Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-59206 |
7.4 (3.1)
|
Windows Resilient File System (ReFS) Deduplication Ser… |
Microsoft |
Windows 11 Version 24H2 |
2025-10-14T17:00:33.832Z | 2026-02-13T23:11:49.692Z |
| CVE-2025-59204 |
5.5 (3.1)
|
Windows Management Services Information Disclosure Vul… |
Microsoft |
Windows 10 Version 1809 |
2025-10-14T17:00:33.266Z | 2026-02-13T23:11:49.124Z |
| CVE-2025-59202 |
7 (3.1)
|
Windows Remote Desktop Services Elevation of Privilege… |
Microsoft |
Windows 10 Version 1607 |
2025-10-14T17:00:32.507Z | 2026-02-13T23:11:48.652Z |
| CVE-2025-59201 |
7.8 (3.1)
|
Network Connection Status Indicator (NCSI) Elevation o… |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:00:32.009Z | 2026-02-13T23:11:48.015Z |
| CVE-2025-59200 |
7.7 (3.1)
|
Data Sharing Service Spoofing Vulnerability |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:00:31.341Z | 2026-02-13T23:11:47.537Z |
| CVE-2025-59199 |
7.8 (3.1)
|
Software Protection Platform (SPP) Elevation of Privil… |
Microsoft |
Windows 10 Version 1809 |
2025-10-14T17:00:30.703Z | 2026-02-13T23:11:46.997Z |
| CVE-2025-59196 |
7 (3.1)
|
Windows Simple Search and Discovery Protocol (SSDP) Se… |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:00:30.108Z | 2026-02-13T23:11:46.458Z |
| CVE-2025-59195 |
7 (3.1)
|
Microsoft Graphics Component Denial of Service Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2025-10-14T17:00:29.561Z | 2026-02-13T23:11:45.851Z |
| CVE-2025-59186 |
5.5 (3.1)
|
Windows Kernel Information Disclosure Vulnerability |
Microsoft |
Windows Server 2016 |
2025-10-14T17:00:28.982Z | 2026-02-13T23:11:45.200Z |
| CVE-2025-59185 |
6.5 (3.1)
|
NTLM Hash Disclosure Spoofing Vulnerability |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:00:28.356Z | 2026-02-13T23:11:44.531Z |
| CVE-2025-58735 |
7 (3.1)
|
Inbox COM Objects (Global Memory) Remote Code Executio… |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:00:27.693Z | 2026-02-13T23:11:43.957Z |
| CVE-2025-58732 |
7 (3.1)
|
Inbox COM Objects (Global Memory) Remote Code Executio… |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:00:27.106Z | 2026-02-13T23:11:43.410Z |
| CVE-2025-58728 |
7.8 (3.1)
|
Windows Bluetooth Service Elevation of Privilege Vulne… |
Microsoft |
Windows 10 Version 1809 |
2025-10-14T17:00:26.604Z | 2026-02-13T23:11:42.840Z |
| CVE-2025-58722 |
7.8 (3.1)
|
Microsoft DWM Core Library Elevation of Privilege Vuln… |
Microsoft |
Windows 10 Version 1607 |
2025-10-14T17:00:25.939Z | 2026-02-13T23:11:42.311Z |
| CVE-2025-58719 |
4.7 (3.1)
|
Windows Connected Devices Platform Service Elevation o… |
Microsoft |
Windows 10 Version 1607 |
2025-10-14T17:00:25.357Z | 2026-02-13T23:11:41.715Z |
| CVE-2025-58717 |
6.5 (3.1)
|
Windows Routing and Remote Access Service (RRAS) Infor… |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:00:24.791Z | 2026-02-13T23:11:41.197Z |
| CVE-2025-58716 |
8.8 (3.1)
|
Windows Speech Runtime Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:00:24.216Z | 2026-02-13T23:11:40.539Z |
| CVE-2025-58715 |
8.8 (3.1)
|
Windows Speech Runtime Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:00:23.658Z | 2026-02-13T23:11:39.866Z |
| CVE-2025-55701 |
7.8 (3.1)
|
Windows Authentication Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:00:23.119Z | 2026-02-13T23:11:39.327Z |
| CVE-2025-55700 |
6.5 (3.1)
|
Windows Routing and Remote Access Service (RRAS) Infor… |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:00:22.479Z | 2026-02-13T23:11:38.804Z |
| CVE-2025-55689 |
7 (3.1)
|
Windows PrintWorkflowUserSvc Elevation of Privilege Vu… |
Microsoft |
Windows 10 Version 21H2 |
2025-10-14T17:00:21.808Z | 2026-02-13T23:11:38.307Z |
| CVE-2025-55687 |
7.4 (3.1)
|
Windows Resilient File System (ReFS) Elevation of Priv… |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:00:21.189Z | 2026-02-13T23:11:37.639Z |
| CVE-2025-55686 |
7 (3.1)
|
Windows PrintWorkflowUserSvc Elevation of Privilege Vu… |
Microsoft |
Windows 10 Version 21H2 |
2025-10-14T17:00:20.615Z | 2026-02-13T23:11:37.075Z |
| CVE-2025-55685 |
7 (3.1)
|
Windows PrintWorkflowUserSvc Elevation of Privilege Vu… |
Microsoft |
Windows 10 Version 21H2 |
2025-10-14T17:00:20.034Z | 2026-02-13T23:11:36.511Z |
| CVE-2025-55681 |
7 (3.1)
|
Desktop Window Manager Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2025-10-14T17:00:19.139Z | 2026-02-13T23:11:35.974Z |
| CVE-2025-55677 |
7.8 (3.1)
|
Windows Device Association Broker Service Elevation of… |
Microsoft |
Windows 11 Version 24H2 |
2025-10-14T17:00:18.544Z | 2026-02-13T23:11:35.471Z |
| CVE-2025-55676 |
5.5 (3.1)
|
Windows USB Video Class System Driver Information Disc… |
Microsoft |
Windows 11 Version 24H2 |
2025-10-14T17:00:17.902Z | 2026-02-13T23:11:34.745Z |
| CVE-2025-55340 |
7 (3.1)
|
Windows Remote Desktop Protocol Security Feature Bypass |
Microsoft |
Windows 10 Version 21H2 |
2025-10-14T17:00:17.330Z | 2026-02-13T23:11:34.033Z |
| CVE-2025-55339 |
7.8 (3.1)
|
Windows Network Driver Interface Specification (NDIS) … |
Microsoft |
Windows 11 version 22H2 |
2025-10-14T17:00:16.751Z | 2026-02-13T23:11:33.373Z |
| CVE-2025-55336 |
5.5 (3.1)
|
Windows Cloud Files Mini Filter Driver Information Dis… |
Microsoft |
Windows 10 Version 1809 |
2025-10-14T17:00:15.367Z | 2026-02-13T23:11:32.771Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-0790 |
5.3 (3.0)
|
ALGO 8180 IP Audio Alerter Web UI Direct Request Infor… |
ALGO |
8180 IP Audio Alerter |
2026-01-23T03:01:20.618Z | 2026-01-23T19:38:42.172Z |
| CVE-2025-69929 |
9.8 (3.1)
|
An issue in N3uron Web User Interface v.1.21.7-24… |
n/a |
n/a |
2026-01-29T00:00:00.000Z | 2026-02-03T16:43:20.985Z |
| CVE-2026-25938 |
9.5 (4.0)
|
FUXA Unauthenticated Remote Code Execution in Node-RED… |
frangoteam |
FUXA |
2026-02-09T22:18:15.774Z | 2026-02-11T21:22:19.452Z |
| CVE-2026-25939 |
9.3 (4.0)
|
FUXA Unauthenticated Remote Arbitrary Scheduler Write |
frangoteam |
FUXA |
2026-02-09T22:21:03.611Z | 2026-02-11T21:21:07.816Z |
| CVE-2026-25951 |
8.6 (4.0)
|
FUXA has a Path Traversal Sanitization Bypass |
frangoteam |
FUXA |
2026-02-09T22:24:25.857Z | 2026-02-11T21:24:18.690Z |
| CVE-2020-37007 |
0 (4.0)
5.3 (3.1)
|
Liman 0.7 - Cross-Site Request Forgery (Change Password) |
salihciftci |
Liman |
2026-01-29T14:28:29.695Z | 2026-01-29T16:48:41.228Z |
| CVE-2026-20614 |
N/A
|
A path handling issue was addressed with improved… |
Apple |
macOS |
2026-02-11T22:58:36.526Z | 2026-02-13T04:56:36.038Z |
| CVE-2026-25530 |
4.3 (3.1)
|
Kanboard is missing authorization check in getSwimlane… |
kanboard |
kanboard |
2026-02-10T16:47:58.617Z | 2026-02-10T17:06:13.410Z |
| CVE-2026-24885 |
5.7 (3.1)
|
Kanboard Affected by Cross-Site Request Forgery (CSRF)… |
kanboard |
kanboard |
2026-02-10T16:40:01.579Z | 2026-02-10T17:27:35.020Z |
| CVE-2026-20681 |
3.3 (3.1)
|
A privacy issue was addressed with improved priva… |
Apple |
macOS |
2026-02-11T22:58:42.753Z | 2026-02-13T19:14:05.604Z |
| CVE-2026-20678 |
5.5 (3.1)
|
An authorization issue was addressed with improve… |
Apple |
iOS and iPadOS |
2026-02-11T22:58:43.562Z | 2026-02-13T19:07:08.322Z |
| CVE-2026-20667 |
8.8 (3.1)
|
A logic issue was addressed with improved checks.… |
Apple |
macOS |
2026-02-11T22:58:03.531Z | 2026-02-13T19:41:07.155Z |
| CVE-2026-20646 |
3.3 (3.1)
|
A logging issue was addressed with improved data … |
Apple |
macOS |
2026-02-11T22:58:11.733Z | 2026-02-13T19:43:11.438Z |
| CVE-2026-20641 |
7.1 (3.1)
|
A privacy issue was addressed with improved check… |
Apple |
macOS |
2026-02-11T22:58:19.210Z | 2026-02-13T19:27:51.774Z |
| CVE-2026-20640 |
4.6 (3.1)
|
An inconsistent user interface issue was addresse… |
Apple |
iOS and iPadOS |
2026-02-11T22:58:22.823Z | 2026-02-13T19:20:00.274Z |
| CVE-2025-48823 |
5.9 (3.1)
|
Windows Cryptographic Services Information Disclosure … |
Microsoft |
Windows 10 Version 1507 |
2025-07-08T16:57:47.917Z | 2026-02-13T19:07:23.350Z |
| CVE-2025-47964 |
5.4 (3.1)
|
Microsoft Edge (Chromium-based) Spoofing Vulnerability |
Microsoft |
Microsoft Edge (Chromium-based) |
2025-07-11T16:36:54.030Z | 2026-02-13T19:13:45.222Z |
| CVE-2025-47963 |
6.3 (3.1)
|
Microsoft Edge (Chromium-based) Spoofing Vulnerability |
Microsoft |
Microsoft Edge (Chromium-based) |
2025-07-11T16:36:54.605Z | 2026-02-13T19:13:45.737Z |
| CVE-2025-47732 |
8.7 (3.1)
|
Microsoft Dataverse Remote Code Execution Vulnerability |
Microsoft |
Microsoft Dataverse |
2025-05-08T22:17:27.315Z | 2026-02-13T19:21:36.917Z |
| CVE-2025-47176 |
7.8 (3.1)
|
Microsoft Outlook Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-06-10T17:02:43.887Z | 2026-02-13T19:13:42.487Z |
| CVE-2025-40905 |
N/A
|
WWW::OAuth 1.000 and earlier for Perl uses insecure ra… |
DBOOK |
WWW::OAuth |
2026-02-12T23:39:28.994Z | 2026-02-13T19:16:45.884Z |
| CVE-2025-29972 |
9.9 (3.1)
|
Azure Storage Resource Provider Spoofing Vulnerability |
Microsoft |
Azure Storage Resource Provider (SRP) |
2025-05-08T22:17:24.266Z | 2026-02-13T19:21:34.653Z |
| CVE-2025-29813 |
10 (3.1)
|
Azure DevOps Elevation of Privilege Vulnerability |
Microsoft |
Azure DevOps |
2025-05-08T22:17:26.036Z | 2026-02-13T19:21:35.844Z |
| CVE-2025-26647 |
8.8 (3.1)
|
Windows Kerberos Elevation of Privilege Vulnerability |
Microsoft |
Windows Server 2008 R2 Service Pack 1 |
2025-04-08T17:23:49.183Z | 2026-02-13T19:33:06.786Z |
| CVE-2025-21389 |
7.5 (3.1)
|
Windows Universal Plug and Play (UPnP) Device Host Den… |
Microsoft |
Windows 10 Version 1507 |
2025-01-14T18:04:11.595Z | 2026-02-13T19:56:10.321Z |
| CVE-2025-21300 |
7.5 (3.1)
|
Windows Universal Plug and Play (UPnP) Device Host Den… |
Microsoft |
Windows 10 Version 1507 |
2025-01-14T18:04:33.870Z | 2026-02-13T19:56:33.591Z |
| CVE-2025-21104 |
4.3 (3.1)
|
Dell NetWorker, versions prior to 19.11.0.4 and v… |
Dell |
NetWorker |
2025-03-13T11:42:22.866Z | 2026-02-13T19:53:35.044Z |
| CVE-2023-28322 |
5.3 (3.1)
|
An information disclosure vulnerability exists in… |
n/a |
https://github.com/curl/curl |
2023-05-26T00:00:00.000Z | 2026-02-13T19:43:18.938Z |
| CVE-2022-45188 |
7.8 (3.1)
|
Netatalk through 3.1.13 has an afp_getappl heap-b… |
n/a |
n/a |
2022-11-12T00:00:00.000Z | 2026-02-13T19:33:18.557Z |
| CVE-2022-43551 |
7.5 (3.1)
|
A vulnerability exists in curl <7.87.0 HSTS check… |
n/a |
https://github.com/curl/curl |
2022-12-23T00:00:00.000Z | 2026-02-13T19:43:56.236Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-69929 | An issue in N3uron Web User Interface v.1.21.7-240207.1047 allows a remote attacker to escalate pri… | 2026-01-29T20:16:09.953 | 2026-02-13T20:32:24.303 |
| fkie_cve-2026-25938 | FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. From 1.2.8 through 1.2.10… | 2026-02-09T23:16:06.100 | 2026-02-13T20:31:47.513 |
| fkie_cve-2026-25939 | FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. From 1.2.8 through versio… | 2026-02-09T23:16:06.287 | 2026-02-13T20:31:09.137 |
| fkie_cve-2026-25951 | FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. Prior to 1.2.11, there is… | 2026-02-09T23:16:06.630 | 2026-02-13T20:28:36.930 |
| fkie_cve-2020-37007 | Liman 0.7 contains a cross-site request forgery vulnerability that allows attackers to manipulate u… | 2026-01-29T15:16:07.613 | 2026-02-13T20:24:01.220 |
| fkie_cve-2026-20614 | A path handling issue was addressed with improved validation. This issue is fixed in macOS Sequoia … | 2026-02-11T23:16:04.957 | 2026-02-13T20:22:46.497 |
