Recent vulnerabilities
| ID | Description | Published | Updated |
|---|---|---|---|
| ghsa-8rxx-f9pw-chh2 | A maliciously crafted file, when executed on the victim's machine, can lead to privilege escalation… | 2025-11-06T18:32:57Z | 2025-11-06T18:32:57Z |
| ghsa-878r-8w43-p6c6 | Improper access control in Devolutions Server 2025.3.5.0 and earlier allows a View-only user to ret… | 2025-11-06T18:32:57Z | 2025-11-07T15:31:29Z |
| ghsa-699q-v8cp-38m8 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-11-06T18:32:57Z | 2025-11-06T18:32:57Z |
| ghsa-63mf-v9cc-6mhm | The default configuration of WatchGuard Firebox devices through 2025-09-10 allows administrative ac… | 2025-11-06T18:32:57Z | 2025-11-07T15:31:29Z |
| ghsa-5wq3-37q6-mmxx | Unrestricted Upload of File with Dangerous Type vulnerability in KingAddons.com King Addons for Ele… | 2025-11-06T18:32:57Z | 2025-11-06T18:32:57Z |
| ghsa-528v-jh77-whhw | Incorrect Privilege Assignment vulnerability in KingAddons.com King Addons for Elementor king-addon… | 2025-11-06T18:32:57Z | 2025-11-06T18:32:57Z |
| ghsa-4c24-2mrg-x84r | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-11-06T18:32:57Z | 2025-11-06T18:32:57Z |
| ghsa-3g4p-m6j4-fxhj | An issue in KiloView Dual Channel 4k HDMI & 3G-SDI HEVC Video Encoder Firmware v.1.20.0006 allows a… | 2025-11-06T18:32:57Z | 2025-11-06T18:32:57Z |
| ghsa-2r25-g38v-g635 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-11-06T18:32:57Z | 2025-11-06T18:32:57Z |
| ghsa-262v-cvcm-vwc2 | Missing Authorization vulnerability in anibalwainstein Effect Maker effect-maker allows Exploiting … | 2025-11-06T18:32:57Z | 2025-11-06T18:32:57Z |
| ghsa-xhf8-58fx-m7x8 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-11-06T18:32:56Z | 2025-11-06T21:31:28Z |
| ghsa-x2hr-gg7q-66w5 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-11-06T18:32:56Z | 2025-11-06T18:32:57Z |
| ghsa-wq8h-vpfm-4frm | Missing Authorization vulnerability in ThemeNectar Salient salient.This issue affects Salient: from… | 2025-11-06T18:32:56Z | 2025-11-06T18:32:56Z |
| ghsa-w747-9m2v-9c7f | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-11-06T18:32:56Z | 2025-11-07T00:30:29Z |
| ghsa-vxvc-rrx4-6472 | Missing Authorization vulnerability in uxper Togo togo.This issue affects Togo: from n/a through < 1.0.4. | 2025-11-06T18:32:56Z | 2025-11-06T21:31:28Z |
| ghsa-v2pc-r36h-f9fx | Authentication Bypass Using an Alternate Path or Channel vulnerability in Elated-Themes Search & Go… | 2025-11-06T18:32:56Z | 2025-11-06T18:32:57Z |
| ghsa-q785-f6ff-vwgw | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-11-06T18:32:56Z | 2025-11-07T15:31:29Z |
| ghsa-q6gw-m89w-g24c | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-11-06T18:32:56Z | 2025-11-07T15:31:29Z |
| ghsa-q2x7-75gc-3j8r | Deserialization of Untrusted Data vulnerability in uxper Togo togo.This issue affects Togo: from n/… | 2025-11-06T18:32:56Z | 2025-11-06T21:31:28Z |
| ghsa-pmvv-fv86-573g | Incorrect Privilege Assignment vulnerability in uxper Togo togo.This issue affects Togo: from n/a t… | 2025-11-06T18:32:56Z | 2025-11-07T15:31:29Z |
| ghsa-pfgw-2cm5-3rc9 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-11-06T18:32:56Z | 2025-11-06T21:31:27Z |
| ghsa-p9fc-5f3m-4xpv | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-11-06T18:32:56Z | 2025-11-06T21:31:27Z |
| ghsa-mwmx-44g6-hhx9 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-11-06T18:32:56Z | 2025-11-07T00:30:29Z |
| ghsa-j9gp-4v9p-jmv2 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-11-06T18:32:56Z | 2025-11-06T21:31:28Z |
| ghsa-hghp-rpcc-wp2c | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-11-06T18:32:56Z | 2025-11-06T18:32:57Z |
| ghsa-gx3q-6pr6-g9q4 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-11-06T18:32:56Z | 2025-11-06T21:31:28Z |
