Recent vulnerabilities
ID | CVSS | Description | Vendor | Product | Published | Updated |
---|---|---|---|---|---|---|
cve-2025-33077 | 8.8 (v3.1) | IBM Engineering Systems Design Rhapsody code execution |
IBM |
Engineering Systems Design Rhapsody |
2025-07-23T14:49:24.439Z | 2025-08-18T01:31:24.100Z |
cve-2025-33020 | 5.9 (v3.1) | IBM Engineering Systems Design Rhapsody information di… |
IBM |
Engineering Systems Design Rhapsody |
2025-07-23T14:47:29.357Z | 2025-08-18T01:31:04.799Z |
cve-2025-36116 | 6.3 (v3.1) | IBM Db2 Mirror for i cross-site websocket hijacking |
IBM |
Db2 Mirror for i |
2025-07-23T14:26:06.865Z | 2025-08-18T01:30:27.202Z |
cve-2025-36117 | 6.3 (v3.1) | IBM Db2 Mirror for i session fixation |
IBM |
Db2 Mirror for i |
2025-07-23T14:27:08.061Z | 2025-08-18T01:30:05.928Z |
cve-2024-41751 | 5.5 (v3.1) | IBM SmartCloud Analytics - Log Analysis security bypass |
IBM |
SmartCloud Analytics Log Analysis |
2025-07-23T11:09:44.485Z | 2025-08-18T01:29:44.858Z |
cve-2024-41750 | 5.5 (v3.1) | IBM SmartCloud Analytics - Log Analysis security bypass |
IBM |
SmartCloud Analytics Log Analysis |
2025-07-23T11:15:12.334Z | 2025-08-18T01:29:21.637Z |
cve-2024-40686 | 5.4 (v3.1) | IBM SmartCloud Analytics - Log Analysis HOST header in… |
IBM |
SmartCloud Analytics Log Analysis |
2025-07-23T11:12:23.857Z | 2025-08-18T01:28:44.168Z |
cve-2025-33109 | 7.5 (v3.1) | IBM i privilege escalation |
IBM |
i |
2025-07-24T15:06:49.888Z | 2025-08-18T01:28:18.727Z |
cve-2025-33013 | 6.2 (v3.1) | IBM MQ Operator information disclosure |
IBM |
MQ Operator |
2025-07-24T14:55:04.945Z | 2025-08-18T01:27:18.300Z |
cve-2025-9099 | Acrel Environmental Monitoring Cloud Platform UploadNe… |
Acrel |
Environmental Monitoring Cloud Platform |
2025-08-18T01:02:06.521Z | 2025-08-18T01:02:06.521Z | |
cve-2025-31715 | 9.8 (v3.1) | In vowifi service, there is a possible command in… |
Unisoc (Shanghai) Technologies Co., Ltd. |
SL8521E/SL8521ET/ SL8541E/UIS8141E/UWS6137/UWS6137E/UWS6151(E)/UWS6152 |
2025-08-18T00:34:30.378Z | 2025-08-18T00:34:30.378Z |
cve-2025-31714 | 6.8 (v3.1) | In Developer Tools, there is a possible missing v… |
Unisoc (Shanghai) Technologies Co., Ltd. |
SL8521E/SL8521ET/ SL8541E/UIS8141E/UWS6137/UWS6137E/UWS6151(E)/UWS6152 |
2025-08-18T00:34:29.399Z | 2025-08-18T00:34:29.399Z |
cve-2025-31713 | 8.4 (v3.1) | In engineer mode service, there is a possible com… |
Unisoc (Shanghai) Technologies Co., Ltd. |
SL8521E/SL8521ET/ SL8541E/UIS8141E/UWS6137/UWS6137E/UWS6151(E)/UWS6152 |
2025-08-18T00:34:28.435Z | 2025-08-18T00:34:28.435Z |
cve-2025-9098 | Elseplus File Recovery App AndroidManifest.xml imprope… |
Elseplus |
File Recovery App |
2025-08-18T00:32:05.703Z | 2025-08-18T00:32:05.703Z | |
cve-2025-9097 | Euro Information CIC banque et compte en ligne App com… |
Euro Information |
CIC banque et compte en ligne App |
2025-08-18T00:02:05.870Z | 2025-08-18T00:02:05.870Z | |
cve-2025-9096 | ExpressGateway express-gateway REST Endpoint apps.js c… |
ExpressGateway |
express-gateway |
2025-08-17T23:32:05.435Z | 2025-08-17T23:32:05.435Z | |
cve-2025-7342 | 7.5 (v3.1) | VM images built with Kubernetes Image Builder Nutanix … |
Kubernetes |
Image Builder |
2025-08-17T23:03:56.571Z | 2025-08-17T23:03:56.571Z |
cve-2025-9095 | ExpressGateway express-gateway REST Endpoint users.js … |
ExpressGateway |
express-gateway |
2025-08-17T23:02:07.148Z | 2025-08-17T23:02:07.148Z | |
cve-2025-9094 | ThingsBoard Add Gateway special elements used in a tem… |
n/a |
ThingsBoard |
2025-08-17T22:32:05.887Z | 2025-08-17T22:32:05.887Z | |
cve-2025-9093 | BuzzFeed App com.buzzfeed.android AndroidManifest.xml … |
n/a |
BuzzFeed App |
2025-08-17T22:02:06.368Z | 2025-08-17T22:02:06.368Z | |
cve-2025-8671 | N/A | CVE-2025-8671 |
SUSE Linux |
Enterprise Module for Development Tools |
2025-08-13T12:03:37.167Z | 2025-08-17T14:26:49.121Z |
cve-2025-45770 | N/A | jwt v5.4.3 was discovered to contain weak encrypt… |
n/a |
n/a |
2025-07-31T00:00:00.000Z | 2025-08-17T04:00:19.045Z |
cve-2025-45769 | N/A | php-jwt v6.11.0 was discovered to contain weak en… |
n/a |
n/a |
2025-07-31T00:00:00.000Z | 2025-08-17T03:59:12.347Z |
cve-2025-45766 | N/A | poco v1.14.1-release was discovered to contain we… |
n/a |
n/a |
2025-08-06T00:00:00.000Z | 2025-08-17T03:57:24.360Z |
cve-2025-9091 | Tenda AC20 shadow hard-coded credentials |
Tenda |
AC20 |
2025-08-17T02:32:09.136Z | 2025-08-17T02:32:09.136Z | |
cve-2025-9090 | Tenda AC20 Telnet Service telnet websFormDefine comman… |
Tenda |
AC20 |
2025-08-17T02:02:07.488Z | 2025-08-17T02:02:07.488Z | |
cve-2025-36005 | 5.9 (v3.1) | IBM MQ Operator information disclosure |
IBM |
MQ Operator |
2025-07-24T14:52:53.238Z | 2025-08-17T01:24:38.369Z |
cve-2024-49828 | 6.5 (v3.1) | IBM Db2 for Linux, UNIX and Windows denial of service |
IBM |
Db2 |
2025-07-29T19:04:20.976Z | 2025-08-17T01:23:37.630Z |
cve-2024-52894 | 4.9 (v3.1) | IBM Db2 for Linux, UNIX and Windows denial of service |
IBM |
Db2 |
2025-07-29T19:00:12.910Z | 2025-08-17T01:23:03.366Z |
cve-2024-51473 | 6.5 (v3.1) | IBM Db2 for Linux, UNIX and Windows denial of service |
IBM |
Db2 |
2025-07-29T19:02:40.346Z | 2025-08-17T01:21:55.841Z |
ID | CVSS | Description | Vendor | Product | Published | Updated |
---|---|---|---|---|---|---|
cve-2025-45770 | N/A | jwt v5.4.3 was discovered to contain weak encrypt… |
n/a |
n/a |
2025-07-31T00:00:00.000Z | 2025-08-17T04:00:19.045Z |
cve-2025-45769 | N/A | php-jwt v6.11.0 was discovered to contain weak en… |
n/a |
n/a |
2025-07-31T00:00:00.000Z | 2025-08-17T03:59:12.347Z |
cve-2025-45766 | N/A | poco v1.14.1-release was discovered to contain we… |
n/a |
n/a |
2025-08-06T00:00:00.000Z | 2025-08-17T03:57:24.360Z |
cve-2025-9091 | Tenda AC20 shadow hard-coded credentials |
Tenda |
AC20 |
2025-08-17T02:32:09.136Z | 2025-08-17T02:32:09.136Z | |
cve-2025-9090 | Tenda AC20 Telnet Service telnet websFormDefine comman… |
Tenda |
AC20 |
2025-08-17T02:02:07.488Z | 2025-08-17T02:02:07.488Z | |
cve-2025-9089 | Tenda AC20 SetIpMacBind sub_48E628 stack-based overflow |
Tenda |
AC20 |
2025-08-16T23:32:07.804Z | 2025-08-16T23:32:07.804Z | |
cve-2023-43029 | 6.8 (v3.1) | IBM Storage Virtualize vSphere Remote Plug-in informat… |
IBM |
Storage Virtualize vSphere Remote Plug-in |
2025-03-21T15:33:51.807Z | 2025-08-17T00:03:33.951Z |
cve-2025-9088 | Tenda AC20 formSetVirtualSer save_virtualser_data stac… |
Tenda |
AC20 |
2025-08-16T23:02:07.777Z | 2025-08-16T23:02:07.777Z | |
cve-2025-9087 | Tenda AC20 SetNetControlList Endpoint set_qosMib_list … |
Tenda |
AC20 |
2025-08-16T22:32:07.366Z | 2025-08-16T22:32:07.366Z | |
cve-2025-23266 | 9 (v3.1) | NVIDIA Container Toolkit for all platforms contai… |
NVIDIA |
Container Toolkit |
2025-07-17T19:08:21.352Z | 2025-08-16T21:33:32.242Z |
cve-2023-4515 | N/A | ksmbd: validate command request size |
Linux |
Linux |
2025-08-16T13:25:50.562Z | 2025-08-16T13:25:50.562Z |
cve-2023-4130 | N/A | ksmbd: fix wrong next length validation of ea buffer i… |
Linux |
Linux |
2025-08-16T13:27:58.227Z | 2025-08-16T13:27:58.227Z |
cve-2023-3867 | N/A | ksmbd: fix out of bounds read in smb2_sess_setup |
Linux |
Linux |
2025-08-16T13:29:51.946Z | 2025-08-16T13:29:51.946Z |
cve-2023-3866 | N/A | ksmbd: validate session id and tree id in the compound… |
Linux |
Linux |
2025-08-16T13:27:57.332Z | 2025-08-16T13:27:57.332Z |
cve-2023-3865 | N/A | ksmbd: fix out-of-bound read in smb2_write |
Linux |
Linux |
2025-08-16T13:27:56.403Z | 2025-08-16T13:27:56.403Z |
cve-2023-32249 | N/A | ksmbd: not allow guest user on multichannel |
Linux |
Linux |
2025-08-16T13:25:49.645Z | 2025-08-16T13:25:49.645Z |
cve-2023-32246 | N/A | ksmbd: call rcu_barrier() in ksmbd_server_exit() |
Linux |
Linux |
2025-08-16T13:22:09.212Z | 2025-08-16T13:22:09.212Z |
cve-2025-8878 | Paid Membership Plugin, Ecommerce, User Registration F… |
properfraction |
Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress |
2025-08-16T11:11:24.022Z | 2025-08-16T11:11:24.022Z | |
cve-2025-8143 | Soledad <= 8.6.7 - Authenticated (Contributor+) Stored… |
pencidesign |
Soledad |
2025-08-16T11:11:24.852Z | 2025-08-16T11:11:24.852Z | |
cve-2025-8142 | Soledad <= 8.6.7 - Authenticated (Contributor+) Local … |
pencidesign |
Soledad |
2025-08-16T11:11:23.436Z | 2025-08-16T11:11:23.436Z | |
cve-2025-8105 | Soledad <= 8.6.7 - Unauthenticated Arbitrary Shortcode… |
pencidesign |
Soledad |
2025-08-16T11:11:24.459Z | 2025-08-16T11:11:24.459Z | |
cve-2025-38552 | N/A | mptcp: plug races between subflow fail and subflow creation |
Linux |
Linux |
2025-08-16T11:34:20.455Z | 2025-08-16T11:34:20.455Z |
cve-2025-38551 | N/A | virtio-net: fix recursived rtnl_lock() during probe() |
Linux |
Linux |
2025-08-16T11:34:19.544Z | 2025-08-16T11:34:19.544Z |
cve-2025-38550 | N/A | ipv6: mcast: Delay put pmc->idev in mld_del_delrec() |
Linux |
Linux |
2025-08-16T11:34:18.619Z | 2025-08-16T11:34:18.619Z |
cve-2025-38549 | N/A | efivarfs: Fix memory leak of efivarfs_fs_info in fs_co… |
Linux |
Linux |
