Recent vulnerabilities
| ID | Description | Published | Updated |
|---|---|---|---|
| ghsa-8pxq-vpq2-2xjv | In the Linux kernel, the following vulnerability has been resolved: perf: arm_spe: Prevent overflo… | 2025-10-28T12:30:17Z | 2025-10-29T15:31:54Z |
| ghsa-8c8f-r28v-v5hp | In the Linux kernel, the following vulnerability has been resolved: crypto: hisilicon/qm - set NUL… | 2025-10-28T12:30:17Z | 2025-10-28T12:30:17Z |
| ghsa-85v2-7wpp-wgf5 | An unauthenticated user can connect to a publicly accessible database using arbitrary credentials. … | 2025-10-28T12:30:17Z | 2025-10-28T12:30:17Z |
| ghsa-6gg9-hc2m-2hw4 | In the Linux kernel, the following vulnerability has been resolved: PCI: rcar-host: Pass proper IR… | 2025-10-28T12:30:17Z | 2025-10-28T12:30:17Z |
| ghsa-4hvf-57gh-hgxp | In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid overflow wh… | 2025-10-28T12:30:17Z | 2025-10-28T12:30:17Z |
| ghsa-447q-wwcf-54f8 | In the Linux kernel, the following vulnerability has been resolved: tcp_metrics: use dst_dev_net_r… | 2025-10-28T12:30:17Z | 2025-10-28T12:30:17Z |
| ghsa-2w39-4r85-2c9m | In the Linux kernel, the following vulnerability has been resolved: drm/msm: Fix obj leak in VM_BI… | 2025-10-28T12:30:17Z | 2025-10-28T12:30:17Z |
| ghsa-29fx-85hc-pfpw | In the Linux kernel, the following vulnerability has been resolved: ptp: Add a upper bound on max_… | 2025-10-28T12:30:17Z | 2025-10-28T12:30:17Z |
| ghsa-24rq-hg3c-whf7 | In the Linux kernel, the following vulnerability has been resolved: pps: fix warning in pps_regist… | 2025-10-28T12:30:17Z | 2025-10-29T15:31:54Z |
| ghsa-xxjc-4ppm-x655 | In the Linux kernel, the following vulnerability has been resolved: net: dlink: handle copy_thresh… | 2025-10-28T12:30:16Z | 2025-10-29T15:31:53Z |
| ghsa-w4pg-p4j3-82c8 | In the Linux kernel, the following vulnerability has been resolved: misc: fastrpc: fix possible ma… | 2025-10-28T12:30:16Z | 2025-10-28T12:30:16Z |
| ghsa-vvjm-j2jq-pjc2 | In the Linux kernel, the following vulnerability has been resolved: ASoC: codecs: wcd937x: set the… | 2025-10-28T12:30:16Z | 2025-10-28T12:30:16Z |
| ghsa-rwhf-69pj-m4jv | In the Linux kernel, the following vulnerability has been resolved: net: nfc: nci: Add parameter v… | 2025-10-28T12:30:16Z | 2025-10-28T12:30:16Z |
| ghsa-pq9p-38r9-fjq5 | In the Linux kernel, the following vulnerability has been resolved: Squashfs: fix uninit-value in … | 2025-10-28T12:30:16Z | 2025-10-29T15:31:53Z |
| ghsa-p3rp-6995-mvj3 | In the Linux kernel, the following vulnerability has been resolved: bpf: Skip scalar adjustment fo… | 2025-10-28T12:30:16Z | 2025-10-28T12:30:16Z |
| ghsa-jq6c-xqjw-rcrp | In the Linux kernel, the following vulnerability has been resolved: pinctrl: check the return valu… | 2025-10-28T12:30:16Z | 2025-10-29T15:31:53Z |
| ghsa-j3cc-8mgg-5gq2 | In the Linux kernel, the following vulnerability has been resolved: tee: fix register_shm_helper()… | 2025-10-28T12:30:16Z | 2025-10-28T12:30:16Z |
| ghsa-hw92-4498-rgw4 | In the Linux kernel, the following vulnerability has been resolved: uio_hv_generic: Let userspace … | 2025-10-28T12:30:16Z | 2025-10-29T15:31:53Z |
| ghsa-hrmw-f63j-cpmf | In the Linux kernel, the following vulnerability has been resolved: tracing: Fix race condition in… | 2025-10-28T12:30:16Z | 2025-10-29T15:31:53Z |
| ghsa-f89g-f269-w35c | In the Linux kernel, the following vulnerability has been resolved: io_uring/zcrx: fix overshootin… | 2025-10-28T12:30:16Z | 2025-10-28T12:30:16Z |
| ghsa-c4m5-3mj6-4mp6 | In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: Skip fastpath emulat… | 2025-10-28T12:30:16Z | 2025-10-28T12:30:16Z |
| ghsa-9g2x-xr9c-j935 | In the Linux kernel, the following vulnerability has been resolved: vhost: vringh: Modify the retu… | 2025-10-28T12:30:16Z | 2025-10-28T12:30:16Z |
