Recent vulnerabilities
ID | CVSS | Description | Vendor | Product | Published | Updated |
---|---|---|---|---|---|---|
cve-2023-37405 | 6.5 (v3.1) | IBM Cloud Pak System information disclosure |
IBM |
Cloud Pak System |
2025-03-27T17:20:04.260Z | 2025-08-17T01:14:54.449Z |
cve-2023-38272 | 5.9 (v3.1) | IBM Cloud Pak System information disclosure |
IBM |
Cloud Pak System |
2025-03-27T17:21:08.596Z | 2025-08-17T01:11:50.459Z |
cve-2023-38007 | 5.4 (v3.1) | IBM Cloud Pak System HTML injection |
IBM |
Cloud Pak System |
2025-06-27T14:48:28.581Z | 2025-08-17T00:24:09.866Z |
cve-2023-47160 | 8.2 (v3.1) | IBM Cognos Controller XML external entity injection |
IBM |
Cognos Controller |
2025-02-19T16:20:09.058Z | 2025-08-17T00:10:00.333Z |
cve-2023-42007 | 5.4 (v3.1) | IBM Sterling Control Center cross-site scripting |
IBM |
Sterling Control Center |
2025-04-10T13:24:46.308Z | 2025-08-17T00:09:35.887Z |
cve-2023-27272 | 3.1 (v3.1) | IBM Aspera Console weak password requirements |
IBM |
Aspera Console |
2025-04-14T20:38:20.988Z | 2025-08-17T00:08:48.731Z |
cve-2023-35894 | 5.4 (v3.1) | IBM Control Center HOST header injection |
IBM |
Control Center |
2025-03-07T16:47:52.841Z | 2025-08-17T00:08:13.891Z |
cve-2023-43035 | 4 (v3.1) | IBM Sterling Control Center information disclosure |
IBM |
Sterling Control Center |
2025-04-10T13:26:44.672Z | 2025-08-17T00:05:25.920Z |
cve-2023-43039 | 6.1 (v3.1) | IBM OpenPages with Watson cross-site scripting |
IBM |
OpenPages with Watson |
2025-07-08T18:25:54.730Z | 2025-08-17T00:04:37.335Z |
cve-2023-43029 | 6.8 (v3.1) | IBM Storage Virtualize vSphere Remote Plug-in informat… |
IBM |
Storage Virtualize vSphere Remote Plug-in |
2025-03-21T15:33:51.807Z | 2025-08-17T00:03:33.951Z |
cve-2023-43037 | 6.5 (v3.1) | IBM Maximo Application Suite improper access control |
IBM |
Maximo Application Suite |
2025-04-10T13:19:47.338Z | 2025-08-16T23:43:52.116Z |
cve-2023-43052 | 5.3 (v3.1) | IBM Control Center external service interaction |
IBM |
Control Center |
2025-03-07T16:55:51.661Z | 2025-08-16T23:43:09.959Z |
cve-2023-33861 | 6.5 (v3.1) | IBM Security ReaQta improper certificate validation |
IBM |
Security ReaQta EDR |
2025-05-20T14:51:23.748Z | 2025-08-16T23:42:45.090Z |
cve-2023-33844 | 5.4 (v3.1) | IBM Security Verify Governance cross-site scripting |
IBM |
Security Verify Governance |
2025-04-09T14:03:58.894Z | 2025-08-16T23:42:11.334Z |
cve-2024-38341 | 5.9 (v3.1) | IBM Sterling Secure Proxy information disclosure |
IBM |
Sterling Secure Proxy |
2025-05-28T15:21:00.248Z | 2025-08-16T23:41:17.022Z |
cve-2025-9089 | Tenda AC20 SetIpMacBind sub_48E628 stack-based overflow |
Tenda |
AC20 |
2025-08-16T23:32:07.804Z | 2025-08-16T23:32:07.804Z | |
cve-2025-9088 | Tenda AC20 formSetVirtualSer save_virtualser_data stac… |
Tenda |
AC20 |
2025-08-16T23:02:07.777Z | 2025-08-16T23:02:07.777Z | |
cve-2025-9087 | Tenda AC20 SetNetControlList Endpoint set_qosMib_list … |
Tenda |
AC20 |
2025-08-16T22:32:07.366Z | 2025-08-16T22:32:07.366Z | |
cve-2025-23266 | 9 (v3.1) | NVIDIA Container Toolkit for all platforms contai… |
NVIDIA |
Container Toolkit |
2025-07-17T19:08:21.352Z | 2025-08-16T21:33:32.242Z |
cve-2023-3867 | N/A | ksmbd: fix out of bounds read in smb2_sess_setup |
Linux |
Linux |
2025-08-16T13:29:51.946Z | 2025-08-16T13:29:51.946Z |
cve-2023-4130 | N/A | ksmbd: fix wrong next length validation of ea buffer i… |
Linux |
Linux |
2025-08-16T13:27:58.227Z | 2025-08-16T13:27:58.227Z |
cve-2023-3866 | N/A | ksmbd: validate session id and tree id in the compound… |
Linux |
Linux |
2025-08-16T13:27:57.332Z | 2025-08-16T13:27:57.332Z |
cve-2023-3865 | N/A | ksmbd: fix out-of-bound read in smb2_write |
Linux |
Linux |
2025-08-16T13:27:56.403Z | 2025-08-16T13:27:56.403Z |
cve-2023-4515 | N/A | ksmbd: validate command request size |
Linux |
Linux |
2025-08-16T13:25:50.562Z | 2025-08-16T13:25:50.562Z |
cve-2023-32249 | N/A | ksmbd: not allow guest user on multichannel |
Linux |
Linux |
2025-08-16T13:25:49.645Z | 2025-08-16T13:25:49.645Z |
cve-2023-32246 | N/A | ksmbd: call rcu_barrier() in ksmbd_server_exit() |
Linux |
Linux |
2025-08-16T13:22:09.212Z | 2025-08-16T13:22:09.212Z |
cve-2025-38552 | N/A | mptcp: plug races between subflow fail and subflow creation |
Linux |
Linux |
2025-08-16T11:34:20.455Z | 2025-08-16T11:34:20.455Z |
cve-2025-38551 | N/A | virtio-net: fix recursived rtnl_lock() during probe() |
Linux |
Linux |
2025-08-16T11:34:19.544Z | 2025-08-16T11:34:19.544Z |
cve-2025-38550 | N/A | ipv6: mcast: Delay put pmc->idev in mld_del_delrec() |
Linux |
Linux |
2025-08-16T11:34:18.619Z | 2025-08-16T11:34:18.619Z |
cve-2025-38549 | N/A | efivarfs: Fix memory leak of efivarfs_fs_info in fs_co… |
Linux |
Linux |
2025-08-16T11:34:17.699Z | 2025-08-16T11:34:17.699Z |
ID | CVSS | Description | Vendor | Product | Published | Updated |
---|---|---|---|---|---|---|
cve-2025-38543 | N/A | drm/tegra: nvdec: Fix dma_alloc_coherent error check |
Linux |
Linux |
2025-08-16T11:22:17.619Z | 2025-08-16T11:22:17.619Z |
cve-2025-38542 | N/A | net: appletalk: Fix device refcount leak in atrtr_create() |
Linux |
Linux |
2025-08-16T11:22:16.689Z | 2025-08-16T11:22:16.689Z |
cve-2025-38541 | N/A | wifi: mt76: mt7925: Fix null-ptr-deref in mt7925_therm… |
Linux |
Linux |
2025-08-16T11:22:15.776Z | 2025-08-16T11:22:15.776Z |
cve-2025-38540 | N/A | HID: quirks: Add quirk for 2 Chicony Electronics HP 5M… |
Linux |
Linux |
2025-08-16T11:22:14.773Z | 2025-08-16T11:22:14.773Z |
cve-2025-38539 | N/A | tracing: Add down_write(trace_event_sem) when adding t… |
Linux |
Linux |
2025-08-16T11:12:31.678Z | 2025-08-16T11:12:31.678Z |
cve-2025-38538 | N/A | dmaengine: nbpfaxi: Fix memory corruption in probe() |
Linux |
Linux |
2025-08-16T11:12:30.878Z | 2025-08-16T11:12:30.878Z |
cve-2025-38537 | N/A | net: phy: Don't register LEDs for genphy |
Linux |
Linux |
2025-08-16T11:12:29.432Z | 2025-08-16T11:12:29.432Z |
cve-2025-38536 | N/A | net: airoha: fix potential use-after-free in airoha_np… |
Linux |
Linux |
2025-08-16T11:12:28.627Z | 2025-08-16T11:12:28.627Z |
cve-2025-38535 | N/A | phy: tegra: xusb: Fix unbalanced regulator disable in … |
Linux |
Linux |
2025-08-16T11:12:27.873Z | 2025-08-16T11:12:27.873Z |
cve-2025-38534 | N/A | netfs: Fix copy-to-cache so that it performs collectio… |
Linux |
Linux |
2025-08-16T11:12:27.014Z | 2025-08-16T11:12:27.014Z |
cve-2025-38533 | N/A | net: libwx: fix the using of Rx buffer DMA |
Linux |
Linux |
2025-08-16T11:12:25.978Z | 2025-08-16T11:12:25.978Z |
cve-2025-38532 | N/A | net: libwx: properly reset Rx ring descriptor |
Linux |
Linux |
2025-08-16T11:12:25.161Z | 2025-08-16T11:12:25.161Z |
cve-2025-38531 | N/A | iio: common: st_sensors: Fix use of uninitialize devic… |
Linux |
Linux |
2025-08-16T11:12:24.405Z | 2025-08-16T11:12:24.405Z |
cve-2025-38530 | N/A | comedi: pcl812: Fix bit shift out of bounds |
Linux |
Linux |
2025-08-16T11:12:23.368Z | 2025-08-16T11:12:23.368Z |
cve-2025-38529 | N/A | comedi: aio_iiro_16: Fix bit shift out of bounds |
Linux |
Linux |
2025-08-16T11:12:22.447Z | 2025-08-16T11:12:22.447Z |
cve-2025-38528 | N/A | bpf: Reject %p% format string in bprintf-like helpers |
Linux |
Linux |
2025-08-16T11:12:21.667Z | 2025-08-16T11:12:21.667Z |
cve-2025-38527 | N/A | smb: client: fix use-after-free in cifs_oplock_break |
Linux |
Linux |
2025-08-16T11:12:20.843Z | 2025-08-16T11:12:20.843Z |
cve-2025-38526 | N/A | ice: add NULL check in eswitch lag check |
Linux |
Linux |
2025-08-16T11:12:20.036Z | 2025-08-16T11:12:20.036Z |
cve-2025-38525 | N/A | rxrpc: Fix irq-disabled in local_bh_enable() |
Linux |
Linux |
2025-08-16T11:12:19.191Z | 2025-08-16T11:12:19.191Z |
cve-2025-38524 | N/A | rxrpc: Fix recv-recv race of completed call |
Linux |
Linux |
2025-08-16T11:12:18.314Z | 2025-08-16T11:12:18.314Z |
cve-2025-38523 | N/A | cifs: Fix the smbd_response slab to allow usercopy |
Linux |
Linux |
2025-08-16T11:12:17.254Z | 2025-08-16T11:12:17.254Z |
cve-2025-38522 | N/A | sched/ext: Prevent update_locked_rq() calls with NULL rq |
Linux |
Linux |
2025-08-16T11:12:11.304Z | 2025-08-16T11:12:11.304Z |
cve-2025-9092 | 1 (v4.0) | Hybrid Module Deployment in Multi-JVM Environments Lea… |
Legion of the Bouncy Castle Inc. |
Bouncy Castle for Java - BC-FJA 2.1.0 |
2025-08-16T10:29:59.417Z | 2025-08-16T10:29:59.417Z |
cve-2025-38521 | N/A | drm/imagination: Fix kernel crash when hard resetting … |
