Recent vulnerabilities
| ID | Description | Published | Updated |
|---|---|---|---|
| ghsa-rfwj-hvcp-2885 | This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Sonoma … | 2025-11-04T03:30:28Z | 2025-11-04T15:31:33Z |
| ghsa-qj67-gr9c-3589 | The issue was addressed with improved memory handling. This issue is fixed in watchOS 26.1, iOS 26.… | 2025-11-04T03:30:28Z | 2025-11-04T18:31:52Z |
| ghsa-pwvc-4r36-xf4c | This issue was addressed with improved validation of symlinks. This issue is fixed in visionOS 26.1… | 2025-11-04T03:30:28Z | 2025-11-05T21:31:00Z |
| ghsa-pq76-cc8r-h3cm | The issue was addressed with improved memory handling. This issue is fixed in Safari 26.1, visionOS… | 2025-11-04T03:30:28Z | 2025-11-04T15:31:32Z |
| ghsa-p2fp-xccv-vf5p | A buffer overflow was addressed with improved bounds checking. This issue is fixed in Safari 26.1, … | 2025-11-04T03:30:28Z | 2025-11-05T21:30:59Z |
| ghsa-mjxr-6g34-88q5 | A permissions issue was addressed with improved validation. This issue is fixed in macOS Sonoma 14.… | 2025-11-04T03:30:28Z | 2025-11-04T18:31:52Z |
| ghsa-m3cw-288r-j9r9 | The issue was addressed with improved memory handling. This issue is fixed in iOS 26.1 and iPadOS 2… | 2025-11-04T03:30:28Z | 2025-11-05T21:31:00Z |
| ghsa-jrv3-f6mq-763r | An out-of-bounds read was addressed with improved input validation. This issue is fixed in visionOS… | 2025-11-04T03:30:28Z | 2025-11-05T21:31:00Z |
| ghsa-jp2w-2c9w-v4jw | The issue was addressed with improved bounds checks. This issue is fixed in iOS 26.1 and iPadOS 26.… | 2025-11-04T03:30:28Z | 2025-11-04T18:31:52Z |
| ghsa-jj3r-g3mj-2cmm | A logging issue was addressed with improved data redaction. This issue is fixed in iOS 26.1 and iPa… | 2025-11-04T03:30:28Z | 2025-11-05T21:30:59Z |
| ghsa-hp39-5pfm-cwwg | A file quarantine bypass was addressed with additional checks. This issue is fixed in macOS Sonoma … | 2025-11-04T03:30:28Z | 2025-11-04T18:31:52Z |
| ghsa-hmxw-42mv-c458 | This issue was addressed through improved state management. This issue is fixed in Safari 26.1, vis… | 2025-11-04T03:30:28Z | 2025-11-04T15:31:33Z |
| ghsa-h3q9-mrw5-m795 | A use-after-free issue was addressed with improved memory management. This issue is fixed in watchO… | 2025-11-04T03:30:28Z | 2025-11-05T21:31:00Z |
| ghsa-gwp3-4wx7-jwwf | The issue was addressed with improved memory handling. This issue is fixed in Safari 26.1, visionOS… | 2025-11-04T03:30:28Z | 2025-11-05T21:31:00Z |
| ghsa-grg8-q2p5-vr2m | A race condition was addressed with improved state handling. This issue is fixed in macOS Sonoma 14… | 2025-11-04T03:30:28Z | 2025-11-04T15:31:32Z |
| ghsa-gh9m-4g47-fhpv | This issue was addressed with improved checks This issue is fixed in Safari 26.1, visionOS 26.1, wa… | 2025-11-04T03:30:28Z | 2025-11-04T18:31:52Z |
| ghsa-g56v-hwx4-cxqq | A use-after-free issue was addressed with improved memory management. This issue is fixed in Safari… | 2025-11-04T03:30:28Z | 2025-11-04T15:31:33Z |
| ghsa-g2mg-7ch7-9vr3 | An access issue was addressed with additional sandbox restrictions. This issue is fixed in visionOS… | 2025-11-04T03:30:28Z | 2025-11-04T15:31:32Z |
| ghsa-fgch-fhp4-c3fg | A permissions issue was addressed with additional sandbox restrictions. This issue is fixed in macO… | 2025-11-04T03:30:28Z | 2025-11-04T18:31:52Z |
| ghsa-f355-f4c3-6hgx | This issue was addressed with additional entitlement checks. This issue is fixed in macOS Sonoma 14… | 2025-11-04T03:30:28Z | 2025-11-04T15:31:32Z |
| ghsa-c5r8-2x4w-9v34 | This issue was addressed by restricting options offered on a locked device. This issue is fixed in … | 2025-11-04T03:30:28Z | 2025-11-04T15:31:32Z |
| ghsa-9cx4-pc9m-fxvr | A permissions issue was addressed with additional restrictions. This issue is fixed in watchOS 26.1… | 2025-11-04T03:30:28Z | 2025-11-05T21:31:00Z |
