00.000Z | 2025-10-31T01:10:32.000Z |
| msrc_cve-2025-40090 | ksmbd: fix recursive locking in RPC handle list access | 2025-10-02T00:00:00.000Z | 2025-10-31T01:10:10.000Z |
| msrc_cve-2025-40088 | hfsplus: fix slab-out-of-bounds read in hfsplus_strcasecmp() | 2025-10-02T00:00:00.000Z | 2025-10-31T01:10:26.000Z |
| msrc_cve-2025-40087 | NFSD: Define a proc_layoutcommit for the FlexFiles layout type | 2025-10-02T00:00:00.000Z | 2025-10-31T01:09:47.000Z |
| msrc_cve-2025-40085 | ALSA: usb-audio: Fix NULL pointer deference in try_to_register_card | 2025-10-02T00:00:00.000Z | 2025-10-31T01:03:31.000Z |
| msrc_cve-2025-40084 | ksmbd: transport_ipc: validate payload size before reading handle | 2025-10-02T00:00:00.000Z | 2025-10-31T01:03:20.000Z |
| msrc_cve-2025-40083 | net/sched: sch_qfq: Fix null-deref in agg_dequeue | 2025-10-02T00:00:00.000Z | 2025-10-31T01:03:26.000Z |
| msrc_cve-2025-40081 | perf: arm_spe: Prevent overflow in PERF_IDX2OFF() | 2025-10-02T00:00:00.000Z | 2025-10-29T01:04:15.000Z |
| msrc_cve-2025-40080 | nbd: restrict sockets to TCP and UDP | 2025-10-02T00:00:00.000Z | 2025-10-29T01:03:21.000Z |
| msrc_cve-2025-40079 | riscv, bpf: Sign extend struct ops return values properly | 2025-10-02T00:00:00.000Z | 2025-10-29T01:05:01.000Z |
| msrc_cve-2025-40078 | bpf: Explicitly check accesses to bpf_sock_addr | 2025-10-02T00:00:00.000Z | 2025-10-29T01:02:11.000Z |
| msrc_cve-2025-40077 | f2fs: fix to avoid overflow while left shift operation | 2025-10-02T00:00:00.000Z | 2025-10-29T01:03:32.000Z |
| msrc_cve-2025-40075 | tcp_metrics: use dst_dev_net_rcu() | 2025-10-02T00:00:00.000Z | 2025-10-29T01:04:44.000Z |
| msrc_cve-2025-40074 | ipv4: start using dst_dev_rcu() | 2025-10-02T00:00:00.000Z | 2025-10-29T01:03:43.000Z |
| msrc_cve-2025-40071 | tty: n_gsm: Don't block input queue by waiting MSC | 2025-10-02T00:00:00.000Z | 2025-10-29T01:05:06.000Z |
| msrc_cve-2025-40068 | fs: ntfs3: Fix integer overflow in run_unpack() | 2025-10-02T00:00:00.000Z | 2025-10-29T01:04:55.000Z |
| msrc_cve-2025-40065 | RISC-V: KVM: Write hgatp register with valid mode bits | 2025-10-02T00:00:00.000Z | 2025-10-29T01:04:39.000Z |
| msrc_cve-2025-40064 | smc: Fix use-after-free in __pnet_find_base_ndev(). | 2025-10-02T00:00:00.000Z | 2025-10-29T01:03:48.000Z |
| msrc_cve-2025-40061 | RDMA/rxe: Fix race in do_task() when draining | 2025-10-02T00:00:00.000Z | 2025-10-29T01:02:05.000Z |
| msrc_cve-2025-40060 | coresight: trbe: Return NULL pointer for allocation failures | 2025-10-02T00:00:00.000Z | 2025-10-29T01:03:16.000Z |
| msrc_cve-2025-40057 | ptp: Add a upper bound on max_vclocks | 2025-10-02T00:00:00.000Z | 2025-10-29T01:04:50.000Z |
| msrc_cve-2025-40056 | vhost: vringh: Fix copy_to_iter return value check | 2025-10-02T00:00:00.000Z | 2025-10-29T01:02:59.000Z |
| msrc_cve-2025-40055 | ocfs2: fix double free in user_cluster_connect() | 2025-10-02T00:00:00.000Z | 2025-10-29T01:02:49.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-22-104-05 | Siemens OpenSSL Vulnerabilities in Industrial Products | 2022-04-14T00:00:00.000000Z | 2022-05-12T00:00:00.000000Z |
| icsa-22-104-04 | Siemens SCALANCE FragAttacks | 2021-07-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-20-070-01 | ICSA-20-070-01_Siemens and PKE SiNVR/SiVMS Video Server (Update B) | 2020-03-10T00:00:00.000000Z | 2021-08-10T00:00:00.000000Z |
| icsa-21-068-10 | Siemens SCALANCE and SIMATIC libcurl (Update B) | 2019-04-09T00:00:00.000000Z | 2021-03-09T00:00:00.000000Z |
| icsa-25-294-03 | Siemens SIMATIC S7-1200 CPU V1/V2 Devices | 2011-06-10T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-010603 | Out-of-bounds write vulnerability in FUJIFILM Business Innovation MFPs | 2025-08-05T11:29+09:00 | 2025-08-05T11:29+09:00 |
| jvndb-2025-010408 | Multiple vulnerabilities in PowerCMS | 2025-08-01T12:05+09:00 | 2025-08-01T12:05+09:00 |
| jvndb-2025-000055 | ZXHN-F660T and ZXHN-F660A use a common credential for all installations | 2025-07-31T15:12+09:00 | 2025-07-31T15:12+09:00 |