Linux |
Linux |
2025-08-16T10:55:08.373Z | 2025-08-16T10:55:08.373Z |
cve-2025-38520 | N/A | drm/amdkfd: Don't call mmput from MMU notifier callback |
Linux |
Linux |
2025-08-16T10:55:07.114Z | 2025-08-16T10:55:07.114Z |
cve-2025-38519 | N/A | mm/damon: fix divide by zero in damon_get_intervals_score() |
Linux |
Linux |
2025-08-16T10:55:06.083Z | 2025-08-16T10:55:06.083Z |
cve-2025-38518 | N/A | x86/CPU/AMD: Disable INVLPGB on Zen2 |
Linux |
Linux |
2025-08-16T10:55:05.039Z | 2025-08-16T10:55:05.039Z |
cve-2025-38517 | N/A | lib/alloc_tag: do not acquire non-existent lock in all… |
Linux |
Linux |
2025-08-16T10:55:04.217Z | 2025-08-16T10:55:04.217Z |
cve-2025-38516 | N/A | pinctrl: qcom: msm: mark certain pins as invalid for i… |
Linux |
Linux |
2025-08-16T10:55:03.161Z | 2025-08-16T10:55:03.161Z |
cve-2025-38515 | N/A | drm/sched: Increment job count before swapping tail sp… |
Linux |
Linux |
2025-08-16T10:55:02.173Z | 2025-08-16T10:55:02.173Z |
ID | Description | Published | Updated |
---|---|---|---|
fkie_cve-2025-38542 | In the Linux kernel, the following vulnerability has been resolved: net: appletalk: Fix device ref… | 2025-08-16T12:15:30.083 | 2025-08-16T12:15:30.083 |
fkie_cve-2025-38541 | In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7925: Fix null-p… | 2025-08-16T12:15:29.957 | 2025-08-16T12:15:29.957 |
fkie_cve-2025-38540 | In the Linux kernel, the following vulnerability has been resolved: HID: quirks: Add quirk for 2 C… | 2025-08-16T12:15:29.830 | 2025-08-16T12:15:29.830 |
fkie_cve-2025-38539 | In the Linux kernel, the following vulnerability has been resolved: tracing: Add down_write(trace_… | 2025-08-16T12:15:29.717 | 2025-08-16T12:15:29.717 |
fkie_cve-2025-38538 | In the Linux kernel, the following vulnerability has been resolved: dmaengine: nbpfaxi: Fix memory… | 2025-08-16T12:15:29.593 | 2025-08-16T12:15:29.593 |
fkie_cve-2025-38537 | In the Linux kernel, the following vulnerability has been resolved: net: phy: Don't register LEDs … | 2025-08-16T12:15:29.467 | 2025-08-16T12:15:29.467 |
fkie_cve-2025-38536 | In the Linux kernel, the following vulnerability has been resolved: net: airoha: fix potential use… | 2025-08-16T12:15:29.347 | 2025-08-16T12:15:29.347 |
fkie_cve-2025-38535 | In the Linux kernel, the following vulnerability has been resolved: phy: tegra: xusb: Fix unbalanc… | 2025-08-16T12:15:29.217 | 2025-08-16T12:15:29.217 |
fkie_cve-2025-38534 | In the Linux kernel, the following vulnerability has been resolved: netfs: Fix copy-to-cache so th… | 2025-08-16T12:15:29.087 | 2025-08-16T12:15:29.087 |
fkie_cve-2025-38533 | In the Linux kernel, the following vulnerability has been resolved: net: libwx: fix the using of R… | 2025-08-16T12:15:28.957 | 2025-08-16T12:15:28.957 |
fkie_cve-2025-38532 | In the Linux kernel, the following vulnerability has been resolved: net: libwx: properly reset Rx … | 2025-08-16T12:15:28.823 | 2025-08-16T12:15:28.823 |
fkie_cve-2025-38531 | In the Linux kernel, the following vulnerability has been resolved: iio: common: st_sensors: Fix u… | 2025-08-16T12:15:28.693 | 2025-08-16T12:15:28.693 |
fkie_cve-2025-38530 | In the Linux kernel, the following vulnerability has been resolved: comedi: pcl812: Fix bit shift … | 2025-08-16T12:15:28.570 | 2025-08-16T12:15:28.570 |
fkie_cve-2025-38529 | In the Linux kernel, the following vulnerability has been resolved: comedi: aio_iiro_16: Fix bit s… | 2025-08-16T12:15:28.443 | 2025-08-16T12:15:28.443 |
fkie_cve-2025-38528 | In the Linux kernel, the following vulnerability has been resolved: bpf: Reject %p% format string … | 2025-08-16T12:15:28.313 | 2025-08-16T12:15:28.313 |
fkie_cve-2025-38527 | In the Linux kernel, the following vulnerability has been resolved: smb: client: fix use-after-fre… | 2025-08-16T12:15:28.183 | 2025-08-16T12:15:28.183 |
fkie_cve-2025-38526 | In the Linux kernel, the following vulnerability has been resolved: ice: add NULL check in eswitch… | 2025-08-16T12:15:28.060 | 2025-08-16T12:15:28.060 |
fkie_cve-2025-38525 | In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix irq-disabled in loc… | 2025-08-16T12:15:27.933 | 2025-08-16T12:15:27.933 |
fkie_cve-2025-38524 | In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix recv-recv race of c… | 2025-08-16T12:15:27.800 | 2025-08-16T12:15:27.800 |
fkie_cve-2025-38523 | In the Linux kernel, the following vulnerability has been resolved: cifs: Fix the smbd_response sl… | 2025-08-16T12:15:27.667 | 2025-08-16T12:15:27.667 |
fkie_cve-2025-38522 | In the Linux kernel, the following vulnerability has been resolved: sched/ext: Prevent update_lock… | 2025-08-16T12:15:27.523 | 2025-08-16T12:15:27.523 |
fkie_cve-2025-9092 | Uncontrolled Resource Consumption vulnerability in Legion of the Bouncy Castle Inc. Bouncy Castle f… | 2025-08-16T11:15:45.540 | 2025-08-16T11:15:45.540 |
fkie_cve-2025-38521 | In the Linux kernel, the following vulnerability has been resolved: drm/imagination: Fix kernel cr… | 2025-08-16T11:15:45.413 | 2025-08-16T11:15:45.413 |
fkie_cve-2025-38520 | In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Don't call mmput f… | 2025-08-16T11:15:45.283 | 2025-08-16T11:15:45.283 |
fkie_cve-2025-38519 | In the Linux kernel, the following vulnerability has been resolved: mm/damon: fix divide by zero i… | 2025-08-16T11:15:45.160 | 2025-08-16T11:15:45.160 |
fkie_cve-2025-38518 | In the Linux kernel, the following vulnerability has been resolved: x86/CPU/AMD: Disable INVLPGB o… | 2025-08-16T11:15:45.020 | 2025-08-16T11:15:45.020 |
fkie_cve-2025-38517 | In the Linux kernel, the following vulnerability has been resolved: lib/alloc_tag: do not acquire … | 2025-08-16T11:15:44.897 | 2025-08-16T11:15:44.897 |
fkie_cve-2025-38516 | In the Linux kernel, the following vulnerability has been resolved: pinctrl: qcom: msm: mark certa… | 2025-08-16T11:15:44.763 | 2025-08-16T11:15:44.763 |
fkie_cve-2025-38515 | In the Linux kernel, the following vulnerability has been resolved: drm/sched: Increment job count… | 2025-08-16T11:15:44.637 | 2025-08-16T11:15:44.637 |
fkie_cve-2025-38514 | In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix oops due to non-exi… | 2025-08-16T11:15:44.510 | 2025-08-16T11:15:44.510 |
ID | Description | Published | Updated |
---|---|---|---|
ghsa-vjcw-7f57-9vvv | In the Linux kernel, the following vulnerability has been resolved: kasan: remove kasan_find_vm_ar… | 2025-08-16T12:30:32Z | 2025-08-16T12:30:32Z |
ghsa-vcxg-6r55-jcpr | In the Linux kernel, the following vulnerability has been resolved: wifi: mwifiex: discard erroneo… | 2025-08-16T12:30:32Z | 2025-08-16T12:30:32Z |
ghsa-vc22-mx78-4mgj | In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix oops due to non-exi… | 2025-08-16T12:30:32Z | 2025-08-16T12:30:32Z |
ghsa-v6cf-mv9h-c8mc | Uncontrolled Resource Consumption vulnerability in Legion of the Bouncy Castle Inc. Bouncy Castle f… | 2025-08-16T12:30:32Z | 2025-08-16T12:30:32Z |
ghsa-qmw3-6h2f-2gvh | In the Linux kernel, the following vulnerability has been resolved: net: libwx: fix the using of R… | 2025-08-16T12:30:32Z | 2025-08-16T12:30:32Z |
ghsa-q44j-p422-qjh5 | In the Linux kernel, the following vulnerability has been resolved: bpf: Reject %p% format string … | 2025-08-16T12:30:32Z | 2025-08-16T12:30:32Z |
ghsa-pm7p-wjq9-6m43 | In the Linux kernel, the following vulnerability has been resolved: btrfs: fix assertion when buil… | 2025-08-16T12:30:32Z | 2025-08-16T12:30:32Z |
ghsa-p2wm-x2jh-86vj | In the Linux kernel, the following vulnerability has been resolved: x86/sev: Use TSC_FACTOR for Se… | 2025-08-16T12:30:32Z | 2025-08-16T12:30:32Z |
ghsa-mvcj-x699-wrp4 | In the Linux kernel, the following vulnerability has been resolved: mm/damon: fix divide by zero i… | 2025-08-16T12:30:32Z | 2025-08-16T12:30:32Z |
ghsa-jqcq-x2c2-xp7j | In the Linux kernel, the following vulnerability has been resolved: comedi: aio_iiro_16: Fix bit s… | 2025-08-16T12:30:32Z | 2025-08-16T12:30:32Z |
ghsa-j2mv-rj6m-hq85 | In the Linux kernel, the following vulnerability has been resolved: comedi: pcl812: Fix bit shift … | 2025-08-16T12:30:32Z | 2025-08-16T12:30:32Z |
ghsa-hxq3-8p4p-wv7w | In the Linux kernel, the following vulnerability has been resolved: wifi: prevent A-MSDU attacks i… | 2025-08-16T12:30:32Z | 2025-08-16T12:30:32Z |
ghsa-hm6q-hprh-4f22 | In the Linux kernel, the following vulnerability has been resolved: smb: client: fix use-after-fre… | 2025-08-16T12:30:32Z | 2025-08-16T12:30:32Z |
