Recent vulnerabilities
| ID | Description | Published | Updated |
|---|---|---|---|
| ghsa-q2x4-7v64-r886 | The issue was addressed with improved checks. This issue is fixed in iOS 26.1 and iPadOS 26.1, Safa… | 2025-11-04T03:30:29Z | 2025-11-05T21:31:00Z |
| ghsa-pqwf-2452-r2f3 | An authorization issue was addressed with improved state management. This issue is fixed in iOS 26.… | 2025-11-04T03:30:29Z | 2025-11-04T18:31:53Z |
| ghsa-p867-9m9g-6jj4 | A buffer overflow was addressed with improved bounds checking. This issue is fixed in Xcode 26.1. A… | 2025-11-04T03:30:29Z | 2025-11-04T15:31:34Z |
| ghsa-mwcp-7pff-55mh | A logic issue was addressed with improved checks. This issue is fixed in iOS 26.1 and iPadOS 26.1. … | 2025-11-04T03:30:29Z | 2025-11-04T18:31:52Z |
| ghsa-mr98-6qp8-6gpm | The issue was addressed with improved memory handling. This issue is fixed in watchOS 26.1, iOS 26.… | 2025-11-04T03:30:29Z | 2025-11-04T21:31:33Z |
| ghsa-jqp9-863w-8xvr | This issue was addressed by restricting options offered on a locked device. This issue is fixed in … | 2025-11-04T03:30:29Z | 2025-11-04T18:31:52Z |
| ghsa-grmc-3h6c-p3q9 | A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma… | 2025-11-04T03:30:29Z | 2025-11-04T18:31:53Z |
| ghsa-gp5f-42gx-q2fq | A privacy issue was addressed with improved handling of user preferences. This issue is fixed in wa… | 2025-11-04T03:30:29Z | 2025-11-04T18:31:53Z |
| ghsa-cvjw-3jg5-rvcq | An authentication issue was addressed with improved state management. This issue is fixed in watchO… | 2025-11-04T03:30:29Z | 2025-11-04T15:31:33Z |
| ghsa-c9vx-r5gq-hhr8 | A validation issue was addressed with improved input sanitization. This issue is fixed in macOS Son… | 2025-11-04T03:30:29Z | 2025-11-04T15:31:33Z |
| ghsa-c7h7-j3m6-933p | A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma… | 2025-11-04T03:30:29Z | 2025-11-04T21:31:33Z |
| ghsa-9c63-94gf-85h2 | A use-after-free issue was addressed with improved memory management. This issue is fixed in watchO… | 2025-11-04T03:30:29Z | 2025-11-04T15:31:33Z |
| ghsa-946v-48wq-8882 | A privacy issue was addressed with improved private data redaction for log entries. This issue is f… | 2025-11-04T03:30:29Z | 2025-11-04T18:31:53Z |
| ghsa-8v28-rgjq-f5h7 | An inconsistent user interface issue was addressed with improved state management. This issue is fi… | 2025-11-04T03:30:29Z | 2025-11-05T21:31:01Z |
| ghsa-8h3p-p2xh-j29x | This issue was addressed through improved state management. This issue is fixed in iOS 26.1 and iPa… | 2025-11-04T03:30:29Z | 2025-11-05T21:31:00Z |
| ghsa-849v-5927-j7jq | A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing re… | 2025-11-04T03:30:29Z | 2025-11-04T18:31:53Z |
| ghsa-7jw7-wvw3-gc2g | An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS So… | 2025-11-04T03:30:29Z | 2025-11-04T15:31:33Z |
| ghsa-7g3g-36m8-grv8 | A logic issue was addressed with improved checks. This issue is fixed in iOS 26.1 and iPadOS 26.1. … | 2025-11-04T03:30:29Z | 2025-11-05T21:31:00Z |
| ghsa-6wgr-2m33-vg69 | An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in X… | 2025-11-04T03:30:29Z | 2025-11-04T15:31:34Z |
| ghsa-6824-ghx8-vrm5 | This issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.2. An app … | 2025-11-04T03:30:29Z | 2025-11-04T18:31:53Z |
| ghsa-4v2x-jqm6-7wqw | A privacy issue was addressed by removing sensitive data. This issue is fixed in iOS 26.1 and iPadO… | 2025-11-04T03:30:29Z | 2025-11-04T15:31:34Z |
| ghsa-479r-rg4f-86j3 | The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to Stored Cro… | 2025-11-04T03:30:29Z | 2025-11-04T03:30:29Z |
| ghsa-3rjw-h7x9-663w | A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma… | 2025-11-04T03:30:29Z | 2025-11-04T18:31:53Z |
| ghsa-2mw2-gj79-mjf4 | A use after free issue was addressed with improved memory management. This issue is fixed in macOS … | 2025-11-04T03:30:29Z | 2025-11-04T15:31:34Z |
| ghsa-xvjg-xxqh-hg7q | The issue was addressed with improved memory handling. This issue is fixed in Safari 26, tvOS 26, w… | 2025-11-04T03:30:28Z | 2025-11-04T18:31:52Z |
