Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-21517 |
4.7 (3.1)
|
Windows App for Mac Installer Elevation of Privilege V… |
Microsoft |
Windows App for Mac |
2026-02-10T17:51:15.940Z | 2026-02-13T22:30:47.445Z |
| CVE-2026-20846 |
7.5 (3.1)
|
GDI+ Denial of Service Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:49.875Z | 2026-02-13T22:30:46.269Z |
| CVE-2026-20841 |
7.8 (3.1)
|
Windows Notepad App Remote Code Execution Vulnerability |
Microsoft |
Windows Notepad |
2026-02-10T17:51:50.412Z | 2026-02-13T22:30:46.908Z |
| CVE-2026-21228 |
8.1 (3.1)
|
Azure Local Remote Code Execution Vulnerability |
Microsoft |
Azure Local |
2026-02-10T17:51:48.818Z | 2026-02-13T22:30:45.048Z |
| CVE-2026-21222 |
5.5 (3.1)
|
Windows Kernel Information Disclosure Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:49.321Z | 2026-02-13T22:30:45.639Z |
| CVE-2026-21231 |
7.8 (3.1)
|
Windows Kernel Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:48.230Z | 2026-02-13T22:30:44.462Z |
| CVE-2026-21237 |
7 (3.1)
|
Windows Subsystem for Linux Elevation of Privilege Vul… |
Microsoft |
Windows 10 Version 21H2 |
2026-02-10T17:51:47.120Z | 2026-02-13T22:30:43.334Z |
| CVE-2026-21232 |
7.8 (3.1)
|
Windows HTTP.sys Elevation of Privilege Vulnerability |
Microsoft |
Windows 11 version 22H3 |
2026-02-10T17:51:47.717Z | 2026-02-13T22:30:43.935Z |
| CVE-2026-21239 |
7.8 (3.1)
|
Windows Kernel Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:45.888Z | 2026-02-13T22:30:42.308Z |
| CVE-2026-21238 |
7.8 (3.1)
|
Windows Ancillary Function Driver for WinSock Elevatio… |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:46.513Z | 2026-02-13T22:30:42.874Z |
| CVE-2026-21241 |
7 (3.1)
|
Windows Ancillary Function Driver for WinSock Elevatio… |
Microsoft |
Windows 11 version 22H3 |
2026-02-10T17:51:45.304Z | 2026-02-13T22:30:41.758Z |
| CVE-2026-21240 |
7.8 (3.1)
|
Windows HTTP.sys Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2026-02-10T17:51:44.627Z | 2026-02-13T22:30:41.120Z |
| CVE-2026-21244 |
7.3 (3.1)
|
Windows Hyper-V Remote Code Execution Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:43.396Z | 2026-02-13T22:30:40.031Z |
| CVE-2026-21243 |
7.5 (3.1)
|
Windows Lightweight Directory Access Protocol (LDAP) D… |
Microsoft |
Windows Server 2019 |
2026-02-10T17:51:43.963Z | 2026-02-13T22:30:40.569Z |
| CVE-2026-21245 |
7.8 (3.1)
|
Windows Kernel Elevation of Privilege Vulnerability |
Microsoft |
Windows 11 Version 24H2 |
2026-02-10T17:51:42.716Z | 2026-02-13T22:30:39.408Z |
| CVE-2026-21250 |
7.8 (3.1)
|
Windows HTTP.sys Elevation of Privilege Vulnerability |
Microsoft |
Windows 11 Version 24H2 |
2026-02-10T17:51:41.521Z | 2026-02-13T22:30:38.271Z |
| CVE-2026-21249 |
3.3 (3.1)
|
Windows NTLM Spoofing Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:42.124Z | 2026-02-13T22:30:38.826Z |
| CVE-2026-21253 |
7 (3.1)
|
Mailslot File System Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:39.411Z | 2026-02-13T22:30:37.193Z |
| CVE-2026-21251 |
7.8 (3.1)
|
Cluster Client Failover (CCF) Elevation of Privilege V… |
Microsoft |
Windows Server 2016 |
2026-02-10T17:51:40.939Z | 2026-02-13T22:30:37.684Z |
| CVE-2026-21256 |
8.8 (3.1)
|
GitHub Copilot and Visual Studio Remote Code Execution… |
Microsoft |
Microsoft Visual Studio 2022 version 17.14 |
2026-02-10T17:51:38.364Z | 2026-02-13T22:30:36.020Z |
| CVE-2026-21255 |
8.8 (3.1)
|
Windows Hyper-V Security Feature Bypass Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:38.926Z | 2026-02-13T22:30:36.579Z |
| CVE-2026-21257 |
8 (3.1)
|
GitHub Copilot and Visual Studio Elevation of Privileg… |
Microsoft |
Microsoft Visual Studio 2022 version 17.14 |
2026-02-10T17:51:37.741Z | 2026-02-13T22:30:35.483Z |
| CVE-2026-21508 |
7 (3.1)
|
Windows Storage Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:36.479Z | 2026-02-13T22:30:34.258Z |
| CVE-2026-21261 |
5.5 (3.1)
|
Microsoft Excel Information Disclosure Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-02-10T17:51:37.088Z | 2026-02-13T22:30:34.836Z |
| CVE-2026-21511 |
7.5 (3.1)
|
Microsoft Outlook Spoofing Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-02-10T17:51:35.908Z | 2026-02-13T22:30:33.619Z |
| CVE-2026-21525 |
6.2 (3.1)
|
Windows Remote Access Connection Manager Denial of Ser… |
Microsoft |
Windows 10 Version 1607 |
2026-02-10T17:51:34.755Z | 2026-02-13T22:30:32.403Z |
| CVE-2026-21516 |
8.8 (3.1)
|
GitHub Copilot for Jetbrains Remote Code Execution Vul… |
Microsoft |
GitHub Copilot Plugin for JetBrains IDEs |
2026-02-10T17:51:35.340Z | 2026-02-13T22:30:32.984Z |
| CVE-2026-21529 |
5.7 (3.1)
|
Azure HDInsight Spoofing Vulnerability |
Microsoft |
Azure HDInsight |
2026-02-10T17:51:33.525Z | 2026-02-13T22:30:31.301Z |
| CVE-2026-21514 |
7.8 (3.1)
|
Microsoft Word Security Feature Bypass Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-02-10T17:51:34.153Z | 2026-02-13T22:30:31.778Z |
| CVE-2026-21537 |
8.8 (3.1)
|
Microsoft Defender for Endpoint Linux Extension Remote… |
Microsoft |
Microsoft Defender for Endpoint for Linux |
2026-02-10T17:51:32.870Z | 2026-02-13T22:30:30.725Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-1446 |
5 (3.1)
|
XSS issue is Esri ArcGIS Pro versions 3.6.0 and earlier |
Esri |
ArcGIS Pro |
2026-01-26T17:24:12.411Z | 2026-02-06T06:04:15.645Z |
| CVE-2025-67706 |
5.6 (3.1)
|
Unvalidated File Upload vulnerability in ArcGIS Server. |
Esri |
ArcGIS Server |
2025-12-31T22:15:44.035Z | 2026-02-06T05:56:48.794Z |
| CVE-2024-51962 |
8.7 (3.1)
|
SQL injection vulnerability in ArcGIS Server |
Esri |
ArcGIS Server |
2025-03-03T19:58:48.928Z | 2026-02-06T06:08:07.932Z |
| CVE-2024-25709 |
6.1 (3.1)
|
Self-XSS style in move item dialog |
Esri |
Portal for ArcGIS |
2024-04-04T17:55:17.893Z | 2026-02-06T06:10:48.587Z |
| CVE-2024-25705 |
5.4 (3.1)
|
Cross site scripting issue in embed widget |
Esri |
Portal for ArcGIS |
2024-04-04T17:55:55.942Z | 2026-02-06T06:12:10.286Z |
| CVE-2024-51954 |
8.5 (3.1)
|
Unauthorized access to secure services in ArcGIS Server |
Esri |
ArcGIS Server |
2025-03-03T19:53:21.215Z | 2026-02-06T06:06:30.794Z |
| CVE-2025-67707 |
5.6 (3.1)
|
Unvalidated File Upload vulnerability in ArcGIS Server. |
Esri |
ArcGIS Server |
2025-12-31T22:16:14.745Z | 2026-02-06T05:59:15.358Z |
| CVE-2024-25699 |
8.5 (3.1)
|
Portal for ArcGIS has an invalid authentication vulner… |
Esri |
Portal for ArcGIS |
2024-04-04T17:56:25.557Z | 2026-02-06T06:13:23.035Z |
| CVE-2024-8149 |
4.6 (3.1)
|
BUG-000168624 - Unvalidated redirect in Portal for ArcGIS. |
Esri |
Portal for ArcGIS |
2024-10-04T17:14:39.010Z | 2026-02-06T06:15:10.027Z |
| CVE-2023-25837 |
8.4 (3.1)
|
BUG-000133088 - ArcGIS Enterprise site builder is subj… |
Esri |
Portal for ArcGIS Sites |
2023-07-21T03:42:24.610Z | 2026-02-06T06:16:41.493Z |
| CVE-2023-25835 |
8.4 (3.1)
|
BUG-000153659 ArcGIS Enterprise Sites has a stored XS… |
Esri |
Portal for ArcGIS Sites |
2023-07-20T23:30:50.190Z | 2026-02-06T06:17:43.231Z |
| CVE-2026-22220 |
6.8 (4.0)
|
Improper Input Validation Leading to DoS on TP-Link Ar… |
TP-Link Systems Inc. |
Archer BE230 v1.2 |
2026-02-03T17:15:59.836Z | 2026-02-04T18:32:13.840Z |
| CVE-2026-22228 |
6.8 (4.0)
|
Improper Input Validation Leading to DoS on TP-Link Ar… |
TP-Link Systems Inc. |
Archer BE230 v1.2 |
2026-02-03T17:20:34.537Z | 2026-02-04T18:28:42.403Z |
| CVE-2025-68157 |
3.7 (3.1)
|
webpack buildHttp HttpUriPlugin allowedUris bypass via… |
webpack |
webpack |
2026-02-05T23:08:13.214Z | 2026-02-06T19:29:14.352Z |
| CVE-2025-64657 |
9.8 (3.1)
|
Azure Application Gateway Elevation of Privilege Vulne… |
Microsoft |
Azure App Gateway |
2025-11-26T00:20:52.352Z | 2026-02-13T20:46:20.037Z |
| CVE-2025-46305 |
5.7 (3.1)
|
The issue was addressed with improved bounds chec… |
Apple |
macOS |
2026-02-11T22:58:09.916Z | 2026-02-13T18:59:36.484Z |
| CVE-2025-46304 |
5.7 (3.1)
|
The issue was addressed with improved bounds chec… |
Apple |
macOS |
2026-02-11T22:58:04.411Z | 2026-02-13T18:59:39.713Z |
| CVE-2025-46303 |
5.7 (3.1)
|
The issue was addressed with improved bounds chec… |
Apple |
macOS |
2026-02-11T22:58:28.265Z | 2026-02-13T18:59:42.673Z |
| CVE-2025-46302 |
5.7 (3.1)
|
The issue was addressed with improved bounds chec… |
Apple |
macOS |
2026-02-11T22:58:14.458Z | 2026-02-13T18:59:50.297Z |
| CVE-2025-46301 |
5.7 (3.1)
|
The issue was addressed with improved bounds chec… |
Apple |
macOS |
2026-02-11T22:58:46.183Z | 2026-02-13T18:59:55.810Z |
| CVE-2025-46300 |
5.7 (3.1)
|
The issue was addressed with improved bounds chec… |
Apple |
macOS |
2026-02-11T22:58:30.792Z | 2026-02-13T19:00:07.999Z |
| CVE-2025-36552 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:10:42.204Z | |
| CVE-2025-36545 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:16.143Z | |
| CVE-2025-36542 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:17.424Z | |
| CVE-2025-36538 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:18.604Z | |
| CVE-2025-36534 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:19.538Z | |
| CVE-2025-36532 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:20.473Z | |
| CVE-2025-36526 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:21.535Z | |
| CVE-2025-36524 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:22.471Z | |
| CVE-2025-36523 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused | N/A | N/A | 2026-02-13T18:11:23.390Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-1446 | There is a Cross‑Site Scripting (XSS) issue in Esri ArcGIS Pro versions 3.6.0 and earlier. ArcGIS P… | 2026-01-26T18:16:30.140 | 2026-02-13T19:41:55.783 |
| fkie_cve-2025-67706 | ArcGIS Server version 11.5 and earlier on Windows and Linux does not properly validate uploaded fil… | 2025-12-31T23:15:41.687 | 2026-02-13T19:41:51.960 |
| fkie_cve-2024-51962 | A SQL injection vulnerability in ArcGIS Server allows an EDIT operation to modify column properties… | 2025-03-03T20:15:43.043 | 2026-02-13T19:41:49.147 |
| fkie_cve-2024-25709 | There is a stored Cross‑Site Scripting (XSS) vulnerability in Esri Portal for ArcGIS versions 11.2 … | 2024-04-04T18:15:13.340 | 2026-02-13T19:41:45.883 |
| fkie_cve-2024-25705 | There is a cross‑site scripting (XSS) vulnerability in Esri Portal for ArcGIS Experience Builder ve… | 2024-04-04T18:15:12.603 | 2026-02-13T19:41:39.000 |
| fkie_cve-2024-51954 | There is an improper access control issue in ArcGIS Server versions 11.3 and below on Windows and L… | 2025-03-03T20:15:41.903 | 2026-02-13T19:41:36.327 |
| fkie_cve-2025-67707 | ArcGIS Server version 11.5 and earlier on Windows and Linux does not properly validate uploaded fil… | 2025-12-31T23:15:41.833 | 2026-02-13T19:41:33.480 |
| fkie_cve-2024-25699 | There is a difficult‑to‑exploit improper authentication issue in the Home application for Esri Port… | 2024-04-04T18:15:11.593 | 2026-02-13T19:41:30.620 |
| fkie_cve-2024-8149 | There is a reflected Cross‑Site Scripting (XSS) vulnerability in Esri Portal for ArcGIS versions 11… | 2024-10-04T18:15:08.833 | 2026-02-13T19:41:27.740 |
| fkie_cve-2023-25837 | There is a Cross‑Site Scripting (XSS) vulnerability in Esri ArcGIS Enterprise Sites versions 10.9 a… | 2023-07-21T04:15:12.377 | 2026-02-13T19:41:24.867 |