| ghsa-8gf8-fqww-vr2c | A logging issue was addressed with improved data redaction. This issue is fixed in iOS 26.1 and iPa… | 2025-11-04T03:30:28Z | 2025-11-04T15:31:32Z |
| ghsa-7xjx-fwh6-g2vq | A privacy issue was addressed by removing sensitive data. This issue is fixed in iOS 26.1 and iPadO… | 2025-11-04T03:30:28Z | 2025-11-05T21:31:00Z |
| ghsa-7mgf-w3jg-xvr7 | The issue was addressed with improved memory handling. This issue is fixed in Safari 26.1, visionOS… | 2025-11-04T03:30:28Z | 2025-11-05T21:31:00Z |
| ghsa-73f2-rmwh-r8w6 | The issue was addressed with improved memory handling. This issue is fixed in Safari 26.1, visionOS… | 2025-11-04T03:30:28Z | 2025-11-05T21:30:59Z |
| ghsa-43xx-j7mw-696v | Multiple issues were addressed by disabling array allocation sinking. This issue is fixed in iOS 26… | 2025-11-04T03:30:28Z | 2025-11-04T15:31:32Z |
| ghsa-3x69-vfm2-92j8 | A use-after-free issue was addressed with improved memory management. This issue is fixed in watchO… | 2025-11-04T03:30:28Z | 2025-11-05T21:31:00Z |
| ghsa-3jx8-9w5m-fvm9 | A permissions issue was addressed with additional restrictions. This issue is fixed in watchOS 26.1… | 2025-11-04T03:30:28Z | 2025-11-04T18:31:52Z |
| ghsa-vxm4-m9xw-gjq4 | A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoi… | 2025-11-04T03:30:27Z | 2025-11-04T18:31:52Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2025-11007 | CE21 Suite 2.2.1 - 2.3.1 - Missing Authorization to Un… |
ce21com |
CE21 Suite |
2025-11-04T03:26:45.901Z | 2025-11-04T18:49:41.405Z | |
| cve-2025-12070 | ViaAds <= 2.1.1 - Cross-Site Request Forgery to API Ke… |
viaads |
ViaAds |
2025-11-04T03:26:45.215Z | 2025-11-04T18:50:13.151Z | |
| cve-2025-47370 | 6.5 (v3.1) | Reachable Assertion in BT Controller |
Qualcomm, Inc. |
Snapdragon |
2025-11-04T03:19:26.256Z | 2025-11-04T19:00:52.629Z |
| cve-2025-47368 | 7.8 (v3.1) | Buffer Over-read in DSP Service |
Qualcomm, Inc. |
Snapdragon |
2025-11-04T03:19:24.982Z | 2025-11-04T14:44:51.488Z |
| cve-2025-47367 | 7.8 (v3.1) | Out-of-bounds Write in WinBlast Driver |
Qualcomm, Inc. |
Snapdragon |
2025-11-04T03:19:23.734Z | 2025-11-04T14:45:01.835Z |
| cve-2025-47365 | 7.8 (v3.1) | Integer Overflow or Wraparound in Automotive Platform |
Qualcomm, Inc. |
Snapdragon |
2025-11-04T03:19:22.474Z | 2025-11-04T14:45:13.687Z |
| cve-2025-47362 | 6.1 (v3.1) | Buffer Over-read in Automotive Software platform based… |
Qualcomm, Inc. |
Snapdragon |
2025-11-04T03:19:21.202Z | 2025-11-04T19:18:27.877Z |
| cve-2025-47361 | 7.8 (v3.1) | Improper Validation of Array Index in Automotive Softw… |
Qualcomm, Inc. |
Snapdragon |
2025-11-04T03:19:19.924Z | 2025-11-04T14:45:30.355Z |
| cve-2025-47360 | 7.8 (v3.1) | Stack-based Buffer Overflow in Automotive Software pla… |
Qualcomm, Inc. |
Snapdragon |
2025-11-04T03:19:18.581Z | 2025-11-04T14:45:44.073Z |
| cve-2025-47357 | 8 (v3.1) | Missing Authentication for Critical Function in SMSS |
Qualcomm, Inc. |
Snapdragon |
2025-11-04T03:19:17.319Z | 2025-11-04T19:18:49.323Z |
| cve-2025-47353 | 7.8 (v3.1) | Exposed Dangerous Method or Function in Automotive Sof… |
Qualcomm, Inc. |
Snapdragon |
2025-11-04T03:19:16.035Z | 2025-11-04T14:45:53.136Z |
| cve-2025-47352 | 7.8 (v3.1) | Improper Validation of Array Index in Audio |
Qualcomm, Inc. |
Snapdragon |
2025-11-04T03:19:14.758Z | 2025-11-04T14:46:09.028Z |
| cve-2025-27074 | 8.8 (v3.1) | Incorrect Calculation of Buffer Size in SCE-Mink |
Qualcomm, Inc. |
Snapdragon |
2025-11-04T03:19:13.447Z | 2025-11-04T14:46:19.115Z |
| cve-2025-27070 | 7.8 (v3.1) | Out-of-bounds Write in Windows Compute |
Qualcomm, Inc. |
Snapdragon |
2025-11-04T03:19:12.122Z | 2025-11-04T14:46:30.167Z |
| cve-2025-27064 | 6.1 (v3.1) | Buffer Over-read in Core Services |
Qualcomm, Inc. |
Snapdragon |
2025-11-04T03:19:10.792Z | 2025-11-04T19:39:01.419Z |