| ghsa-8c35-rp3g-c86r | In the Linux kernel, the following vulnerability has been resolved: Input: uinput - zero-initializ… | 2025-10-28T12:30:16Z | 2025-10-29T15:31:53Z |
| ghsa-7wxp-97wr-wj5g | In the Linux kernel, the following vulnerability has been resolved: remoteproc: pru: Fix potential… | 2025-10-28T12:30:16Z | 2025-10-28T12:30:16Z |
| ghsa-76hq-frpj-75r7 | In the Linux kernel, the following vulnerability has been resolved: smb: client: fix crypto buffer… | 2025-10-28T12:30:16Z | 2025-10-28T12:30:17Z |
| ghsa-5hpm-4x7m-g857 | In the Linux kernel, the following vulnerability has been resolved: fbdev: simplefb: Fix use after… | 2025-10-28T12:30:16Z | 2025-10-28T12:30:16Z |
| ghsa-4wjr-gmwc-pw8f | In the Linux kernel, the following vulnerability has been resolved: PCI/AER: Avoid NULL pointer de… | 2025-10-28T12:30:16Z | 2025-10-28T12:30:16Z |
| ghsa-4j58-87g3-fv33 | In the Linux kernel, the following vulnerability has been resolved: fs: udf: fix OOB read in lengt… | 2025-10-28T12:30:16Z | 2025-10-29T15:31:53Z |
| ghsa-4chp-rv27-mr56 | In the Linux kernel, the following vulnerability has been resolved: PCI: endpoint: pci-epf-test: A… | 2025-10-28T12:30:16Z | 2025-10-28T12:30:16Z |
| ghsa-3q4f-fwrg-cw4x | In the Linux kernel, the following vulnerability has been resolved: mm/ksm: fix flag-dropping beha… | 2025-10-28T12:30:16Z | 2025-10-29T15:31:53Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2025-40070 | N/A | pps: fix warning in pps_register_cdev when register de… |
Linux |
Linux |
2025-10-28T11:48:38.838Z | 2025-10-29T13:19:57.243Z |
| cve-2025-40069 | N/A | drm/msm: Fix obj leak in VM_BIND error path |
Linux |
Linux |
2025-10-28T11:48:38.232Z | 2025-10-28T11:48:38.232Z |
| cve-2025-40068 | N/A | fs: ntfs3: Fix integer overflow in run_unpack() |
Linux |
Linux |
2025-10-28T11:48:37.636Z | 2025-10-28T11:48:37.636Z |
| cve-2025-40067 | N/A | fs/ntfs3: reject index allocation if $BITMAP is empty … |
Linux |
Linux |
2025-10-28T11:48:37.034Z | 2025-10-28T11:48:37.034Z |
| cve-2025-40066 | N/A | wifi: mt76: mt7996: Check phy before init msta_link in… |
Linux |
Linux |
2025-10-28T11:48:36.438Z | 2025-10-28T11:48:36.438Z |
| cve-2025-40065 | N/A | RISC-V: KVM: Write hgatp register with valid mode bits |
Linux |
Linux |
2025-10-28T11:48:35.785Z | 2025-10-28T11:48:35.785Z |
| cve-2025-40064 | N/A | smc: Fix use-after-free in __pnet_find_base_ndev(). |
Linux |
Linux |
2025-10-28T11:48:35.155Z | 2025-10-28T11:48:35.155Z |
| cve-2025-40063 | N/A | crypto: comp - Use same definition of context alloc an… |
Linux |
Linux |
2025-10-28T11:48:34.549Z | 2025-10-28T11:48:34.549Z |
| cve-2025-40062 | N/A | crypto: hisilicon/qm - set NULL to qm->debug.qm_diff_regs |
Linux |
Linux |
2025-10-28T11:48:33.961Z | 2025-10-28T11:48:33.961Z |
| cve-2025-40061 | N/A | RDMA/rxe: Fix race in do_task() when draining |
Linux |
Linux |
2025-10-28T11:48:33.361Z | 2025-10-28T11:48:33.361Z |
| cve-2025-40060 | N/A | coresight: trbe: Return NULL pointer for allocation failures |
Linux |
Linux |
2025-10-28T11:48:32.775Z | 2025-10-28T11:48:32.775Z |
| cve-2025-40059 | N/A | coresight: Fix incorrect handling for return value of … |
Linux |
Linux |
2025-10-28T11:48:32.186Z | 2025-10-28T11:48:32.186Z |
| cve-2025-40058 | N/A | iommu/vt-d: Disallow dirty tracking if incoherent page walk |
Linux |
Linux |
2025-10-28T11:48:31.567Z | 2025-10-28T11:48:31.567Z |
| cve-2025-40057 | N/A | ptp: Add a upper bound on max_vclocks |
Linux |
Linux |
2025-10-28T11:48:30.947Z | 2025-10-28T11:48:30.947Z |
| cve-2025-40056 | N/A | vhost: vringh: Fix copy_to_iter return value check |
Linux |
Linux |
2025-10-28T11:48:30.249Z | 2025-10-28T11:48:30.249Z |
| cve-2025-40055 | N/A | ocfs2: fix double free in user_cluster_connect() |
Linux |
Linux |
2025-10-28T11:48:29.665Z | 2025-10-29T13:19:55.237Z |
| cve-2025-40054 | N/A | f2fs: fix UAF issue in f2fs_merge_page_bio() |
Linux |
Linux |
2025-10-28T11:48:29.073Z | 2025-10-28T11:48:29.073Z |