| ghsa-xh83-4f2v-gp3x | A permissions issue was addressed with additional restrictions. This issue is fixed in iOS 26.1 and… | 2025-11-04T03:30:28Z | 2025-11-05T21:31:00Z |
| ghsa-vg6g-ppvj-7qh3 | This issue was addressed through improved state management. This issue is fixed in iOS 26.1 and iPa… | 2025-11-04T03:30:28Z | 2025-11-04T15:31:33Z |
| ghsa-v5c8-f9w5-3g67 | This issue was addressed with improved checks. This issue is fixed in Safari 26.1, visionOS 26.1, w… | 2025-11-04T03:30:28Z | 2025-11-05T21:31:00Z |
| ghsa-v3g8-vrxx-mrhp | The issue was addressed by adding additional logic. This issue is fixed in iOS 26.1 and iPadOS 26.1… | 2025-11-04T03:30:28Z | 2025-11-04T18:31:52Z |
| ghsa-rj8f-f8h4-6gwq | The issue was addressed with improved handling of caches. This issue is fixed in iOS 26.1 and iPadO… | 2025-11-04T03:30:28Z | 2025-11-04T18:31:52Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2025-12402 | LinkedIn Resume <= 2.00 - Cross-Site Request Forgery t… |
bondnono |
LinkedIn Resume |
2025-11-04T04:27:19.651Z | 2025-11-04T15:52:16.797Z | |
| cve-2025-12415 | MapMap <= 1.1 - Cross-Site Request Forgery to Settings… |
sugiartha |
MapMap |
2025-11-04T04:27:19.056Z | 2025-11-04T15:53:00.650Z | |
| cve-2025-12156 | Ai Auto Tool Content Writing Assistant (Gemini Writer,… |
aitool |
Ai Auto Tool Content Writing Assistant (Gemini Writer, ChatGPT ) All in One |
2025-11-04T04:27:18.698Z | 2025-11-04T16:08:38.677Z | |
| cve-2025-11724 | EM Beer Manager <= 3.2.3 - Authenticated (Subscriber+)… |
erinmorelli |
EM Beer Manager |
2025-11-04T04:27:18.321Z | 2025-11-04T16:32:44.217Z | |
| cve-2025-12456 | Centangle Team Showcase <= 1.0.0 - Cross-Site Request … |
centangle |
Centangle-Team |
2025-11-04T04:27:17.736Z | 2025-11-04T16:43:20.440Z | |
| cve-2025-12400 | LMB^Box Smileys <= 3.2 - Cross-Site Request Forgery to… |
lmbbox |
LMB^Box Smileys |
2025-11-04T04:27:17.374Z | 2025-11-04T16:47:13.869Z | |
| cve-2025-12369 | Extensions for Leaflet Map <= 4.7 - Authenticated (Con… |
hupe13 |
Extensions for Leaflet Map |
2025-11-04T04:27:17.014Z | 2025-11-04T16:47:34.277Z | |
| cve-2025-11890 | Crypto Payment Gateway with Payeer for WooCommerce <= … |
beycanpress |
Crypto Payment Gateway with Payeer for WooCommerce |
2025-11-04T04:27:16.569Z | 2025-11-04T16:47:59.207Z | |
| cve-2025-12157 | Simple User Capabilities <= 1.0 - Missing Authorizatio… |
tanvirahmed1984 |
Simple User Capabilities |
2025-11-04T04:27:16.185Z | 2025-11-04T17:16:00.320Z | |
| cve-2025-12410 | SH Contextual Help <= 3.2.1 - Cross-Site Request Forge… |
samhoamt |
SH Contextual Help |
2025-11-04T04:27:15.805Z | 2025-11-04T21:01:21.541Z | |
| cve-2025-11758 | All in One Time Clock Lite – Tracking Employee Time Ha… |
codebangers |
All in One Time Clock Lite – Tracking Employee Time Has Never Been Easier |
2025-11-04T04:27:15.403Z | 2025-11-04T21:00:48.168Z | |
| cve-2025-12413 | Social Media WPCF7 Stop Words <= 1.1.3 - Cross-Site Re… |
socialmedialtd |
WPCF7 Stop words |
2025-11-04T04:27:14.981Z | 2025-11-04T21:00:10.133Z | |
| cve-2025-12350 | DominoKit <= 1.1.0 - Missing Authorization to Unauthen… |
domiinodev |
DominoKit |
2025-11-04T04:27:14.553Z | 2025-11-04T20:59:31.623Z | |
| cve-2025-12393 | Free Quotation <= 3.1.6 - Authenticated (Admin+) Store… |
kris_iv |
Free Quotation |
2025-11-04T04:27:14.125Z | 2025-11-04T20:58:53.990Z | |
| cve-2025-12416 | Pagerank Tools <= 1.1.5 - Cross-Site Request Forgery t… |
mahype |
Pagerank tools |
2025-11-04T04:27:13.744Z | 2025-11-04T20:56:39.593Z | |
| cve-2025-10896 | Multiple Plugins <= Multiple Versions - Missing Author… |
litonice13 |
Master Blocks – Ultimate Gutenberg Blocks for Marketers |
2025-11-04T04:27:13.331Z | 2025-11-04T20:55:54.279Z | |
| cve-2025-12412 | Top Bar Notification <= 1.12 - Cross-Site Request Forg… |
josereyev |
Top Bar Notification |
2025-11-04T04:27:12.930Z | 2025-11-04T20:53:26.807Z | |
| cve-2025-12188 | Posts Navigation Links for Sections and Headings - Fre… |
wpmasterscom |
Posts Navigation Links for Sections and Headings – Free by WP Masters |