| ghsa-ff25-8qm5-3w37 | Missing Authorization vulnerability in CodexThemes TheGem Demo Import (for WPBakery) thegem-importe… | 2025-11-06T18:32:56Z | 2025-11-06T21:31:28Z |
| ghsa-cpr8-jq42-qq4p | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability … | 2025-11-06T18:32:56Z | 2025-11-06T18:32:57Z |
| ghsa-cm3p-rq24-84m2 | Unrestricted Upload of File with Dangerous Type vulnerability in Case-Themes Case Addons case-addon… | 2025-11-06T18:32:56Z | 2025-11-07T00:30:29Z |
| ghsa-cf83-9m7h-2m52 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusi… | 2025-11-06T18:32:56Z | 2025-11-06T18:32:57Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2025-64327 | ThinkDashboard: Blind Server-Side Request Forgery (SSR… |
MatiasDesuu |
ThinkDashboard |
2025-11-06T21:07:17.672Z | 2025-11-06T21:29:15.660Z | |
| cve-2025-64326 | Weblate leaks the IP of project members inviting users… |
WeblateOrg |
weblate |
2025-11-06T20:55:17.594Z | 2025-11-06T21:18:02.834Z | |
| cve-2025-64174 | OpenMage is vulnerable to XSS in Admin Notifications |
OpenMage |
magento-lts |
2025-11-06T20:45:55.915Z | 2025-11-06T21:20:10.817Z | |
| cve-2025-33110 | 5.4 (v3.1) | IBM OpenPages Vulnerable to HTML Injection |
IBM |
OpenPages |
2025-11-06T20:43:16.690Z | 2025-11-06T21:11:53.167Z |
| cve-2025-64173 | Apollo Router Core: Access Control Bypass on Polymorph… |
apollographql |
router |
2025-11-06T20:42:51.785Z | 2025-11-07T13:48:35.506Z | |
| cve-2025-52881 | runc: LSM labels can be bypassed with malicious config… |
opencontainers |
runc |
2025-11-06T20:23:36.237Z | 2025-11-06T21:07:09.382Z | |
| cve-2025-12486 | 8.8 (v3.0) | Heimdall Data Database Proxy Cross-Site Scripting Remo… |
Heimdall Data |
Database Proxy |
2025-11-06T20:12:54.400Z | 2025-11-06T20:26:19.171Z |
| cve-2025-12487 | 9.8 (v3.0) | oobabooga text-generation-webui trust_remote_code Reli… |
oobabooga |
text-generation-webui |
2025-11-06T20:12:07.187Z | 2025-11-06T20:29:38.307Z |
| cve-2025-12488 | 9.8 (v3.0) | oobabooga text-generation-webui trust_remote_code Reli… |
oobabooga |
text-generation-webui |
2025-11-06T20:11:52.136Z | 2025-11-06T20:30:32.724Z |
| cve-2025-12489 | 7.8 (v3.0) | evernote-mcp-server openBrowser Command Injection Priv… |
evernote-mcp-server |
evernote-mcp-server |
2025-11-06T20:11:32.632Z | 2025-11-06T20:43:33.002Z |
| cve-2025-12490 | 8.8 (v3.0) | Netgate pfSense CE Suricata Path Traversal Remote Code… |
Netgate |
pfSense |
2025-11-06T20:10:57.257Z | 2025-11-06T20:44:02.067Z |
| cve-2025-52565 | container escape due to /dev/console mount and related races |
opencontainers |
runc |
2025-11-06T20:02:58.513Z | 2025-11-06T21:32:19.129Z | |
| cve-2022-50590 | 8.8 (v4.0) | SuiteCRM < 7.12.6 Type Confusion via 'deleteAttachment… |
SuiteCRM |
SuiteCRM |
2025-11-06T19:59:36.078Z | 2025-11-06T20:26:09.006Z |
| cve-2022-50589 | 9.3 (v4.0) | SuiteCRM < 7.12.6 SQL Injection via 'export' Functionality |
SuiteCRM |
SuiteCRM |
2025-11-06T19:59:12.520Z | 2025-11-06T20:27:20.421Z |
| cve-2022-50596 | 9.3 (v4.0) | D-Link DIR-1260 <= v1.20B05 GetDeviceSettings Unauthen… |
D-Link |
DIR-1260 |
2025-11-06T19:58:51.704Z | 2025-11-07T15:07:18.977Z |
| cve-2022-50595 | 9.3 (v4.0) | Advantech iView < v5.7.04 Build 6425 ztp_search_value … |
Advantech |
iView |
2025-11-06T19:58:23.068Z | 2025-11-06T20:33:36.519Z |
| cve-2022-50591 | 8.8 (v4.0) | Advantech iView < v5.7.04 Build 6425 ztp_config_id Par… |
Advantech |
iView |
2025-11-06T19:58:06.223Z | 2025-11-06T20:36:15.818Z |
| cve-2022-50593 | 9.3 (v4.0) | Advantech iView < v5.7.04 Build 6425 search_term Param… |
Advantech |
iView |
2025-11-06T19:57:44.271Z | 2025-11-06T21:02:21.355Z |
| cve-2022-50592 | 9.3 (v4.0) | Advantech iView < v5.7.04 Build 6425 getInventoryRepor… |
Advantech |
iView |
2025-11-06T19:57:20.528Z | 2025-11-06T21:07:38.762Z |
| cve-2022-50594 | 8.8 (v4.0) | Advantech iView < v5.7.04 Build 6425 data Parameter SQ… |
Advantech |
iView |
2025-11-06T19:57:00.425Z | 2025-11-06T21:10:30.978Z |