| fkie_cve-2023-25835 | There is a stored Cross‑Site Scripting (XSS) vulnerability in Esri Portal for ArcGIS Sites versions… | 2023-07-21T00:15:10.343 | 2026-02-13T19:41:21.620 |
| fkie_cve-2026-22220 | A lack of proper input validation in the HTTP processing path in TP-Link Archer BE230 v1.2 (web mod… | 2026-02-03T18:16:19.077 | 2026-02-13T19:26:51.867 |
| fkie_cve-2026-22228 | An authenticated user with high privileges may trigger a denial‑of‑service condition in TP-Link Arc… | 2026-02-03T18:16:19.227 | 2026-02-13T19:25:43.203 |
| fkie_cve-2025-68157 | Webpack is a module bundler. From version 5.49.0 to before 5.104.0, when experiments.buildHttp is e… | 2026-02-05T23:15:53.777 | 2026-02-13T19:21:27.670 |
| fkie_cve-2025-64657 | Stack-based buffer overflow in Azure Application Gateway allows an unauthorized attacker to elevate… | 2025-11-26T01:16:07.747 | 2026-02-13T19:17:27.853 |
| fkie_cve-2025-46305 | The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, i… | 2026-02-11T23:16:03.030 | 2026-02-13T19:16:32.560 |
| fkie_cve-2025-46304 | The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, i… | 2026-02-11T23:16:02.930 | 2026-02-13T19:16:32.413 |
| fkie_cve-2025-46303 | The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, i… | 2026-02-11T23:16:02.830 | 2026-02-13T19:16:32.260 |
| fkie_cve-2025-46302 | The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, i… | 2026-02-11T23:16:02.733 | 2026-02-13T19:16:32.110 |
| fkie_cve-2025-46301 | The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, i… | 2026-02-11T23:16:02.630 | 2026-02-13T19:16:31.963 |
| fkie_cve-2025-46300 | The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, i… | 2026-02-11T23:16:02.527 | 2026-02-13T19:16:31.773 |
| fkie_cve-2025-36552 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:31.700 | 2026-02-13T19:16:31.700 |
| fkie_cve-2025-36545 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:31.640 | 2026-02-13T19:16:31.640 |
| fkie_cve-2025-36542 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:31.580 | 2026-02-13T19:16:31.580 |
| fkie_cve-2025-36538 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:31.520 | 2026-02-13T19:16:31.520 |
| fkie_cve-2025-36534 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:31.460 | 2026-02-13T19:16:31.460 |
| fkie_cve-2025-36532 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:31.400 | 2026-02-13T19:16:31.400 |
| fkie_cve-2025-36526 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:31.343 | 2026-02-13T19:16:31.343 |
| fkie_cve-2025-36524 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:31.283 | 2026-02-13T19:16:31.283 |
| fkie_cve-2025-36523 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T19:16:31.220 | 2026-02-13T19:16:31.220 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-4p49-fwp8-38mv |
8.8 (3.1)
|
Authentication Bypass Using an Alternate Path or Channel vulnerability in Universal Software Inc. F… | 2026-02-13T15:30:26Z | 2026-02-13T15:30:26Z |
| ghsa-wxwg-9693-mqg4 |
3.3 (3.1)
|
A logic issue was addressed with improved validation. This issue is fixed in iOS 18.7.5 and iPadOS … | 2026-02-12T00:31:05Z | 2026-02-13T15:30:24Z |
| ghsa-wp4v-6rrv-wqv9 |
5.5 (3.1)
|
An authorization issue was addressed with improved state management. This issue is fixed in iOS 26.… | 2026-02-12T00:31:05Z | 2026-02-13T15:30:24Z |
| ghsa-r5cf-37x9-4hgv |
7.8 (3.1)
|
A package validation issue was addressed by blocking the vulnerable package. This issue is fixed in… | 2026-02-12T00:31:05Z | 2026-02-13T15:30:24Z |
| ghsa-4m8q-p6h8-x2wj |
5.5 (3.1)
|
The issue was addressed with improved memory handling. This issue is fixed in watchOS 26.3, tvOS 26… | 2026-02-12T00:31:05Z | 2026-02-13T15:30:24Z |
| ghsa-hpj8-5pv7-f58m |
8.8 (3.1)
|
Use after free in Ozone in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convi… | 2026-02-11T21:30:40Z | 2026-02-13T15:30:23Z |
| ghsa-cqx4-h5ph-3xj9 |
7.5 (3.1)
7.7 (4.0)
|
Notepad++ versions prior to 8.8.9, when using the WinGUp updater, contain an update integrity verif… | 2026-02-03T03:30:26Z | 2026-02-13T15:30:23Z |
| ghsa-8xrx-9wj4-6775 |
7.5 (3.1)
|
A logging issue was addressed with improved data redaction. This issue is fixed in watchOS 26.3, iO… | 2026-02-12T00:31:04Z | 2026-02-13T15:30:23Z |
| ghsa-8qwr-rrp6-9jjv |
9.0 (3.1)
|
Axigen Mail Server before 10.5.57 contains multiple stored Cross-Site Scripting (XSS) vulnerabiliti… | 2026-02-05T18:30:32Z | 2026-02-13T15:30:23Z |
| ghsa-5m2c-5h5x-7j8g |
9.1 (3.1)
|
Axigen Mail Server before 10.5.57 contains an improper access control vulnerability in the WebAdmin… | 2026-02-05T18:30:30Z | 2026-02-13T15:30:23Z |
| ghsa-366r-6rjw-f277 |
3.3 (3.1)
|
A logging issue was addressed with improved data redaction. This issue is fixed in macOS Tahoe 26.3… | 2026-02-12T00:31:04Z | 2026-02-13T15:30:23Z |
| ghsa-25c8-jwjc-6mjh |
8.8 (3.1)
|
Axigen Mail Server before 10.5.57 and 10.6.x before 10.6.26 contains a Cross-Site Request Forgery (… | 2026-02-05T18:30:30Z | 2026-02-13T15:30:23Z |
| ghsa-jp3q-wwp3-pwv9 |
2.1 (4.0)
|
Freeform Craft Plugin CP UI (builder/integrations) has Stored Cross-Site Scripting (XSS) issue | 2026-01-22T21:41:14Z | 2026-02-13T14:57:31Z |
| ghsa-9f3f-wv7r-qc8r |
5.9 (3.1)
|
Pion DTLS's usage of random nonce generation with AES GCM ciphers risks leaking the authentication key | 2026-02-11T15:13:12Z | 2026-02-13T14:18:28Z |
| ghsa-hg24-p7xv-jhq8 |
5.3 (3.1)
|
A flaw was identified in libsoup, a widely used HTTP library in GNOME-based systems. When processin… | 2026-02-13T12:31:21Z | 2026-02-13T12:31:21Z |
| ghsa-qvpr-vq7h-28cr |
2.5 (4.0)
|
Improper Certificate Validation vulnerability in Thales SafeNet Agent for Windows Logon on Windows … | 2026-02-13T09:30:14Z | 2026-02-13T09:30:15Z |
| ghsa-wqfr-wcp9-8hjx |
6.0 (4.0)
|
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporati… | 2026-02-13T06:30:48Z | 2026-02-13T06:30:48Z |
| ghsa-w2wv-47q4-8cfp |
6.0 (4.0)
|
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporati… | 2026-02-13T06:30:48Z | 2026-02-13T06:30:48Z |
| ghsa-qgqm-fpvv-jgfh |
8.8 (3.1)
8.7 (4.0)
|
FileZen contains an OS command injection vulnerability. When FileZen Antivirus Check Option is enab… | 2026-02-13T06:30:48Z | 2026-02-13T06:30:48Z |
| ghsa-m89x-fmf3-8qg7 |
|
Rejected reason: Not used | 2026-02-13T06:30:48Z | 2026-02-13T06:30:48Z |
| ghsa-m427-5j3m-c367 |
6.0 (4.0)
|
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporati… | 2026-02-13T06:30:48Z | 2026-02-13T06:30:48Z |
| ghsa-hj36-wjv6-r2jg |
|
Rejected reason: Not used | 2026-02-13T06:30:48Z | 2026-02-13T06:30:48Z |
| ghsa-g49m-vv72-hpjc |
6.0 (4.0)
|
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporati… | 2026-02-13T06:30:48Z | 2026-02-13T06:30:48Z |
| ghsa-8h65-hm9c-rm83 |
|
Rejected reason: Not used | 2026-02-13T06:30:47Z | 2026-02-13T06:30:48Z |
| ghsa-87x6-px5f-h23m |
6.0 (4.0)
|
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporati… | 2026-02-13T06:30:48Z | 2026-02-13T06:30:48Z |
| ghsa-74ff-438v-4pmv |
|
Rejected reason: Not used | 2026-02-13T06:30:48Z | 2026-02-13T06:30:48Z |
| ghsa-6r9v-ccr5-c2v6 |
|
Rejected reason: Not used | 2026-02-13T06:30:48Z | 2026-02-13T06:30:48Z |
| ghsa-6q5j-vm4q-pg2w |
|
Rejected reason: Not used | 2026-02-13T06:30:48Z | 2026-02-13T06:30:48Z |
| ghsa-63pv-7q5h-42xq |
|
Rejected reason: Not used | 2026-02-13T06:30:48Z | 2026-02-13T06:30:48Z |
| ghsa-5mvg-hq8x-4fhj |
|
Rejected reason: Not used | 2026-02-13T06:30:48Z | 2026-02-13T06:30:48Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2023-287 |
4.3 (3.1)
|
Nautobot is a Network Source of Truth and Network Automation Platform built as a web appl… | nautobot | 2023-12-22T17:15:00+00:00 | 2024-11-21T14:22:55.764934+00:00 |
| pysec-2023-286 |
5.3 (3.1)
|
Nautobot is a Network Source of Truth and Network Automation Platform built as a web appl… | nautobot | 2023-12-12T23:15:00+00:00 | 2024-11-21T14:22:55.664554+00:00 |
| pysec-2023-285 |
5.4 (3.1)
|
Nautobot is a Network Source of Truth and Network Automation Platform built as a web appl… | nautobot | 2023-11-22T16:15:00+00:00 | 2024-11-21T14:22:55.567982+00:00 |
| pysec-2023-284 |
6.5 (3.1)
|
Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4. | modoboa | 2023-01-23T14:15:00+00:00 | 2024-11-21T14:22:55.160710+00:00 |
| pysec-2023-283 |
4.3 (3.1)
|
Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4. | modoboa | 2023-01-19T18:15:00+00:00 | 2024-11-21T14:22:55.105976+00:00 |
| pysec-2023-282 |
6.5 (3.1)
|
Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4. | modoboa | 2023-01-19T09:15:00+00:00 | 2024-11-21T14:22:55.051300+00:00 |
| pysec-2022-43141 |
7.5 (3.1)
|
MotionEye v0.42.1 and below allows attackers to access sensitive information via a GET re… | motioneye | 2022-03-24T17:15:00+00:00 | 2024-11-21T14:22:55.422153+00:00 |
| pysec-2012-37 |
|
The (1) EC2 and (2) OS APIs in OpenStack Compute (Nova) Folsom (2012.2), Essex (2012.1), … | nova | 2012-06-21T15:55:00Z | 2024-11-21T14:22:55.891133Z |
| pysec-2012-36 |
|
Openstack Compute (Nova) Folsom, 2012.1, and 2011.3 does not limit the number of security… | nova | 2012-06-07T19:55:00Z | 2024-11-21T14:22:55.825436Z |
| pysec-2023-281 |
8.8 (3.1)
|
Improper Neutralization of Special Elements Used in a Template Engine in GitHub repositor… | mlflow | 2023-12-12T04:15:00+00:00 | 2024-11-21T14:22:54.938745+00:00 |
| pysec-2023-280 |
7.8 (3.1)
|
OS Command Injection in GitHub repository mlflow/mlflow prior to 2.6.0. | mlflow | 2023-08-01T01:15:00+00:00 | 2024-11-21T14:22:54.880705+00:00 |
| pysec-2023-279 |
9.1 (3.1)
|
MindsDB is a SQL Server for artificial intelligence. Prior to version 23.11.4.1, the `put… | mindsdb | 2023-12-22T21:15:00+00:00 | 2024-11-21T14:22:54.549778+00:00 |
| pysec-2023-277 |
5.3 (3.1)
|
MindsDB connects artificial intelligence models to real time data. Versions prior to 23.1… | mindsdb | 2023-12-11T19:15:00+00:00 | 2024-11-21T14:22:54.391272+00:00 |
| pysec-2014-110 |
|
Multiple cross-site scripting (XSS) vulnerabilities in apps/common/templates/calculate_fo… | mayan-edms | 2014-05-27T13:55:00Z | 2024-11-21T14:22:54.240407Z |
| pysec-2024-128 |
6.1 (3.1)
|
Label Studio, an open source data labeling tool had a remote import feature allowed users… | label-studio | 2024-01-24T00:15:00+00:00 | 2024-11-21T14:22:53.406222+00:00 |
| pysec-2024-127 |
5.3 (3.1)
|
Label Studio is a popular open source data labeling tool. The vulnerability affects all v… | label-studio | 2024-01-31T17:15:00+00:00 | 2024-11-21T14:22:53.294472+00:00 |
| pysec-2024-126 |
5.4 (3.1)
|
Label Studio is an a popular open source data labeling tool. Versions prior to 1.9.2 have… | label-studio | 2024-01-23T23:15:00+00:00 | 2024-11-21T14:22:53.235341+00:00 |
| pysec-2023-275 |
7.5 (3.1)
|
Label Studio is an open source data labeling tool. In all current versions of Label Studi… | label-studio | 2023-11-13T21:15:00+00:00 | 2024-11-21T14:22:53.350760+00:00 |
| pysec-2023-274 |
8.8 (3.1)
|
Label Studio is a multi-type data labeling and annotation tool with standardized output f… | label-studio | 2023-11-09T15:15:00+00:00 | 2024-11-21T14:22:53.173192+00:00 |
| pysec-2023-273 |
8.8 (3.1)
|
