Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-62215 |
7 (3.1)
|
Windows Kernel Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2025-11-11T17:59:48.205Z | 2026-02-13T20:46:14.834Z |
| CVE-2025-62214 |
6.7 (3.1)
|
Visual Studio Remote Code Execution Vulnerability |
Microsoft |
Microsoft Visual Studio 2022 version 17.14 |
2025-11-11T17:59:47.547Z | 2026-02-13T20:46:14.336Z |
| CVE-2025-62211 |
8.7 (3.1)
|
Dynamics 365 Field Service (online) Spoofing Vulnerability |
Microsoft |
Dynamics 365 Field Service (online) |
2025-11-11T17:59:46.977Z | 2026-02-13T20:46:13.682Z |
| CVE-2025-59499 |
8.8 (3.1)
|
Microsoft SQL Server Elevation of Privilege Vulnerability |
Microsoft |
Microsoft SQL Server 2016 Service Pack 3 (GDR) |
2025-11-11T17:59:46.405Z | 2026-02-13T20:46:13.033Z |
| CVE-2025-62209 |
5.5 (3.1)
|
Windows License Manager Information Disclosure Vulnerability |
Microsoft |
Windows 10 Version 1507 |
2025-11-11T17:59:45.904Z | 2026-02-13T20:46:12.519Z |
| CVE-2025-62208 |
5.5 (3.1)
|
Windows License Manager Information Disclosure Vulnerability |
Microsoft |
Windows 10 Version 1507 |
2025-11-11T17:59:45.339Z | 2026-02-13T20:46:11.869Z |
| CVE-2025-62205 |
7.8 (3.1)
|
Microsoft Office Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-11-11T17:59:44.771Z | 2026-02-13T20:46:11.279Z |
| CVE-2025-62204 |
8 (3.1)
|
Microsoft SharePoint Remote Code Execution Vulnerability |
Microsoft |
Microsoft SharePoint Enterprise Server 2016 |
2025-11-11T17:59:44.205Z | 2026-02-13T20:46:10.790Z |
| CVE-2025-62203 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-11-11T17:59:43.546Z | 2026-02-13T20:46:10.218Z |
| CVE-2025-62202 |
7.1 (3.1)
|
Microsoft Excel Information Disclosure Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-11-11T17:59:42.941Z | 2026-02-13T20:46:09.722Z |
| CVE-2025-62201 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-11-11T17:59:42.387Z | 2026-02-13T20:46:09.180Z |
| CVE-2025-62200 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-11-11T17:59:41.808Z | 2026-02-13T20:46:08.727Z |
| CVE-2025-60724 |
9.8 (3.1)
|
GDI+ Remote Code Execution Vulnerability |
Microsoft |
Microsoft Office for Android |
2025-11-11T17:59:41.177Z | 2026-02-13T20:46:08.096Z |
| CVE-2025-60723 |
6.3 (3.1)
|
DirectX Graphics Kernel Denial of Service Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2025-11-11T17:59:40.522Z | 2026-02-13T20:46:07.529Z |
| CVE-2025-60720 |
7.8 (3.1)
|
Windows Transport Driver Interface (TDI) Translation D… |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:39.877Z | 2026-02-13T20:46:06.973Z |
| CVE-2025-60718 |
7.8 (3.1)
|
Windows Administrator Protection Elevation of Privileg… |
Microsoft |
Windows 11 Version 24H2 |
2025-11-11T17:59:39.236Z | 2026-02-13T20:46:06.306Z |
| CVE-2025-60717 |
7 (3.1)
|
Windows Broadcast DVR User Service Elevation of Privil… |
Microsoft |
Windows 10 Version 1809 |
2025-11-11T17:59:38.592Z | 2026-02-13T20:46:05.691Z |
| CVE-2025-60716 |
7 (3.1)
|
DirectX Graphics Kernel Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2025-11-11T17:59:37.998Z | 2026-02-13T20:46:05.077Z |
| CVE-2025-60715 |
8 (3.1)
|
Windows Routing and Remote Access Service (RRAS) Remot… |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:37.399Z | 2026-02-13T20:46:04.432Z |
| CVE-2025-60714 |
7.8 (3.1)
|
Windows OLE Remote Code Execution Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:36.834Z | 2026-02-13T20:46:03.878Z |
| CVE-2025-60713 |
7.8 (3.1)
|
Windows Routing and Remote Access Service (RRAS) Eleva… |
Microsoft |
Windows Server 2016 |
2025-11-11T17:59:36.265Z | 2026-02-13T20:46:03.329Z |
| CVE-2025-59515 |
7 (3.1)
|
Windows Broadcast DVR User Service Elevation of Privil… |
Microsoft |