2025-08-16T11:34:17.699Z | 2025-08-16T11:34:17.699Z |
cve-2025-38548 | N/A | hwmon: (corsair-cpro) Validate the size of the receive… |
Linux |
Linux |
2025-08-16T11:34:16.889Z | 2025-08-16T11:34:16.889Z |
cve-2025-38547 | N/A | iio: adc: axp20x_adc: Add missing sentinel to AXP717 A… |
Linux |
Linux |
2025-08-16T11:34:15.905Z | 2025-08-16T11:34:15.905Z |
cve-2025-38546 | N/A | atm: clip: Fix memory leak of struct clip_vcc. |
Linux |
Linux |
2025-08-16T11:22:20.477Z | 2025-08-16T11:22:20.477Z |
cve-2025-38545 | N/A | net: ethernet: ti: am65-cpsw-nuss: Fix skb size by acc… |
Linux |
Linux |
2025-08-16T11:22:19.459Z | 2025-08-16T11:22:19.459Z |
cve-2025-38544 | N/A | rxrpc: Fix bug due to prealloc collision |
Linux |
Linux |
2025-08-16T11:22:18.541Z | 2025-08-16T11:22:18.541Z |
ID | Description | Published | Updated |
---|---|---|---|
fkie_cve-2025-45769 | php-jwt v6.11.0 was discovered to contain weak encryption. NOTE: this issue has been disputed on th… | 2025-07-31T20:15:33.150 | 2025-08-17T04:15:39.083 |
fkie_cve-2025-45766 | poco v1.14.1-release was discovered to contain weak encryption. NOTE: this issue has been disputed … | 2025-08-06T20:15:28.953 | 2025-08-17T04:15:33.243 |
fkie_cve-2025-9091 | A security flaw has been discovered in Tenda AC20 16.03.08.12. Affected by this vulnerability is an… | 2025-08-17T03:15:27.650 | 2025-08-17T03:15:27.650 |
fkie_cve-2025-9090 | A vulnerability was identified in Tenda AC20 16.03.08.12. Affected is the function websFormDefine o… | 2025-08-17T03:15:26.527 | 2025-08-17T03:15:26.527 |
fkie_cve-2025-9089 | A vulnerability was determined in Tenda AC20 16.03.08.12. This issue affects the function sub_48E62… | 2025-08-17T00:15:27.517 | 2025-08-17T00:15:27.517 |
fkie_cve-2023-43029 | IBM Storage Virtualize vSphere Remote Plug-in 1.0 and 1.1 could allow a remote user to obtain sensi… | 2025-03-21T16:15:17.240 | 2025-08-17T00:15:26.160 |
fkie_cve-2025-9088 | A vulnerability was found in Tenda AC20 16.03.08.12. This vulnerability affects the function save_v… | 2025-08-16T23:15:26.523 | 2025-08-16T23:15:26.523 |
fkie_cve-2025-9087 | A vulnerability has been found in Tenda AC20 16.03.08.12. This affects the function set_qosMib_list… | 2025-08-16T23:15:26.257 | 2025-08-16T23:15:26.257 |
fkie_cve-2025-23266 | NVIDIA Container Toolkit for all platforms contains a vulnerability in some hooks used to initializ… | 2025-07-17T20:15:28.693 | 2025-08-16T22:15:25.613 |
fkie_cve-2023-4515 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate command reques… | 2025-08-16T14:15:27.780 | 2025-08-16T14:15:27.780 |
fkie_cve-2023-4130 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix wrong next length v… | 2025-08-16T14:15:27.640 | 2025-08-16T14:15:27.640 |
fkie_cve-2023-3867 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix out of bounds read … | 2025-08-16T14:15:27.510 | 2025-08-16T14:15:27.510 |
fkie_cve-2023-3866 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate session id and… | 2025-08-16T14:15:27.383 | 2025-08-16T14:15:27.383 |
fkie_cve-2023-3865 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix out-of-bound read i… | 2025-08-16T14:15:27.250 | 2025-08-16T14:15:27.250 |
fkie_cve-2023-32249 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: not allow guest user on… | 2025-08-16T14:15:27.123 | 2025-08-16T14:15:27.123 |
fkie_cve-2023-32246 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: call rcu_barrier() in k… | 2025-08-16T14:15:26.393 | 2025-08-16T14:15:26.393 |
fkie_cve-2025-8878 | The The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restr… | 2025-08-16T12:15:32.127 | 2025-08-16T12:15:32.127 |
fkie_cve-2025-8143 | The Soledad theme for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘pcsml_smartli… | 2025-08-16T12:15:31.930 | 2025-08-16T12:15:31.930 |
fkie_cve-2025-8142 | The Soledad theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and in… | 2025-08-16T12:15:31.740 | 2025-08-16T12:15:31.740 |
fkie_cve-2025-8105 | The The Soledad theme for WordPress is vulnerable to arbitrary shortcode execution in all versions … | 2025-08-16T12:15:31.537 | 2025-08-16T12:15:31.537 |
fkie_cve-2025-38552 | In the Linux kernel, the following vulnerability has been resolved: mptcp: plug races between subf… | 2025-08-16T12:15:31.400 | 2025-08-16T12:15:31.400 |
fkie_cve-2025-38551 | In the Linux kernel, the following vulnerability has been resolved: virtio-net: fix recursived rtn… | 2025-08-16T12:15:31.267 | 2025-08-16T12:15:31.267 |
fkie_cve-2025-38550 | In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast: Delay put pmc->id… | 2025-08-16T12:15:31.137 | 2025-08-16T12:15:31.137 |
fkie_cve-2025-38549 | In the Linux kernel, the following vulnerability has been resolved: efivarfs: Fix memory leak of e… | 2025-08-16T12:15:31.003 | 2025-08-16T12:15:31.003 |
fkie_cve-2025-38548 | In the Linux kernel, the following vulnerability has been resolved: hwmon: (corsair-cpro) Validate… | 2025-08-16T12:15:30.880 | 2025-08-16T12:15:30.880 |
fkie_cve-2025-38547 | In the Linux kernel, the following vulnerability has been resolved: iio: adc: axp20x_adc: Add miss… | 2025-08-16T12:15:30.757 | 2025-08-16T12:15:30.757 |
fkie_cve-2025-38546 | In the Linux kernel, the following vulnerability has been resolved: atm: clip: Fix memory leak of … | 2025-08-16T12:15:30.620 | 2025-08-16T12:15:30.620 |
fkie_cve-2025-38545 | In the Linux kernel, the following vulnerability has been resolved: net: ethernet: ti: am65-cpsw-n… | 2025-08-16T12:15:30.500 | 2025-08-16T12:15:30.500 |
fkie_cve-2025-38544 | In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix bug due to prealloc… | 2025-08-16T12:15:30.373 | 2025-08-16T12:15:30.373 |
fkie_cve-2025-38543 | In the Linux kernel, the following vulnerability has been resolved: drm/tegra: nvdec: Fix dma_allo… | 2025-08-16T12:15:30.237 | 2025-08-16T12:15:30.237 |
ID | Description | Published | Updated |
---|---|---|---|
ghsa-pm54-8x3h-h6h9 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix out of bounds read … | 2025-08-16T15:30:30Z | 2025-08-16T15:30:30Z |
ghsa-mr68-gqxj-cfm9 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix out-of-bound read i… | 2025-08-16T15:30:30Z | 2025-08-16T15:30:30Z |
ghsa-j2x9-qg6q-8wg7 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate command reques… | 2025-08-16T15:30:30Z | 2025-08-16T15:30:30Z |
ghsa-hwfv-6r5j-7xm3 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: validate session id and… | 2025-08-16T15:30:30Z | 2025-08-16T15:30:30Z |
ghsa-75h4-6q93-6c34 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: call rcu_barrier() in k… | 2025-08-16T15:30:30Z | 2025-08-16T15:30:30Z |
ghsa-3ccm-2cr5-453p | In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix wrong next length v… | 2025-08-16T15:30:30Z | 2025-08-16T15:30:30Z |
ghsa-xq4m-w85j-23vg | The The Soledad theme for WordPress is vulnerable to arbitrary shortcode execution in all versions … | 2025-08-16T12:30:33Z | 2025-08-16T12:30:33Z |
ghsa-wcfp-94c7-jmv4 | In the Linux kernel, the following vulnerability has been resolved: net: phy: Don't register LEDs … | 2025-08-16T12:30:33Z | 2025-08-16T12:30:33Z |
ghsa-vq2f-jgxp-899c | In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7925: Fix null-p… | 2025-08-16T12:30:33Z | 2025-08-16T12:30:33Z |
ghsa-m82r-6669-cm5x | In the Linux kernel, the following vulnerability has been resolved: net: appletalk: Fix device ref… | 2025-08-16T12:30:33Z | 2025-08-16T12:30:33Z |
ghsa-jgp9-rwc2-m645 | In the Linux kernel, the following vulnerability has been resolved: tracing: Add down_write(trace_… | 2025-08-16T12:30:33Z | 2025-08-16T12:30:33Z |
ghsa-j928-v9rj-pq95 | In the Linux kernel, the following vulnerability has been resolved: ipv6: mcast: Delay put pmc->id… | 2025-08-16T12:30:33Z | 2025-08-16T12:30:33Z |
ghsa-hfm8-q4mr-mf9f | In the Linux kernel, the following vulnerability has been resolved: virtio-net: fix recursived rtn… | 2025-08-16T12:30:33Z | 2025-08-16T12:30:33Z |
ghsa-h9hh-vjgw-q6wq | In the Linux kernel, the following vulnerability has been resolved: mptcp: plug races between subf… | 2025-08-16T12:30:33Z | 2025-08-16T12:30:33Z |
ghsa-gvwq-wr3v-v8jg | In the Linux kernel, the following vulnerability has been resolved: phy: tegra: xusb: Fix unbalanc… | 2025-08-16T12:30:33Z | 2025-08-16T12:30:33Z |
ghsa-gp4f-7pr4-w93j | In the Linux kernel, the following vulnerability has been resolved: iio: adc: axp20x_adc: Add miss… | 2025-08-16T12:30:33Z | 2025-08-16T12:30:33Z |
ghsa-ffcm-x32p-2f7m | The Soledad theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and in… | 2025-08-16T12:30:33Z | 2025-08-16T12:30:33Z |
ghsa-f6c4-25w9-79f8 | In the Linux kernel, the following vulnerability has been resolved: atm: clip: Fix memory leak of … | 2025-08-16T12:30:33Z | 2025-08-16T12:30:33Z |
ghsa-cr65-c8fq-xhfg | The The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restr… | 2025-08-16T12:30:33Z | 2025-08-16T12:30:33Z |
