Recent vulnerabilities
| ID | Description | Published | Updated |
|---|---|---|---|
| ghsa-3fg3-j45r-7qh2 | In the Linux kernel, the following vulnerability has been resolved: thermal: intel: quark_dts: fix… | 2025-12-30T15:30:35Z | 2025-12-30T15:30:35Z |
| ghsa-36j9-v89w-79c6 | In the Linux kernel, the following vulnerability has been resolved: ptp_qoriq: fix memory leak in … | 2025-12-30T15:30:35Z | 2025-12-30T15:30:35Z |
| ghsa-2337-fj37-r35q | In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: avoid referencing… | 2025-12-30T15:30:35Z | 2025-12-30T15:30:35Z |
| ghsa-wr38-v9r2-5hhw | In the Linux kernel, the following vulnerability has been resolved: s390/vmem: split pages when de… | 2025-12-30T15:30:34Z | 2025-12-30T15:30:34Z |
| ghsa-wm5w-7h48-37x2 | In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix an uninit variable a… | 2025-12-30T15:30:34Z | 2025-12-30T15:30:34Z |
| ghsa-wfvh-f2f6-f56w | In the Linux kernel, the following vulnerability has been resolved: iomap: Fix possible overflow c… | 2025-12-30T15:30:34Z | 2025-12-30T15:30:34Z |
| ghsa-wfjg-crvw-f25h | In the Linux kernel, the following vulnerability has been resolved: debugobjects: Don't wake up ks… | 2025-12-30T15:30:34Z | 2025-12-30T15:30:34Z |
| ghsa-vrgf-cf4x-v6w6 | In the Linux kernel, the following vulnerability has been resolved: fs/sysv: Null check to prevent… | 2025-12-30T15:30:34Z | 2025-12-30T15:30:34Z |
| ghsa-r3v9-vm52-w2px | In the Linux kernel, the following vulnerability has been resolved: powerpc/pseries: Rework lppaca… | 2025-12-30T15:30:34Z | 2025-12-30T15:30:34Z |
| ghsa-qq6g-5658-hpx2 | In the Linux kernel, the following vulnerability has been resolved: soundwire: bus: Fix unbalanced… | 2025-12-30T15:30:34Z | 2025-12-30T15:30:34Z |
| ghsa-q3xj-c96p-46gm | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2025-12-30T15:30:34Z | 2025-12-30T15:30:34Z |
| ghsa-jxrr-h72w-8m3v | In the Linux kernel, the following vulnerability has been resolved: cifs: fix potential oops in ci… | 2025-12-30T15:30:33Z | 2025-12-30T15:30:34Z |
| ghsa-jwmj-482q-j9c2 | In the Linux kernel, the following vulnerability has been resolved: RDMA/srpt: Add a check for val… | 2025-12-30T15:30:34Z | 2025-12-30T15:30:34Z |
| ghsa-jw53-vfm2-vf66 | In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: Fix NULL deref cau… | 2025-12-30T15:30:34Z | 2025-12-30T15:30:34Z |
| ghsa-jm7j-xgrw-fv67 | In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Fix a possible null-… | 2025-12-30T15:30:34Z | 2025-12-30T15:30:34Z |
| ghsa-jg98-775f-9rrv | In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Don't clone flow po… | 2025-12-30T15:30:34Z | 2025-12-30T15:30:34Z |
| ghsa-j78v-x2hm-xc58 | In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Add missing gfx11 … | 2025-12-30T15:30:33Z | 2025-12-30T15:30:34Z |
| ghsa-hvj9-4j33-rmxc | In the Linux kernel, the following vulnerability has been resolved: sh: dma: Fix DMA channel offse… | 2025-12-30T15:30:34Z | 2025-12-30T15:30:34Z |
| ghsa-gqhr-h84m-5956 | In the Linux kernel, the following vulnerability has been resolved: fbdev: udlfb: Fix endpoint che… | 2025-12-30T15:30:34Z | 2025-12-30T15:30:34Z |
| ghsa-fp2g-4w3c-p2mv | In the Linux kernel, the following vulnerability has been resolved: MIPS: fw: Allow firmware to pa… | 2025-12-30T15:30:34Z | 2025-12-30T15:30:34Z |
| ghsa-fg5h-p8w5-653v | In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: Fix memory leak … | 2025-12-30T15:30:34Z | 2025-12-30T15:30:34Z |
| ghsa-cphq-rv4m-x79g | In the Linux kernel, the following vulnerability has been resolved: SUNRPC: double free xprt_ctxt … | 2025-12-30T15:30:33Z | 2025-12-30T15:30:34Z |
| ghsa-c9xp-xhgq-2rj5 | In the Linux kernel, the following vulnerability has been resolved: xfrm: Fix leak of dev tracker … | 2025-12-30T15:30:34Z | 2025-12-30T15:30:34Z |
| ghsa-88jr-vfwv-8mp6 | In the Linux kernel, the following vulnerability has been resolved: tty: serial: imx: disable Agei… | 2025-12-30T15:30:34Z | 2025-12-30T15:30:34Z |
| ghsa-7v8c-h9vh-3q7f | In the Linux kernel, the following vulnerability has been resolved: drm/nouveau/kms/nv50-: init hp… | 2025-12-30T15:30:34Z | 2025-12-30T15:30:34Z |
| ghsa-76fv-99ww-8hmg | In the Linux kernel, the following vulnerability has been resolved: media: dvb-usb: m920x: Fix a p… | 2025-12-30T15:30:34Z | 2025-12-30T15:30:34Z |
| ghsa-6jgm-8895-m249 | In the Linux kernel, the following vulnerability has been resolved: media: usb: siano: Fix use aft… | 2025-12-30T15:30:34Z | 2025-12-30T15:30:34Z |
| ghsa-6cxv-3w9c-fphw | In the Linux kernel, the following vulnerability has been resolved: media: tuners: qt1010: replace… | 2025-12-30T15:30:34Z | 2025-12-30T15:30:34Z |
| ghsa-5q4r-9x8x-8xrp | In the Linux kernel, the following vulnerability has been resolved: btrfs: release path before ino… | 2025-12-30T15:30:34Z | 2025-12-30T15:30:34Z |
| ghsa-53m3-7xgw-52vj | In the Linux kernel, the following vulnerability has been resolved: cifs: Fix lost destroy smbd co… | 2025-12-30T15:30:34Z | 2025-12-30T15:30:34Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2025-37742 | N/A | jfs: Fix uninit-value access of imap allocated in the … |
Linux |
Linux |
2025-05-01T12:55:50.603Z | 2026-01-02T15:28:59.420Z |
| cve-2025-37741 | N/A | jfs: Prevent copying of nlink with value 0 from disk inode |
Linux |
Linux |
2025-05-01T12:55:49.947Z | 2026-01-02T15:28:58.213Z |
| cve-2025-37740 | N/A | jfs: add sanity check for agwidth in dbMount |
Linux |
Linux |
2025-05-01T12:55:49.287Z | 2026-01-02T15:28:57.031Z |
| cve-2025-37738 | N/A | ext4: ignore xattrs past end |
Linux |
Linux |
2025-05-01T12:55:47.981Z | 2026-01-02T15:28:55.490Z |
| cve-2025-23163 | N/A | net: vlan: don't propagate flags on open |
Linux |
Linux |
2025-05-01T12:55:47.380Z | 2026-01-02T15:28:54.249Z |
| cve-2025-23161 | N/A | PCI: vmd: Make vmd_dev::cfg_lock a raw_spinlock_t type |
Linux |
Linux |
2025-05-01T12:55:46.021Z | 2026-01-02T15:28:53.041Z |
| cve-2025-23141 | N/A | KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect … |
Linux |
Linux |
2025-05-01T12:55:31.525Z | 2026-01-02T15:28:51.304Z |
| cve-2025-22026 | N/A | nfsd: don't ignore the return code of svc_proc_register() |
Linux |
Linux |
2025-04-16T14:11:47.243Z | 2026-01-02T15:28:50.042Z |
| cve-2025-22025 | N/A | nfsd: put dl_stid if fail to queue dl_recall |
Linux |
Linux |
2025-04-16T14:11:46.624Z | 2026-01-02T15:28:48.432Z |
| cve-2025-22022 | N/A | usb: xhci: Apply the link chain quirk on NEC isoc endpoints |
Linux |
Linux |
2025-04-16T10:23:27.423Z | 2026-01-02T15:28:47.139Z |
| cve-2025-22008 | N/A | regulator: check that dummy regulator has been probed … |
Linux |
Linux |
2025-04-08T08:17:59.257Z | 2026-01-02T15:28:45.857Z |
| cve-2025-21993 | N/A | iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in i… |
Linux |
Linux |
2025-04-02T12:53:15.513Z | 2026-01-02T15:28:44.546Z |
| cve-2025-21992 | N/A | HID: ignore non-functional sensor in HP 5MP Camera |
Linux |
Linux |
2025-04-02T12:53:14.833Z | 2026-01-02T15:28:43.091Z |
| cve-2025-21969 | N/A | Bluetooth: L2CAP: Fix slab-use-after-free Read in l2ca… |
Linux |
Linux |
2025-04-01T15:47:03.408Z | 2026-01-02T15:28:41.453Z |
| cve-2025-21957 | N/A | scsi: qla1280: Fix kernel oops when debug level > 2 |
Linux |
Linux |
2025-04-01T15:46:56.733Z | 2026-01-02T15:28:39.749Z |
| cve-2025-21912 | N/A | gpio: rcar: Use raw_spinlock to protect register access |