| cve-2025-40053 | N/A | net: dlink: handle copy_thresh allocation failure |
Linux |
Linux |
2025-10-28T11:48:28.444Z | 2025-10-29T13:19:52.908Z |
| cve-2025-40052 | N/A | smb: client: fix crypto buffers in non-linear memory |
Linux |
Linux |
2025-10-28T11:48:27.854Z | 2025-10-28T11:48:27.854Z |
| cve-2025-40051 | N/A | vhost: vringh: Modify the return value check |
Linux |
Linux |
2025-10-28T11:48:27.279Z | 2025-10-28T11:48:27.279Z |
| cve-2025-40050 | N/A | bpf: Skip scalar adjustment for BPF_NEG if dst is a pointer |
Linux |
Linux |
2025-10-28T11:48:26.654Z | 2025-10-28T11:48:26.654Z |
| cve-2025-40049 | N/A | Squashfs: fix uninit-value in squashfs_get_parent |
Linux |
Linux |
2025-10-28T11:48:25.862Z | 2025-10-29T13:19:50.179Z |
| cve-2025-40048 | N/A | uio_hv_generic: Let userspace take care of interrupt mask |
Linux |
Linux |
2025-10-28T11:48:25.220Z | 2025-10-29T13:19:47.795Z |
| cve-2025-40047 | N/A | io_uring/waitid: always prune wait queue entry in io_w… |
Linux |
Linux |
2025-10-28T11:48:24.625Z | 2025-10-28T11:48:24.625Z |
| cve-2025-40046 | N/A | io_uring/zcrx: fix overshooting recv limit |
Linux |
Linux |
2025-10-28T11:48:24.022Z | 2025-10-28T11:48:24.022Z |
| cve-2025-40045 | N/A | ASoC: codecs: wcd937x: set the comp soundwire port correctly |
Linux |
Linux |
2025-10-28T11:48:23.431Z | 2025-10-28T11:48:23.431Z |
| cve-2025-40044 | N/A | fs: udf: fix OOB read in lengthAllocDescs handling |
Linux |
Linux |
2025-10-28T11:48:22.827Z | 2025-10-29T13:19:45.879Z |
| cve-2025-40043 | N/A | net: nfc: nci: Add parameter validation for packet data |
Linux |
Linux |
2025-10-28T11:48:22.230Z | 2025-10-28T11:48:22.230Z |
| cve-2025-40042 | N/A | tracing: Fix race condition in kprobe initialization c… |
Linux |
Linux |
2025-10-28T11:48:21.638Z | 2025-10-29T13:19:43.590Z |
| cve-2025-40041 | N/A | LoongArch: BPF: Sign-extend struct ops return values p… |
Linux |
Linux |
2025-10-28T11:48:21.021Z | 2025-10-28T11:48:21.021Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2025-12424 | 10 (v4.0) | Privilege Escalation through SUID-bit Binary |
Azure Access Technology |
BLU-IC2 |
2025-10-28T18:18:47.127Z | 2025-10-28T19:10:07.120Z |
| cve-2025-12423 | 10 (v4.0) | Denial of Service - Protocol Manipulation |
Azure Access Technology |
BLU-IC2 |
2025-10-28T18:14:57.727Z | 2025-10-28T19:09:14.374Z |
| cve-2025-61080 | N/A | A reflected Cross-Site Scripting (XSS) vulnerabil… |
n/a |
n/a |
2025-10-28T00:00:00.000Z | 2025-10-28T20:03:28.315Z |
| cve-2025-60805 | N/A | An issue was discovered in BESSystem BES Applicat… |
n/a |
n/a |
2025-10-28T00:00:00.000Z | 2025-10-29T17:29:47.277Z |
| cve-2025-60800 | N/A | Incorrect access control in the /jshERP-boot/user… |
n/a |
n/a |
2025-10-28T00:00:00.000Z | 2025-10-29T17:32:48.200Z |
| cve-2025-60355 | N/A | zhangyd-c OneBlog before 2.3.9 was vulnerable to … |
n/a |
n/a |
2025-10-28T00:00:00.000Z | 2025-10-29T13:59:43.618Z |
| cve-2025-60354 | N/A | Unauthorized modification of arbitrary articles v… |
n/a |
n/a |
2025-10-28T00:00:00.000Z | 2025-10-29T14:56:23.126Z |
| cve-2025-12422 | 10 (v4.0) | Vulnerable Upgrade Feature (Arbitrary File Write) |
Azure Access Technology |
BLU-IC2 |
2025-10-28T18:09:39.841Z | 2025-10-28T19:09:39.496Z |
| cve-2025-54605 | N/A | Bitcoin Core through 29.0 allows Uncontrolled Res… |
n/a |
n/a |
2025-10-28T00:00:00.000Z | 2025-10-29T14:06:18.939Z |
| cve-2025-54604 | N/A | Bitcoin Core through 29.0 allows Uncontrolled Res… |
n/a |
n/a |
2025-10-28T00:00:00.000Z | 2025-10-29T14:08:44.399Z |
| cve-2025-61155 | N/A | Hotta Studio GameDriverX64.sys 7.23.4.7, a signed… |
n/a |
n/a |
2025-10-28T00:00:00.000Z | 2025-10-29T14:21:55.893Z |
| cve-2025-60858 | N/A | Reolink Video Doorbell Wi-Fi DB_566128M5MP_W stor… |
n/a |
n/a |
2025-10-28T00:00:00.000Z | 2025-10-29T14:23:48.691Z |
| cve-2025-60349 | N/A | An issue was discovered in Prevx v3.0.5.220 allow… |