Windows 10 Version 1809 |
2025-11-11T17:59:35.615Z | 2026-02-13T20:46:02.678Z |
| CVE-2025-59514 |
7.8 (3.1)
|
Microsoft Streaming Service Proxy Elevation of Privile… |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:35.037Z | 2026-02-13T20:46:02.108Z |
| CVE-2025-47179 |
6.7 (3.1)
|
Configuration Manager Elevation of Privilege Vulnerability |
Microsoft |
Microsoft Configuration Manager |
2025-11-11T17:59:34.472Z | 2026-02-13T20:46:01.564Z |
| CVE-2025-62207 |
8.6 (3.1)
|
Azure Monitor Elevation of Privilege Vulnerability |
Microsoft |
Azure Monitor Control Service |
2025-11-20T22:18:38.189Z | 2026-02-13T20:46:00.258Z |
| CVE-2025-59240 |
5.5 (3.1)
|
Microsoft Excel Information Disclosure Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-11-11T17:59:33.945Z | 2026-02-13T20:46:00.911Z |
| CVE-2025-59245 |
9.8 (3.1)
|
Microsoft SharePoint Online Elevation of Privilege Vul… |
Microsoft |
Microsoft SharePoint Online |
2025-11-20T22:18:36.895Z | 2026-02-13T20:45:59.170Z |
| CVE-2025-49752 |
10 (3.1)
|
Azure Bastion Elevation of Privilege Vulnerability |
Microsoft |
Azure Bastion Developer |
2025-11-20T22:18:37.511Z | 2026-02-13T20:45:59.672Z |
| CVE-2025-64655 |
8.8 (3.1)
|
Dynamics OmniChannel SDK Storage Containers Elevation … |
Microsoft |
Dynamics OmniChannel SDK Storage Containers |
2025-11-20T22:18:36.195Z | 2026-02-13T20:45:58.697Z |
| CVE-2025-62452 |
8 (3.1)
|
Windows Routing and Remote Access Service (RRAS) Remot… |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:33.306Z | 2026-02-13T20:45:58.084Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2023-0676 |
2.4 (3.0)
|
Cross-site Scripting (XSS) - Reflected in phpipam/phpipam |
phpipam |
phpipam/phpipam |
2023-02-04T00:00:00.000Z | 2026-02-13T16:33:48.571Z |
| CVE-2021-35438 |
N/A
|
phpIPAM 1.4.3 allows Reflected XSS via app/dashbo… |
n/a |
n/a |
2021-06-23T14:20:08.000Z | 2026-02-13T16:31:58.716Z |
| CVE-2019-25314 |
4.8 (4.0)
5.5 (3.1)
|
Duplicate-Post 3.2.3 - Persistent Cross-Site Scripting |
Yoast |
Duplicate-Post |
2026-02-11T14:56:53.383Z | 2026-02-13T16:27:57.676Z |
| CVE-2018-15899 |
N/A
|
An issue was discovered in MiniCMS 1.10. There is… |
n/a |
n/a |
2018-08-27T04:00:00.000Z | 2026-02-13T16:28:47.267Z |
| CVE-2017-6541 |
N/A
|
Multiple Cross-Site Scripting (XSS) issues were d… |
n/a |
n/a |
2017-03-08T08:37:00.000Z | 2026-02-13T16:27:21.411Z |
| CVE-2017-6537 |
N/A
|
A Cross-Site Scripting (XSS) issue was discovered… |
n/a |
n/a |
2017-03-08T08:37:00.000Z | 2026-02-13T16:25:49.871Z |
| CVE-2017-6478 |
N/A
|
paintballrefjosh/MaNGOSWebV4 before 4.0.8 is vuln… |
n/a |
n/a |
2017-03-05T20:00:00.000Z | 2026-02-13T16:21:36.773Z |
| CVE-2017-6396 |
N/A
|
An issue was discovered in WPO-Foundation WebPage… |
n/a |
n/a |
2017-03-02T06:00:00.000Z | 2026-02-13T16:09:18.650Z |
| CVE-2025-64186 |
8.7 (3.1)
|
Evervault Go SDK: Incomplete PCR Validation in Enclave… |
evervault |
evervault-go |
2025-11-12T20:34:04.321Z | 2025-11-14T17:40:17.728Z |
| CVE-2025-23368 |
8.1 (3.1)
|
Org.wildfly.core:wildfly-elytron-integration: wildfly … |
|
|
2025-03-04T15:14:47.806Z | 2026-02-13T17:04:34.561Z |
| CVE-2025-63645 |
5.4 (3.1)
|
A stored cross-site scripting (XSS) vulnerability… |
n/a |
n/a |
2025-11-12T00:00:00.000Z | 2025-11-13T15:48:25.326Z |
| CVE-2025-64271 |
6.5 (3.1)
|
WordPress WP Plugin Manager plugin <= 1.4.7 - Cross Si… |
HasThemes |
WP Plugin Manager |
2025-11-13T09:24:30.639Z | 2026-01-20T14:28:21.446Z |
| CVE-2025-12784 |
6.9 (4.0)
|
Certain HP LaserJet Pro Printers – Potential Informati… |
HP Inc |
HP Color LaserJet MFP M478-M479 series |
2025-11-13T17:35:09.424Z | 2025-11-13T18:03:11.167Z |
| CVE-2025-12785 |
6.9 (4.0)
|
Certain HP LaserJet Pro Printers – Potential Informati… |
HP Inc |