ghsa-cgrx-9qvf-wh88 | In the Linux kernel, the following vulnerability has been resolved: efivarfs: Fix memory leak of e… | 2025-08-16T12:30:33Z | 2025-08-16T12:30:33Z |
ghsa-9w4m-fr9r-hh23 | In the Linux kernel, the following vulnerability has been resolved: drm/tegra: nvdec: Fix dma_allo… | 2025-08-16T12:30:33Z | 2025-08-16T12:30:33Z |
ghsa-9m7r-fq3j-mfwq | In the Linux kernel, the following vulnerability has been resolved: hwmon: (corsair-cpro) Validate… | 2025-08-16T12:30:33Z | 2025-08-16T12:30:33Z |
ghsa-7jx7-g6pm-43wc | In the Linux kernel, the following vulnerability has been resolved: net: ethernet: ti: am65-cpsw-n… | 2025-08-16T12:30:33Z | 2025-08-16T12:30:33Z |
ghsa-6x9m-mw8m-fq7f | In the Linux kernel, the following vulnerability has been resolved: net: airoha: fix potential use… | 2025-08-16T12:30:33Z | 2025-08-16T12:30:33Z |
ghsa-646r-2h84-3p3v | In the Linux kernel, the following vulnerability has been resolved: dmaengine: nbpfaxi: Fix memory… | 2025-08-16T12:30:33Z | 2025-08-16T12:30:33Z |
ghsa-4c9q-7835-998j | In the Linux kernel, the following vulnerability has been resolved: net: libwx: properly reset Rx … | 2025-08-16T12:30:32Z | 2025-08-16T12:30:33Z |
ghsa-459r-g93g-c5wc | In the Linux kernel, the following vulnerability has been resolved: HID: quirks: Add quirk for 2 C… | 2025-08-16T12:30:33Z | 2025-08-16T12:30:33Z |
ghsa-446v-48hm-jgwm | The Soledad theme for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘pcsml_smartli… | 2025-08-16T12:30:33Z | 2025-08-16T12:30:33Z |
ghsa-2fgf-j87m-qgrf | In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix bug due to prealloc… | 2025-08-16T12:30:33Z | 2025-08-16T12:30:33Z |
ghsa-x96j-4m6x-jcvx | In the Linux kernel, the following vulnerability has been resolved: bpf: Fix oob access in cgroup … | 2025-08-16T12:30:32Z | 2025-08-16T12:30:32Z |
ID | Description | Package | Published | Updated |
---|---|---|---|---|
pysec-2025-51 | Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) v… | apache-airflow-providers-snowflake | 2025-06-24T08:15:24+00:00 | 2025-06-26T21:23:03.132527+00:00 |
pysec-2025-50 | vLLM, an inference and serving engine for large language models (LLMs), has a Regular Exp… | vllm | 2025-05-30T18:15:32+00:00 | 2025-06-19T03:02:28.572160+00:00 |
pysec-2024-255 | Gradio before 4.20 allows credential leakage on Windows. | gradio | 2024-05-05T20:15:07+00:00 | 2025-06-17T19:21:48.983901+00:00 |
pysec-2024-254 | A session fixation vulnerability exists in the zenml-io/zenml application, where JWT toke… | zenml | 2024-04-16T00:15:11+00:00 | 2025-06-13T00:48:41.806476+00:00 |
pysec-2025-49 | setuptools is a package that allows users to download, build, install, upgrade, and unins… | setuptools | 2025-05-17T16:15:19+00:00 | 2025-06-12T22:23:11.115559+00:00 |
pysec-2025-48 | Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessm… | mobsf | 2025-03-31T17:15:42+00:00 | 2025-06-12T22:23:10.476087+00:00 |
pysec-2024-253 | pretix before 2024.1.1 mishandles file validation. | pretix | 2024-02-26T16:28:00+00:00 | 2025-06-11T15:23:51.683422+00:00 |
pysec-2024-252 | PyTorch before v2.2.0 was discovered to contain a heap buffer overflow vulnerability in t… | torch | 2024-04-17T19:15:07+00:00 | 2025-06-10T19:22:08.948962+00:00 |
pysec-2024-251 | Pytorch before version v2.2.0 was discovered to contain a use-after-free vulnerability in… | torch | 2024-04-17T19:15:07+00:00 | 2025-06-10T03:12:59.077932+00:00 |
pysec-2025-47 | An issue was discovered in Django 5.2 before 5.2.2, 5.1 before 5.1.10, and 4.2 before 4.2… | django | 2025-06-05T03:15:25+00:00 | 2025-06-05T05:23:28.296596+00:00 |
pysec-2025-46 | A vulnerability was found in erdogant pypickle up to 1.1.5. It has been classified as cri… | pypickle | 2025-05-26T08:15:19+00:00 | 2025-06-03T17:36:58.579358+00:00 |
pysec-2025-45 | A vulnerability was found in erdogant pypickle up to 1.1.5 and classified as problematic.… | pypickle | 2025-05-26T07:15:26+00:00 | 2025-06-03T17:36:58.528116+00:00 |
pysec-2024-250 | Pytorch before v2.2.0 has an Out-of-bounds Read vulnerability via the component torch/csr… | torch | 2024-04-19T21:15:08+00:00 | 2025-06-03T15:23:56.072490+00:00 |
pysec-2023-312 | Redis before 6cbea7d allows a replica to cause an assertion failure in a primary server b… | redis | 2023-07-15T23:15:09Z | 2025-06-02T11:48:06.372423Z |
pysec-2025-44 | django-helpdesk before 1.0.0 allows Sensitive Data Exposure because of os.umask(0) in mod… | django-helpdesk | 2025-05-31T01:15:19+00:00 | 2025-05-31T03:09:35.357757+00:00 |
pysec-2025-43 | vLLM is an inference and serving engine for large language models (LLMs). In versions sta… | vllm | 2025-05-29T17:15:21+00:00 | 2025-05-29T19:21:01.611587+00:00 |
pysec-2025-42 | vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Ver… | vllm | 2025-04-30T01:15:51+00:00 | 2025-05-28T21:23:12.396609+00:00 |
pysec-2025-41 | PyTorch is a Python package that provides tensor computation with strong GPU acceleration… | torch | 2025-04-18T16:15:23+00:00 | 2025-05-28T15:23:37.843138+00:00 |
pysec-2025-40 | A vulnerability in the `preprocess_string()` function of the `transformers.testing_utils`… | transformers | 2025-05-19T12:15:19+00:00 | 2025-05-21T19:22:10.801823+00:00 |
pysec-2024-249 | ### Summary On all Label Studio versions prior to 1.11.0, data imported via file upload f… | label-studio | 2024-02-22T22:15:47+00:00 | 2025-05-19T11:22:35.312280+00:00 |
pysec-2024-248 | OpenCanary, a multi-protocol network honeypot, directly executed commands taken from its … | opencanary | 2024-10-14T21:15:12+00:00 | 2025-05-16T14:23:05.150356+00:00 |
pysec-2025-39 | motionEye is an online interface for the software motion, a video surveillance program wi… | motioneye | 2025-05-14T16:15:29+00:00 | 2025-05-14T17:22:51.050788+00:00 |
pysec-2025-38 | OpenStack Ironic before 29.0.1 can write unintended files to a target node disk during im… | ironic | 2025-05-08T17:16:01Z | 2025-05-13T04:24:03.083929Z |
pysec-2024-247 | A directory traversal vulnerability exists in the zenml-io/zenml repository, specifically… | zenml | 2024-04-16T00:15:11+00:00 | 2025-05-12T15:23:53.861001+00:00 |
pysec-2025-37 | An issue was discovered in Django 4.2 before 4.2.21, 5.1 before 5.1.9, and 5.2 before 5.2… | django | 2025-05-08T04:17:18+00:00 | 2025-05-08T05:23:16.210893+00:00 |
pysec-2025-36 | Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/v1/valida… | langflow | 2025-04-07T15:15:44+00:00 | 2025-05-07T19:22:44.993642+00:00 |
pysec-2024-246 | Vyper is a pythonic Smart Contract Language for the Ethereum virtual machine. Starting in… | vyper | 2024-04-25T17:15:50+00:00 | 2025-05-05T19:21:20.899426+00:00 |
pysec-2024-111 | A path traversal vulnerability exists in the `getFullPath` method of langchain-ai/langcha… | langchain | 2024-10-29T13:15:00Z | 2025-05-02T18:39:47.588215Z |
pysec-2024-245 | Apache Airflow, versions before 2.8.2, has a vulnerability that allows authenticated user… | apache-airflow | 2024-02-29T11:15:08+00:00 | 2025-05-01T21:22:38.598048+00:00 |
pysec-2025-35 | Weblate is a web based localization tool. Prior to version 5.11, when creating a new comp… | weblate | 2025-04-15T21:16:04+00:00 | 2025-04-30T17:22:51.467257+00:00 |
ID | Description | Type |
---|---|---|
tid-309 | If the integrated development environment (IDE) or vendor software that is used to manage… | application-software |
tid-308 | The threat actor can overwrite a previously deployed/installed malicious program with a d… | application-software |
tid-307 | Many devices that allow the execution of custom application programs, such as IEC 61131 b… | application-software |
tid-306 | While restricting the execution of external programs within a sandboxed execution environ… | application-software |
tid-305 | If the device allows the downloading and execution of native binaries on the device, a th… | application-software |
tid-304 | A threat actor can manipulate the runtime environments on a device to maintain persistenc… | application-software |
tid-303 | If device management is intended to be performed by a dedicated engineering software plat… | application-software |
tid-302 | A threat actor can install a malicious program to the device to manipulate its operations… | application-software |
tid-301 | A threat actor could modify application-level binaries or libraries on the device to intr… | application-software |
tid-226 | Some devise will login information that can be exploited by attackers to further their at… | system-software |
tid-225 | Threat actors may try to manipulate logs on the device to evade defenses, confuse inciden… | system-software |
tid-224 | If a device has debugging capabilities (e.g., diagnostic tools, debug logs, etc.) that ar… | system-software |
tid-223 | If the threat actor can obtain sufficient privileges on the devices, they may be able to … | system-software |
tid-222 | Various devices and associated services are necessary to support communications and conne… | system-software |
tid-221 | Some devices will allow for authentication over the network, but do not implement mechani… | system-software |