Kiwi TCMS is an open source test management system. In kiwitcms/Kiwi v12.2 and prior and … | kiwitcms | 2023-04-24T22:15:00+00:00 | 2024-11-21T14:22:53.063160+00:00 |
| pysec-2022-43137 |
5.5 (3.1)
|
LIEF commit 365a16a was discovered to contain a reachable assertion abort via the compone… | lief | 2022-09-13T21:15:00+00:00 | 2024-11-21T14:22:53.842904+00:00 |
| pysec-2017-144 |
7.5 (3.1)
|
Koji 1.13.0 does not properly validate SCM paths, allowing an attacker to work around bla… | koji | 2017-10-06T17:29:00Z | 2024-11-21T14:22:53.117821Z |
| pysec-2023-272 |
4.3 (3.1)
|
The Jupyter Server provides the backend (i.e. the core services, APIs, and REST endpoints… | jupyter-server | 2023-12-04T21:15:00+00:00 | 2024-11-21T14:22:52.227754+00:00 |
| pysec-2018-151 |
8.8 (3.1)
|
An issue was discovered in Project Jupyter JupyterHub OAuthenticator 0.6.x before 0.6.2 a… | jupyterhub | 2018-02-18T03:29:00Z | 2024-11-21T14:22:52.286953Z |
| pysec-2018-150 |
7.5 (3.1)
|
Hyperledger Iroha versions v1.0_beta and v1.0.0_beta-1 are vulnerable to transaction and … | iroha | 2018-06-01T19:29:00Z | 2024-11-21T14:22:52.162008Z |
| pysec-2014-104 |
|
FreeIPA 4.0.x before 4.0.5 and 4.1.x before 4.1.1, when 2FA is enabled, allows remote att… | ipa | 2014-11-19T18:59:00Z | 2024-11-21T14:22:52.00819Z |
| pysec-2013-40 |
|
OpenStack Identity (Keystone) Grizzly 2013.1.1, when DEBUG mode logging is enabled, logs … | keystone | 2013-05-21T18:55:00Z | 2024-11-21T14:22:52.515884Z |
| pysec-2012-35 |
|
OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens… | keystone | 2012-12-18T01:55:00Z | 2024-11-21T14:22:52.404569Z |
| pysec-2012-34 |
|
OpenStack Keystone before 2012.1.1, as used in OpenStack Folsom before Folsom-1 and OpenS… | keystone | 2012-07-31T10:45:00Z | 2024-11-21T14:22:52.344123Z |
| pysec-2023-271 |
5.3 (3.1)
|
Hail is an open-source, general-purpose, Python-based data analysis tool with additional … | hail | 2023-12-29T17:16:00+00:00 | 2024-11-21T14:22:51.672042+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-4224 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.414154Z |
| gsd-2024-4223 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.423284Z |
| gsd-2024-4222 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.363699Z |
| gsd-2024-4221 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.433755Z |
| gsd-2024-4220 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.384898Z |
| gsd-2024-4219 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.359066Z |
| gsd-2024-4218 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.369587Z |
| gsd-2024-4217 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.397245Z |
| gsd-2024-4216 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.414356Z |
| gsd-2024-4215 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.378015Z |
| gsd-2024-4214 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.390841Z |
| gsd-2024-4213 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.379947Z |
| gsd-2024-4212 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.440122Z |
| gsd-2024-4211 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.414864Z |
| gsd-2024-4210 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.431459Z |
| gsd-2024-4209 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.403437Z |
| gsd-2024-4208 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.386660Z |
| gsd-2024-4207 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.376954Z |
| gsd-2024-4206 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.423074Z |
| gsd-2024-4205 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.362130Z |
| gsd-2024-4204 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.429356Z |
| gsd-2024-4203 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.393641Z |
| gsd-2024-4202 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.405198Z |
| gsd-2024-4201 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.401052Z |
| gsd-2024-4200 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.430960Z |
| gsd-2024-4199 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.422865Z |
| gsd-2024-4198 | Mattermost versions 9.6.0, 9.5.x before 9.5.3, and 8.1.x before 8.1.12 fail to fully vali… | 2024-04-26T05:02:17.420758Z |
| gsd-2024-4197 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.437306Z |
| gsd-2024-4196 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.385450Z |
| gsd-2024-4195 | Mattermost versions 9.6.0, 9.5.x before 9.5.3, and 8.1.x before 8.1.12 fail to fully vali… | 2024-04-26T05:02:17.392645Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-566 | Malicious code in debug-fmt (npm) | 2026-01-28T07:37:08Z | 2026-02-02T05:56:27Z |
| mal-2026-556 | Malicious code in digital-music-dynmsg-ribbon (npm) | 2026-01-28T06:52:12Z | 2026-02-02T05:56:27Z |
| mal-2026-551 | Malicious code in express-lists-routes (npm) | 2026-01-28T03:26:59Z | 2026-02-02T05:56:27Z |
| mal-2026-531 | Malicious code in hackerxhj (npm) | 2026-01-27T08:09:00Z | 2026-02-02T05:56:27Z |
| mal-2026-530 | Malicious code in grepleaks (npm) | 2026-01-27T08:09:32Z | 2026-02-02T05:56:27Z |
| mal-2026-529 | Malicious code in fileupload-core (npm) | 2026-01-27T07:56:49Z | 2026-02-02T05:56:27Z |
| mal-2026-521 | Malicious code in hammer-jquery (npm) | 2026-01-27T02:25:01Z | 2026-02-02T05:56:27Z |
| mal-2026-520 | Malicious code in ftm-noderpc (npm) | 2026-01-27T02:44:52Z | 2026-02-02T05:56:27Z |
| mal-2026-588 | Malicious code in chai-sub (npm) | 2026-01-28T14:53:28Z | 2026-02-02T05:56:26Z |
| mal-2026-587 | Malicious code in chai-px (npm) | 2026-01-28T14:48:04Z | 2026-02-02T05:56:26Z |
| mal-2026-586 | Malicious code in chai-chains-async (npm) | 2026-01-28T14:46:57Z | 2026-02-02T05:56:26Z |
| mal-2026-585 | Malicious code in chai-async-tests (npm) | 2026-01-28T14:56:54Z | 2026-02-02T05:56:26Z |
| mal-2026-584 | Malicious code in chai-as-extended (npm) | 2026-01-28T15:06:22Z | 2026-02-02T05:56:26Z |
| mal-2026-565 | Malicious code in converse-rn-lib (npm) | 2026-01-28T07:50:39Z | 2026-02-02T05:56:26Z |
| mal-2026-564 | Malicious code in chai-as-hashed (npm) | 2026-01-28T07:53:44Z | 2026-02-02T05:56:26Z |
| mal-2026-555 | Malicious code in acuitymobileapp (npm) | 2026-01-28T07:13:15Z | 2026-02-02T05:56:26Z |
| mal-2026-550 | Malicious code in cdnhost (npm) | 2026-01-28T03:21:37Z | 2026-02-02T05:56:26Z |
| mal-2026-549 | Malicious code in blockchain-helper-lib (npm) | 2026-01-28T03:20:46Z | 2026-02-02T05:56:26Z |
| mal-2026-508 | Malicious code in cartos-dds-ui (npm) | 2026-01-26T16:41:17Z | 2026-02-02T05:56:26Z |
| mal-2026-578 | Malicious code in @pukpuk1/somsodamsd (npm) | 2026-01-28T13:59:24Z | 2026-02-02T05:56:25Z |
| mal-2026-563 | Malicious code in @nayzak51/primebeem-db (npm) | 2026-01-28T07:27:26Z | 2026-02-02T05:56:25Z |
| mal-2026-528 | Malicious code in @shije/new-qs (npm) | 2026-01-27T07:55:42Z | 2026-02-02T05:56:25Z |
| mal-2026-527 | Malicious code in @santandergroup-uk/edgehome-components (npm) | 2026-01-27T08:16:51Z | 2026-02-02T05:56:25Z |
| mal-2026-526 | Malicious code in @row-components/pricing-embedded-sui (npm) | 2026-01-27T08:01:02Z | 2026-02-02T05:56:25Z |
| mal-2026-519 | Malicious code in @afg-ikea/ikea-modals (npm) | 2026-01-27T02:11:41Z | 2026-02-02T05:56:25Z |
| mal-2026-518 | Malicious code in @afg-ikea/ikea-kiosk-related-components (npm) | 2026-01-27T02:11:40Z | 2026-02-02T05:56:25Z |
| mal-2026-517 | Malicious code in @afg-ikea/ikea-family-registration-module (npm) | 2026-01-27T02:11:40Z | 2026-02-02T05:56:25Z |
| mal-2026-509 | Malicious code in @sommos/create-program-template-form-data (npm) | 2026-01-26T18:20:46Z | 2026-02-02T05:56:25Z |
| mal-2026-635 | Malicious code in finnairshop (npm) | 2026-02-02T05:19:43Z | 2026-02-02T05:19:43Z |
| mal-2026-633 | Malicious code in cowsay-fancy (npm) | 2026-02-02T05:19:43Z | 2026-02-02T05:19:43Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2566 | Mozilla Firefox und Firefox ESR: Mehrere Schwachstellen | 2025-11-11T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2441 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-29T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2433 | Google Cloud Platform (Envoy Proxy):: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-28T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2380 | Xen: Mehrere Schwachstellen | 2025-10-21T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2110 | LibTiff: Schwachstelle ermöglicht Codeausführung | 2025-09-22T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2085 | Red Hat OpenShift Service Mesh: Mehrere Schwachstellen | 2025-09-17T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2034 | Erlang/OTP: Mehrere Schwachstellen | 2025-09-10T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2007 | Xen: Mehrere Schwachstellen | 2025-09-09T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-1965 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-09-03T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-1654 | libTIFF (Tiffmedian, Thumbnail): Mehrere Schwachstellen | 2025-07-27T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-1205 | Golang Go: Mehrere Schwachstellen | 2025-06-01T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-0270 | cURL: Mehrere Schwachstellen | 2025-02-04T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-0259 | Red Hat Satellite: Schwachstelle ermöglicht Denial of Service | 2025-02-04T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-0131 | OpenSSL: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-01-20T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2023-1608 | Perl: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-06-29T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2840 | Exim: Schwachstelle ermöglicht Codeausführung | 2025-12-14T23:00:00.000+00:00 | 2026-01-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2495 | Django: Mehrere Schwachstellen ermöglichen Denial of Service und SQL-Injection | 2025-11-05T23:00:00.000+00:00 | 2026-01-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2436 | Xwayland und X.Org X11: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2025-10-28T23:00:00.000+00:00 | 2026-01-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2186 | Django: Mehrere Schwachstellen ermöglichen Manipulation von Dateien | 2025-10-01T22:00:00.000+00:00 | 2026-01-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2083 | Ruby: Schwachstelle ermöglicht Denial of Service | 2025-09-17T22:00:00.000+00:00 | 2026-01-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2825 | MediaWiki: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2025-12-10T23:00:00.000+00:00 | 2025-12-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2028 | Red Hat OpenShift Container Platform: Schwachstelle ermöglicht Codeausführung | 2025-09-10T22:00:00.000+00:00 | 2025-12-30T23:00:00.000+00:00 |
| wid-sec-w-2025-0754 | Red Hat Enterprise Linux (opentelemetry-collector): Schwachstelle ermöglicht Denial of Service | 2025-04-08T22:00:00.000+00:00 | 2025-12-30T23:00:00.000+00:00 |
| wid-sec-w-2025-0606 | Red Hat Enterprise Linux (Gatekeeper): Mehrere Schwachstellen ermöglichen Denial of Service | 2025-03-19T23:00:00.000+00:00 | 2025-12-30T23:00:00.000+00:00 |