2025-11-04T04:27:12.323Z | 2025-11-04T20:52:13.667Z | |
| cve-2025-12683 | 5.8 (v4.0) | NULL DACL assigned to Named Pipe communicating with SY… |
Voidtools |
Everything |
2025-11-04T04:23:02.884Z | 2025-11-04T20:50:21.977Z |
| cve-2025-12069 | WP Global Screen Options <= 0.2 - Cross-Site Request F… |
stiand |
WP Global Screen Options |
2025-11-04T03:26:47.094Z | 2025-11-04T18:48:00.111Z | |
| cve-2025-11008 | CE21 Suite <= 2.3.1 - Unauthenticated Sensitive Inform… |
ce21com |
CE21 Suite |
2025-11-04T03:26:46.726Z | 2025-11-04T18:48:23.226Z | |
| cve-2025-12401 | Label Plugins <= 0.5 - Cross-Site Request Forgery to S… |
theode |
Label Plugins |
2025-11-04T03:26:46.350Z | 2025-11-04T18:48:46.590Z | |
| cve-2025-11007 | CE21 Suite 2.2.1 - 2.3.1 - Missing Authorization to Un… |
ce21com |
CE21 Suite |
2025-11-04T03:26:45.901Z | 2025-11-04T18:49:41.405Z | |
| cve-2025-12070 | ViaAds <= 2.1.1 - Cross-Site Request Forgery to API Ke… |
viaads |
ViaAds |
2025-11-04T03:26:45.215Z | 2025-11-04T18:50:13.151Z | |
| cve-2025-47370 | 6.5 (v3.1) | Reachable Assertion in BT Controller |
Qualcomm, Inc. |
Snapdragon |
2025-11-04T03:19:26.256Z | 2025-11-04T19:00:52.629Z |
| cve-2025-47368 | 7.8 (v3.1) | Buffer Over-read in DSP Service |
Qualcomm, Inc. |
Snapdragon |
2025-11-04T03:19:24.982Z | 2025-11-04T14:44:51.488Z |
| cve-2025-47367 | 7.8 (v3.1) | Out-of-bounds Write in WinBlast Driver |
Qualcomm, Inc. |
Snapdragon |
2025-11-04T03:19:23.734Z | 2025-11-04T14:45:01.835Z |
| cve-2025-47365 | 7.8 (v3.1) | Integer Overflow or Wraparound in Automotive Platform |
Qualcomm, Inc. |
Snapdragon |
2025-11-04T03:19:22.474Z | 2025-11-04T14:45:13.687Z |
| cve-2025-47362 | 6.1 (v3.1) | Buffer Over-read in Automotive Software platform based… |
Qualcomm, Inc. |
Snapdragon |
2025-11-04T03:19:21.202Z | 2025-11-04T19:18:27.877Z |
| cve-2025-47361 | 7.8 (v3.1) | Improper Validation of Array Index in Automotive Softw… |
Qualcomm, Inc. |
Snapdragon |
2025-11-04T03:19:19.924Z | 2025-11-04T14:45:30.355Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2025-20747 | N/A | In gnss service, there is a possible out of bound… |
MediaTek, Inc. |
MT2718, MT2737, MT6835, MT6878, MT6886, MT6897, MT6899, MT6982, MT6985, MT6986, MT6986D, MT6989, MT6990, MT6991, MT8676, MT8678, MT8755, MT8893 |
2025-11-04T06:20:19.607Z | 2025-11-05T04:55:31.133Z |
| cve-2025-20746 | N/A | In gnss service, there is a possible out of bound… |
MediaTek, Inc. |
MT2718, MT2737, MT6835, MT6878, MT6886, MT6897, MT6899, MT6982, MT6985, MT6986, MT6986D, MT6989, MT6990, MT6991, MT8676, MT8678, MT8755, MT8893 |
2025-11-04T06:20:17.860Z | 2025-11-05T04:55:32.792Z |
| cve-2025-20745 | N/A | In apusys, there is a possible memory corruption … |
MediaTek, Inc. |
MT2718, MT6989, MT6991, MT8370, MT8390, MT8395, MT8676, MT8678, MT87920 |
2025-11-04T06:20:03.095Z | 2025-11-05T04:55:47.647Z |
| cve-2025-20744 | N/A | In pda, there is a possible escalation of privile… |
MediaTek, Inc. |
MT6899, MT6991, MT8793 |
2025-11-04T06:19:59.710Z | 2025-11-05T04:55:45.818Z |
| cve-2025-20743 | N/A | In clkdbg, there is a possible escalation of priv… |
MediaTek, Inc. |
MT2718, MT6761, MT6765, MT6768, MT6781, MT6853, MT6877, MT6886, MT6893, MT6897, MT6899, MT6983, MT6989, MT6991, MT8113, MT8163, MT8168, MT8169, MT8183, MT8186, MT8188, MT8195, MT8196, MT8321, MT8365, MT8385, MT8390, MT8391, MT8512, MT8516, MT8519, MT8676, MT8678, MT8695, MT8696, MT8698, MT8755, MT8766, MT8768, MT8771, MT8775, MT8781, MT8786, MT8788E, MT8791T, MT8792, MT8793, MT8796, MT8797, MT8798, MT8873, MT8883, MT8893 |
2025-11-04T06:19:57.990Z | 2025-11-05T04:55:44.828Z |
| cve-2025-20742 | N/A | In wlan AP driver, there is a possible out of bou… |
MediaTek, Inc. |
MT6890, MT7603, MT7615, MT7622, MT7915, MT7916, MT7981, MT7986 |
2025-11-04T06:19:56.287Z | 2025-11-05T04:55:43.910Z |
| cve-2025-20741 | N/A | In wlan AP driver, there is a possible out of bou… |
MediaTek, Inc. |
MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986 |
2025-11-04T06:20:21.366Z | 2025-11-05T04:55:30.330Z |
| cve-2025-20740 | N/A | In wlan STA driver, there is a possible out of bo… |