tid-220 | Hardware roots of trust can be used to support many desirable device security functions, … | system-software |
tid-219 | Operating Systems and Kernels frequently run at the highest levels of permissions. If pro… | system-software |
tid-218 | A threat actor may be able to install a rootkit that can manipulate the operating system … | system-software |
tid-217 | When firmware/software update process is initiated on a device, it may enter a different … | system-software |
tid-216 | Firmware updates will oftentimes include fixes to security vulnerabilities, meaning that … | system-software |
tid-215 | If the firmware/software update is not encrypted at rest in storage it can be reverse eng… | system-software |
tid-214 | Some device have mutable or immutable secure Roots of Trust (ROTs) that may store keys or… | system-software |
tid-213 | To avoid the weaknesses of a shared secret verification (see TID-212), devices may utiliz… | system-software |
tid-212 | Some devices utilize a shared secret authentication scheme to verify firmware updates. Th… | system-software |
tid-211 | If a device does not have a mechanism to authenticate firmware updates, a threat actor ma… | system-software |
tid-210 | Threat actors will frequently target device components, like firmware, that have already … | system-software |
tid-209 | If a threat actor can access a hypervisor’s host infrastructure, such as through existing… | system-software |
tid-208 | Virtualization mechanisms allow multiple operating sytem instances to share the same unde… | system-software |
tid-207 | Container environments, such as Docker and Kubernetes, share the same underlying kernel a… | system-software |
tid-206 | While the use of memory permissions, such as non-executable stack and heap memory, can pr… | system-software |
ID | Description |
---|---|
gsd-2024-33874 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33861 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33850 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33856 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33870 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33849 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33854 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33868 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33881 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33880 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33877 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33873 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33859 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33875 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33878 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33858 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33872 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33857 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33853 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33863 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33852 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33866 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33867 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33882 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33871 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33862 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33864 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33865 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33869 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33860 | The format of the source doesn't require a description, click on the link for more details |
ID | Description | Published | Updated |
---|---|---|---|
mal-2025-5756 | Malicious code in yoomoney-github-landing (npm) | 2025-07-10T04:52:32Z | 2025-07-23T00:41:11Z |
mal-2025-5755 | Malicious code in tutorial_front (npm) | 2025-07-10T04:10:42Z | 2025-07-23T00:41:11Z |
mal-2025-5482 | Malicious code in wix-test-package (npm) | 2025-06-18T17:35:21Z | 2025-07-23T00:41:11Z |
mal-2025-6089 | Malicious code in fxa-auth-server (npm) | 2025-07-12T17:36:47Z | 2025-07-23T00:41:10Z |
mal-2025-6017 | Malicious code in evmlogger (npm) | 2025-07-21T03:31:41Z | 2025-07-23T00:41:10Z |
mal-2025-5814 | Malicious code in graphprotocol-tools-monorepo (npm) | 2025-07-08T20:06:11Z | 2025-07-23T00:41:10Z |
mal-2025-5812 | Malicious code in fxa-admin-panel (npm) | 2025-07-08T02:25:19Z | 2025-07-23T00:41:10Z |
mal-2025-5809 | Malicious code in dep-confusion-poc-monke (npm) | 2025-07-10T11:59:35Z | 2025-07-23T00:41:10Z |
mal-2025-5807 | Malicious code in dashboard-demo (npm) | 2025-07-09T03:58:33Z | 2025-07-23T00:41:10Z |
mal-2025-5758 | Malicious code in @shadowmonarchx/eslint_plugin_react (npm) | 2025-07-10T13:30:48Z | 2025-07-23T00:41:10Z |
mal-2025-5652 | Malicious code in ru.rustore.core (npm) | 2025-07-07T17:15:46Z | 2025-07-23T00:41:10Z |
mal-2025-5641 | Malicious code in consgraphql (npm) | 2025-07-06T05:10:49Z | 2025-07-23T00:41:10Z |
mal-2025-5638 | Malicious code in nonsensetest (npm) | 2025-07-05T15:07:32Z | 2025-07-23T00:41:10Z |
mal-2025-5629 | Malicious code in cmc-core (npm) | 2025-07-05T07:34:52Z | 2025-07-23T00:41:10Z |
mal-2025-5628 | Malicious code in consgraphqlnodeserv (npm) | 2025-07-05T07:10:49Z | 2025-07-23T00:41:10Z |
mal-2025-5627 | Malicious code in graphql-commons (npm) | 2025-07-05T06:50:43Z | 2025-07-23T00:41:10Z |
mal-2025-5625 | Malicious code in plugin-meta-extractor (npm) | 2025-07-05T03:03:08Z | 2025-07-23T00:41:10Z |
mal-2025-2890 | Malicious code in paypal-url-generator (npm) | 2025-03-28T12:54:11Z | 2025-07-23T00:41:10Z |
mal-2024-2565 | Malicious code in jquery-dragster (npm) | 2024-06-25T12:48:03Z | 2025-07-23T00:41:10Z |
mal-2024-2369 | Malicious code in financialforce (npm) | 2024-06-25T12:42:58Z | 2025-07-23T00:41:10Z |
mal-2025-6014 | Malicious code in okta-core-component (npm) | 2025-07-16T13:59:06Z | 2025-07-23T00:38:28Z |
mal-2025-6005 | Malicious code in noya-vaults (npm) | 2025-07-18T04:05:48Z | 2025-07-23T00:38:28Z |
mal-2025-6002 | Malicious code in rtp-rapyd (npm) | 2025-07-17T23:38:30Z | 2025-07-23T00:38:28Z |
mal-2025-6000 | Malicious code in public-tools-and-demos (npm) | 2025-07-15T04:42:22Z | 2025-07-23T00:38:28Z |
mal-2025-5993 | Malicious code in preview-server-auth-poc (npm) | 2025-07-17T14:10:53Z | 2025-07-23T00:38:28Z |
mal-2025-5991 | Malicious code in lunasec (npm) | 2025-07-17T08:11:10Z | 2025-07-23T00:38:28Z |
mal-2025-5987 | Malicious code in rollup-linux-riscv64-gnu (npm) | 2025-07-16T01:14:54Z | 2025-07-23T00:38:28Z |
mal-2025-5844 | Malicious code in ngf-gov-hr-navbar (npm) | 2025-07-14T12:05:52Z | 2025-07-23T00:38:28Z |
mal-2025-5843 | Malicious code in ngf-attachment-item-view (npm) | 2025-07-14T12:05:47Z | 2025-07-23T00:38:28Z |
mal-2025-5836 | Malicious code in tw-core-ui (npm) | 2025-07-12T07:20:01Z | 2025-07-23T00:38:28Z |
ID | Description | Published | Updated |
---|---|---|---|
wid-sec-w-2025-1766 | Liferay Portal und DXP: Schwachstelle ermöglicht Denial of Service | 2025-08-11T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1764 | Bouncy Castle: Schwachstelle ermöglicht Denial of Service | 2025-08-11T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1757 | Linux Kernel: Schwachstelle ermöglicht Umgehen von Sicherheitsmechanismen | 2025-08-11T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1740 | Golang Go: Mehrere Schwachstellen ermöglichen Manipulation von Dateien | 2025-08-06T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1717 | libTIFF (tiff2ps): Schwachstelle ermöglicht Denial of Service | 2025-08-04T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1703 | WebKitGTK: Mehrere Schwachstellen | 2025-08-03T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1700 | libTIFF: Schwachstelle ermöglicht einen Denial of Service | 2025-08-03T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1681 | Red Hat OpenShift (glog): Schwachstelle ermöglicht Manipulation von Dateien | 2025-07-30T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1679 | Linux Kernel: Schwachstelle ermöglicht Manipulation und Dos | 2025-07-29T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1667 | Google Chrome / Microsoft Edge: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-07-29T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1665 | Linux Kernel: Mehrere Schwachstellen | 2025-07-28T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1654 | libTIFF (Tiffmedian, Thumbnail): Mehrere Schwachstellen | 2025-07-27T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1653 | Linux Kernel: Mehrere Schwachstellen | 2025-07-27T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1638 | Nvidia Treiber: Mehrere Schwachstellen | 2025-07-23T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1636 | Apache HTTP Server: Schwachstelle ermöglicht umgehen von Sicherheitsvorkehrungen | 