| cve-2025-12324 | TablePress – Tables in WordPress made easy <= 3.2.4 - … |
tobiasbg |
TablePress – Tables in WordPress made easy |
2025-11-04T02:26:55.497Z | 2025-11-05T14:49:27.004Z | |
| cve-2025-11841 | Greenshift – animation and page builder blocks <= 12.2… |
wpsoul |
Greenshift – animation and page builder blocks |
2025-11-04T01:50:26.195Z | 2025-11-04T20:49:06.880Z | |
| cve-2025-43373 | N/A | The issue was addressed with improved memory hand… |
Apple |
macOS |
2025-11-04T01:18:04.169Z | 2025-11-04T14:37:55.279Z |
| cve-2025-43365 | N/A | A denial-of-service issue was addressed with impr… |
Apple |
iOS and iPadOS |
2025-11-04T01:17:59.138Z | 2025-11-05T18:33:44.365Z |
| cve-2025-43430 | N/A | This issue was addressed through improved state m… |
Apple |
Safari |
2025-11-04T01:17:57.253Z | 2025-11-04T16:50:56.968Z |
| cve-2025-43426 | N/A | A logging issue was addressed with improved data … |
Apple |
iOS and iPadOS |
2025-11-04T01:17:56.437Z | 2025-11-04T15:31:50.262Z |
| cve-2025-43390 | N/A | A downgrade issue affecting Intel-based Mac compu… |
Apple |
macOS |
2025-11-04T01:17:54.534Z | 2025-11-04T14:40:31.629Z |
| cve-2025-43447 | N/A | The issue was addressed with improved memory hand… |
Apple |
visionOS |
2025-11-04T01:17:53.695Z | 2025-11-04T16:44:48.812Z |
| cve-2025-43502 | N/A | A privacy issue was addressed by removing sensiti… |
Apple |
Safari |
2025-11-04T01:17:52.851Z | 2025-11-04T14:47:59.138Z |
| cve-2025-43386 | N/A | An out-of-bounds access issue was addressed with … |
Apple |
iOS and iPadOS |
2025-11-04T01:17:51.013Z | 2025-11-06T14:34:08.916Z |
| cve-2025-43345 | N/A | A correctness issue was addressed with improved c… |
Apple |
macOS |
2025-11-04T01:17:49.289Z | 2025-11-04T14:51:39.904Z |
| cve-2025-43493 | N/A | The issue was addressed with improved checks. Thi… |
Apple |
iOS and iPadOS |
2025-11-04T01:17:45.738Z | 2025-11-06T14:35:05.690Z |
| cve-2025-43387 | N/A | A permissions issue was addressed with additional… |
Apple |
macOS |
2025-11-04T01:17:42.899Z | 2025-11-05T04:55:19.394Z |
| cve-2025-43411 | N/A | This issue was addressed with additional entitlem… |
Apple |
macOS |
2025-11-04T01:17:41.073Z | 2025-11-04T14:58:31.806Z |
| cve-2025-43446 | N/A | This issue was addressed with improved validation… |
Apple |
macOS |
2025-11-04T01:17:39.255Z | 2025-11-04T13:00:19.992Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2025-20730 | N/A | In preloader, there is a possible escalation of p… |
MediaTek, Inc. |
MT2737, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6990, MT6991, MT8188, MT8195, MT8676, MT8678, MT8696 |
2025-11-04T06:19:47.152Z | 2025-11-05T04:55:40.432Z |
| cve-2025-20729 | N/A | In wlan AP driver, there is a possible out of bou… |
MediaTek, Inc. |
MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986 |
2025-11-04T06:20:05.491Z | 2025-11-05T04:55:48.589Z |
| cve-2025-20728 | N/A | In wlan STA driver, there is a possible out of bo… |
MediaTek, Inc. |
MT7902, MT7920, MT7921, MT7922, MT7925, MT7927 |
2025-11-04T06:19:45.290Z | 2025-11-05T04:55:39.588Z |
| cve-2025-20727 | N/A | In Modem, there is a possible out of bounds write… |
MediaTek, Inc. |
MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8786, MT8788, MT8788E, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893 |
2025-11-04T06:19:40.087Z | 2025-11-05T04:55:35.978Z |
| cve-2025-20726 | N/A | In Modem, there is a possible out of bounds write… |
MediaTek, Inc. |
MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8786, MT8788, MT8788E, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893 |
2025-11-04T06:19:41.827Z | 2025-11-05T04:55:36.771Z |
| cve-2025-20725 | N/A | In ims service, there is a possible out of bounds… |
MediaTek, Inc. |
MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8786, MT8788, MT8788E, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8893 |