HP Color LaserJet MFP M478-M479 series |
2025-11-13T17:38:09.461Z | 2025-11-13T18:03:55.247Z |
| CVE-2025-37161 |
7.5 (3.1)
|
Unauthenticated Remote Denial-of-Service (DoS) Vulnera… |
Hewlett Packard Enterprise (HPE) |
HPE Aruba Networking 100 Series Cellular Bridge |
2025-11-18T19:21:23.220Z | 2025-11-19T14:36:15.968Z |
| CVE-2025-37162 |
6.5 (3.1)
|
Authenticated Command Injection Vulnerability Leading … |
Hewlett Packard Enterprise (HPE) |
HPE Aruba Networking 100 Series Cellular Bridge |
2025-11-18T19:23:20.504Z | 2025-11-19T14:39:46.998Z |
| CVE-2025-15520 |
4.3 (3.1)
|
RegistrationMagic <= 6.0.7.2 - Subscriber+ Sensitive D… |
Unknown |
RegistrationMagic |
2026-02-13T06:00:07.689Z | 2026-02-13T15:18:04.762Z |
| CVE-2019-25348 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-02-12T19:02:37.107Z | 2026-02-13T15:19:50.724Z |
| CVE-2025-63226 |
5.7 (3.1)
|
The Sencore SMP100 SMP Media Platform (firmware v… |
n/a |
n/a |
2025-11-18T00:00:00.000Z | 2025-11-19T18:52:23.807Z |
| CVE-2025-66409 |
2.7 (4.0)
|
ESF-IDF has an Out-of-Bounds Read in ESP32 Bluetooth A… |
espressif |
esp-idf |
2025-12-02T18:09:03.069Z | 2025-12-02T18:46:18.126Z |
| CVE-2025-66411 |
7.8 (3.1)
|
Coder logged sensitive objects unsanitized |
coder |
coder |
2025-12-03T19:25:24.207Z | 2025-12-03T21:42:17.349Z |
| CVE-2025-66489 |
9.9 (4.0)
|
Cal.com Authentication Bypass via bad TOTP + password checks |
calcom |
cal.com |
2025-12-03T19:44:35.303Z | 2025-12-03T21:48:27.861Z |
| CVE-2025-22042 |
N/A
|
ksmbd: add bounds check for create lease context |
Linux |
Linux |
2025-04-16T14:12:03.896Z | 2025-11-03T19:41:24.487Z |
| CVE-2025-38501 |
7.5 (3.1)
|
ksmbd: limit repeated connections from clients with th… |
Linux |
Linux |
2025-08-16T05:30:09.138Z | 2025-11-04T21:10:11.398Z |
| CVE-2025-37947 |
7.8 (3.1)
|
ksmbd: prevent out-of-bounds stream writes by validati… |
Linux |
Linux |
2025-05-20T16:01:43.788Z | 2025-11-03T19:57:37.368Z |
| CVE-2025-8280 |
5.8 (3.1)
|
Contact Form 7 reCAPTCHA <= 1.2.0 - Reflected XSS via … |
Unknown |
Contact Form 7 reCAPTCHA |
2025-09-12T06:00:06.157Z | 2025-09-12T16:22:30.609Z |
| CVE-2025-37778 |
N/A
|
ksmbd: Fix dangling pointer in krb_authenticate |
Linux |
Linux |
2025-05-01T13:07:16.472Z | 2025-11-03T19:54:55.466Z |
| CVE-2025-37775 |
N/A
|
ksmbd: fix the warning from __kernel_write_iter |
Linux |
Linux |
2025-05-01T13:07:14.356Z | 2025-11-03T19:54:54.085Z |
| CVE-2025-38575 |
N/A
|
ksmbd: use aead_request_free to match aead_request_alloc |
Linux |
Linux |
2025-04-18T07:01:33.904Z | 2025-11-03T19:58:31.892Z |
| CVE-2025-46310 |
6 (3.1)
|
This issue was addressed through improved state m… |
Apple |
macOS |
2026-02-11T22:58:56.379Z | 2026-02-12T16:12:49.303Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2018-15899 | An issue was discovered in MiniCMS 1.10. There is a post.php?date= XSS vulnerability. | 2018-08-27T04:29:00.997 | 2026-02-13T17:16:08.870 |
| fkie_cve-2017-6541 | Multiple Cross-Site Scripting (XSS) issues were discovered in webpagetest 3.0. The vulnerabilities … | 2017-03-08T08:59:00.457 | 2026-02-13T17:16:08.750 |
| fkie_cve-2017-6537 | A Cross-Site Scripting (XSS) issue was discovered in webpagetest 3.0. The vulnerability exists due … | 2017-03-08T08:59:00.300 | 2026-02-13T17:16:08.623 |
| fkie_cve-2017-6478 | paintballrefjosh/MaNGOSWebV4 before 4.0.8 is vulnerable to a reflected XSS in install/index.php (st… | 2017-03-05T20:59:00.213 | 2026-02-13T17:16:08.487 |
| fkie_cve-2017-6396 | An issue was discovered in WPO-Foundation WebPageTest 3.0. The vulnerability exists due to insuffic… | 2017-03-02T06:59:00.480 | 2026-02-13T17:16:07.587 |