| fkie_cve-2026-25530 | Kanboard is project management software focused on Kanban methodology. Prior to 1.2.50, the getSwim… | 2026-02-10T17:16:21.910 | 2026-02-13T20:21:29.700 |
| fkie_cve-2026-24885 | Kanboard is project management software focused on Kanban methodology. Prior to 1.2.50, a Cross-Sit… | 2026-02-10T17:16:20.940 | 2026-02-13T20:19:00.370 |
| fkie_cve-2026-20681 | A privacy issue was addressed with improved private data redaction for log entries. This issue is f… | 2026-02-11T23:16:10.460 | 2026-02-13T20:17:40.933 |
| fkie_cve-2026-20678 | An authorization issue was addressed with improved state management. This issue is fixed in iOS 26.… | 2026-02-11T23:16:10.217 | 2026-02-13T20:17:40.773 |
| fkie_cve-2026-20667 | A logic issue was addressed with improved checks. This issue is fixed in watchOS 26.3, macOS Tahoe … | 2026-02-11T23:16:09.113 | 2026-02-13T20:17:40.620 |
| fkie_cve-2026-20646 | A logging issue was addressed with improved data redaction. This issue is fixed in macOS Tahoe 26.3… | 2026-02-11T23:16:07.530 | 2026-02-13T20:17:40.477 |
| fkie_cve-2026-20641 | A privacy issue was addressed with improved checks. This issue is fixed in watchOS 26.3, tvOS 26.3,… | 2026-02-11T23:16:07.123 | 2026-02-13T20:17:40.330 |
| fkie_cve-2026-20640 | An inconsistent user interface issue was addressed with improved state management. This issue is fi… | 2026-02-11T23:16:07.023 | 2026-02-13T20:17:40.193 |
| fkie_cve-2025-48823 | Cryptographic issues in Windows Cryptographic Services allows an unauthorized attacker to disclose … | 2025-07-08T17:15:47.580 | 2026-02-13T20:17:30.333 |
| fkie_cve-2025-47964 | Microsoft Edge (Chromium-based) Spoofing Vulnerability | 2025-07-11T17:15:40.460 | 2026-02-13T20:17:24.467 |
| fkie_cve-2025-47963 | No cwe for this issue in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform… | 2025-07-11T17:15:40.200 | 2026-02-13T20:17:24.307 |
| fkie_cve-2025-47732 | Deserialization of untrusted data in Microsoft Dataverse allows an authorized attacker to execute c… | 2025-05-08T23:15:52.940 | 2026-02-13T20:17:23.490 |
| fkie_cve-2025-47176 | '.../...//' in Microsoft Office Outlook allows an authorized attacker to execute code locally. | 2025-06-10T17:23:59.800 | 2026-02-13T20:17:23.027 |
| fkie_cve-2025-40905 | WWW::OAuth 1.000 and earlier for Perl uses the rand() function as the default source of entropy, wh… | 2026-02-13T00:16:03.280 | 2026-02-13T20:17:19.527 |
| fkie_cve-2025-29972 | Server-side request forgery (ssrf) in Azure Storage Resource Provider allows an authorized attacker… | 2025-05-08T23:15:52.507 | 2026-02-13T20:17:11.060 |
| fkie_cve-2025-29813 | Authentication bypass by assumed-immutable data in Azure DevOps allows an unauthorized attacker to … | 2025-05-08T23:15:52.153 | 2026-02-13T20:17:05.733 |
| fkie_cve-2025-26647 | Improper input validation in Windows Kerberos allows an authorized attacker to elevate privileges o… | 2025-04-08T18:15:48.510 | 2026-02-13T20:16:53.983 |
| fkie_cve-2025-21389 | Uncontrolled resource consumption in Windows Universal Plug and Play (UPnP) Device Host allows an u… | 2025-01-14T18:16:03.660 | 2026-02-13T20:16:41.427 |
| fkie_cve-2025-21300 | Windows Universal Plug and Play (UPnP) Device Host Denial of Service Vulnerability | 2025-01-14T18:15:52.463 | 2026-02-13T20:16:31.037 |
| fkie_cve-2025-21104 | Dell NetWorker, versions prior to 19.11.0.4 and version 19.12, contains an URL Redirection to Untru… | 2025-03-13T12:15:12.510 | 2026-02-13T20:16:15.527 |
| fkie_cve-2023-28322 | An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcur… | 2023-05-26T21:15:16.153 | 2026-02-13T20:16:15.183 |
| fkie_cve-2022-45188 | Netatalk through 3.1.13 has an afp_getappl heap-based buffer overflow resulting in code execution v… | 2022-11-12T05:15:12.907 | 2026-02-13T20:16:14.290 |
| fkie_cve-2022-43551 | A vulnerability exists in curl <7.87.0 HSTS check that could be bypassed to trick it to keep using … | 2022-12-23T15:15:15.777 | 2026-02-13T20:16:13.973 |
| fkie_cve-2022-42916 | In curl before 7.86.0, the HSTS check could be bypassed to trick it into staying with HTTP. Using i… | 2022-10-29T02:15:09.047 | 2026-02-13T20:16:13.750 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-5mc7-p6pj-r3f5 |
5.9 (4.0)
|
User-controlled header names and values containing newlines can allow injecting HTTP headers. | 2026-01-21T00:31:42Z | 2026-02-13T18:31:23Z |
| ghsa-rfj8-8392-mfcm |
7.5 (3.1)
6.9 (4.0)
|
Certain HP LaserJet Pro printers may be vulnerable to information disclosure leading to credential … | 2025-11-13T18:31:05Z | 2026-02-13T18:31:22Z |
| ghsa-2886-9536-rhhj |
4.9 (3.1)
6.9 (4.0)
|
Certain HP LaserJet Pro printers may be vulnerable to information disclosure leading to credential … | 2025-11-13T18:31:05Z | 2026-02-13T18:31:22Z |
| ghsa-x34v-6wh4-m93r |
8.0 (3.1)
|
An eval Injection vulnerability in the component invesalius/reader/dicom.py of InVesalius 3.1.99991… | 2024-08-23T21:30:42Z | 2026-02-13T18:31:21Z |
| ghsa-rr66-qxh8-8qwq |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ksmbd: use aead_request_free t… | 2025-04-18T15:31:38Z | 2026-02-13T18:31:21Z |
| ghsa-m77w-6vjw-wh2f |
7.8 (3.1)
|
A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the G… | 2023-10-03T18:30:23Z | 2026-02-13T18:31:21Z |
| ghsa-jgcm-pqcv-h934 |
6.1 (3.1)
|
Multiple Cross-Site Scripting (XSS) issues were discovered in webpagetest 3.0. The vulnerabilities … | 2022-05-17T02:54:55Z | 2026-02-13T18:31:21Z |
| ghsa-g4fr-g4v5-cfmc |
6.1 (3.1)
|
paintballrefjosh/MaNGOSWebV4 before 4.0.8 is vulnerable to a reflected XSS in install/index.php (st… | 2022-05-13T01:12:12Z | 2026-02-13T18:31:21Z |
| ghsa-f6p2-2572-4pjp |
6.1 (3.1)
|
Cross-site Scripting (XSS) - Reflected in GitHub repository phpipam/phpipam prior to 1.5.1. | 2023-02-04T15:30:32Z | 2026-02-13T18:31:21Z |
| ghsa-c6wh-345m-mrfm |
6.1 (3.1)
|
An issue was discovered in WPO-Foundation WebPageTest 3.0. The vulnerability exists due to insuffic… | 2022-05-17T02:56:29Z | 2026-02-13T18:31:21Z |
| ghsa-9x7h-v87g-j6jw |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ksmbd: add bounds check for cr… | 2025-04-16T15:34:40Z | 2026-02-13T18:31:21Z |
| ghsa-9w8w-fgjg-w972 |
9.1 (3.1)
|
I, Librarian before and including 5.11.1 is vulnerable to Server-Side Request Forgery (SSRF) due to… | 2025-01-07T21:30:55Z | 2026-02-13T18:31:21Z |
| ghsa-9cr4-jvh8-pr25 |
6.1 (3.1)
|
A Cross-Site Scripting (XSS) issue was discovered in webpagetest 3.0. The vulnerability exists due … | 2022-05-17T02:54:58Z | 2026-02-13T18:31:21Z |
| ghsa-75wh-ww84-2q6c |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix the warning from __… | 2025-05-01T15:31:44Z | 2026-02-13T18:31:21Z |
| ghsa-6v67-599p-fprc |
6.5 (3.1)
|
External control of file name or path in Windows NTLM allows an unauthorized attacker to perform sp… | 2025-03-11T18:32:17Z | 2026-02-13T18:31:21Z |
| ghsa-5mqf-9q34-g8c2 |
7.5 (3.1)
|
Directory Traversal vulnerability in Centro de Tecnologia da Informaco Renato Archer InVesalius3 v3… | 2024-09-25T18:31:20Z | 2026-02-13T18:31:21Z |
| ghsa-54jh-gr2j-w5jp |
6.1 (3.1)
|
phpIPAM 1.4.3 allows Reflected XSS via app/dashboard/widgets/ipcalc-result.php and app/tools/ip-cal… | 2022-05-24T19:05:59Z | 2026-02-13T18:31:21Z |
| ghsa-4vjp-phjj-3f57 |
10.0 (4.0)
|
Hyland OnBase versions prior to 17.0.2.87 (other versions may be affected) are vulnerable to unauth… | 2025-08-13T18:31:24Z | 2026-02-13T18:31:21Z |
| ghsa-45gw-fx24-h4pv |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ksmbd: Fix dangling pointer in… | 2025-05-01T15:31:44Z | 2026-02-13T18:31:21Z |
| ghsa-2g3f-rmh8-cj3f |
6.5 (3.1)
|
phpipam 1.6 is vulnerable to Cross Site Scripting (XSS) via /app/tools/request-ip/index.php. | 2024-07-26T18:30:36Z | 2026-02-13T18:31:21Z |
| ghsa-23wj-fq4f-57vr |
6.1 (3.1)
|
An issue was discovered in MiniCMS 1.10. There is a post.php?date= XSS vulnerability. | 2022-05-14T02:03:36Z | 2026-02-13T18:31:21Z |
| ghsa-pm44-x5x7-24c4 |
6.5 (3.1)
|
Apache Airflow Has an Authorization Bypass That Allows Unauthorized Task Log Access | 2026-02-09T12:30:22Z | 2026-02-13T18:20:21Z |
| ghsa-7ppg-37fh-vcr6 |
9.8 (3.1)
|
Milvus: Unauthenticated Access to Restful API on Metrics Port (9091) Leads to Critical System Compromise | 2026-02-11T19:49:44Z | 2026-02-13T17:17:11Z |
| ghsa-33mh-2634-fwr2 |
5.8 (3.1)
|
Faraday affected by SSRF via protocol-relative URL host override in build_exclusive_url | 2026-02-09T20:37:05Z | 2026-02-13T17:16:36Z |
| ghsa-p6pv-q7rc-g4h9 |
7.7 (4.0)
|
Unauthenticated Spree Commerce users can view completed guest orders by Order ID | 2026-02-05T21:13:24Z | 2026-02-13T17:16:21Z |
| ghsa-87fh-rc96-6fr6 |
7.7 (4.0)
|
Unauthenticated Spree Commerce users can access all guest addresses | 2026-02-05T21:19:30Z | 2026-02-13T17:16:07Z |
| ghsa-jr94-gj3h-c8rf |
5.3 (3.1)
|
Directus Vulnerable to User Enumeration via Password Reset Timing Attack | 2026-02-12T22:13:04Z | 2026-02-13T17:15:48Z |
| ghsa-wj8p-jj64-h7ff |
8.8 (3.1)
|
Arbitrary WASM Code Execution via AnnotationOverrideFlight Injection in Yoke ATC | 2026-02-12T22:06:45Z | 2026-02-13T17:15:43Z |
| ghsa-965m-v4cc-6334 |
7.5 (3.1)
|
Unauthenticated Admission Webhook Endpoints in Yoke ATC | 2026-02-12T22:06:36Z | 2026-02-13T17:15:36Z |
| ghsa-27jp-wm6q-gp25 |
6.9 (4.0)
|
sqlparse: formatting list of tuples leads to denial of service | 2026-02-13T16:16:11Z | 2026-02-13T16:16:11Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2023-287 |
4.3 (3.1)
|
Nautobot is a Network Source of Truth and Network Automation Platform built as a web appl… | nautobot | 2023-12-22T17:15:00+00:00 | 2024-11-21T14:22:55.764934+00:00 |
| pysec-2023-286 |
5.3 (3.1)
|
Nautobot is a Network Source of Truth and Network Automation Platform built as a web appl… | nautobot | 2023-12-12T23:15:00+00:00 | 2024-11-21T14:22:55.664554+00:00 |
| pysec-2023-285 |
5.4 (3.1)
|
Nautobot is a Network Source of Truth and Network Automation Platform built as a web appl… | nautobot | 2023-11-22T16:15:00+00:00 | 2024-11-21T14:22:55.567982+00:00 |
| pysec-2023-284 |
6.5 (3.1)
|
Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4. | modoboa | 2023-01-23T14:15:00+00:00 | 2024-11-21T14:22:55.160710+00:00 |
| pysec-2023-283 |
4.3 (3.1)
|
Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4. | modoboa | 2023-01-19T18:15:00+00:00 | 2024-11-21T14:22:55.105976+00:00 |
| pysec-2023-282 |
6.5 (3.1)
|
Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4. | modoboa | 2023-01-19T09:15:00+00:00 | 2024-11-21T14:22:55.051300+00:00 |
| pysec-2022-43141 |
7.5 (3.1)
|
MotionEye v0.42.1 and below allows attackers to access sensitive information via a GET re… | motioneye | 2022-03-24T17:15:00+00:00 | 2024-11-21T14:22:55.422153+00:00 |
| pysec-2012-37 |
|
The (1) EC2 and (2) OS APIs in OpenStack Compute (Nova) Folsom (2012.2), Essex (2012.1), … | nova | 2012-06-21T15:55:00Z | 2024-11-21T14:22:55.891133Z |
| pysec-2012-36 |
|
Openstack Compute (Nova) Folsom, 2012.1, and 2011.3 does not limit the number of security… | nova | 2012-06-07T19:55:00Z | 2024-11-21T14:22:55.825436Z |
| pysec-2023-281 |
8.8 (3.1)
|
Improper Neutralization of Special Elements Used in a Template Engine in GitHub repositor… | mlflow | 2023-12-12T04:15:00+00:00 | 2024-11-21T14:22:54.938745+00:00 |
| pysec-2023-280 |
7.8 (3.1)
|
OS Command Injection in GitHub repository mlflow/mlflow prior to 2.6.0. | mlflow | 2023-08-01T01:15:00+00:00 | 2024-11-21T14:22:54.880705+00:00 |
