Recent vulnerabilities
| ID | Description | Published | Updated |
|---|---|---|---|
| ghsa-c7h7-j3m6-933p | A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma… | 2025-11-04T03:30:29Z | 2025-11-04T21:31:33Z |
| ghsa-9c63-94gf-85h2 | A use-after-free issue was addressed with improved memory management. This issue is fixed in watchO… | 2025-11-04T03:30:29Z | 2025-11-04T15:31:33Z |
| ghsa-946v-48wq-8882 | A privacy issue was addressed with improved private data redaction for log entries. This issue is f… | 2025-11-04T03:30:29Z | 2025-11-04T18:31:53Z |
| ghsa-8v28-rgjq-f5h7 | An inconsistent user interface issue was addressed with improved state management. This issue is fi… | 2025-11-04T03:30:29Z | 2025-11-05T21:31:01Z |
| ghsa-8h3p-p2xh-j29x | This issue was addressed through improved state management. This issue is fixed in iOS 26.1 and iPa… | 2025-11-04T03:30:29Z | 2025-11-05T21:31:00Z |
| ghsa-849v-5927-j7jq | A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing re… | 2025-11-04T03:30:29Z | 2025-11-04T18:31:53Z |
| ghsa-7jw7-wvw3-gc2g | An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS So… | 2025-11-04T03:30:29Z | 2025-11-04T15:31:33Z |
| ghsa-7g3g-36m8-grv8 | A logic issue was addressed with improved checks. This issue is fixed in iOS 26.1 and iPadOS 26.1. … | 2025-11-04T03:30:29Z | 2025-11-05T21:31:00Z |
| ghsa-6wgr-2m33-vg69 | An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in X… | 2025-11-04T03:30:29Z | 2025-11-04T15:31:34Z |
| ghsa-6824-ghx8-vrm5 | This issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.2. An app … | 2025-11-04T03:30:29Z | 2025-11-04T18:31:53Z |
| ghsa-4v2x-jqm6-7wqw | A privacy issue was addressed by removing sensitive data. This issue is fixed in iOS 26.1 and iPadO… | 2025-11-04T03:30:29Z | 2025-11-04T15:31:34Z |
| ghsa-479r-rg4f-86j3 | The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to Stored Cro… | 2025-11-04T03:30:29Z | 2025-11-04T03:30:29Z |
| ghsa-3rjw-h7x9-663w | A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma… | 2025-11-04T03:30:29Z | 2025-11-04T18:31:53Z |
| ghsa-2mw2-gj79-mjf4 | A use after free issue was addressed with improved memory management. This issue is fixed in macOS … | 2025-11-04T03:30:29Z | 2025-11-04T15:31:34Z |
| ghsa-xvjg-xxqh-hg7q | The issue was addressed with improved memory handling. This issue is fixed in Safari 26, tvOS 26, w… | 2025-11-04T03:30:28Z | 2025-11-04T18:31:52Z |
| ghsa-xh83-4f2v-gp3x | A permissions issue was addressed with additional restrictions. This issue is fixed in iOS 26.1 and… | 2025-11-04T03:30:28Z | 2025-11-05T21:31:00Z |
| ghsa-vg6g-ppvj-7qh3 | This issue was addressed through improved state management. This issue is fixed in iOS 26.1 and iPa… | 2025-11-04T03:30:28Z | 2025-11-04T15:31:33Z |
| ghsa-v5c8-f9w5-3g67 | This issue was addressed with improved checks. This issue is fixed in Safari 26.1, visionOS 26.1, w… | 2025-11-04T03:30:28Z | 2025-11-05T21:31:00Z |
| ghsa-v3g8-vrxx-mrhp | The issue was addressed by adding additional logic. This issue is fixed in iOS 26.1 and iPadOS 26.1… | 2025-11-04T03:30:28Z | 2025-11-04T18:31:52Z |
| ghsa-rj8f-f8h4-6gwq | The issue was addressed with improved handling of caches. This issue is fixed in iOS 26.1 and iPadO… | 2025-11-04T03:30:28Z | 2025-11-04T18:31:52Z |
| ghsa-rfwj-hvcp-2885 | This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Sonoma … | 2025-11-04T03:30:28Z | 2025-11-04T15:31:33Z |
| ghsa-qj67-gr9c-3589 | The issue was addressed with improved memory handling. This issue is fixed in watchOS 26.1, iOS 26.… | 2025-11-04T03:30:28Z | 2025-11-04T18:31:52Z |
| ghsa-pwvc-4r36-xf4c | This issue was addressed with improved validation of symlinks. This issue is fixed in visionOS 26.1… | 2025-11-04T03:30:28Z | 2025-11-05T21:31:00Z |
| ghsa-pq76-cc8r-h3cm | The issue was addressed with improved memory handling. This issue is fixed in Safari 26.1, visionOS… | 2025-11-04T03:30:28Z | 2025-11-04T15:31:32Z |