ghsa-h6rm-fwmf-3cqc | In the Linux kernel, the following vulnerability has been resolved: wifi: zd1211rw: Fix potential … | 2025-08-16T12:30:32Z | 2025-08-16T12:30:32Z |
ghsa-f2wc-6g38-9vmc | In the Linux kernel, the following vulnerability has been resolved: ice: add NULL check in eswitch… | 2025-08-16T12:30:32Z | 2025-08-16T12:30:32Z |
ghsa-f266-g682-96xf | In the Linux kernel, the following vulnerability has been resolved: iio: common: st_sensors: Fix u… | 2025-08-16T12:30:32Z | 2025-08-16T12:30:32Z |
ghsa-9rxx-pq63-85w7 | In the Linux kernel, the following vulnerability has been resolved: drm/imagination: Fix kernel cr… | 2025-08-16T12:30:32Z | 2025-08-16T12:30:32Z |
ghsa-964p-9vqv-9rhv | In the Linux kernel, the following vulnerability has been resolved: x86/CPU/AMD: Disable INVLPGB o… | 2025-08-16T12:30:32Z | 2025-08-16T12:30:32Z |
ghsa-8w9j-8c65-frh3 | In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Don't call mmput f… | 2025-08-16T12:30:32Z | 2025-08-16T12:30:32Z |
ghsa-8mqg-35g3-7pvm | In the Linux kernel, the following vulnerability has been resolved: sched/ext: Prevent update_lock… | 2025-08-16T12:30:32Z | 2025-08-16T12:30:32Z |
ghsa-8mcg-xrhw-92v3 | In the Linux kernel, the following vulnerability has been resolved: KVM: Allow CPU to reschedule w… | 2025-08-16T12:30:32Z | 2025-08-16T12:30:32Z |
ghsa-864c-jv4g-gp7q | In the Linux kernel, the following vulnerability has been resolved: lib/alloc_tag: do not acquire … | 2025-08-16T12:30:32Z | 2025-08-16T12:30:32Z |
ghsa-7gjj-mw46-368m | In the Linux kernel, the following vulnerability has been resolved: HID: nintendo: avoid bluetooth… | 2025-08-16T12:30:32Z | 2025-08-16T12:30:32Z |
ghsa-6x2c-jc67-wp74 | In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix irq-disabled in loc… | 2025-08-16T12:30:32Z | 2025-08-16T12:30:32Z |
ghsa-6wqf-m4v2-8ppm | In the Linux kernel, the following vulnerability has been resolved: drm/sched: Increment job count… | 2025-08-16T12:30:32Z | 2025-08-16T12:30:32Z |
ghsa-6rpm-59f8-4x64 | In the Linux kernel, the following vulnerability has been resolved: netfs: Fix copy-to-cache so th… | 2025-08-16T12:30:32Z | 2025-08-16T12:30:32Z |
ghsa-6fwg-c2rw-7c32 | In the Linux kernel, the following vulnerability has been resolved: io_uring/zcrx: fix pp destruct… | 2025-08-16T12:30:32Z | 2025-08-16T12:30:32Z |
ghsa-59vp-pw3x-2g3w | In the Linux kernel, the following vulnerability has been resolved: drm/xe/pf: Clear all LMTT page… | 2025-08-16T12:30:32Z | 2025-08-16T12:30:32Z |
ghsa-569j-76w5-38vw | In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix recv-recv race of c… | 2025-08-16T12:30:32Z | 2025-08-16T12:30:32Z |
ghsa-4x9v-h3r3-c3mf | In the Linux kernel, the following vulnerability has been resolved: cifs: Fix the smbd_response sl… | 2025-08-16T12:30:32Z | 2025-08-16T12:30:32Z |
ID | Description | Package | Published | Updated |
---|---|---|---|---|
pysec-2025-34 | The unsafe globals in Picklescan before 0.0.25 do not include ssl. Consequently, ssl.get_… | picklescan | 2025-04-24T01:15:49+00:00 | 2025-04-24T03:08:15.436691+00:00 |
pysec-2025-33 | Vyper is a Pythonic Smart Contract Language for the EVM. When the Vyper Compiler uses the… | vyper | 2025-01-14T18:16:05+00:00 | 2025-04-23T21:23:01.322686+00:00 |
pysec-2025-32 | BentoML is a Python library for building online serving systems optimized for AI apps and… | bentoml | 2025-04-09T16:15:25+00:00 | 2025-04-22T19:21:34.073355+00:00 |
pysec-2025-31 | vyper is a Pythonic Smart Contract Language for the EVM. Vyper handles AugAssign statemen… | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.116292+00:00 |
pysec-2025-30 | vyper is a Pythonic Smart Contract Language for the EVM. Multiple evaluation of a single … | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.064106+00:00 |
pysec-2025-29 | vyper is a Pythonic Smart Contract Language for the EVM. Vyper `sqrt()` builtin uses the … | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.005382+00:00 |
pysec-2025-28 | The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.772920+00:00 |
pysec-2025-27 | The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.711157+00:00 |
pysec-2025-26 | The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.645758+00:00 |
pysec-2021-891 | CWE - CWE-287: Improper Authentication vulnerability in SUSE Linux Enterprise Server 15 S… | salt | 2021-03-03T10:15:13+00:00 | 2025-04-09T17:27:27.582884+00:00 |
pysec-2025-25 | Rembg is a tool to remove images background. In Rembg 2.0.57 and earlier, the CORS middle… | rembg | 2025-03-03T17:15:14+00:00 | 2025-04-09T17:27:27.532849+00:00 |
pysec-2025-24 | Rembg is a tool to remove images background. In Rembg 2.0.57 and earlier, the /api/remove… | rembg | 2025-03-03T17:15:14+00:00 | 2025-04-09T17:27:27.486485+00:00 |
pysec-2025-23 | Versions of the package ray before 2.43.0 are vulnerable to Insertion of Sensitive Inform… | ray | 2025-03-06T05:15:16+00:00 | 2025-04-09T17:27:27.434099+00:00 |
pysec-2022-43179 | Poetry is a dependency manager for Python. To handle dependencies that come from a Git re… | poetry | 2022-09-07T19:15:08+00:00 | 2025-04-09T17:27:27.255151+00:00 |
pysec-2025-22 | A vulnerability, that could result in Remote Code Execution (RCE), has been found in Plot… | plotai | 2025-03-10T14:15:24+00:00 | 2025-04-09T17:27:27.203714+00:00 |
pysec-2023-311 | plone.namedfile allows users to handle `File` and `Image` fields targeting, but not depen… | plone-namedfile | 2023-09-21T15:15:10+00:00 | 2025-04-09T17:27:27.153848+00:00 |
pysec-2025-21 | picklescan before 0.0.23 fails to detect malicious pickle files inside PyTorch model arch… | picklescan | 2025-03-10T12:15:12+00:00 | 2025-04-09T17:27:27.016747+00:00 |
pysec-2025-20 | picklescan before 0.0.23 is vulnerable to a ZIP archive manipulation attack that causes i… | picklescan | 2025-03-10T12:15:10+00:00 | 2025-04-09T17:27:26.966215+00:00 |
pysec-2025-19 | picklescan before 0.0.22 only considers standard pickle file extensions in the scope for … | picklescan | 2025-03-03T19:15:34+00:00 | 2025-04-09T17:27:26.916350+00:00 |
pysec-2025-18 | picklescan before 0.0.21 does not treat 'pip' as an unsafe global. An attacker could craf… | picklescan | 2025-02-26T15:15:24+00:00 | 2025-04-09T17:27:26.867210+00:00 |
pysec-2023-310 | Mobile Security Framework (MobSF) <=v3.7.8 Beta is vulnerable to Insecure Permissions. NO… | mobsf | 2023-09-21T22:15:11+00:00 | 2025-04-09T17:27:26.663665+00:00 |
pysec-2025-17 | In mlflow/mlflow version 2.18, an admin is able to create a new user account without sett… | mlflow | 2025-03-20T10:15:54+00:00 | 2025-04-09T17:27:26.322333+00:00 |
pysec-2023-309 | Path Traversal in GitHub repository mlflow/mlflow prior to 2.9.2. | mlflow | 2023-12-13T00:15:07+00:00 | 2025-04-09T17:27:26.271200+00:00 |
pysec-2023-308 | Absolute Path Traversal in GitHub repository mlflow/mlflow prior to 2.5.0. | mlflow | 2023-07-19T01:15:10+00:00 | 2025-04-09T17:27:26.223213+00:00 |
pysec-2025-16 | LNbits is a Lightning wallet and accounts system. A Server-Side Request Forgery (SSRF) vu… | lnbits | 2025-04-06T20:15:15+00:00 | 2025-04-09T17:27:25.872691+00:00 |
pysec-2025-15 | Flask-AppBuilder is an application development framework. Prior to 4.5.3, Flask-AppBuilde… | flask-appbuilder | 2025-03-03T16:15:41+00:00 | 2025-04-09T17:27:25.227116+00:00 |
pysec-2025-14 | An issue was discovered in Django 5.1 before 5.1.8 and 5.0 before 5.0.14. The NFKC normal… | django | 2025-04-02T13:15:44+00:00 | 2025-04-09T17:27:25.169049+00:00 |
pysec-2025-13 | An issue was discovered in Django 5.1 before 5.1.7, 5.0 before 5.0.13, and 4.2 before 4.2… | django | 2025-03-06T19:15:27+00:00 | 2025-04-09T17:27:25.095679+00:00 |
pysec-2022-43178 | An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the cleo … | cleo | 2022-11-09T20:15:10+00:00 | 2025-04-09T17:27:24.793038+00:00 |
pysec-2022-43177 | Azure CLI is the command-line interface for Microsoft Azure. In versions previous to 2.40… | azure-cli | 2022-10-25T17:15:56+00:00 | 2025-04-09T17:27:24.642962+00:00 |
ID | Description | Type |
---|---|---|
tid-205 | If a threat actor has access to a valid OS account, they can utilize existing OS tools an… | system-software |
tid-204 | Without a correctly enforced operating system privilege model, a compromised or untrusted… | system-software |