MediaTek, Inc. |
MT7902, MT7920, MT7921, MT7922, MT7925, MT7927 |
2025-11-04T06:19:54.584Z | 2025-11-04T15:04:25.506Z |
| cve-2025-20739 | N/A | In wlan AP driver, there is a possible out of bou… |
MediaTek, Inc. |
MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986 |
2025-11-04T06:20:16.025Z | 2025-11-05T04:55:33.598Z |
| cve-2025-20738 | N/A | In wlan AP driver, there is a possible out of bou… |
MediaTek, Inc. |
MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986 |
2025-11-04T06:20:14.296Z | 2025-11-05T04:55:34.374Z |
| cve-2025-20737 | N/A | In wlan AP driver, there is a possible out of bou… |
MediaTek, Inc. |
MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986 |
2025-11-04T06:19:52.883Z | 2025-11-05T04:55:42.993Z |
| cve-2025-20736 | N/A | In wlan AP driver, there is a possible out of bou… |
MediaTek, Inc. |
MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986 |
2025-11-04T06:20:12.530Z | 2025-11-05T04:55:35.164Z |
| cve-2025-20735 | N/A | In wlan AP driver, there is a possible out of bou… |
MediaTek, Inc. |
MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986 |
2025-11-04T06:19:50.999Z | 2025-11-05T04:55:42.073Z |
| cve-2025-20734 | N/A | In wlan AP driver, there is a possible out of bou… |
MediaTek, Inc. |
MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986 |
2025-11-04T06:20:10.764Z | 2025-11-05T04:55:51.084Z |
| cve-2025-20733 | N/A | In wlan AP driver, there is a possible out of bou… |
MediaTek, Inc. |
MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986 |
2025-11-04T06:19:49.117Z | 2025-11-05T04:55:41.224Z |
| cve-2025-20732 | N/A | In wlan AP driver, there is a possible out of bou… |
MediaTek, Inc. |
MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986 |
2025-11-04T06:20:08.954Z | 2025-11-05T04:55:50.276Z |
| cve-2025-20731 | N/A | In wlan AP driver, there is a possible out of bou… |
MediaTek, Inc. |
MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986 |
2025-11-04T06:20:07.276Z | 2025-11-05T04:55:49.411Z |
| cve-2025-20730 | N/A | In preloader, there is a possible escalation of p… |
MediaTek, Inc. |
MT2737, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6990, MT6991, MT8188, MT8195, MT8676, MT8678, MT8696 |
2025-11-04T06:19:47.152Z | 2025-11-05T04:55:40.432Z |
| cve-2025-20729 | N/A | In wlan AP driver, there is a possible out of bou… |
MediaTek, Inc. |
MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986 |
2025-11-04T06:20:05.491Z | 2025-11-05T04:55:48.589Z |
| cve-2025-20728 | N/A | In wlan STA driver, there is a possible out of bo… |
MediaTek, Inc. |
MT7902, MT7920, MT7921, MT7922, MT7925, MT7927 |
2025-11-04T06:19:45.290Z | 2025-11-05T04:55:39.588Z |
| cve-2025-20727 | N/A | In Modem, there is a possible out of bounds write… |
MediaTek, Inc. |
MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8786, MT8788, MT8788E, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893 |
2025-11-04T06:19:40.087Z | 2025-11-05T04:55:35.978Z |
| cve-2025-20726 | N/A | In Modem, there is a possible out of bounds write… |
MediaTek, Inc. |
MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8786, MT8788, MT8788E, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893 |
2025-11-04T06:19:41.827Z | 2025-11-05T04:55:36.771Z |
| cve-2025-20725 | N/A | In ims service, there is a possible out of bounds… |
MediaTek, Inc. |
MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8786, MT8788, MT8788E, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8893 |
2025-11-04T06:19:43.569Z | 2025-11-05T04:55:37.570Z |
| cve-2025-12683 | 5.8 (v4.0) | NULL DACL assigned to Named Pipe communicating with SY… |
Voidtools |
Everything |
2025-11-04T04:23:02.884Z | 2025-11-04T20:50:21.977Z |
| cve-2025-12456 | Centangle Team Showcase <= 1.0.0 - Cross-Site Request … |
centangle |
Centangle-Team |
2025-11-04T04:27:17.736Z | 2025-11-04T16:43:20.440Z | |
| cve-2025-12452 | Visit Counter 1.0 - Cross-Site Request Forgery to Stor… |
bestiadurmiente |
Visit Counter |
2025-11-04T04:27:22.522Z | 2025-11-04T15:08:35.205Z | |