| ghsa-p2fp-xccv-vf5p | A buffer overflow was addressed with improved bounds checking. This issue is fixed in Safari 26.1, … | 2025-11-04T03:30:28Z | 2025-11-05T21:30:59Z |
| ghsa-mjxr-6g34-88q5 | A permissions issue was addressed with improved validation. This issue is fixed in macOS Sonoma 14.… | 2025-11-04T03:30:28Z | 2025-11-04T18:31:52Z |
| ghsa-m3cw-288r-j9r9 | The issue was addressed with improved memory handling. This issue is fixed in iOS 26.1 and iPadOS 2… | 2025-11-04T03:30:28Z | 2025-11-05T21:31:00Z |
| ghsa-jrv3-f6mq-763r | An out-of-bounds read was addressed with improved input validation. This issue is fixed in visionOS… | 2025-11-04T03:30:28Z | 2025-11-05T21:31:00Z |
| ghsa-jp2w-2c9w-v4jw | The issue was addressed with improved bounds checks. This issue is fixed in iOS 26.1 and iPadOS 26.… | 2025-11-04T03:30:28Z | 2025-11-04T18:31:52Z |
| ghsa-jj3r-g3mj-2cmm | A logging issue was addressed with improved data redaction. This issue is fixed in iOS 26.1 and iPa… | 2025-11-04T03:30:28Z | 2025-11-05T21:30:59Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2025-47368 | 7.8 (v3.1) | Buffer Over-read in DSP Service |
Qualcomm, Inc. |
Snapdragon |
2025-11-04T03:19:24.982Z | 2025-11-04T14:44:51.488Z |
| cve-2025-47367 | 7.8 (v3.1) | Out-of-bounds Write in WinBlast Driver |
Qualcomm, Inc. |
Snapdragon |
2025-11-04T03:19:23.734Z | 2025-11-04T14:45:01.835Z |
| cve-2025-47365 | 7.8 (v3.1) | Integer Overflow or Wraparound in Automotive Platform |
Qualcomm, Inc. |
Snapdragon |
2025-11-04T03:19:22.474Z | 2025-11-04T14:45:13.687Z |
| cve-2025-47362 | 6.1 (v3.1) | Buffer Over-read in Automotive Software platform based… |
Qualcomm, Inc. |
Snapdragon |
2025-11-04T03:19:21.202Z | 2025-11-04T19:18:27.877Z |
| cve-2025-47361 | 7.8 (v3.1) | Improper Validation of Array Index in Automotive Softw… |
Qualcomm, Inc. |
Snapdragon |
2025-11-04T03:19:19.924Z | 2025-11-04T14:45:30.355Z |
| cve-2025-47360 | 7.8 (v3.1) | Stack-based Buffer Overflow in Automotive Software pla… |
Qualcomm, Inc. |
Snapdragon |
2025-11-04T03:19:18.581Z | 2025-11-04T14:45:44.073Z |
| cve-2025-47357 | 8 (v3.1) | Missing Authentication for Critical Function in SMSS |
Qualcomm, Inc. |
Snapdragon |
2025-11-04T03:19:17.319Z | 2025-11-04T19:18:49.323Z |
| cve-2025-47353 | 7.8 (v3.1) | Exposed Dangerous Method or Function in Automotive Sof… |
Qualcomm, Inc. |
Snapdragon |
2025-11-04T03:19:16.035Z | 2025-11-04T14:45:53.136Z |
| cve-2025-47352 | 7.8 (v3.1) | Improper Validation of Array Index in Audio |
Qualcomm, Inc. |
Snapdragon |
2025-11-04T03:19:14.758Z | 2025-11-04T14:46:09.028Z |
| cve-2025-27074 | 8.8 (v3.1) | Incorrect Calculation of Buffer Size in SCE-Mink |
Qualcomm, Inc. |
Snapdragon |
2025-11-04T03:19:13.447Z | 2025-11-04T14:46:19.115Z |
| cve-2025-27070 | 7.8 (v3.1) | Out-of-bounds Write in Windows Compute |
Qualcomm, Inc. |
Snapdragon |
2025-11-04T03:19:12.122Z | 2025-11-04T14:46:30.167Z |
| cve-2025-27064 | 6.1 (v3.1) | Buffer Over-read in Core Services |
Qualcomm, Inc. |
Snapdragon |
2025-11-04T03:19:10.792Z | 2025-11-04T19:39:01.419Z |
| cve-2025-12324 | TablePress – Tables in WordPress made easy <= 3.2.4 - … |
tobiasbg |
TablePress – Tables in WordPress made easy |
2025-11-04T02:26:55.497Z | 2025-11-05T14:49:27.004Z | |
| cve-2025-11841 | Greenshift – animation and page builder blocks <= 12.2… |
wpsoul |
Greenshift – animation and page builder blocks |
2025-11-04T01:50:26.195Z | 2025-11-04T20:49:06.880Z | |
| cve-2025-43373 | N/A | The issue was addressed with improved memory hand… |
Apple |
macOS |
2025-11-04T01:18:04.169Z | 2025-11-04T14:37:55.279Z |
| cve-2025-43365 | N/A | A denial-of-service issue was addressed with impr… |
Apple |
iOS and iPadOS |
2025-11-04T01:17:59.138Z | 2025-11-05T18:33:44.365Z |
| cve-2025-43430 | N/A | This issue was addressed through improved state m… |
Apple |
Safari |