| fkie_cve-2025-64186 | Evervault is a payment security solution. A vulnerability was identified in the `evervault-go` SDK’… | 2025-11-12T21:15:53.727 | 2026-02-13T16:57:05.983 |
| fkie_cve-2025-23368 | A flaw was found in Wildfly Elytron integration. The component does not implement sufficient measur… | 2025-03-04T16:15:39.270 | 2026-02-13T16:43:08.830 |
| fkie_cve-2025-63645 | A stored cross-site scripting (XSS) vulnerability exists in pH7Software pH7-Social-Dating-CMS 17.9.… | 2025-11-12T22:15:49.387 | 2026-02-13T16:42:45.310 |
| fkie_cve-2025-64271 | Cross-Site Request Forgery (CSRF) vulnerability in HasThemes WP Plugin Manager wp-plugin-manager al… | 2025-11-13T10:15:52.470 | 2026-02-13T16:41:27.587 |
| fkie_cve-2025-12784 | Certain HP LaserJet Pro printers may be vulnerable to information disclosure leading to credential … | 2025-11-13T18:15:49.760 | 2026-02-13T16:38:20.467 |
| fkie_cve-2025-12785 | Certain HP LaserJet Pro printers may be vulnerable to information disclosure leading to credential … | 2025-11-13T18:15:49.960 | 2026-02-13T16:34:37.377 |
| fkie_cve-2025-37161 | A vulnerability in the web-based management interface of affected products could allow an unauthent… | 2025-11-18T20:15:46.180 | 2026-02-13T16:31:47.860 |
| fkie_cve-2025-37162 | A vulnerability in the command line interface of affected devices could allow an authenticated remo… | 2025-11-18T20:15:46.723 | 2026-02-13T16:22:59.433 |
| fkie_cve-2025-15520 | The RegistrationMagic WordPress plugin before 6.0.7.2 checks nonces but not capabilities, allowing… | 2026-02-13T06:16:10.897 | 2026-02-13T16:16:09.690 |
| fkie_cve-2019-25348 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2026-02-12T20:16:01.940 | 2026-02-13T16:16:09.530 |
| fkie_cve-2025-63226 | The Sencore SMP100 SMP Media Platform (firmware versions V4.2.160, V60.1.4, V60.1.29) is vulnerable… | 2025-11-18T20:15:47.583 | 2026-02-13T16:13:55.730 |
| fkie_cve-2025-66409 | ESF-IDF is the Espressif Internet of Things (IOT) Development Framework. In 5.5.1, 5.4.3, 5.3.4, 5.… | 2025-12-02T19:15:52.133 | 2026-02-13T16:12:30.543 |
| fkie_cve-2025-66411 | Coder allows organizations to provision remote development environments via Terraform. Prior to 2.2… | 2025-12-03T20:16:26.727 | 2026-02-13T16:09:09.850 |
| fkie_cve-2025-66489 | Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provide… | 2025-12-03T20:16:27.057 | 2026-02-13T16:03:36.057 |
| fkie_cve-2025-22042 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: add bounds check for cr… | 2025-04-16T15:15:57.593 | 2026-02-13T15:58:50.887 |
| fkie_cve-2025-38501 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: limit repeated connecti… | 2025-08-16T06:15:27.923 | 2026-02-13T15:58:02.790 |
| fkie_cve-2025-37947 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: prevent out-of-bounds s… | 2025-05-20T16:15:32.677 | 2026-02-13T15:57:44.103 |
| fkie_cve-2025-8280 | The Contact Form 7 reCAPTCHA WordPress plugin through 1.2.0 does not escape the $_SERVER['REQUEST_U… | 2025-09-12T06:15:43.660 | 2026-02-13T15:54:12.670 |
| fkie_cve-2025-37778 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: Fix dangling pointer in… | 2025-05-01T14:15:41.617 | 2026-02-13T15:52:51.533 |
| fkie_cve-2025-37775 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix the warning from __… | 2025-05-01T14:15:41.197 | 2026-02-13T15:52:21.587 |
| fkie_cve-2025-38575 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: use aead_request_free t… | 2025-04-18T07:15:43.717 | 2026-02-13T15:50:14.600 |
| fkie_cve-2025-46310 | This issue was addressed through improved state management. This issue is fixed in macOS Sequoia 15… | 2026-02-11T23:16:03.120 | 2026-02-13T15:47:47.473 |
| fkie_cve-2026-20605 | The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.7.4,… | 2026-02-11T23:16:04.210 | 2026-02-13T15:47:23.443 |