| cve-2025-12416 | Pagerank Tools <= 1.1.5 - Cross-Site Request Forgery t… |
mahype |
Pagerank tools |
2025-11-04T04:27:13.744Z | 2025-11-04T20:56:39.593Z | |
| cve-2025-12415 | MapMap <= 1.1 - Cross-Site Request Forgery to Settings… |
sugiartha |
MapMap |
2025-11-04T04:27:19.056Z | 2025-11-04T15:53:00.650Z | |
| cve-2025-12413 | Social Media WPCF7 Stop Words <= 1.1.3 - Cross-Site Re… |
socialmedialtd |
WPCF7 Stop words |
2025-11-04T04:27:14.981Z | 2025-11-04T21:00:10.133Z | |
| cve-2025-12412 | Top Bar Notification <= 1.12 - Cross-Site Request Forg… |
josereyev |
Top Bar Notification |
2025-11-04T04:27:12.930Z | 2025-11-04T20:53:26.807Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-178212 | Malicious code in rindaman-poke49 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178211 | Malicious code in rindaman-poke48 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178210 | Malicious code in rindaman-poke47 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178209 | Malicious code in rindaman-poke46 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178208 | Malicious code in rindaman-poke45 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178207 | Malicious code in rindaman-poke44 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178206 | Malicious code in rindaman-poke43 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178205 | Malicious code in rindaman-poke42 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178204 | Malicious code in rindaman-poke41 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178203 | Malicious code in rindaman-poke40 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178202 | Malicious code in rindaman-poke4 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178201 | Malicious code in rindaman-poke39 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178200 | Malicious code in rindaman-poke38 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178199 | Malicious code in rindaman-poke37 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178198 | Malicious code in rindaman-poke36 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178197 | Malicious code in rindaman-poke35 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178196 | Malicious code in rindaman-poke34 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178195 | Malicious code in rindaman-poke33 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178194 | Malicious code in rindaman-poke32 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178193 | Malicious code in rindaman-poke31 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178192 | Malicious code in rindaman-poke30 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178191 | Malicious code in rindaman-poke3 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178190 | Malicious code in rindaman-poke29 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178189 | Malicious code in rindaman-poke28 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178188 | Malicious code in rindaman-poke27 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178187 | Malicious code in rindaman-poke26 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178186 | Malicious code in rindaman-poke25 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178185 | Malicious code in rindaman-poke24 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178184 | Malicious code in rindaman-poke23 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178183 | Malicious code in rindaman-poke22 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:11327 | Red Hat Security Advisory: glib2 security update | 2025-07-16T14:14:58+00:00 | 2025-11-06T22:45:12+00:00 |
| rhsa-2025:11324 | Red Hat Security Advisory: cloud-init security update | 2025-07-16T14:11:48+00:00 | 2025-11-11T09:40:24+00:00 |
| rhsa-2025:10771 | Red Hat Security Advisory: OpenShift Container Platform 4.19.4 bug fix and security update | 2025-07-16T07:50:43+00:00 | 2025-11-06T23:14:18+00:00 |
| rhsa-2025:11298 | Red Hat Security Advisory: kernel security update | 2025-07-16T06:06:47+00:00 | 2025-11-08T07:16:49+00:00 |