2025-07-23T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1623 | Mozilla Firefox , Firefox ESR und Thunderbird: Mehrere Schwachstellen | 2025-07-22T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1622 | Google Chrome / Microsoft Edge: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-07-22T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1620 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-07-21T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1613 | Linux Kernel: Mehrere Schwachstellen | 2025-07-20T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1569 | Oracle Java SE: Mehrere Schwachstellen | 2025-07-15T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1522 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-09T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1517 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-08T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1502 | AMD Prozessor: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2025-07-08T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1481 | Linux Kernel: Mehrere Schwachstellen | 2025-07-07T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1465 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-06T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1461 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-03T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1452 | Linux Kernel: Mehrere Schwachstellen | 2025-07-02T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1417 | Linux Kernel: Mehrere Schwachstellen | 2025-06-29T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1372 | Linux Kernel: Schwachstelle ermöglicht Manipulation von Daten und Denial of Service | 2025-06-22T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1350 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-06-17T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
ID | Description | Published | Updated |
---|---|---|---|
ncsc-2025-0235 | Kwetsbaarheden verholpen in Firefox en Thunderbird | 2025-07-23T13:01:45.118883Z | 2025-07-23T13:01:45.118883Z |
ncsc-2025-0204 | Kwetsbaarheden verholpen in Cisco ISE en ISE-PIC | 2025-06-26T09:02:07.224036Z | 2025-07-23T07:46:25.364521Z |
ncsc-2025-0234 | Kwetsbaarheid verholpen in CrushFTP | 2025-07-21T08:34:35.304610Z | 2025-07-21T08:34:35.304610Z |
ncsc-2025-0215 | Kwetsbaarheden verholpen in Microsoft Office | 2025-07-08T18:24:48.517158Z | 2025-07-19T11:40:27.812820Z |
ncsc-2025-0232 | Kwetsbaarheid verholpen in Keycloak | 2025-07-18T13:12:14.074394Z | 2025-07-18T13:12:14.074394Z |
ncsc-2025-0196 | Kwetsbaarheden verholpen in Citrix NetScaler ADC en NetScaler Gateway | 2025-06-18T08:32:32.792202Z | 2025-07-18T09:51:52.738778Z |
ncsc-2025-0231 | Kwetsbaarheden verholpen in XWiki | 2025-07-17T12:35:48.998487Z | 2025-07-17T12:35:48.998487Z |
ncsc-2025-0230 | Kwetsbaarheid verholpen in Wing FTP Server | 2025-07-14T06:06:24.154078Z | 2025-07-14T06:06:24.154078Z |
ncsc-2025-0226 | Kwetsbaarheid verholpen in FortiWeb | 2025-07-11T09:57:23.588152Z | 2025-07-11T13:20:55.101692Z |
ncsc-2025-0229 | Kwetsbaarheden verholpen in Adobe InDesign Desktop | 2025-07-11T10:01:48.229418Z | 2025-07-11T10:01:48.229418Z |
ncsc-2025-0228 | Kwetsbaarheden verholpen in Zoom Clients | 2025-07-11T09:58:21.871103Z | 2025-07-11T09:58:21.871103Z |
ncsc-2025-0227 | Kwetsbaarheid verholpen in Juniper SRX300 Series | 2025-07-11T09:57:40.476096Z | 2025-07-11T09:57:40.476096Z |
ncsc-2025-0225 | Kwetsbaarheid verholpen in Juniper Networks Security Director | 2025-07-11T09:55:46.934253Z | 2025-07-11T09:55:46.934253Z |
ncsc-2025-0224 | Kwetsbaarheden verholpen in Adobe Illustrator | 2025-07-09T08:57:08.548822Z | 2025-07-09T08:57:08.548822Z |
ncsc-2025-0223 | Kwetsbaarheden verholpen in Adobe Framemaker | 2025-07-09T08:47:38.891072Z | 2025-07-09T08:47:38.891072Z |
ncsc-2025-0222 | Kwetsbaarheden verholpen in Adobe ColdFusion | 2025-07-09T08:41:53.656736Z | 2025-07-09T08:41:53.656736Z |
ncsc-2025-0221 | Kwetsbaarheden verholpen in Schneider Electric EcoStruxture IT Datacenter Expert | 2025-07-09T08:38:05.336146Z | 2025-07-09T08:38:05.336146Z |
ncsc-2025-0220 | Kwetsbaarheden verholpen in Palo Alto PAN-OS | 2025-07-09T08:33:14.284978Z | 2025-07-09T08:33:14.284978Z |
ncsc-2025-0219 | Kwetsbaarheden verholpen in SAP producten | 2025-07-09T08:29:00.474865Z | 2025-07-09T08:29:00.474865Z |
ncsc-2025-0218 | Kwetsbaarheden verholpen in Microsoft Edge (Chromium based) | 2025-07-08T18:26:55.812717Z | 2025-07-08T18:26:55.812717Z |
ncsc-2025-0217 | Kwetsbaarheden verholpen in Microsoft Visual Studio | 2025-07-08T18:26:14.881161Z | 2025-07-08T18:26:14.881161Z |
ncsc-2025-0216 | Kwetsbaarheden verholpen in Microsoft SQL Server | 2025-07-08T18:25:40.909948Z | 2025-07-08T18:25:40.909948Z |
ncsc-2025-0214 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-07-08T18:24:14.065296Z | 2025-07-08T18:24:14.065296Z |
ncsc-2025-0213 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-07-08T18:23:09.960791Z | 2025-07-08T18:23:09.960791Z |
ncsc-2025-0212 | Kwetsbaarheden verholpen in Splunk Enterprise en Splunk Cloud Platform | 2025-07-08T12:03:17.100858Z | 2025-07-08T12:03:17.100858Z |
ncsc-2025-0211 | Kwetsbaarheden verholpen in Siemens producten | 2025-07-08T11:58:23.712452Z | 2025-07-08T11:58:23.712452Z |
ncsc-2025-0210 | Kwetsbaarheid verholpen in Cisco Unified Communications Manager | 2025-07-03T07:43:27.075341Z | 2025-07-03T07:43:27.075341Z |
ncsc-2025-0209 | Kwetsbaarheid verholpen in Google Chrome | 2025-07-01T15:56:24.236216Z | 2025-07-01T15:56:24.236216Z |
ncsc-2025-0208 | Kwetsbaarheden verholpen in Adobe Commerce | 2025-06-30T12:59:12.105658Z | 2025-06-30T12:59:12.105658Z |
ncsc-2025-0207 | Kwetsbaarheden verholpen in Adobe InDesign Desktop | 2025-06-30T12:58:32.421661Z | 2025-06-30T12:58:32.421661Z |
ID | Description | Published | Updated |
---|---|---|---|
ssa-446307 | SSA-446307: Authentication Bypass Vulnerability in BMC (CVE-2024-54085) affects SIMATIC IPC RS-828A | 2025-05-13T00:00:00Z | 2025-08-12T00:00:00Z |
ssa-400089 | SSA-400089: Denial of Service Vulnerability in SIPROTEC 4 and SIPROTEC 4 Compact | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
ssa-398330 | SSA-398330: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP >= V3.1.0 and < V3.1.5 | 2023-12-12T00:00:00Z | 2025-08-12T00:00:00Z |
ssa-392859 | SSA-392859: Local Arbitrary Code Execution Vulnerability in Siemens Engineering Platforms before V20 | 2024-12-10T00:00:00Z | 2025-08-12T00:00:00Z |
ssa-382999 | SSA-382999: Multiple Vulnerabilities in Opcenter Quality Before V2506 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
ssa-355557 | SSA-355557: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.2 | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
ssa-353002 | SSA-353002: Multiple Vulnerabilities in SCALANCE XB-200 / XC-200 / XP-200 / XF-200BA / XR-300WG Family | 2024-03-12T00:00:00Z | 2025-08-12T00:00:00Z |
ssa-331739 | SSA-331739: Privilege Escalation Vulnerability in WIBU CodeMeter Runtime Affecting Siemens Products | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
ssa-282044 | SSA-282044: DLL Hijacking Vulnerability in Siemens Web Installer used by the Online Software Delivery | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
ssa-265688 | SSA-265688: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP V1.1 | 2024-04-09T00:00:00Z | 2025-08-12T00:00:00Z |
ssa-256353 | SSA-256353: Third-Party Component Vulnerabilities in RUGGEDCOM ROS | 2022-03-08T00:00:00Z | 2025-08-12T00:00:00Z |
ssa-186293 | SSA-186293: XML External Entity (XXE) Injection Vulnerability in SIMOTION SCOUT, SIMOTION SCOUT TIA and SINAMICS STARTER | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
ssa-177847 | SSA-177847: Improper VNC Password Check Vulnerability in SINUMERIK Controllers | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
ssa-170375 | SSA-170375: Multiple Vulnerabilities in RUGGEDCOM ROS Before V5.9 | 2024-07-09T00:00:00Z | 2025-08-12T00:00:00Z |
ssa-097435 | SSA-097435: Usernames Disclosure Vulnerability in Mendix Runtime | 2024-09-10T00:00:00Z | 2025-08-12T00:00:00Z |
ssa-094954 | SSA-094954: Authentication Bypass Vulnerability in BIST mode of RUGGEDCOM ROX II | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
ssa-082556 | SSA-082556: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1.5 | 2025-06-10T00:00:00Z | 2025-08-12T00:00:00Z |
ssa-725549 | SSA-725549: Denial of Service of ICMP in Industrial Devices | 2025-04-08T00:00:00Z | 2025-07-21T00:00:00Z |
ssa-183963 | SSA-183963: Certificate Validation Vulnerabilities in SICAM TOOLBOX II Before V07.11 | 2025-07-08T00:00:00Z | 2025-07-18T00:00:00Z |
ssa-938066 | SSA-938066: Remote Code Execution Vulnerability in SENTRON Powermanager and Desigo CC | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
ssa-904646 | SSA-904646: Sensitive Data Exposure Vulnerability in SIPROTEC 5 Devices | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