| cve-2025-34247 | 5.1 (v4.0) | Advantech WebAccess/VPN < 1.1.5 SQL Injection via Netw… |
Advantech |
WebAccess/VPN |
2025-11-06T19:49:37.330Z | 2025-11-06T20:05:51.848Z |
| cve-2025-34246 | 5.3 (v4.0) | Advantech WebAccess/VPN < 1.1.5 SQL Injection via Ajax… |
Advantech |
WebAccess/VPN |
2025-11-06T19:49:01.611Z | 2025-11-06T20:06:14.132Z |
| cve-2025-34245 | 5.3 (v4.0) | Advantech WebAccess/VPN < 1.1.5 SQL Injection via Ajax… |
Advantech |
WebAccess/VPN |
2025-11-06T19:48:21.189Z | 2025-11-06T20:06:33.433Z |
| cve-2025-34244 | 5.3 (v4.0) | Advantech WebAccess/VPN < 1.1.5 SQL Injection via Ajax… |
Advantech |
WebAccess/VPN |
2025-11-06T19:47:41.796Z | 2025-11-06T20:06:52.567Z |
| cve-2025-34243 | 5.3 (v4.0) | Advantech WebAccess/VPN < 1.1.5 SQL Injection via Ajax… |
Advantech |
WebAccess/VPN |
2025-11-06T19:47:04.733Z | 2025-11-06T20:07:10.296Z |
| cve-2025-34242 | 8.6 (v4.0) | Advantech WebAccess/VPN < 1.1.5 SQL Injection via Ajax… |
Advantech |
WebAccess/VPN |
2025-11-06T19:46:20.183Z | 2025-11-06T20:08:14.910Z |
| cve-2025-34241 | 5.3 (v4.0) | Advantech WebAccess/VPN < 1.1.5 SQL Injection via Ajax… |
Advantech |
WebAccess/VPN |
2025-11-06T19:45:39.944Z | 2025-11-06T20:08:33.015Z |
| cve-2025-34240 | 8.6 (v4.0) | Advantech WebAccess/VPN < 1.1.5 SQL Injection via AppM… |
Advantech |
WebAccess/VPN |
2025-11-06T19:45:02.692Z | 2025-11-06T21:01:40.174Z |
| cve-2025-34239 | 8.6 (v4.0) | Advantech WebAccess/VPN < 1.1.5 Command Injection in A… |
Advantech |
WebAccess/VPN |
2025-11-06T19:44:18.796Z | 2025-11-06T20:58:37.711Z |
| cve-2025-34238 | 6.9 (v4.0) | Advantech WebAccess/VPN < 1.1.5 Path Traversal via Aja… |
Advantech |
WebAccess/VPN |
2025-11-06T19:43:35.153Z | 2025-11-06T20:24:02.958Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2025-52881 | runc: LSM labels can be bypassed with malicious config… |
opencontainers |
runc |
2025-11-06T20:23:36.237Z | 2025-11-06T21:07:09.382Z | |
| cve-2025-33110 | 5.4 (v3.1) | IBM OpenPages Vulnerable to HTML Injection |
IBM |
OpenPages |
2025-11-06T20:43:16.690Z | 2025-11-06T21:11:53.167Z |
| cve-2025-12790 | 7.4 (v3.1) | Rubygem-mqtt: rubygem-mqtt hostname validation |
Red Hat |
Red Hat Satellite 6 |
2025-11-06T21:07:34.970Z | 2025-11-08T04:55:19.808Z |
| cve-2025-12489 | 7.8 (v3.0) | evernote-mcp-server openBrowser Command Injection Priv… |
evernote-mcp-server |
evernote-mcp-server |
2025-11-06T20:11:32.632Z | 2025-11-06T20:43:33.002Z |
| cve-2025-12488 | 9.8 (v3.0) | oobabooga text-generation-webui trust_remote_code Reli… |
oobabooga |
text-generation-webui |
2025-11-06T20:11:52.136Z | 2025-11-06T20:30:32.724Z |
| cve-2025-12487 | 9.8 (v3.0) | oobabooga text-generation-webui trust_remote_code Reli… |
oobabooga |
text-generation-webui |
2025-11-06T20:12:07.187Z | 2025-11-06T20:29:38.307Z |
| cve-2025-12486 | 8.8 (v3.0) | Heimdall Data Database Proxy Cross-Site Scripting Remo… |
Heimdall Data |
Database Proxy |
2025-11-06T20:12:54.400Z | 2025-11-06T20:26:19.171Z |
| cve-2025-52565 | container escape due to /dev/console mount and related races |
opencontainers |
runc |
2025-11-06T20:02:58.513Z | 2025-11-06T21:32:19.129Z | |
| cve-2025-34247 | 5.1 (v4.0) | Advantech WebAccess/VPN < 1.1.5 SQL Injection via Netw… |
Advantech |
WebAccess/VPN |
2025-11-06T19:49:37.330Z | 2025-11-06T20:05:51.848Z |
| cve-2025-34246 | 5.3 (v4.0) | Advantech WebAccess/VPN < 1.1.5 SQL Injection via Ajax… |
Advantech |
WebAccess/VPN |
2025-11-06T19:49:01.611Z | 2025-11-06T20:06:14.132Z |
| cve-2025-34245 | 5.3 (v4.0) | Advantech WebAccess/VPN < 1.1.5 SQL Injection via Ajax… |
Advantech |
WebAccess/VPN |
2025-11-06T19:48:21.189Z | 2025-11-06T20:06:33.433Z |
| cve-2025-34244 | 5.3 (v4.0) | Advantech WebAccess/VPN < 1.1.5 SQL Injection via Ajax… |
Advantech |
WebAccess/VPN |
2025-11-06T19:47:41.796Z | 2025-11-06T20:06:52.567Z |
| cve-2025-34243 | 5.3 (v4.0) | Advantech WebAccess/VPN < 1.1.5 SQL Injection via Ajax… |