| rhsa-2025:11299 | Red Hat Security Advisory: kernel-rt security update | 2025-07-16T05:49:58+00:00 | 2025-11-08T07:16:50+00:00 |
| rhsa-2025:11295 | Red Hat Security Advisory: cloud-init security update | 2025-07-16T04:11:21+00:00 | 2025-11-11T09:40:23+00:00 |
| rhsa-2025:10867 | Red Hat Security Advisory: java-17-openjdk security update | 2025-07-15T23:11:01+00:00 | 2025-11-11T07:51:14+00:00 |
| rhsa-2025:11245 | Red Hat Security Advisory: kernel security update | 2025-07-15T21:19:21+00:00 | 2025-11-11T11:27:16+00:00 |
| rhsa-2025:11146 | Red Hat Security Advisory: Red Hat OpenShift Builds 1.4.1 | 2025-07-15T12:52:27+00:00 | 2025-11-07T03:32:05+00:00 |
| rhsa-2025:11102 | Red Hat Security Advisory: fence-agents security update | 2025-07-15T09:42:29+00:00 | 2025-11-07T03:32:04+00:00 |
| rhsa-2025:11101 | Red Hat Security Advisory: fence-agents security update | 2025-07-15T09:39:19+00:00 | 2025-11-07T03:32:02+00:00 |
| rhsa-2025:11066 | Red Hat Security Advisory: glibc security update | 2025-07-15T07:20:09+00:00 | 2025-11-11T10:40:52+00:00 |
| rhsa-2025:11044 | Red Hat Security Advisory: python3.12-setuptools security update | 2025-07-15T01:38:19+00:00 | 2025-11-07T03:32:02+00:00 |
| rhsa-2025:11036 | Red Hat Security Advisory: python-setuptools security update | 2025-07-15T01:37:44+00:00 | 2025-11-07T03:31:56+00:00 |
| rhsa-2025:11030 | Red Hat Security Advisory: emacs security update | 2025-07-15T01:37:44+00:00 | 2025-11-06T22:35:13+00:00 |
| rhsa-2025:10773 | Red Hat Security Advisory: OpenShift Container Platform 4.19.4 security and extras update | 2025-07-15T01:11:43+00:00 | 2025-11-06T23:14:18+00:00 |
| rhsa-2025:11043 | Red Hat Security Advisory: python3.11-setuptools security update | 2025-07-15T01:06:28+00:00 | 2025-11-07T03:31:59+00:00 |
| rhsa-2025:11042 | Red Hat Security Advisory: socat security update | 2025-07-15T00:52:03+00:00 | 2025-11-11T12:54:41+00:00 |
| rhsa-2025:11045 | Red Hat Security Advisory: kernel security update | 2025-07-15T00:39:13+00:00 | 2025-11-11T11:27:15+00:00 |
| rhsa-2025:11047 | Red Hat Security Advisory: pcs security update | 2025-07-15T00:35:48+00:00 | 2025-11-06T22:56:17+00:00 |
| rhsa-2025:11048 | Red Hat Security Advisory: rsync security update | 2025-07-15T00:31:43+00:00 | 2025-11-08T04:24:27+00:00 |
| rhsa-2025:10992 | Red Hat Security Advisory: Red Hat Developer Hub 1.5.3 release. | 2025-07-14T19:46:35+00:00 | 2025-11-07T03:32:00+00:00 |
| rhsa-2025:10991 | Red Hat Security Advisory: microcode_ctl security update | 2025-07-14T18:06:22+00:00 | 2025-11-11T16:17:43+00:00 |
| rhsa-2025:10981 | Red Hat Security Advisory: kpatch-patch-5_14_0-570_17_1 security update | 2025-07-14T17:19:37+00:00 | 2025-11-11T11:27:15+00:00 |
| rhsa-2025:10979 | Red Hat Security Advisory: kpatch-patch-5_14_0-427_13_1, kpatch-patch-5_14_0-427_31_1, kpatch-patch-5_14_0-427_44_1, kpatch-patch-5_14_0-427_55_1, and kpatch-patch-5_14_0-427_68_2 security update | 2025-07-14T17:14:29+00:00 | 2025-11-11T11:27:15+00:00 |
| rhsa-2025:10976 | Red Hat Security Advisory: kpatch-patch-4_18_0-372_118_1, kpatch-patch-4_18_0-372_131_1, kpatch-patch-4_18_0-372_137_1, kpatch-patch-4_18_0-372_145_1, and kpatch-patch-4_18_0-372_91_1 security update | 2025-07-14T17:14:12+00:00 | 2025-11-11T11:27:13+00:00 |
| rhsa-2025:10980 | Red Hat Security Advisory: kpatch-patch-5_14_0-284_104_1, kpatch-patch-5_14_0-284_117_1, kpatch-patch-5_14_0-284_52_1, kpatch-patch-5_14_0-284_79_1, and kpatch-patch-5_14_0-284_92_1 security update | 2025-07-14T17:13:42+00:00 | 2025-11-11T11:27:15+00:00 |
| rhsa-2025:10977 | Red Hat Security Advisory: kpatch-patch-4_18_0-553, kpatch-patch-4_18_0-553_16_1, kpatch-patch-4_18_0-553_30_1, kpatch-patch-4_18_0-553_40_1, and kpatch-patch-4_18_0-553_53_1 security update | 2025-07-14T17:11:43+00:00 | 2025-11-11T11:27:14+00:00 |
| rhsa-2025:10974 | Red Hat Security Advisory: kpatch-patch-4_18_0-477_43_1, kpatch-patch-4_18_0-477_67_1, kpatch-patch-4_18_0-477_81_1, kpatch-patch-4_18_0-477_89_1, and kpatch-patch-4_18_0-477_97_1 security update | 2025-07-14T17:11:43+00:00 | 2025-11-11T11:27:13+00:00 |