| wid-sec-w-2025-0485 | Golang Go: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-03-04T23:00:00.000+00:00 | 2025-12-30T23:00:00.000+00:00 |
| wid-sec-w-2025-0123 | Red Hat Enterprise Linux und and OpenShift (go-git): Mehrere Schwachstellen | 2025-01-19T23:00:00.000+00:00 | 2025-12-30T23:00:00.000+00:00 |
| wid-sec-w-2024-0789 | HTTP/2: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-04-03T22:00:00.000+00:00 | 2025-12-30T23:00:00.000+00:00 |
| wid-sec-w-2023-3174 | SSH Protokoll: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-12-18T23:00:00.000+00:00 | 2025-12-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2930 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2020-07-21T22:00:00.000+00:00 | 2025-12-29T23:00:00.000+00:00 |
| wid-sec-w-2025-1744 | OpenJPEG: Schwachstelle ermöglicht Denial of Service | 2025-08-07T22:00:00.000+00:00 | 2025-12-29T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0109 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-04-08T18:53:20.624247Z | 2025-04-08T18:53:20.624247Z |
| ncsc-2025-0108 | Kwetsbaarheid verholpen in Microsoft System Center | 2025-04-08T18:52:22.999321Z | 2025-04-08T18:52:22.999321Z |
| ncsc-2025-0107 | Kwetsbaarheden verholpen in Microsoft Office | 2025-04-08T18:50:53.931519Z | 2025-04-08T18:50:53.931519Z |
| ncsc-2025-0106 | Kwetsbaarheden verholpen in Siemens producten | 2025-04-08T13:57:11.959816Z | 2025-04-08T13:57:11.959816Z |
| ncsc-2025-0101 | Kwetsbaarheid verholpen in CrushFTP | 2025-04-01T07:47:50.425419Z | 2025-04-07T14:03:59.372671Z |
| ncsc-2025-0105 | Kwetsbaarheid verholpen in Ivanti Connect Secure, Policy Secure en ZTA Gateways | 2025-04-03T14:19:37.560619Z | 2025-04-03T14:19:37.560619Z |
| ncsc-2025-0104 | Kwetsbaarheid verholpen in Cisco Enterprise Chat and Email | 2025-04-03T08:04:22.928655Z | 2025-04-03T08:04:22.928655Z |
| ncsc-2025-0103 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2025-04-01T08:42:27.059536Z | 2025-04-01T08:42:27.059536Z |
| ncsc-2025-0102 | Kwetsbaarheden verholpen in Apple macOS | 2025-04-01T08:41:09.934597Z | 2025-04-01T08:41:09.934597Z |
| ncsc-2025-0100 | Kwetsbaarheden verholpen in GitLab EE/CE | 2025-03-27T14:49:34.316050Z | 2025-03-27T14:49:34.316050Z |
| ncsc-2025-0095 | Kwetsbaarheden verholpen in Kubernetes Ingress NGINX Controller | 2025-03-25T07:13:08.093318Z | 2025-03-27T14:41:30.387171Z |
| ncsc-2025-0099 | Kwetsbaarheden verholpen in Splunk Enterprise en Splunk Cloud Platform | 2025-03-27T09:18:30.331072Z | 2025-03-27T09:18:30.331072Z |
| ncsc-2025-0098 | Kwetsbaarheid verholpen in Google Chrome | 2025-03-26T12:45:59.434386Z | 2025-03-26T12:45:59.434386Z |
| ncsc-2025-0097 | Kwetsbaarheid verholpen in NetApp SnapCenter | 2025-03-25T08:41:39.996819Z | 2025-03-25T08:41:39.996819Z |
| ncsc-2025-0096 | Kwetsbaarheid verholpen in Next.js | 2025-03-25T08:38:53.524904Z | 2025-03-25T08:38:53.524904Z |
| ncsc-2025-0094 | Kwetsbaarheid verholpen in Veeam Backup & Replication | 2025-03-20T14:10:16.806777Z | 2025-03-20T14:10:16.806777Z |
| ncsc-2025-0093 | Kwetsbaarheid verholpen in IBM InfoSphere Information Server | 2025-03-20T13:17:45.897480Z | 2025-03-20T13:17:45.897480Z |
| ncsc-2025-0092 | Kwetsbaarheden verholpen in IBM AIX | 2025-03-20T13:13:43.163579Z | 2025-03-20T13:13:43.163579Z |
| ncsc-2025-0091 | Kwetsbaarheid verholpen in Synology DiskStation Manager | 2025-03-19T15:03:23.414509Z | 2025-03-19T15:03:23.414509Z |
| ncsc-2025-0090 | Kwetsbaarheid verholpen in Synology Replication Service en Synology Unified Controller | 2025-03-19T15:02:46.122619Z | 2025-03-19T15:02:46.122619Z |
| ncsc-2025-0089 | Kwetsbaarheid verholpen in Apache Tomcat | 2025-03-17T18:36:12.978021Z | 2025-03-17T18:36:12.978021Z |
| ncsc-2025-0088 | Kwetsbaarheden verholpen in Autodesk AutoCAD | 2025-03-14T10:10:13.263645Z | 2025-03-14T10:10:13.263645Z |
| ncsc-2025-0087 | Kwetsbaarheden verholpen in GitLab | 2025-03-14T09:14:59.775984Z | 2025-03-14T09:14:59.775984Z |
| ncsc-2025-0086 | Kwetsbaarheid verholpen in Apple iOS, iPadOS, macOS Sequoia, visionOS en Safari | 2025-03-12T13:48:59.223945Z | 2025-03-12T13:48:59.223945Z |
| ncsc-2025-0085 | Kwetsbaarheid verholpen in Ivanti Secure Access Client | 2025-03-12T11:00:45.614633Z | 2025-03-12T11:00:45.614633Z |
| ncsc-2025-0084 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2025-03-12T10:56:00.883114Z | 2025-03-12T10:56:00.883114Z |
| ncsc-2025-0083 | Kwetsbaarheden verholpen in Fortinet FortiSandbox | 2025-03-12T10:51:18.487649Z | 2025-03-12T10:51:18.487649Z |
| ncsc-2025-0082 | Kwetsbaarheden verholpen in FortiOS, FortiProxy, FortiPAM, FortiSRA en FortiWeb. | 2025-03-12T10:46:38.451715Z | 2025-03-12T10:46:38.451715Z |
| ncsc-2025-0081 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-03-11T18:45:19.628300Z | 2025-03-11T18:45:19.628300Z |
| ncsc-2025-0080 | Kwetsbaarheden verholpen in Microsoft Office | 2025-03-11T18:44:43.336447Z | 2025-03-11T18:44:43.336447Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-968170 | SSA-968170: Remote Code Execution Vulnerability in SIMATIC STEP 7 V5.x and Derived Products | 2023-06-13T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-953710 | SSA-953710: Vulnerabilities in the Network Communication Stack in Desigo Fire Safety UL and Cerberus PRO UL Fire Protection Systems | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-925850 | SSA-925850: Improper Access Control in Polarion ALM | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-923361 | SSA-923361: MODEL File Parsing Vulnerability in Tecnomatix Plant Simulation before V2302.0011 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-916916 | SSA-916916: Security Vulnerabilities Fixed in RUGGEDCOM CROSSBOW V5.5 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-871717 | SSA-871717: Multiple Vulnerabilities in Polarion ALM | 2024-02-13T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-665034 | SSA-665034: Vulnerability in Nozomi Guardian/CMC before 23.3.0 on RUGGEDCOM APE1808 devices | 2024-02-13T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-661579 | SSA-661579: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-647455 | SSA-647455: Multiple Vulnerabilities in Nozomi Guardian/CMC before 22.6.2 on RUGGEDCOM APE1808 devices | 2023-10-10T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-592380 | SSA-592380: Denial of Service Vulnerability in SIMATIC S7-1500 CPUs and related products | 2023-12-12T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-589937 | SSA-589937: Multiple Memory Corruption Vulnerabilities in Solid Edge | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-489698 | SSA-489698: X_T File Parsing Vulnerability in Parasolid | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-382651 | SSA-382651: File Parsing Vulnerability in Solid Edge | 2024-03-12T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-292063 | SSA-292063: Multiple Vulnerabilities in Nozomi Guardian/CMC before 22.6.3 and 23.1.0 on RUGGEDCOM APE1808 devices | 2023-11-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-292022 | SSA-292022: Vulnerability in Nozomi Guardian/CMC before 23.4.1 on RUGGEDCOM APE1808 devices | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-273900 | SSA-273900: Multiple Vulnerabilities in SIMATIC CN 4100 before V3.0 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-258494 | SSA-258494: Stack Overflow Vulnerability in Simcenter Nastran before 2406.90 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-240541 | SSA-240541: WIBU Systems CodeMeter Heap Buffer Overflow Vulnerability in Industrial Products | 2023-09-12T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-225840 | SSA-225840: Vulnerabilities in the Network Communication Stack in Sinteso EN and Cerberus PRO EN Fire Protection Systems | 2024-03-12T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-046364 | SSA-046364: X_T File Parsing Vulnerabilities in Parasolid | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-999588 | SSA-999588: Multiple Vulnerabilities in User Management Component (UMC) Before V2.11.2 | 2023-12-12T00:00:00Z | 2025-01-14T00:00:00Z |
| SSA-976324 | SSA-976324: Multiple IGS File Parsing Vulnerabilities in PS/IGES Parasolid Translator Component before V27.1.215 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-968170 | SSA-968170: Remote Code Execution Vulnerability in SIMATIC STEP 7 V5.x and Derived Products | 2023-06-13T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-962515 | SSA-962515: Out of Bounds Read Vulnerability in Industrial Products | 2024-05-14T00:00:00Z | 2024-12-10T00:00:00Z |
| SSA-953710 | SSA-953710: Vulnerabilities in the Network Communication Stack in Desigo Fire Safety UL and Cerberus PRO UL Fire Protection Systems | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-935500 | SSA-935500: Denial of Service Vulnerability in FTP Server of Nucleus RTOS based APOGEE, TALON and Desigo PXC/PXM Products | 2022-10-11T00:00:00Z | 2025-05-13T00:00:00Z |
| SSA-925850 | SSA-925850: Improper Access Control in Polarion ALM | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-923361 | SSA-923361: MODEL File Parsing Vulnerability in Tecnomatix Plant Simulation before V2302.0011 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-916916 | SSA-916916: Security Vulnerabilities Fixed in RUGGEDCOM CROSSBOW V5.5 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-871717 | SSA-871717: Multiple Vulnerabilities in Polarion ALM | 2024-02-13T00:00:00Z | 2024-05-14T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2024:0664 | Red Hat Security Advisory: OpenShift Container Platform 4.12.49 bug fix update and security update | 2024-02-08T19:31:18+00:00 | 2026-02-15T07:06:12+00:00 |
| rhsa-2024:0660 | Red Hat Security Advisory: OpenShift Container Platform 4.13.32 bug fix and security update | 2024-02-07T15:07:37+00:00 | 2026-02-15T07:06:11+00:00 |
| rhsa-2024:0485 | Red Hat Security Advisory: OpenShift Container Platform 4.12.48 bug fix and security update | 2024-01-31T16:17:59+00:00 | 2026-02-15T07:06:10+00:00 |
| rhsa-2024:0484 | Red Hat Security Advisory: OpenShift Container Platform 4.13.31 bug fix and security update | 2024-02-01T19:01:48+00:00 | 2026-02-15T07:06:10+00:00 |
| rhsa-2024:0306 | Red Hat Security Advisory: OpenShift Container Platform 4.11.57 bug fix and security update | 2024-01-24T20:54:46+00:00 | 2026-02-15T07:06:09+00:00 |
| rhsa-2024:0302 | Red Hat Security Advisory: Kube Descheduler Operator for Red Hat OpenShift 5.0.0 for RHEL 9:security update | 2024-03-06T13:33:21+00:00 | 2026-02-15T07:06:09+00:00 |
| rhsa-2024:0290 | Red Hat Security Advisory: OpenShift Container Platform 4.14.10 bug fix and security update | 2024-01-23T20:26:08+00:00 | 2026-02-15T07:06:09+00:00 |
| rhsa-2024:0273 | Red Hat Security Advisory: OpenShift Virtualization 4.12.9 Images security and bug fix update | 2024-01-17T08:29:36+00:00 | 2026-02-15T07:06:08+00:00 |
| rhsa-2024:0198 | Red Hat Security Advisory: OpenShift Container Platform 4.12.47 security update | 2024-01-17T18:20:55+00:00 | 2026-02-15T07:06:08+00:00 |
| rhsa-2024:0193 | Red Hat Security Advisory: OpenShift Container Platform 4.13.29 bug fix and security update | 2024-01-17T09:48:09+00:00 | 2026-02-15T07:06:07+00:00 |