2025-11-04T01:17:57.253Z | 2025-11-04T16:50:56.968Z |
| cve-2025-43426 | N/A | A logging issue was addressed with improved data … |
Apple |
iOS and iPadOS |
2025-11-04T01:17:56.437Z | 2025-11-04T15:31:50.262Z |
| cve-2025-43390 | N/A | A downgrade issue affecting Intel-based Mac compu… |
Apple |
macOS |
2025-11-04T01:17:54.534Z | 2025-11-04T14:40:31.629Z |
| cve-2025-43447 | N/A | The issue was addressed with improved memory hand… |
Apple |
visionOS |
2025-11-04T01:17:53.695Z | 2025-11-04T16:44:48.812Z |
| cve-2025-43502 | N/A | A privacy issue was addressed by removing sensiti… |
Apple |
Safari |
2025-11-04T01:17:52.851Z | 2025-11-04T14:47:59.138Z |
| cve-2025-43386 | N/A | An out-of-bounds access issue was addressed with … |
Apple |
iOS and iPadOS |
2025-11-04T01:17:51.013Z | 2025-11-06T14:34:08.916Z |
| cve-2025-43345 | N/A | A correctness issue was addressed with improved c… |
Apple |
macOS |
2025-11-04T01:17:49.289Z | 2025-11-04T14:51:39.904Z |
| cve-2025-43493 | N/A | The issue was addressed with improved checks. Thi… |
Apple |
iOS and iPadOS |
2025-11-04T01:17:45.738Z | 2025-11-06T14:35:05.690Z |
| cve-2025-43387 | N/A | A permissions issue was addressed with additional… |
Apple |
macOS |
2025-11-04T01:17:42.899Z | 2025-11-05T04:55:19.394Z |
| cve-2025-43411 | N/A | This issue was addressed with additional entitlem… |
Apple |
macOS |
2025-11-04T01:17:41.073Z | 2025-11-04T14:58:31.806Z |
| cve-2025-43446 | N/A | This issue was addressed with improved validation… |
Apple |
macOS |
2025-11-04T01:17:39.255Z | 2025-11-04T13:00:19.992Z |
| cve-2025-43503 | N/A | An inconsistent user interface issue was addresse… |
Apple |
iOS and iPadOS |
2025-11-04T01:17:38.232Z | 2025-11-06T14:35:40.019Z |
| cve-2025-43450 | N/A | A logic issue was addressed with improved checks.… |
Apple |
iOS and iPadOS |
2025-11-04T01:17:36.172Z | 2025-11-06T14:36:06.162Z |
| cve-2025-43391 | N/A | A privacy issue was addressed with improved handl… |
Apple |
macOS |
2025-11-04T01:17:35.327Z | 2025-11-04T15:07:27.166Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2025-20732 | N/A | In wlan AP driver, there is a possible out of bou… |
MediaTek, Inc. |
MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986 |
2025-11-04T06:20:08.954Z | 2025-11-05T04:55:50.276Z |
| cve-2025-20731 | N/A | In wlan AP driver, there is a possible out of bou… |
MediaTek, Inc. |
MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986 |
2025-11-04T06:20:07.276Z | 2025-11-05T04:55:49.411Z |
| cve-2025-20730 | N/A | In preloader, there is a possible escalation of p… |
MediaTek, Inc. |
MT2737, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6833, MT6835, MT6853, MT6855, MT6877, MT6878, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6897, MT6899, MT6983, MT6985, MT6989, MT6990, MT6991, MT8188, MT8195, MT8676, MT8678, MT8696 |
2025-11-04T06:19:47.152Z | 2025-11-05T04:55:40.432Z |
| cve-2025-20729 | N/A | In wlan AP driver, there is a possible out of bou… |
MediaTek, Inc. |
MT6890, MT7615, MT7622, MT7663, MT7915, MT7916, MT7981, MT7986 |
2025-11-04T06:20:05.491Z | 2025-11-05T04:55:48.589Z |
| cve-2025-20728 | N/A | In wlan STA driver, there is a possible out of bo… |
MediaTek, Inc. |
MT7902, MT7920, MT7921, MT7922, MT7925, MT7927 |
2025-11-04T06:19:45.290Z | 2025-11-05T04:55:39.588Z |
| cve-2025-20727 | N/A | In Modem, there is a possible out of bounds write… |
MediaTek, Inc. |
MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8786, MT8788, MT8788E, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893 |
2025-11-04T06:19:40.087Z | 2025-11-05T04:55:35.978Z |
| cve-2025-20726 | N/A | In Modem, there is a possible out of bounds write… |
MediaTek, Inc. |
MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6813, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8666, MT8667, MT8673, MT8675, MT8676, MT8678, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8786, MT8788, MT8788E, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893 |