2025-11-04T06:19:43.569Z | 2025-11-05T04:55:37.570Z |
| cve-2025-12683 | 5.8 (v4.0) | NULL DACL assigned to Named Pipe communicating with SY… |
Voidtools |
Everything |
2025-11-04T04:23:02.884Z | 2025-11-04T20:50:21.977Z |
| cve-2025-12456 | Centangle Team Showcase <= 1.0.0 - Cross-Site Request … |
centangle |
Centangle-Team |
2025-11-04T04:27:17.736Z | 2025-11-04T16:43:20.440Z | |
| cve-2025-12452 | Visit Counter 1.0 - Cross-Site Request Forgery to Stor… |
bestiadurmiente |
Visit Counter |
2025-11-04T04:27:22.522Z | 2025-11-04T15:08:35.205Z | |
| cve-2025-12416 | Pagerank Tools <= 1.1.5 - Cross-Site Request Forgery t… |
mahype |
Pagerank tools |
2025-11-04T04:27:13.744Z | 2025-11-04T20:56:39.593Z | |
| cve-2025-12415 | MapMap <= 1.1 - Cross-Site Request Forgery to Settings… |
sugiartha |
MapMap |
2025-11-04T04:27:19.056Z | 2025-11-04T15:53:00.650Z | |
| cve-2025-12413 | Social Media WPCF7 Stop Words <= 1.1.3 - Cross-Site Re… |
socialmedialtd |
WPCF7 Stop words |
2025-11-04T04:27:14.981Z | 2025-11-04T21:00:10.133Z | |
| cve-2025-12412 | Top Bar Notification <= 1.12 - Cross-Site Request Forg… |
josereyev |
Top Bar Notification |
2025-11-04T04:27:12.930Z | 2025-11-04T20:53:26.807Z | |
| cve-2025-12410 | SH Contextual Help <= 3.2.1 - Cross-Site Request Forge… |
samhoamt |
SH Contextual Help |
2025-11-04T04:27:15.805Z | 2025-11-04T21:01:21.541Z | |
| cve-2025-12403 | Associados Amazon Plugin <= 0.8 - Cross-Site Request F… |
revokee |
Associados Amazon Plugin |
2025-11-04T04:27:23.574Z | 2025-11-04T14:58:40.263Z | |
| cve-2025-12402 | LinkedIn Resume <= 2.00 - Cross-Site Request Forgery t… |
bondnono |
LinkedIn Resume |
2025-11-04T04:27:19.651Z | 2025-11-04T15:52:16.797Z | |
| cve-2025-12400 | LMB^Box Smileys <= 3.2 - Cross-Site Request Forgery to… |
lmbbox |
LMB^Box Smileys |
2025-11-04T04:27:17.374Z | 2025-11-04T16:47:13.869Z | |
| cve-2025-12396 | Clubmember <= 0.2 - Authenticated (Admin+) Stored Cros… |
alaminopu |
clubmember |
2025-11-04T04:27:24.287Z | 2025-11-04T14:41:45.820Z | |
| cve-2025-12393 | Free Quotation <= 3.1.6 - Authenticated (Admin+) Store… |
kris_iv |
Free Quotation |
2025-11-04T04:27:14.125Z | 2025-11-04T20:58:53.990Z | |
| cve-2025-12389 | Import Export For WooCommerce <= 1.6.2 - Missing Autho… |
sidngr |
Import Export For WooCommerce |
2025-11-04T04:27:21.061Z | 2025-11-04T15:20:23.287Z | |
| cve-2025-12371 | Nari Accountant <= 1.0.12 - Authenticated (Editor+) St… |
shakhi |
Nari Accountant |
2025-11-04T04:27:21.431Z | 2025-11-04T15:15:44.559Z | |
| cve-2025-12369 | Extensions for Leaflet Map <= 4.7 - Authenticated (Con… |
hupe13 |
Extensions for Leaflet Map |
2025-11-04T04:27:17.014Z | 2025-11-04T16:47:34.277Z | |
| cve-2025-12350 | DominoKit <= 1.1.0 - Missing Authorization to Unauthen… |
domiinodev |
DominoKit |
2025-11-04T04:27:14.553Z | 2025-11-04T20:59:31.623Z | |
| cve-2025-12188 | Posts Navigation Links for Sections and Headings - Fre… |
wpmasterscom |
Posts Navigation Links for Sections and Headings – Free by WP Masters |
2025-11-04T04:27:12.323Z | 2025-11-04T20:52:13.667Z | |
| cve-2025-12158 | Simple User Capabilities <= 1.0 - Missing Authorizatio… |
tanvirahmed1984 |
Simple User Capabilities |
2025-11-04T04:27:22.881Z | 2025-11-04T15:01:57.048Z | |
| cve-2025-12157 | Simple User Capabilities <= 1.0 - Missing Authorizatio… |
tanvirahmed1984 |
Simple User Capabilities |
2025-11-04T04:27:16.185Z | 2025-11-04T17:16:00.320Z | |
| cve-2025-12156 | Ai Auto Tool Content Writing Assistant (Gemini Writer,… |
aitool |
Ai Auto Tool Content Writing Assistant (Gemini Writer, ChatGPT ) All in One |
2025-11-04T04:27:18.698Z | 2025-11-04T16:08:38.677Z | |
| cve-2025-12065 | WP Carticon <= 1.0.0 - Authenticated (Admin+) Stored C… |
carticon |
WP Carticon |
2025-11-04T04:27:21.798Z | 2025-11-04T15:10:58.084Z | |
| cve-2025-11890 | Crypto Payment Gateway with Payeer for WooCommerce <= … |