Linux |
Linux |
2025-04-01T15:40:50.299Z | 2026-01-02T15:28:38.362Z |
| cve-2025-21821 | N/A | fbdev: omap: use threaded IRQ for LCD DMA |
Linux |
Linux |
2025-02-27T20:06:12.722Z | 2026-01-02T15:28:36.965Z |
| cve-2025-21776 | N/A | USB: hub: Ignore non-compliant devices with too many c… |
Linux |
Linux |
2025-02-27T02:18:21.503Z | 2026-01-02T15:28:35.430Z |
| cve-2025-21772 | N/A | partitions: mac: fix handling of bogus partition table |
Linux |
Linux |
2025-02-27T02:18:19.528Z | 2026-01-02T15:28:33.911Z |
| cve-2025-21750 | N/A | wifi: brcmfmac: Check the return value of of_property_… |
Linux |
Linux |
2025-02-27T02:12:21.155Z | 2026-01-02T15:28:32.326Z |
| cve-2025-21744 | N/A | wifi: brcmfmac: fix NULL pointer dereference in brcmf_… |
Linux |
Linux |
2025-02-27T02:12:17.259Z | 2026-01-02T15:28:30.829Z |
| cve-2025-21738 | N/A | ata: libata-sff: Ensure that we cannot write outside t… |
Linux |
Linux |
2025-02-27T02:12:13.942Z | 2026-01-02T15:28:29.370Z |
| cve-2025-21699 | N/A | gfs2: Truncate address space when flipping GFS2_DIF_JD… |
Linux |
Linux |
2025-02-12T13:52:50.962Z | 2026-01-02T15:28:27.961Z |
| cve-2025-21690 | N/A | scsi: storvsc: Ratelimit warning logs to prevent VM de… |
Linux |
Linux |
2025-02-10T15:58:46.392Z | 2026-01-02T15:28:26.316Z |
| cve-2025-49342 | 7.1 (v3.1) | WordPress Custom Style plugin <= 1.0 - Cross Site Requ… |
Wolfgang Häfelinger |
Custom Style |
2025-12-31T05:55:53.218Z | 2026-01-02T15:20:12.771Z |
| cve-2025-62852 | 1.2 (v4.0) | QTS, QuTS hero |
QNAP Systems Inc. |
QTS |
2026-01-02T15:19:40.492Z | 2026-01-02T15:19:40.492Z |
| cve-2025-59387 | 8.1 (v4.0) | MARS (Multi-Application Recovery Service) |
QNAP Systems Inc. |
MARS (Multi-Application Recovery Service) |
2026-01-02T15:19:30.445Z | 2026-01-02T15:19:30.445Z |
| cve-2025-59384 | 8.1 (v4.0) | Qfiling |
QNAP Systems Inc. |
Qfiling |
2026-01-02T15:19:19.626Z | 2026-01-02T15:19:19.626Z |
| cve-2025-59381 | 4.6 (v4.0) | QTS, QuTS hero |
QNAP Systems Inc. |
QTS |
2026-01-02T15:19:09.271Z | 2026-01-02T15:19:09.271Z |
| cve-2025-69261 | WasmEdge integer wrap in MemoryInstance::getSpan()'s m… |
WasmEdge |
WasmEdge |
2025-12-30T19:43:59.746Z | 2026-01-02T15:16:16.123Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2025-15244 | PHPEMS Purchase Request race condition |
n/a |
PHPEMS |
2025-12-30T10:32:05.640Z | 2025-12-30T16:02:21.268Z | |
| cve-2025-15242 | PHPEMS Coupon race condition |
n/a |
PHPEMS |
2025-12-30T09:32:07.221Z | 2025-12-30T16:00:48.345Z | |
| cve-2025-15241 | CloudPanel Community Edition HTTP Header users redirect |
CloudPanel |
Community Edition |
2025-12-30T09:02:07.225Z | 2025-12-30T14:41:02.720Z | |
| cve-2025-14509 | Lucky Wheel for WooCommerce – Spin a Sale <= 1.1.13 - … |
villatheme |
Lucky Wheel for WooCommerce – Spin a Sale |
2025-12-30T11:14:25.111Z | 2025-12-30T12:55:26.974Z | |
| cve-2023-54213 | N/A | USB: sisusbvga: Add endpoint checks |
Linux |
Linux |
2025-12-30T12:11:10.702Z | 2025-12-30T12:11:10.702Z |
| cve-2023-54211 | N/A | tracing: Fix warning in trace_buffered_event_disable() |
Linux |
Linux |
2025-12-30T12:11:09.356Z | 2025-12-30T12:11:09.356Z |
| cve-2023-54210 | N/A | Bluetooth: hci_sync: Avoid use-after-free in dbg for h… |
Linux |
Linux |
2025-12-30T12:11:08.682Z | 2025-12-30T12:11:08.682Z |
| cve-2023-54209 | N/A | block: fix blktrace debugfs entries leakage |
Linux |
Linux |
2025-12-30T12:11:08.027Z | 2025-12-30T12:11:08.027Z |
| cve-2023-54208 | N/A | media: ov5675: Fix memleak in ov5675_init_controls() |
Linux |
Linux |
2025-12-30T12:11:07.336Z | 2025-12-30T12:11:07.336Z |
| cve-2023-54207 | N/A | HID: uclogic: Correct devm device reference for hidinp… |
Linux |
Linux |
2025-12-30T12:11:06.643Z | 2025-12-30T12:11:06.643Z |
| cve-2023-54206 | N/A | net/sched: flower: fix filter idr initialization |
Linux |
Linux |
2025-12-30T12:11:05.945Z | 2025-12-30T12:11:05.945Z |
| cve-2023-54205 | N/A | pinctrl: stm32: Fix refcount leak in stm32_pctrl_get_i… |
Linux |
Linux |
2025-12-30T12:11:05.295Z | 2025-12-30T12:11:05.295Z |
| cve-2023-54204 | N/A | mmc: sunplus: fix return value check of mmc_add_host() |
Linux |
Linux |
2025-12-30T12:11:04.622Z | 2025-12-30T12:11:04.622Z |
| cve-2023-54203 | N/A | ksmbd: fix slab-out-of-bounds in init_smb2_rsp_hdr |
Linux |
Linux |
2025-12-30T12:09:07.538Z | 2025-12-30T12:09:07.538Z |
| cve-2023-54202 | N/A | drm/i915: fix race condition UAF in i915_perf_add_conf… |
Linux |
Linux |
2025-12-30T12:09:06.872Z | 2025-12-30T12:09:06.872Z |
| cve-2023-54201 | N/A | RDMA/efa: Fix wrong resources deallocation order |
Linux |
Linux |
2025-12-30T12:09:06.211Z | 2025-12-30T12:09:06.211Z |
| cve-2023-54200 | N/A | netfilter: nf_tables: always release netdev hooks from… |
Linux |
Linux |
2025-12-30T12:09:05.538Z | 2025-12-30T12:09:05.538Z |
| cve-2023-54199 | N/A | drm/msm/adreno: Fix null ptr access in adreno_gpu_cleanup() |
Linux |
Linux |
2025-12-30T12:09:04.886Z | 2025-12-30T12:09:04.886Z |
| cve-2023-54198 | N/A | tty: fix out-of-bounds access in tty_driver_lookup_tty() |
Linux |
Linux |
2025-12-30T12:09:04.229Z | 2025-12-30T12:09:04.229Z |
| cve-2023-54197 | N/A | Revert "Bluetooth: btsdio: fix use after free bug in b… |
Linux |
Linux |
2025-12-30T12:09:03.472Z | 2025-12-30T12:09:03.472Z |
| cve-2023-54196 | N/A | fs/ntfs3: Fix NULL pointer dereference in 'ni_write_inode' |
Linux |
Linux |
2025-12-30T12:09:02.801Z | 2025-12-30T12:09:02.801Z |
| cve-2023-54195 | N/A | rxrpc: Fix timeout of a call that hasn't yet been gran… |
Linux |
Linux |
2025-12-30T12:09:02.123Z | 2025-12-30T12:09:02.123Z |
| cve-2023-54194 | N/A | exfat: use kvmalloc_array/kvfree instead of kmalloc_ar… |
Linux |
Linux |
2025-12-30T12:09:01.436Z | 2025-12-30T12:09:01.436Z |
| cve-2023-54193 | N/A | net/sched: cls_api: remove block_cb from driver_list b… |
Linux |
Linux |
2025-12-30T12:09:00.738Z | 2025-12-30T12:09:00.738Z |
| cve-2023-54192 | N/A | f2fs: fix null pointer panic in tracepoint in __replac… |
Linux |
Linux |
2025-12-30T12:08:59.989Z | 2025-12-30T12:08:59.989Z |
| cve-2023-54191 | N/A | wifi: mt76: mt7996: fix memory leak in mt7996_mcu_exit |
Linux |
Linux |
2025-12-30T12:08:59.304Z | 2025-12-30T12:08:59.304Z |
| cve-2023-54190 | N/A | leds: led-core: Fix refcount leak in of_led_get() |
Linux |
Linux |
2025-12-30T12:08:58.605Z | 2025-12-30T12:08:58.605Z |
| cve-2023-54189 | N/A | pstore/ram: Add check for kstrdup |
Linux |
Linux |
2025-12-30T12:08:57.915Z | 2025-12-30T12:08:57.915Z |
| cve-2023-54188 | N/A | dmaengine: apple-admac: Fix 'current_tx' not getting freed |
Linux |
Linux |
2025-12-30T12:08:57.226Z | 2025-12-30T12:08:57.226Z |
| cve-2023-54187 | N/A | f2fs: fix potential corruption when moving a directory |
Linux |
Linux |
2025-12-30T12:08:56.562Z | 2025-12-30T12:08:56.562Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2023-54168 | In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx4: Prevent shift wrapp… | 2025-12-30T13:16:04.610 | 2025-12-31T20:43:05.160 |
| fkie_cve-2023-54167 | In the Linux kernel, the following vulnerability has been resolved: m68k: mm: Move initrd phys_to_… | 2025-12-30T13:16:04.503 | 2025-12-31T20:43:05.160 |
| fkie_cve-2023-54166 | In the Linux kernel, the following vulnerability has been resolved: igc: Fix Kernel Panic during n… | 2025-12-30T13:16:04.393 | 2025-12-31T20:43:05.160 |