2025-11-04T06:19:41.827Z | 2025-11-05T04:55:36.771Z |
| cve-2025-20725 | N/A | In ims service, there is a possible out of bounds… |
MediaTek, Inc. |
MT2735, MT2737, MT6739, MT6761, MT6762, MT6762D, MT6762M, MT6763, MT6765, MT6765T, MT6767, MT6768, MT6769, MT6769K, MT6769S, MT6769T, MT6769Z, MT6771, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8766R, MT8768, MT8771, MT8786, MT8788, MT8788E, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8893 |
2025-11-04T06:19:43.569Z | 2025-11-05T04:55:37.570Z |
| cve-2025-12683 | 5.8 (v4.0) | NULL DACL assigned to Named Pipe communicating with SY… |
Voidtools |
Everything |
2025-11-04T04:23:02.884Z | 2025-11-04T20:50:21.977Z |
| cve-2025-12456 | Centangle Team Showcase <= 1.0.0 - Cross-Site Request … |
centangle |
Centangle-Team |
2025-11-04T04:27:17.736Z | 2025-11-04T16:43:20.440Z | |
| cve-2025-12452 | Visit Counter 1.0 - Cross-Site Request Forgery to Stor… |
bestiadurmiente |
Visit Counter |
2025-11-04T04:27:22.522Z | 2025-11-04T15:08:35.205Z | |
| cve-2025-12416 | Pagerank Tools <= 1.1.5 - Cross-Site Request Forgery t… |
mahype |
Pagerank tools |
2025-11-04T04:27:13.744Z | 2025-11-04T20:56:39.593Z | |
| cve-2025-12415 | MapMap <= 1.1 - Cross-Site Request Forgery to Settings… |
sugiartha |
MapMap |
2025-11-04T04:27:19.056Z | 2025-11-04T15:53:00.650Z | |
| cve-2025-12413 | Social Media WPCF7 Stop Words <= 1.1.3 - Cross-Site Re… |
socialmedialtd |
WPCF7 Stop words |
2025-11-04T04:27:14.981Z | 2025-11-04T21:00:10.133Z | |
| cve-2025-12412 | Top Bar Notification <= 1.12 - Cross-Site Request Forg… |
josereyev |
Top Bar Notification |
2025-11-04T04:27:12.930Z | 2025-11-04T20:53:26.807Z | |
| cve-2025-12410 | SH Contextual Help <= 3.2.1 - Cross-Site Request Forge… |
samhoamt |
SH Contextual Help |
2025-11-04T04:27:15.805Z | 2025-11-04T21:01:21.541Z | |
| cve-2025-12403 | Associados Amazon Plugin <= 0.8 - Cross-Site Request F… |
revokee |
Associados Amazon Plugin |
2025-11-04T04:27:23.574Z | 2025-11-04T14:58:40.263Z | |
| cve-2025-12402 | LinkedIn Resume <= 2.00 - Cross-Site Request Forgery t… |
bondnono |
LinkedIn Resume |
2025-11-04T04:27:19.651Z | 2025-11-04T15:52:16.797Z | |
| cve-2025-12400 | LMB^Box Smileys <= 3.2 - Cross-Site Request Forgery to… |
lmbbox |
LMB^Box Smileys |
2025-11-04T04:27:17.374Z | 2025-11-04T16:47:13.869Z | |
| cve-2025-12396 | Clubmember <= 0.2 - Authenticated (Admin+) Stored Cros… |
alaminopu |
clubmember |
2025-11-04T04:27:24.287Z | 2025-11-04T14:41:45.820Z | |
| cve-2025-12393 | Free Quotation <= 3.1.6 - Authenticated (Admin+) Store… |
kris_iv |
Free Quotation |
2025-11-04T04:27:14.125Z | 2025-11-04T20:58:53.990Z | |
| cve-2025-12389 | Import Export For WooCommerce <= 1.6.2 - Missing Autho… |
sidngr |
Import Export For WooCommerce |
2025-11-04T04:27:21.061Z | 2025-11-04T15:20:23.287Z | |
| cve-2025-12371 | Nari Accountant <= 1.0.12 - Authenticated (Editor+) St… |
shakhi |
Nari Accountant |
2025-11-04T04:27:21.431Z | 2025-11-04T15:15:44.559Z | |
| cve-2025-12369 | Extensions for Leaflet Map <= 4.7 - Authenticated (Con… |
hupe13 |
Extensions for Leaflet Map |
2025-11-04T04:27:17.014Z | 2025-11-04T16:47:34.277Z | |
| cve-2025-12350 | DominoKit <= 1.1.0 - Missing Authorization to Unauthen… |
domiinodev |
DominoKit |
2025-11-04T04:27:14.553Z | 2025-11-04T20:59:31.623Z | |
| cve-2025-12188 | Posts Navigation Links for Sections and Headings - Fre… |
wpmasterscom |
Posts Navigation Links for Sections and Headings – Free by WP Masters |
2025-11-04T04:27:12.323Z | 2025-11-04T20:52:13.667Z | |
| cve-2025-12158 | Simple User Capabilities <= 1.0 - Missing Authorizatio… |
tanvirahmed1984 |
Simple User Capabilities |
2025-11-04T04:27:22.881Z | 2025-11-04T15:01:57.048Z | |
| cve-2025-12157 | Simple User Capabilities <= 1.0 - Missing Authorizatio… |
tanvirahmed1984 |
Simple User Capabilities |