| pysec-2023-279 |
9.1 (3.1)
|
MindsDB is a SQL Server for artificial intelligence. Prior to version 23.11.4.1, the `put… | mindsdb | 2023-12-22T21:15:00+00:00 | 2024-11-21T14:22:54.549778+00:00 |
| pysec-2023-277 |
5.3 (3.1)
|
MindsDB connects artificial intelligence models to real time data. Versions prior to 23.1… | mindsdb | 2023-12-11T19:15:00+00:00 | 2024-11-21T14:22:54.391272+00:00 |
| pysec-2014-110 |
|
Multiple cross-site scripting (XSS) vulnerabilities in apps/common/templates/calculate_fo… | mayan-edms | 2014-05-27T13:55:00Z | 2024-11-21T14:22:54.240407Z |
| pysec-2024-128 |
6.1 (3.1)
|
Label Studio, an open source data labeling tool had a remote import feature allowed users… | label-studio | 2024-01-24T00:15:00+00:00 | 2024-11-21T14:22:53.406222+00:00 |
| pysec-2024-127 |
5.3 (3.1)
|
Label Studio is a popular open source data labeling tool. The vulnerability affects all v… | label-studio | 2024-01-31T17:15:00+00:00 | 2024-11-21T14:22:53.294472+00:00 |
| pysec-2024-126 |
5.4 (3.1)
|
Label Studio is an a popular open source data labeling tool. Versions prior to 1.9.2 have… | label-studio | 2024-01-23T23:15:00+00:00 | 2024-11-21T14:22:53.235341+00:00 |
| pysec-2023-275 |
7.5 (3.1)
|
Label Studio is an open source data labeling tool. In all current versions of Label Studi… | label-studio | 2023-11-13T21:15:00+00:00 | 2024-11-21T14:22:53.350760+00:00 |
| pysec-2023-274 |
8.8 (3.1)
|
Label Studio is a multi-type data labeling and annotation tool with standardized output f… | label-studio | 2023-11-09T15:15:00+00:00 | 2024-11-21T14:22:53.173192+00:00 |
| pysec-2023-273 |
8.8 (3.1)
|
Kiwi TCMS is an open source test management system. In kiwitcms/Kiwi v12.2 and prior and … | kiwitcms | 2023-04-24T22:15:00+00:00 | 2024-11-21T14:22:53.063160+00:00 |
| pysec-2022-43137 |
5.5 (3.1)
|
LIEF commit 365a16a was discovered to contain a reachable assertion abort via the compone… | lief | 2022-09-13T21:15:00+00:00 | 2024-11-21T14:22:53.842904+00:00 |
| pysec-2017-144 |
7.5 (3.1)
|
Koji 1.13.0 does not properly validate SCM paths, allowing an attacker to work around bla… | koji | 2017-10-06T17:29:00Z | 2024-11-21T14:22:53.117821Z |
| pysec-2023-272 |
4.3 (3.1)
|
The Jupyter Server provides the backend (i.e. the core services, APIs, and REST endpoints… | jupyter-server | 2023-12-04T21:15:00+00:00 | 2024-11-21T14:22:52.227754+00:00 |
| pysec-2018-151 |
8.8 (3.1)
|
An issue was discovered in Project Jupyter JupyterHub OAuthenticator 0.6.x before 0.6.2 a… | jupyterhub | 2018-02-18T03:29:00Z | 2024-11-21T14:22:52.286953Z |
| pysec-2018-150 |
7.5 (3.1)
|
Hyperledger Iroha versions v1.0_beta and v1.0.0_beta-1 are vulnerable to transaction and … | iroha | 2018-06-01T19:29:00Z | 2024-11-21T14:22:52.162008Z |
| pysec-2014-104 |
|
FreeIPA 4.0.x before 4.0.5 and 4.1.x before 4.1.1, when 2FA is enabled, allows remote att… | ipa | 2014-11-19T18:59:00Z | 2024-11-21T14:22:52.00819Z |
| pysec-2013-40 |
|
OpenStack Identity (Keystone) Grizzly 2013.1.1, when DEBUG mode logging is enabled, logs … | keystone | 2013-05-21T18:55:00Z | 2024-11-21T14:22:52.515884Z |
| pysec-2012-35 |
|
OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens… | keystone | 2012-12-18T01:55:00Z | 2024-11-21T14:22:52.404569Z |
| pysec-2012-34 |
|
OpenStack Keystone before 2012.1.1, as used in OpenStack Folsom before Folsom-1 and OpenS… | keystone | 2012-07-31T10:45:00Z | 2024-11-21T14:22:52.344123Z |
| pysec-2023-271 |
5.3 (3.1)
|
Hail is an open-source, general-purpose, Python-based data analysis tool with additional … | hail | 2023-12-29T17:16:00+00:00 | 2024-11-21T14:22:51.672042+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-4224 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.414154Z |
| gsd-2024-4223 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.423284Z |
| gsd-2024-4222 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.363699Z |
| gsd-2024-4221 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.433755Z |
| gsd-2024-4220 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.384898Z |
| gsd-2024-4219 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.359066Z |
| gsd-2024-4218 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.369587Z |
| gsd-2024-4217 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.397245Z |
| gsd-2024-4216 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.414356Z |
| gsd-2024-4215 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.378015Z |
| gsd-2024-4214 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.390841Z |
| gsd-2024-4213 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.379947Z |
| gsd-2024-4212 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.440122Z |
| gsd-2024-4211 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.414864Z |
| gsd-2024-4210 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.431459Z |
| gsd-2024-4209 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.403437Z |
| gsd-2024-4208 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.386660Z |
| gsd-2024-4207 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.376954Z |
| gsd-2024-4206 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.423074Z |
| gsd-2024-4205 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.362130Z |
| gsd-2024-4204 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.429356Z |
| gsd-2024-4203 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.393641Z |
| gsd-2024-4202 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.405198Z |
| gsd-2024-4201 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.401052Z |
| gsd-2024-4200 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.430960Z |
| gsd-2024-4199 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.422865Z |
| gsd-2024-4198 | Mattermost versions 9.6.0, 9.5.x before 9.5.3, and 8.1.x before 8.1.12 fail to fully vali… | 2024-04-26T05:02:17.420758Z |
| gsd-2024-4197 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.437306Z |
| gsd-2024-4196 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-26T05:02:17.385450Z |
| gsd-2024-4195 | Mattermost versions 9.6.0, 9.5.x before 9.5.3, and 8.1.x before 8.1.12 fail to fully vali… | 2024-04-26T05:02:17.392645Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-609 | Malicious code in euskalplantxa (npm) | 2026-01-30T15:31:12Z | 2026-02-02T05:56:27Z |
| mal-2026-608 | Malicious code in ezviz-shop-mall (npm) | 2026-01-30T13:08:07Z | 2026-02-02T05:56:27Z |
| mal-2026-605 | Malicious code in dhgshop (npm) | 2026-01-29T15:50:42Z | 2026-02-02T05:56:27Z |
| mal-2026-589 | Malicious code in dotenv-embed (npm) | 2026-01-28T14:56:54Z | 2026-02-02T05:56:27Z |
| mal-2026-569 | Malicious code in ern-picking2-api (npm) | 2026-01-28T07:48:24Z | 2026-02-02T05:56:27Z |
| mal-2026-568 | Malicious code in equimper (npm) | 2026-01-28T07:43:53Z | 2026-02-02T05:56:27Z |
| mal-2026-567 | Malicious code in debug-glitz (npm) | 2026-01-28T07:37:08Z | 2026-02-02T05:56:27Z |
| mal-2026-566 | Malicious code in debug-fmt (npm) | 2026-01-28T07:37:08Z | 2026-02-02T05:56:27Z |
| mal-2026-556 | Malicious code in digital-music-dynmsg-ribbon (npm) | 2026-01-28T06:52:12Z | 2026-02-02T05:56:27Z |
| mal-2026-551 | Malicious code in express-lists-routes (npm) | 2026-01-28T03:26:59Z | 2026-02-02T05:56:27Z |
| mal-2026-531 | Malicious code in hackerxhj (npm) | 2026-01-27T08:09:00Z | 2026-02-02T05:56:27Z |
| mal-2026-530 | Malicious code in grepleaks (npm) | 2026-01-27T08:09:32Z | 2026-02-02T05:56:27Z |
| mal-2026-529 | Malicious code in fileupload-core (npm) | 2026-01-27T07:56:49Z | 2026-02-02T05:56:27Z |
| mal-2026-521 | Malicious code in hammer-jquery (npm) | 2026-01-27T02:25:01Z | 2026-02-02T05:56:27Z |
| mal-2026-520 | Malicious code in ftm-noderpc (npm) | 2026-01-27T02:44:52Z | 2026-02-02T05:56:27Z |
| mal-2026-588 | Malicious code in chai-sub (npm) | 2026-01-28T14:53:28Z | 2026-02-02T05:56:26Z |
| mal-2026-587 | Malicious code in chai-px (npm) | 2026-01-28T14:48:04Z | 2026-02-02T05:56:26Z |
| mal-2026-586 | Malicious code in chai-chains-async (npm) | 2026-01-28T14:46:57Z | 2026-02-02T05:56:26Z |
| mal-2026-585 | Malicious code in chai-async-tests (npm) | 2026-01-28T14:56:54Z | 2026-02-02T05:56:26Z |
| mal-2026-584 | Malicious code in chai-as-extended (npm) | 2026-01-28T15:06:22Z | 2026-02-02T05:56:26Z |
| mal-2026-565 | Malicious code in converse-rn-lib (npm) | 2026-01-28T07:50:39Z | 2026-02-02T05:56:26Z |
| mal-2026-564 | Malicious code in chai-as-hashed (npm) | 2026-01-28T07:53:44Z | 2026-02-02T05:56:26Z |
| mal-2026-555 | Malicious code in acuitymobileapp (npm) | 2026-01-28T07:13:15Z | 2026-02-02T05:56:26Z |
| mal-2026-550 | Malicious code in cdnhost (npm) | 2026-01-28T03:21:37Z | 2026-02-02T05:56:26Z |
| mal-2026-549 | Malicious code in blockchain-helper-lib (npm) | 2026-01-28T03:20:46Z | 2026-02-02T05:56:26Z |
| mal-2026-508 | Malicious code in cartos-dds-ui (npm) | 2026-01-26T16:41:17Z | 2026-02-02T05:56:26Z |
| mal-2026-578 | Malicious code in @pukpuk1/somsodamsd (npm) | 2026-01-28T13:59:24Z | 2026-02-02T05:56:25Z |
| mal-2026-563 | Malicious code in @nayzak51/primebeem-db (npm) | 2026-01-28T07:27:26Z | 2026-02-02T05:56:25Z |
| mal-2026-528 | Malicious code in @shije/new-qs (npm) | 2026-01-27T07:55:42Z | 2026-02-02T05:56:25Z |
| mal-2026-527 | Malicious code in @santandergroup-uk/edgehome-components (npm) | 2026-01-27T08:16:51Z | 2026-02-02T05:56:25Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2566 | Mozilla Firefox und Firefox ESR: Mehrere Schwachstellen | 2025-11-11T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2441 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-29T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2433 | Google Cloud Platform (Envoy Proxy):: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-28T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2380 | Xen: Mehrere Schwachstellen | 2025-10-21T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2110 | LibTiff: Schwachstelle ermöglicht Codeausführung | 2025-09-22T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2085 | Red Hat OpenShift Service Mesh: Mehrere Schwachstellen | 2025-09-17T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2034 | Erlang/OTP: Mehrere Schwachstellen | 2025-09-10T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2007 | Xen: Mehrere Schwachstellen | 2025-09-09T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-1965 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-09-03T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-1654 | libTIFF (Tiffmedian, Thumbnail): Mehrere Schwachstellen | 2025-07-27T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-1205 | Golang Go: Mehrere Schwachstellen | 2025-06-01T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-0270 | cURL: Mehrere Schwachstellen | 2025-02-04T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-0259 | Red Hat Satellite: Schwachstelle ermöglicht Denial of Service | 2025-02-04T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-0131 | OpenSSL: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-01-20T23:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2023-1608 | Perl: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-06-29T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2840 | Exim: Schwachstelle ermöglicht Codeausführung | 2025-12-14T23:00:00.000+00:00 | 2026-01-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2495 | Django: Mehrere Schwachstellen ermöglichen Denial of Service und SQL-Injection | 2025-11-05T23:00:00.000+00:00 | 2026-01-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2436 | Xwayland und X.Org X11: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2025-10-28T23:00:00.000+00:00 | 2026-01-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2186 | Django: Mehrere Schwachstellen ermöglichen Manipulation von Dateien | 2025-10-01T22:00:00.000+00:00 | 2026-01-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2083 | Ruby: Schwachstelle ermöglicht Denial of Service | 2025-09-17T22:00:00.000+00:00 | 2026-01-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2825 | MediaWiki: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2025-12-10T23:00:00.000+00:00 | 2025-12-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2028 | Red Hat OpenShift Container Platform: Schwachstelle ermöglicht Codeausführung | 2025-09-10T22:00:00.000+00:00 | 2025-12-30T23:00:00.000+00:00 |