| fkie_cve-2023-54165 | In the Linux kernel, the following vulnerability has been resolved: zsmalloc: move LRU update from… | 2025-12-30T13:16:04.283 | 2025-12-31T20:43:05.160 |
| fkie_cve-2023-54164 | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ISO: fix iso_conn r… | 2025-12-30T13:16:04.167 | 2025-12-31T20:43:05.160 |
| fkie_cve-2023-54162 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix possible memory lea… | 2025-12-30T12:15:44.373 | 2025-12-31T20:43:05.160 |
| fkie_cve-2022-50889 | In the Linux kernel, the following vulnerability has been resolved: dm integrity: Fix UAF in dm_in… | 2025-12-30T13:16:04.050 | 2025-12-31T20:43:05.160 |
| fkie_cve-2022-50888 | In the Linux kernel, the following vulnerability has been resolved: remoteproc: qcom: q6v5: Fix po… | 2025-12-30T13:16:03.943 | 2025-12-31T20:43:05.160 |
| fkie_cve-2022-50887 | In the Linux kernel, the following vulnerability has been resolved: regulator: core: fix unbalance… | 2025-12-30T13:16:03.833 | 2025-12-31T20:43:05.160 |
| fkie_cve-2022-50886 | In the Linux kernel, the following vulnerability has been resolved: mmc: toshsd: fix return value … | 2025-12-30T13:16:03.720 | 2025-12-31T20:43:05.160 |
| fkie_cve-2022-50885 | In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix NULL-ptr-deref i… | 2025-12-30T13:16:03.603 | 2025-12-31T20:43:05.160 |
| fkie_cve-2022-50884 | In the Linux kernel, the following vulnerability has been resolved: drm: Prevent drm_copy_field() … | 2025-12-30T13:16:03.493 | 2025-12-31T20:43:05.160 |
| fkie_cve-2022-50882 | In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix memory le… | 2025-12-30T13:16:03.283 | 2025-12-31T20:43:05.160 |
| fkie_cve-2022-50881 | In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: Fix use-after-fre… | 2025-12-30T13:16:03.173 | 2025-12-31T20:43:05.160 |
| fkie_cve-2022-50880 | In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: add peer map cle… | 2025-12-30T13:16:03.063 | 2025-12-31T20:43:05.160 |
| fkie_cve-2022-50879 | In the Linux kernel, the following vulnerability has been resolved: objtool: Fix SEGFAULT find_in… | 2025-12-30T13:16:02.953 | 2025-12-31T20:43:05.160 |
| fkie_cve-2022-50878 | In the Linux kernel, the following vulnerability has been resolved: gpu: lontium-lt9611: Fix NULL … | 2025-12-30T13:16:02.843 | 2025-12-31T20:43:05.160 |
| fkie_cve-2022-50877 | In the Linux kernel, the following vulnerability has been resolved: net: broadcom: bcm4908_enet: u… | 2025-12-30T13:16:02.723 | 2025-12-31T20:43:05.160 |
| fkie_cve-2022-50876 | In the Linux kernel, the following vulnerability has been resolved: usb: musb: Fix musb_gadget.c r… | 2025-12-30T13:16:02.610 | 2025-12-31T20:43:05.160 |
| fkie_cve-2022-50875 | In the Linux kernel, the following vulnerability has been resolved: of: overlay: fix null pointer … | 2025-12-30T13:16:02.503 | 2025-12-31T20:43:05.160 |
| fkie_cve-2022-50874 | In the Linux kernel, the following vulnerability has been resolved: RDMA/erdma: Fix refcount leak … | 2025-12-30T13:16:02.387 | 2025-12-31T20:43:05.160 |
| fkie_cve-2022-50873 | In the Linux kernel, the following vulnerability has been resolved: vdpa/vp_vdpa: fix kfree a wron… | 2025-12-30T13:16:02.263 | 2025-12-31T20:43:05.160 |
| fkie_cve-2022-50872 | In the Linux kernel, the following vulnerability has been resolved: ARM: OMAP2+: Fix memory leak i… | 2025-12-30T13:16:02.140 | 2025-12-31T20:43:05.160 |
| fkie_cve-2022-50871 | In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: Fix qmi_msg_hand… | 2025-12-30T13:16:02.030 | 2025-12-31T20:43:05.160 |
| fkie_cve-2022-50870 | In the Linux kernel, the following vulnerability has been resolved: powerpc/rtas: avoid device tre… | 2025-12-30T13:16:01.887 | 2025-12-31T20:43:05.160 |
| fkie_cve-2022-50869 | In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Fix slab-out-of-boun… | 2025-12-30T13:16:01.760 | 2025-12-31T20:43:05.160 |
| fkie_cve-2022-50868 | In the Linux kernel, the following vulnerability has been resolved: hwrng: amd - Fix PCI device re… | 2025-12-30T13:16:01.643 | 2025-12-31T20:43:05.160 |
| fkie_cve-2022-50867 | In the Linux kernel, the following vulnerability has been resolved: drm/msm/a6xx: Fix kvzalloc vs … | 2025-12-30T13:16:01.533 | 2025-12-31T20:43:05.160 |
| fkie_cve-2022-50866 | In the Linux kernel, the following vulnerability has been resolved: ASoC: pxa: fix null-pointer de… | 2025-12-30T13:16:01.420 | 2025-12-31T20:43:05.160 |
| fkie_cve-2022-50865 | In the Linux kernel, the following vulnerability has been resolved: tcp: fix a signed-integer-over… | 2025-12-30T13:16:01.317 | 2025-12-31T20:43:05.160 |
| ID | Description | Package | Published | Updated |
|---|---|---|---|---|
| pysec-2022-148 | Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a use… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:28.987872Z |
| pysec-2022-147 | Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a den… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:28.843331Z |
| pysec-2022-146 | Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a den… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:28.710235Z |
| pysec-2022-145 | Tensorflow is an Open Source Machine Learning Framework. The Grappler optimizer in Tensor… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:28.561700Z |
| pysec-2022-144 | Tensorflow is an Open Source Machine Learning Framework. During shape inference, TensorFl… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:28.435695Z |
| pysec-2022-143 | Tensorflow is an Open Source Machine Learning Framework. The Grappler optimizer in Tensor… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:28.283580Z |
| pysec-2022-142 | Tensorflow is an Open Source Machine Learning Framework. If a graph node is invalid, Tens… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:28.101919Z |
| pysec-2022-141 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `GetInitOp… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:27.968735Z |
| pysec-2022-140 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `OpLevelCo… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:27.816300Z |
| pysec-2022-139 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `OpLevelCo… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:27.680857Z |
| pysec-2022-138 | Tensorflow is an Open Source Machine Learning Framework. There is a typo in TensorFlow's … | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:27.547711Z |
| pysec-2022-137 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `AssignOp`… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:27.416732Z |
| pysec-2022-136 | Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, TensorF… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:27.267952Z |
| pysec-2022-135 | Tensorflow is an Open Source Machine Learning Framework. When decoding a tensor from prot… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:27.136787Z |
| pysec-2022-134 | Tensorflow is an Open Source Machine Learning Framework. When decoding a tensor from prot… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:26.999978Z |
| pysec-2022-133 | Tensorflow is an Open Source Machine Learning Framework. Multiple operations in TensorFlo… | tensorflow-gpu | 2022-02-03T13:15:00Z | 2022-03-09T00:18:26.852426Z |
| pysec-2022-132 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `AddManySp… | tensorflow-gpu | 2022-02-03T12:15:00Z | 2022-03-09T00:18:26.728990Z |