tid-203 | Threat actors may be able to install a driver or kernel module with malicious code to loa… | system-software |
tid-202 | Devices may have vulnerabilities within software used to parse various network protocols.… | system-software |
tid-201 | Some devices utilize bootloaders that are either stored in writable memory or memory that… | system-software |
tid-119 | Hardware debugging ports (e.g., JTAG, SWD, etc.) oftentimes have high privileges or direc… | hardware |
tid-118 | If a threat actor has physical access to a device, they may be able to cause physical dam… | hardware |
tid-116 | If a device has a latent user access port, it may be possible for attackers to leverage p… | hardware |
tid-115 | Unprotected programming or debugging interfaces may be used to extract device firmware, e… | hardware |
tid-114 | Messages and data passing between discrete sub-components and peripherals may be intercep… | hardware |
tid-113 | A threat actor could manipulate the firmware associated with a device’s peripheral or oth… | hardware |
tid-111 | An untrusted storage peripheral (e.g., USB) could be connected to the device. If maliciou… | hardware |
tid-110 | Certain software-executed attacks can introduce a fault to the physical hardware of the d… | hardware |
tid-109 | If a threat actor can physically access a RAM chip, they may be able to readout the conte… | hardware |
tid-108 | Contents of non-volatile memory chips or non-fixed storage (e.g., SD cards, Compact Flash… | hardware |
tid-107 | If separate discrete chips/peripherals that have access to the same physical memory, a th… | hardware |
tid-106 | A threat actor could intercept data across a data bus used to connect a process to either… | hardware |
tid-105 | A threat actor with physical access to a device may be able to manipulate the processor’s… | hardware |
tid-103 | Operating system memory safety models rely on processor hardware to enforce separation be… | hardware |
tid-102 | Devices will oftentimes emit different electromagnetic signals during different operation… | hardware |
tid-101 | Devices will oftentimes consume variable amounts of power depending on the operations the… | hardware |
ID | Description |
---|---|
gsd-2024-33855 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33851 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33879 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-4294 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-4292 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-4295 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-4291 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-4293 | The format of the source doesn't require a description, click on the link for more details |
gsd-2023-52722 | The format of the source doesn't require a description, click on the link for more details |
gsd-2022-48685 | The format of the source doesn't require a description, click on the link for more details |
gsd-2022-48684 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-24777 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-28875 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33786 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33697 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33722 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33784 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33788 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33814 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33701 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33776 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33712 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33840 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33838 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33749 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33839 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33733 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33845 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33741 | The format of the source doesn't require a description, click on the link for more details |
gsd-2024-33738 | The format of the source doesn't require a description, click on the link for more details |
ID | Description | Published | Updated |
---|---|---|---|
mal-2025-6006 | Malicious code in everestsystems-content-core (npm) | 2025-07-18T12:23:02Z | 2025-07-23T00:38:27Z |
mal-2025-5997 | Malicious code in dex-sample-app (npm) | 2025-07-17T23:38:29Z | 2025-07-23T00:38:27Z |
mal-2025-5985 | Malicious code in dom-navigation (npm) | 2025-07-12T04:19:04Z | 2025-07-23T00:38:27Z |
mal-2025-5984 | Malicious code in @3kali182/selenium-webdriver4 (npm) | 2025-07-12T04:17:32Z | 2025-07-23T00:38:27Z |
mal-2025-5981 | Malicious code in @hub-la/payments-proto (npm) | 2025-07-16T12:28:21Z | 2025-07-23T00:38:27Z |
mal-2025-5840 | Malicious code in flow-playground (npm) | 2025-07-13T10:57:29Z | 2025-07-23T00:38:27Z |
mal-2025-5838 | Malicious code in @0xzyo111/frontend-logger (npm) | 2025-07-12T13:54:38Z | 2025-07-23T00:38:27Z |
mal-2025-6116 | Malicious code in pre-and-postinstall-scripts-example (npm) | 2025-07-22T21:13:16Z | 2025-07-22T21:13:16Z |
mal-2025-6120 | Malicious code in pro-stocks-widget (npm) | 2025-07-22T18:07:59Z | 2025-07-22T18:07:59Z |
mal-2025-6068 | Malicious code in @wptv/components (npm) | 2025-07-22T16:33:19Z | 2025-07-22T16:33:19Z |
mal-2025-6083 | Malicious code in cosmjs (npm) | 2025-07-22T16:31:37Z | 2025-07-22T16:31:37Z |
mal-2025-6072 | Malicious code in anchor5 (npm) | 2025-07-22T16:30:56Z | 2025-07-22T16:30:56Z |
mal-2025-6130 | Malicious code in spring-tx (npm) | 2025-07-22T16:30:29Z | 2025-07-22T16:30:29Z |
mal-2025-6129 | Malicious code in spring-context (npm) | 2025-07-22T16:30:14Z | 2025-07-22T16:30:14Z |
mal-2025-6101 | Malicious code in jsr305 (npm) | 2025-07-22T16:30:04Z | 2025-07-22T16:30:04Z |
mal-2025-6102 | Malicious code in logback-classic (npm) | 2025-07-22T16:29:50Z | 2025-07-22T16:29:50Z |
mal-2025-6100 | Malicious code in jcl-over-slf4j (npm) | 2025-07-22T16:29:23Z | 2025-07-22T16:29:23Z |
mal-2025-6125 | Malicious code in slf4j-api (npm) | 2025-07-22T16:29:15Z | 2025-07-22T16:29:15Z |
mal-2025-6092 | Malicious code in grammarly-editor-sdk (npm) | 2025-07-22T16:28:48Z | 2025-07-22T16:28:48Z |
mal-2025-6111 | Malicious code in okx-dex (npm) | 2025-07-22T16:28:11Z | 2025-07-22T16:28:11Z |
mal-2025-6131 | Malicious code in telenet (npm) | 2025-07-22T16:27:52Z | 2025-07-22T16:27:52Z |
mal-2025-6128 | Malicious code in splice-pulumi-common-validator (npm) | 2025-07-22T16:27:17Z | 2025-07-22T16:27:17Z |
mal-2025-6032 | Malicious code in @md_nafeed/synpress-metamask (npm) | 2025-07-22T16:26:59Z | 2025-07-22T16:26:59Z |
mal-2025-6077 | Malicious code in chime-config (npm) | 2025-07-22T16:26:39Z | 2025-07-22T16:26:39Z |
mal-2025-6076 | Malicious code in chime-ci-helper (npm) | 2025-07-22T16:26:33Z | 2025-07-22T16:26:33Z |
mal-2025-6079 | Malicious code in chime-secrets (npm) | 2025-07-22T16:26:25Z | 2025-07-22T16:26:25Z |
mal-2025-6078 | Malicious code in chime-core-utils (npm) | 2025-07-22T16:26:18Z | 2025-07-22T16:26:18Z |
mal-2025-6080 | Malicious code in chime-utils (npm) | 2025-07-22T16:25:54Z | 2025-07-22T16:25:54Z |
mal-2025-6020 | Malicious code in is (npm) | 2025-07-22T07:14:14Z | 2025-07-22T07:14:14Z |
mal-2025-6115 | Malicious code in paypal-examples-langchain (npm) | 2025-07-22T03:47:24Z | 2025-07-22T03:47:24Z |
ID | Description | Published | Updated |
---|---|---|---|