| fkie_cve-2026-20606 | This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Tahoe 26.3, … | 2026-02-11T23:16:04.310 | 2026-02-13T15:46:40.683 |
| fkie_cve-2026-20610 | This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Tahoe 26.… | 2026-02-11T23:16:04.643 | 2026-02-13T15:45:52.137 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-74vw-h65p-vr44 |
5.3 (3.1)
|
A logic issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, iOS … | 2026-02-12T00:31:05Z | 2026-02-12T21:31:26Z |
| ghsa-3p5c-6wpr-gh3w |
5.3 (3.1)
|
A logic issue was addressed with improved state management. This issue is fixed in iOS 26.3 and iPa… | 2026-02-12T00:31:05Z | 2026-02-12T21:31:26Z |
| ghsa-3993-26cm-wfhm |
4.6 (3.1)
|
An inconsistent user interface issue was addressed with improved state management. This issue is fi… | 2026-02-12T00:31:04Z | 2026-02-12T21:31:26Z |
| ghsa-26vr-h5vf-58cq |
4.6 (3.1)
|
A privacy issue was addressed by removing sensitive data. This issue is fixed in iOS 26.3 and iPadO… | 2026-02-12T00:31:05Z | 2026-02-12T21:31:26Z |
| ghsa-25q2-mm9v-fcj8 |
5.5 (3.1)
|
A privacy issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, ma… | 2026-02-12T00:31:04Z | 2026-02-12T21:31:26Z |
| ghsa-x6mf-6c4h-p75j |
4.9 (3.1)
3.6 (4.0)
|
An allocation of resources without limits or throttling vulnerability has been reported to affect F… | 2026-02-11T15:30:25Z | 2026-02-12T21:31:25Z |
| ghsa-x4qx-g5c7-vgmf |
6.5 (3.1)
4.9 (4.0)
|
An out-of-bounds read vulnerability has been reported to affect File Station 5. If a remote attacke… | 2026-02-11T15:30:25Z | 2026-02-12T21:31:25Z |
| ghsa-w6g5-6qxq-f96f |
4.9 (3.1)
3.6 (4.0)
|
An allocation of resources without limits or throttling vulnerability has been reported to affect F… | 2026-02-11T15:30:25Z | 2026-02-12T21:31:25Z |
| ghsa-rq5p-55rh-7hgc |
4.4 (3.1)
1.3 (4.0)
|
A path traversal vulnerability has been reported to affect File Station 5. If a local attacker gain… | 2026-02-11T15:30:26Z | 2026-02-12T21:31:25Z |
| ghsa-pjf9-xcq9-w388 |
6.5 (3.1)
1.3 (4.0)
|
A path traversal vulnerability has been reported to affect File Station 6. If a remote attacker gai… | 2026-02-11T15:30:26Z | 2026-02-12T21:31:25Z |
| ghsa-p94w-qfcw-pq69 |
6.5 (3.1)
1.3 (4.0)
|
An uncontrolled resource consumption vulnerability has been reported to affect File Station 5. If a… | 2026-02-11T15:30:26Z | 2026-02-12T21:31:25Z |
| ghsa-mcfq-f994-8hqg |
7.5 (3.1)
1.3 (4.0)
|
A weak authentication vulnerability has been reported to affect File Station 5. The remote attacker… | 2026-02-11T15:30:26Z | 2026-02-12T21:31:25Z |
| ghsa-h7qq-mch4-gjx3 |
7.8 (3.1)
2.0 (4.0)
|
A command injection vulnerability has been reported to affect Media Streaming add-on. If an attacke… | 2026-02-11T15:30:24Z | 2026-02-12T21:31:25Z |
| ghsa-h3fv-27fp-2c8j |
5.5 (3.1)
1.7 (4.0)
|
An out-of-bounds read vulnerability has been reported to affect Media Streaming add-on. If an attac… | 2026-02-11T15:30:24Z | 2026-02-12T21:31:25Z |
| ghsa-g4c6-xx88-2hqq |
6.5 (3.1)
5.2 (4.0)
|
A path traversal vulnerability has been reported to affect File Station 5. If a remote attacker gai… | 2026-02-11T15:30:26Z | 2026-02-12T21:31:25Z |
| ghsa-cx65-rpp3-qf6c |
5.4 (3.1)
|
A stored HTML injection vulnerability in the Recipe Notes rendering component in Mealie 3.3.1 allow… | 2026-02-11T21:30:39Z | 2026-02-12T21:31:25Z |
| ghsa-8863-jvcv-whf3 |
6.5 (3.1)
1.3 (4.0)
|
A path traversal vulnerability has been reported to affect File Station 5. If a remote attacker gai… | 2026-02-11T15:30:26Z | 2026-02-12T21:31:25Z |
| ghsa-76mg-x9r8-w496 |
4.9 (3.1)
1.2 (4.0)
|
A NULL pointer dereference vulnerability has been reported to affect File Station 5. If a remote at… | 2026-02-11T15:30:25Z | 2026-02-12T21:31:25Z |