| pysec-2022-131 | Tensorflow is an Open Source Machine Learning Framework. The implementations of `Sparse*C… | tensorflow-gpu | 2022-02-03T12:15:00Z | 2022-03-09T00:18:26.570322Z |
| pysec-2022-130 | Tensorflow is an Open Source Machine Learning Framework. TensorFlow is vulnerable to a he… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:26.438942Z |
| pysec-2022-129 | Tensorflow is an Open Source Machine Learning Framework. An attacker can trigger denial o… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:26.310749Z |
| pysec-2022-128 | Tensorflow is an Open Source Machine Learning Framework. When decoding a resource handle … | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:26.187094Z |
| pysec-2022-127 | Tensorflow is an Open Source Machine Learning Framework. In multiple places, TensorFlow u… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:26.055433Z |
| pysec-2022-126 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `Range` su… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:25.916972Z |
| pysec-2022-125 | Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite m… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:25.786755Z |
| pysec-2022-124 | Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite m… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:25.643457Z |
| pysec-2022-123 | Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite m… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:25.518342Z |
| pysec-2022-122 | Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite m… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:25.380350Z |
| pysec-2022-121 | Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite m… | tensorflow-gpu | 2022-02-04T23:15:00Z | 2022-03-09T00:18:25.246505Z |
| pysec-2022-120 | Tensorflow is an Open Source Machine Learning Framework. ### Impact An attacker can craft… | tensorflow-gpu | 2022-02-03T15:15:00Z | 2022-03-09T00:18:25.119172Z |
| pysec-2022-119 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseCou… | tensorflow-gpu | 2022-02-03T15:15:00Z | 2022-03-09T00:18:24.990899Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-32954 | Unrestricted Upload of File with Dangerous Type vulnerability in Tribulant Newsletters.Th… | 2024-04-23T05:02:10.338806Z |
| gsd-2024-32969 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:02:10.336805Z |
| gsd-2024-32994 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:02:10.327905Z |
| gsd-2024-32972 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:02:10.318245Z |
| gsd-2023-52721 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:01:35.589969Z |
| gsd-2023-52719 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:01:35.384447Z |
| gsd-2023-52720 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-23T05:01:35.330143Z |
| gsd-2024-4023 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-22T05:02:08.676402Z |
| gsd-2018-25101 | A vulnerability, which was classified as problematic, has been found in l2c2technologies … | 2024-04-21T05:02:45.593909Z |
| gsd-2024-4021 | A vulnerability was found in Keenetic KN-1010, KN-1410, KN-1711, KN-1810 and KN-1910 up t… | 2024-04-21T05:02:03.524179Z |
| gsd-2024-4022 | A vulnerability was found in Keenetic KN-1010, KN-1410, KN-1711, KN-1810 and KN-1910 up t… | 2024-04-21T05:02:03.520941Z |
| gsd-2024-4020 | A vulnerability was found in Tenda FH1206 1.2.0.8(8155) and classified as critical. This … | 2024-04-21T05:02:03.519205Z |
| gsd-2015-10132 | A vulnerability classified as problematic was found in Thimo Grauerholz WP-Spreadplugin u… | 2024-04-21T05:00:54.861505Z |
| gsd-2024-29079 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:06.789437Z |
| gsd-2024-29077 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:06.706305Z |
| gsd-2024-29223 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:06.608333Z |
| gsd-2024-27461 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:06.418108Z |
| gsd-2024-3998 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:06.160987Z |
| gsd-2024-3994 | The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable t… | 2024-04-20T05:02:06.154525Z |
| gsd-2024-3985 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:06.139392Z |
| gsd-2024-3990 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:06.133590Z |
| gsd-2024-3993 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:06.066057Z |
| gsd-2024-3996 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:06.060075Z |
| gsd-2024-3981 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:06.047097Z |
| gsd-2024-3977 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:05.999112Z |
| gsd-2024-3979 | A vulnerability, which was classified as problematic, has been found in COVESA vsomeip up… | 2024-04-20T05:02:05.972665Z |
| gsd-2024-3976 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:05.954049Z |
| gsd-2024-3992 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:05.918291Z |
| gsd-2024-3982 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:05.904972Z |
| gsd-2024-3989 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-20T05:02:05.894049Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-192449 | Malicious code in elf-stats-sugarplum-mitten-141 (npm) | 2025-12-11T01:47:51Z | 2025-12-19T09:25:43Z |
| mal-2025-192448 | Malicious code in elf-stats-sparkly-snowglobe-243 (npm) | 2025-12-11T01:47:51Z | 2025-12-19T09:25:43Z |
| mal-2025-192447 | Malicious code in elf-stats-snowy-toolkit-186 (npm) | 2025-12-11T01:47:51Z | 2025-12-19T09:25:43Z |
| mal-2025-192446 | Malicious code in elf-stats-silvered-wishlist-243 (npm) | 2025-12-11T01:47:51Z | 2025-12-19T09:25:43Z |
| mal-2025-192445 | Malicious code in elf-stats-silvered-mailbag-755 (npm) | 2025-12-11T01:47:51Z | 2025-12-19T09:25:43Z |
| mal-2025-192444 | Malicious code in elf-stats-merry-icicle-449 (npm) | 2025-12-11T01:47:51Z | 2025-12-19T09:25:43Z |
| mal-2025-192443 | Malicious code in elf-stats-jolly-hammer-980 (npm) | 2025-12-11T01:47:51Z | 2025-12-19T09:25:43Z |
| mal-2025-192442 | Malicious code in elf-stats-ember-stockpile-448 (npm) | 2025-12-11T01:47:51Z | 2025-12-19T09:25:43Z |
| mal-2025-192441 | Malicious code in elf-stats-cosy-garland-592 (npm) | 2025-12-11T01:47:51Z | 2025-12-19T09:25:43Z |
| mal-2025-192440 | Malicious code in elf-stats-candystriped-snowglobe-426 (npm) | 2025-12-11T01:47:51Z | 2025-12-19T09:25:43Z |
| mal-0000-kam193-ae6bedba7c21e763 | Malicious code in connections-api-hidden-runner (PyPI) | 2025-12-19T08:23:35Z | 2025-12-19T08:23:35Z |
| mal-0000-kam193-3fabc78b2d6a644c | Malicious code in connections-api-hidden-runner (PyPI) | 2025-12-19T08:23:35Z | 2025-12-19T08:23:35Z |
| mal-0000-kam193-b35338995e5b550a | Malicious code in hidden-powershell-runner-ax7 (PyPI) | 2025-12-19T08:23:06Z | 2025-12-19T08:23:06Z |
| mal-0000-kam193-5785c01837ec1727 | Malicious code in hidden-powershell-runner-ax7 (PyPI) | 2025-12-19T08:23:06Z | 2025-12-19T08:23:06Z |
| mal-2025-192609 | Malicious code in f5rest (PyPI) | 2025-12-18T19:50:55Z | 2025-12-18T19:50:55Z |
| mal-2025-192608 | Malicious code in f5-logger (PyPI) | 2025-12-18T19:50:28Z | 2025-12-18T19:50:28Z |
| mal-2025-192607 | Malicious code in bigip (PyPI) | 2025-12-18T19:49:24Z | 2025-12-18T19:49:24Z |
| mal-2025-192494 | Malicious code in elf-stats-ember-stocking-807 (npm) | 2025-12-11T19:46:09Z | 2025-12-18T06:26:30Z |
