| opensuse openSUSE-SU-2025-20148-1: openSUSE 16 : Security update for openexr (Important) (openSUSE-SU-2025-20148-1) | CVE-2025-12840, CVE-2025-12495, CVE-2025-12839 | 12/13/2025 | testing |
| oracle_linux ELSA-2025-23134: ELSA-2025-23134: mysql:8.0 security update (MODERATE) | CVE-2025-53045, CVE-2025-53044, CVE-2025-53054, CVE-2025-53062, CVE-2025-53040, CVE-2025-53053, CVE-2025-53069, CVE-2025-53042 | 12/13/2025 | testing |
| suse_linux SUSE-SU-2025:4386-1: SUSE SLES12 : Security update for postgresql16 (Important) (SUSE-SU-2025:4386-1) | CVE-2025-12817, CVE-2025-12818 | 12/13/2025 | development |
| suse_linux SUSE-SU-2025:4387-1: SUSE SLES15 : Security update for postgresql16 (Important) (SUSE-SU-2025:4387-1) | CVE-2025-12817, CVE-2025-12818 | 12/13/2025 | testing |
| suse_linux SUSE-SU-2025:4388-1: SUSE SLED15 / SLES15 / openSUSE 15 : Security update for postgresql16 (Important) (SUSE-SU-2025:4388-1) | CVE-2025-12817, CVE-2025-12818 | 12/13/2025 | testing |
| suse_linux SUSE-SU-2025:4389-1: SUSE SLES15 / openSUSE 15 : Security update for python (Low) (SUSE-SU-2025:4389-1) | CVE-2025-6075, CVE-2025-8291 | 12/13/2025 | testing |
| suse_linux SUSE-SU-2025:4373-1: SUSE SLES15 : Security update for container-suseconnect (Moderate) (SUSE-SU-2025:4373-1) | | 12/13/2025 | testing |
| suse_linux SUSE-SU-2025:4380-1: SUSE SLES15 / openSUSE 15 : Security update for kubernetes-client (Important) (SUSE-SU-2025:4380-1) | | 12/13/2025 | testing |
| opensuse openSUSE-SU-2025-20150-1: openSUSE 16 : Security update for binutils (Important) (openSUSE-SU-2025-20150-1) | CVE-2025-11494, CVE-2025-1179, CVE-2025-11495, CVE-2025-11412, CVE-2025-1153, CVE-2025-11414, CVE-2025-8224, CVE-2025-1151, CVE-2025-1180, CVE-2025-1181, CVE-2025-1182, CVE-2025-1150, CVE-2025-5244, CVE-2025-7546, CVE-2025-8225, CVE-2025-3198, CVE-2025-11083, CVE-2025-1147, CVE-2025-1149, CVE-2025-0840, CVE-2025-5245, CVE-2025-1176, CVE-2025-1152, CVE-2025-7545, CVE-2025-1148, CVE-2025-1178, CVE-2025-11413 | 12/13/2025 | testing |
| opensuse openSUSE-SU-2025-20153-1: openSUSE 16 : Security update for python-Django (Important) (openSUSE-SU-2025-20153-1) | CVE-2025-64460, CVE-2025-13372, CVE-2025-64459 | 12/13/2025 | testing |
| oracle_linux ELSA-2025-23109: ELSA-2025-23109: mysql security update (MODERATE) | CVE-2025-53045, CVE-2025-53044, CVE-2025-53054, CVE-2025-53062, CVE-2025-53040, CVE-2025-53053, CVE-2025-53069, CVE-2025-53042 | 12/13/2025 | testing |
| suse_linux SUSE-SU-2025:4384-1: SUSE SLES15 / openSUSE 15 : Security update for python-Django (Important) (SUSE-SU-2025:4384-1) | CVE-2025-64460, CVE-2025-13372 | 12/13/2025 | testing |
| suse_linux SUSE-SU-2025:4390-1: SUSE SLED15 / SLES15 / openSUSE 15 : Security update for rhino (Moderate) (SUSE-SU-2025:4390-1) | CVE-2025-66453 | 12/13/2025 | testing |