| jvndb-2025-000054 | Apache Jena Fuseki vulnerable to path traversal | 2025-07-30T14:17+09:00 | 2025-07-30T14:17+09:00 |
| jvndb-2025-000053 | "SwitchBot" App vulnerable to insertion of sensitive information into log file | 2025-07-29T13:44+09:00 | 2025-07-29T13:44+09:00 |
| jvndb-2025-010056 | TP-Link VIGI NVR1104H-4P and VIGI NVR2016H-16MP vulnerable to OS command injection | 2025-07-28T17:53+09:00 | 2025-07-28T17:53+09:00 |
| jvndb-2025-000052 | TP-Link Archer C1200 vulnerable to clickjacking | 2025-07-24T14:16+09:00 | 2025-07-24T14:16+09:00 |
| jvndb-2025-000051 | Real-time Bus Tracking System vulnerable to improper validation of specified quantity in input | 2025-07-23T13:54+09:00 | 2025-07-23T13:54+09:00 |
| jvndb-2025-009576 | Multiple vulnerabilities in ELECOM wireless LAN routers | 2025-07-23T11:13+09:00 | 2025-07-23T11:13+09:00 |
| jvndb-2025-000050 | "region PAY" App for Android vulnerable to insertion of sensitive information into log file | 2025-07-22T13:33+09:00 | 2025-07-22T13:33+09:00 |
| jvndb-2025-009150 | Security updates for Trend Micro products (June 2025) | 2025-07-17T17:03+09:00 | 2025-07-17T17:03+09:00 |
| jvndb-2025-000049 | ZWX-2000CSW2-HN and ZWX-2000CS2-HN vulnerable to use of hard-coded credentials | 2025-07-16T13:54+09:00 | 2025-07-16T13:54+09:00 |
| jvndb-2025-008881 | Least Privilege Violation Vulnerability in the communications functions of NJ/NX series Machine Automation Controllers | 2025-07-15T15:54+09:00 | 2025-07-15T15:54+09:00 |
| jvndb-2025-008783 | Firebox T15 contains an issue with hidden functionality | 2025-07-14T17:22+09:00 | 2025-07-14T17:22+09:00 |
| jvndb-2025-008145 | Epson Web Installer for Mac vulnerable to missing authentication for critical function | 2025-07-08T14:08+09:00 | 2025-07-08T14:08+09:00 |
| jvndb-2025-008106 | Heap-based buffer overflow vulnerability in V-SFT and TELLUS | 2025-07-07T16:26+09:00 | 2025-07-07T16:26+09:00 |
| jvndb-2025-008105 | Windows shortcut following (.LNK) vulnerability in Trend Micro Security for Windows (CVE-2025-52521) | 2025-07-07T16:04+09:00 | 2025-07-07T16:04+09:00 |
| jvndb-2025-000047 | Multiple vulnerabilities in Nimesa Backup and Recovery | 2025-07-07T15:26+09:00 | 2025-07-07T15:26+09:00 |
| jvndb-2025-007978 | Multiple vulnerabilities in Trend Micro Password Manager for Windows (CVE-2025-48443, CVE-2025-52837) | 2025-07-04T13:28+09:00 | 2025-07-04T13:28+09:00 |
| jvndb-2025-000045 | Multiple vulnerabilities in Active! mail | 2025-07-02T14:13+09:00 | 2025-07-02T14:13+09:00 |
| jvndb-2025-007754 | Multiple vulnerabilities in Contec CONPROSYS HMI System (CHS) | 2025-07-02T11:31+09:00 | 2025-07-02T11:31+09:00 |
| jvndb-2025-007607 | Pass-Back Attack vulnerability in Konica Minorta bizhub series | 2025-07-01T14:09+09:00 | 2025-07-01T14:09+09:00 |
| jvndb-2025-007595 | Multiple vulnerabilities in Web Connection of Konica Minolta MFPs | 2025-07-01T14:02+09:00 | 2025-07-01T14:02+09:00 |
| jvndb-2025-000046 | SLNX Help Documentation of RICOH Streamline NX vulnerable to reflected cross-site scripting | 2025-06-30T15:45+09:00 | 2025-06-30T15:45+09:00 |
| jvndb-2025-007552 | Multiple vulnerabilities in TB-eye network recorders and AHD recorders | 2025-06-30T14:45+09:00 | 2025-06-30T14:45+09:00 |
| jvndb-2025-007521 | Multiple Brother driver installers for Windows vulnerable to privilege escalation | 2025-06-27T09:37+09:00 | 2025-08-19T11:29+09:00 |
| jvndb-2025-007519 | Multiple vulnerabilities in multiple BROTHER products | 2025-06-26T18:15+09:00 | 2025-09-22T10:16+09:00 |
| jvndb-2025-000043 | Multiple vulnerabilities in iroha Board | 2025-06-26T15:13+09:00 | 2025-06-26T15:13+09:00 |
| jvndb-2025-000044 | Denial-of-service (DoS) vulnerabilities in multiple Apache products | 2025-06-26T14:41+09:00 | 2025-10-01T14:18+09:00 |
| jvndb-2025-000042 | Inefficient regular expressions in GROWI | 2025-06-24T15:25+09:00 | 2025-06-24T15:25+09:00 |
| ID | Description | Updated |
|---|