| rhsa-2025:10978 | Red Hat Security Advisory: kpatch-patch-5_14_0-70_112_1, kpatch-patch-5_14_0-70_121_1, kpatch-patch-5_14_0-70_124_1, kpatch-patch-5_14_0-70_132_1, and kpatch-patch-5_14_0-70_85_1 security update | 2025-07-14T17:07:14+00:00 | 2025-11-11T11:27:14+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-37942 | HID: pidff: Make sure to fetch pool before checking SIMULTANEOUS_MAX | 2025-05-02T00:00:00.000Z | 2025-09-03T21:59:05.000Z |
| msrc_cve-2025-37940 | ftrace: Add cond_resched() to ftrace_graph_set_hash() | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37938 | tracing: Verify event formats that have "%*p.." | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37936 | perf/x86/intel: KVM: Mask PEBS_ENABLE loaded for guest with vCPU's value. | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37933 | octeon_ep: Fix host hang issue during device reboot | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37932 | sch_htb: make htb_qlen_notify() idempotent | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37931 | btrfs: adjust subpage bit start based on sectorsize | 2025-05-02T00:00:00.000Z | 2025-09-03T23:57:34.000Z |
| msrc_cve-2025-37930 | drm/nouveau: Fix WARN_ON in nouveau_fence_context_kill() | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37927 | iommu/amd: Fix potential buffer overflow in parse_ivrs_acpihid | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37926 | ksmbd: fix use-after-free in ksmbd_session_rpc_open | 2025-05-02T00:00:00.000Z | 2025-09-04T00:12:26.000Z |
| msrc_cve-2025-37924 | ksmbd: fix use-after-free in kerberos authentication | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37923 | tracing: Fix oob write in trace_seq_to_buffer() | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37922 | book3s64/radix : Align section vmemmap start address to PAGE_SIZE | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37921 | vxlan: vnifilter: Fix unlocked deletion of default FDB entry | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37920 | xsk: Fix race condition in AF_XDP generic RX path | 2025-05-02T00:00:00.000Z | 2025-09-03T23:01:31.000Z |
| msrc_cve-2025-37918 | Bluetooth: btusb: avoid NULL pointer dereference in skb_dequeue() | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37916 | pds_core: remove write-after-free of client_id | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37915 | net_sched: drr: Fix double list add in class with netem as child qdisc | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37914 | net_sched: ets: Fix double list add in class with netem as child qdisc | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37913 | net_sched: qfq: Fix double list add in class with netem as child qdisc | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37911 | bnxt_en: Fix out-of-bound memcpy() during ethtool -w | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37909 | net: lan743x: Fix memleak issue when GSO enabled | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37907 | accel/ivpu: Fix locking order in ivpu_job_submit | 2025-05-02T00:00:00.000Z | 2025-09-03T21:53:02.000Z |
| msrc_cve-2025-37905 | firmware: arm_scmi: Balance device refcount when destroying devices | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37903 | drm/amd/display: Fix slab-use-after-free in hdcp | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37901 | irqchip/qcom-mpm: Prevent crash when trying to handle non-wake GPIOs | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37899 | ksmbd: fix use-after-free in session logoff | 2025-05-02T00:00:00.000Z | 2025-09-04T01:01:26.000Z |
| msrc_cve-2025-37897 | wifi: plfxlc: Remove erroneous assert in plfxlc_mac_release | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37892 | mtd: inftlcore: Add error check for inftl_read_oob() | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37891 | ALSA: ump: Fix buffer overflow at UMP SysEx message conversion | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2018-000047 | IIJ SmartKey App for Android vulnerable to authentication bypass | 2018-05-11T14:34+09:00 | 2019-12-27T18:11+09:00 |