wid-sec-w-2025-1298 | AMD Prozessoren: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-06-10T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1278 | AMD Prozessoren: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen | 2025-06-10T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1277 | Microsoft Windows: Mehrere Schwachstellen | 2025-06-10T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1270 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-06-09T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1231 | Python: Mehrere Schwachstellen | 2025-06-03T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1215 | OWASP ModSecurity: Schwachstelle ermöglicht Denial of Service | 2025-06-02T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1201 | Linux Kernel: Mehrere Schwachstellen | 2025-05-29T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1145 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-05-26T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1114 | Linux Kernel: Mehrere Schwachstellen | 2025-05-20T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1098 | Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2025-05-18T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1076 | Wibu-Systems CodeMeter: Schwachstelle ermöglicht Privilegieneskalation | 2025-05-15T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-1001 | Intel Prozessoren: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2025-05-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-0975 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-05-07T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-0922 | Linux Kernel: Mehrere Schwachstellen | 2025-05-01T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-0844 | Linux Kernel: Mehrere Schwachstellen | 2025-04-16T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-0795 | MIT Kerberos: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-04-14T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-0683 | Linux Kernel: Mehrere Schwachstellen | 2025-04-01T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-0607 | WebKitGTK and WPE WebKit: Mehrere Schwachstellen | 2025-03-20T23:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-0573 | TianoCore EDK2: Schwachstelle ermöglicht Denial of Service und Infogewinn | 2025-03-16T23:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-0542 | Webkit/Apple : Schwachstelle ermöglicht Umgehung von Sicherheitsmechanismen | 2025-03-11T23:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-0499 | Linux Kernel: Mehrere Schwachstellen | 2025-03-06T23:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-0461 | Linux Kernel: Mehrere Schwachstellen | 2025-02-27T23:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-0453 | Linux Kernel: Mehrere Schwachstellen | 2025-02-26T23:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-0155 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-01-21T23:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-0119 | Linux Kernel: Mehrere Schwachstellen | 2025-01-19T23:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-0105 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-01-15T23:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2025-0016 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-01-06T23:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2024-3762 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-12-29T23:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2024-2173 | Linux Kernel: Mehrere Schwachstellen | 2024-09-17T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
wid-sec-w-2024-1875 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-08-18T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
ID | Description | Published | Updated |
---|---|---|---|
ncsc-2025-0206 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2025-06-30T12:57:43.622242Z | 2025-06-30T12:57:43.622242Z |
ncsc-2025-0205 | Kwetsbaarheid verholpen in IBM WebSphere Application Server | 2025-06-26T12:32:54.177712Z | 2025-06-26T12:32:54.177712Z |
ncsc-2025-0203 | Kwetsbaarheid verholpen in Citrix NetScaler ADC en NetScaler Gateway | 2025-06-25T14:54:38.413413Z | 2025-06-25T14:54:38.413413Z |
ncsc-2025-0202 | Kwetsbaarheden verholpen in IBM InfoSphere Information Server | 2025-06-22T08:19:47.485567Z | 2025-06-22T08:19:47.485567Z |
ncsc-2025-0201 | Kwetsbaarheid verholpen in IBM Spectrum Protect Server | 2025-06-22T08:17:03.146698Z | 2025-06-22T08:17:03.146698Z |
ncsc-2025-0200 | Kwetsbaarheden verholpen in IBM QRadar SIEM | 2025-06-20T11:04:50.445218Z | 2025-06-20T11:04:50.445218Z |
ncsc-2025-0199 | Kwetsbaarheid verholpen in Cisco AnyConnect VPN voor Meraki MX en Z | 2025-06-19T08:42:22.673078Z | 2025-06-19T08:42:22.673078Z |
ncsc-2025-0198 | Kwetsbaarheden verholpen in Veeam Backup | 2025-06-18T12:18:39.049977Z | 2025-06-18T12:18:39.049977Z |
ncsc-2025-0197 | Kwetsbaarheid verholpen in GeoServer | 2025-06-18T10:17:42.472544Z | 2025-06-18T10:17:42.472544Z |
ncsc-2025-0195 | Kwetsbaarheden verholpen in Apache Tomcat | 2025-06-18T08:01:06.984131Z | 2025-06-18T08:01:06.984131Z |
ncsc-2025-0194 | Kwetsbaarheden verholpen in Trend Micro Apex One en Apex Central | 2025-06-12T11:12:33.408725Z | 2025-06-12T11:12:33.408725Z |
ncsc-2025-0193 | Kwetsbaarheden verholpen in Ivanti Workspace Control | 2025-06-12T11:08:41.247215Z | 2025-06-12T11:08:41.247215Z |
ncsc-2025-0192 | Kwetsbaarheden verholpen in Fortinet FortiOS | 2025-06-12T11:04:45.167843Z | 2025-06-12T11:04:45.167843Z |
ncsc-2025-0191 | Kwetsbaarheden verholpen in Adobe Commerce en Magento | 2025-06-11T06:58:19.840921Z | 2025-06-11T06:58:19.840921Z |
ncsc-2025-0190 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2025-06-10T18:46:10.932182Z | 2025-06-10T18:46:10.932182Z |
ncsc-2025-0189 | Kwetsbaarheden verholpen in Microsoft Office | 2025-06-10T18:45:25.061778Z | 2025-06-10T18:45:25.061778Z |
ncsc-2025-0182 | Kwetsbaarheden verholpen in Google Chrome en Microsoft Edge | 2025-06-03T07:52:36.009178Z | 2025-06-10T18:44:36.060357Z |
ncsc-2025-0188 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-06-10T18:43:18.187461Z | 2025-06-10T18:43:18.187461Z |
ncsc-2025-0187 | Kwetsbaarheden verholpen in Siemens producten | 2025-06-10T13:11:56.672768Z | 2025-06-10T13:11:56.672768Z |
ncsc-2025-0186 | Kwetsbaarheden verholpen in SAP Producten | 2025-06-10T10:15:56.898255Z | 2025-06-10T10:15:56.898255Z |
ncsc-2025-0185 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2025-06-10T07:19:02.701613Z | 2025-06-10T07:19:02.701613Z |
ncsc-2025-0181 | Kwetsbaarheid verholpen in Roundcube Webmail | 2025-06-02T09:04:58.900416Z | 2025-06-05T14:19:00.303593Z |
ncsc-2025-0184 | Kwetsbaarheden verholpen in HPE StoreOnce Software | 2025-06-05T10:37:04.196801Z | 2025-06-05T10:37:04.196801Z |
ncsc-2025-0183 | Kwetsbaarheid verholpen in Cisco Identity Services Engine voor cloudplatformen | 2025-06-05T10:25:46.291683Z | 2025-06-05T10:25:46.291683Z |
ncsc-2025-0180 | Kwetsbaarheid verholpen in IBM Tivoli Monitoring | 2025-06-02T09:00:25.515472Z | 2025-06-02T09:00:25.515472Z |
ncsc-2025-0179 | Kwetsbaarheid verholpen in Siemens SiPass Integrated | 2025-05-27T11:42:46.878569Z | 2025-05-27T11:42:46.878569Z |
ncsc-2025-0178 | Kwetsbaarheden verholpen in Infoblox NETMRI | 2025-05-23T08:55:37.586046Z | 2025-05-23T08:55:37.586046Z |
ncsc-2025-0177 | Kwetsbaarheden verholpen in ABB ASPECT-productlijn | 2025-05-23T08:40:56.272804Z | 2025-05-23T08:40:56.272804Z |
ncsc-2025-0176 | Kwetsbaarheden verholpen in GitLab | 2025-05-23T08:38:34.688022Z | 2025-05-23T08:38:34.688022Z |
ncsc-2025-0175 | Kwetsbaarheden verholpen in Trend Micro Apex Central | 2025-05-23T08:28:52.215347Z | 2025-05-23T08:28:52.215347Z |
ID | Description | Published | Updated |
---|---|---|---|
ssa-573669 | SSA-573669: Multiple Vulnerabilities in TIA Administrator Before V3.0.6 | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
ssa-513708 | SSA-513708: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices | 2025-06-10T00:00:00Z | 2025-07-08T00:00:00Z |
ssa-446545 | SSA-446545: Impact of RegreSSHion (CVE-2024-6387) in Siemens Industrial Products | 2024-09-10T00:00:00Z | 2025-07-08T00:00:00Z |
ssa-366067 | SSA-366067: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.1 on RUGGEDCOM APE1808 Devices | 2024-03-12T00:00:00Z | 2025-07-08T00:00:00Z |
ssa-364175 | SSA-364175: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.4-h1 | 2024-07-09T00:00:00Z | 2025-07-08T00:00:00Z |
ssa-327438 | SSA-327438: Multiple Vulnerabilities in SCALANCE LPE9403 | 2025-05-13T00:00:00Z | 2025-07-08T00:00:00Z |
ssa-091753 | SSA-091753: Multiple Vulnerabilities in Solid Edge Before SE2025 Update 5 | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
ssa-083019 | SSA-083019: Multiple Vulnerabilities in RUGGEDCOM ROS Devices | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
ssa-078892 | SSA-078892: Multiple Vulnerabilities in SINEC NMS Before V4.0 | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
ssa-426509 | SSA-426509: Multiple Local Code Execution Vulnerabilities in Questa and ModelSim | 2024-10-08T00:00:00Z | 2025-06-17T00:00:00Z |
ssa-345750 | SSA-345750: Default Credentials in Energy Services Using Elspec G5DFR | 2025-06-10T00:00:00Z | 2025-06-16T00:00:00Z |