n/a |
n/a |
2025-10-28T00:00:00.000Z | 2025-10-29T14:20:06.640Z |
| cve-2025-56399 | N/A | alexusmai laravel-file-manager 3.3.1 and before a… |
n/a |
n/a |
2025-10-28T00:00:00.000Z | 2025-10-29T14:17:01.200Z |
| cve-2025-36386 | 9.8 (v3.1) | There is a vulnerability in the IBM Maximo Manage appl… |
IBM |
IBM Maximo Application Suite |
2025-10-28T15:56:58.740Z | 2025-10-28T16:57:09.538Z |
| cve-2025-34294 | 7.1 (v4.0) | Wazuh File Integrity Monitoring (FIM) & Active Respons… |
Wazuh, Inc. |
Wazuh |
2025-10-28T15:48:15.981Z | 2025-10-28T18:21:22.793Z |
| cve-2025-61128 | N/A | Stack-based buffer overflow vulnerability in WAVL… |
n/a |
n/a |
2025-10-28T00:00:00.000Z | 2025-10-29T14:14:00.899Z |
| cve-2025-61107 | N/A | FRRouting/frr from v4.0 through v10.4.1 was disco… |
n/a |
n/a |
2025-10-28T00:00:00.000Z | 2025-10-28T17:13:29.381Z |
| cve-2025-61106 | N/A | FRRouting/frr from v4.0 through v10.4.1 was disco… |
n/a |
n/a |
2025-10-28T00:00:00.000Z | 2025-10-28T17:12:10.302Z |
| cve-2025-61104 | N/A | FRRouting/frr from v4.0 through v10.4.1 was disco… |
n/a |
n/a |
2025-10-28T00:00:00.000Z | 2025-10-28T17:11:41.827Z |
| cve-2025-61103 | N/A | FRRouting/frr from v4.0 through v10.4.1 was disco… |
n/a |
n/a |
2025-10-28T00:00:00.000Z | 2025-10-28T17:11:14.470Z |
| cve-2025-61043 | N/A | An out-of-bounds read vulnerability has been disc… |
n/a |
n/a |
2025-10-28T00:00:00.000Z | 2025-10-29T14:11:14.694Z |
| cve-2025-36085 | 5.4 (v3.1) | Multiple Vulnerabilities in IBM Concert Software. |
IBM |
Concert |
2025-10-28T14:58:30.727Z | 2025-10-28T15:19:13.749Z |
| cve-2025-36083 | 6.2 (v3.1) | Multiple Vulnerabilities in IBM Concert Software. |
IBM |
Concert Software |
2025-10-28T14:55:35.813Z | 2025-10-28T15:20:05.847Z |
| cve-2025-36081 | 5.3 (v3.1) | Multiple Vulnerabilities in IBM Concert Software. |
IBM |
Concert Software |
2025-10-28T14:53:10.782Z | 2025-10-28T15:23:20.773Z |
| cve-2025-34318 | 5.1 (v4.0) | IPFire < v2.29 Stored XSS via DNS Creation (proxy.cgi) |
IPFire.org |
IPFire |
2025-10-28T14:36:19.112Z | 2025-10-28T15:19:18.537Z |
| cve-2025-34317 | 5.1 (v4.0) | IPFire < v2.29 Stored XSS via DNS Creation (dns.cgi) |
IPFire.org |
IPFire |
2025-10-28T14:36:00.558Z | 2025-10-28T15:19:29.398Z |
| cve-2025-34316 | 5.1 (v4.0) | IPFire < v2.29 Stored XSS via Mail Server Settings |
IPFire.org |
IPFire |
2025-10-28T14:34:54.739Z | 2025-10-29T18:07:01.018Z |
| cve-2025-34315 | 5.1 (v4.0) | IPFire < v2.29 Stored XSS via Remote Syslog Server Address |
IPFire.org |
IPFire |
2025-10-28T14:33:54.312Z | 2025-10-29T18:13:29.333Z |
| cve-2025-34314 | 5.1 (v4.0) | IPFire < v2.29 Stored XSS via Time Constraint Rule URL… |
IPFire.org |
IPFire |
2025-10-28T14:33:09.667Z | 2025-10-29T18:26:57.565Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-188161 | Malicious code in mysql-heka-version-saturnology (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-188160 | Malicious code in mysql-fork-pavo-firebase (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-188159 | Malicious code in mysql-enceladus-cressida-whitedwarf (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-188158 | Malicious code in mysql-cassini-unuk-middleware (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-188157 | Malicious code in mutation-telesto-cybernetics-library (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-188156 | Malicious code in mutation-promise-xenon-fermion (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-188155 | Malicious code in mutation-local-archaeoastronomy-auth (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-188154 | Malicious code in mutation-exec-arcturus-gulp (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-188153 | Malicious code in mutation-dotenv-leda-crust (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-188152 | Malicious code in mutation-docusaurus-scorpius-centauri (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-188151 | Malicious code in mutation-cladistics-graviton-upgrade (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-188150 | Malicious code in mutation-augmentedreality-archaeoastronomy-neutronstar (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-188149 | Malicious code in multiverse-terser-webpack-plugin-vulcan-redgiant (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-188148 | Malicious code in multiverse-perseus-ignite-ceres (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-188147 | Malicious code in multiverse-pavo-dependencies-enif (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-188146 | Malicious code in multiverse-jsonp-mdx-commitlint-config-angular (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-188145 | Malicious code in multiverse-carina-boson-fusion (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-188144 | Malicious code in mui-xerxes-proxima-cassini (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-188143 | Malicious code in mui-reveal-md-registry-yaml (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-188142 | Malicious code in mui-norma-callisto-terser-webpack-plugin (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-188141 | Malicious code in mui-neutrino-nestjs-stratigraphy (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-188140 | Malicious code in mui-meissa-technosignature-wasat (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-188139 | Malicious code in mui-meissa-subscription-event (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-188138 | Malicious code in mui-delphinus-castor-magnetosphere (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-188137 | Malicious code in mui-cluster-antares-nucleosynthesis (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-188136 | Malicious code in mui-auth-betelgeuse-xo (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-188135 | Malicious code in mui-asthenosphere-callback-webdriver-manager (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-188134 | Malicious code in mu-slow-star-promise-eta (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-188133 | Malicious code in mu-mu-psi-zero-java (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| mal-2025-188132 | Malicious code in mu-kernel-phi-transpile-node (npm) | 2025-11-13T03:23:14Z | 2025-11-13T03:23:14Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:3066 | Red Hat Security Advisory: OpenShift Container Platform 4.18.6 bug fix and security update | 2025-03-25T06:59:06+00:00 | 2025-11-15T14:36:37+00:00 |
| rhsa-2025:3128 | Red Hat Security Advisory: kernel security update | 2025-03-25T00:18:11+00:00 | 2025-11-11T16:17:45+00:00 |
| rhsa-2025:3127 | Red Hat Security Advisory: kernel-rt security update | 2025-03-25T00:09:56+00:00 | 2025-11-11T16:17:45+00:00 |
| rhsa-2025:3124 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Container Release Update | 2025-03-24T23:57:44+00:00 | 2025-11-13T17:26:54+00:00 |
| rhsa-2025:3123 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update | 2025-03-24T17:53:25+00:00 | 2025-11-13T17:26:50+00:00 |
| rhsa-2025:3113 | Red Hat Security Advisory: fence-agents security update | 2025-03-24T14:13:20+00:00 | 2025-11-13T17:26:50+00:00 |
| rhsa-2025:3107 | Red Hat Security Advisory: libxslt security update | 2025-03-24T14:10:00+00:00 | 2025-11-15T00:14:00+00:00 |
| rhsa-2025:3112 | Red Hat Security Advisory: kpatch-patch-5_14_0-70_112_1, kpatch-patch-5_14_0-70_121_1, kpatch-patch-5_14_0-70_124_1, and kpatch-patch-5_14_0-70_85_1 security update | 2025-03-24T13:41:24+00:00 | 2025-11-15T00:13:58+00:00 |
| rhsa-2025:3111 | Red Hat Security Advisory: fence-agents security update | 2025-03-24T10:53:59+00:00 | 2025-11-13T17:26:54+00:00 |
| rhsa-2025:3108 | Red Hat Security Advisory: pcs security update | 2025-03-24T10:39:40+00:00 | 2025-11-06T22:35:45+00:00 |