| mal-0000-ossf-package-analysis-baeae2c02ab89a72 | Malicious code in jsondatatoruby (npm) | 2025-12-17T19:25:55Z | 2025-12-17T19:25:55Z |
| mal-2025-192605 | Malicious code in trondec (PyPI) | 2025-12-17T17:56:56Z | 2025-12-17T17:56:56Z |
| mal-2025-192512 | Malicious code in elf-stats-marzipan-cocoa-977 (npm) | 2025-12-11T19:46:09Z | 2025-12-16T09:26:26Z |
| mal-2025-192507 | Malicious code in elf-stats-holly-stocking-294 (npm) | 2025-12-11T19:46:09Z | 2025-12-16T09:26:26Z |
| mal-2025-192502 | Malicious code in elf-stats-fuzzy-fireplace-615 (npm) | 2025-12-11T19:46:09Z | 2025-12-16T09:26:26Z |
| mal-2025-192470 | Malicious code in elf-stats-aurora-sleigh-694 (npm) | 2025-12-11T19:46:09Z | 2025-12-16T09:26:26Z |
| mal-2025-192510 | Malicious code in elf-stats-jubilant-wreath-403 (npm) | 2025-12-11T19:46:09Z | 2025-12-16T08:26:30Z |
| mal-2025-192490 | Malicious code in elf-stats-cosy-ribbon-689 (npm) | 2025-12-11T19:46:09Z | 2025-12-16T08:26:30Z |
| mal-2025-192193 | Malicious code in elf-stats-whimsical-snowflake-250 (npm) | 2025-12-03T15:59:29Z | 2025-12-16T07:25:30Z |
| mal-2025-192103 | Malicious code in elf-stats-mulled-wishlist-789 (npm) | 2025-12-03T15:59:29Z | 2025-12-16T07:25:30Z |
| mal-2025-192056 | Malicious code in elf-stats-gingersnap-reindeer-987 (npm) | 2025-12-03T15:59:29Z | 2025-12-16T07:25:30Z |
| mal-2025-191971 | Malicious code in @testfei/hallo-word (npm) | 2025-12-03T02:55:45Z | 2025-12-16T06:26:40Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-0968 | Drupal: Mehrere Schwachstellen | 2024-04-24T22:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-0739 | Drupal: Schwachstelle ermöglicht Cross-Site Scripting | 2024-03-27T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-0594 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2024-03-11T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-0570 | Drupal: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-03-06T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-0517 | Drupal Extensions: Mehrere Schwachstellen | 2024-02-28T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-0465 | Drupal: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-02-21T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-0444 | Linux Kernel: Mehrere Schwachstellen | 2024-02-20T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-0400 | Drupal: Schwachstelle ermöglicht Cross-Site Scripting | 2024-02-14T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-0344 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2024-02-11T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-0320 | Drupal: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-02-07T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-0263 | Drupal: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-01-31T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-0196 | Drupal: Mehrere Schwachstellen | 2024-01-24T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-0137 | Red Hat OpenShift Container Platform: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-01-17T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-0060 | Drupal Extensions: Mehrere Schwachstellen | 2024-01-10T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2023-3087 | Linux Kernel: Mehrere Schwachstellen | 2023-12-07T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2023-1503 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2023-06-18T22:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2023-0207 | Internet Systems Consortium BIND: Mehrere Schwachstellen ermöglichen Denial of Service | 2023-01-25T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2025-0037 | PaloAlto Networks Expedition: Mehrere Schwachstellen | 2025-01-08T23:00:00.000+00:00 | 2025-01-08T23:00:00.000+00:00 |
| wid-sec-w-2025-0036 | Aruba Switch: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-01-08T23:00:00.000+00:00 | 2025-01-08T23:00:00.000+00:00 |
| wid-sec-w-2025-0034 | IBM App Connect Enterprise: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-01-08T23:00:00.000+00:00 | 2025-01-08T23:00:00.000+00:00 |
| wid-sec-w-2025-0033 | GitLab: Mehrere Schwachstellen | 2025-01-08T23:00:00.000+00:00 | 2025-01-08T23:00:00.000+00:00 |
| wid-sec-w-2025-0032 | Drupal: Mehrere Schwachstellen | 2025-01-08T23:00:00.000+00:00 | 2025-01-08T23:00:00.000+00:00 |
| wid-sec-w-2025-0031 | Juniper JUNOS: Mehrere Schwachstellen ermöglichen Denial of Service und Informationsoffenlegung | 2025-01-08T23:00:00.000+00:00 | 2025-01-08T23:00:00.000+00:00 |
| wid-sec-w-2025-0030 | Trend Micro Apex One: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode | 2025-01-08T23:00:00.000+00:00 | 2025-01-08T23:00:00.000+00:00 |
| wid-sec-w-2025-0029 | Ivanti Connect Secure: Mehrere Schwachstellen ermöglichen Codeausführung und Privilegienerweiterung | 2025-01-08T23:00:00.000+00:00 | 2025-01-08T23:00:00.000+00:00 |
| wid-sec-w-2024-3573 | Red Hat Advanced Cluster Security: Schwachstelle ermöglicht Denial of Service | 2024-12-01T23:00:00.000+00:00 | 2025-01-08T23:00:00.000+00:00 |
| wid-sec-w-2024-3140 | Juniper JUNOS: Mehrere Schwachstellen | 2024-10-09T22:00:00.000+00:00 | 2025-01-08T23:00:00.000+00:00 |
| wid-sec-w-2024-1892 | Red Hat OpenShift: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-08-21T22:00:00.000+00:00 | 2025-01-08T23:00:00.000+00:00 |
| wid-sec-w-2024-1486 | OpenSSH: Schwachstelle ermöglicht Codeausführung | 2024-06-30T22:00:00.000+00:00 | 2025-01-08T23:00:00.000+00:00 |
| wid-sec-w-2024-1398 | Red Hat Enterprise Linux (Flatpak): Schwachstelle ermöglicht Codeausführung | 2024-06-17T22:00:00.000+00:00 | 2025-01-08T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:21887 | Red Hat Security Advisory: bind security update | 2025-11-20T20:47:47+00:00 | 2025-11-27T03:24:34+00:00 |
| rhsa-2025:21741 | Red Hat Security Advisory: bind security update | 2025-11-19T06:20:03+00:00 | 2025-11-27T03:24:33+00:00 |
| rhsa-2025:21819 | Red Hat Security Advisory: idm:DL1 security update | 2025-11-20T08:18:01+00:00 | 2025-11-27T03:24:32+00:00 |
| rhsa-2025:21939 | Red Hat Security Advisory: bind9.16 security update | 2025-11-24T10:36:41+00:00 | 2025-11-27T03:24:31+00:00 |
| rhsa-2025:21817 | Red Hat Security Advisory: bind security update | 2025-11-20T08:05:31+00:00 | 2025-11-27T03:24:31+00:00 |
| rhsa-2025:21820 | Red Hat Security Advisory: idm:DL1 security update | 2025-11-20T08:10:36+00:00 | 2025-11-27T03:24:28+00:00 |
| rhsa-2025:21735 | Red Hat Security Advisory: bind security update | 2025-11-19T04:04:48+00:00 | 2025-11-27T03:24:28+00:00 |
| rhsa-2025:21448 | Red Hat Security Advisory: python-kdcproxy security update | 2025-11-17T06:19:12+00:00 | 2025-11-27T03:24:28+00:00 |
| rhsa-2025:21821 | Red Hat Security Advisory: idm:DL1 security update | 2025-11-20T08:05:06+00:00 | 2025-11-27T03:24:25+00:00 |
| rhsa-2025:21111 | Red Hat Security Advisory: bind9.18 security update | 2025-11-12T10:44:58+00:00 | 2025-11-27T03:24:25+00:00 |
| rhsa-2025:21110 | Red Hat Security Advisory: bind security update | 2025-11-12T10:49:03+00:00 | 2025-11-27T03:24:25+00:00 |
| rhsa-2025:21806 | Red Hat Security Advisory: python-kdcproxy security update | 2025-11-20T05:58:44+00:00 | 2025-11-27T03:24:23+00:00 |
| rhsa-2025:21748 | Red Hat Security Advisory: python-kdcproxy security update | 2025-11-19T08:16:29+00:00 | 2025-11-27T03:24:19+00:00 |