| jvndb-2018-003030 | Access Control Vulnerability in Hitachi Infrastructure Analytics Advisor | 2018-05-10T15:30+09:00 | 2018-07-31T12:12+09:00 |
| jvndb-2018-000045 | Multiple vulnerabilities in WordPress plugin "Ultimate Member" | 2018-05-10T13:44+09:00 | 2018-08-30T18:11+09:00 |
| jvndb-2018-000044 | RT-AC68U vulnerable to cross-site scripting | 2018-05-09T15:38+09:00 | 2018-08-30T12:20+09:00 |
| jvndb-2018-000043 | RT-AC1200HP vulnerable to cross-site scripting | 2018-05-09T15:37+09:00 | 2018-08-30T12:15+09:00 |
| jvndb-2018-000042 | RT-AC87U vulnerable to cross-site scripting | 2018-05-09T15:37+09:00 | 2018-08-30T12:32+09:00 |
| jvndb-2018-000041 | The installers of multiple CELSYS,Inc. software may insecurely load Dynamic Link Libraries | 2018-04-27T15:19+09:00 | 2018-08-30T14:12+09:00 |
| jvndb-2018-000040 | WordPress plugin "Open Graph for Facebook, Google+ and Twitter Card Tags" vulnerable to cross-site scripting | 2018-04-27T15:01+09:00 | 2018-08-30T13:54+09:00 |
| jvndb-2018-000039 | WordPress plugin "PixelYourSite" vulnerable to cross-site scripting | 2018-04-27T14:24+09:00 | 2018-08-30T11:55+09:00 |
| jvndb-2018-000038 | WordPress plugin "WP Google Map Plugin" vulnerable to cross-site scripting | 2018-04-27T14:15+09:00 | 2018-08-30T12:00+09:00 |
| jvndb-2018-000037 | WordPress plugin "Events Manager" vulnerable to cross-site scripting | 2018-04-27T14:00+09:00 | 2018-08-30T11:48+09:00 |
| jvndb-2018-000036 | Joruri Gw vulnerable to arbitrary file upload | 2018-04-26T15:19+09:00 | 2018-08-30T14:02+09:00 |
| jvndb-2018-000035 | EC-CUBE vulnerable to session fixation | 2018-04-17T13:39+09:00 | 2018-08-22T17:42+09:00 |
| jvndb-2018-000030 | Installer of SoundEngine Free may insecurely load Dynamic Link Libraries | 2018-04-13T13:52+09:00 | 2018-06-14T14:16+09:00 |
| jvndb-2018-000034 | Tenable Appliance vulnerable to cross-site scripting | 2018-04-12T14:33+09:00 | 2018-06-14T14:20+09:00 |
| jvndb-2018-000033 | The installer of PhishWall Client Internet Explorer edition may insecurely load Dynamic Link Libraries | 2018-04-12T14:27+09:00 | 2018-04-12T14:27+09:00 |
| jvndb-2018-000032 | Hatena Bookmark App for iOS contains an address bar spoofing vulnerability | 2018-04-10T13:39+09:00 | 2018-04-10T13:39+09:00 |
| jvndb-2018-000031 | Multiple vulnerabilities in Cybozu Garoon | 2018-04-09T14:27+09:00 | 2018-06-14T14:33+09:00 |
| jvndb-2018-002257 | DoS Vulnerability in JP1/ServerConductor/Deployment Manager and Hitachi Compute Systems Manager | 2018-04-05T10:22+09:00 | 2018-04-10T10:55+09:00 |
| jvndb-2018-000029 | Safari vulnerable to script injection | 2018-03-30T13:39+09:00 | 2018-06-14T14:02+09:00 |
| jvndb-2018-000028 | LXR vulnerable to OS command injection | 2018-03-29T14:00+09:00 | 2018-06-14T14:08+09:00 |
| jvndb-2018-000027 | Multiple vulnerabilities in WZR-1750DHP2 | 2018-03-29T13:52+09:00 | 2018-06-14T14:12+09:00 |
| jvndb-2018-000026 | iRemoconWiFi App for Android fails to verify SSL server certificates | 2018-03-27T13:40+09:00 | 2018-06-14T14:29+09:00 |
| jvndb-2018-000025 | The installer of PhishWall Client Firefox and Chrome edition for Windows may insecurely load Dynamic Link Libraries | 2018-03-15T13:38+09:00 | 2018-06-14T13:43+09:00 |
| jvndb-2018-000908 | WebProxy vulnerable to directory traversal | 2018-03-13T16:48+09:00 | 2018-06-14T13:51+09:00 |
| jvndb-2018-000906 | TinyFTP Daemon vulnerable to buffer overflow | 2018-03-13T16:48+09:00 | 2018-06-14T14:12+09:00 |
| jvndb-2018-000905 | ViX may insecurely load Dynamic Link Libraries | 2018-03-13T16:48+09:00 | 2018-06-14T13:52+09:00 |
| jvndb-2018-000904 | PHP 2chBBS vulnerable to cross-site scripting | 2018-03-13T16:47+09:00 | 2018-06-14T13:55+09:00 |
| jvndb-2018-000900 | ArsenoL vulnerable to cross-site scripting | 2018-03-13T16:46+09:00 | 2018-06-14T13:58+09:00 |
| jvndb-2018-000907 | QQQ SYSTEMS vulnerable to arbitrary command injection | 2018-03-13T16:43+09:00 | 2018-06-14T13:53+09:00 |
| ID | Description | Updated |
|---|