Advantech |
WebAccess/VPN |
2025-11-06T19:47:04.733Z | 2025-11-06T20:07:10.296Z |
| cve-2025-34242 | 8.6 (v4.0) | Advantech WebAccess/VPN < 1.1.5 SQL Injection via Ajax… |
Advantech |
WebAccess/VPN |
2025-11-06T19:46:20.183Z | 2025-11-06T20:08:14.910Z |
| cve-2025-34241 | 5.3 (v4.0) | Advantech WebAccess/VPN < 1.1.5 SQL Injection via Ajax… |
Advantech |
WebAccess/VPN |
2025-11-06T19:45:39.944Z | 2025-11-06T20:08:33.015Z |
| cve-2025-34240 | 8.6 (v4.0) | Advantech WebAccess/VPN < 1.1.5 SQL Injection via AppM… |
Advantech |
WebAccess/VPN |
2025-11-06T19:45:02.692Z | 2025-11-06T21:01:40.174Z |
| cve-2025-34239 | 8.6 (v4.0) | Advantech WebAccess/VPN < 1.1.5 Command Injection in A… |
Advantech |
WebAccess/VPN |
2025-11-06T19:44:18.796Z | 2025-11-06T20:58:37.711Z |
| cve-2025-34238 | 6.9 (v4.0) | Advantech WebAccess/VPN < 1.1.5 Path Traversal via Aja… |
Advantech |
WebAccess/VPN |
2025-11-06T19:43:35.153Z | 2025-11-06T20:24:02.958Z |
| cve-2025-34237 | 6.3 (v4.0) | Advantech WebAccess/VPN < 1.1.5 Stored XSS via Standal… |
Advantech |
WebAccess/VPN |
2025-11-06T19:40:50.496Z | 2025-11-06T20:24:46.528Z |
| cve-2025-34236 | 6.2 (v4.0) | Advantech WebAccess/VPN < 1.1.5 Stored XSS via Network… |
Advantech |
WebAccess/VPN |
2025-11-06T19:39:40.112Z | 2025-11-06T20:25:05.684Z |
| cve-2025-12490 | 8.8 (v3.0) | Netgate pfSense CE Suricata Path Traversal Remote Code… |
Netgate |
pfSense |
2025-11-06T20:10:57.257Z | 2025-11-06T20:44:02.067Z |
| cve-2022-50596 | 9.3 (v4.0) | D-Link DIR-1260 <= v1.20B05 GetDeviceSettings Unauthen… |
D-Link |
DIR-1260 |
2025-11-06T19:58:51.704Z | 2025-11-07T15:07:18.977Z |
| cve-2022-50595 | 9.3 (v4.0) | Advantech iView < v5.7.04 Build 6425 ztp_search_value … |
Advantech |
iView |
2025-11-06T19:58:23.068Z | 2025-11-06T20:33:36.519Z |
| cve-2022-50594 | 8.8 (v4.0) | Advantech iView < v5.7.04 Build 6425 data Parameter SQ… |
Advantech |
iView |
2025-11-06T19:57:00.425Z | 2025-11-06T21:10:30.978Z |
| cve-2022-50593 | 9.3 (v4.0) | Advantech iView < v5.7.04 Build 6425 search_term Param… |
Advantech |
iView |
2025-11-06T19:57:44.271Z | 2025-11-06T21:02:21.355Z |
| cve-2022-50592 | 9.3 (v4.0) | Advantech iView < v5.7.04 Build 6425 getInventoryRepor… |
Advantech |
iView |
2025-11-06T19:57:20.528Z | 2025-11-06T21:07:38.762Z |
| cve-2022-50591 | 8.8 (v4.0) | Advantech iView < v5.7.04 Build 6425 ztp_config_id Par… |
Advantech |
iView |
2025-11-06T19:58:06.223Z | 2025-11-06T20:36:15.818Z |
| cve-2022-50590 | 8.8 (v4.0) | SuiteCRM < 7.12.6 Type Confusion via 'deleteAttachment… |
SuiteCRM |
SuiteCRM |
2025-11-06T19:59:36.078Z | 2025-11-06T20:26:09.006Z |
| cve-2022-50589 | 9.3 (v4.0) | SuiteCRM < 7.12.6 SQL Injection via 'export' Functionality |
SuiteCRM |
SuiteCRM |
2025-11-06T19:59:12.520Z | 2025-11-06T20:27:20.421Z |
| cve-2025-63551 | N/A | A Server-Side Request Forgery (SSRF) vulnerabilit… |
n/a |
n/a |
2025-11-06T00:00:00.000Z | 2025-11-07T15:11:56.765Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-54782 | Malicious code in sari-bakwan11-ruro (npm) | 2025-11-10T05:18:00Z | 2025-11-10T05:18:00Z |
| mal-2025-54781 | Malicious code in sari-asinan99-riris (npm) | 2025-11-10T05:18:00Z | 2025-11-10T05:18:00Z |
| mal-2025-54780 | Malicious code in rudi-tongseng7-ruro (npm) | 2025-11-10T05:18:00Z | 2025-11-10T05:18:00Z |
| mal-2025-54779 | Malicious code in rudi-telurtahu81-riris (npm) | 2025-11-10T05:18:00Z | 2025-11-10T05:18:00Z |
| mal-2025-54778 | Malicious code in rudi-telurtahu35-riris (npm) | 2025-11-10T05:18:00Z | 2025-11-10T05:18:00Z |
| mal-2025-54777 | Malicious code in rudi-tek74-riris (npm) | 2025-11-10T05:18:00Z | 2025-11-10T05:18:00Z |
| mal-2025-54776 | Malicious code in rudi-tek22-miaww (npm) | 2025-11-10T05:18:00Z | 2025-11-10T05:18:00Z |
| mal-2025-54775 | Malicious code in rudi-tapai92-ruro (npm) | 2025-11-10T05:18:00Z | 2025-11-10T05:18:00Z |