ssa-876787 | SSA-876787: Open Redirect Vulnerability in SIMATIC S7-1500 and S7-1200 CPUs | 2024-10-08T00:00:00Z | 2025-07-08T00:00:00Z |
ssa-763427 | SSA-763427: Authentication Bypass Vulnerability in SIMATIC CP and TIM Devices | 2015-11-27T00:00:00Z | 2025-07-08T00:00:00Z |
ssa-723487 | SSA-723487: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SCALANCE, RUGGEDCOM and Related Products | 2024-07-09T00:00:00Z | 2025-07-08T00:00:00Z |
ssa-698820 | SSA-698820: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.4 on RUGGEDCOM APE1808 Devices | 2024-07-09T00:00:00Z | 2025-07-08T00:00:00Z |
ssa-634640 | SSA-634640: Weak Authentication Vulnerability in Siemens Industrial Edge Devices | 2025-04-08T00:00:00Z | 2025-07-08T00:00:00Z |
ssa-627195 | SSA-627195: Zip Path Traversal Vulnerability in Mendix Studio Pro's Module Installation Process | 2025-06-12T00:00:00Z | 2025-07-08T00:00:00Z |
ssa-626991 | SSA-626991: Denial of Service Vulnerability in SIMATIC CN 4100 before V4.0 | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
ssa-614723 | SSA-614723: Denial of Service Vulnerabilities in User Management Component (UMC) | 2025-05-13T00:00:00Z | 2025-07-08T00:00:00Z |
ssa-593272 | SSA-593272: SegmentSmack in Interniche IP-Stack based Industrial Devices | 2020-04-14T00:00:00Z | 2025-07-08T00:00:00Z |
ID | Description | Published | Updated |
---|---|---|---|
rhsa-2021:5093 | Red Hat Security Advisory: Red Hat build of Eclipse Vert.x 4.1.5 SP1 security update | 2021-12-14T16:00:56+00:00 | 2025-08-18T03:22:01+00:00 |
rhsa-2022:8652 | Red Hat Security Advisory: Red Hat Fuse 7.11.1 release and security update | 2022-11-28T14:39:27+00:00 | 2025-08-18T03:22:00+00:00 |
rhsa-2021:5140 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 security update | 2021-12-15T02:59:53+00:00 | 2025-08-18T03:21:56+00:00 |
rhsa-2022:6507 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.5.2 security fixes and bug fixes | 2022-09-13T21:48:13+00:00 | 2025-08-18T03:21:55+00:00 |
rhsa-2021:5127 | Red Hat Security Advisory: Openshift Logging security and bug update (5.2.4) | 2021-12-14T18:38:45+00:00 | 2025-08-18T03:21:54+00:00 |
rhsa-2022:6156 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.11.0 security, enhancement, & bugfix update | 2022-08-24T13:45:52+00:00 | 2025-08-18T03:21:53+00:00 |
rhsa-2021:5137 | Red Hat Security Advisory: Openshift Logging Security Release (5.0.10) | 2021-12-14T21:36:36+00:00 | 2025-08-18T03:21:49+00:00 |
rhsa-2021:5126 | Red Hat Security Advisory: Red Hat Integration Camel Extensions for Quarkus GA security update | 2021-12-14T16:19:04+00:00 | 2025-08-18T03:21:47+00:00 |
rhsa-2022:6422 | Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.0.2 security and bug fixes | 2022-09-12T21:10:32+00:00 | 2025-08-18T03:21:46+00:00 |
rhsa-2022:5913 | Red Hat Security Advisory: Red Hat Kiali for OpenShift Service Mesh 2.0 security update | 2022-08-08T08:09:05+00:00 | 2025-08-18T03:21:44+00:00 |
rhsa-2021:5133 | Red Hat Security Advisory: Red Hat AMQ Streams 1.6.5 release and security update | 2021-12-14T21:13:26+00:00 | 2025-08-18T03:21:42+00:00 |
rhsa-2022:6393 | Red Hat Security Advisory: RHV Manager (ovirt-engine) [ovirt-4.5.2] bug fix and security update | 2022-09-08T11:31:04+00:00 | 2025-08-18T03:21:39+00:00 |
rhsa-2021:5130 | Red Hat Security Advisory: Red Hat Integration Camel-K 1.6.2 release and security update | 2021-12-14T17:55:09+00:00 | 2025-08-18T03:21:39+00:00 |
rhsa-2022:5915 | Red Hat Security Advisory: Red Hat Kiali for OpenShift Service Mesh 2.2 security update | 2022-08-08T08:47:11+00:00 | 2025-08-18T03:21:36+00:00 |
rhsa-2021:5138 | Red Hat Security Advisory: Red Hat AMQ Streams 1.8.4 release and security update | 2021-12-14T21:49:01+00:00 | 2025-08-18T03:21:34+00:00 |
rhsa-2021:5129 | Red Hat Security Advisory: Openshift Logging security and bug update (5.3.1) | 2021-12-14T19:37:00+00:00 | 2025-08-18T03:21:31+00:00 |
rhsa-2022:6392 | Red Hat Security Advisory: RHV RHEL Host (ovirt-host) [ovirt-4.5.2] security update | 2022-09-08T11:29:21+00:00 | 2025-08-18T03:21:30+00:00 |
rhsa-2022:5914 | Red Hat Security Advisory: Red Hat Kiali for OpenShift Service Mesh 2.1 security update | 2022-08-08T08:16:49+00:00 | 2025-08-18T03:21:27+00:00 |
rhsa-2021:5132 | Red Hat Security Advisory: Red Hat Data Grid 8.2.2 security update | 2021-12-14T20:03:50+00:00 | 2025-08-18T03:21:26+00:00 |
rhsa-2021:5108 | Red Hat Security Advisory: OpenShift Container Platform 4.8.z security update | 2021-12-14T15:09:31+00:00 | 2025-08-18T03:21:24+00:00 |
rhsa-2022:0296 | Red Hat Security Advisory: Red Hat Process Automation Manager 7.12.0 security update | 2022-01-26T15:52:53+00:00 | 2025-08-18T03:21:17+00:00 |
rhsa-2021:5128 | Red Hat Security Advisory: Openshift Logging security and bug update (5.1.5) | 2021-12-14T18:09:12+00:00 | 2025-08-18T03:21:17+00:00 |
rhsa-2021:5134 | Red Hat Security Advisory: Red Hat Fuse 7.10.0 release and security update | 2021-12-14T21:31:33+00:00 | 2025-08-18T03:21:16+00:00 |
rhsa-2021:5094 | Red Hat Security Advisory: OpenShift Container Platform 3.11.z security update | 2021-12-14T05:50:14+00:00 | 2025-08-18T03:21:07+00:00 |
rhsa-2025:12662 | Red Hat Security Advisory: kernel security update | 2025-08-04T15:19:46+00:00 | 2025-08-18T03:10:05+00:00 |
rhsa-2025:11855 | Red Hat Security Advisory: kernel security update | 2025-07-28T08:32:56+00:00 | 2025-08-18T03:09:52+00:00 |
rhsa-2025:11861 | Red Hat Security Advisory: kernel security update | 2025-07-28T10:31:41+00:00 | 2025-08-18T03:09:37+00:00 |
rhsa-2025:13935 | Red Hat Security Advisory: golang security update | 2025-08-18T00:53:52+00:00 | 2025-08-18T03:09:36+00:00 |
rhsa-2025:13941 | Red Hat Security Advisory: golang security update | 2025-08-18T00:42:23+00:00 | 2025-08-18T03:09:34+00:00 |
rhsa-2025:13944 | Red Hat Security Advisory: openjpeg2 security update | 2025-08-18T01:22:08+00:00 | 2025-08-18T03:09:32+00:00 |
ID | Description | Published | Updated |
---|---|---|---|
cisco-sa-ece-xss-cbtkteyc | Cisco Enterprise Chat and Email Stored Cross-Site Scripting Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-07-02T16:00:00+00:00 |
cisco-sa-cucm-ssh-m4ubdpe7 | Cisco Unified Communications Manager Static SSH Credentials Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-07-02T16:00:00+00:00 |
cisco-sa-broadworks-xss-o696ymra | Cisco BroadWorks Application Delivery Platform Cross-Site Scripting Vulnerability | 2025-07-02T16:00:00+00:00 | 2025-07-02T16:00:00+00:00 |
cisco-sa-ise-stored-xss-yff54m73 | Cisco Identity Services Stored Cross-Site Scripting Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-06-30T15:08:59+00:00 |
cisco-sa-ise-auth-bypass-mvfkvqau | Cisco Identity Services Engine Authorization Bypass Vulnerability | 2025-06-25T16:00:00+00:00 | 2025-06-25T16:00:00+00:00 |
cisco-sa-ise-file-upload-p4m8vwxy | Cisco Identity Services Engine Arbitrary File Upload Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-23T19:16:21+00:00 |
cisco-sa-meraki-mx-vpn-dos-sm5gcfm7 | Cisco Meraki MX and Z Series AnyConnect VPN with Client Certificate Authentication Denial of Service Vulnerability | 2025-06-18T16:00:00+00:00 | 2025-06-18T16:00:00+00:00 |
cisco-sa-clamav-udf-hmwd9ndy | ClamAV UDF File Parsing Out-of-Bounds Read Information Disclosure Vulnerability | 2025-06-18T16:00:00+00:00 | 2025-06-18T16:00:00+00:00 |
cisco-sa-erlang-otp-ssh-xyzzy | Multiple Cisco Products Unauthenticated Remote Code Execution in Erlang/OTP SSH Server: April 2025 | 2025-04-22T21:45:00+00:00 | 2025-06-11T14:40:37+00:00 |
cisco-sa-wlc-file-uplpd-rhzg9ufc | Cisco IOS XE Wireless Controller Software Arbitrary File Upload Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-06-06T20:02:48+00:00 |
cisco-sa-ise-aws-static-cred-fpmjucm7 | Cisco Identity Services Engine on Cloud Platforms Static Credential Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-05T17:26:25+00:00 |
cisco-sa-vos-command-inject-65s2ucyy | Cisco Unified Communications Products Command Injection Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
cisco-sa-ucs-ssh-priv-esc-2mzdtdjm | Cisco Integrated Management Controller Privilege Escalation Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
cisco-sa-uccx-multi-uhotvpgl | Cisco Unified Contact Center Express Vulnerabilities | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
cisco-sa-uccx-editor-rce-ezyyzte8 | Cisco Unified Contact Center Express Editor Remote Code Execution Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
cisco-sa-te-endagent-filewrt-zncdqnrj | Cisco ThousandEyes Endpoint Agent for Windows Arbitrary File Delete Vulnerabilities | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
cisco-sa-ndfc-shkv-snqjtjrp | Cisco Nexus Dashboard Fabric Controller SSH Host Key Validation Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
cisco-sa-icm-xss-cfcqhxag | Cisco Unified Intelligent Contact Management Enterprise Cross-Site Scripting Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