| suse_linux SUSE-SU-2025:4383-1: SUSE SLES12 : Security update for libpng12 (Moderate) (SUSE-SU-2025:4383-1) | CVE-2025-64505 | 12/13/2025 | testing |
| suse_linux SUSE-SU-2025:4381-1: SUSE SLES15 / openSUSE 15 : Security update for kubernetes-client (Important) (SUSE-SU-2025:4381-1) | | 12/13/2025 | testing |
| suse_linux SUSE-SU-2025:4382-1: SUSE SLES12 : Security update for gegl (Important) (SUSE-SU-2025:4382-1) | CVE-2025-10921 | 12/13/2025 | testing |
| [Web App Scanning] Gladinet CentreStack < 16.4.10315.56368 Insecure Deserialization | CVE-2025-30406 | 12/12/2025 | testing |
| [Web App Scanning] Gladinet Triofox < 16.7.10368.56560 Improper Access Control | CVE-2025-12480 | 12/12/2025 | testing |
| apache_httpd 2.4.66.json: Fixed in Apache HTTP Server 2.4.66 | CVE-2025-65082, CVE-2025-55753, CVE-2025-58098, CVE-2025-59775, CVE-2025-66200 | 12/11/2025 | development |
| oracle_linux ELSA-2025-28041: ELSA-2025-28041: openssl security update (MODERATE) | CVE-2025-9230 | 12/10/2025 | development |
| oracle_linux ELSA-2025-22865: ELSA-2025-22865: kernel security update (MODERATE) | CVE-2025-39925, CVE-2025-39979 | 12/10/2025 | development |
| cisco cisco-sa-react-flight-TYw32Ddb: Remote Code Execution Vulnerability in React and Next.js Frameworks: December 2025 | CVE-2025-55182 | 12/5/2025 | development |
| Multiple Vulnerabilities in GoLang Go | CVE-2025-61727, CVE-2025-61729 | 12/4/2025 | development |
| fedora FEDORA-2025-6b2336ec55: openbao-2.4.4-1.fc42 | CVE-2025-64761, CVE-2025-58183 | 12/3/2025 | development |
| fedora FEDORA-2025-c7f4367479: openbao-2.4.4-1.fc43 | CVE-2025-58185, CVE-2025-58189, CVE-2025-64761, CVE-2025-61723, CVE-2025-61725, CVE-2025-58188, CVE-2025-58183 | 12/3/2025 | development |
| fedora FEDORA-2025-35fe65f08c: forgejo-13.0.3-1.fc43 | | 12/3/2025 | development |
| fedora FEDORA-2025-bb6c04e3ee: nextcloud-32.0.2-1.fc41 | CVE-2025-64500 | 12/3/2025 | development |
| TP-Link Archer C7(EU) and TL-WR841N/ND(MS) OS Command Injection Vulnerability (CVE-2025-9377) | CVE-2025-9377 | 12/2/2025 | development |
| atlassian_confluence CONFSERVER-101479: Path Traversal Third-Party Dependency in Confluence Data Center and Server - CVE-2023-42282 | CVE-2025-48387 | 11/20/2025 | development |
| atlassian_confluence CONFSERVER-101477: DoS (Denial of Service) Third-Party Dependency in Confluence Data Center and Server - CVE-2024-37890 | CVE-2022-31129, CVE-2024-25710, CVE-2025-48387, CVE-2025-55163, CVE-2022-46175, CVE-2021-23337, CVE-2024-38819, CVE-2025-48734, CVE-2024-22259, CVE-2025-22235, CVE-2022-24772, CVE-2024-4068, CVE-2025-22166, CVE-2025-22228, CVE-2021-3807, CVE-2023-42282, CVE-2024-45296, CVE-2024-38999, CVE-2020-8203, CVE-2024-45590, CVE-2023-52428, CVE-2022-38900, CVE-2022-24785, CVE-2016-1000027, CVE-2021-33587, CVE-2025-41248, CVE-2023-26159, CVE-2024-37890, CVE-2025-48976, CVE-2024-21538, CVE-2022-24771, CVE-2024-29415, CVE-2020-28471, CVE-2021-3803, CVE-2023-45133 | 11/20/2025 | development |