ssa-726617 | SSA-726617: Incorrect Privilege Assignment Vulnerability in Mendix OIDC SSO Module | 2025-05-13T00:00:00Z | 2025-06-12T00:00:00Z |
ssa-928984 | SSA-928984: Heap-based Buffer Overflow Vulnerability in User Management Component (UMC) | 2024-12-16T00:00:00Z | 2025-06-10T00:00:00Z |
ssa-874353 | SSA-874353: Entity Enumeration Vulnerability in Mendix Runtime | 2025-04-08T00:00:00Z | 2025-06-10T00:00:00Z |
ssa-858251 | SSA-858251: Authentication Bypass Vulnerabilities in OPC UA | 2025-03-11T00:00:00Z | 2025-06-10T00:00:00Z |
ssa-693776 | SSA-693776: Multiple Vulnerabilities in Industrial Communication Devices based on SINEC OS before V3.2 | 2025-06-10T00:00:00Z | 2025-06-10T00:00:00Z |
ssa-656895 | SSA-656895: Open Redirect Vulnerability in Teamcenter | 2025-02-11T00:00:00Z | 2025-06-10T00:00:00Z |
ssa-633269 | SSA-633269: Incorrect Authorization Check Vulnerability in Industrial Communication Devices based on SINEC OS before V3.1 | 2025-06-10T00:00:00Z | 2025-06-10T00:00:00Z |
ssa-620799 | SSA-620799: Denial of Service Vulnerability During BLE Pairing in SENTRON Powercenter 1000/1100 | 2024-12-10T00:00:00Z | 2025-06-10T00:00:00Z |
ssa-497656 | SSA-497656: Multiple NTP Vulnerabilities in TIM 4R-IE Devices | 2021-04-13T00:00:00Z | 2025-06-10T00:00:00Z |
ssa-486186 | SSA-486186: Out of Bounds Read Vulnerability in Tecnomatix Plant Simulation Before 2404 | 2025-06-10T00:00:00Z | 2025-06-10T00:00:00Z |
ssa-354569 | SSA-354569: Multiple Vulnerabilities in Palo Alto Networks PAN-OS on RUGGEDCOM APE1808 Devices | 2024-11-22T00:00:00Z | 2025-06-10T00:00:00Z |
ssa-340240 | SSA-340240: Denial of Service Vulnerability in SIRIUS 3RV2921-5M | 2024-10-08T00:00:00Z | 2025-06-10T00:00:00Z |
ssa-301229 | SSA-301229: Client-Side Enforcement of Server-Side Security Vulnerabilities in RUGGEDCOM ROX II | 2025-05-13T00:00:00Z | 2025-06-10T00:00:00Z |
ssa-216014 | SSA-216014: Vulnerabilities in EFI variable of SIMATIC IPCs, SIMATIC Tablet PCs, and SIMATIC Field PGs | 2025-03-11T00:00:00Z | 2025-06-10T00:00:00Z |
ssa-162506 | SSA-162506: DHCP Client Vulnerability in SIMOTICS CONNECT 400, Desigo PXC/PXM, APOGEE MEC/MBC/PXC, APOGEE PXC Series, and TALON TC Series | 2020-04-14T00:00:00Z | 2025-06-10T00:00:00Z |
ssa-054046 | SSA-054046: Unauthenticated Information Disclosure in Web Server of SIMATIC S7-1500 CPUs | 2024-10-08T00:00:00Z | 2025-06-10T00:00:00Z |
ssa-367714 | SSA-367714: Improper Integrity Check of Firmware Updates in SiPass integrated AC5102 / ACC-G2 and ACC-AP | 2025-05-23T00:00:00Z | 2025-05-23T00:00:00Z |
ssa-041082 | SSA-041082: Out of Bounds Read Vulnerability in SiPass Integrated Before V2.95.3.18 | 2025-05-23T00:00:00Z | 2025-05-23T00:00:00Z |
ssa-556937 | SSA-556937: Multiple Vulnerabilities in VersiCharge AC Series EV Chargers | 2025-05-13T00:00:00Z | 2025-05-14T00:00:00Z |
ID | Description | Published | Updated |
---|---|---|---|
rhsa-2025:11456 | Red Hat Security Advisory: kernel-rt security update | 2025-07-21T11:31:52+00:00 | 2025-08-18T03:09:26+00:00 |
rhsa-2025:13946 | Red Hat Security Advisory: kernel security update | 2025-08-18T01:48:53+00:00 | 2025-08-18T03:09:16+00:00 |
rhsa-2025:11455 | Red Hat Security Advisory: kernel security update | 2025-07-21T12:01:02+00:00 | 2025-08-18T03:09:15+00:00 |
rhsa-2025:13940 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2025-08-18T00:52:32+00:00 | 2025-08-18T03:09:00+00:00 |
rhsa-2025:13947 | Red Hat Security Advisory: rsync security update | 2025-08-18T01:20:03+00:00 | 2025-08-18T03:08:52+00:00 |
rhsa-2024:9315 | Red Hat Security Advisory: kernel security update | 2024-11-12T09:11:05+00:00 | 2025-08-18T03:07:46+00:00 |
rhsa-2025:13805 | Red Hat Security Advisory: kernel security update | 2025-08-13T15:29:16+00:00 | 2025-08-18T03:07:41+00:00 |
rhsa-2025:13781 | Red Hat Security Advisory: kernel security update | 2025-08-13T09:41:41+00:00 | 2025-08-18T03:07:29+00:00 |
rhsa-2024:7000 | Red Hat Security Advisory: kernel security update | 2024-09-24T02:39:02+00:00 | 2025-08-18T03:07:24+00:00 |
rhsa-2025:13776 | Red Hat Security Advisory: kernel security update | 2025-08-13T02:49:20+00:00 | 2025-08-18T03:07:17+00:00 |
rhsa-2024:7001 | Red Hat Security Advisory: kernel-rt security update | 2024-09-24T00:40:51+00:00 | 2025-08-18T03:07:07+00:00 |
rhsa-2025:13633 | Red Hat Security Advisory: kernel-rt security update | 2025-08-11T14:20:25+00:00 | 2025-08-18T03:07:06+00:00 |
rhsa-2025:12752 | Red Hat Security Advisory: kernel security update | 2025-08-04T16:59:36+00:00 | 2025-08-18T03:06:55+00:00 |
rhsa-2024:5102 | Red Hat Security Advisory: kernel-rt security update | 2024-08-08T04:44:11+00:00 | 2025-08-18T03:06:48+00:00 |
rhsa-2025:12746 | Red Hat Security Advisory: kernel security update | 2025-08-04T16:42:16+00:00 | 2025-08-18T03:06:42+00:00 |
rhsa-2025:12753 | Red Hat Security Advisory: kernel-rt security update | 2025-08-04T16:27:12+00:00 | 2025-08-18T03:06:31+00:00 |
rhsa-2024:5101 | Red Hat Security Advisory: kernel security update | 2024-08-08T04:53:16+00:00 | 2025-08-18T03:06:26+00:00 |
rhsa-2025:12013 | Red Hat Security Advisory: rsync security update | 2025-07-29T00:20:18+00:00 | 2025-08-18T03:05:29+00:00 |
rhsa-2025:11048 | Red Hat Security Advisory: rsync security update | 2025-07-15T00:31:43+00:00 | 2025-08-18T03:05:18+00:00 |
rhsa-2025:10541 | Red Hat Security Advisory: rsync security update | 2025-07-08T00:18:38+00:00 | 2025-08-18T03:05:08+00:00 |
rhsa-2017:3453 | Red Hat Security Advisory: java-1.8.0-ibm security update | 2017-12-13T16:48:15+00:00 | 2025-08-18T03:05:01+00:00 |
rhsa-2025:8280 | Red Hat Security Advisory: OpenShift Container Platform 4.17.32 bug fix and security update | 2025-06-04T09:19:59+00:00 | 2025-08-18T03:04:53+00:00 |
rhsa-2017:3047 | Red Hat Security Advisory: java-1.6.0-sun security update | 2017-10-24T12:09:09+00:00 | 2025-08-18T03:04:53+00:00 |
rhsa-2025:13936 | Red Hat Security Advisory: golang security update | 2025-08-18T00:31:32+00:00 | 2025-08-18T03:04:49+00:00 |
rhsa-2017:3046 | Red Hat Security Advisory: java-1.7.0-oracle security update | 2017-10-24T12:14:29+00:00 | 2025-08-18T03:04:47+00:00 |
rhsa-2025:8284 | Red Hat Security Advisory: OpenShift Container Platform 4.18.16 bug fix and security update | 2025-06-03T10:16:45+00:00 | 2025-08-18T03:04:40+00:00 |
rhsa-2017:2999 | Red Hat Security Advisory: java-1.8.0-oracle security update | 2017-10-23T07:44:37+00:00 | 2025-08-18T03:04:40+00:00 |
rhsa-2025:13961 | Red Hat Security Advisory: kernel-rt security update | 2025-08-18T02:50:08+00:00 | 2025-08-18T03:04:32+00:00 |
rhsa-2017:1222 | Red Hat Security Advisory: java-1.6.0-ibm security update | 2017-05-10T12:43:49+00:00 | 2025-08-18T03:04:32+00:00 |
rhsa-2025:8395 | Red Hat Security Advisory: rsync security update | 2025-06-02T21:24:57+00:00 | 2025-08-18T03:04:30+00:00 |
ID | Description | Published | Updated |
---|---|---|---|
cisco-sa-sdwanarbfile-2zkhkzwj | Cisco Catalyst SD-WAN Manager Arbitrary File Creation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-14T20:04:53+00:00 |
cisco-sa-sdwan-fileoverwrite-uc9txwh | Cisco Catalyst SD-WAN Manager Arbitrary File Overwrite Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-08T15:55:57+00:00 |
cisco-sa-wlc-wncd-p6gvt6hl | Cisco IOS XE Software for WLC Wireless IPv6 Clients Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
cisco-sa-webui-multi-arnhm4v6 | Cisco IOS XE Software Web-Based Management Interface Vulnerabilities | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
cisco-sa-webui-cmdinj-gvn3oknc | Cisco IOS XE Software Web-Based Management Interface Command Injection Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
cisco-sa-vmanage-xss-xhn8m5jt | Cisco Catalyst SD-WAN Manager Stored Cross-Site Scripting Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
cisco-sa-vmanage-html-inj-gxvtk6zj | Cisco Catalyst SD-WAN Manager Reflected HTML Injection Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
cisco-sa-twamp-kv4fhugn | Cisco IOS, IOS XE, and IOS XR Software TWAMP Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
cisco-sa-snmpv3-qkeyvzsy | Cisco IOS and IOS XE Software SNMPv3 Configuration Restriction Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
cisco-sa-snmp-bypass-hhuvujdn | Cisco IOS XE SD-WAN Software Packet Filtering Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