| rhsa-2025:19912 | Red Hat Security Advisory: bind security update | 2025-11-06T15:50:53+00:00 | 2025-11-27T03:24:19+00:00 |
| rhsa-2025:21139 | Red Hat Security Advisory: python-kdcproxy security update | 2025-11-12T16:20:43+00:00 | 2025-11-27T03:24:12+00:00 |
| rhsa-2025:21138 | Red Hat Security Advisory: python-kdcproxy security update | 2025-11-12T16:32:24+00:00 | 2025-11-27T03:24:11+00:00 |
| rhsa-2025:21140 | Red Hat Security Advisory: idm:DL1 security update | 2025-11-12T18:01:16+00:00 | 2025-11-27T03:24:10+00:00 |
| rhsa-2025:19835 | Red Hat Security Advisory: bind security update | 2025-11-06T01:58:21+00:00 | 2025-11-27T03:24:09+00:00 |
| rhsa-2025:21142 | Red Hat Security Advisory: python-kdcproxy security update | 2025-11-12T15:26:34+00:00 | 2025-11-27T03:24:02+00:00 |
| rhsa-2025:21141 | Red Hat Security Advisory: python-kdcproxy security update | 2025-11-12T15:26:24+00:00 | 2025-11-27T03:24:02+00:00 |
| rhsa-2025:22005 | Red Hat Security Advisory: go-rpm-macros security update | 2025-11-25T01:21:20+00:00 | 2025-11-26T21:27:42+00:00 |
| rhsa-2025:22004 | Red Hat Security Advisory: go-rpm-macros security update | 2025-11-25T01:11:08+00:00 | 2025-11-26T21:27:38+00:00 |
| rhsa-2025:20518 | Red Hat Security Advisory: kernel security update | 2025-11-11T09:13:24+00:00 | 2025-11-26T21:27:09+00:00 |
| rhsa-2025:21897 | Red Hat Security Advisory: Satellite 6.15.5.7 Async Update | 2025-11-20T21:27:37+00:00 | 2025-11-26T21:26:52+00:00 |
| rhsa-2025:19810 | Red Hat Security Advisory: Red Hat JBoss Web Server 6.1.3 release and security update | 2025-11-06T16:24:24+00:00 | 2025-11-26T21:26:49+00:00 |
| rhsa-2025:19809 | Red Hat Security Advisory: Red Hat JBoss Web Server 6.1.3 release and security update | 2025-11-06T16:32:43+00:00 | 2025-11-26T21:26:49+00:00 |
| rhsa-2025:1675 | Red Hat Security Advisory: bind security update | 2025-02-19T13:50:41+00:00 | 2025-11-26T21:26:38+00:00 |
| rhsa-2025:1669 | Red Hat Security Advisory: bind security update | 2025-02-19T07:07:41+00:00 | 2025-11-26T21:26:36+00:00 |
| rhsa-2025:1681 | Red Hat Security Advisory: bind security update | 2025-02-19T14:48:56+00:00 | 2025-11-26T21:26:33+00:00 |
| rhsa-2025:1665 | Red Hat Security Advisory: bind security update | 2025-02-19T04:53:05+00:00 | 2025-11-26T21:26:30+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2022-49635 | drm/i915/selftests: fix subtraction overflow bug | 2025-02-02T00:00:00.000Z | 2025-10-24T01:02:36.000Z |
| msrc_cve-2022-49610 | KVM: VMX: Prevent RSB underflow before vmenter | 2025-02-02T00:00:00.000Z | 2025-10-24T01:02:30.000Z |
| msrc_cve-2022-49562 | KVM: x86: Use __try_cmpxchg_user() to update guest PTE A/D bits | 2025-02-02T00:00:00.000Z | 2025-10-24T01:01:54.000Z |
| msrc_cve-2022-49552 | bpf: Fix combination of jit blinding and pointers to bpf subprogs. | 2025-02-02T00:00:00.000Z | 2025-10-24T01:01:49.000Z |
| msrc_cve-2022-49543 | ath11k: fix the warning of dev_wake in mhi_pm_disable_transition() | 2025-02-02T00:00:00.000Z | 2025-10-24T01:01:44.000Z |
| msrc_cve-2022-49469 | btrfs: fix anon_dev leak in create_subvol() | 2025-02-02T00:00:00.000Z | 2025-10-24T01:01:38.000Z |
| msrc_cve-2022-49173 | spi: fsi: Implement a timeout for polling status | 2025-02-02T00:00:00.000Z | 2025-10-24T01:01:33.000Z |
| msrc_cve-2025-59500 | Azure Notification Service Elevation of Privilege Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-23T07:00:00.000Z |
| msrc_cve-2025-59295 | Windows URL Parsing Remote Code Execution Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-23T07:00:00.000Z |
| msrc_cve-2025-59273 | Azure Event Grid System Elevation of Privilege Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-23T07:00:00.000Z |
| msrc_cve-2025-55676 | Windows USB Video Class System Driver Information Disclosure Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-23T07:00:00.000Z |
| msrc_cve-2025-53054 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:06:45.000Z |
| msrc_cve-2025-53045 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:06:38.000Z |
| msrc_cve-2025-53069 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:06:30.000Z |
| msrc_cve-2025-53053 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:06:22.000Z |
| msrc_cve-2025-53062 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:06:15.000Z |
| msrc_cve-2025-53040 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:06:07.000Z |
| msrc_cve-2025-53044 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:06:00.000Z |
| msrc_cve-2025-53042 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.0-8.0.43, 8.4.0-8.4.6 and 9.0.0-9.4.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2025-10-02T00:00:00.000Z | 2025-10-23T01:05:53.000Z |
| msrc_cve-2025-55315 | ASP.NET Security Feature Bypass Vulnerability | 2025-10-14T07:00:00.000Z | 2025-10-22T07:00:00.000Z |
| msrc_cve-2024-57888 | workqueue: Do not warn when cancelling WQ_MEM_RECLAIM work from !WQ_MEM_RECLAIM worker | 2025-01-02T00:00:00.000Z | 2025-10-22T01:02:36.000Z |
| msrc_cve-2022-49533 | ath11k: Change max no of active probe SSID and BSSID to fw capability | 2025-02-02T00:00:00.000Z | 2025-10-22T01:02:31.000Z |
| msrc_cve-2022-49528 | media: i2c: dw9714: Disable the regulator when the driver fails to probe | 2025-02-02T00:00:00.000Z | 2025-10-22T01:02:25.000Z |
| msrc_cve-2022-49504 | scsi: lpfc: Inhibit aborts if external loopback plug is inserted | 2025-02-02T00:00:00.000Z | 2025-10-22T01:02:20.000Z |
| msrc_cve-2022-49420 | net: annotate races around sk->sk_bound_dev_if | 2025-02-02T00:00:00.000Z | 2025-10-22T01:02:14.000Z |
| msrc_cve-2022-49333 | net/mlx5: E-Switch, pair only capable devices | 2025-02-02T00:00:00.000Z | 2025-10-22T01:02:09.000Z |
| msrc_cve-2022-49306 | usb: dwc3: host: Stop setting the ACPI companion | 2025-02-02T00:00:00.000Z | 2025-10-22T01:02:03.000Z |
| msrc_cve-2022-49267 | mmc: core: use sysfs_emit() instead of sprintf() | 2025-02-02T00:00:00.000Z | 2025-10-22T01:01:58.000Z |
| msrc_cve-2024-38564 | bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE | 2024-06-02T07:00:00.000Z | 2025-10-22T01:01:47.000Z |
| msrc_cve-2025-40010 | afs: Fix potential null pointer dereference in afs_put_server | 2025-10-02T00:00:00.000Z | 2025-10-22T01:01:41.