| atlassian_confluence CONFSERVER-101488: SSRF (Server-Side Request Forgery) Third-Party Dependency in Confluence Data Center and Server - CVE-2023-42282 | CVE-2022-31129, CVE-2024-25710, CVE-2025-48387, CVE-2025-55163, CVE-2022-46175, CVE-2021-23337, CVE-2024-38819, CVE-2025-48734, CVE-2024-22259, CVE-2025-22235, CVE-2022-24772, CVE-2024-4068, CVE-2025-22166, CVE-2025-22228, CVE-2021-3807, CVE-2023-42282, CVE-2024-45296, CVE-2024-38999, CVE-2020-8203, CVE-2024-45590, CVE-2023-52428, CVE-2022-38900, CVE-2022-24785, CVE-2016-1000027, CVE-2021-33587, CVE-2025-41248, CVE-2023-26159, CVE-2024-37890, CVE-2025-48976, CVE-2024-21538, CVE-2022-24771, CVE-2024-29415, CVE-2020-28471, CVE-2021-3803, CVE-2023-45133 | 11/20/2025 | development |
| atlassian_confluence CONFSERVER-101485: Improper Authorization Third-Party Dependency in Confluence Data Center and Server - CVE-2025-41248 | CVE-2022-31129, CVE-2024-25710, CVE-2025-48387, CVE-2025-55163, CVE-2022-46175, CVE-2021-23337, CVE-2024-38819, CVE-2025-48734, CVE-2024-22259, CVE-2025-22235, CVE-2022-24772, CVE-2024-4068, CVE-2025-22166, CVE-2025-22228, CVE-2021-3807, CVE-2023-42282, CVE-2024-45296, CVE-2024-38999, CVE-2020-8203, CVE-2024-45590, CVE-2023-52428, CVE-2022-38900, CVE-2022-24785, CVE-2016-1000027, CVE-2021-33587, CVE-2025-41248, CVE-2023-26159, CVE-2024-37890, CVE-2025-48976, CVE-2024-21538, CVE-2022-24771, CVE-2024-29415, CVE-2020-28471, CVE-2021-3803, CVE-2023-45133 | 11/20/2025 | development |
| atlassian_confluence CONFSERVER-101480: DoS (Denial of Service) Third-Party Dependency in Confluence Data Center and Server - CVE-2024-45296 | CVE-2022-31129, CVE-2024-25710, CVE-2025-48387, CVE-2025-55163, CVE-2022-46175, CVE-2021-23337, CVE-2024-38819, CVE-2025-48734, CVE-2024-22259, CVE-2025-22235, CVE-2022-24772, CVE-2024-4068, CVE-2025-22166, CVE-2025-22228, CVE-2021-3807, CVE-2023-42282, CVE-2024-45296, CVE-2024-38999, CVE-2020-8203, CVE-2024-45590, CVE-2023-52428, CVE-2022-38900, CVE-2022-24785, CVE-2016-1000027, CVE-2021-33587, CVE-2025-41248, CVE-2023-26159, CVE-2024-37890, CVE-2025-48976, CVE-2024-21538, CVE-2022-24771, CVE-2024-29415, CVE-2020-28471, CVE-2021-3803, CVE-2023-45133 | 11/20/2025 | development |
| atlassian_confluence CONFSERVER-101487: Prototype Pollution Third-Party Dependency in Confluence Data Center and Server - CVE-2022-46175 | CVE-2022-31129, CVE-2024-25710, CVE-2025-48387, CVE-2025-55163, CVE-2022-46175, CVE-2021-23337, CVE-2024-38819, CVE-2025-48734, CVE-2024-22259, CVE-2025-22235, CVE-2022-24772, CVE-2024-4068, CVE-2025-22166, CVE-2025-22228, CVE-2021-3807, CVE-2023-42282, CVE-2024-45296, CVE-2024-38999, CVE-2020-8203, CVE-2024-45590, CVE-2023-52428, CVE-2022-38900, CVE-2022-24785, CVE-2016-1000027, CVE-2021-33587, CVE-2025-41248, CVE-2023-26159, CVE-2024-37890, CVE-2025-48976, CVE-2024-21538, CVE-2022-24771, CVE-2024-29415, CVE-2020-28471, CVE-2021-3803, CVE-2023-45133 | 11/20/2025 | development |