| mal-2025-54774 | Malicious code in rudi-takokak82-breki (npm) | 2025-11-10T05:18:00Z | 2025-11-10T05:18:00Z |
| mal-2025-54773 | Malicious code in rudi-soto40-miaww (npm) | 2025-11-10T05:18:00Z | 2025-11-10T05:18:00Z |
| mal-2025-54772 | Malicious code in rudi-serabi14-apidev (npm) | 2025-11-10T05:18:00Z | 2025-11-10T05:18:00Z |
| mal-2025-54771 | Malicious code in rudi-ruwet16-sukiwir (npm) | 2025-11-10T05:18:00Z | 2025-11-10T05:18:00Z |
| mal-2025-54770 | Malicious code in rudi-rendang60-riris (npm) | 2025-11-10T05:18:00Z | 2025-11-10T05:18:00Z |
| mal-2025-54769 | Malicious code in rudi-rawon40-sukiwir (npm) | 2025-11-10T05:18:00Z | 2025-11-10T05:18:00Z |
| mal-2025-54768 | Malicious code in rudi-peyek74-ruro (npm) | 2025-11-10T05:18:00Z | 2025-11-10T05:18:00Z |
| mal-2025-54767 | Malicious code in rudi-otak-otak36-cloud9 (npm) | 2025-11-10T05:18:00Z | 2025-11-10T05:18:00Z |
| mal-2025-54766 | Malicious code in rudi-otak-otak13-sukiwir (npm) | 2025-11-10T05:18:00Z | 2025-11-10T05:18:00Z |
| mal-2025-54765 | Malicious code in rudi-nasisayur90-sukiwir (npm) | 2025-11-10T05:18:00Z | 2025-11-10T05:18:00Z |
| mal-2025-54764 | Malicious code in rudi-nasicampur78-riris (npm) | 2025-11-10T05:18:00Z | 2025-11-10T05:18:00Z |
| mal-2025-54763 | Malicious code in rudi-nasicampur46-ruro (npm) | 2025-11-10T05:18:00Z | 2025-11-10T05:18:00Z |
| mal-2025-54762 | Malicious code in rudi-nasi39-miaww (npm) | 2025-11-10T05:18:00Z | 2025-11-10T05:18:00Z |
| mal-2025-54761 | Malicious code in rudi-naget23-riris (npm) | 2025-11-10T05:18:00Z | 2025-11-10T05:18:00Z |
| mal-2025-54760 | Malicious code in rudi-mie73-riris (npm) | 2025-11-10T05:18:00Z | 2025-11-10T05:18:00Z |
| mal-2025-54759 | Malicious code in rudi-menjes92-riris (npm) | 2025-11-10T05:18:00Z | 2025-11-10T05:18:00Z |
| mal-2025-54758 | Malicious code in rudi-martabak45-breki (npm) | 2025-11-10T05:18:00Z | 2025-11-10T05:18:00Z |
| mal-2025-54757 | Malicious code in rudi-mangut75-sukiwir (npm) | 2025-11-10T05:18:00Z | 2025-11-10T05:18:00Z |
| mal-2025-54756 | Malicious code in rudi-mangut33-miaww (npm) | 2025-11-10T05:18:00Z | 2025-11-10T05:18:00Z |
| mal-2025-54755 | Malicious code in rudi-lupis27-miaww (npm) | 2025-11-10T05:18:00Z | 2025-11-10T05:18:00Z |
| mal-2025-54754 | Malicious code in rudi-lupis26-miaww (npm) | 2025-11-10T05:18:00Z | 2025-11-10T05:18:00Z |
| mal-2025-54753 | Malicious code in rudi-lumpur56-sukiwir (npm) | 2025-11-10T05:18:00Z | 2025-11-10T05:18:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:18275 | Red Hat Security Advisory: libssh security update | 2025-10-16T22:09:51+00:00 | 2025-11-10T12:41:37+00:00 |
| rhsa-2025:18256 | Red Hat Security Advisory: .NET 8.0 security update | 2025-10-16T15:40:20+00:00 | 2025-11-06T23:42:33+00:00 |
| rhsa-2025:18255 | Red Hat Security Advisory: Red Hat build of Keycloak 26.0.16 Update | 2025-10-16T14:50:34+00:00 | 2025-11-07T18:35:57+00:00 |
| rhsa-2025:18254 | Red Hat Security Advisory: Red Hat build of Keycloak 26.0.16 Images Update | 2025-10-16T14:47:34+00:00 | 2025-11-07T18:35:57+00:00 |
| rhsa-2025:18252 | Red Hat Security Advisory: Kiali 2.11.4 for Red Hat OpenShift Service Mesh 3.1 | 2025-10-16T13:13:12+00:00 | 2025-11-10T01:32:53+00:00 |
| rhsa-2025:17672 | Red Hat Security Advisory: OpenShift Container Platform 4.12.81 security and extras update | 2025-10-16T11:11:29+00:00 | 2025-11-10T01:32:52+00:00 |
| rhsa-2025:17669 | Red Hat Security Advisory: OpenShift Container Platform 4.12.81 packages and security update | 2025-10-16T11:03:25+00:00 | 2025-11-10T14:22:21+00:00 |
| rhsa-2025:18231 | Red Hat Security Advisory: libssh security update | 2025-10-16T10:25:20+00:00 | 2025-11-10T12:41:34+00:00 |
| rhsa-2025:17671 | Red Hat Security Advisory: OpenShift Container Platform 4.12.81 bug fix and security update | 2025-10-16T10:07:40+00:00 | 2025-11-10T13:43:33+00:00 |
| rhsa-2025:18219 | Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.16.0 | 2025-10-16T08:41:21+00:00 | 2025-11-07T18:37:08+00:00 |