| rhsa-2024:0059 | Red Hat Security Advisory: OpenShift Container Platform 4.11.56 bug fix and security update | 2024-01-10T00:23:49+00:00 | 2026-02-15T07:06:07+00:00 |
| rhsa-2024:0050 | Red Hat Security Advisory: OpenShift Container Platform 4.14.8 bug fix and security update | 2024-01-09T16:55:38+00:00 | 2026-02-15T07:06:07+00:00 |
| rhsa-2023:7831 | Red Hat Security Advisory: OpenShift Container Platform 4.14.7 bug fix and security update | 2024-01-03T20:04:32+00:00 | 2026-02-15T07:06:07+00:00 |
| rhsa-2023:7827 | Red Hat Security Advisory: OpenShift Container Platform 4.13.z security update | 2024-01-04T14:22:05+00:00 | 2026-02-15T07:06:06+00:00 |
| rhsa-2023:7823 | Red Hat Security Advisory: OpenShift Container Platform 4.12.46 bug fix and security update | 2024-01-04T14:41:38+00:00 | 2026-02-15T07:06:06+00:00 |
| rhsa-2023:7741 | Red Hat Security Advisory: Red Hat Ceph Storage 6.1 security, enhancements, and bug fix update | 2023-12-12T13:55:37+00:00 | 2026-02-15T07:06:06+00:00 |
| rhsa-2023:7710 | Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 7.2.0 security update | 2023-12-11T00:20:04+00:00 | 2026-02-15T07:06:05+00:00 |
| rhsa-2023:7704 | Red Hat Security Advisory: OpenShift Virtualization 4.14.1 security and bug fix update | 2023-12-07T15:00:28+00:00 | 2026-02-15T07:06:05+00:00 |
| rhsa-2023:7703 | Red Hat Security Advisory: Red Hat OpenShift Pipelines 1.10.6 release and security update | 2023-12-07T14:57:07+00:00 | 2026-02-15T07:06:05+00:00 |
| rhsa-2023:7699 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Client tkn for 1.10.6 release and security update | 2023-12-07T14:26:32+00:00 | 2026-02-15T07:06:04+00:00 |
| rhsa-2023:7691 | Red Hat Security Advisory: OpenShift Container Platform 4.11.55 bug fix and security update | 2023-12-13T21:44:50+00:00 | 2026-02-15T07:06:03+00:00 |
| rhsa-2023:7690 | Red Hat Security Advisory: OpenShift Container Platform 4.11.55 security update | 2023-12-13T21:03:30+00:00 | 2026-02-15T07:06:03+00:00 |
| rhsa-2023:7687 | Red Hat Security Advisory: OpenShift Container Platform 4.13.26 bug fix and security update | 2023-12-13T00:13:20+00:00 | 2026-02-15T07:06:03+00:00 |
| rhsa-2023:7682 | Red Hat Security Advisory: OpenShift Container Platform 4.14.6 bug fix and security update | 2023-12-12T09:48:40+00:00 | 2026-02-15T07:06:03+00:00 |
| rhsa-2023:7662 | Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 6.0.3 security update | 2023-12-06T00:20:48+00:00 | 2026-02-15T07:06:03+00:00 |
| rhsa-2023:7608 | Red Hat Security Advisory: OpenShift Container Platform 4.12.45 bug fix and security update | 2023-12-06T17:55:11+00:00 | 2026-02-15T07:06:02+00:00 |
| rhsa-2023:7607 | Red Hat Security Advisory: OpenShift Container Platform 4.12.45 security and extras update | 2023-12-06T16:54:41+00:00 | 2026-02-15T07:06:02+00:00 |
| rhsa-2023:7604 | Red Hat Security Advisory: OpenShift Container Platform 4.13.25 bug fix and security update | 2023-12-06T00:34:23+00:00 | 2026-02-15T07:06:01+00:00 |
| rhsa-2023:7602 | Red Hat Security Advisory: OpenShift Container Platform 4.13.25 security and extras update | 2023-12-06T00:16:04+00:00 | 2026-02-15T07:06:01+00:00 |
| rhsa-2023:7599 | Red Hat Security Advisory: OpenShift Container Platform 4.14.5 bug fix and security update | 2023-12-05T09:57:03+00:00 | 2026-02-15T07:06:01+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-266-17 | Siemens SINEC Traffic Analyzer | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-21 | Siemens BFCClient | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-20 | Siemens RUGGEDCOM ROX II | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-19 | Siemens SINUMERIK | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-17 | Siemens SINEC Traffic Analyzer | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-16 | Siemens SICAM Q100/Q200 | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-15 | Siemens SINEC OS | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-14 | Siemens RUGGEDCOM ROX II | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-13 | Siemens SIMATIC RTLS Locating Manager | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-12 | Siemens SIPROTEC 4 and SIPROTEC 4 Compact | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-10 | Siemens SIPROTEC 5 | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-08 | Siemens RUGGEDCOM CROSSBOW Station Access Controller | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-07 | Siemens Third-Party Components in SINEC OS | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-06 | Siemens Opcenter Quality | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-04 | Siemens Simcenter Femap | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-02 | Siemens COMOS | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-01 | Siemens SIMATIC RTLS Locating Manager | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-191-05 | Siemens TIA Project-Server and TIA Portal | 2025-07-08T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-135-07 | Siemens SIMATIC IPC RS-828A | 2025-05-13T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-044-05 | Siemens SIPROTEC 5 Devices | 2025-02-11T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-24-347-05 | Siemens Siemens Engineering Platforms | 2024-12-10T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-24-319-12 | Siemens Mendix Runtime | 2024-11-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-24-256-05 | Siemens Mendix Runtime | 2024-09-10T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-24-193-06 | Siemens RUGGEDCOM | 2024-07-09T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-24-074-08 | Siemens SCALANCE XB-200 / XC-200 / XP-200 / XF-200BA / XR-300WG Family | 2024-03-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-23-348-10 | Siemens SIMATIC S7-1500 | 2023-12-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-23-222-12 | Siemens RUGGEDCOM ROS | 2023-08-08T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-23-222-08 | Siemens RUGGEDCOM ROS Devices | 2023-08-08T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-22-314-05 | Siemens RUGGEDCOM ROS | 2022-11-08T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-22-195-18 | Siemens RUGGEDCOM ROS Code Injection | 2022-07-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-rsvp-dos-oypvgvzf | Cisco IOS and IOS XE Software Resource Reservation Protocol Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-rsvp-dos-OypvgVZf | Cisco IOS and IOS XE Software Resource Reservation Protocol Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-repacl-9exgnbpd | Cisco IOS Software on Cisco Industrial Ethernet Series Switches Access Control List Bypass Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-repacl-9eXgnBpD | Cisco IOS Software on Cisco Industrial Ethernet Series Switches Access Control List Bypass Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-pim-apbvfysj | Cisco IOS XE Software Protocol Independent Multicast Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-pim-APbVfySJ | Cisco IOS XE Software Protocol Independent Multicast Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-ios-xe-sda-edge-dos-mbcbg9k | Cisco IOS XE Software SD-Access Fabric Edge Node Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-ios-xe-sda-edge-dos-MBcbG9k | Cisco IOS XE Software SD-Access Fabric Edge Node Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-ios-webui-hfwnrgk | Cisco IOS and IOS XE Software Web UI Cross-Site Request Forgery Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-ios-webui-HfwnRgk | Cisco IOS and IOS XE Software Web UI Cross-Site Request Forgery Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-httpsrvr-dos-yozthut | Cisco IOS XE Software HTTP Server Telephony Services Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-httpsrvr-dos-yOZThut | Cisco IOS XE Software HTTP Server Telephony Services Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-dnac-ssh-e4uodasj | Cisco Catalyst Center Static SSH Host Key Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-dnac-ssh-e4uOdASj | Cisco Catalyst Center Static SSH Host Key Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-cpp-vfr-dos-nhhkggo | Cisco IOS XE Software IPv4 Fragmentation Reassembly Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-cpp-vfr-dos-nhHKGgO | Cisco IOS XE Software IPv4 Fragmentation Reassembly Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-c9800-cwa-acl-npsbhsna | Cisco IOS XE Software for Wireless Controllers CWA Pre-Authentication ACL Bypass Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-c9800-cwa-acl-nPSbHSnA | Cisco IOS XE Software for Wireless Controllers CWA Pre-Authentication ACL Bypass Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-nso-auth-bypass-qnteesp | Multiple Cisco Products Web-Based Management Interface Privilege Escalation Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-25T13:05:54+00:00 |
| cisco-sa-nso-auth-bypass-QnTEesp | Multiple Cisco Products Web-Based Management Interface Privilege Escalation Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-25T13:05:54+00:00 |
| cisco-sa-cucm-xss-9zmfhyz | Cisco Unified Communications Manager Cross-Site Scripting Vulnerability | 2024-08-21T16:00:00+00:00 | 2024-09-20T15:48:56+00:00 |
| cisco-sa-cucm-xss-9zmfHyZ | Cisco Unified Communications Manager Cross-Site Scripting Vulnerability | 2024-08-21T16:00:00+00:00 | 2024-09-20T15:48:56+00:00 |
| cisco-sa-nxos-cmd-injection-xd9ohyop | Cisco NX-OS Software CLI Command Injection Vulnerability | 2024-07-01T16:00:00+00:00 | 2024-09-17T18:05:20+00:00 |
| cisco-sa-nxos-cmd-injection-xD9OhyOP | Cisco NX-OS Software CLI Command Injection Vulnerability | 2024-07-01T16:00:00+00:00 | 2024-09-17T18:05:20+00:00 |
| cisco-sa-openssh-rce-2024 | Remote Unauthenticated Code Execution Vulnerability in OpenSSH Server (regreSSHion): July 2024 | 2024-07-02T16:00:00+00:00 | 2024-09-13T14:43:44+00:00 |
| cisco-sa-pak-mem-exhst-3ke9fefy | Cisco IOS XR Software UDP Packet Memory Exhaustion Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-pak-mem-exhst-3ke9FeFy | Cisco IOS XR Software UDP Packet Memory Exhaustion Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-l2services-2mvhdnuc | Cisco IOS XR Software Network Convergence System Denial of Service Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-l2services-2mvHdNuC | Cisco IOS XR Software Network Convergence System Denial of Service Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-isis-xehpbvne | Cisco IOS XR Software Segment Routing for Intermediate System-to-Intermediate System Denial of Service Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-38679 | media: venus: Fix OOB read due to missing payload bound check | 2025-09-02T00:00:00.000Z | 2026-01-10T01:02:21.000Z |
| msrc_cve-2025-39706 | drm/amdkfd: Destroy KFD debugfs after destroy KFD wq | 2025-09-02T00:00:00.000Z | 2026-01-09T01:10:21.000Z |
| msrc_cve-2025-39703 | net, hsr: reject HSR frame if skb can't hold tag | 2025-09-02T00:00:00.000Z | 2026-01-09T01:10:16.000Z |
| msrc_cve-2025-39702 | ipv6: sr: Fix MAC comparison to be constant-time | 2025-09-02T00:00:00.000Z | 2026-01-09T01:10:11.000Z |