| rhsa-2025:3109 | Red Hat Security Advisory: pcs security update | 2025-03-24T10:39:04+00:00 | 2025-11-06T22:35:43+00:00 |
| rhsa-2025:3094 | Red Hat Security Advisory: kpatch-patch-4_18_0-477_43_1, kpatch-patch-4_18_0-477_67_1, kpatch-patch-4_18_0-477_81_1, and kpatch-patch-4_18_0-477_89_1 security update | 2025-03-20T19:23:02+00:00 | 2025-11-08T07:13:39+00:00 |
| rhsa-2025:3097 | Red Hat Security Advisory: kpatch-patch-5_14_0-427_13_1, kpatch-patch-5_14_0-427_31_1, kpatch-patch-5_14_0-427_44_1, and kpatch-patch-5_14_0-427_55_1 security update | 2025-03-20T19:22:44+00:00 | 2025-11-15T00:13:59+00:00 |
| rhsa-2025:3096 | Red Hat Security Advisory: kpatch-patch-5_14_0-284_104_1, kpatch-patch-5_14_0-284_52_1, kpatch-patch-5_14_0-284_79_1, and kpatch-patch-5_14_0-284_92_1 security update | 2025-03-20T19:21:07+00:00 | 2025-11-15T00:13:58+00:00 |
| rhsa-2025:3095 | Red Hat Security Advisory: kpatch-patch-4_18_0-372_118_1, kpatch-patch-4_18_0-372_131_1, kpatch-patch-4_18_0-372_137_1, and kpatch-patch-4_18_0-372_91_1 security update | 2025-03-20T19:19:32+00:00 | 2025-11-08T07:13:36+00:00 |
| rhsa-2025:3093 | Red Hat Security Advisory: kpatch-patch-4_18_0-305_120_1, kpatch-patch-4_18_0-305_138_1, kpatch-patch-4_18_0-305_145_1, and kpatch-patch-4_18_0-305_150_1 security update | 2025-03-20T19:17:27+00:00 | 2025-11-08T07:13:34+00:00 |
| rhsa-2025:3091 | Red Hat Security Advisory: Red Hat Build of Apache Camel 4.8 for Quarkus 3.15 update is now available (RHBQ 3.15.3.SP2) | 2025-03-20T15:47:58+00:00 | 2025-11-11T16:17:58+00:00 |
| rhsa-2025:3082 | Red Hat Security Advisory: postgresql:12 security update | 2025-03-20T15:02:06+00:00 | 2025-10-27T20:14:02+00:00 |
| rhsa-2025:3069 | Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.14.3 security update | 2025-03-20T08:37:59+00:00 | 2025-11-15T08:45:09+00:00 |
| rhsa-2025:3064 | Red Hat Security Advisory: postgresql:12 security update | 2025-03-20T07:53:21+00:00 | 2025-10-27T20:14:02+00:00 |
| rhsa-2025:3063 | Red Hat Security Advisory: postgresql:12 security update | 2025-03-20T07:34:00+00:00 | 2025-10-27T20:14:06+00:00 |
| rhsa-2025:3062 | Red Hat Security Advisory: postgresql:12 security update | 2025-03-20T07:28:55+00:00 | 2025-10-27T20:14:01+00:00 |
| rhsa-2025:3053 | Red Hat Security Advisory: Gatekeeper v3.15.4 | 2025-03-20T04:55:47+00:00 | 2025-11-15T14:36:33+00:00 |
| rhsa-2025:3052 | Red Hat Security Advisory: Gatekeeper v3.18.0 | 2025-03-20T04:53:19+00:00 | 2025-11-15T08:45:08+00:00 |
| rhsa-2025:3050 | Red Hat Security Advisory: postgresql:12 security update | 2025-03-20T04:40:30+00:00 | 2025-10-27T20:14:00+00:00 |
| rhsa-2025:3051 | Red Hat Security Advisory: Gatekeeper v3.17.2 | 2025-03-20T04:38:00+00:00 | 2025-11-15T08:45:07+00:00 |
| rhsa-2025:2700 | Red Hat Security Advisory: OpenShift Container Platform 4.13.56 security update | 2025-03-20T01:46:31+00:00 | 2025-11-14T11:39:17+00:00 |
| rhsa-2025:3049 | Red Hat Security Advisory: kpatch-patch-4_18_0-553, kpatch-patch-4_18_0-553_16_1, kpatch-patch-4_18_0-553_30_1, and kpatch-patch-4_18_0-553_40_1 security update | 2025-03-20T01:15:34+00:00 | 2025-11-15T00:13:58+00:00 |
| rhsa-2025:3048 | Red Hat Security Advisory: kpatch-patch-5_14_0-503_15_1 and kpatch-patch-5_14_0-503_26_1 security update | 2025-03-20T01:12:54+00:00 | 2025-11-15T00:13:59+00:00 |
| rhsa-2025:2710 | Red Hat Security Advisory: OpenShift Container Platform 4.14.49 bug fix and security update | 2025-03-19T20:54:49+00:00 | 2025-11-15T08:45:06+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2024-50272 | filemap: Fix bounds checking in filemap_read() | 2024-11-02T00:00:00.000Z | 2025-01-29T00:00:00.000Z |
| msrc_cve-2024-50271 | signal: restore the override_rlimit logic | 2024-11-02T00:00:00.000Z | 2025-01-29T00:00:00.000Z |
| msrc_cve-2024-50269 | usb: musb: sunxi: Fix accessing an released usb phy | 2024-11-02T00:00:00.000Z | 2025-01-29T00:00:00.000Z |