beycanpress |
Crypto Payment Gateway with Payeer for WooCommerce |
2025-11-04T04:27:16.569Z | 2025-11-04T16:47:59.207Z | |
| cve-2025-11812 | Reuse Builder <= 1.7 - Authenticated (Contributor+) St… |
redq |
Reuse Builder |
2025-11-04T04:27:23.926Z | 2025-11-04T14:56:24.438Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-178182 | Malicious code in rindaman-poke21 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178181 | Malicious code in rindaman-poke20 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178180 | Malicious code in rindaman-poke2 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178179 | Malicious code in rindaman-poke19 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178178 | Malicious code in rindaman-poke18 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178177 | Malicious code in rindaman-poke17 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178176 | Malicious code in rindaman-poke16 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178175 | Malicious code in rindaman-poke15 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178174 | Malicious code in rindaman-poke14 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178173 | Malicious code in rindaman-poke13 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178172 | Malicious code in rindaman-poke12 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178171 | Malicious code in rindaman-poke11 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178170 | Malicious code in rindaman-poke10 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178169 | Malicious code in rindaman-poke1 (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178168 | Malicious code in reion-tui-pix (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178167 | Malicious code in ramadan-zidan-tea (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178166 | Malicious code in polymera-munirato (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178165 | Malicious code in polymera-munirat (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178164 | Malicious code in polymera-munira (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178163 | Malicious code in polymera-manuyat-mayasi (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178162 | Malicious code in polymera-buyasi (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178161 | Malicious code in polymera-buyaitatar (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178160 | Malicious code in polymera-buyaitata (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178159 | Malicious code in polymera-buyaitat (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178158 | Malicious code in polymera-buyaita (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178157 | Malicious code in polymera-buyai (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178156 | Malicious code in polymera-anasri (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178155 | Malicious code in polymera-anasrai (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178154 | Malicious code in polymera-anasiraia (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| mal-2025-178153 | Malicious code in polymera-anasirai (npm) | 2025-11-12T19:18:14Z | 2025-11-12T19:18:14Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:10931 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.23 Security update | 2025-07-14T16:21:20+00:00 | 2025-11-11T17:10:33+00:00 |
| rhsa-2025:10925 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.23 Security update | 2025-07-14T15:56:17+00:00 | 2025-11-11T17:10:32+00:00 |
| rhsa-2025:10924 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.23 Security update | 2025-07-14T15:56:17+00:00 | 2025-11-11T17:10:31+00:00 |