| msrc_cve-2025-39697 | NFS: Fix a race when updating an existing write | 2025-09-02T00:00:00.000Z | 2026-01-09T01:10:06.000Z |
| msrc_cve-2025-39691 | fs/buffer: fix use-after-free when call bh_read() helper | 2025-09-02T00:00:00.000Z | 2026-01-09T01:09:56.000Z |
| msrc_cve-2025-39689 | ftrace: Also allocate and copy hash for reading of filter files | 2025-09-02T00:00:00.000Z | 2026-01-09T01:09:51.000Z |
| msrc_cve-2025-39683 | tracing: Limit access to parser->buffer when trace_get_user failed | 2025-09-02T00:00:00.000Z | 2026-01-09T01:09:31.000Z |
| msrc_cve-2025-39681 | x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper | 2025-09-02T00:00:00.000Z | 2026-01-09T01:09:27.000Z |
| msrc_cve-2025-39716 | parisc: Revise __get_user() to probe user read access | 2025-09-02T00:00:00.000Z | 2026-01-09T01:08:07.000Z |
| msrc_cve-2025-39693 | drm/amd/display: Avoid a NULL pointer dereference | 2025-09-02T00:00:00.000Z | 2026-01-09T01:07:51.000Z |
| msrc_cve-2025-39676 | scsi: qla4xxx: Prevent a potential error pointer dereference | 2025-09-02T00:00:00.000Z | 2026-01-09T01:07:43.000Z |
| msrc_cve-2025-39673 | ppp: fix race conditions in ppp_fill_forward_path | 2025-09-02T00:00:00.000Z | 2026-01-09T01:07:26.000Z |
| msrc_cve-2025-38699 | scsi: bfa: Double-free fix | 2025-09-02T00:00:00.000Z | 2026-01-09T01:07:17.000Z |
| msrc_cve-2024-42317 | mm/huge_memory: avoid PMD-size page cache if needed | 2024-08-02T00:00:00.000Z | 2026-01-08T14:51:05.000Z |
| msrc_cve-2024-47794 | bpf: Prevent tailcall infinite loop caused by freplace | 2025-01-02T00:00:00.000Z | 2026-01-08T14:51:00.000Z |
| msrc_cve-2025-61105 | FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the show_vty_link_info function at ospf_ext.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted OSPF packet. | 2025-10-02T00:00:00.000Z | 2026-01-08T14:50:56.000Z |
| msrc_cve-2025-61107 | FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the show_vty_ext_pref_pref_sid function at ospf_ext.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted LSA Update packet. | 2025-10-02T00:00:00.000Z | 2026-01-08T14:50:51.000Z |
| msrc_cve-2024-57898 | wifi: cfg80211: clear link ID from bitmap during link delete after clean up | 2025-01-02T00:00:00.000Z | 2026-01-08T14:50:48.000Z |
| msrc_cve-2025-61102 | FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the show_vty_ext_link_adj_sid function at ospf_ext.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted OSPF packet. | 2025-10-02T00:00:00.000Z | 2026-01-08T14:50:44.000Z |
| msrc_cve-2025-22111 | net: Remove RTNL dance for SIOCBRADDIF and SIOCBRDELIF. | 2025-04-02T00:00:00.000Z | 2026-01-08T14:50:41.000Z |
| msrc_cve-2024-57872 | scsi: ufs: pltfrm: Dellocate HBA during ufshcd_pltfrm_remove() | 2025-01-02T00:00:00.000Z | 2026-01-08T14:50:40.000Z |
| msrc_cve-2025-40102 | KVM: arm64: Prevent access to vCPU events before init | 2025-10-02T00:00:00.000Z | 2026-01-08T14:50:36.000Z |
| msrc_cve-2024-41067 | btrfs: scrub: handle RST lookup error correctly | 2024-07-01T07:00:00.000Z | 2026-01-08T14:50:33.000Z |
| msrc_cve-2025-40057 | ptp: Add a upper bound on max_vclocks | 2025-10-02T00:00:00.000Z | 2026-01-08T14:50:28.000Z |
| msrc_cve-2025-22115 | btrfs: fix block group refcount race in btrfs_create_pending_block_groups() | 2025-04-02T00:00:00.000Z | 2026-01-08T14:50:25.000Z |
| msrc_cve-2025-40075 | tcp_metrics: use dst_dev_net_rcu() | 2025-10-02T00:00:00.000Z | 2026-01-08T14:50:20.000Z |
| msrc_cve-2024-56782 | ACPI: x86: Add adev NULL check to acpi_quirk_skip_serdev_enumeration() | 2025-01-02T00:00:00.000Z | 2026-01-08T14:50:16.000Z |
| msrc_cve-2025-40065 | RISC-V: KVM: Write hgatp register with valid mode bits | 2025-10-02T00:00:00.000Z | 2026-01-08T14:50:12.000Z |
| msrc_cve-2024-56775 | drm/amd/display: Fix handling of plane refcount | 2025-01-02T00:00:00.000Z | 2026-01-08T14:50:07.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:20116-1 | Security update for rnp | 2025-11-27T12:39:03Z | 2025-11-27T12:39:03Z |
| opensuse-su-2025-20116-1 | Security update for rnp | 2025-11-27T12:39:03Z | 2025-11-27T12:39:03Z |
| opensuse-su-2025:20118-1 | Security update for gitea-tea | 2025-11-27T12:30:27Z | 2025-11-27T12:30:27Z |
| opensuse-su-2025-20118-1 | Security update for gitea-tea | 2025-11-27T12:30:27Z | 2025-11-27T12:30:27Z |
| opensuse-su-2025:20119-1 | Security update for tcpreplay | 2025-11-27T12:29:40Z | 2025-11-27T12:29:40Z |
| opensuse-su-2025-20119-1 | Security update for tcpreplay | 2025-11-27T12:29:40Z | 2025-11-27T12:29:40Z |
| opensuse-su-2025:20115-1 | Security update for pnpm | 2025-11-27T12:28:46Z | 2025-11-27T12:28:46Z |
| opensuse-su-2025-20115-1 | Security update for pnpm | 2025-11-27T12:28:46Z | 2025-11-27T12:28:46Z |
| opensuse-su-2025:20117-1 | Security update for trivy | 2025-11-27T12:27:44Z | 2025-11-27T12:27:44Z |
| opensuse-su-2025-20117-1 | Security update for trivy | 2025-11-27T12:27:44Z | 2025-11-27T12:27:44Z |
| opensuse-su-2025:20100-1 | Security update for libvirt | 2025-11-27T10:23:20Z | 2025-11-27T10:23:20Z |
| opensuse-su-2025-20100-1 | Security update for libvirt | 2025-11-27T10:23:20Z | 2025-11-27T10:23:20Z |
| opensuse-su-2025:20099-1 | Security update for xwayland | 2025-11-27T10:11:16Z | 2025-11-27T10:11:16Z |
| opensuse-su-2025-20099-1 | Security update for xwayland | 2025-11-27T10:11:16Z | 2025-11-27T10:11:16Z |
| opensuse-su-2025:15778-1 | libwireshark19-4.6.1-2.1 on GA media | 2025-11-27T00:00:00Z | 2025-11-27T00:00:00Z |
| opensuse-su-2025:15777-1 | python311-spotipy-2.25.2-1.1 on GA media | 2025-11-27T00:00:00Z | 2025-11-27T00:00:00Z |
| opensuse-su-2025:15776-1 | python311-pypdf-6.4.0-1.1 on GA media | 2025-11-27T00:00:00Z | 2025-11-27T00:00:00Z |
| opensuse-su-2025:15775-1 | opa-1.11.0-1.1 on GA media | 2025-11-27T00:00:00Z | 2025-11-27T00:00:00Z |
| opensuse-su-2025:15774-1 | netbird-0.60.3-1.1 on GA media | 2025-11-27T00:00:00Z | 2025-11-27T00:00:00Z |
| opensuse-su-2025:15773-1 | cheat-4.4.2-3.1 on GA media | 2025-11-27T00:00:00Z | 2025-11-27T00:00:00Z |
| opensuse-su-2025:20091-1 | Security update for the Linux Kernel | 2025-11-26T17:04:24Z | 2025-11-26T17:04:24Z |
| opensuse-su-2025-20091-1 | Security update for the Linux Kernel | 2025-11-26T17:04:24Z | 2025-11-26T17:04:24Z |
| opensuse-su-2025:20090-1 | Security update for curl | 2025-11-26T14:30:14Z | 2025-11-26T14:30:14Z |
| opensuse-su-2025-20090-1 | Security update for curl | 2025-11-26T14:30:14Z | 2025-11-26T14:30:14Z |
| opensuse-su-2025-20097-1 | Security update for helmfile | 2025-11-26T14:11:10Z | 2025-11-26T14:11:10Z |
| opensuse-su-2025:20089-1 | Security update for mysql-connector-java | 2025-11-26T08:12:25Z | 2025-11-26T08:12:25Z |
| opensuse-su-2025-20089-1 | Security update for mysql-connector-java | 2025-11-26T08:12:25Z | 2025-11-26T08:12:25Z |
| opensuse-su-2025:15772-1 | kubevirt-container-disk-1.6.3-1.1 on GA media | 2025-11-26T00:00:00Z | 2025-11-26T00:00:00Z |
| opensuse-su-2025:15771-1 | git-bug-0.10.1-3.1 on GA media | 2025-11-26T00:00:00Z | 2025-11-26T00:00:00Z |
| opensuse-su-2025:15770-1 | bash-git-prompt-2.7.1-4.1 on GA media | 2025-11-26T00:00:00Z | 2025-11-26T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-postgresql-2025-12818 | PostgreSQL libpq undersizes allocations, via integer wraparound | 2025-11-21T08:47:38.070Z | 2025-11-21T09:06:15.683Z |
| bit-postgresql-2025-12817 | PostgreSQL CREATE STATISTICS does not check for schema CREATE privilege | 2025-11-21T08:47:36.690Z | 2025-11-21T09:06:15.683Z |
| bit-golang-2025-58187 | Quadratic complexity when checking name constraints in crypto/x509 | 2025-11-06T12:58:22.304Z | 2025-11-21T09:06:15.683Z |
| bit-gitlab-2025-7736 | Incorrect Authorization in GitLab | 2025-11-20T09:05:14.844Z | 2025-11-21T09:06:15.683Z |
| bit-gitlab-2025-7000 | Insertion of Sensitive Information Into Sent Data in GitLab | 2025-11-21T09:04:35.128Z | 2025-11-21T09:06:15.683Z |
| bit-gitlab-2025-6945 | Improper Neutralization of Special Elements used in a Command ('Command Injection') in GitLab | 2025-11-21T09:04:31.573Z | 2025-11-21T09:06:15.683Z |
| bit-gitlab-2025-6171 | Missing Authorization in GitLab | 2025-11-21T09:04:22.209Z | 2025-11-21T09:06:15.683Z |
| bit-gitlab-2025-2615 | Insertion of Sensitive Information Into Sent Data in GitLab | 2025-11-20T09:04:09.576Z | 2025-11-21T09:06:15.683Z |
| bit-gitlab-2025-12983 | Memory Allocation with Excessive Size Value in GitLab | 2025-11-20T09:03:27.972Z | 2025-11-21T09:06:15.683Z |
| bit-gitlab-2025-11990 | Improper Handling of URL Encoding (Hex Encoding) in GitLab | 2025-11-20T09:03:19.328Z | 2025-11-20T09:06:46.640Z |
| bit-gitlab-2025-11865 | Incorrect Authorization in GitLab | 2025-11-20T09:03:10.744Z | 2025-11-20T09:06:46.640Z |
| bit-moodle-2025-62401 | Moodle: possible to bypass timer in timed assignments | 2025-11-17T23:47:50.898Z | 2025-11-18T00:06:24.423Z |
| bit-moodle-2025-62400 | Moodle: hidden group names visible to event creators | 2025-11-17T23:47:49.403Z | 2025-11-18T00:06:24.423Z |
| bit-moodle-2025-62399 | Moodle: password brute force risk when mobile/web services enabled | 2025-11-17T23:47:47.926Z | 2025-11-18T00:06:24.423Z |
| bit-moodle-2025-62398 | Moodle: possible to bypass mfa | 2025-11-17T23:47:46.528Z | 2025-11-18T00:06:24.423Z |
| bit-moodle-2025-62397 | Moodle: router produces json instead of 404 error for invalid course id | 2025-11-17T23:47:45.012Z | 2025-11-18T00:06:24.423Z |
| bit-moodle-2025-62396 | Moodle: router (r.php) could expose application directories | 2025-11-17T23:47:43.645Z | 2025-11-18T00:06:24.423Z |
| bit-moodle-2025-62395 | Moodle: external cohort search service leaks system cohort data | 2025-11-17T23:47:42.131Z | 2025-11-18T00:06:24.423Z |
| bit-moodle-2025-62394 | Moodle: quiz notifications sent to suspended participants | 2025-11-17T23:47:40.687Z | 2025-11-18T00:06:24.423Z |
| bit-moodle-2025-62393 | Moodle: course access permissions not properly checked in course_output_fragment_course_overview | 2025-11-17T23:47:39.287Z | 2025-11-18T00:06:24.423Z |
| bit-mongodb-2025-10061 | Malformed $group Query May Cause MongoDB Server to Crash | 2025-09-19T09:58:18.588Z | 2025-11-14T15:09:14.122Z |
| bit-kibana-2025-37734 | Kibana Origin Validation Error | 2025-11-14T14:40:47.948Z | 2025-11-14T15:09:14.122Z |
| bit-elk-2025-37734 | Kibana Origin Validation Error | 2025-11-14T14:38:05.480Z | 2025-11-14T15:09:14.122Z |
| bit-valkey-2025-46817 | Lua library commands may lead to integer overflow and potential RCE | 2025-10-08T08:52:36.400Z | 2025-11-13T11:23:28.166Z |
| bit-redis-2025-46817 | Lua library commands may lead to integer overflow and potential RCE | 2025-10-08T08:51:25.578Z | 2025-11-13T11:23:28.166Z |
| bit-keydb-2025-46817 | Lua library commands may lead to integer overflow and potential RCE | 2025-10-08T08:43:20.393Z | 2025-11-13T11:23:28.166Z |
| bit-discourse-2025-48954 | Discourse vulnerable to XSS via user-provided query parameter in oauth failure flow | 2025-07-01T17:44:46.702Z | 2025-11-13T11:23:28.166Z |
| bit-parse-2025-64430 | Parse Server Vulnerable to Server-Side Request Forgery (SSRF) in File Upload via URI Format | 2025-11-12T11:45:02.117Z | 2025-11-12T12:05:53.614Z |