| atlassian_confluence CONFSERVER-101486: DoS (Denial of Service) Third-Party Dependency in Confluence Data Center and Server - CVE-2023-42282 | CVE-2022-31129, CVE-2024-25710, CVE-2025-48387, CVE-2025-55163, CVE-2022-46175, CVE-2021-23337, CVE-2024-38819, CVE-2025-48734, CVE-2024-22259, CVE-2025-22235, CVE-2022-24772, CVE-2024-4068, CVE-2025-22166, CVE-2025-22228, CVE-2021-3807, CVE-2023-42282, CVE-2024-45296, CVE-2024-38999, CVE-2020-8203, CVE-2024-45590, CVE-2023-52428, CVE-2022-38900, CVE-2022-24785, CVE-2016-1000027, CVE-2021-33587, CVE-2025-41248, CVE-2023-26159, CVE-2024-37890, CVE-2025-48976, CVE-2024-21538, CVE-2022-24771, CVE-2024-29415, CVE-2020-28471, CVE-2021-3803, CVE-2023-45133 | 11/20/2025 | development |
| Motex LANSCOPE Endpoint Manager Improper Verification of Source of a Communication Channel Vulnerability (CVE-2025-61932) | CVE-2025-61932 | 11/18/2025 | development |
| Rapid7 Velociraptor Incorrect Default Permissions Vulnerability (CVE-2025-6264) | CVE-2025-6264 | 11/17/2025 | development |
| Security Update for Intel Killer Performance Suite | CVE-2025-24491 | 11/14/2025 | development |
| Security Update for Intel Distribution for Python Software | CVE-2025-30182 | 11/14/2025 | development |
| cisco cisco-sa-cc-unauth-rce-QeN8h7mQ: Cisco Unified Contact Center Express Remote Code Execution Vulnerabilities | CVE-2025-20358, CVE-2025-20354 | 11/12/2025 | development |
| Security Update for Dell iDRAC | CVE-2025-22397 | 11/12/2025 | development |
| FA plugin updates for ubuntu_linux: 2025/11/06 12:19 chunk 1/1 | CVE-2025-64459, CVE-2025-64458 | 11/7/2025 | development |
| redhat RHSA-2025:19512: RHSA-2025:19512: pcs security update (Important) | CVE-2025-59830, CVE-2025-61772, CVE-2025-61771, CVE-2025-61919, CVE-2025-61770 | 11/4/2025 | development |
| suse_linux SUSE-SU-2025:03606-1: SUSE openSUSE 15 : Security update for squid (Important) (SUSE-SU-2025:03606-1) | CVE-2025-59362 | 10/16/2025 | development |
| suse_linux SUSE-SU-2025:03600-1: SUSE openSUSE 15 : Security update for the Linux Kernel (Important) (SUSE-SU-2025:03600-1) | CVE-2025-39833, CVE-2025-39675, CVE-2025-39783, CVE-2023-53181, CVE-2023-53215, CVE-2023-53343, CVE-2023-53456, CVE-2023-53177, CVE-2025-39925, CVE-2023-53395, CVE-2025-39844, CVE-2025-38622, CVE-2023-53379, CVE-2025-39763, CVE-2025-38706, CVE-2025-38725, CVE-2025-38735, CVE-2023-53247, CVE-2023-53325, CVE-2024-58240, CVE-2023-53263, CVE-2023-53264, CVE-2025-39824, CVE-2023-39197, CVE-2023-53444, CVE-2025-39782, CVE-2023-53303, CVE-2025-38713, CVE-2023-53432, CVE-2023-53462, CVE-2023-53446, CVE-2023-53206, CVE-2023-53394, CVE-2025-39860, CVE-2023-53336, CVE-2025-38593, CVE-2025-38721, CVE-2023-53357, CVE-2023-53520, CVE-2025-39923, CVE-2023-53257, CVE-2023-53179, CVE-2025-39889, CVE-2023-53217, CVE-2025-39800, CVE-2025-39849, CVE-2023-53369, CVE-2025-39709, CVE-2025-39677, CVE-2023-53350, CVE-2025-38488, CVE-2025-39710, CVE-2025-39853, CVE-2023-53323, CVE-2023-53500, CVE-2025-39726, CVE-2025-39738, CVE-2023-53316, CVE-2023-53374, CVE-2023-53448, CVE-2025-39806, CVE-2025-39907, CVE-2023-53421, CVE-2023-53180, CVE-2025-38692, CVE-2025-39857, CVE-2023-53480, CVE-2025-39827, CVE-2024-58090, CVE-2025-39714, CVE-2023-53238, CVE-2025-38724, CVE-2025-39787, CVE-2025-39850, CVE-2023-53420, CVE-2025-38456, CVE-2025-39685, CVE-2025-38605, CVE-2025-38694, CVE-2025-38685, CVE-2023-53312, CVE-2023-53333, CVE-2025-39770, CVE-2025-39797, CVE-2023-53183, CVE-2025-38574, CVE-2023-53492, CVE-2023-53360, CVE-2023-53457, CVE-2023-53488, CVE-2023-53510, CVE-2023-53505, CVE-2025-38597, CVE-2023-53501, CVE-2025-39869, CVE-2023-53479, CVE-2023-53518, CVE-2023-53516, CVE-2025-39751, CVE-2025-39694, CVE-2025-39825, CVE-2025-39742, CVE-2023-53461, CVE-2023-53371, CVE-2025-39871, CVE-2023-53196, CVE-2023-53441, CVE-2023-53331, CVE-2023-53207, CVE-2023-53436, CVE-2025-39810, CVE-2025-38679, CVE-2025-38640, CVE-2025-38616, CVE-2023-53367, CVE-2023-53490, CVE-2023-53485, CVE-2025-39686, CVE-2023-53205, CVE-2023-53365, CVE-2023-53167, CVE-2023-53377, CVE-2023-53311, CVE-2025-39847, CVE-2023-53245, CVE-2023-53339, CVE-2025-39790, CVE-2023-53255, CVE-2025-39739, CVE-2023-53319, CVE-2023-53291, CVE-2023-53280, CVE-2023-53472, CVE-2025-38643, CVE-2023-53230, CVE-2023-53147, CVE-2023-53248, CVE-2023-53491, CVE-2025-38698, CVE-2023-53527, CVE-2023-53260, CVE-2023-53201, CVE-2024-26584, CVE-2023-53496, CVE-2023-53304, CVE-2023-53314, CVE-2025-38695, CVE-2023-53235, CVE-2025-39750, CVE-2023-53426, CVE-2025-38584, CVE-2025-38639, CVE-2023-53185, CVE-2025-38732, CVE-2025-39730, CVE-2023-53275, CVE-2025-39705, CVE-2025-39691, CVE-2025-39891, CVE-2025-39679, CVE-2025-39682, CVE-2025-39861, CVE-2025-39724, CVE-2023-53321, CVE-2023-53391, CVE-2023-53528, CVE-2023-53292, CVE-2023-53454, CVE-2025-38660, CVE-2025-39864, CVE-2023-53189, CVE-2025-38263, CVE-2023-31248, CVE-2025-38702, CVE-2023-53368, CVE-2023-53451, CVE-2025-38693, CVE-2025-39773, CVE-2025-39832, CVE-2025-39920, CVE-2025-38730, CVE-2023-53530, CVE-2025-38623, CVE-2025-39693, CVE-2025-39764, CVE-2025-39798, CVE-2025-39823, CVE-2023-53220, CVE-2023-53463, CVE-2023-53354, CVE-2025-38255, CVE-2025-39845, CVE-2023-53226, CVE-2025-38514, CVE-2025-39865, CVE-2025-38691, CVE-2025-38701, CVE-2023-42753, CVE-2023-53438, CVE-2025-38527, CVE-2025-38676, CVE-2023-53165, CVE-2023-53192, CVE-2025-38351, CVE-2025-39835, CVE-2025-38645, CVE-2023-53187, CVE-2025-38736, CVE-2023-53322, CVE-2023-53425, CVE-2023-53370, CVE-2025-38687, CVE-2025-39684, CVE-2023-53447, CVE-2025-38668, CVE-2025-39706, CVE-2025