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-21-194-09 | Siemens JT Utilities | 2021-07-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-194-08 | Siemens Solid Edge | 2021-07-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-194-05 | Siemens SIMATIC Software Products | 2021-07-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-194-04 | Siemens SINUMERIK Integrate Operate Client | 2021-07-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-159-14 | Siemens JT2Go and Teamcenter Visualization | 2021-06-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-159-13 | Siemens SIMATIC RFID (Update B) | 2021-06-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-159-12 | Siemens Simcenter Femap | 2021-06-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-159-11 | Siemens SIMATIC NET CP 443-1 OPC UA | 2021-06-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-159-10 | Siemens SIMATIC TIM libcurl | 2021-06-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-159-09 | Siemens Solid Edge | 2021-06-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-159-08 | Siemens TIM 1531 IRC | 2021-06-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-159-07 | Siemens Mendix SAML Module | 2021-06-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-152-01 | Siemens SIMATIC S7-1200 and S7-1500 CPU Families (Update A) | 2021-05-28T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-131-15 | Siemens SIMATIC S7-1500 | 2021-05-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-131-14 | Siemens SCALANCE W1750D (Update B) | 2021-05-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-131-12 | Siemens SIMATIC SmartVNC HMI WinCC Products (Update B) | 2021-05-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-131-11 | Siemens SIMATIC UltraVNC HMI WinCC Products | 2021-05-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-131-10 | Siemens SCALANCE XM-400 and XR-500 Devices | 2021-05-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-131-09 | Siemens Mendix Excel Importer Module | 2021-05-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-131-08 | Siemens Tecnomatix Plant Simulation | 2021-05-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-131-07 | Siemens SIMATIC NET CP343-1 | 2021-05-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-131-06 | Siemens SNMP Implementation of WinCC Runtime | 2021-05-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-131-05 | Siemens Mendix Database Replication Module | 2021-05-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-131-04 | Siemens SINAMICS Medium Voltage Products Remote Access (Update B) | 2021-05-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-110-07 | Siemens Mendix | 2021-04-14T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-103-15 | Siemens and Milestone Siveillance Video Open Network Bridge | 2021-04-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-103-14 | Siemens Nucleus DNS (Update A) | 2021-04-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-103-13 | Siemens SIMOTICS CONNECT 400 (Update A) | 2021-04-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-103-12 | Siemens Tecnomatix RobotExpert | 2021-04-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-103-08 | Siemens SINEMA Remote Connect Server | 2021-04-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-asaftd-rsa-key-leak-ms7uefzz | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software RSA Private Key Leak Vulnerability | 2022-08-10T16:00:00+00:00 | 2022-08-10T16:00:00+00:00 |
| cisco-sa-asaftd-rsa-key-leak-Ms7UEfZz | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software RSA Private Key Leak Vulnerability | 2022-08-10T16:00:00+00:00 | 2022-08-10T16:00:00+00:00 |
| cisco-sa-webex-xss-frmhijck-ko3wmkus | Cisco Webex Meetings Web Interface Vulnerabilities | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-webex-xss-frmhijck-kO3wmkuS | Cisco Webex Meetings Web Interface Vulnerabilities | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-sb-mult-vuln-cbvp4sur | Cisco Small Business RV Series Routers Vulnerabilities | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-sb-mult-vuln-CbVp4SUR | Cisco Small Business RV Series Routers Vulnerabilities | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-ise-pwd-wh64ahqf | Cisco Identity Services Engine Sensitive Information Disclosure Vulnerability | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-ise-pwd-WH64AhQF | Cisco Identity Services Engine Sensitive Information Disclosure Vulnerability | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-cucm-file-delete-n2vpmone | Cisco Unified Communications Manager Arbitrary File Deletion Vulnerability | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-cucm-file-delete-N2VPmOnE | Cisco Unified Communications Manager Arbitrary File Deletion Vulnerability | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-broadworks-xss-xbhfr4cd | Cisco BroadWorks Application Delivery Platform Software Cross-Site Scripting Vulnerability | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-broadworks-xss-xbhfr4cD | Cisco BroadWorks Application Delivery Platform Software Cross-Site Scripting Vulnerability | 2022-08-03T16:00:00+00:00 | 2022-08-03T16:00:00+00:00 |
| cisco-sa-sma-esa-auth-bypass-66kecxqd | Cisco Email Security Appliance and Cisco Secure Email and Web Manager External Authentication Bypass Vulnerability | 2022-06-15T16:00:00+00:00 | 2022-08-02T13:07:47+00:00 |
| cisco-sa-sma-esa-auth-bypass-66kEcxQD | Cisco Email Security Appliance and Cisco Secure Email and Web Manager External Authentication Bypass Vulnerability | 2022-06-15T16:00:00+00:00 | 2022-08-02T13:07:47+00:00 |
| cisco-sa-sb-rv-rce-overflow-yghbyak | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Remote Command Execution and Denial of Service Vulnerabilities | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-sb-rv-rce-overflow-ygHByAK | Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Remote Command Execution and Denial of Service Vulnerabilities | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-ndb-mprvesc-emhdgxe5 | Cisco Nexus Dashboard Privilege Escalation Vulnerabilities | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-ndb-mprvesc-EMhDgXe5 | Cisco Nexus Dashboard Privilege Escalation Vulnerabilities | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-ndb-mhcvuln-vpsbpj9y | Cisco Nexus Dashboard Unauthorized Access Vulnerabilities | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-ndb-mhcvuln-vpsBPJ9y | Cisco Nexus Dashboard Unauthorized Access Vulnerabilities | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-ndb-afw-2mt9tb99 | Cisco Nexus Dashboard Arbitrary File Write Vulnerability | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-ndb-afw-2MT9tb99 | Cisco Nexus Dashboard Arbitrary File Write Vulnerability | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-nd-tlsvld-tbaqlp3n | Cisco Nexus Dashboard SSL Certificate Validation Vulnerability | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-nd-tlsvld-TbAQLp3N | Cisco Nexus Dashboard SSL Certificate Validation Vulnerability | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-ise-lifetime-pwd-gpcs76mb | Cisco Identity Services Engine Administrator Password Lifetime Expiration Issue | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-ise-lifetime-pwd-GpCs76mb | Cisco Identity Services Engine Administrator Password Lifetime Expiration Issue | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-iotcc-xss-wqrclrvd | Cisco IoT Control Center Cross-Site Scripting Vulnerability | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-iotcc-xss-WQrCLRVd | Cisco IoT Control Center Cross-Site Scripting Vulnerability | 2022-07-20T16:00:00+00:00 | 2022-07-20T16:00:00+00:00 |
| cisco-sa-ise-saml-nuukmpf9 | Cisco Identity Services Engine Authentication Bypass Vulnerability | 2022-06-15T16:00:00+00:00 | 2022-07-13T14:42:14+00:00 |
| cisco-sa-ISE-SAML-nuukMPf9 | Cisco Identity Services Engine Authentication Bypass Vulnerability | 2022-06-15T16:00:00+00:00 | 2022-07-13T14:42:14+00:00 |
| ID | Description | Updated |
|---|---|---|
| var-200608-0031 | Stack-based buffer overflow in bootpd in the DHCP component for Apple Mac OS X 10.3.9 and… | 2024-11-29T19:49:28.828000Z |
| var-202212-1751 | A type confusion issue was addressed with improved state handling. This issue is fixed in… | 2024-11-29T19:49:28.574000Z |