| wid-sec-w-2025-0754 | Red Hat Enterprise Linux (opentelemetry-collector): Schwachstelle ermöglicht Denial of Service | 2025-04-08T22:00:00.000+00:00 | 2025-12-30T23:00:00.000+00:00 |
| wid-sec-w-2025-0606 | Red Hat Enterprise Linux (Gatekeeper): Mehrere Schwachstellen ermöglichen Denial of Service | 2025-03-19T23:00:00.000+00:00 | 2025-12-30T23:00:00.000+00:00 |
| wid-sec-w-2025-0485 | Golang Go: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-03-04T23:00:00.000+00:00 | 2025-12-30T23:00:00.000+00:00 |
| wid-sec-w-2025-0123 | Red Hat Enterprise Linux und and OpenShift (go-git): Mehrere Schwachstellen | 2025-01-19T23:00:00.000+00:00 | 2025-12-30T23:00:00.000+00:00 |
| wid-sec-w-2024-0789 | HTTP/2: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-04-03T22:00:00.000+00:00 | 2025-12-30T23:00:00.000+00:00 |
| wid-sec-w-2023-3174 | SSH Protokoll: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-12-18T23:00:00.000+00:00 | 2025-12-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2930 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2020-07-21T22:00:00.000+00:00 | 2025-12-29T23:00:00.000+00:00 |
| wid-sec-w-2025-1744 | OpenJPEG: Schwachstelle ermöglicht Denial of Service | 2025-08-07T22:00:00.000+00:00 | 2025-12-29T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0109 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-04-08T18:53:20.624247Z | 2025-04-08T18:53:20.624247Z |
| ncsc-2025-0108 | Kwetsbaarheid verholpen in Microsoft System Center | 2025-04-08T18:52:22.999321Z | 2025-04-08T18:52:22.999321Z |
| ncsc-2025-0107 | Kwetsbaarheden verholpen in Microsoft Office | 2025-04-08T18:50:53.931519Z | 2025-04-08T18:50:53.931519Z |
| ncsc-2025-0106 | Kwetsbaarheden verholpen in Siemens producten | 2025-04-08T13:57:11.959816Z | 2025-04-08T13:57:11.959816Z |
| ncsc-2025-0101 | Kwetsbaarheid verholpen in CrushFTP | 2025-04-01T07:47:50.425419Z | 2025-04-07T14:03:59.372671Z |
| ncsc-2025-0105 | Kwetsbaarheid verholpen in Ivanti Connect Secure, Policy Secure en ZTA Gateways | 2025-04-03T14:19:37.560619Z | 2025-04-03T14:19:37.560619Z |
| ncsc-2025-0104 | Kwetsbaarheid verholpen in Cisco Enterprise Chat and Email | 2025-04-03T08:04:22.928655Z | 2025-04-03T08:04:22.928655Z |
| ncsc-2025-0103 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2025-04-01T08:42:27.059536Z | 2025-04-01T08:42:27.059536Z |
| ncsc-2025-0102 | Kwetsbaarheden verholpen in Apple macOS | 2025-04-01T08:41:09.934597Z | 2025-04-01T08:41:09.934597Z |
| ncsc-2025-0100 | Kwetsbaarheden verholpen in GitLab EE/CE | 2025-03-27T14:49:34.316050Z | 2025-03-27T14:49:34.316050Z |
| ncsc-2025-0095 | Kwetsbaarheden verholpen in Kubernetes Ingress NGINX Controller | 2025-03-25T07:13:08.093318Z | 2025-03-27T14:41:30.387171Z |
| ncsc-2025-0099 | Kwetsbaarheden verholpen in Splunk Enterprise en Splunk Cloud Platform | 2025-03-27T09:18:30.331072Z | 2025-03-27T09:18:30.331072Z |
| ncsc-2025-0098 | Kwetsbaarheid verholpen in Google Chrome | 2025-03-26T12:45:59.434386Z | 2025-03-26T12:45:59.434386Z |
| ncsc-2025-0097 | Kwetsbaarheid verholpen in NetApp SnapCenter | 2025-03-25T08:41:39.996819Z | 2025-03-25T08:41:39.996819Z |
| ncsc-2025-0096 | Kwetsbaarheid verholpen in Next.js | 2025-03-25T08:38:53.524904Z | 2025-03-25T08:38:53.524904Z |
| ncsc-2025-0094 | Kwetsbaarheid verholpen in Veeam Backup & Replication | 2025-03-20T14:10:16.806777Z | 2025-03-20T14:10:16.806777Z |
| ncsc-2025-0093 | Kwetsbaarheid verholpen in IBM InfoSphere Information Server | 2025-03-20T13:17:45.897480Z | 2025-03-20T13:17:45.897480Z |
| ncsc-2025-0092 | Kwetsbaarheden verholpen in IBM AIX | 2025-03-20T13:13:43.163579Z | 2025-03-20T13:13:43.163579Z |
| ncsc-2025-0091 | Kwetsbaarheid verholpen in Synology DiskStation Manager | 2025-03-19T15:03:23.414509Z | 2025-03-19T15:03:23.414509Z |
| ncsc-2025-0090 | Kwetsbaarheid verholpen in Synology Replication Service en Synology Unified Controller | 2025-03-19T15:02:46.122619Z | 2025-03-19T15:02:46.122619Z |
| ncsc-2025-0089 | Kwetsbaarheid verholpen in Apache Tomcat | 2025-03-17T18:36:12.978021Z | 2025-03-17T18:36:12.978021Z |
| ncsc-2025-0088 | Kwetsbaarheden verholpen in Autodesk AutoCAD | 2025-03-14T10:10:13.263645Z | 2025-03-14T10:10:13.263645Z |
| ncsc-2025-0087 | Kwetsbaarheden verholpen in GitLab | 2025-03-14T09:14:59.775984Z | 2025-03-14T09:14:59.775984Z |
| ncsc-2025-0086 | Kwetsbaarheid verholpen in Apple iOS, iPadOS, macOS Sequoia, visionOS en Safari | 2025-03-12T13:48:59.223945Z | 2025-03-12T13:48:59.223945Z |
| ncsc-2025-0085 | Kwetsbaarheid verholpen in Ivanti Secure Access Client | 2025-03-12T11:00:45.614633Z | 2025-03-12T11:00:45.614633Z |
| ncsc-2025-0084 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2025-03-12T10:56:00.883114Z | 2025-03-12T10:56:00.883114Z |
| ncsc-2025-0083 | Kwetsbaarheden verholpen in Fortinet FortiSandbox | 2025-03-12T10:51:18.487649Z | 2025-03-12T10:51:18.487649Z |
| ncsc-2025-0082 | Kwetsbaarheden verholpen in FortiOS, FortiProxy, FortiPAM, FortiSRA en FortiWeb. | 2025-03-12T10:46:38.451715Z | 2025-03-12T10:46:38.451715Z |
| ncsc-2025-0081 | Kwetsbaarheden verholpen in Microsoft Azure | 2025-03-11T18:45:19.628300Z | 2025-03-11T18:45:19.628300Z |
| ncsc-2025-0080 | Kwetsbaarheden verholpen in Microsoft Office | 2025-03-11T18:44:43.336447Z | 2025-03-11T18:44:43.336447Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-968170 | SSA-968170: Remote Code Execution Vulnerability in SIMATIC STEP 7 V5.x and Derived Products | 2023-06-13T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-953710 | SSA-953710: Vulnerabilities in the Network Communication Stack in Desigo Fire Safety UL and Cerberus PRO UL Fire Protection Systems | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-925850 | SSA-925850: Improper Access Control in Polarion ALM | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-923361 | SSA-923361: MODEL File Parsing Vulnerability in Tecnomatix Plant Simulation before V2302.0011 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-916916 | SSA-916916: Security Vulnerabilities Fixed in RUGGEDCOM CROSSBOW V5.5 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-871717 | SSA-871717: Multiple Vulnerabilities in Polarion ALM | 2024-02-13T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-665034 | SSA-665034: Vulnerability in Nozomi Guardian/CMC before 23.3.0 on RUGGEDCOM APE1808 devices | 2024-02-13T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-661579 | SSA-661579: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-647455 | SSA-647455: Multiple Vulnerabilities in Nozomi Guardian/CMC before 22.6.2 on RUGGEDCOM APE1808 devices | 2023-10-10T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-592380 | SSA-592380: Denial of Service Vulnerability in SIMATIC S7-1500 CPUs and related products | 2023-12-12T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-589937 | SSA-589937: Multiple Memory Corruption Vulnerabilities in Solid Edge | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-489698 | SSA-489698: X_T File Parsing Vulnerability in Parasolid | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-382651 | SSA-382651: File Parsing Vulnerability in Solid Edge | 2024-03-12T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-292063 | SSA-292063: Multiple Vulnerabilities in Nozomi Guardian/CMC before 22.6.3 and 23.1.0 on RUGGEDCOM APE1808 devices | 2023-11-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-292022 | SSA-292022: Vulnerability in Nozomi Guardian/CMC before 23.4.1 on RUGGEDCOM APE1808 devices | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-273900 | SSA-273900: Multiple Vulnerabilities in SIMATIC CN 4100 before V3.0 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-258494 | SSA-258494: Stack Overflow Vulnerability in Simcenter Nastran before 2406.90 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-240541 | SSA-240541: WIBU Systems CodeMeter Heap Buffer Overflow Vulnerability in Industrial Products | 2023-09-12T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-225840 | SSA-225840: Vulnerabilities in the Network Communication Stack in Sinteso EN and Cerberus PRO EN Fire Protection Systems | 2024-03-12T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-046364 | SSA-046364: X_T File Parsing Vulnerabilities in Parasolid | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-999588 | SSA-999588: Multiple Vulnerabilities in User Management Component (UMC) Before V2.11.2 | 2023-12-12T00:00:00Z | 2025-01-14T00:00:00Z |
| SSA-976324 | SSA-976324: Multiple IGS File Parsing Vulnerabilities in PS/IGES Parasolid Translator Component before V27.1.215 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-968170 | SSA-968170: Remote Code Execution Vulnerability in SIMATIC STEP 7 V5.x and Derived Products | 2023-06-13T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-962515 | SSA-962515: Out of Bounds Read Vulnerability in Industrial Products | 2024-05-14T00:00:00Z | 2024-12-10T00:00:00Z |
| SSA-953710 | SSA-953710: Vulnerabilities in the Network Communication Stack in Desigo Fire Safety UL and Cerberus PRO UL Fire Protection Systems | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-935500 | SSA-935500: Denial of Service Vulnerability in FTP Server of Nucleus RTOS based APOGEE, TALON and Desigo PXC/PXM Products | 2022-10-11T00:00:00Z | 2025-05-13T00:00:00Z |
| SSA-925850 | SSA-925850: Improper Access Control in Polarion ALM | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-923361 | SSA-923361: MODEL File Parsing Vulnerability in Tecnomatix Plant Simulation before V2302.0011 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-916916 | SSA-916916: Security Vulnerabilities Fixed in RUGGEDCOM CROSSBOW V5.5 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-871717 | SSA-871717: Multiple Vulnerabilities in Polarion ALM | 2024-02-13T00:00:00Z | 2024-05-14T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:19566 | Red Hat Security Advisory: osbuild-composer security update | 2025-11-04T04:48:55+00:00 | 2026-02-16T01:30:42+00:00 |
| rhsa-2025:19306 | Red Hat Security Advisory: OpenShift Container Platform 4.15.59 bug fix and security update | 2025-11-06T11:55:24+00:00 | 2026-02-16T01:30:42+00:00 |
| rhsa-2025:1849 | Red Hat Security Advisory: RHTAS 1.1.1 - Red Hat Trusted Artifact Signer Release | 2025-02-25T15:47:48+00:00 | 2026-02-16T01:30:40+00:00 |