2025-11-04T04:27:16.185Z | 2025-11-04T17:16:00.320Z | |
| cve-2025-12156 | Ai Auto Tool Content Writing Assistant (Gemini Writer,… |
aitool |
Ai Auto Tool Content Writing Assistant (Gemini Writer, ChatGPT ) All in One |
2025-11-04T04:27:18.698Z | 2025-11-04T16:08:38.677Z | |
| cve-2025-12065 | WP Carticon <= 1.0.0 - Authenticated (Admin+) Stored C… |
carticon |
WP Carticon |
2025-11-04T04:27:21.798Z | 2025-11-04T15:10:58.084Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-184059 | Malicious code in mitokok-oni-oldis (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184058 | Malicious code in mitokoik-oni-oldis (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184057 | Malicious code in mitokoik-oni-oladis (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184056 | Malicious code in mitokoik-oni-oladips (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184055 | Malicious code in mitokoik-oni-oladinps (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184054 | Malicious code in mitokoik-oni-oladinaps (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184053 | Malicious code in mitokoik-oni-oladiaps (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184052 | Malicious code in mitoko-ontmi-lapikasi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184051 | Malicious code in mitoko-ontcmi-lapiokasi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184050 | Malicious code in mitoko-ontcmi-lapiokamakuasi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184049 | Malicious code in mitoko-ontcmi-lapiokamakasi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184048 | Malicious code in mitoko-ontcmi-lapiokamaasi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184047 | Malicious code in mitoko-ontcmi-lapiokaasi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184046 | Malicious code in mitoko-ontcmi-lapikasi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184045 | Malicious code in mitoko-ontcami-lasi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184044 | Malicious code in mitoko-ontcami-lapkasi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184043 | Malicious code in mitoko-ontcami-lapikasi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184042 | Malicious code in mitoko-ontcami-lapikamasi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184041 | Malicious code in mitoko-ontcami-lapikamakusi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184040 | Malicious code in mitoko-ontcami-lapikamakuasi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184039 | Malicious code in mitoko-ontcami-lapasi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184038 | Malicious code in mitoko-ontcami-laoi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184037 | Malicious code in mitoko-ontcami-lamokoinabia (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184036 | Malicious code in mitoko-ontcami-lamokoinab (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184035 | Malicious code in mitoko-ontcami-lamokoina (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184034 | Malicious code in mitoko-ontcami-lamokoin (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184033 | Malicious code in mitoko-ontcami-lamokoi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184032 | Malicious code in mitoko-ontcami-lamoki (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184031 | Malicious code in mitoko-ontcami-lamoi (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| mal-2025-184030 | Malicious code in mitoko-ontcami-lai (npm) | 2025-11-12T22:25:03Z | 2025-11-12T22:25:03Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:10585 | Red Hat Security Advisory: jq security update | 2025-07-08T11:18:39+00:00 | 2025-11-11T09:29:47+00:00 |
| rhsa-2025:10602 | Red Hat Security Advisory: python3 security update | 2025-07-08T11:17:19+00:00 | 2025-11-11T08:20:07+00:00 |