| rhsa-2025:18183 | Red Hat Security Advisory: libsoup3 security update | 2025-10-15T20:35:08+00:00 | 2025-11-10T12:42:02+00:00 |
| rhsa-2025:18151 | Red Hat Security Advisory: .NET 9.0 security update | 2025-10-15T16:57:02+00:00 | 2025-11-06T23:42:32+00:00 |
| rhsa-2025:18155 | Red Hat Security Advisory: firefox security update | 2025-10-15T16:41:57+00:00 | 2025-11-10T06:42:30+00:00 |
| rhsa-2025:18150 | Red Hat Security Advisory: .NET 9.0 security update | 2025-10-15T16:34:50+00:00 | 2025-11-06T23:42:32+00:00 |
| rhsa-2025:18153 | Red Hat Security Advisory: .NET 9.0 security update | 2025-10-15T16:33:56+00:00 | 2025-11-06T23:42:32+00:00 |
| rhsa-2025:18152 | Red Hat Security Advisory: .NET 8.0 security update | 2025-10-15T16:18:27+00:00 | 2025-11-06T23:42:32+00:00 |
| rhsa-2025:18149 | Red Hat Security Advisory: .NET 8.0 security update | 2025-10-15T16:16:39+00:00 | 2025-11-06T23:42:31+00:00 |
| rhsa-2025:18154 | Red Hat Security Advisory: firefox security update | 2025-10-15T16:00:06+00:00 | 2025-11-10T06:42:29+00:00 |
| rhsa-2025:18148 | Red Hat Security Advisory: .NET 8.0 security update | 2025-10-15T15:58:41+00:00 | 2025-11-06T23:42:33+00:00 |
| rhsa-2025:18070 | Red Hat Security Advisory: webkit2gtk3 security update | 2025-10-15T14:16:26+00:00 | 2025-11-10T06:42:29+00:00 |
| rhsa-2025:17657 | Red Hat Security Advisory: OpenShift Container Platform 4.18.26 bug fix and security update | 2025-10-15T14:07:50+00:00 | 2025-11-06T22:56:36+00:00 |
| rhsa-2025:18097 | Red Hat Security Advisory: webkit2gtk3 security update | 2025-10-15T11:46:25+00:00 | 2025-11-10T06:42:29+00:00 |
| rhsa-2025:18098 | Red Hat Security Advisory: kernel-rt security update | 2025-10-15T11:39:50+00:00 | 2025-11-08T07:17:25+00:00 |
| rhsa-2025:18093 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.18.1 security update | 2025-10-15T10:27:05+00:00 | 2025-11-07T00:15:16+00:00 |
| rhsa-2025:18076 | Red Hat Security Advisory: Red Hat Build of Apache Camel 4.10 for Quarkus 3.20 update is now available (RHBQ 3.20.3.GA) | 2025-10-15T09:14:18+00:00 | 2025-11-08T07:17:44+00:00 |
| rhsa-2025:17690 | Red Hat Security Advisory: OpenShift Container Platform 4.16.50 bug fix and security update | 2025-10-15T07:45:25+00:00 | 2025-11-06T22:56:37+00:00 |
| rhsa-2025:18054 | Red Hat Security Advisory: kernel security update | 2025-10-15T07:08:30+00:00 | 2025-11-08T07:17:25+00:00 |
| rhsa-2025:18043 | Red Hat Security Advisory: kernel security update | 2025-10-15T00:31:48+00:00 | 2025-11-08T07:17:24+00:00 |
| rhsa-2025:18028 | Red Hat Security Advisory: Red Hat Build of Apache Camel 4.10.7 for Spring Boot release. | 2025-10-14T17:59:03+00:00 | 2025-11-10T13:55:12+00:00 |
| rhsa-2025:17563 | Red Hat Security Advisory: Red Hat build of Quarkus 3.20.3 release and security update | 2025-10-14T13:01:32+00:00 | 2025-11-08T07:17:42+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-46152 | In PyTorch before 2.7.0, bitwise_right_shift produces incorrect output for certain out-of-bounds values of the "other" argument. | 2025-09-02T00:00:00.000Z | 2025-09-29T01:01:54.000Z |
| msrc_cve-2025-46150 | In PyTorch before 2.7.0, when torch.compile is used, FractionalMaxPool2d has inconsistent results. | 2025-09-02T00:00:00.000Z | 2025-10-02T01:05:21.000Z |
| msrc_cve-2025-46149 | In PyTorch before 2.7.0, when inductor is used, nn.Fold has an assertion error. | 2025-09-02T00:00:00.000Z | 2025-10-02T01:05:06.000Z |
| msrc_cve-2025-46148 | In PyTorch through 2.6.0, when eager is used, nn.PairwiseDistance(p=2) produces incorrect results. | 2025-09-02T00:00:00.000Z | 2025-09-29T01:01:59.000Z |
| msrc_cve-2025-40928 | JSON::XS before version 4.04 for Perl has an integer buffer overflow causing a segfault when parsing crafted JSON, enabling denial-of-service attacks or other unspecified impact | 2025-09-02T00:00:00.000Z | 2025-09-11T01:01:27.000Z |