| ghsa-682g-84mv-mcxh |
4.9 (3.1)
4.8 (4.0)
|
A path traversal vulnerability has been reported to affect File Station 5. If a remote attacker gai… | 2026-02-11T15:30:25Z | 2026-02-12T21:31:25Z |
| ghsa-59g4-3crj-9w92 |
4.4 (3.1)
1.3 (4.0)
|
A path traversal vulnerability has been reported to affect File Station 5. If a local attacker gain… | 2026-02-11T15:30:26Z | 2026-02-12T21:31:25Z |
| ghsa-3v9p-vgm5-cgm3 |
8.8 (3.1)
1.1 (4.0)
|
An improper neutralization of directives in statically saved code ('Static Code Injection') vulnera… | 2026-02-11T15:30:25Z | 2026-02-12T21:31:25Z |
| ghsa-m83h-48rr-jcrh |
8.1 (3.1)
|
SolarWinds Web Help Desk was found to be susceptible to a security control bypass vulnerability tha… | 2026-01-28T09:30:30Z | 2026-02-12T21:31:24Z |
| ghsa-m786-h9gp-8q53 |
9.8 (3.1)
|
Microsoft Configuration Manager Remote Code Execution Vulnerability | 2024-10-08T18:33:14Z | 2026-02-12T21:31:24Z |
| ghsa-vx5f-vmr6-32wf |
5.2 (4.0)
|
cap-go/capacitor-native-biometric Authentication Bypass | 2026-02-10T14:33:50Z | 2026-02-12T20:25:16Z |
| ghsa-5882-5rx9-xgxp |
10.0 (4.0)
|
Crawl4AI is Vulnerable to Remote Code Execution in Docker API via Hooks Parameter | 2026-01-16T20:59:16Z | 2026-02-12T20:09:29Z |
| ghsa-vx9w-5cx4-9796 |
8.6 (3.1)
9.2 (4.0)
|
Crawl4AI Has Local File Inclusion in Docker API via file:// URLs | 2026-01-16T20:58:51Z | 2026-02-12T20:09:06Z |
| ghsa-w7fw-mjwx-w883 |
3.7 (3.1)
|
qs's arrayLimit bypass in comma parsing allows denial of service | 2026-02-12T17:04:39Z | 2026-02-12T20:07:59Z |
| ghsa-r8w2-w357-9pjv |
9.8 (3.1)
|
XDocReport affected by a Server-Side Template Injection (SSTI) vulnerability | 2026-01-20T18:31:57Z | 2026-02-12T19:51:02Z |
| ghsa-436v-jg82-p533 |
9.8 (3.1)
|
Azure AI Language Authoring Elevation of Privilege Vulnerability can Lead to RCE | 2026-02-10T18:30:42Z | 2026-02-12T19:19:53Z |
| ghsa-pj3r-q6m4-wfcw |
8.7 (4.0)
|
Improper Access Control in an on-chip debug interface could allow a privileged attacker to enable a… | 2026-02-12T18:30:24Z | 2026-02-12T18:30:24Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2017-115 |
5.5 (3.1)
|
exiv2 0.26 contains a Stack out of bounds read in webp parser | exiv2 | 2017-11-17T22:29:00Z | 2024-11-21T14:22:45.992477Z |
| pysec-2015-36 |
|
Buffer overflow in the RiffVideo::infoTagsHandler function in riffvideo.cpp in Exiv2 0.24… | exiv2 | 2015-01-02T20:59:00Z | 2024-11-21T14:22:45.931449Z |
| pysec-2008-11 |
|
Exiv2 0.16 allows user-assisted remote attackers to cause a denial of service (divide-by-… | exiv2 | 2008-06-13T19:41:00Z | 2024-11-21T14:22:45.866207Z |
| pysec-2022-43126 |
9.8 (3.1)
|
The d8s-dates for python, as distributed on PyPI, included a potential code-execution bac… | democritus-timezones | 2022-11-07T15:15:00Z | 2024-11-21T14:22:44.991216Z |
| pysec-2022-43125 |
9.8 (3.1)
|
The d8s-python for python, as distributed on PyPI, included a potential code-execution ba… | democritus-strings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.941258Z |
| pysec-2022-43124 |
9.8 (3.1)
|
The d8s-xml for python, as distributed on PyPI, included a potential code-execution backd… | democritus-strings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.889277Z |
| pysec-2022-43123 |
9.8 (3.1)
|
The d8s-netstrings for python, as distributed on PyPI, included a potential code-executio… | democritus-strings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.834592Z |
| pysec-2022-43122 |
9.8 (3.1)
|
The d8s-grammars for python, as distributed on PyPI, included a potential code-execution … | democritus-strings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.785522Z |
| pysec-2022-43121 |