| rhsa-2025:10551 | Red Hat Security Advisory: container-tools:rhel8 security update | 2025-07-08T01:25:43+00:00 | 2025-11-10T13:52:37+00:00 |
| rhsa-2025:10547 | Red Hat Security Advisory: kernel security update | 2025-07-08T01:15:28+00:00 | 2025-11-06T22:35:12+00:00 |
| rhsa-2025:10550 | Red Hat Security Advisory: podman security update | 2025-07-08T01:13:03+00:00 | 2025-11-10T13:52:37+00:00 |
| rhsa-2025:10549 | Red Hat Security Advisory: podman security update | 2025-07-08T01:00:08+00:00 | 2025-11-10T13:52:37+00:00 |
| rhsa-2025:10544 | Red Hat Security Advisory: socat security update | 2025-07-08T00:27:18+00:00 | 2025-11-11T12:54:40+00:00 |
| rhsa-2025:10541 | Red Hat Security Advisory: rsync security update | 2025-07-08T00:18:38+00:00 | 2025-11-08T04:24:26+00:00 |
| rhsa-2025:10536 | Red Hat Security Advisory: kernel-rt security update | 2025-07-08T00:13:53+00:00 | 2025-11-06T22:35:12+00:00 |
| rhsa-2025:10527 | Red Hat Security Advisory: kernel-rt security update | 2025-07-07T19:12:57+00:00 | 2025-11-11T11:27:06+00:00 |
| rhsa-2025:10520 | Red Hat Security Advisory: sudo security update | 2025-07-07T18:20:02+00:00 | 2025-11-06T23:14:15+00:00 |
| rhsa-2025:10518 | Red Hat Security Advisory: sudo security update | 2025-07-07T17:11:07+00:00 | 2025-11-06T23:14:14+00:00 |
| rhsa-2025:10484 | Red Hat Security Advisory: python3 security update | 2025-07-07T16:21:57+00:00 | 2025-11-11T08:20:07+00:00 |
| rhsa-2025:10459 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.8 Security update | 2025-07-07T13:35:06+00:00 | 2025-11-11T17:10:31+00:00 |
| rhsa-2025:10452 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.8 Security update | 2025-07-07T13:32:31+00:00 | 2025-11-11T17:10:30+00:00 |
| rhsa-2025:10453 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0.8 Security update | 2025-07-07T13:27:47+00:00 | 2025-11-11T17:10:30+00:00 |
| rhsa-2025:10410 | Red Hat Security Advisory: tigervnc security update | 2025-07-07T12:25:56+00:00 | 2025-11-10T14:23:00+00:00 |
| rhsa-2025:10407 | Red Hat Security Advisory: python-setuptools security update | 2025-07-07T12:06:41+00:00 | 2025-11-07T03:31:52+00:00 |
| rhsa-2025:10399 | Red Hat Security Advisory: python3.9 security update | 2025-07-07T11:25:51+00:00 | 2025-11-11T08:20:06+00:00 |
| rhsa-2025:10383 | Red Hat Security Advisory: sudo security update | 2025-07-07T09:01:16+00:00 | 2025-11-06T23:14:13+00:00 |
| rhsa-2025:10379 | Red Hat Security Advisory: kernel security update | 2025-07-07T08:44:55+00:00 | 2025-11-11T11:27:06+00:00 |
| rhsa-2025:10381 | Red Hat Security Advisory: tigervnc security update | 2025-07-07T08:13:05+00:00 | 2025-11-10T14:23:01+00:00 |
| rhsa-2025:10377 | Red Hat Security Advisory: tigervnc security update | 2025-07-07T07:29:00+00:00 | 2025-11-10T14:22:59+00:00 |
| rhsa-2025:10375 | Red Hat Security Advisory: tigervnc security update | 2025-07-07T07:28:11+00:00 | 2025-11-10T14:23:01+00:00 |
| rhsa-2025:10374 | Red Hat Security Advisory: tigervnc security update | 2025-07-07T07:26:39+00:00 | 2025-11-10T14:22:57+00:00 |
| rhsa-2025:10378 | Red Hat Security Advisory: tigervnc security update | 2025-07-07T07:26:25+00:00 | 2025-11-10T14:22:59+00:00 |
| rhsa-2025:10376 | Red Hat Security Advisory: tigervnc security update | 2025-07-07T07:20:55+00:00 | 2025-11-10T14:22:58+00:00 |
| rhsa-2025:10371 | Red Hat Security Advisory: kernel security update | 2025-07-07T06:10:45+00:00 | 2025-11-11T08:42:47+00:00 |
| rhsa-2025:10370 | Red Hat Security Advisory: xorg-x11-server-Xwayland security update | 2025-07-07T05:33:20+00:00 | 2025-11-10T14:22:57+00:00 |