| msrc_cve-2025-40300 | x86/vmscape: Add conditional IBPB mitigation | 2025-09-02T00:00:00.000Z | 2025-09-13T01:04:26.000Z |
| msrc_cve-2025-39886 | bpf: Tell memcg to use allow_spinning=false path in bpf_timer_init() | 2025-09-02T00:00:00.000Z | 2025-09-24T01:02:00.000Z |
| msrc_cve-2025-39885 | ocfs2: fix recursive semaphore deadlock in fiemap call | 2025-09-02T00:00:00.000Z | 2025-09-24T01:01:44.000Z |
| msrc_cve-2025-39883 | mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory | 2025-09-02T00:00:00.000Z | 2025-09-24T01:02:21.000Z |
| msrc_cve-2025-39881 | kernfs: Fix UAF in polling when open file is released | 2025-09-02T00:00:00.000Z | 2025-09-24T01:01:49.000Z |
| msrc_cve-2025-39880 | libceph: fix invalid accesses to ceph_connection_v1_info | 2025-09-02T00:00:00.000Z | 2025-09-24T01:02:31.000Z |
| msrc_cve-2025-39877 | mm/damon/sysfs: fix use-after-free in state_show() | 2025-09-02T00:00:00.000Z | 2025-09-24T01:01:55.000Z |
| msrc_cve-2025-39876 | net: fec: Fix possible NPD in fec_enet_phy_reset_after_clk_enable() | 2025-09-02T00:00:00.000Z | 2025-09-24T01:02:26.000Z |
| msrc_cve-2025-39873 | can: xilinx_can: xcan_write_frame(): fix use-after-free of transmitted SKB | 2025-09-02T00:00:00.000Z | 2025-09-24T01:02:10.000Z |
| msrc_cve-2025-39869 | dmaengine: ti: edma: Fix memory allocation size for queue_priority_map | 2025-09-02T00:00:00.000Z | 2025-09-24T01:02:15.000Z |
| msrc_cve-2025-39867 | netfilter: nft_set_pipapo: fix null deref for empty set | 2025-09-02T00:00:00.000Z | 2025-09-24T01:02:05.000Z |
| msrc_cve-2025-39866 | fs: writeback: fix use-after-free in __mark_inode_dirty() | 2025-09-02T00:00:00.000Z | 2025-09-21T01:03:07.000Z |
| msrc_cve-2025-39865 | tee: fix NULL pointer dereference in tee_shm_put | 2025-09-02T00:00:00.000Z | 2025-09-21T01:02:21.000Z |
| msrc_cve-2025-39864 | wifi: cfg80211: fix use-after-free in cmp_bss() | 2025-09-02T00:00:00.000Z | 2025-09-21T01:03:02.000Z |
| msrc_cve-2025-39863 | wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work | 2025-09-02T00:00:00.000Z | 2025-09-21T01:02:41.000Z |
| msrc_cve-2025-39862 | wifi: mt76: mt7915: fix list corruption after hardware restart | 2025-09-02T00:00:00.000Z | 2025-09-21T01:02:05.000Z |
| msrc_cve-2025-39861 | Bluetooth: vhci: Prevent use-after-free by removing debugfs files early | 2025-09-02T00:00:00.000Z | 2025-09-21T01:02:57.000Z |
| msrc_cve-2025-39860 | Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen() | 2025-09-02T00:00:00.000Z | 2025-09-21T01:02:36.000Z |
| msrc_cve-2025-39859 | ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog | 2025-09-02T00:00:00.000Z | 2025-09-21T01:02:52.000Z |
| msrc_cve-2025-39857 | net/smc: fix one NULL pointer dereference in smc_ib_is_sg_need_sync() | 2025-09-02T00:00:00.000Z | 2025-09-21T01:01:49.000Z |
| msrc_cve-2025-39853 | i40e: Fix potential invalid access when MAC list is empty | 2025-09-02T00:00:00.000Z | 2025-09-21T01:01:34.000Z |
| msrc_cve-2025-39851 | vxlan: Fix NPD when refreshing an FDB entry with a nexthop object | 2025-09-02T00:00:00.000Z | 2025-09-21T01:01:55.000Z |
| msrc_cve-2025-39850 | vxlan: Fix NPD in {arp,neigh}_reduce() when using nexthop objects | 2025-09-02T00:00:00.000Z | 2025-09-21T01:02:47.000Z |
| msrc_cve-2025-39849 | wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() | 2025-09-02T00:00:00.000Z | 2025-09-21T01:01:29.000Z |
| msrc_cve-2025-39848 | ax25: properly unshare skbs in ax25_kiss_rcv() | 2025-09-02T00:00:00.000Z | 2025-09-21T01:03:25.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2024-000084 | Multiple vulnerabilities in ZEXELON ZWX-2000CSW2-HN | 2024-08-05T13:46+09:00 | 2024-08-05T13:46+09:00 |
| jvndb-2024-000077 | FFRI AMC vulnerable to OS command injection | 2024-07-30T16:40+09:00 | 2024-07-30T16:40+09:00 |
| jvndb-2024-000078 | Multiple vulnerabilities in ELECOM wireless LAN routers | 2024-07-30T15:34+09:00 | 2025-02-12T14:34+09:00 |