| bit-tomcat-2025-55752 | Apache Tomcat: Directory traversal via rewrite with possible RCE if PUT is enabled | 2025-11-06T13:00:31.694Z | 2025-11-11T12:05:08.739Z |
| bit-django-2025-64459 | Potential SQL injection via _connector keyword argument in QuerySet and Q objects | 2025-11-11T11:36:39.904Z | 2025-11-11T12:05:08.739Z |
| ID | Description | Updated |
|---|---|---|
| var-200512-0299 | Heap-based buffer overflow in rsync in Mac OS X 10.4 through 10.4.5 allows remote authent… | 2024-07-23T21:40:52.289000Z |
| var-202212-2277 | An integer underflow in Organization Specific TLV was found in various versions of OpenvS… | 2024-07-23T21:40:51.741000Z |
| var-200912-0756 | The U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, 8.x before 8.2 on Wind… | 2024-07-23T21:40:51.958000Z |
| var-201210-0456 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:40:50.864000Z |
| var-200712-0433 | Integer underflow in the asn1_get_string function in the SNMP back end (backend/snmp.c) f… | 2024-07-23T21:40:50.122000Z |
| var-201904-1460 | A cross-site scripting issue existed in Safari. This issue was addressed with improved UR… | 2024-07-23T21:40:45.159000Z |
| var-201806-1466 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T21:40:45.074000Z |
| var-201501-0436 | The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1… | 2024-07-23T21:40:45.003000Z |
| var-200704-0226 | Apple File Protocol (AFP) Client in Apple Mac OS X 10.3.9 through 10.4.9 does not properl… | 2024-07-23T21:40:44.831000Z |
| var-201605-0465 | The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple … | 2024-07-23T21:40:43.806000Z |
| var-202010-1510 | A type confusion issue was addressed with improved memory handling. This issue is fixed i… | 2024-07-23T21:40:40.672000Z |
| var-201103-0114 | The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x be… | 2024-07-23T21:40:40.823000Z |
| var-201302-0262 | Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.… | 2024-07-23T21:40:39.972000Z |
| var-201109-0201 | Use-after-free vulnerability in the document loader in Google Chrome before 14.0.835.163 … | 2024-07-23T21:40:39.355000Z |
| var-200505-1240 | The rsvp_print function in tcpdump 3.9.1 and earlier allows remote attackers to cause a d… | 2024-07-23T21:40:35.490000Z |
| var-201912-1857 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:39:57.528000Z |
| var-202104-0752 | A memory corruption issue was addressed with improved validation. This issue is fixed in … | 2024-07-23T21:39:56.465000Z |
| var-200902-0880 | International Components for Unicode (ICU) 4.0, 3.6, and other 3.x versions, as used in A… | 2024-07-23T21:39:24.164000Z |
| var-201908-1958 | The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently l… | 2024-07-23T21:39:23.746000Z |
| var-200102-0052 | Cisco Catalyst 6000, 5000, or 4000 switches allow remote attackers to cause a denial of s… | 2024-07-23T21:39:23.577000Z |
| var-201708-0038 | The decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 al… | 2024-07-23T21:39:15.769000Z |
| var-200901-0706 | WebKit in Apple Safari before 4.0 does not prevent remote loading of local Java applets, … | 2024-07-23T21:39:10.742000Z |
| var-202112-1608 | A carefully crafted request body can cause a buffer overflow in the mod_lua multipart par… | 2024-07-23T21:38:29.659000Z |
| var-202301-1703 | The issue was addressed with improved memory handling. This issue is fixed in macOS Monte… | 2024-07-23T21:38:27.556000Z |
| var-202103-0287 | A flaw possibility of race condition and incorrect initialization of the process id was f… | 2024-07-23T21:38:27.231000Z |
| var-201011-0174 | ipp.c in cupsd in CUPS 1.4.4 and earlier does not properly allocate memory for attribute … | 2024-07-23T21:37:24.567000Z |
| var-202106-0343 | Improper isolation of shared resources in some Intel(R) Processors may allow an authentic… | 2024-07-23T21:37:23.721000Z |
| var-201506-0268 | The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before… | 2024-07-23T21:36:44.513000Z |
| var-201904-0744 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:36:28.176000Z |
| var-201606-0329 | Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/us… | 2024-07-23T21:36:28.630000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2024-000065 | "ZOZOTOWN" App for Android fails to restrict custom URL schemes properly | 2024-06-19T16:04+09:00 | 2024-06-19T16:04+09:00 |
| jvndb-2022-000029 | KOYO Electronics Screen Creator Advance2 vulnerable to authentication bypass | 2022-05-09T14:43+09:00 | 2024-06-19T16:03+09:00 |
| jvndb-2022-000028 | Multiple vulnerabilities in multiple MEIKYO ELECTRIC products | 2022-05-09T14:31+09:00 | 2024-06-19T15:55+09:00 |
| jvndb-2024-000064 | WordPress plugin "SiteGuard WP Plugin" may leak the customized path to the login page | 2024-06-19T14:25+09:00 | 2024-06-19T14:25+09:00 |
| jvndb-2022-001809 | Trend Micro Password Manager vulnerable to privilege escalation | 2022-05-24T15:27+09:00 | 2024-06-18T17:52+09:00 |
| jvndb-2022-000032 | Installer of Trend Micro Password Manager may insecurely load Dynamic Link Libraries | 2022-05-11T15:21+09:00 | 2024-06-18T17:46+09:00 |
| jvndb-2022-000039 | RevoWorks incomplete filtering of MS Office v4 macros | 2022-05-27T16:09+09:00 | 2024-06-18T16:31+09:00 |
| jvndb-2022-001948 | Multiple vulnerabilities in Trend Micro Apex One and Apex One as a Service | 2022-06-03T12:17+09:00 | 2024-06-18T16:30+09:00 |
| jvndb-2022-001931 | Multiple vulnerabilities in Fuji Electric V-SFT, V-Server and V-Server Lite | 2022-05-27T15:37+09:00 | 2024-06-18T16:28+09:00 |
| jvndb-2022-000038 | WordPress plugin "WP Statistics" vulnerable to cross-site scripting | 2022-05-24T15:00+09:00 | 2024-06-18T15:41+09:00 |
| jvndb-2022-000031 | GENEREX RCCMD vulnerable to directory traversal | 2022-05-10T15:47+09:00 | 2024-06-18T15:35+09:00 |
| jvndb-2024-000061 | Multiple vulnerabilities in Ricoh Streamline NX PC Client | 2024-06-18T14:56+09:00 | 2024-06-18T14:56+09:00 |
| jvndb-2022-001929 | Multiple vulnerabilities in Fuji Electric V-SFT | 2022-05-27T15:39+09:00 | 2024-06-18T13:44+09:00 |
| jvndb-2024-000063 | Multiple vulnerabilities in ID Link Manager and FUJITSU Software TIME CREATOR | 2024-06-18T13:43+09:00 | 2024-06-18T13:43+09:00 |
| jvndb-2022-000034 | EC-CUBE plugin "Easy Blog for EC-CUBE4" vulnerable to cross-site request forgery | 2022-05-13T16:31+09:00 | 2024-06-18T12:13+09:00 |
| jvndb-2022-000036 | Multiple vulnerabilities in Rakuten Casa | 2022-05-19T15:13+09:00 | 2024-06-18T12:09+09:00 |
| jvndb-2022-000053 | Django Extract and Trunc functions vulnerable to SQL injection | 2022-07-12T13:47+09:00 | 2024-06-18T11:57+09:00 |
| jvndb-2022-000057 | WordPress Plugin "Newsletter" vulnerable to cross-site scripting | 2022-07-25T14:30+09:00 | 2024-06-18T11:21+09:00 |
| jvndb-2022-000033 | Strapi vulnerable to cross-site scripting | 2022-05-13T16:45+09:00 | 2024-06-18T11:17+09:00 |
| jvndb-2022-000043 | SHIRASAGI vulnerable to cross-site scripting | 2022-06-09T13:31+09:00 | 2024-06-18T11:13+09:00 |
| jvndb-2022-000040 | Mobaoku-Auction & Flea Market App for iOS vulnerable to improper server certificate verification | 2022-05-27T15:48+09:00 | 2024-06-18T11:06+09:00 |
| jvndb-2022-000044 | Cisco Catalyst 2940 Series Switches vulnerable to cross-site scripting | 2022-06-14T13:46+09:00 | 2024-06-18T10:51+09:00 |
| jvndb-2022-000047 | web2py vulnerable to open redirect | 2022-06-23T14:21+09:00 | 2024-06-18T10:48+09:00 |
| jvndb-2022-000048 | L2Blocker Sensor setup screen vulnerable to authentication bypass | 2022-06-24T14:21+09:00 | 2024-06-18T10:45+09:00 |
| jvndb-2022-000041 | WordPress Plugin "Modern Events Calendar Lite" vulnerable to cross-site scripting | 2022-06-01T13:39+09:00 | 2024-06-18T10:42+09:00 |
| jvndb-2022-000042 | T&D Data Server and THERMO RECORDER DATA SERVER contain a directory traversal vulnerability. | 2022-06-01T16:12+09:00 | 2024-06-18T10:34+09:00 |
| jvndb-2022-000051 | Multiple vulnerabilities in Cybozu Garoon | 2022-07-04T14:17+09:00 | 2024-06-17T16:49+09:00 |
| jvndb-2022-000035 | Multiple vulnerabilities in Cybozu Garoon | 2022-05-16T14:25+09:00 | 2024-06-17T16:34+09:00 |
| jvndb-2024-003539 | Multiple vulnerabilities in Toshiba Tec and Oki Electric Industry MFPs | 2024-06-17T15:21+09:00 | 2024-06-17T15:21+09:00 |
| jvndb-2022-000058 | Multiple vulnerabilities in untangle | 2022-07-25T14:18+09:00 | 2024-06-17T11:03+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:20019-1 | Security update for sssd | 2026-01-02T16:58:52Z | 2026-01-02T16:58:52Z |
| suse-su-2026:20014-1 | Security update for sssd | 2026-01-02T16:58:52Z | 2026-01-02T16:58:52Z |
| suse-su-2026:0005-1 | Security update for rsync | 2026-01-02T12:30:51Z | 2026-01-02T12:30:51Z |
| suse-su-2026:20058-1 | Security update for rsync | 2026-01-02T11:13:05Z | 2026-01-02T11:13:05Z |
| suse-su-2026:20057-1 | Security update for libmicrohttpd | 2026-01-02T11:07:26Z | 2026-01-02T11:07:26Z |
| suse-ru-2026:20056-1 | Recommended update for shim | 2026-01-01T13:54:36Z | 2026-01-01T13:54:36Z |
| suse-su-2025:4539-1 | Security update for python36 | 2025-12-31T15:05:33Z | 2025-12-31T15:05:33Z |
| suse-su-2025:4538-1 | Security update for python3 | 2025-12-31T15:05:25Z | 2025-12-31T15:05:25Z |
| suse-su-2025:4536-1 | Security update for podman | 2025-12-31T10:35:17Z | 2025-12-31T10:35:17Z |
| suse-su-2026:20036-1 | Security update for dpdk | 2025-12-30T20:51:25Z | 2025-12-30T20:51:25Z |
| suse-su-2026:20037-1 | Security update for ovmf | 2025-12-30T20:33:17Z | 2025-12-30T20:33:17Z |
| suse-su-2026:20035-1 | Security update for podman | 2025-12-30T20:16:23Z | 2025-12-30T20:16:23Z |
| suse-su-2026:20055-1 | Security update for dpdk | 2025-12-30T20:05:16Z | 2025-12-30T20:05:16Z |
| suse-su-2026:20054-1 | Security update for capstone | 2025-12-30T20:03:14Z | 2025-12-30T20:03:14Z |
| suse-ru-2026:20004-1 | Recommended update for shim | 2025-12-30T16:20:45Z | 2025-12-30T16:20:45Z |
| suse-su-2025:4534-1 | Security update for dpdk22 | 2025-12-29T16:15:13Z | 2025-12-29T16:15:13Z |
| suse-su-2025:4533-1 | Security update for libpng16 | 2025-12-29T16:11:25Z | 2025-12-29T16:11:25Z |
| suse-su-2025:4532-1 | Security update for apache2-mod_auth_openidc | 2025-12-29T13:53:59Z | 2025-12-29T13:53:59Z |
| suse-su-2025:4530-1 | Security update for the Linux Kernel | 2025-12-29T10:48:23Z | 2025-12-29T10:48:23Z |
| suse-su-2025:4528-1 | Security update for webkit2gtk3 | 2025-12-26T14:52:35Z | 2025-12-26T14:52:35Z |
| suse-su-2025:4527-1 | Security update for webkit2gtk3 | 2025-12-26T14:49:08Z | 2025-12-26T14:49:08Z |
| suse-su-2025:4526-1 | Security update for buildah | 2025-12-26T12:24:16Z | 2025-12-26T12:24:16Z |
| suse-su-2025:4525-1 | Security update for gnutls | 2025-12-26T12:19:11Z | 2025-12-26T12:19:11Z |
| suse-su-2025:4523-1 | Security update for qemu | 2025-12-26T10:45:48Z | 2025-12-26T10:45:48Z |
| suse-su-2025:4522-1 | Security update for python39 | 2025-12-26T10:35:01Z | 2025-12-26T10:35:01Z |
| suse-su-2025:4521-1 | Security update for the Linux Kernel | 2025-12-24T12:42:49Z | 2025-12-24T12:42:49Z |
| suse-su-2025:4520-1 | Security update for mariadb | 2025-12-24T09:19:47Z | 2025-12-24T09:19:47Z |