cisco-sa-sisf-dos-zgwt4ddy | Multiple Cisco Products Switch Integrated Security Features DHCPv6 Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
cisco-sa-sdwan-priviesc-wck7bmmt | Cisco Catalyst SD-WAN Manager Privilege Escalation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
cisco-sa-netconf-nacm-bypass-tgzv9pmq | Cisco IOS XE Software Model-Driven Programmability Authorization Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
cisco-sa-multiprod-ikev2-dos-gpctuqv2 | Cisco Adaptive Security Appliance Software, Firepower Threat Defense Software, IOS Software, and IOS XE Software IKEv2 Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
cisco-sa-ipsgacl-pg6qfzk | Cisco IOS Software on Cisco Catalyst 1000 and 2960L Switches Access Control List Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
cisco-sa-iox-dos-95fqnf7b | Cisco IOx Application Hosting Environment Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
cisco-sa-iosxe-privesc-su7scvdp | Cisco IOS XE Software Privilege Escalation Vulnerabilities | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
cisco-sa-iosxe-ikev1-dos-xhk3hzfc | Cisco IOS XE Software Internet Key Exchange Version 1 Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
cisco-sa-iosxe-dhcpsn-dos-xbn8mtks | Cisco IOS XE Software DHCP Snooping Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
cisco-sa-ios-http-privesc-wcrd5e3 | Cisco IOS Software Industrial Ethernet Switch Device Manager Privilege Escalation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
cisco-sa-ewlc-user-del-hqxmpudj | Cisco IOS XE Wireless Controller Software Unauthorized User Deletion Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
cisco-sa-ewlc-cdp-dos-fpeks9k | Cisco IOS XE Wireless Controller Software Cisco Discovery Protocol Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
cisco-sa-catc-insec-acc-mtt8eheb | Cisco Catalyst Center Insufficient Access Control Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
cisco-sa-catalyst-tls-pqnd5kej | Cisco Catalyst SD-WAN Manager Certificate Validation Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
cisco-sa-c2960-3560-sboot-ztqadrhq | Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches Secure Boot Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
cisco-sa-bootstrap-kfgxygdh | Cisco IOS XE Software Bootstrap Arbitrary File Write Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
cisco-sa-asr903-rsp3-arp-dos-wmfzdvjz | Cisco IOS XE Software for Cisco ASR 903 Aggregation Services Routers ARP Denial of Service Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-05-07T16:00:00+00:00 |
cisco-sa-webex-app-client-rce-ufymmylc | Cisco Webex App Client-Side Remote Code Execution Vulnerability | 2025-04-16T16:00:00+00:00 | 2025-04-16T16:00:00+00:00 |
cisco-sa-sna-prvesc-4bqmk33z | Cisco Secure Network Analytics Privilege Escalation Vulnerability | 2025-04-16T16:00:00+00:00 | 2025-04-16T16:00:00+00:00 |
cisco-sa-nd-unenum-2xffh472 | Cisco Nexus Dashboard LDAP Username Enumeration Vulnerability | 2025-04-16T16:00:00+00:00 | 2025-04-16T16:00:00+00:00 |
ID | Description | Published | Updated |
---|---|---|---|
msrc_cve-2025-53135 | DirectX Graphics Kernel Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-53134 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-53133 | Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-53132 | Win32k Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-53131 | Windows Media Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-50177 | Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-50176 | DirectX Graphics Kernel Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-50173 | Windows Installer Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-50172 | DirectX Graphics Kernel Denial of Service Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-50171 | Remote Desktop Spoofing Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-50170 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-50169 | Windows SMB Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-50168 | Win32k Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-50167 | Windows Hyper-V Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-50166 | Windows Distributed Transaction Coordinator (MSDTC) Information Disclosure Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-50165 | Windows Graphics Component Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-50164 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-50163 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-50162 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-50161 | Win32k Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-50160 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-50159 | Remote Access Point-to-Point Protocol (PPP) EAP-TLS Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-50158 | Windows NTFS Information Disclosure Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-50157 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-50156 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-50155 | Windows Push Notifications Apps Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-50154 | Microsoft Windows File Explorer Spoofing Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-50153 | Desktop Windows Manager Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-49762 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
msrc_cve-2025-49761 | Windows Kernel Elevation of Privilege Vulnerability | 2025-08-12T07:00:00.000Z | 2025-08-12T07:00:00.000Z |
ID | Description | Published | Updated |
---|---|---|---|
jvndb-2025-004079 | Improper access permission settings in multiple SEIKO EPSON printer drivers for Windows OS | 2025-04-30T11:46+09:00 | 2025-04-30T11:46+09:00 |
jvndb-2025-004076 | Security Update for Trend Micro Trend Vision One (April 2025) | 2025-04-30T10:38+09:00 | 2025-04-30T10:38+09:00 |
jvndb-2025-000029 | Multiple vulnerabilities in Quick Agent | 2025-04-25T13:49+09:00 | 2025-04-25T13:49+09:00 |
jvndb-2025-000028 | i-PRO Configuration Tool vulnerable to use of hard-coded cryptographic key | 2025-04-24T13:50+09:00 | 2025-04-24T13:50+09:00 |
jvndb-2025-000027 | Active! mail vulnerable to stack-based buffer overflow | 2025-04-18T16:50+09:00 | 2025-04-18T16:50+09:00 |
jvndb-2016-000129 | Android OS issue where it is affected by the CRIME attack | 2016-07-25T11:15+09:00 | 2025-04-18T16:36+09:00 |
jvndb-2025-003213 | TP-Link Deco BE65 Pro vulnerable to OS command injection | 2025-04-11T13:52+09:00 | 2025-04-11T13:52+09:00 |
jvndb-2025-000026 | Multiple vulnerabilities in BizRobo! | 2025-04-10T15:36+09:00 | 2025-04-10T15:36+09:00 |
jvndb-2025-003091 | Multiple vulnerabilities in Trend Micro Endpoint security products for enterprises (April 2025) | 2025-04-09T14:55+09:00 | 2025-04-09T14:55+09:00 |
jvndb-2025-002990 | Multiple vulnerabilities in Inaba Denki Sangyo Wi-Fi AP UNIT 'AC-WPS-11ac series' | 2025-04-07T17:44+09:00 | 2025-04-07T17:44+09:00 |
jvndb-2025-002714 | Improper symbolic link file handling in FutureNet NXR series, VXR series and WXR series routers | 2025-03-31T16:59+09:00 | 2025-04-03T15:19+09:00 |
jvndb-2025-000025 | WinRAR vulnerable to the symbolic link based "Mark of the Web" check bypass | 2025-04-03T12:29+09:00 | 2025-04-03T12:29+09:00 |
jvndb-2025-000022 | Multiple vulnerabilities in JTEKT ELECTRONICS CORPORATION's products | 2025-04-02T15:12+09:00 | 2025-04-02T15:12+09:00 |
jvndb-2025-002790 | Out-of-bounds Write vulnerabilities in Canon Printer Drivers for Production Printers, Office/Small Office Multifunction Printers and Laser Printers | 2025-04-02T15:05+09:00 | 2025-04-02T15:05+09:00 |
jvndb-2025-000023 | WordPress plugin "Welcart e-Commerce" vulnerable to untrusted data deserialization | 2025-04-01T14:20+09:00 | 2025-04-01T14:20+09:00 |
jvndb-2024-003016 | Multiple vulnerabilities in home gateway HGW BL1500HM | 2024-03-25T17:28+09:00 | 2025-03-28T12:01+09:00 |
jvndb-2025-000018 | Multiple vulnerabilities in home gateway HGW-BL1500HM | 2025-03-19T15:33+09:00 | 2025-03-28T11:48+09:00 |
jvndb-2025-000024 | a-blog cms vulnerable to untrusted data deserialization | 2025-03-28T10:46+09:00 | 2025-03-28T10:46+09:00 |
jvndb-2025-000021 | Multiple vulnerabilities in PowerCMS | 2025-03-26T18:13+09:00 | 2025-03-26T18:13+09:00 |
jvndb-2025-002592 | Multiple vulnerabilities in CHOCO TEI WATCHER mini | 2025-03-26T13:25+09:00 | 2025-03-26T13:25+09:00 |