| var-201904-1325 | A memory corruption issue was addressed with improved memory handling. This issue affecte… | 2024-11-29T19:48:56.552000Z |
| var-200909-0399 | The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass inte… | 2024-11-29T19:48:46.120000Z |
| var-201201-0030 | The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not proper… | 2024-11-29T19:48:30.130000Z |
| var-202101-1926 | Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer o… | 2024-11-29T19:48:22.261000Z |
| var-201210-0155 | Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS … | 2024-11-29T19:47:49.870000Z |
| var-201505-0062 | Double free vulnerability in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before … | 2024-11-29T19:47:48.471000Z |
| var-200912-0769 | ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause … | 2024-11-29T19:47:16.665000Z |
| var-201704-1397 | The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lack certa… | 2024-11-29T19:47:16.600000Z |
| var-202004-1994 | A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.4 a… | 2024-11-29T19:46:45.431000Z |
| var-201711-0479 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-11-29T19:46:44.416000Z |
| var-201912-0575 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-11-29T19:46:44.339000Z |
| var-200810-0394 | Unspecified vulnerability in Script Editor in Mac OS X 10.4.11 and 10.5.5 allows local us… | 2024-11-29T19:46:13.550000Z |
| var-201306-0258 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-11-29T19:46:12.127000Z |
| var-201904-1352 | A type confusion issue was addressed with improved memory handling. This issue affected v… | 2024-11-29T19:46:10.332000Z |
| var-200704-0227 | Unspecified vulnerability in the CoreServices daemon in CarbonCore in Apple Mac OS X 10.4… | 2024-11-29T19:46:07.623000Z |
| var-200911-0398 | The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Int… | 2024-11-29T19:45:18.768000Z |
| var-201108-0148 | Integer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and… | 2024-11-29T19:45:18.503000Z |
| var-201702-0879 | An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari … | 2024-11-29T19:45:18.434000Z |
| var-201912-0579 | A logic issue existed in the handling of synchronous page loads. This issue was addressed… | 2024-11-29T19:45:17.459000Z |
| var-200809-0194 | VideoConference in Apple Mac OS X 10.4.11 and 10.5 through 10.5.4 allows remote attackers… | 2024-11-29T19:45:16.249000Z |
| var-202202-0906 | valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes. Apple i… | 2024-11-29T19:45:14.785000Z |
| var-202203-0099 | If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) … | 2024-11-29T19:45:13.194000Z |
| var-201710-1409 | An issue was discovered in certain Apple products. iOS before 11 is affected. Safari befo… | 2024-11-29T19:45:12.866000Z |
| var-201511-0087 | The xz_decomp function in xzlib.c in libxml2 2.9.1 does not properly detect compression e… | 2024-11-29T19:45:09.457000Z |
| var-201302-0234 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-11-29T19:45:09.039000Z |
| var-200906-0603 | Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possi… | 2024-11-29T19:45:08.835000Z |
| var-200704-0740 | The IPv6 protocol allows remote attackers to cause a denial of service via crafted IPv6 t… | 2024-11-29T19:45:03.527000Z |
| var-201908-1840 | When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_dat… | 2024-11-29T19:45:03.230000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2018-000042 | RT-AC87U vulnerable to cross-site scripting | 2018-05-09T15:37+09:00 | 2018-08-30T12:32+09:00 |
| jvndb-2018-000044 | RT-AC68U vulnerable to cross-site scripting | 2018-05-09T15:38+09:00 | 2018-08-30T12:20+09:00 |
| jvndb-2018-000043 | RT-AC1200HP vulnerable to cross-site scripting | 2018-05-09T15:37+09:00 | 2018-08-30T12:15+09:00 |
| jvndb-2018-000038 | WordPress plugin "WP Google Map Plugin" vulnerable to cross-site scripting | 2018-04-27T14:15+09:00 | 2018-08-30T12:00+09:00 |
| jvndb-2018-000039 | WordPress plugin "PixelYourSite" vulnerable to cross-site scripting | 2018-04-27T14:24+09:00 | 2018-08-30T11:55+09:00 |
| jvndb-2018-000037 | WordPress plugin "Events Manager" vulnerable to cross-site scripting | 2018-04-27T14:00+09:00 | 2018-08-30T11:48+09:00 |
| jvndb-2018-000035 | EC-CUBE vulnerable to session fixation | 2018-04-17T13:39+09:00 | 2018-08-22T17:42+09:00 |
| jvndb-2018-006460 | Path Traversal Vulnerability in Hitachi Automation Director | 2018-08-22T17:11+09:00 | 2018-08-22T17:11+09:00 |
| jvndb-2018-006459 | Path Traversal Vulnerability in JP1/Automatic Operation | 2018-08-22T17:11+09:00 | 2018-08-22T17:11+09:00 |
| jvndb-2018-000050 | Self-Extracting Archive files created by IExpress may insecurely load Dynamic Link Libraries | 2018-05-17T14:57+09:00 | 2018-08-21T16:40+09:00 |
| jvndb-2018-000086 | Multiple vulnerabilities in EC-CUBE Payment Module and GMO-PG Payment Module (PG Multi-Payment Service) for EC-CUBE | 2018-08-09T16:43+09:00 | 2018-08-09T16:43+09:00 |
| jvndb-2018-003553 | Information Disclosure Vulnerability in Hitachi Automation Director | 2018-05-28T12:13+09:00 | 2018-07-31T12:16+09:00 |
| jvndb-2018-003030 | Access Control Vulnerability in Hitachi Infrastructure Analytics Advisor | 2018-05-10T15:30+09:00 | 2018-07-31T12:12+09:00 |
| jvndb-2018-000064 | Chrome Extension "5000 trillion yen converter" vulnerable to cross-site scripting | 2018-06-15T14:36+09:00 | 2018-06-15T14:36+09:00 |
| jvndb-2018-000031 | Multiple vulnerabilities in Cybozu Garoon | 2018-04-09T14:27+09:00 | 2018-06-14T14:33+09:00 |
| jvndb-2018-000026 | iRemoconWiFi App for Android fails to verify SSL server certificates | 2018-03-27T13:40+09:00 | 2018-06-14T14:29+09:00 |
| jvndb-2018-000034 | Tenable Appliance vulnerable to cross-site scripting | 2018-04-12T14:33+09:00 | 2018-06-14T14:20+09:00 |
| jvndb-2018-000030 | Installer of SoundEngine Free may insecurely load Dynamic Link Libraries | 2018-04-13T13:52+09:00 | 2018-06-14T14:16+09:00 |
| jvndb-2018-000906 | TinyFTP Daemon vulnerable to buffer overflow | 2018-03-13T16:48+09:00 | 2018-06-14T14:12+09:00 |
| jvndb-2018-000027 | Multiple vulnerabilities in WZR-1750DHP2 | 2018-03-29T13:52+09:00 | 2018-06-14T14:12+09:00 |
| jvndb-2018-000028 | LXR vulnerable to OS command injection | 2018-03-29T14:00+09:00 | 2018-06-14T14:08+09:00 |
| jvndb-2018-000903 | QQQ SYSTEMS vulnerable to cross-site scripting | 2018-03-13T16:43+09:00 | 2018-06-14T14:03+09:00 |
| jvndb-2018-000029 | Safari vulnerable to script injection | 2018-03-30T13:39+09:00 | 2018-06-14T14:02+09:00 |
| jvndb-2018-000900 | ArsenoL vulnerable to cross-site scripting | 2018-03-13T16:46+09:00 | 2018-06-14T13:58+09:00 |
| jvndb-2018-000019 | Multiple vulnerabilities in Jubatus | 2018-03-02T13:45+09:00 | 2018-06-14T13:57+09:00 |
| jvndb-2018-000904 | PHP 2chBBS vulnerable to cross-site scripting | 2018-03-13T16:47+09:00 | 2018-06-14T13:55+09:00 |
| jvndb-2018-000024 | Multiple vulnerabilities in CG-WGR1200 | 2018-03-09T13:56+09:00 | 2018-06-14T13:54+09:00 |
| jvndb-2018-000907 | QQQ SYSTEMS vulnerable to arbitrary command injection | 2018-03-13T16:43+09:00 | 2018-06-14T13:53+09:00 |
| jvndb-2018-000905 | ViX may insecurely load Dynamic Link Libraries | 2018-03-13T16:48+09:00 | 2018-06-14T13:52+09:00 |
| jvndb-2018-000908 | WebProxy vulnerable to directory traversal | 2018-03-13T16:48+09:00 | 2018-06-14T13:51+09:00 |
| ID | Description | Updated |
|---|