| msrc_cve-2024-50268 | usb: typec: fix potential out of bounds in ucsi_ccg_update_set_new_cam_cmd() | 2024-11-02T00:00:00.000Z | 2025-01-29T00:00:00.000Z |
| msrc_cve-2024-50267 | USB: serial: io_edgeport: fix use after free in debug printk | 2024-11-02T00:00:00.000Z | 2025-01-29T00:00:00.000Z |
| msrc_cve-2024-50265 | ocfs2: remove entry once instead of null-ptr-dereference in ocfs2_xa_remove() | 2024-11-02T00:00:00.000Z | 2025-01-29T00:00:00.000Z |
| msrc_cve-2024-50264 | vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans | 2024-11-02T00:00:00.000Z | 2025-01-29T00:00:00.000Z |
| msrc_cve-2024-50262 | bpf: Fix out-of-bounds write in trie_get_next_key() | 2024-11-02T00:00:00.000Z | 2025-01-29T00:00:00.000Z |
| msrc_cve-2024-50261 | macsec: Fix use-after-free while sending the offloading packet | 2024-11-02T00:00:00.000Z | 2025-01-29T00:00:00.000Z |
| msrc_cve-2024-50259 | netdevsim: Add trailing zero to terminate the string in nsim_nexthop_bucket_activity_write() | 2024-11-02T00:00:00.000Z | 2025-01-29T00:00:00.000Z |
| msrc_cve-2024-50258 | net: fix crash when config small gso_max_size/gso_ipv4_max_size | 2024-11-02T00:00:00.000Z | 2025-01-29T00:00:00.000Z |
| msrc_cve-2024-50257 | netfilter: Fix use-after-free in get_info() | 2024-11-02T00:00:00.000Z | 2025-01-29T00:00:00.000Z |
| msrc_cve-2024-50256 | netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6() | 2024-11-02T00:00:00.000Z | 2025-01-29T00:00:00.000Z |
| msrc_cve-2024-50255 | Bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs | 2024-11-02T00:00:00.000Z | 2025-01-29T00:00:00.000Z |
| msrc_cve-2024-50252 | mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address | 2024-11-02T00:00:00.000Z | 2025-01-29T00:00:00.000Z |
| msrc_cve-2024-50251 | netfilter: nft_payload: sanitize offset and length before calling skb_checksum() | 2024-11-02T00:00:00.000Z | 2025-01-29T00:00:00.000Z |
| msrc_cve-2024-50250 | fsdax: dax_unshare_iter needs to copy entire blocks | 2024-11-02T00:00:00.000Z | 2025-01-29T00:00:00.000Z |
| msrc_cve-2024-50249 | ACPI: CPPC: Make rmw_lock a raw_spin_lock | 2024-11-02T00:00:00.000Z | 2025-01-29T00:00:00.000Z |
| msrc_cve-2024-50248 | ntfs3: Add bounds checking to mi_enum_attr() | 2024-11-02T00:00:00.000Z | 2025-01-29T00:00:00.000Z |
| msrc_cve-2024-50247 | fs/ntfs3: Check if more than chunk-size bytes are written | 2024-11-02T00:00:00.000Z | 2025-01-29T00:00:00.000Z |
| msrc_cve-2024-50246 | fs/ntfs3: Add rough attr alloc_size check | 2024-11-02T00:00:00.000Z | 2025-01-29T00:00:00.000Z |
| msrc_cve-2024-50245 | fs/ntfs3: Fix possible deadlock in mi_read | 2024-11-02T00:00:00.000Z | 2025-01-29T00:00:00.000Z |
| msrc_cve-2024-50244 | fs/ntfs3: Additional check in ni_clear() | 2024-11-02T00:00:00.000Z | 2025-01-29T00:00:00.000Z |
| msrc_cve-2024-50243 | fs/ntfs3: Fix general protection fault in run_is_mapped_full | 2024-11-02T00:00:00.000Z | 2025-01-29T00:00:00.000Z |
| msrc_cve-2024-50242 | fs/ntfs3: Additional check in ntfs_file_release | 2024-11-02T00:00:00.000Z | 2025-01-29T00:00:00.000Z |
| msrc_cve-2024-50240 | phy: qcom: qmp-usb: fix NULL-deref on runtime suspend | 2024-11-02T00:00:00.000Z | 2025-01-29T00:00:00.000Z |
| msrc_cve-2024-50239 | phy: qcom: qmp-usb-legacy: fix NULL-deref on runtime suspend | 2024-11-02T00:00:00.000Z | 2025-01-29T00:00:00.000Z |
| msrc_cve-2024-50237 | wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower | 2024-11-02T00:00:00.000Z | 2025-01-29T00:00:00.000Z |
| msrc_cve-2024-50236 | wifi: ath10k: Fix memory leak in management tx | 2024-11-02T00:00:00.000Z | 2025-01-29T00:00:00.000Z |
| msrc_cve-2024-50235 | wifi: cfg80211: clear wdev->cqm_config pointer on free | 2024-11-02T00:00:00.000Z | 2025-01-29T00:00:00.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2012-000035 | Multiple JustSystems products vulnerable to buffer overflow | 2012-04-24T13:37+09:00 | 2012-05-09T19:49+09:00 |