| rhsa-2025:10926 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.23 Security update | 2025-07-14T15:55:57+00:00 | 2025-11-11T17:10:33+00:00 |
| rhsa-2025:10876 | Red Hat Security Advisory: cloud-init security update | 2025-07-14T11:20:17+00:00 | 2025-11-11T09:40:22+00:00 |
| rhsa-2025:10879 | Red Hat Security Advisory: cloud-init security update | 2025-07-14T11:16:22+00:00 | 2025-11-11T09:40:24+00:00 |
| rhsa-2025:10871 | Red Hat Security Advisory: sudo security update | 2025-07-14T10:44:37+00:00 | 2025-11-06T23:14:26+00:00 |
| rhsa-2025:10854 | Red Hat Security Advisory: kernel security update | 2025-07-14T08:20:46+00:00 | 2025-11-11T08:48:01+00:00 |
| rhsa-2025:10848 | Red Hat Security Advisory: cloud-init security update | 2025-07-14T07:35:46+00:00 | 2025-11-11T09:40:21+00:00 |
| rhsa-2025:10844 | Red Hat Security Advisory: cloud-init security update | 2025-07-14T07:13:31+00:00 | 2025-11-11T09:40:19+00:00 |
| rhsa-2025:10837 | Red Hat Security Advisory: kernel security update | 2025-07-14T02:33:21+00:00 | 2025-11-11T16:22:52+00:00 |
| rhsa-2025:10834 | Red Hat Security Advisory: kernel security update | 2025-07-14T01:22:25+00:00 | 2025-11-11T11:27:12+00:00 |
| rhsa-2025:10836 | Red Hat Security Advisory: sudo security update | 2025-07-14T01:19:40+00:00 | 2025-11-06T23:14:21+00:00 |
| rhsa-2025:10835 | Red Hat Security Advisory: sudo security update | 2025-07-14T01:15:10+00:00 | 2025-11-06T23:14:21+00:00 |
| rhsa-2025:10830 | Red Hat Security Advisory: kernel security update | 2025-07-14T00:25:51+00:00 | 2025-11-11T11:27:12+00:00 |
| rhsa-2025:10828 | Red Hat Security Advisory: kernel security update | 2025-07-14T00:25:21+00:00 | 2025-11-11T11:27:12+00:00 |
| rhsa-2025:10829 | Red Hat Security Advisory: kernel-rt security update | 2025-07-14T00:20:20+00:00 | 2025-11-11T11:27:12+00:00 |
| rhsa-2025:10823 | Red Hat Security Advisory: Red Hat build of Tempo 3.6.1 release | 2025-07-10T17:57:25+00:00 | 2025-11-11T16:22:44+00:00 |
| rhsa-2025:10814 | Red Hat Security Advisory: apache-commons-beanutils security update | 2025-07-10T16:19:11+00:00 | 2025-11-11T16:22:51+00:00 |
| rhsa-2025:10809 | Red Hat Security Advisory: satellite/iop-advisor-engine-rhel9 container image available as a Technology Preview | 2025-07-10T14:18:19+00:00 | 2025-11-07T03:31:54+00:00 |
| rhsa-2025:10796 | Red Hat Security Advisory: libblockdev security update | 2025-07-10T13:21:31+00:00 | 2025-11-11T10:12:40+00:00 |
| rhsa-2025:10787 | Red Hat Security Advisory: Red Hat OpenShift Builds 1.4.1 | 2025-07-10T10:31:35+00:00 | 2025-11-07T03:31:54+00:00 |
| rhsa-2025:10780 | Red Hat Security Advisory: glib2 security update | 2025-07-10T10:00:05+00:00 | 2025-11-06T22:45:12+00:00 |
| rhsa-2025:10779 | Red Hat Security Advisory: sudo security update | 2025-07-10T08:45:45+00:00 | 2025-11-06T23:14:19+00:00 |
| rhsa-2025:10761 | Red Hat Security Advisory: kernel security update | 2025-07-10T03:00:20+00:00 | 2025-11-11T11:27:11+00:00 |
| rhsa-2025:10271 | Red Hat Security Advisory: OpenShift Container Platform 4.12.78 packages and security update | 2025-07-10T01:56:40+00:00 | 2025-11-11T20:38:44+00:00 |
| rhsa-2025:10270 | Red Hat Security Advisory: OpenShift Container Platform 4.12.78 bug fix and security update | 2025-07-10T01:34:18+00:00 | 2025-10-21T04:17:34+00:00 |
| rhsa-2025:10738 | Red Hat Security Advisory: Kiali 2.4.7 for Red Hat OpenShift Service Mesh 3.0 | 2025-07-09T15:20:25+00:00 | 2025-11-10T12:10:46+00:00 |
| rhsa-2025:10735 | Red Hat Security Advisory: Red Hat build of OpenTelemetry 3.6.1 release | 2025-07-09T14:31:36+00:00 | 2025-11-11T16:22:43+00:00 |