| rhsa-2025:1848 | Red Hat Security Advisory: RHTAS 1.1.1 - Red Hat Trusted Artifact Signer Release | 2025-02-25T15:47:37+00:00 | 2026-02-16T01:30:40+00:00 |
| rhsa-2025:1847 | Red Hat Security Advisory: RHTAS 1.1.1 - Red Hat Trusted Artifact Signer Release | 2025-02-25T15:45:17+00:00 | 2026-02-16T01:30:37+00:00 |
| rhsa-2025:1845 | Red Hat Security Advisory: RHTAS 1.1.1 - Red Hat Trusted Artifact Signer Release | 2025-02-25T15:43:03+00:00 | 2026-02-16T01:30:37+00:00 |
| rhsa-2025:1841 | Red Hat Security Advisory: RHTAS 1.1.1 - Red Hat Trusted Artifact Signer Release | 2025-02-25T15:38:58+00:00 | 2026-02-16T01:30:35+00:00 |
| rhsa-2025:1829 | Red Hat Security Advisory: RHODF-4.16-RHEL-9 security update | 2025-02-25T09:15:15+00:00 | 2026-02-16T01:30:35+00:00 |
| rhsa-2025:18242 | Red Hat Security Advisory: OpenShift Container Platform 4.13.61 security and extras update | 2025-10-23T02:52:48+00:00 | 2026-02-16T01:30:33+00:00 |
| rhsa-2025:18241 | Red Hat Security Advisory: OpenShift Container Platform 4.13.61 bug fix and security update | 2025-10-23T03:23:41+00:00 | 2026-02-16T01:30:32+00:00 |
| rhsa-2025:1824 | Red Hat Security Advisory: RHODF-4.17-RHEL-9 security update | 2025-02-25T07:50:02+00:00 | 2026-02-16T01:30:30+00:00 |
| rhsa-2025:17690 | Red Hat Security Advisory: OpenShift Container Platform 4.16.50 bug fix and security update | 2025-10-15T07:45:25+00:00 | 2026-02-16T01:30:28+00:00 |
| rhsa-2025:17671 | Red Hat Security Advisory: OpenShift Container Platform 4.12.81 bug fix and security update | 2025-10-16T10:07:40+00:00 | 2026-02-16T01:30:25+00:00 |
| rhsa-2025:17657 | Red Hat Security Advisory: OpenShift Container Platform 4.18.26 bug fix and security update | 2025-10-15T14:07:50+00:00 | 2026-02-16T01:30:23+00:00 |
| rhsa-2025:17232 | Red Hat Security Advisory: OpenShift Container Platform 4.17.41 bug fix and security update | 2025-10-08T15:52:57+00:00 | 2026-02-16T01:30:19+00:00 |
| rhsa-2025:1710 | Red Hat Security Advisory: OpenShift Container Platform 4.15.46 security and extras update | 2025-02-27T00:58:32+00:00 | 2026-02-16T01:30:16+00:00 |
| rhsa-2025:16595 | Red Hat Security Advisory: VolSync v0.13 security fixes and container updates | 2025-09-24T15:33:41+00:00 | 2026-02-16T01:30:14+00:00 |
| rhsa-2025:16165 | Red Hat Security Advisory: OpenShift Container Platform 4.14.57 bug fix and security update | 2025-09-25T04:42:04+00:00 | 2026-02-16T01:30:13+00:00 |
| rhsa-2025:16160 | Red Hat Security Advisory: OpenShift Container Platform 4.15.58 bug fix and security update | 2025-09-25T08:35:24+00:00 | 2026-02-16T01:30:06+00:00 |
| rhsa-2025:15872 | Red Hat Security Advisory: VolSync v0.12 security fixes and container updates | 2025-09-15T21:56:29+00:00 | 2026-02-16T01:30:04+00:00 |
| rhsa-2025:15680 | Red Hat Security Advisory: OpenShift Container Platform 4.16.48 bug fix and security update | 2025-09-17T11:15:03+00:00 | 2026-02-16T01:30:04+00:00 |
| rhsa-2025:15673 | Red Hat Security Advisory: OpenShift Container Platform 4.13.60 bug fix and security update | 2025-09-18T04:52:06+00:00 | 2026-02-16T01:30:00+00:00 |
| rhsa-2025:15332 | Red Hat Security Advisory: OpenShift Container Platform 4.12.80 bug fix and security update | 2025-09-11T10:37:17+00:00 | 2026-02-16T01:30:00+00:00 |
| rhsa-2025:14859 | Red Hat Security Advisory: OpenShift Container Platform 4.16.47 bug fix and security update | 2025-09-04T13:50:12+00:00 | 2026-02-16T01:29:47+00:00 |
| rhsa-2025:14855 | Red Hat Security Advisory: OpenShift Container Platform 4.14.56 bug fix and security update | 2025-09-04T04:22:43+00:00 | 2026-02-16T01:29:43+00:00 |
| rhsa-2025:14820 | Red Hat Security Advisory: OpenShift Container Platform 4.18.23 bug fix and security update | 2025-09-04T14:47:49+00:00 | 2026-02-16T01:29:33+00:00 |
| rhsa-2025:1468 | Red Hat Security Advisory: ACS 4.4 enhancement and security update | 2025-02-13T18:14:31+00:00 | 2026-02-16T01:29:29+00:00 |
| rhsa-2025:1451 | Red Hat Security Advisory: OpenShift Container Platform 4.14.48 security update | 2025-02-19T23:10:54+00:00 | 2026-02-16T01:29:26+00:00 |
| rhsa-2025:1448 | Red Hat Security Advisory: RHOAI 2.17.0 - Red Hat OpenShift AI | 2025-02-13T15:51:37+00:00 | 2026-02-16T01:29:24+00:00 |
| rhsa-2025:14048 | Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 10.19 product release | 2025-08-18T21:34:48+00:00 | 2026-02-16T01:29:23+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-266-17 | Siemens SINEC Traffic Analyzer | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-21 | Siemens BFCClient | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-20 | Siemens RUGGEDCOM ROX II | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-19 | Siemens SINUMERIK | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-17 | Siemens SINEC Traffic Analyzer | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-16 | Siemens SICAM Q100/Q200 | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-15 | Siemens SINEC OS | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-14 | Siemens RUGGEDCOM ROX II | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-13 | Siemens SIMATIC RTLS Locating Manager | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-12 | Siemens SIPROTEC 4 and SIPROTEC 4 Compact | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-10 | Siemens SIPROTEC 5 | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-08 | Siemens RUGGEDCOM CROSSBOW Station Access Controller | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-07 | Siemens Third-Party Components in SINEC OS | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-06 | Siemens Opcenter Quality | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-04 | Siemens Simcenter Femap | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-02 | Siemens COMOS | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-01 | Siemens SIMATIC RTLS Locating Manager | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-191-05 | Siemens TIA Project-Server and TIA Portal | 2025-07-08T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-135-07 | Siemens SIMATIC IPC RS-828A | 2025-05-13T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-044-05 | Siemens SIPROTEC 5 Devices | 2025-02-11T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-24-347-05 | Siemens Siemens Engineering Platforms | 2024-12-10T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-24-319-12 | Siemens Mendix Runtime | 2024-11-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-24-256-05 | Siemens Mendix Runtime | 2024-09-10T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-24-193-06 | Siemens RUGGEDCOM | 2024-07-09T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-24-074-08 | Siemens SCALANCE XB-200 / XC-200 / XP-200 / XF-200BA / XR-300WG Family | 2024-03-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-23-348-10 | Siemens SIMATIC S7-1500 | 2023-12-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-23-222-12 | Siemens RUGGEDCOM ROS | 2023-08-08T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-23-222-08 | Siemens RUGGEDCOM ROS Devices | 2023-08-08T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-22-314-05 | Siemens RUGGEDCOM ROS | 2022-11-08T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-22-195-18 | Siemens RUGGEDCOM ROS Code Injection | 2022-07-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-rsvp-dos-oypvgvzf | Cisco IOS and IOS XE Software Resource Reservation Protocol Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-rsvp-dos-OypvgVZf | Cisco IOS and IOS XE Software Resource Reservation Protocol Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-repacl-9exgnbpd | Cisco IOS Software on Cisco Industrial Ethernet Series Switches Access Control List Bypass Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-repacl-9eXgnBpD | Cisco IOS Software on Cisco Industrial Ethernet Series Switches Access Control List Bypass Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-pim-apbvfysj | Cisco IOS XE Software Protocol Independent Multicast Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-pim-APbVfySJ | Cisco IOS XE Software Protocol Independent Multicast Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-ios-xe-sda-edge-dos-mbcbg9k | Cisco IOS XE Software SD-Access Fabric Edge Node Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-ios-xe-sda-edge-dos-MBcbG9k | Cisco IOS XE Software SD-Access Fabric Edge Node Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-ios-webui-hfwnrgk | Cisco IOS and IOS XE Software Web UI Cross-Site Request Forgery Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-ios-webui-HfwnRgk | Cisco IOS and IOS XE Software Web UI Cross-Site Request Forgery Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-httpsrvr-dos-yozthut | Cisco IOS XE Software HTTP Server Telephony Services Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-httpsrvr-dos-yOZThut | Cisco IOS XE Software HTTP Server Telephony Services Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-dnac-ssh-e4uodasj | Cisco Catalyst Center Static SSH Host Key Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-dnac-ssh-e4uOdASj | Cisco Catalyst Center Static SSH Host Key Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-cpp-vfr-dos-nhhkggo | Cisco IOS XE Software IPv4 Fragmentation Reassembly Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-cpp-vfr-dos-nhHKGgO | Cisco IOS XE Software IPv4 Fragmentation Reassembly Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-c9800-cwa-acl-npsbhsna | Cisco IOS XE Software for Wireless Controllers CWA Pre-Authentication ACL Bypass Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-c9800-cwa-acl-nPSbHSnA | Cisco IOS XE Software for Wireless Controllers CWA Pre-Authentication ACL Bypass Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-nso-auth-bypass-qnteesp | Multiple Cisco Products Web-Based Management Interface Privilege Escalation Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-25T13:05:54+00:00 |
| cisco-sa-nso-auth-bypass-QnTEesp | Multiple Cisco Products Web-Based Management Interface Privilege Escalation Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-25T13:05:54+00:00 |
| cisco-sa-cucm-xss-9zmfhyz | Cisco Unified Communications Manager Cross-Site Scripting Vulnerability | 2024-08-21T16:00:00+00:00 | 2024-09-20T15:48:56+00:00 |
| cisco-sa-cucm-xss-9zmfHyZ | Cisco Unified Communications Manager Cross-Site Scripting Vulnerability | 2024-08-21T16:00:00+00:00 | 2024-09-20T15:48:56+00:00 |
| cisco-sa-nxos-cmd-injection-xd9ohyop | Cisco NX-OS Software CLI Command Injection Vulnerability | 2024-07-01T16:00:00+00:00 | 2024-09-17T18:05:20+00:00 |
| cisco-sa-nxos-cmd-injection-xD9OhyOP | Cisco NX-OS Software CLI Command Injection Vulnerability | 2024-07-01T16:00:00+00:00 | 2024-09-17T18:05:20+00:00 |
| cisco-sa-openssh-rce-2024 | Remote Unauthenticated Code Execution Vulnerability in OpenSSH Server (regreSSHion): July 2024 | 2024-07-02T16:00:00+00:00 | 2024-09-13T14:43:44+00:00 |
| cisco-sa-pak-mem-exhst-3ke9fefy | Cisco IOS XR Software UDP Packet Memory Exhaustion Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-pak-mem-exhst-3ke9FeFy | Cisco IOS XR Software UDP Packet Memory Exhaustion Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-l2services-2mvhdnuc | Cisco IOS XR Software Network Convergence System Denial of Service Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-l2services-2mvHdNuC | Cisco IOS XR Software Network Convergence System Denial of Service Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-isis-xehpbvne | Cisco IOS XR Software Segment Routing for Intermediate System-to-Intermediate System Denial of Service Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-38679 | media: venus: Fix OOB read due to missing payload bound check | 2025-09-02T00:00:00.000Z | 2026-01-10T01:02:21.000Z |