-38614, CVE-2023-53249, CVE-2025-38664, CVE-2025-39732, CVE-2025-39718, CVE-2025-39703, CVE-2023-53175, CVE-2023-53386, CVE-2025-39808, CVE-2023-53364, CVE-2023-53151, CVE-2025-38680, CVE-2023-53342, CVE-2023-53174, CVE-2025-39701, CVE-2023-53495, CVE-2025-39746, CVE-2025-38419, CVE-2025-39882, CVE-2025-39848, CVE-2023-53287, CVE-2025-38466, CVE-2025-22022, CVE-2025-38727, CVE-2025-39713, CVE-2023-53274, CVE-2023-53523, CVE-2023-53507, CVE-2023-53487, CVE-2025-39744, CVE-2023-53204, CVE-2025-38119, CVE-2025-38659, CVE-2025-39761, CVE-2023-53328, CVE-2023-53508, CVE-2023-53222, CVE-2023-53515, CVE-2023-53401, CVE-2023-53305, CVE-2025-38678, CVE-2025-38526, CVE-2023-53324, CVE-2023-53195, CVE-2025-38418, CVE-2023-53221, CVE-2025-39839, CVE-2025-39826, CVE-2025-38590, CVE-2023-53184, CVE-2023-53252, CVE-2025-39838, CVE-2023-53531, CVE-2023-3772, CVE-2025-39719, CVE-2023-53150, CVE-2023-53210, CVE-2025-40300, CVE-2023-53286, CVE-2025-39846, CVE-2025-38408, CVE-2025-38681, CVE-2023-53385, CVE-2023-53258, CVE-2023-53209, CVE-2023-53504, CVE-2025-38734, CVE-2023-53313, CVE-2023-53251, CVE-2023-53465, CVE-2023-53208, CVE-2023-53352, CVE-2025-39721, CVE-2025-39842, CVE-2023-53152, CVE-2025-38556, CVE-2023-53442, CVE-2025-39801, CVE-2023-53261, CVE-2025-38544, CVE-2025-39678, CVE-2023-53309, CVE-2025-38402, CVE-2023-53384, CVE-2023-53424, CVE-2023-53397, CVE-2023-53288, CVE-2023-53356, CVE-2025-38465, CVE-2025-38697, CVE-2025-38683, CVE-2025-39681, CVE-2023-53380, CVE-2025-38715, CVE-2023-53362, CVE-2025-39758, CVE-2025-38234, CVE-2023-53243, CVE-2023-53519, CVE-2025-39757, CVE-2025-39870, CVE-2023-53493, CVE-2025-38705, CVE-2025-39754, CVE-2025-38722, CVE-2025-38684, CVE-2025-39854, CVE-2023-53429, CVE-2025-39766, CVE-2023-53428, CVE-2025-39772, CVE-2025-39749, CVE-2023-53170, CVE-2025-39863, CVE-2025-39885, CVE-2025-38729, CVE-2023-53272, CVE-2025-39759, CVE-2023-53231, CVE-2023-53526, CVE-2025-39873, CVE-2025-38533, CVE-2025-39743, CVE-2023-53338, CVE-2025-38712, CVE-2025-38709, CVE-2025-38714, CVE-2025-38595, CVE-2023-53148, CVE-2025-39760 | 10/16/2025 | development |
| suse_linux SUSE-SU-2025:03599-1: SUSE openSUSE 15 : Security update for qt6-base (Moderate) (SUSE-SU-2025:03599-1) | CVE-2025-5455, CVE-2025-30348 | 10/16/2025 | development |
| redhat RHSA-2025:17776: RHSA-2025:17776: kernel security update (Moderate) | CVE-2025-39757, CVE-2025-39761, CVE-2025-38556 | 10/13/2025 | development |
| redhat RHSA-2025:17797: RHSA-2025:17797: kernel security update (Moderate) | CVE-2022-50228, CVE-2023-53305 | 10/13/2025 | development |
| redhat RHSA-2025:17733: RHSA-2025:17733: kernel security update (Important) | CVE-2021-22555 | 10/11/2025 | development |
| oracle_linux ELSA-2025-17377: ELSA-2025-17377: kernel security update (MODERATE) | CVE-2025-38351, CVE-2024-50301, CVE-2025-39761 | 10/8/2025 | development |