| rhsa-2025:10353 | Red Hat Security Advisory: socat security update | 2025-07-07T02:52:30+00:00 | 2025-11-11T12:54:39+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-37797 | net_sched: hfsc: Fix a UAF vulnerability in class handling | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37796 | wifi: at76c50x: fix use after free access in at76_disconnect | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37794 | wifi: mac80211: Purge vif txq in ieee80211_do_stop() | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37793 | ASoC: Intel: avs: Fix null-ptr-deref in avs_component_probe() | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37792 | Bluetooth: btrtl: Prevent potential NULL dereference | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37790 | net: mctp: Set SOCK_RCU_FREE | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37789 | net: openvswitch: fix nested key length validation in the set() action | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37788 | cxgb4: fix memory leak in cxgb4_init_ethtool_filters() error path | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37787 | net: dsa: mv88e6xxx: avoid unregistering devlink regions which were never registered | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37786 | net: dsa: free routing table on probe failure | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37781 | i2c: cros-ec-tunnel: defer probe if parent EC is not present | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37780 | isofs: Prevent the use of too small fid | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37778 | ksmbd: Fix dangling pointer in krb_authenticate | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37777 | ksmbd: fix use-after-free in __smb2_lease_break_noti() | 2025-05-02T00:00:00.000Z | 2025-09-04T01:09:02.000Z |
| msrc_cve-2025-37776 | ksmbd: fix use-after-free in smb_break_all_levII_oplock() | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37775 | ksmbd: fix the warning from __kernel_write_iter | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37773 | virtiofs: add filesystem context source name check | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37772 | RDMA/cma: Fix workqueue crash in cma_netevent_work_handler | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37771 | drm/amd/pm: Prevent division by zero | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37770 | drm/amd/pm: Prevent division by zero | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37769 | drm/amd/pm/smu11: Prevent division by zero | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37768 | drm/amd/pm: Prevent division by zero | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37767 | drm/amd/pm: Prevent division by zero | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37766 | drm/amd/pm: Prevent division by zero | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37765 | drm/nouveau: prime: fix ttm_bo_delayed_delete oops | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37759 | ublk: fix handling recovery & reissue in ublk_abort_queue() | 2025-05-02T00:00:00.000Z | 2025-09-03T22:48:52.000Z |
| msrc_cve-2025-37758 | ata: pata_pxa: Fix potential NULL pointer dereference in pxa_ata_probe() | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37757 | tipc: fix memory leak in tipc_link_xmit | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37756 | net: tls: explicitly disallow disconnect | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| msrc_cve-2025-37755 | net: libwx: handle page_pool_dev_alloc_pages error | 2025-05-02T00:00:00.000Z | 2025-07-11T00:00:00.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2017-000231 | OpenAM (Open Source Edition) vulnerable to authentication bypass | 2017-11-01T15:36+09:00 | 2018-03-14T14:03+09:00 |
| jvndb-2017-008629 | Memory corruption vulnerability in Rakuraku Hagaki and Rakuraku Hagaki Select for Ichitaro | 2017-10-25T12:17+09:00 | 2018-03-14T14:01+09:00 |
| jvndb-2017-008411 | XXE Vulnerability in Hitachi Command Suite | 2017-10-18T14:22+09:00 | 2017-11-07T15:06+09:00 |
| jvndb-2017-000229 | Home unit KX-HJB1000 contains multiple vulnerabilities | 2017-10-17T17:22+09:00 | 2018-03-07T14:24+09:00 |