| msrc_cve-2025-39706 | drm/amdkfd: Destroy KFD debugfs after destroy KFD wq | 2025-09-02T00:00:00.000Z | 2026-01-09T01:10:21.000Z |
| msrc_cve-2025-39703 | net, hsr: reject HSR frame if skb can't hold tag | 2025-09-02T00:00:00.000Z | 2026-01-09T01:10:16.000Z |
| msrc_cve-2025-39702 | ipv6: sr: Fix MAC comparison to be constant-time | 2025-09-02T00:00:00.000Z | 2026-01-09T01:10:11.000Z |
| msrc_cve-2025-39697 | NFS: Fix a race when updating an existing write | 2025-09-02T00:00:00.000Z | 2026-01-09T01:10:06.000Z |
| msrc_cve-2025-39691 | fs/buffer: fix use-after-free when call bh_read() helper | 2025-09-02T00:00:00.000Z | 2026-01-09T01:09:56.000Z |
| msrc_cve-2025-39689 | ftrace: Also allocate and copy hash for reading of filter files | 2025-09-02T00:00:00.000Z | 2026-01-09T01:09:51.000Z |
| msrc_cve-2025-39683 | tracing: Limit access to parser->buffer when trace_get_user failed | 2025-09-02T00:00:00.000Z | 2026-01-09T01:09:31.000Z |
| msrc_cve-2025-39681 | x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper | 2025-09-02T00:00:00.000Z | 2026-01-09T01:09:27.000Z |
| msrc_cve-2025-39716 | parisc: Revise __get_user() to probe user read access | 2025-09-02T00:00:00.000Z | 2026-01-09T01:08:07.000Z |
| msrc_cve-2025-39693 | drm/amd/display: Avoid a NULL pointer dereference | 2025-09-02T00:00:00.000Z | 2026-01-09T01:07:51.000Z |
| msrc_cve-2025-39676 | scsi: qla4xxx: Prevent a potential error pointer dereference | 2025-09-02T00:00:00.000Z | 2026-01-09T01:07:43.000Z |
| msrc_cve-2025-39673 | ppp: fix race conditions in ppp_fill_forward_path | 2025-09-02T00:00:00.000Z | 2026-01-09T01:07:26.000Z |
| msrc_cve-2025-38699 | scsi: bfa: Double-free fix | 2025-09-02T00:00:00.000Z | 2026-01-09T01:07:17.000Z |
| msrc_cve-2024-42317 | mm/huge_memory: avoid PMD-size page cache if needed | 2024-08-02T00:00:00.000Z | 2026-01-08T14:51:05.000Z |
| msrc_cve-2024-47794 | bpf: Prevent tailcall infinite loop caused by freplace | 2025-01-02T00:00:00.000Z | 2026-01-08T14:51:00.000Z |
| msrc_cve-2025-61105 | FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the show_vty_link_info function at ospf_ext.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted OSPF packet. | 2025-10-02T00:00:00.000Z | 2026-01-08T14:50:56.000Z |
| msrc_cve-2025-61107 | FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the show_vty_ext_pref_pref_sid function at ospf_ext.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted LSA Update packet. | 2025-10-02T00:00:00.000Z | 2026-01-08T14:50:51.000Z |
| msrc_cve-2024-57898 | wifi: cfg80211: clear link ID from bitmap during link delete after clean up | 2025-01-02T00:00:00.000Z | 2026-01-08T14:50:48.000Z |
| msrc_cve-2025-61102 | FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the show_vty_ext_link_adj_sid function at ospf_ext.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted OSPF packet. | 2025-10-02T00:00:00.000Z | 2026-01-08T14:50:44.000Z |
| msrc_cve-2025-22111 | net: Remove RTNL dance for SIOCBRADDIF and SIOCBRDELIF. | 2025-04-02T00:00:00.000Z | 2026-01-08T14:50:41.000Z |
| msrc_cve-2024-57872 | scsi: ufs: pltfrm: Dellocate HBA during ufshcd_pltfrm_remove() | 2025-01-02T00:00:00.000Z | 2026-01-08T14:50:40.000Z |
| msrc_cve-2025-40102 | KVM: arm64: Prevent access to vCPU events before init | 2025-10-02T00:00:00.000Z | 2026-01-08T14:50:36.000Z |
| msrc_cve-2024-41067 | btrfs: scrub: handle RST lookup error correctly | 2024-07-01T07:00:00.000Z | 2026-01-08T14:50:33.000Z |
| msrc_cve-2025-40057 | ptp: Add a upper bound on max_vclocks | 2025-10-02T00:00:00.000Z | 2026-01-08T14:50:28.000Z |
| msrc_cve-2025-22115 | btrfs: fix block group refcount race in btrfs_create_pending_block_groups() | 2025-04-02T00:00:00.000Z | 2026-01-08T14:50:25.000Z |
| msrc_cve-2025-40075 | tcp_metrics: use dst_dev_net_rcu() | 2025-10-02T00:00:00.000Z | 2026-01-08T14:50:20.000Z |
| msrc_cve-2024-56782 | ACPI: x86: Add adev NULL check to acpi_quirk_skip_serdev_enumeration() | 2025-01-02T00:00:00.000Z | 2026-01-08T14:50:16.000Z |
| msrc_cve-2025-40065 | RISC-V: KVM: Write hgatp register with valid mode bits | 2025-10-02T00:00:00.000Z | 2026-01-08T14:50:12.000Z |
| msrc_cve-2024-56775 | drm/amd/display: Fix handling of plane refcount | 2025-01-02T00:00:00.000Z | 2026-01-08T14:50:07.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:20116-1 | Security update for rnp | 2025-11-27T12:39:03Z | 2025-11-27T12:39:03Z |
| opensuse-su-2025-20116-1 | Security update for rnp | 2025-11-27T12:39:03Z | 2025-11-27T12:39:03Z |
| opensuse-su-2025:20118-1 | Security update for gitea-tea | 2025-11-27T12:30:27Z | 2025-11-27T12:30:27Z |
| opensuse-su-2025-20118-1 | Security update for gitea-tea | 2025-11-27T12:30:27Z | 2025-11-27T12:30:27Z |
| opensuse-su-2025:20119-1 | Security update for tcpreplay | 2025-11-27T12:29:40Z | 2025-11-27T12:29:40Z |
| opensuse-su-2025-20119-1 | Security update for tcpreplay | 2025-11-27T12:29:40Z | 2025-11-27T12:29:40Z |
| opensuse-su-2025:20115-1 | Security update for pnpm | 2025-11-27T12:28:46Z | 2025-11-27T12:28:46Z |
| opensuse-su-2025-20115-1 | Security update for pnpm | 2025-11-27T12:28:46Z | 2025-11-27T12:28:46Z |
| opensuse-su-2025:20117-1 | Security update for trivy | 2025-11-27T12:27:44Z | 2025-11-27T12:27:44Z |
| opensuse-su-2025-20117-1 | Security update for trivy | 2025-11-27T12:27:44Z | 2025-11-27T12:27:44Z |
| opensuse-su-2025:20100-1 | Security update for libvirt | 2025-11-27T10:23:20Z | 2025-11-27T10:23:20Z |
| opensuse-su-2025-20100-1 | Security update for libvirt | 2025-11-27T10:23:20Z | 2025-11-27T10:23:20Z |
| opensuse-su-2025:20099-1 | Security update for xwayland | 2025-11-27T10:11:16Z | 2025-11-27T10:11:16Z |
| opensuse-su-2025-20099-1 | Security update for xwayland | 2025-11-27T10:11:16Z | 2025-11-27T10:11:16Z |
| opensuse-su-2025:15778-1 | libwireshark19-4.6.1-2.1 on GA media | 2025-11-27T00:00:00Z | 2025-11-27T00:00:00Z |
| opensuse-su-2025:15777-1 | python311-spotipy-2.25.2-1.1 on GA media | 2025-11-27T00:00:00Z | 2025-11-27T00:00:00Z |
| opensuse-su-2025:15776-1 | python311-pypdf-6.4.0-1.1 on GA media | 2025-11-27T00:00:00Z | 2025-11-27T00:00:00Z |
| opensuse-su-2025:15775-1 | opa-1.11.0-1.1 on GA media | 2025-11-27T00:00:00Z | 2025-11-27T00:00:00Z |
| opensuse-su-2025:15774-1 | netbird-0.60.3-1.1 on GA media | 2025-11-27T00:00:00Z | 2025-11-27T00:00:00Z |
| opensuse-su-2025:15773-1 | cheat-4.4.2-3.1 on GA media | 2025-11-27T00:00:00Z | 2025-11-27T00:00:00Z |
| opensuse-su-2025:20091-1 | Security update for the Linux Kernel | 2025-11-26T17:04:24Z | 2025-11-26T17:04:24Z |
| opensuse-su-2025-20091-1 | Security update for the Linux Kernel | 2025-11-26T17:04:24Z | 2025-11-26T17:04:24Z |
| opensuse-su-2025:20090-1 | Security update for curl | 2025-11-26T14:30:14Z | 2025-11-26T14:30:14Z |
| opensuse-su-2025-20090-1 | Security update for curl | 2025-11-26T14:30:14Z | 2025-11-26T14:30:14Z |
| opensuse-su-2025-20097-1 | Security update for helmfile | 2025-11-26T14:11:10Z | 2025-11-26T14:11:10Z |
| opensuse-su-2025:20089-1 | Security update for mysql-connector-java | 2025-11-26T08:12:25Z | 2025-11-26T08:12:25Z |
| opensuse-su-2025-20089-1 | Security update for mysql-connector-java | 2025-11-26T08:12:25Z | 2025-11-26T08:12:25Z |
| opensuse-su-2025:15772-1 | kubevirt-container-disk-1.6.3-1.1 on GA media | 2025-11-26T00:00:00Z | 2025-11-26T00:00:00Z |
| opensuse-su-2025:15771-1 | git-bug-0.10.1-3.1 on GA media | 2025-11-26T00:00:00Z | 2025-11-26T00:00:00Z |
| opensuse-su-2025:15770-1 | bash-git-prompt-2.7.1-4.1 on GA media | 2025-11-26T00:00:00Z | 2025-11-26T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-postgresql-2025-12818 | PostgreSQL libpq undersizes allocations, via integer wraparound | 2025-11-21T08:47:38.070Z | 2025-11-21T09:06:15.683Z |
| bit-postgresql-2025-12817 | PostgreSQL CREATE STATISTICS does not check for schema CREATE privilege | 2025-11-21T08:47:36.690Z | 2025-11-21T09:06:15.683Z |
| bit-golang-2025-58187 | Quadratic complexity when checking name constraints in crypto/x509 | 2025-11-06T12:58:22.304Z | 2025-11-21T09:06:15.683Z |
| bit-gitlab-2025-7736 | Incorrect Authorization in GitLab | 2025-11-20T09:05:14.844Z | 2025-11-21T09:06:15.683Z |
| bit-gitlab-2025-7000 | Insertion of Sensitive Information Into Sent Data in GitLab | 2025-11-21T09:04:35.128Z | 2025-11-21T09:06:15.683Z |
| bit-gitlab-2025-6945 | Improper Neutralization of Special Elements used in a Command ('Command Injection') in GitLab | 2025-11-21T09:04:31.573Z | 2025-11-21T09:06:15.683Z |
| bit-gitlab-2025-6171 | Missing Authorization in GitLab | 2025-11-21T09:04:22.209Z | 2025-11-21T09:06:15.683Z |
| bit-gitlab-2025-2615 | Insertion of Sensitive Information Into Sent Data in GitLab | 2025-11-20T09:04:09.576Z | 2025-11-21T09:06:15.683Z |
| bit-gitlab-2025-12983 | Memory Allocation with Excessive Size Value in GitLab | 2025-11-20T09:03:27.972Z | 2025-11-21T09:06:15.683Z |
| bit-gitlab-2025-11990 | Improper Handling of URL Encoding (Hex Encoding) in GitLab | 2025-11-20T09:03:19.328Z | 2025-11-20T09:06:46.640Z |
| bit-gitlab-2025-11865 | Incorrect Authorization in GitLab | 2025-11-20T09:03:10.744Z | 2025-11-20T09:06:46.640Z |
| bit-moodle-2025-62401 | Moodle: possible to bypass timer in timed assignments | 2025-11-17T23:47:50.898Z | 2025-11-18T00:06:24.423Z |
| bit-moodle-2025-62400 | Moodle: hidden group names visible to event creators | 2025-11-17T23:47:49.403Z | 2025-11-18T00:06:24.423Z |
| bit-moodle-2025-62399 | Moodle: password brute force risk when mobile/web services enabled | 2025-11-17T23:47:47.926Z | 2025-11-18T00:06:24.423Z |
| bit-moodle-2025-62398 | Moodle: possible to bypass mfa | 2025-11-17T23:47:46.528Z | 2025-11-18T00:06:24.423Z |
| bit-moodle-2025-62397 | Moodle: router produces json instead of 404 error for invalid course id | 2025-11-17T23:47:45.012Z | 2025-11-18T00:06:24.423Z |
| bit-moodle-2025-62396 | Moodle: router (r.php) could expose application directories | 2025-11-17T23:47:43.645Z | 2025-11-18T00:06:24.423Z |
| bit-moodle-2025-62395 | Moodle: external cohort search service leaks system cohort data | 2025-11-17T23:47:42.131Z | 2025-11-18T00:06:24.423Z |
| bit-moodle-2025-62394 | Moodle: quiz notifications sent to suspended participants | 2025-11-17T23:47:40.687Z | 2025-11-18T00:06:24.423Z |
| bit-moodle-2025-62393 | Moodle: course access permissions not properly checked in course_output_fragment_course_overview | 2025-11-17T23:47:39.287Z | 2025-11-18T00:06:24.423Z |
| bit-mongodb-2025-10061 | Malformed $group Query May Cause MongoDB Server to Crash | 2025-09-19T09:58:18.588Z | 2025-11-14T15:09:14.122Z |
| bit-kibana-2025-37734 | Kibana Origin Validation Error | 2025-11-14T14:40:47.948Z | 2025-11-14T15:09:14.122Z |
| bit-elk-2025-37734 | Kibana Origin Validation Error | 2025-11-14T14:38:05.480Z | 2025-11-14T15:09:14.122Z |
| bit-valkey-2025-46817 | Lua library commands may lead to integer overflow and potential RCE | 2025-10-08T08:52:36.400Z | 2025-11-13T11:23:28.166Z |
| bit-redis-2025-46817 | Lua library commands may lead to integer overflow and potential RCE | 2025-10-08T08:51:25.578Z | 2025-11-13T11:23:28.166Z |