jvndb-2025-000019 | Multiple vulnerabilities in AssetView | 2025-03-25T17:10+09:00 | 2025-03-25T17:10+09:00 |
jvndb-2025-000020 | +F FS010M vulnerable to OS command injection | 2025-03-18T15:01+09:00 | 2025-03-18T15:01+09:00 |
jvndb-2025-000017 | hostapd vulnerable to improper processing of RADIUS packets | 2025-03-12T14:19+09:00 | 2025-03-12T14:19+09:00 |
jvndb-2025-000016 | Multiple vulnerabilities in RemoteView Agent (for Windows) | 2025-03-06T14:27+09:00 | 2025-03-10T15:22+09:00 |
jvndb-2025-001898 | Multiple vulnerabilities in FutureNet AS series (Industrial Routers) and FA series (Protocol Conversion Machine) | 2025-03-04T14:56+09:00 | 2025-03-04T14:56+09:00 |
jvndb-2025-001605 | "RoboForm Password Manager" App for Android vulnerable to authentication bypass using an alternate path or channel | 2025-02-20T20:15+09:00 | 2025-02-20T20:15+09:00 |
jvndb-2025-000004 | Multiple vulnerabilities in I-O DATA router UD-LT2 | 2025-01-22T13:55+09:00 | 2025-02-20T15:55+09:00 |
jvndb-2025-000014 | Multiple cross-site scripting vulnerabilities in Movable Type | 2025-02-19T16:19+09:00 | 2025-02-19T16:19+09:00 |
jvndb-2025-000015 | RevoWorks SCVX and RevoWorks Browser vulnerable to incorrect resource transfer between spheres | 2025-02-19T14:51+09:00 | 2025-02-19T14:51+09:00 |
jvndb-2025-001563 | Out-of-bounds write vulnerability in FUJIFILM Business Innovation Corp. MFPs | 2025-02-18T16:33+09:00 | 2025-02-18T16:33+09:00 |
ID | Description | Published | Updated |
---|---|---|---|
suse-su-2025:02736-1 | Security update for python-urllib3 | 2025-08-08T08:06:29Z | 2025-08-08T08:06:29Z |
suse-su-2025:02735-1 | Security update for python-urllib3 | 2025-08-08T08:06:11Z | 2025-08-08T08:06:11Z |
suse-su-2025:02734-1 | Security update for dpkg | 2025-08-08T08:05:13Z | 2025-08-08T08:05:13Z |
suse-su-2025:02727-1 | Security update for grub2 | 2025-08-07T09:02:11Z | 2025-08-07T09:02:11Z |
suse-su-2025:02725-1 | Security update for grub2 | 2025-08-07T09:01:46Z | 2025-08-07T09:01:46Z |
suse-su-2025:02724-1 | Security update for grub2 | 2025-08-07T09:01:39Z | 2025-08-07T09:01:39Z |
suse-su-2025:02719-1 | Security update for libgcrypt | 2025-08-07T03:38:36Z | 2025-08-07T03:38:36Z |
suse-su-2025:02718-1 | Security update for libarchive | 2025-08-06T13:55:09Z | 2025-08-06T13:55:09Z |
suse-su-2025:02717-1 | Security update for python311 | 2025-08-06T13:39:47Z | 2025-08-06T13:39:47Z |
suse-su-2025:02710-1 | Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP6) | 2025-08-05T15:04:52Z | 2025-08-05T15:04:52Z |
suse-su-2025:02708-1 | Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP4) | 2025-08-05T11:34:16Z | 2025-08-05T11:34:16Z |
suse-su-2025:02707-1 | Security update for the Linux Kernel (Live Patch 59 for SLE 15 SP3) | 2025-08-05T10:34:34Z | 2025-08-05T10:34:34Z |
suse-su-2025:02706-1 | Security update for grub2 | 2025-08-05T10:08:31Z | 2025-08-05T10:08:31Z |
suse-su-2025:02705-1 | Security update for grub2 | 2025-08-05T10:08:15Z | 2025-08-05T10:08:15Z |
suse-su-2025:02704-1 | Security update for the Linux Kernel (Live Patch 58 for SLE 15 SP3) | 2025-08-05T10:04:25Z | 2025-08-05T10:04:25Z |
suse-su-2025:02703-1 | Security update for djvulibre | 2025-08-05T09:33:05Z | 2025-08-05T09:33:05Z |
suse-su-2025:02701-1 | Security update for python | 2025-08-05T09:32:02Z | 2025-08-05T09:32:02Z |
suse-su-2025:02700-1 | Security update for python39 | 2025-08-05T09:31:34Z | 2025-08-05T09:31:34Z |
suse-su-2025:02699-1 | Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP6) | 2025-08-05T09:04:56Z | 2025-08-05T09:04:56Z |
suse-su-2025:02698-1 | Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP5) | 2025-08-05T09:04:47Z | 2025-08-05T09:04:47Z |
suse-su-2025:02697-1 | Security update for the Linux Kernel (Live Patch 50 for SLE 15 SP3) | 2025-08-05T09:04:38Z | 2025-08-05T09:04:38Z |
suse-su-2025:02695-1 | Security update for djvulibre | 2025-08-05T08:08:58Z | 2025-08-05T08:08:58Z |
suse-su-2025:02693-1 | Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP6) | 2025-08-05T07:34:42Z | 2025-08-05T07:34:42Z |
suse-su-2025:02689-1 | Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6) | 2025-08-05T07:34:35Z | 2025-08-05T07:34:35Z |
suse-su-2025:02691-1 | Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6) | 2025-08-05T06:33:59Z | 2025-08-05T06:33:59Z |
suse-su-2025:02688-1 | Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6) | 2025-08-04T22:50:13Z | 2025-08-04T22:50:13Z |
suse-su-2025:02687-1 | Security update for the Linux Kernel (Live Patch 54 for SLE 15 SP3) | 2025-08-04T17:04:20Z | 2025-08-04T17:04:20Z |
suse-su-2025:02685-1 | Security update for apache2 | 2025-08-04T15:08:14Z | 2025-08-04T15:08:14Z |
suse-su-2025:02684-1 | Security update for apache2 | 2025-08-04T15:07:21Z | 2025-08-04T15:07:21Z |
suse-su-2025:02683-1 | Security update for apache2 | 2025-08-04T15:06:58Z | 2025-08-04T15:06:58Z |
ID | Description | Published | Updated |
---|---|---|---|
opensuse-su-2025:15396-1 | ffmpeg-7-7.1.1-8.1 on GA media | 2025-07-30T00:00:00Z | 2025-07-30T00:00:00Z |
opensuse-su-2025:15395-1 | docker-28.3.3_ce-26.1 on GA media | 2025-07-30T00:00:00Z | 2025-07-30T00:00:00Z |
opensuse-su-2025:15394-1 | libsuricata8_0_0-8.0.0-1.1 on GA media | 2025-07-28T00:00:00Z | 2025-07-28T00:00:00Z |
opensuse-su-2025:15393-1 | java-21-openj9-21.0.8.0-1.1 on GA media | 2025-07-27T00:00:00Z | 2025-07-27T00:00:00Z |
opensuse-su-2025:15392-1 | java-1_8_0-openj9-1.8.0.462-1.1 on GA media | 2025-07-27T00:00:00Z | 2025-07-27T00:00:00Z |
opensuse-su-2025:15391-1 | java-17-openj9-17.0.16.0-1.1 on GA media | 2025-07-27T00:00:00Z | 2025-07-27T00:00:00Z |
opensuse-su-2025:15390-1 | java-11-openj9-11.0.28.0-1.1 on GA media | 2025-07-27T00:00:00Z | 2025-07-27T00:00:00Z |
opensuse-su-2025:15389-1 | forgejo-longterm-11.0.3-1.1 on GA media | 2025-07-27T00:00:00Z | 2025-07-27T00:00:00Z |
opensuse-su-2025:15388-1 | rpi-imager-1.9.5-1.1 on GA media | 2025-07-26T00:00:00Z | 2025-07-26T00:00:00Z |
opensuse-su-2025:15387-1 | libmozjs-128-0-128.13.0-1.1 on GA media | 2025-07-26T00:00:00Z | 2025-07-26T00:00:00Z |
opensuse-su-2025:15386-1 | MozillaFirefox-141.0-1.1 on GA media | 2025-07-26T00:00:00Z | 2025-07-26T00:00:00Z |
opensuse-su-2025:15385-1 | perl-Authen-SASL-2.180.0-2.1 on GA media | 2025-07-25T00:00:00Z | 2025-07-25T00:00:00Z |
opensuse-su-2025:15384-1 | apache2-2.4.65-1.1 on GA media | 2025-07-25T00:00:00Z | 2025-07-25T00:00:00Z |
opensuse-su-2025:15383-1 | MozillaThunderbird-140.1.0-1.1 on GA media | 2025-07-25T00:00:00Z | 2025-07-25T00:00:00Z |
opensuse-su-2025:15382-1 | ruby3.4-rubygem-thor-1.4.0-1.1 on GA media | 2025-07-24T00:00:00Z | 2025-07-24T00:00:00Z |
opensuse-su-2025:15381-1 | python311-starlette-0.47.2-1.1 on GA media | 2025-07-24T00:00:00Z | 2025-07-24T00:00:00Z |
opensuse-su-2025:15380-1 | jupyter-nbdime-7.0.2-21.1 on GA media | 2025-07-24T00:00:00Z | 2025-07-24T00:00:00Z |
opensuse-su-2025:15379-1 | minio-client-20250721T052808Z-1.1 on GA media | 2025-07-24T00:00:00Z | 2025-07-24T00:00:00Z |
opensuse-su-2025:15378-1 | javamail-1.6.2-3.1 on GA media | 2025-07-24T00:00:00Z | 2025-07-24T00:00:00Z |
opensuse-su-2025:15377-1 | grype-db-0.35.0-1.1 on GA media | 2025-07-24T00:00:00Z | 2025-07-24T00:00:00Z |
opensuse-su-2025:15376-1 | cloud-init-25.1.3-1.1 on GA media | 2025-07-24T00:00:00Z | 2025-07-24T00:00:00Z |
opensuse-su-2025:15375-1 | chromedriver-138.0.7204.168-1.1 on GA media | 2025-07-24T00:00:00Z | 2025-07-24T00:00:00Z |
opensuse-su-2025:15374-1 | viewvc-1.3.0~dev20250722-1.1 on GA media | 2025-07-23T00:00:00Z | 2025-07-23T00:00:00Z |
opensuse-su-2025:15373-1 | jupyter-jupyterlab-templates-0.5.2-3.1 on GA media | 2025-07-23T00:00:00Z | 2025-07-23T00:00:00Z |
opensuse-su-2025:15372-1 | grafana-11.6.3+security01-1.1 on GA media | 2025-07-23T00:00:00Z | 2025-07-23T00:00:00Z |
opensuse-su-2025:15371-1 | firefox-esr-140.1.0-1.1 on GA media | 2025-07-23T00:00:00Z | 2025-07-23T00:00:00Z |
opensuse-su-2025:15370-1 | hauler-1.2.5-1.1 on GA media | 2025-07-21T00:00:00Z | 2025-07-21T00:00:00Z |
opensuse-su-2025:15369-1 | cyradm-3.8.6-1.1 on GA media | 2025-07-21T00:00:00Z | 2025-07-21T00:00:00Z |
opensuse-su-2025:15368-1 | lemon-3.50.3-1.1 on GA media | 2025-07-20T00:00:00Z | 2025-07-20T00:00:00Z |
opensuse-su-2025:15367-1 | python313-3.13.5-3.1 on GA media | 2025-07-20T00:00:00Z | 2025-07-20T00:00:00Z |