cisco-sa-ccp-info-disc-zygerqpd | Cisco Customer Collaboration Platform Information Disclosure Vulnerability | 2025-06-04T16:00:00+00:00 | 2025-06-04T16:00:00+00:00 |
cisco-sa-meraki-mx-vpn-dos-qtrhzg2 | Cisco Meraki MX and Z Series Teleworker Gateway AnyConnect VPN Denial of Service Vulnerabilities | 2024-10-02T16:00:00+00:00 | 2025-06-02T14:22:28+00:00 |
cisco-sa-meraki-mx-vpn-dos-by-qwukqv7x | Cisco Meraki MX and Z Series Teleworker Gateway AnyConnect VPN Session Takeover and Denial of Service Vulnerability | 2024-10-02T16:00:00+00:00 | 2025-06-02T14:22:27+00:00 |
cisco-sa-webex-xss-7teqtfn8 | Cisco Webex Services Cross-Site Scripting Vulnerabilities | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
cisco-sa-webex-cache-q4xbkqbg | Cisco Webex Meetings Services HTTP Cache Poisoning Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
cisco-sa-sna-ssti-dpulqsmz | Cisco Secure Network Analytics Manager Privilege Escalation Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
cisco-sa-sna-apiacv-4b6x5ysw | Cisco Secure Network Analytics Manager API Authorization Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
cisco-sa-ise-restart-ss-uf986g2q | Cisco Identity Services Engine RADIUS Denial of Service Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
cisco-sa-duo-ssp-cmd-inj-rcmyrna | Cisco Duo Self-Service Portal Command Injection Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
cisco-sa-cuis-priv-esc-3pk96su4 | Cisco Unified Intelligence Center Privilege Escalation Vulnerabilities | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
cisco-sa-cucm-kkhzbhr5 | Cisco Unified Communications Products Privilege Escalation Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
cisco-sa-contcent-insuffacces-ardovhn8 | Cisco Unified Contact Center Enterprise Cloud Connect Insufficient Access Control Vulnerability | 2025-05-21T16:00:00+00:00 | 2025-05-21T16:00:00+00:00 |
ID | Description | Published | Updated |
---|---|---|---|
sca-2022-0012 | OpenSSL vulnerability affects multiple SICK SIMs | 2022-08-08T13:00:00.000Z | 2022-08-03T13:00:00.000Z |
sca-2022-0010 | Vulnerability in SICK Flexi Soft Designer & Safety Designer | 2022-05-16T10:00:00.000Z | 2022-07-19T10:00:00.000Z |
sca-2022-0011 | Vulnerabilities in SICK Package Analytics | 2022-06-08T15:00:00.000Z | 2022-06-08T15:00:00.000Z |
sca-2022-0009 | Vulnerability in SICK Flexi Soft PROFINET IO Gateway FX0-GPNT and SICK microScan3 PROFINET | 2022-04-29T15:00:00.000Z | 2022-04-29T15:00:00.000Z |
sca-2022-0008 | Vulnerability in SICK Gateways for Flexi Soft, Flexi Compact, SICK EFI Gateway UE4740, SICK microScan3 and outdoorScan3 | 2022-04-29T15:00:00.000Z | 2022-04-29T15:00:00.000Z |
sca-2022-0007 | Vulnerabilities in SICK MARSIC300 | 2022-04-21T15:00:00.000Z | 2022-04-21T15:00:00.000Z |
sca-2022-0006 | Vulnerability in SICK MSC800 | 2022-04-11T15:00:00.000Z | 2022-04-11T15:00:00.000Z |
sca-2022-0005 | Vulnerability in SICK Overall Equipment Effectiveness (OEE) | 2022-04-11T15:00:00.000Z | 2022-04-11T15:00:00.000Z |
sca-2022-0004 | Microsoft vulnerability affects multiple SICK IPCs with SICK MEAC | 2022-04-11T15:00:00.000Z | 2022-03-31T15:00:00.000Z |
sca-2022-0003 | Vulnerabilities in SICK FTMg | 2022-03-31T15:00:00.000Z | 2022-03-31T15:00:00.000Z |
sca-2022-0002 | PwnKit vulnerability affects multiple SICK IPCs | 2022-02-23T16:00:00.000Z | 2022-02-23T16:00:00.000Z |
sca-2022-0001 | Vulnerability in SICK FieldEcho | 2022-02-17T16:00:00.000Z | 2022-02-17T16:00:00.000Z |
sca-2021-0003 | SICK Security Advisory for Apache Log4j (CVE-2021-44228) | 2021-12-14T17:00:00.000Z | 2021-12-17T12:00:00.000Z |
sca-2021-0004 | Vulnerabilities in SICK SOPAS ET | 2021-12-16T08:00:00.000Z | 2021-12-17T08:00:00.000Z |
sca-2021-0002 | MEAC affected by Windows SMBv1 vulnerability | 2021-08-04T10:00:00.000Z | 2021-08-04T10:00:00.000Z |
sca-2021-0001 | Inadequate SSH configuration in SICK Visionary-S CX | 2021-06-25T10:00:00.000Z | 2021-06-25T10:00:00.000Z |
sca-2020-0005 | Package Analytics affected by Windows TCP/IP vulnerability | 2020-10-29T11:00:00.000Z | 2020-10-29T11:00:00.000Z |
sca-2020-0004 | Vulnerability in Platform Mechanism AutoIP | 2020-08-31T10:00:00.000Z | 2020-08-31T10:00:00.000Z |
sca-2020-0003 | MEAC affected by Windows SMBv3 vulnerability | 2020-08-07T10:00:00.000Z | 2020-08-07T10:00:00.000Z |
sca-2020-0002 | Vulnerabilities in SICK Package Analytics | 2020-08-07T10:00:00.000Z | 2020-07-28T10:00:00.000Z |
sca-2020-0001 | Security Information Regarding "Profile Programming" | 2020-05-31T10:00:00.000Z | 2020-05-31T10:00:00.000Z |
sca-2019-0002 | Vulnerability in SICK FX0-GENT00000 and SICK FX0-GPNT00000 | 2019-09-20T10:00:00.000Z | 2019-09-20T10:00:00.000Z |
sca-2019-0001 | MSC800 affected by hard-coded credentials vulnerability | 2019-06-21T10:00:00.000Z | 2019-06-21T10:00:00.000Z |
ID | Description | Published | Updated |
---|---|---|---|
msrc_cve-2025-53728 | Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-53727 | Microsoft SQL Server Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-53726 | Windows Push Notifications Apps Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-53725 | Windows Push Notifications Apps Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-53724 | Windows Push Notifications Apps Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-53723 | Windows Hyper-V Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-53722 | Windows Remote Desktop Services Denial of Service Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-53721 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-53720 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-53719 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-53718 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-53716 | Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-53156 | Windows Storage Port Driver Information Disclosure Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-53155 | Windows Hyper-V Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-53154 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-53153 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-53152 | Desktop Windows Manager Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-53151 | Windows Kernel Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-53149 | Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-53148 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-53147 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-53145 | Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-53144 | Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-53143 | Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-53142 | Microsoft Brokering File System Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-53141 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-53140 | Windows Kernel Transaction Manager Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-53138 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-53137 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-53136 | NT OS Kernel Information Disclosure Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
ID | Description | Published | Updated |
---|---|---|---|
jvndb-2025-007595 | Multiple vulnerabilities in Web Connection of Konica Minolta MFPs | 2025-07-01T14:02+09:00 | 2025-07-01T14:02+09:00 |
jvndb-2025-000046 | SLNX Help Documentation of RICOH Streamline NX vulnerable to reflected cross-site scripting | 2025-06-30T15:45+09:00 | 2025-06-30T15:45+09:00 |
jvndb-2025-007552 | Multiple vulnerabilities in TB-eye network recorders and AHD recorders | 2025-06-30T14:45+09:00 | 2025-06-30T14:45+09:00 |
jvndb-2024-004595 | Multiple vulnerabilities in FutureNet NXR series, VXR series and WXR series | 2024-07-29T17:51+09:00 | 2025-06-30T09:56+09:00 |
jvndb-2025-007521 | Multiple Brother driver installers for Windows vulnerable to privilege escalation | 2025-06-27T09:37+09:00 | 2025-06-27T09:37+09:00 |
jvndb-2025-007519 | Multiple vulnerabilities in multiple BROTHER products | 2025-06-26T18:15+09:00 | 2025-06-26T18:15+09:00 |
jvndb-2025-000043 | Multiple vulnerabilities in iroha Board | 2025-06-26T15:13+09:00 | 2025-06-26T15:13+09:00 |
jvndb-2025-000044 | Denial-of-service (DoS) vulnerabilities in multiple Apache products | 2025-06-26T14:41+09:00 | 2025-06-26T14:41+09:00 |
jvndb-2025-000042 | Inefficient regular expressions in GROWI | 2025-06-24T15:25+09:00 | 2025-06-24T15:25+09:00 |
jvndb-2025-000041 | Multiple vulnerabilities in ELECOM wireless LAN routers | 2025-06-24T14:50+09:00 | 2025-06-24T14:50+09:00 |
jvndb-2025-007390 | Trend Micro Internet Security and Trend Micro Maximum Security vulnerable to link following local privilege escalation (CVE-2025-49384, CVE-2025-49385) | 2025-06-24T11:18+09:00 | 2025-06-24T11:18+09:00 |
jvndb-2025-000040 | KCM3100 vulnerable to authentication bypass using an alternate path or channel | 2025-06-18T13:42+09:00 | 2025-06-18T13:42+09:00 |
jvndb-2025-000039 | Multiple vulnerabilities in RICOH Streamline NX PC Client | 2025-06-13T16:09+09:00 | 2025-06-13T16:09+09:00 |