| bit-keydb-2025-46817 | Lua library commands may lead to integer overflow and potential RCE | 2025-10-08T08:43:20.393Z | 2025-11-13T11:23:28.166Z |
| bit-discourse-2025-48954 | Discourse vulnerable to XSS via user-provided query parameter in oauth failure flow | 2025-07-01T17:44:46.702Z | 2025-11-13T11:23:28.166Z |
| bit-parse-2025-64430 | Parse Server Vulnerable to Server-Side Request Forgery (SSRF) in File Upload via URI Format | 2025-11-12T11:45:02.117Z | 2025-11-12T12:05:53.614Z |
| bit-tomcat-2025-55752 | Apache Tomcat: Directory traversal via rewrite with possible RCE if PUT is enabled | 2025-11-06T13:00:31.694Z | 2025-11-11T12:05:08.739Z |
| bit-django-2025-64459 | Potential SQL injection via _connector keyword argument in QuerySet and Q objects | 2025-11-11T11:36:39.904Z | 2025-11-11T12:05:08.739Z |
| ID | Description | Updated |
|---|---|---|
| var-200512-0299 | Heap-based buffer overflow in rsync in Mac OS X 10.4 through 10.4.5 allows remote authent… | 2024-07-23T21:40:52.289000Z |
| var-202212-2277 | An integer underflow in Organization Specific TLV was found in various versions of OpenvS… | 2024-07-23T21:40:51.741000Z |
| var-200912-0756 | The U3D implementation in Adobe Reader and Acrobat 9.x before 9.3, 8.x before 8.2 on Wind… | 2024-07-23T21:40:51.958000Z |
| var-201210-0456 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:40:50.864000Z |
| var-200712-0433 | Integer underflow in the asn1_get_string function in the SNMP back end (backend/snmp.c) f… | 2024-07-23T21:40:50.122000Z |
| var-201904-1460 | A cross-site scripting issue existed in Safari. This issue was addressed with improved UR… | 2024-07-23T21:40:45.159000Z |
| var-201806-1466 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari be… | 2024-07-23T21:40:45.074000Z |
| var-201501-0436 | The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1… | 2024-07-23T21:40:45.003000Z |
| var-200704-0226 | Apple File Protocol (AFP) Client in Apple Mac OS X 10.3.9 through 10.4.9 does not properl… | 2024-07-23T21:40:44.831000Z |
| var-201605-0465 | The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple … | 2024-07-23T21:40:43.806000Z |
| var-202010-1510 | A type confusion issue was addressed with improved memory handling. This issue is fixed i… | 2024-07-23T21:40:40.672000Z |
| var-201103-0114 | The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x be… | 2024-07-23T21:40:40.823000Z |
| var-201302-0262 | Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.… | 2024-07-23T21:40:39.972000Z |
| var-201109-0201 | Use-after-free vulnerability in the document loader in Google Chrome before 14.0.835.163 … | 2024-07-23T21:40:39.355000Z |
| var-200505-1240 | The rsvp_print function in tcpdump 3.9.1 and earlier allows remote attackers to cause a d… | 2024-07-23T21:40:35.490000Z |
| var-201912-1857 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:39:57.528000Z |
| var-202104-0752 | A memory corruption issue was addressed with improved validation. This issue is fixed in … | 2024-07-23T21:39:56.465000Z |
| var-200902-0880 | International Components for Unicode (ICU) 4.0, 3.6, and other 3.x versions, as used in A… | 2024-07-23T21:39:24.164000Z |
| var-201908-1958 | The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently l… | 2024-07-23T21:39:23.746000Z |
| var-200102-0052 | Cisco Catalyst 6000, 5000, or 4000 switches allow remote attackers to cause a denial of s… | 2024-07-23T21:39:23.577000Z |
| var-201708-0038 | The decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 al… | 2024-07-23T21:39:15.769000Z |
| var-200901-0706 | WebKit in Apple Safari before 4.0 does not prevent remote loading of local Java applets, … | 2024-07-23T21:39:10.742000Z |
| var-202112-1608 | A carefully crafted request body can cause a buffer overflow in the mod_lua multipart par… | 2024-07-23T21:38:29.659000Z |
| var-202301-1703 | The issue was addressed with improved memory handling. This issue is fixed in macOS Monte… | 2024-07-23T21:38:27.556000Z |
| var-202103-0287 | A flaw possibility of race condition and incorrect initialization of the process id was f… | 2024-07-23T21:38:27.231000Z |
| var-201011-0174 | ipp.c in cupsd in CUPS 1.4.4 and earlier does not properly allocate memory for attribute … | 2024-07-23T21:37:24.567000Z |
| var-202106-0343 | Improper isolation of shared resources in some Intel(R) Processors may allow an authentic… | 2024-07-23T21:37:23.721000Z |
| var-201506-0268 | The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before… | 2024-07-23T21:36:44.513000Z |
| var-201904-0744 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:36:28.176000Z |
| var-201606-0329 | Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/us… | 2024-07-23T21:36:28.630000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2024-000065 | "ZOZOTOWN" App for Android fails to restrict custom URL schemes properly | 2024-06-19T16:04+09:00 | 2024-06-19T16:04+09:00 |
| jvndb-2022-000029 | KOYO Electronics Screen Creator Advance2 vulnerable to authentication bypass | 2022-05-09T14:43+09:00 | 2024-06-19T16:03+09:00 |
| jvndb-2022-000028 | Multiple vulnerabilities in multiple MEIKYO ELECTRIC products | 2022-05-09T14:31+09:00 | 2024-06-19T15:55+09:00 |
| jvndb-2024-000064 | WordPress plugin "SiteGuard WP Plugin" may leak the customized path to the login page | 2024-06-19T14:25+09:00 | 2024-06-19T14:25+09:00 |
| jvndb-2022-001809 | Trend Micro Password Manager vulnerable to privilege escalation | 2022-05-24T15:27+09:00 | 2024-06-18T17:52+09:00 |
| jvndb-2022-000032 | Installer of Trend Micro Password Manager may insecurely load Dynamic Link Libraries | 2022-05-11T15:21+09:00 | 2024-06-18T17:46+09:00 |
| jvndb-2022-000039 | RevoWorks incomplete filtering of MS Office v4 macros | 2022-05-27T16:09+09:00 | 2024-06-18T16:31+09:00 |
| jvndb-2022-001948 | Multiple vulnerabilities in Trend Micro Apex One and Apex One as a Service | 2022-06-03T12:17+09:00 | 2024-06-18T16:30+09:00 |
| jvndb-2022-001931 | Multiple vulnerabilities in Fuji Electric V-SFT, V-Server and V-Server Lite | 2022-05-27T15:37+09:00 | 2024-06-18T16:28+09:00 |
| jvndb-2022-000038 | WordPress plugin "WP Statistics" vulnerable to cross-site scripting | 2022-05-24T15:00+09:00 | 2024-06-18T15:41+09:00 |
| jvndb-2022-000031 | GENEREX RCCMD vulnerable to directory traversal | 2022-05-10T15:47+09:00 | 2024-06-18T15:35+09:00 |
| jvndb-2024-000061 | Multiple vulnerabilities in Ricoh Streamline NX PC Client | 2024-06-18T14:56+09:00 | 2024-06-18T14:56+09:00 |
| jvndb-2022-001929 | Multiple vulnerabilities in Fuji Electric V-SFT | 2022-05-27T15:39+09:00 | 2024-06-18T13:44+09:00 |
| jvndb-2024-000063 | Multiple vulnerabilities in ID Link Manager and FUJITSU Software TIME CREATOR | 2024-06-18T13:43+09:00 | 2024-06-18T13:43+09:00 |
| jvndb-2022-000034 | EC-CUBE plugin "Easy Blog for EC-CUBE4" vulnerable to cross-site request forgery | 2022-05-13T16:31+09:00 | 2024-06-18T12:13+09:00 |
| jvndb-2022-000036 | Multiple vulnerabilities in Rakuten Casa | 2022-05-19T15:13+09:00 | 2024-06-18T12:09+09:00 |
| jvndb-2022-000053 | Django Extract and Trunc functions vulnerable to SQL injection | 2022-07-12T13:47+09:00 | 2024-06-18T11:57+09:00 |
| jvndb-2022-000057 | WordPress Plugin "Newsletter" vulnerable to cross-site scripting | 2022-07-25T14:30+09:00 | 2024-06-18T11:21+09:00 |
| jvndb-2022-000033 | Strapi vulnerable to cross-site scripting | 2022-05-13T16:45+09:00 | 2024-06-18T11:17+09:00 |
| jvndb-2022-000043 | SHIRASAGI vulnerable to cross-site scripting | 2022-06-09T13:31+09:00 | 2024-06-18T11:13+09:00 |
| jvndb-2022-000040 | Mobaoku-Auction & Flea Market App for iOS vulnerable to improper server certificate verification | 2022-05-27T15:48+09:00 | 2024-06-18T11:06+09:00 |
| jvndb-2022-000044 | Cisco Catalyst 2940 Series Switches vulnerable to cross-site scripting | 2022-06-14T13:46+09:00 | 2024-06-18T10:51+09:00 |
| jvndb-2022-000047 | web2py vulnerable to open redirect | 2022-06-23T14:21+09:00 | 2024-06-18T10:48+09:00 |
| jvndb-2022-000048 | L2Blocker Sensor setup screen vulnerable to authentication bypass | 2022-06-24T14:21+09:00 | 2024-06-18T10:45+09:00 |
| jvndb-2022-000041 | WordPress Plugin "Modern Events Calendar Lite" vulnerable to cross-site scripting | 2022-06-01T13:39+09:00 | 2024-06-18T10:42+09:00 |
| jvndb-2022-000042 | T&D Data Server and THERMO RECORDER DATA SERVER contain a directory traversal vulnerability. | 2022-06-01T16:12+09:00 | 2024-06-18T10:34+09:00 |
| jvndb-2022-000051 | Multiple vulnerabilities in Cybozu Garoon | 2022-07-04T14:17+09:00 | 2024-06-17T16:49+09:00 |
| jvndb-2022-000035 | Multiple vulnerabilities in Cybozu Garoon | 2022-05-16T14:25+09:00 | 2024-06-17T16:34+09:00 |
| jvndb-2024-003539 | Multiple vulnerabilities in Toshiba Tec and Oki Electric Industry MFPs | 2024-06-17T15:21+09:00 | 2024-06-17T15:21+09:00 |
| jvndb-2022-000058 | Multiple vulnerabilities in untangle | 2022-07-25T14:18+09:00 | 2024-06-17T11:03+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:20019-1 | Security update for sssd | 2026-01-02T16:58:52Z | 2026-01-02T16:58:52Z |
| suse-su-2026:20014-1 | Security update for sssd | 2026-01-02T16:58:52Z | 2026-01-02T16:58:52Z |
| suse-su-2026:0005-1 | Security update for rsync | 2026-01-02T12:30:51Z | 2026-01-02T12:30:51Z |
| suse-su-2026:20058-1 | Security update for rsync | 2026-01-02T11:13:05Z | 2026-01-02T11:13:05Z |
| suse-su-2026:20057-1 | Security update for libmicrohttpd | 2026-01-02T11:07:26Z | 2026-01-02T11:07:26Z |
| suse-ru-2026:20056-1 | Recommended update for shim | 2026-01-01T13:54:36Z | 2026-01-01T13:54:36Z |
| suse-su-2025:4539-1 | Security update for python36 | 2025-12-31T15:05:33Z | 2025-12-31T15:05:33Z |
| suse-su-2025:4538-1 | Security update for python3 | 2025-12-31T15:05:25Z | 2025-12-31T15:05:25Z |
| suse-su-2025:4536-1 | Security update for podman | 2025-12-31T10:35:17Z | 2025-12-31T10:35:17Z |
| suse-su-2026:20036-1 | Security update for dpdk | 2025-12-30T20:51:25Z | 2025-12-30T20:51:25Z |
| suse-su-2026:20037-1 | Security update for ovmf | 2025-12-30T20:33:17Z | 2025-12-30T20:33:17Z |
| suse-su-2026:20035-1 | Security update for podman | 2025-12-30T20:16:23Z | 2025-12-30T20:16:23Z |
| suse-su-2026:20055-1 | Security update for dpdk | 2025-12-30T20:05:16Z | 2025-12-30T20:05:16Z |
| suse-su-2026:20054-1 | Security update for capstone | 2025-12-30T20:03:14Z | 2025-12-30T20:03:14Z |
| suse-ru-2026:20004-1 | Recommended update for shim | 2025-12-30T16:20:45Z | 2025-12-30T16:20:45Z |
| suse-su-2025:4534-1 | Security update for dpdk22 | 2025-12-29T16:15:13Z | 2025-12-29T16:15:13Z |
| suse-su-2025:4533-1 | Security update for libpng16 | 2025-12-29T16:11:25Z | 2025-12-29T16:11:25Z |
| suse-su-2025:4532-1 | Security update for apache2-mod_auth_openidc | 2025-12-29T13:53:59Z | 2025-12-29T13:53:59Z |
| suse-su-2025:4530-1 | Security update for the Linux Kernel | 2025-12-29T10:48:23Z | 2025-12-29T10:48:23Z |
| suse-su-2025:4528-1 | Security update for webkit2gtk3 | 2025-12-26T14:52:35Z | 2025-12-26T14:52:35Z |
| suse-su-2025:4527-1 | Security update for webkit2gtk3 | 2025-12-26T14:49:08Z | 2025-12-26T14:49:08Z |
| suse-su-2025:4526-1 | Security update for buildah | 2025-12-26T12:24:16Z | 2025-12-26T12:24:16Z |
| suse-su-2025:4525-1 | Security update for gnutls | 2025-12-26T12:19:11Z | 2025-12-26T12:19:11Z |
| suse-su-2025:4523-1 | Security update for qemu | 2025-12-26T10:45:48Z | 2025-12-26T10:45:48Z |