| jvndb-2012-000034 | Multiple JustSystems products may insecurely load dynamic libraries | 2012-04-24T13:36+09:00 | 2012-04-24T13:36+09:00 |
| jvndb-2012-000033 | TwitRocker2 (Android version) vulnerable in the WebView class | 2012-04-20T12:21+09:00 | 2012-04-20T12:21+09:00 |
| jvndb-2012-000031 | ActiveScriptRuby vulnerable to arbitrary Ruby script execution | 2012-04-13T14:08+09:00 | 2012-04-13T14:08+09:00 |
| jvndb-2012-000032 | Dokodemo Rikunabi 2013 vulnerable to cross-site scripting | 2012-04-13T14:03+09:00 | 2012-04-13T14:03+09:00 |
| jvndb-2012-001932 | Vulnerability in Fujitsu Interstage List Works Where Permissions Cannot Be Denied | 2012-04-11T11:45+09:00 | 2012-04-11T11:45+09:00 |
| jvndb-2012-000030 | SENCHA SNS vulnerable to session fixation | 2012-04-05T16:41+09:00 | 2012-04-05T16:41+09:00 |
| jvndb-2012-000029 | SENCHA SNS vulnerable to cross-site request forgery | 2012-04-05T16:41+09:00 | 2012-04-05T16:41+09:00 |
| jvndb-2012-000028 | TOSHIBA TEC e-Studio series vulnerable to authentication bypass | 2012-04-05T16:40+09:00 | 2012-04-05T16:40+09:00 |
| jvndb-2012-000027 | Janetter vulnerable to cross-site request forgery | 2012-03-19T14:31+09:00 | 2012-03-19T14:31+09:00 |
| jvndb-2012-000026 | Janetter vulnerable to information disclosure | 2012-03-19T14:27+09:00 | 2012-03-19T14:27+09:00 |
| jvndb-2012-001793 | JP1/Cm2/Network Node Manager i Denial of Service (DoS) Vulnerability | 2012-03-19T12:04+09:00 | 2012-03-19T12:04+09:00 |
| jvndb-2012-000025 | Redmine vulnerable to cross-site scripting | 2012-03-13T13:39+09:00 | 2012-03-13T13:39+09:00 |
| jvndb-2012-000024 | twicca fails to restrict access permissions | 2012-03-13T13:36+09:00 | 2012-03-13T13:36+09:00 |
| jvndb-2012-000023 | Jenkins vulnerable to cross-site scripting | 2012-03-09T14:35+09:00 | 2012-03-09T14:35+09:00 |
| jvndb-2012-000022 | Jenkins vulnerable to cross-site scripting | 2012-03-09T14:28+09:00 | 2012-03-09T14:28+09:00 |
| jvndb-2012-000021 | SquirrelMail plugin Autocomplete vulnerable to cross-site scripting | 2012-03-09T14:18+09:00 | 2012-03-09T14:18+09:00 |
| jvndb-2012-000020 | ES File Explorer fails to restrict access permissions | 2012-03-05T15:50+09:00 | 2012-03-05T15:50+09:00 |
| jvndb-2012-000019 | Kingsoft Internet Security 2011 vulnerable to denial-of-service | 2012-03-01T14:03+09:00 | 2012-03-01T14:03+09:00 |
| jvndb-2012-000018 | Movable Type vulnerable to session hijacking | 2012-02-23T14:28+09:00 | 2012-02-23T14:28+09:00 |
| jvndb-2012-000017 | Movable Type vulnerable to OS command injection | 2012-02-23T14:21+09:00 | 2012-02-23T14:21+09:00 |
| jvndb-2012-000016 | Movable Type vulnerable to cross-site scripting | 2012-02-23T14:20+09:00 | 2012-02-23T14:20+09:00 |
| jvndb-2012-000015 | Movable Type vulnerable to cross-site request forgery | 2012-02-23T14:19+09:00 | 2012-02-23T14:19+09:00 |
| jvndb-2012-000014 | Multiple COOKPAD applications for Android vulnerable in WebView class | 2012-02-22T14:44+09:00 | 2012-02-29T10:56+09:00 |
| jvndb-2012-000013 | cforms II vulnerable to cross-site scripting | 2012-02-15T17:14+09:00 | 2012-02-15T17:14+09:00 |
| jvndb-2012-000011 | ALFTP may insecurely load executable files | 2012-02-13T15:58+09:00 | 2012-02-13T15:58+09:00 |
| jvndb-2012-000012 | Apache Struts 2 vulnerable to an arbitrary Java method execution | 2012-02-10T14:29+09:00 | 2012-02-10T14:29+09:00 |
| jvndb-2012-000010 | Pocket WiFi (GP02) vulnerable to cross-site request forgery | 2012-02-01T14:12+09:00 | 2012-02-01T14:12+09:00 |
| jvndb-2012-001191 | Arbitrary Code Execution Vulnerability in Hitachi COBOL2002 | 2012-01-27T10:44+09:00 | 2012-01-27T10:44+09:00 |
| jvndb-2012-001190 | Hitachi IT Operations Director Cross-Site Scripting Vulnerability | 2012-01-27T10:38+09:00 | 2012-01-27T10:38+09:00 |
| ID | Description | Updated |
|---|