9.8 (3.1)
|
The d8s-math for python, as distributed on PyPI, included a potential code-execution back… | democritus-strings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.735083Z |
| pysec-2022-43120 |
9.8 (3.1)
|
The d8s-json for python, as distributed on PyPI, included a potential code-execution back… | democritus-strings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.684065Z |
| pysec-2022-43119 |
9.8 (3.1)
|
The d8s-archives for python, as distributed on PyPI, included a potential code-execution … | democritus-strings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.633699Z |
| pysec-2022-43118 |
9.8 (3.1)
|
The d8s-urls for python, as distributed on PyPI, included a potential code-execution back… | democritus-strings | 2022-09-19T14:15:00Z | 2024-11-21T14:22:44.584448Z |
| pysec-2022-43117 |
9.8 (3.1)
|
The d8s-pdfs for python, as distributed on PyPI, included a potential code-execution back… | democritus-networking | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.53409Z |
| pysec-2022-43116 |
9.8 (3.1)
|
The d8s-utility for python, as distributed on PyPI, included a potential code-execution b… | democritus-networking | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.483759Z |
| pysec-2022-43115 |
9.8 (3.1)
|
The d8s-ip-addresses for python, as distributed on PyPI, included a potential code-execut… | democritus-networking | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.428296Z |
| pysec-2022-43114 |
9.8 (3.1)
|
The d8s-mpeg for python, as distributed on PyPI, included a potential code-execution back… | democritus-networking | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.376649Z |
| pysec-2022-43113 |
9.8 (3.1)
|
The d8s-domains for python, as distributed on PyPI, included a potential code-execution b… | democritus-networking | 2022-09-19T15:15:00Z | 2024-11-21T14:22:44.327837Z |
| pysec-2022-43112 |
9.8 (3.1)
|
The d8s-asns for python, as distributed on PyPI, included a potential code-execution back… | democritus-networking | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.27716Z |
| pysec-2022-43111 |
9.8 (3.1)
|
The d8s-html for python, as distributed on PyPI, included a potential code-execution back… | democritus-networking | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.226888Z |
| pysec-2022-43110 |
9.8 (3.1)
|
The d8s-urls for python, as distributed on PyPI, included a potential code-execution back… | democritus-networking | 2022-09-19T15:15:00Z | 2024-11-21T14:22:44.173987Z |
| pysec-2022-43109 |
9.8 (3.1)
|
The d8s-stats for python, as distributed on PyPI, included a potential code-execution bac… | democritus-math | 2022-11-07T15:15:00Z | 2024-11-21T14:22:44.122837Z |
| pysec-2022-43108 |
9.8 (3.1)
|
The d8s-networking for python, as distributed on PyPI, included a potential code-executio… | democritus-json | 2022-11-07T15:15:00Z | 2024-11-21T14:22:44.072231Z |
| pysec-2022-43107 |
9.8 (3.1)
|
The d8s-ip-addresses for python, as distributed on PyPI, included a potential code-execut… | democritus-hypothesis | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.021497Z |
| pysec-2022-43106 |
9.8 (3.1)
|
The d8s-dicts for python, as distributed on PyPI, included a potential code-execution bac… | democritus-hypothesis | 2022-09-19T16:15:00Z | 2024-11-21T14:22:43.965654Z |
| pysec-2022-43105 |
9.8 (3.1)
|
The d8s-dates for python, as distributed on PyPI, included a potential code-execution bac… | democritus-hypothesis | 2022-09-19T15:15:00Z | 2024-11-21T14:22:43.915613Z |
| pysec-2022-43104 |
9.8 (3.1)
|
The d8s-domains for python, as distributed on PyPI, included a potential code-execution b… | democritus-hypothesis | 2022-09-19T15:15:00Z | 2024-11-21T14:22:43.865878Z |