| suse-su-2025:4518-1 | Security update for apache2 | 2025-12-23T19:07:45Z | 2025-12-23T19:07:45Z |
| suse-su-2025:4517-1 | Security update for the Linux Kernel | 2025-12-23T16:28:51Z | 2025-12-23T16:28:51Z |
| suse-su-2025:4516-1 | Security update for the Linux Kernel | 2025-12-23T16:27:39Z | 2025-12-23T16:27:39Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-04861 | Google Android输入验证不当漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-04860 | Google Android越界写入漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-04859 | Google Android竞争条件漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-04858 | Google Android越界写入漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-04857 | Google Android堆缓冲区溢出漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-04856 | Huawei HarmonyOS特权升级漏洞 | 2024-01-23 | 2026-01-15 |
| cnvd-2026-04855 | Huawei HarmonyOS/EMUI授权漏洞 | 2024-01-23 | 2026-01-15 |
| cnvd-2026-04854 | Huawei HarmonyOS/EMUI拒绝服务漏洞 | 2024-01-23 | 2026-01-15 |
| cnvd-2026-04853 | Huawei HarmonyOS释放后使用漏洞 | 2024-01-23 | 2026-01-15 |
| cnvd-2026-04852 | Huawei HarmonyOS越界访问漏洞 | 2024-01-23 | 2026-01-15 |
| cnvd-2026-04851 | Huawei HarmonyOS/EMUI逻辑漏洞 | 2024-02-19 | 2026-01-15 |
| cnvd-2026-04850 | Huawei HarmonyOS/EMUI越界读取漏洞 | 2024-02-19 | 2026-01-15 |
| cnvd-2026-04849 | Huawei HarmonyOS/EMUI堆栈缓冲区溢出漏洞 | 2024-02-19 | 2026-01-15 |
| cnvd-2026-04848 | Huawei HarmonyOS/EMUI堆栈缓冲区溢出漏洞(CNVD-2026-04848) | 2024-02-19 | 2026-01-15 |
| cnvd-2026-04847 | Huawei HarmonyOS/EMUI输入数据未被验证漏洞 | 2024-02-19 | 2026-01-15 |
| cnvd-2026-04139 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0413973) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04138 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0413874) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04137 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0413775) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04136 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0413676) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04135 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0413577) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04134 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0413478) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04130 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0413079) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04129 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0412980) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04128 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0412881) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04127 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0412782) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04126 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0412683) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04125 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0412584) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04124 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0412485) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04123 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0412386) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04122 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0412288) | 2025-12-15 | 2026-01-15 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2025-AVI-1063 | Multiples vulnérabilités dans les produits Splunk | 2025-12-04T00:00:00.000000 | 2025-12-04T00:00:00.000000 |
| CERTFR-2025-AVI-1062 | Multiples vulnérabilités dans Wireshark | 2025-12-04T00:00:00.000000 | 2025-12-04T00:00:00.000000 |
| CERTFR-2025-AVI-1061 | Vulnérabilité dans PostgreSQL PgBouncer | 2025-12-04T00:00:00.000000 | 2025-12-04T00:00:00.000000 |
| CERTFR-2024-AVI-1090 | Multiples vulnérabilités dans Synacor Zimbra Collaboration | 2024-12-18T00:00:00.000000 | 2025-12-04T00:00:00.000000 |
| certfr-2025-avi-1060 | Multiples vulnérabilités dans Python | 2025-12-03T00:00:00.000000 | 2025-12-03T00:00:00.000000 |
| certfr-2025-avi-1059 | Multiples vulnérabilités dans Google Pixel | 2025-12-03T00:00:00.000000 | 2025-12-03T00:00:00.000000 |
| certfr-2025-avi-1058 | Multiples vulnérabilités dans Google Chrome | 2025-12-03T00:00:00.000000 | 2025-12-03T00:00:00.000000 |
| CERTFR-2025-AVI-1060 | Multiples vulnérabilités dans Python | 2025-12-03T00:00:00.000000 | 2025-12-03T00:00:00.000000 |
| CERTFR-2025-AVI-1059 | Multiples vulnérabilités dans Google Pixel | 2025-12-03T00:00:00.000000 | 2025-12-03T00:00:00.000000 |
| CERTFR-2025-AVI-1058 | Multiples vulnérabilités dans Google Chrome | 2025-12-03T00:00:00.000000 | 2025-12-03T00:00:00.000000 |
| certfr-2025-avi-1057 | Multiples vulnérabilités dans les produits VMware | 2025-12-02T00:00:00.000000 | 2025-12-02T00:00:00.000000 |
| certfr-2025-avi-1056 | Multiples vulnérabilités dans Google Android | 2025-12-02T00:00:00.000000 | 2025-12-02T00:00:00.000000 |
| CERTFR-2025-AVI-1057 | Multiples vulnérabilités dans les produits VMware | 2025-12-02T00:00:00.000000 | 2025-12-02T00:00:00.000000 |
| CERTFR-2025-AVI-1056 | Multiples vulnérabilités dans Google Android | 2025-12-02T00:00:00.000000 | 2025-12-02T00:00:00.000000 |
| certfr-2025-avi-1055 | Multiples vulnérabilités dans Zabbix | 2025-12-01T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| certfr-2025-avi-1054 | Multiples vulnérabilités dans les produits VMware | 2025-12-01T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| certfr-2025-avi-1053 | Vulnérabilité dans Stormshield Network VPN Client | 2025-12-01T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| certfr-2025-avi-1052 | Vulnérabilité dans Mattermost Server | 2025-12-01T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| certfr-2025-avi-0936 | Multiples vulnérabilités dans Mattermost Server | 2025-10-29T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| CERTFR-2025-AVI-1055 | Multiples vulnérabilités dans Zabbix | 2025-12-01T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| CERTFR-2025-AVI-1054 | Multiples vulnérabilités dans les produits VMware | 2025-12-01T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| CERTFR-2025-AVI-1053 | Vulnérabilité dans Stormshield Network VPN Client | 2025-12-01T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| CERTFR-2025-AVI-1052 | Vulnérabilité dans Mattermost Server | 2025-12-01T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| CERTFR-2025-AVI-0936 | Multiples vulnérabilités dans Mattermost Server | 2025-10-29T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| certfr-2025-avi-1051 | Multiples vulnérabilités dans les produits IBM | 2025-11-28T00:00:00.000000 | 2025-11-28T00:00:00.000000 |
| certfr-2025-avi-1050 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-11-28T00:00:00.000000 | 2025-11-28T00:00:00.000000 |
| certfr-2025-avi-1049 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-11-28T00:00:00.000000 | 2025-11-28T00:00:00.000000 |
| certfr-2025-avi-1048 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2025-11-28T00:00:00.000000 | 2025-11-28T00:00:00.000000 |
| certfr-2025-avi-1047 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-11-28T00:00:00.000000 | 2025-11-28T00:00:00.000000 |
| certfr-2025-avi-1046 | Multiples vulnérabilités dans les produits Moxa | 2025-11-28T00:00:00.000000 | 2025-11-28T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2014-ALE-011 | Vulnérabilité de l'implémentation Kerberos dans Microsoft Windows | 2014-11-18T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| CERTFR-2014-ALE-010 | Vulnérabilité de l'implémentation des protocoles SSL/TLS dans Microsoft Windows | 2014-11-11T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| CERTFR-2014-ALE-008 | Vulnérabilité dans Drupal | 2014-10-16T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| certfr-2014-ale-009 | Vulnérabilité dans Microsoft OLE | 2014-10-22T00:00:00.000000 | 2014-11-12T00:00:00.000000 |
| CERTFR-2014-ALE-009 | Vulnérabilité dans Microsoft OLE | 2014-10-22T00:00:00.000000 | 2014-11-12T00:00:00.000000 |
| certfr-2014-ale-007 | Vulnérabilité dans SSLv3 | 2014-10-15T00:00:00.000000 | 2014-10-15T00:00:00.000000 |
| CERTFR-2014-ALE-007 | Vulnérabilité dans SSLv3 | 2014-10-15T00:00:00.000000 | 2014-10-15T00:00:00.000000 |
| certfr-2014-ale-006 | Vulnérabilité dans GNU bash | 2014-09-25T00:00:00.000000 | 2014-09-30T00:00:00.000000 |
| CERTFR-2014-ALE-006 | Vulnérabilité dans GNU bash | 2014-09-25T00:00:00.000000 | 2014-09-30T00:00:00.000000 |
| certfr-2014-ale-003 | Vulnérabilité dans OpenSSL | 2014-04-08T00:00:00.000000 | 2014-07-30T00:00:00.000000 |
| CERTFR-2014-ALE-003 | Vulnérabilité dans OpenSSL | 2014-04-08T00:00:00.000000 | 2014-07-30T00:00:00.000000 |
| certfr-2014-ale-005 | Vulnérabilité dans Microsoft Internet Explorer | 2014-04-28T00:00:00.000000 | 2014-05-02T00:00:00.000000 |
| CERTFR-2014-ALE-005 | Vulnérabilité dans Microsoft Internet Explorer | 2014-04-28T00:00:00.000000 | 2014-05-02T00:00:00.000000 |
| certfr-2014-ale-004 | Vulnérabilité dans Apache Struts | 2014-04-25T00:00:00.000000 | 2014-04-29T00:00:00.000000 |
| CERTFR-2014-ALE-004 | Vulnérabilité dans Apache Struts | 2014-04-25T00:00:00.000000 | 2014-04-29T00:00:00.000000 |
| certfr-2014-ale-002 | Vulnérabilité dans Microsoft Word | 2014-03-25T00:00:00.000000 | 2014-04-09T00:00:00.000000 |
| CERTFR-2014-ALE-002 | Vulnérabilité dans Microsoft Word | 2014-03-25T00:00:00.000000 | 2014-04-09T00:00:00.000000 |
| certfr-2014-ale-001 | Vulnérabilité dans Microsoft Internet Explorer | 2014-02-21T00:00:00.000000 | 2014-03-12T00:00:00.000000 |
| CERTFR-2014-ALE-001 | Vulnérabilité dans Microsoft Internet Explorer | 2014-02-21T00:00:00.000000 | 2014-03-12T00:00:00.000000 |
| certa-2013-ale-008 | Vulnérabilité critique dans le noyau de Microsoft Windows | 2013-11-28T00:00:00.000000 | 2014-01-16T00:00:00.000000 |
| CERTA-2013-ALE-008 | Vulnérabilité critique dans le noyau de Microsoft Windows | 2013-11-28T00:00:00.000000 | 2014-01-16T00:00:00.000000 |
| certa-2013-ale-007 | Vulnérabilité dans un composant graphique de Microsoft | 2013-11-06T00:00:00.000000 | 2013-12-10T00:00:00.000000 |
| CERTA-2013-ALE-007 | Vulnérabilité dans un composant graphique de Microsoft | 2013-11-06T00:00:00.000000 | 2013-12-10T00:00:00.000000 |
| certa-2013-ale-006 | Vulnérabilité dans Microsoft Internet Explorer | 2013-09-18T00:00:00.000000 | 2013-10-09T00:00:00.000000 |
| CERTA-2013-ALE-006 | Vulnérabilité dans Microsoft Internet Explorer | 2013-09-18T00:00:00.000000 | 2013-10-09T00:00:00.000000 |
| certa-2005-ale-013 | Vulnérabilité dans Citrix Metaframe Presentation | 2005-10-07T00:00:00.000000 | 2013-06-06T00:00:00.000000 |
| CERTA-2005-ALE-013 | Vulnérabilité dans Citrix Metaframe Presentation | 2005-10-07T00:00:00.000000 | 2013-06-06T00:00:00.000000 |
| certa-2013-ale-005 | Vulnérabilité dans le noyau Linux | 2013-05-14T00:00:00.000000 | 2013-05-24T00:00:00.000000 |
| CERTA-2013-ALE-005 | Vulnérabilité dans le noyau Linux | 2013-05-14T00:00:00.000000 | 2013-05-24T00:00:00.000000 |
| certa-2013-ale-004 | Vulnérabilité dans Adobe ColdFusion | 2013-05-10T00:00:00.000000 | 2013-05-15T00:00:00.000000 |