| jvndb-2017-008370 | Information Disclosure Vulnerability in Hitachi Automation Director | 2017-10-17T17:01+09:00 | 2017-10-18T12:31+09:00 |
| jvndb-2017-008369 | Multiple Vulnerabilities in Hitachi Infrastructure Analytics Advisor | 2017-10-17T16:58+09:00 | 2017-10-18T12:31+09:00 |
| jvndb-2017-008364 | RMI Vulnerability in Hitachi Tuning Manager | 2017-10-17T16:26+09:00 | 2017-10-18T12:31+09:00 |
| jvndb-2017-008363 | Information Disclosure Vulnerability in Hitachi Global Link Manager | 2017-10-17T16:26+09:00 | 2017-10-18T12:31+09:00 |
| jvndb-2017-000228 | Installer of HIBUN Confidential File Viewer may insecurely load Dynamic Link Libraries and invoke executable files | 2017-10-11T16:43+09:00 | 2018-03-07T12:09+09:00 |
| jvndb-2017-000227 | HIBUN Confidential File Decryption program may insecurely load Dynamic Link Libraries | 2017-10-11T16:43+09:00 | 2018-03-07T12:06+09:00 |
| jvndb-2017-000226 | HIBUN Confidential File Decryption program may insecurely load Dynamic Link Libraries | 2017-10-11T16:43+09:00 | 2018-03-07T12:12+09:00 |
| jvndb-2017-000225 | Cybozu Office fails to restrict access permissions | 2017-10-11T14:28+09:00 | 2018-03-07T12:21+09:00 |
| jvndb-2017-007767 | Self-Decrypting Confidential Files created by JP1/HIBUN may insecurely load Dynamic Link Libraries | 2017-10-03T11:18+09:00 | 2017-10-06T11:36+09:00 |
| jvndb-2017-000223 | Install program and Installer of i-filter 6.0 may insecurely load Dynamic Link Libraries and invoke executable files | 2017-09-29T13:54+09:00 | 2017-09-29T13:54+09:00 |
| jvndb-2017-000146 | Marp vulnerable to improper access control in JavaScript execution | 2017-09-29T13:54+09:00 | 2018-02-07T11:52+09:00 |
| jvndb-2017-007582 | jwt-scala fails to verify token signatures | 2017-09-26T15:37+09:00 | 2018-03-07T12:23+09:00 |
| jvndb-2017-007422 | InterScan Web Security Virtual Appliance vulnerable to code injection | 2017-09-21T15:58+09:00 | 2018-03-07T14:32+09:00 |
| jvndb-2017-000218 | Wi-Fi STATION L-02F fails to restrict access permissions | 2017-09-12T14:35+09:00 | 2018-02-28T14:09+09:00 |
| jvndb-2017-000217 | Backdoor access issue in Wi-Fi STATION L-02F | 2017-09-12T14:34+09:00 | 2018-02-28T14:11+09:00 |
| jvndb-2017-000222 | SEIL Series routers vulnerable to denial-of-service (DoS) | 2017-09-11T15:19+09:00 | 2018-02-28T14:12+09:00 |
| jvndb-2017-000221 | Installer of FENCE-Explorer may insecurely load Dynamic Link Libraries and invoke executable files | 2017-09-11T14:55+09:00 | 2018-02-28T13:58+09:00 |
| jvndb-2017-000220 | Multiple vulnerabilities in CG-WLR300NM | 2017-09-08T14:14+09:00 | 2018-02-28T12:21+09:00 |
| jvndb-2017-006769 | Denial-of-service (DoS) Vulnerability in JP1 and Hitachi IT Operations Director | 2017-09-04T12:14+09:00 | 2017-09-05T10:46+09:00 |
| jvndb-2017-000219 | Multiple Fuji Xerox products may insecurely load Dynamic Link Libraries | 2017-08-31T16:35+09:00 | 2021-04-12T13:30+09:00 |
| jvndb-2017-000211 | Installer of "Remote Support Tool (Enkaku Support Tool)" may insecurely load Dynamic Link Libraries | 2017-08-30T15:10+09:00 | 2017-08-30T15:10+09:00 |
| jvndb-2017-006466 | Denial-of-service (DoS) Vulnerability in HiRDB | 2017-08-28T13:46+09:00 | 2017-09-05T10:46+09:00 |
| jvndb-2017-000214 | Installer of "Flets Install Tool" may insecurely load Dynamic Link Libraries | 2017-08-25T15:02+09:00 | 2018-02-28T14:07+09:00 |
| jvndb-2017-000212 | Installer of "Flets Azukeru for Windows Auto Backup Tool" may insecurely load Dynamic Link Libraries | 2017-08-25T15:02+09:00 | 2018-02-28T14:07+09:00 |
| jvndb-2017-000216 | Installer of "Flets Setsuzoku Tool" may insecurely load Dynamic Link Libraries | 2017-08-25T14:52+09:00 | 2018-02-28T11:39+09:00 |
| jvndb-2017-000215 | Installer and self-extracting archive containing the installer of "Security Setup Tool" may insecurely load Dynamic Link Libraries | 2017-08-25T14:50+09:00 | 2018-02-28T14:28+09:00 |
| ID | Description | Updated |
|---|