jvndb-2025-000038 | UpdateNavi vulnerable to improper restriction of communication channel to intended endpoints | 2025-06-12T15:56+09:00 | 2025-06-12T15:56+09:00 |
jvndb-2025-000037 | Multiple surveillance cameras provided by i-PRO Co., Ltd. vulnerable to cross-site request forgery | 2025-06-06T13:56+09:00 | 2025-06-06T13:56+09:00 |
jvndb-2025-000036 | TimeWorks vulnerable to path traversal | 2025-06-03T15:35+09:00 | 2025-06-03T15:35+09:00 |
jvndb-2025-000035 | Improper file access permission settings in PC Time Tracer | 2025-06-03T14:40+09:00 | 2025-06-03T14:40+09:00 |
jvndb-2025-000034 | Multiple vulnerabilities in wivia 5 | 2025-05-30T15:57+09:00 | 2025-05-30T15:57+09:00 |
jvndb-2025-001238 | Multiple out-of-bounds write vulnerabilities in Canon Office/Small Office Multifunction Printers and Laser Printers | 2025-01-29T13:41+09:00 | 2025-05-27T16:06+09:00 |
jvndb-2025-000032 | Mailform Pro CGI generating error messages containing sensitive information | 2025-05-26T14:22+09:00 | 2025-05-26T14:22+09:00 |
jvndb-2025-000033 | Improper pattern file validation in i-FILTER optional feature 'Anti-Virus & Sandbox' | 2025-05-23T15:36+09:00 | 2025-05-23T15:36+09:00 |
jvndb-2025-005467 | Passback vulnerabilities in Canon Production Printers, Office/Small Office Multifunction Printers, and Laser Printers | 2025-05-22T15:03+09:00 | 2025-05-22T15:03+09:00 |
jvndb-2024-000117 | Stack-based buffer overflow vulnerability in multiple laser printers and MFPs which implement Ricoh Web Image Monitor | 2024-10-31T16:44+09:00 | 2025-05-19T17:59+09:00 |
jvndb-2025-005107 | Multiple vulnerabilities in V-SFT | 2025-05-16T14:32+09:00 | 2025-05-16T14:32+09:00 |
jvndb-2025-005057 | Multiple vulnerabilities in I-O DATA network attached hard disk 'HDL-T Series' | 2025-05-15T18:27+09:00 | 2025-05-15T18:27+09:00 |
jvndb-2025-005050 | Multiple vulnerabilities in a-blog cms | 2025-05-15T18:11+09:00 | 2025-05-15T18:11+09:00 |
jvndb-2025-000031 | Pgpool-II vulnerable to authentication bypass by primary weakness | 2025-05-15T16:14+09:00 | 2025-05-15T16:14+09:00 |
jvndb-2025-004863 | Panasonic IR Control Hub vulnerable to Unauthorised firmware loading | 2025-05-14T11:30+09:00 | 2025-05-14T11:30+09:00 |
jvndb-2025-004671 | Multiple vulnerabilities in GL-MT2500 and GL-MT2500A | 2025-05-12T17:52+09:00 | 2025-05-12T17:52+09:00 |
jvndb-2025-001016 | OMRON NJ/NX series vulnerable to path traversal | 2025-02-06T18:27+09:00 | 2025-05-08T17:44+09:00 |
ID | Description |
---|---|
ts-2022-002 | TS-2022-002 |
ts-2022-001 | TS-2022-001 |
ID | Description | Published | Updated |
---|---|---|---|
suse-su-2025:02779-1 | Security update for slurm | 2025-08-13T06:57:34Z | 2025-08-13T06:57:34Z |
suse-su-2025:02778-1 | Security update for python3 | 2025-08-13T06:46:17Z | 2025-08-13T06:46:17Z |
suse-su-2025:02777-1 | Security update for webkit2gtk3 | 2025-08-13T06:44:04Z | 2025-08-13T06:44:04Z |
suse-su-2025:02423-2 | Security update for kubernetes1.23 | 2025-08-13T00:10:52Z | 2025-08-13T00:10:52Z |
suse-su-2025:02773-1 | Security update for libgcrypt | 2025-08-13T00:10:27Z | 2025-08-13T00:10:27Z |
suse-su-2025:02772-1 | Recommended update for grub2 | 2025-08-12T17:35:34Z | 2025-08-12T17:35:34Z |
suse-su-2025:02771-1 | Security update for tiff | 2025-08-12T13:50:53Z | 2025-08-12T13:50:53Z |
suse-su-2025:02770-1 | Security update for tiff | 2025-08-12T13:50:14Z | 2025-08-12T13:50:14Z |
suse-su-2025:02769-1 | Security update for amber-cli | 2025-08-12T13:49:30Z | 2025-08-12T13:49:30Z |
suse-su-2025:02768-1 | Security update for sccache | 2025-08-12T13:01:12Z | 2025-08-12T13:01:12Z |
suse-su-2025:02767-1 | Security update for python313 | 2025-08-12T13:01:00Z | 2025-08-12T13:01:00Z |
suse-su-2025:02766-1 | Security update for webkit2gtk3 | 2025-08-12T13:00:40Z | 2025-08-12T13:00:40Z |
suse-su-2025:02765-1 | Security update for webkit2gtk3 | 2025-08-12T12:59:26Z | 2025-08-12T12:59:26Z |
suse-su-2025:02762-1 | Security update for eclipse-jgit | 2025-08-12T12:45:02Z | 2025-08-12T12:45:02Z |
suse-su-2025:02760-1 | Security update for go1.24 | 2025-08-12T12:08:24Z | 2025-08-12T12:08:24Z |
suse-su-2025:02759-1 | Security update for go1.23 | 2025-08-12T12:06:25Z | 2025-08-12T12:06:25Z |
suse-su-2025:02758-1 | Security update for libxml2 | 2025-08-12T10:05:26Z | 2025-08-12T10:05:26Z |
suse-su-2025:02756-1 | Security update for libgcrypt | 2025-08-12T08:23:08Z | 2025-08-12T08:23:08Z |
suse-su-2025:02755-1 | Security update for libssh | 2025-08-12T07:35:23Z | 2025-08-12T07:35:23Z |
suse-su-2025:02754-1 | Security update for opensc | 2025-08-12T07:35:08Z | 2025-08-12T07:35:08Z |
suse-su-2025:02752-1 | Security update for libgcrypt | 2025-08-11T13:15:24Z | 2025-08-11T13:15:24Z |
suse-su-2025:02751-1 | Security update for ImageMagick | 2025-08-11T13:14:11Z | 2025-08-11T13:14:11Z |
suse-su-2025:01786-2 | Security update for postgresql14 | 2025-08-11T12:43:59Z | 2025-08-11T12:43:59Z |
suse-su-2025:01782-2 | Security update for postgresql16 | 2025-08-11T12:42:58Z | 2025-08-11T12:42:58Z |
suse-su-2025:02749-1 | Security update for iperf | 2025-08-11T07:06:39Z | 2025-08-11T07:06:39Z |
suse-su-2025:02746-1 | Security update for zabbix | 2025-08-11T06:20:26Z | 2025-08-11T06:20:26Z |
suse-su-2025:02745-1 | Security update for tomcat | 2025-08-11T06:20:12Z | 2025-08-11T06:20:12Z |
suse-su-2025:02744-1 | Security update for sqlite3 | 2025-08-08T12:41:39Z | 2025-08-08T12:41:39Z |
suse-su-2025:02740-1 | Security update for tgt | 2025-08-08T09:11:54Z | 2025-08-08T09:11:54Z |
suse-su-2025:02739-1 | Security update for ruby2.5 | 2025-08-08T09:11:19Z | 2025-08-08T09:11:19Z |
ID | Description | Published | Updated |
---|---|---|---|
opensuse-su-2025:15426-1 | keylime-ima-policy-0.2.7+141-1.1 on GA media | 2025-08-08T00:00:00Z | 2025-08-08T00:00:00Z |
opensuse-su-2025:15425-1 | himmelblau-1.2.0+git.0.6befefc-1.1 on GA media | 2025-08-08T00:00:00Z | 2025-08-08T00:00:00Z |
opensuse-su-2025:15424-1 | govulncheck-vulndb-0.0.20250807T150727-1.1 on GA media | 2025-08-08T00:00:00Z | 2025-08-08T00:00:00Z |
opensuse-su-2025:15423-1 | go1.24-1.24.6-1.1 on GA media | 2025-08-08T00:00:00Z | 2025-08-08T00:00:00Z |
opensuse-su-2025:15422-1 | go1.23-1.23.12-1.1 on GA media | 2025-08-08T00:00:00Z | 2025-08-08T00:00:00Z |
opensuse-su-2025:15421-1 | chromedriver-139.0.7258.66-1.1 on GA media | 2025-08-08T00:00:00Z | 2025-08-08T00:00:00Z |
opensuse-su-2025:15420-1 | go1.25-1.25rc3-1.1 on GA media | 2025-08-07T00:00:00Z | 2025-08-07T00:00:00Z |
opensuse-su-2025:15419-1 | traefik2-2.11.28-1.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
opensuse-su-2025:15418-1 | traefik-3.5.0-1.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
opensuse-su-2025:15417-1 | libtiff-devel-32bit-4.7.0-7.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
opensuse-su-2025:15416-1 | libpoppler-cpp2-25.08.0-1.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
opensuse-su-2025:15415-1 | libIex-3_3-32-3.3.5-1.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
opensuse-su-2025:15414-1 | iperf-3.19.1-1.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
opensuse-su-2025:15413-1 | ghostscript-10.05.1-1.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
opensuse-su-2025:15412-1 | agama-17+60.68fdb92ec-26.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
opensuse-su-2025:15411-1 | gnutls-3.8.10-1.1 on GA media | 2025-08-05T00:00:00Z | 2025-08-05T00:00:00Z |
opensuse-su-2025:15410-1 | erlang-rabbitmq-client-3.13.7-5.1 on GA media | 2025-08-04T00:00:00Z | 2025-08-04T00:00:00Z |
opensuse-su-2025:15409-1 | python313-3.13.5-4.1 on GA media | 2025-08-04T00:00:00Z | 2025-08-04T00:00:00Z |
opensuse-su-2025:15408-1 | python312-3.12.11-4.1 on GA media | 2025-08-04T00:00:00Z | 2025-08-04T00:00:00Z |
opensuse-su-2025:15407-1 | python311-3.11.13-4.1 on GA media | 2025-08-04T00:00:00Z | 2025-08-04T00:00:00Z |
opensuse-su-2025:15406-1 | kubeshark-cli-52.8.0-1.1 on GA media | 2025-08-04T00:00:00Z | 2025-08-04T00:00:00Z |
opensuse-su-2025:15405-1 | govulncheck-vulndb-0.0.20250730T213748-1.1 on GA media | 2025-08-04T00:00:00Z | 2025-08-04T00:00:00Z |
opensuse-su-2025:15404-1 | python39-3.9.23-4.1 on GA media | 2025-08-03T00:00:00Z | 2025-08-03T00:00:00Z |
opensuse-su-2025:15403-1 | python314-3.14.0~rc1-2.1 on GA media | 2025-08-03T00:00:00Z | 2025-08-03T00:00:00Z |
opensuse-su-2025:15402-1 | python310-3.10.18-4.1 on GA media | 2025-08-03T00:00:00Z | 2025-08-03T00:00:00Z |
opensuse-su-2025:15401-1 | liblua5_5-5-5.5.0~beta1-1.1 on GA media | 2025-08-03T00:00:00Z | 2025-08-03T00:00:00Z |
opensuse-su-2025:15400-1 | grub2-2.12-56.1 on GA media | 2025-08-03T00:00:00Z | 2025-08-03T00:00:00Z |
opensuse-su-2025:15399-1 | chromedriver-138.0.7204.183-1.1 on GA media | 2025-08-01T00:00:00Z | 2025-08-01T00:00:00Z |
opensuse-su-2025:15398-1 | kwctl-1.27.1-1.1 on GA media | 2025-07-31T00:00:00Z | 2025-07-31T00:00:00Z |
opensuse-su-2025:15397-1 | gdk-pixbuf-devel-2.42.12-4.1 on GA media | 2025-07-31T00:00:00Z | 2025-07-31T00:00:00Z |