| rhsa-2025:10707 | Red Hat Security Advisory: sudo security update | 2025-07-09T13:08:53+00:00 | 2025-11-06T23:14:16+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-37890 | net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37887 | pds_core: handle unsupported PDS_CORE_CMD_FW_CONTROL result | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37886 | pds_core: make wait_context part of q_info | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37885 | KVM: x86: Reset IRTE to host control if *new* route isn't postable | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37884 | bpf: Fix deadlock between rcu_tasks_trace and event_mutex. | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37883 | s390/sclp: Add check for get_zeroed_page() | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37882 | usb: xhci: Fix isochronous Ring Underrun/Overrun event handling | 2025-05-02T00:00:00.000Z | 2025-09-04T01:40:47.000Z |
| msrc_cve-2025-37881 | usb: gadget: aspeed: Add NULL pointer check in ast_vhub_init_dev() | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37880 | um: work around sched_yield not yielding in time-travel mode | 2025-05-02T00:00:00.000Z | 2025-09-03T23:50:47.000Z |
| msrc_cve-2025-37879 | 9p/net: fix improper handling of bogus negative read/write replies | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37878 | perf/core: Fix WARN_ON(!ctx) in __free_event() for partial init | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37877 | iommu: Clear iommu-dma ops on cleanup | 2025-05-02T00:00:00.000Z | 2025-09-03T23:22:02.000Z |
| msrc_cve-2025-37875 | igc: fix PTM cycle trigger logic | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37874 | net: ngbe: fix memory leak in ngbe_probe() error path | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37870 | drm/amd/display: prevent hang on link training fail | 2025-05-02T00:00:00.000Z | 2025-09-03T22:55:33.000Z |
| msrc_cve-2025-37867 | RDMA/core: Silence oversized kvmalloc() warning | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37865 | net: dsa: mv88e6xxx: fix -ENOENT when deleting VLANs and MST is unsupported | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37864 | net: dsa: clean up FDB, MDB, VLAN entries on unbind | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37862 | HID: pidff: Fix null pointer dereference in pidff_find_fields | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37861 | scsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue | 2025-05-02T00:00:00.000Z | 2025-09-03T21:49:17.000Z |
| msrc_cve-2025-37859 | page_pool: avoid infinite loop to schedule delayed worker | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37858 | fs/jfs: Prevent integer overflow in AG size calculation | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37857 | scsi: st: Fix array overflow in st_setup() | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37856 | btrfs: harden block_group::bg_list against list_del() races | 2025-05-02T00:00:00.000Z | 2025-09-04T01:23:30.000Z |
| msrc_cve-2025-37855 | drm/amd/display: Guard Possible Null Pointer Dereference | 2025-05-02T00:00:00.000Z | 2025-09-03T22:53:06.000Z |
| msrc_cve-2025-37854 | drm/amdkfd: Fix mode1 reset crash issue | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37853 | drm/amdkfd: debugfs hang_hws skip GPU with MES | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37852 | drm/amdgpu: handle amdgpu_cgs_create_device() errors in amd_powerplay_create() | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37851 | fbdev: omapfb: Add 'plane' value check | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37849 | KVM: arm64: Tear down vGIC on failed vCPU creation | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2018-000903 | QQQ SYSTEMS vulnerable to cross-site scripting | 2018-03-13T16:43+09:00 | 2018-06-14T14:03+09:00 |
| jvndb-2018-000902 | QQQ SYSTEMS vulnerable to cross-site scripting | 2018-03-13T16:43+09:00 | 2018-06-14T13:39+09:00 |
| jvndb-2018-000901 | QQQ SYSTEMS vulnerable to cross-site scripting | 2018-03-13T16:43+09:00 | 2018-06-14T12:31+09:00 |