| suse-su-2025:4522-1 | Security update for python39 | 2025-12-26T10:35:01Z | 2025-12-26T10:35:01Z |
| suse-su-2025:4521-1 | Security update for the Linux Kernel | 2025-12-24T12:42:49Z | 2025-12-24T12:42:49Z |
| suse-su-2025:4520-1 | Security update for mariadb | 2025-12-24T09:19:47Z | 2025-12-24T09:19:47Z |
| suse-su-2025:4518-1 | Security update for apache2 | 2025-12-23T19:07:45Z | 2025-12-23T19:07:45Z |
| suse-su-2025:4517-1 | Security update for the Linux Kernel | 2025-12-23T16:28:51Z | 2025-12-23T16:28:51Z |
| suse-su-2025:4516-1 | Security update for the Linux Kernel | 2025-12-23T16:27:39Z | 2025-12-23T16:27:39Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-04861 | Google Android输入验证不当漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-04860 | Google Android越界写入漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-04859 | Google Android竞争条件漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-04858 | Google Android越界写入漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-04857 | Google Android堆缓冲区溢出漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-04856 | Huawei HarmonyOS特权升级漏洞 | 2024-01-23 | 2026-01-15 |
| cnvd-2026-04855 | Huawei HarmonyOS/EMUI授权漏洞 | 2024-01-23 | 2026-01-15 |
| cnvd-2026-04854 | Huawei HarmonyOS/EMUI拒绝服务漏洞 | 2024-01-23 | 2026-01-15 |
| cnvd-2026-04853 | Huawei HarmonyOS释放后使用漏洞 | 2024-01-23 | 2026-01-15 |
| cnvd-2026-04852 | Huawei HarmonyOS越界访问漏洞 | 2024-01-23 | 2026-01-15 |
| cnvd-2026-04851 | Huawei HarmonyOS/EMUI逻辑漏洞 | 2024-02-19 | 2026-01-15 |
| cnvd-2026-04850 | Huawei HarmonyOS/EMUI越界读取漏洞 | 2024-02-19 | 2026-01-15 |
| cnvd-2026-04849 | Huawei HarmonyOS/EMUI堆栈缓冲区溢出漏洞 | 2024-02-19 | 2026-01-15 |
| cnvd-2026-04848 | Huawei HarmonyOS/EMUI堆栈缓冲区溢出漏洞(CNVD-2026-04848) | 2024-02-19 | 2026-01-15 |
| cnvd-2026-04847 | Huawei HarmonyOS/EMUI输入数据未被验证漏洞 | 2024-02-19 | 2026-01-15 |
| cnvd-2026-04139 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0413973) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04138 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0413874) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04137 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0413775) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04136 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0413676) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04135 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0413577) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04134 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0413478) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04130 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0413079) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04129 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0412980) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04128 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0412881) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04127 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0412782) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04126 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0412683) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04125 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0412584) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04124 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0412485) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04123 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0412386) | 2025-12-15 | 2026-01-15 |
| cnvd-2026-04122 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-0412288) | 2025-12-15 | 2026-01-15 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2025-AVI-1063 | Multiples vulnérabilités dans les produits Splunk | 2025-12-04T00:00:00.000000 | 2025-12-04T00:00:00.000000 |
| CERTFR-2025-AVI-1062 | Multiples vulnérabilités dans Wireshark | 2025-12-04T00:00:00.000000 | 2025-12-04T00:00:00.000000 |
| CERTFR-2025-AVI-1061 | Vulnérabilité dans PostgreSQL PgBouncer | 2025-12-04T00:00:00.000000 | 2025-12-04T00:00:00.000000 |
| CERTFR-2024-AVI-1090 | Multiples vulnérabilités dans Synacor Zimbra Collaboration | 2024-12-18T00:00:00.000000 | 2025-12-04T00:00:00.000000 |
| certfr-2025-avi-1060 | Multiples vulnérabilités dans Python | 2025-12-03T00:00:00.000000 | 2025-12-03T00:00:00.000000 |
| certfr-2025-avi-1059 | Multiples vulnérabilités dans Google Pixel | 2025-12-03T00:00:00.000000 | 2025-12-03T00:00:00.000000 |
| certfr-2025-avi-1058 | Multiples vulnérabilités dans Google Chrome | 2025-12-03T00:00:00.000000 | 2025-12-03T00:00:00.000000 |
| CERTFR-2025-AVI-1060 | Multiples vulnérabilités dans Python | 2025-12-03T00:00:00.000000 | 2025-12-03T00:00:00.000000 |
| CERTFR-2025-AVI-1059 | Multiples vulnérabilités dans Google Pixel | 2025-12-03T00:00:00.000000 | 2025-12-03T00:00:00.000000 |
| CERTFR-2025-AVI-1058 | Multiples vulnérabilités dans Google Chrome | 2025-12-03T00:00:00.000000 | 2025-12-03T00:00:00.000000 |
| certfr-2025-avi-1057 | Multiples vulnérabilités dans les produits VMware | 2025-12-02T00:00:00.000000 | 2025-12-02T00:00:00.000000 |
| certfr-2025-avi-1056 | Multiples vulnérabilités dans Google Android | 2025-12-02T00:00:00.000000 | 2025-12-02T00:00:00.000000 |
| CERTFR-2025-AVI-1057 | Multiples vulnérabilités dans les produits VMware | 2025-12-02T00:00:00.000000 | 2025-12-02T00:00:00.000000 |
| CERTFR-2025-AVI-1056 | Multiples vulnérabilités dans Google Android | 2025-12-02T00:00:00.000000 | 2025-12-02T00:00:00.000000 |
| certfr-2025-avi-1055 | Multiples vulnérabilités dans Zabbix | 2025-12-01T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| certfr-2025-avi-1054 | Multiples vulnérabilités dans les produits VMware | 2025-12-01T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| certfr-2025-avi-1053 | Vulnérabilité dans Stormshield Network VPN Client | 2025-12-01T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| certfr-2025-avi-1052 | Vulnérabilité dans Mattermost Server | 2025-12-01T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| certfr-2025-avi-0936 | Multiples vulnérabilités dans Mattermost Server | 2025-10-29T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| CERTFR-2025-AVI-1055 | Multiples vulnérabilités dans Zabbix | 2025-12-01T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| CERTFR-2025-AVI-1054 | Multiples vulnérabilités dans les produits VMware | 2025-12-01T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| CERTFR-2025-AVI-1053 | Vulnérabilité dans Stormshield Network VPN Client | 2025-12-01T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| CERTFR-2025-AVI-1052 | Vulnérabilité dans Mattermost Server | 2025-12-01T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| CERTFR-2025-AVI-0936 | Multiples vulnérabilités dans Mattermost Server | 2025-10-29T00:00:00.000000 | 2025-12-01T00:00:00.000000 |
| certfr-2025-avi-1051 | Multiples vulnérabilités dans les produits IBM | 2025-11-28T00:00:00.000000 | 2025-11-28T00:00:00.000000 |
| certfr-2025-avi-1050 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-11-28T00:00:00.000000 | 2025-11-28T00:00:00.000000 |
| certfr-2025-avi-1049 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-11-28T00:00:00.000000 | 2025-11-28T00:00:00.000000 |
| certfr-2025-avi-1048 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2025-11-28T00:00:00.000000 | 2025-11-28T00:00:00.000000 |
| certfr-2025-avi-1047 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-11-28T00:00:00.000000 | 2025-11-28T00:00:00.000000 |
| certfr-2025-avi-1046 | Multiples vulnérabilités dans les produits Moxa | 2025-11-28T00:00:00.000000 | 2025-11-28T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2014-ALE-011 | Vulnérabilité de l'implémentation Kerberos dans Microsoft Windows | 2014-11-18T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| CERTFR-2014-ALE-010 | Vulnérabilité de l'implémentation des protocoles SSL/TLS dans Microsoft Windows | 2014-11-11T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| CERTFR-2014-ALE-008 | Vulnérabilité dans Drupal | 2014-10-16T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| certfr-2014-ale-009 | Vulnérabilité dans Microsoft OLE | 2014-10-22T00:00:00.000000 | 2014-11-12T00:00:00.000000 |
| CERTFR-2014-ALE-009 | Vulnérabilité dans Microsoft OLE | 2014-10-22T00:00:00.000000 | 2014-11-12T00:00:00.000000 |
| certfr-2014-ale-007 | Vulnérabilité dans SSLv3 | 2014-10-15T00:00:00.000000 | 2014-10-15T00:00:00.000000 |
| CERTFR-2014-ALE-007 | Vulnérabilité dans SSLv3 | 2014-10-15T00:00:00.000000 | 2014-10-15T00:00:00.000000 |
| certfr-2014-ale-006 | Vulnérabilité dans GNU bash | 2014-09-25T00:00:00.000000 | 2014-09-30T00:00:00.000000 |
| CERTFR-2014-ALE-006 | Vulnérabilité dans GNU bash | 2014-09-25T00:00:00.000000 | 2014-09-30T00:00:00.000000 |
| certfr-2014-ale-003 | Vulnérabilité dans OpenSSL | 2014-04-08T00:00:00.000000 | 2014-07-30T00:00:00.000000 |
| CERTFR-2014-ALE-003 | Vulnérabilité dans OpenSSL | 2014-04-08T00:00:00.000000 | 2014-07-30T00:00:00.000000 |
| certfr-2014-ale-005 | Vulnérabilité dans Microsoft Internet Explorer | 2014-04-28T00:00:00.000000 | 2014-05-02T00:00:00.000000 |
| CERTFR-2014-ALE-005 | Vulnérabilité dans Microsoft Internet Explorer | 2014-04-28T00:00:00.000000 | 2014-05-02T00:00:00.000000 |
| certfr-2014-ale-004 | Vulnérabilité dans Apache Struts | 2014-04-25T00:00:00.000000 | 2014-04-29T00:00:00.000000 |
| CERTFR-2014-ALE-004 | Vulnérabilité dans Apache Struts | 2014-04-25T00:00:00.000000 | 2014-04-29T00:00:00.000000 |
| certfr-2014-ale-002 | Vulnérabilité dans Microsoft Word | 2014-03-25T00:00:00.000000 | 2014-04-09T00:00:00.000000 |
| CERTFR-2014-ALE-002 | Vulnérabilité dans Microsoft Word | 2014-03-25T00:00:00.000000 | 2014-04-09T00:00:00.000000 |
| certfr-2014-ale-001 | Vulnérabilité dans Microsoft Internet Explorer | 2014-02-21T00:00:00.000000 | 2014-03-12T00:00:00.000000 |
| CERTFR-2014-ALE-001 | Vulnérabilité dans Microsoft Internet Explorer | 2014-02-21T00:00:00.000000 | 2014-03-12T00:00:00.000000 |
| certa-2013-ale-008 | Vulnérabilité critique dans le noyau de Microsoft Windows | 2013-11-28T00:00:00.000000 | 2014-01-16T00:00:00.000000 |
| CERTA-2013-ALE-008 | Vulnérabilité critique dans le noyau de Microsoft Windows | 2013-11-28T00:00:00.000000 | 2014-01-16T00:00:00.000000 |
| certa-2013-ale-007 | Vulnérabilité dans un composant graphique de Microsoft | 2013-11-06T00:00:00.000000 | 2013-12-10T00:00:00.000000 |
| CERTA-2013-ALE-007 | Vulnérabilité dans un composant graphique de Microsoft | 2013-11-06T00:00:00.000000 | 2013-12-10T00:00:00.000000 |
| certa-2013-ale-006 | Vulnérabilité dans Microsoft Internet Explorer | 2013-09-18T00:00:00.000000 | 2013-10-09T00:00:00.000000 |
| CERTA-2013-ALE-006 | Vulnérabilité dans Microsoft Internet Explorer | 2013-09-18T00:00:00.000000 | 2013-10-09T00:00:00.000000 |
| certa-2005-ale-013 | Vulnérabilité dans Citrix Metaframe Presentation | 2005-10-07T00:00:00.000000 | 2013-06-06T00:00:00.000000 |
| CERTA-2005-ALE-013 | Vulnérabilité dans Citrix Metaframe Presentation | 2005-10-07T00:00:00.000000 | 2013-06-06T00:00:00.000000 |
| certa-2013-ale-005 | Vulnérabilité dans le noyau Linux | 2013-05-14T00:00:00.000000 | 2013-05-24T00:00:00.000000 |
| CERTA-2013-ALE-005 | Vulnérabilité dans le noyau Linux | 2013-05-14T00:00:00.000000 | 2013-05-24T00:00:00.000000 |
| certa-2013-ale-004 | Vulnérabilité dans Adobe ColdFusion | 2013-05-10T00:00:00.000000 | 2013-05-15T00:00:00.000000 |