| jvndb-2024-000081 | EC-CUBE plugin (for EC-CUBE 4 series) "EC-CUBE Web API Plugin" vulnerable to stored cross-site scripting | 2024-07-30T14:06+09:00 | 2024-07-30T14:06+09:00 |
| jvndb-2024-000080 | EC-CUBE 4 Series improper input validation when installing plugins | 2024-07-30T13:56+09:00 | 2024-07-30T13:56+09:00 |
| jvndb-2024-004595 | Multiple vulnerabilities in FutureNet NXR series, VXR series and WXR series | 2024-07-29T17:51+09:00 | 2025-06-30T09:56+09:00 |
| jvndb-2024-000076 | SDoP contains a stack-based buffer overflow vulnerability. | 2024-07-29T17:24+09:00 | 2024-07-29T17:24+09:00 |
| jvndb-2024-000074 | Multiple vulnerabilities in SKYSEA Client View | 2024-07-29T15:28+09:00 | 2024-07-31T14:12+09:00 |
| jvndb-2024-004623 | Multiple products from Check Point Software Technologies vulnerable to information disclosure | 2024-07-29T10:23+09:00 | 2024-10-24T16:37+09:00 |
| jvndb-2024-000075 | ORC vulnerable to stack-based buffer overflow | 2024-07-26T13:55+09:00 | 2024-07-26T13:55+09:00 |
| jvndb-2024-000073 | Assimp vulnerable to heap-based buffer overflow | 2024-07-18T13:44+09:00 | 2024-07-18T13:44+09:00 |
| jvndb-2024-000072 | Cybozu Garoon vulnerable to cross-site scripting | 2024-07-16T16:14+09:00 | 2024-07-16T16:14+09:00 |
| jvndb-2024-000071 | FUJITSU Network Edgiot GW1500 vulnerable to path traversal | 2024-07-16T14:41+09:00 | 2024-07-16T14:41+09:00 |
| jvndb-2024-000070 | Out-of-bounds write vulnerability in Ricoh MFPs and printers | 2024-07-10T14:16+09:00 | 2024-07-10T14:16+09:00 |
| jvndb-2024-000059 | Multiple vulnerabilities in multiple Webmin products | 2024-07-09T14:27+09:00 | 2024-07-09T14:27+09:00 |
| jvndb-2024-000069 | Cleartext transmission issue in TONE store App to TONE store | 2024-07-08T13:43+09:00 | 2024-07-08T13:43+09:00 |
| jvndb-2024-000068 | JP1/Extensible SNMP Agent fails to restrict access permissions | 2024-07-03T14:57+09:00 | 2024-07-03T14:57+09:00 |
| jvndb-2024-003831 | Multiple TP-Link products vulnerable to OS command injection | 2024-06-28T17:38+09:00 | 2024-06-28T17:38+09:00 |
| jvndb-2024-000067 | "Piccoma" App uses a hard-coded API key for an external service | 2024-06-28T13:18+09:00 | 2024-06-28T13:18+09:00 |
| jvndb-2024-000066 | WordPress plugins "WP Tweet Walls" and "Sola Testimonials" vulnerable to cross-site request forgery | 2024-06-26T14:25+09:00 | 2024-06-26T14:25+09:00 |
| jvndb-2024-003699 | LINE client for iOS vulnerable to universal cross-site scripting | 2024-06-24T11:05+09:00 | 2024-06-24T11:05+09:00 |
| jvndb-2024-003645 | Multiple vulnerabilities in multiple Trend Micro products | 2024-06-20T14:59+09:00 | 2024-06-20T14:59+09:00 |
| jvndb-2024-000065 | "ZOZOTOWN" App for Android fails to restrict custom URL schemes properly | 2024-06-19T16:04+09:00 | 2024-06-19T16:04+09:00 |
| jvndb-2024-000064 | WordPress plugin "SiteGuard WP Plugin" may leak the customized path to the login page | 2024-06-19T14:25+09:00 | 2024-06-19T14:25+09:00 |
| jvndb-2024-000061 | Multiple vulnerabilities in Ricoh Streamline NX PC Client | 2024-06-18T14:56+09:00 | 2024-06-18T14:56+09:00 |
| jvndb-2024-000063 | Multiple vulnerabilities in ID Link Manager and FUJITSU Software TIME CREATOR | 2024-06-18T13:43+09:00 | 2024-06-18T13:43+09:00 |
| jvndb-2024-003539 | Multiple vulnerabilities in Toshiba Tec and Oki Electric Industry MFPs | 2024-06-17T15:21+09:00 | 2024-06-17T15:21+09:00 |
| jvndb-2024-000062 | Denial-of-service (DoS) vulnerability in IPCOM WAF function | 2024-06-12T15:03+09:00 | 2024-06-12T15:03+09:00 |
| jvndb-2024-000058 | WordPress Plugin "Music Store - WordPress eCommerce" vulnerable to SQL injection | 2024-06-07T15:24+09:00 | 2024-06-10T17:08+09:00 |
| jvndb-2024-000060 | Multiple vulnerabilities in "FreeFrom - the nostr client" App | 2024-06-07T14:51+09:00 | 2024-06-07T14:51+09:00 |
| ID | Description | Updated |
|---|