| jvndb-2018-000024 | Multiple vulnerabilities in CG-WGR1200 | 2018-03-09T13:56+09:00 | 2018-06-14T13:54+09:00 |
| jvndb-2018-000023 | WordPress plugin "WP All Import" vulnerable to cross-site scripting | 2018-03-08T14:10+09:00 | 2018-06-14T12:27+09:00 |
| jvndb-2018-000022 | WordPress plugin "WP All Import" vulnerable to cross-site scripting | 2018-03-08T14:10+09:00 | 2018-06-14T12:26+09:00 |
| jvndb-2018-000021 | Installer of WinShot may insecurely load Dynamic Link Libraries | 2018-03-05T15:10+09:00 | 2018-06-14T13:43+09:00 |
| jvndb-2018-000020 | Installer of JTrim may insecurely load Dynamic Link Libraries | 2018-03-05T14:07+09:00 | 2018-06-14T13:46+09:00 |
| jvndb-2018-000019 | Multiple vulnerabilities in Jubatus | 2018-03-02T13:45+09:00 | 2018-06-14T13:57+09:00 |
| jvndb-2018-000017 | Multiple vulnerabilities in WXR-1900DHP2 | 2018-02-26T14:10+09:00 | 2018-06-14T13:49+09:00 |
| jvndb-2018-000016 | LINE for iOS fails to verify SSL server certificates | 2018-02-22T15:29+09:00 | 2018-06-14T12:23+09:00 |
| jvndb-2018-000015 | Multiple vulnerabilities in FS010W | 2018-02-22T15:29+09:00 | 2018-04-11T12:31+09:00 |
| jvndb-2018-000013 | Insecure DLL Loading issue in multiple Trend Micro products | 2018-02-15T16:39+09:00 | 2018-04-11T12:23+09:00 |
| jvndb-2018-001389 | XXE Vulnerability in Hitachi Device Manager | 2018-02-14T14:59+09:00 | 2018-03-01T15:20+09:00 |
| jvndb-2018-001388 | Multiple Vulnerabilities in Hitachi Command Suite | 2018-02-14T14:58+09:00 | 2018-03-01T15:20+09:00 |
| jvndb-2018-000014 | Application and self-extracting archive containing the application of "FLET'S v4 / v6 address selection tool" may insecurely load Dynamic Link Libraries | 2018-02-13T15:43+09:00 | 2018-04-11T12:28+09:00 |
| jvndb-2018-000012 | Installer of "FLET'S Azukeru Backup Tool" may insecurely load Dynamic Link Libraries | 2018-02-13T15:37+09:00 | 2018-04-11T12:25+09:00 |
| jvndb-2018-000011 | MP Form Mail CGI eCommerce Edition vulnerable to OS command injection | 2018-02-08T12:21+09:00 | 2018-04-11T11:57+09:00 |
| jvndb-2018-000009 | The installer of Anshin net security for Windows may insecurely load Dynamic Link Libraries | 2018-02-06T15:05+09:00 | 2018-04-11T12:13+09:00 |
| jvndb-2018-000007 | Multiple I-O DATA network devices incorporating "MagicalFinder" vulnerable to OS command injection | 2018-02-06T14:22+09:00 | 2018-04-11T11:51+09:00 |
| jvndb-2018-000010 | WordPress plugin "MTS Simple Booking C" vulnerable to cross-site scripting | 2018-02-02T13:39+09:00 | 2018-04-11T11:53+09:00 |
| jvndb-2018-000008 | Spring Security and Spring Framework vulnerable to authentication bypass | 2018-02-02T12:28+09:00 | 2018-06-14T13:48+09:00 |
| jvndb-2018-000006 | Multiple vulnerabilities in epg search result viewer(kkcald) | 2018-02-01T13:58+09:00 | 2018-04-11T11:49+09:00 |
| jvndb-2017-004607 | Deep Discovery Email Inspector vulnerable to arbitrary code execution | 2018-01-31T13:43+09:00 | 2018-01-31T13:43+09:00 |
| jvndb-2018-000005 | WordPress plugin "WP Retina 2x" vulnerable to cross-site scripting | 2018-01-30T12:30+09:00 | 2018-04-11T11:53+09:00 |
| jvndb-2018-000004 | The installer of "FLET'S VIRUS CLEAR Easy Setup & Application Tool" and "FLET'S VIRUS CLEAR v6 Easy Setup & Application Tool" may insecurely load Dynamic Link Libraries | 2018-01-22T14:17+09:00 | 2018-04-11T11:44+09:00 |
| jvndb-2018-000003 | GroupSession vulnerable to open redirect | 2018-01-19T14:19+09:00 | 2018-04-11T11:37+09:00 |
| jvndb-2018-000002 | Nootka App for Android vulnerable to OS command injection | 2018-01-19T14:19+09:00 | 2018-04-11T11:46+09:00 |
| jvndb-2017-005606 | Multiple vulnerabilities in Deep Discovery Email Inspector | 2018-01-17T16:15+09:00 | 2018-01-17T16:15+09:00 |
| jvndb-2017-002290 | Trend Micro Control Manager vulnerable to SQL injection | 2018-01-17T16:15+09:00 | 2018-01-17T16:15+09:00 |
| ID | Description | Updated |
|---|