| pysec-2022-43103 |
9.8 (3.1)
|
The d8s-uuids for python, as distributed on PyPI, included a potential code-execution bac… | democritus-hypothesis | 2022-09-19T15:15:00Z | 2024-11-21T14:22:43.817031Z |
| pysec-2022-43102 |
9.8 (3.1)
|
The d8s-urls for python 0.1.0, as distributed on PyPI, included a potential code-executio… | democritus-hypothesis | 2022-09-19T15:15:00Z | 2024-11-21T14:22:43.766564Z |
| pysec-2022-43101 |
9.8 (3.1)
|
The d8s-strings for python, as distributed on PyPI, included a potential code-execution b… | democritus-hypothesis | 2022-09-19T16:15:00Z | 2024-11-21T14:22:43.716069Z |
| pysec-2022-43100 |
9.8 (3.1)
|
The d8s-python for python, as distributed on PyPI, included a potential code-execution ba… | democritus-grammars | 2022-11-07T15:15:00Z | 2024-11-21T14:22:43.665816Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33555 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.556591Z |
| gsd-2024-33554 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.667501Z |
| gsd-2024-33553 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.544840Z |
| gsd-2024-33552 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.667300Z |
| gsd-2024-33551 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.543061Z |
| gsd-2024-33550 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.534917Z |
| gsd-2024-33549 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.667701Z |
| gsd-2024-33548 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.564663Z |
| gsd-2024-33547 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.644934Z |
| gsd-2024-33546 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.560266Z |
| gsd-2024-33545 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.604410Z |
| gsd-2024-33544 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.631414Z |
| gsd-2024-33543 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.644262Z |
| gsd-2024-33542 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.688591Z |
| gsd-2024-33541 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.555650Z |
| gsd-2024-33540 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.562741Z |
| gsd-2024-33539 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.670372Z |
| gsd-2024-33538 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.588107Z |
| gsd-2024-33537 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.572272Z |
| gsd-2024-33536 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.665589Z |
| gsd-2024-33535 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.600803Z |
| gsd-2024-33534 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.522494Z |
| gsd-2024-33533 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.580672Z |
| gsd-2024-33532 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.683477Z |
| gsd-2024-33531 | cdbattags lua-resty-jwt 0.2.3 allows attackers to bypass all JWT-parsing signature checks… | 2024-04-25T05:02:10.682199Z |
| gsd-2024-33530 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.519432Z |
| gsd-2024-33529 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.547084Z |
| gsd-2024-33528 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.614150Z |
| gsd-2024-33527 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.684742Z |
| gsd-2024-33526 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-25T05:02:10.643822Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-434 | Malicious code in weaviate-js (npm) | 2026-01-21T04:49:30Z | 2026-01-23T01:39:05Z |
| mal-2026-433 | Malicious code in wallet-adapter-react (npm) | 2026-01-21T04:37:07Z | 2026-01-23T01:39:05Z |
| mal-2026-404 | Malicious code in worldposition (npm) | 2026-01-21T04:21:35Z | 2026-01-23T01:39:05Z |
| mal-2026-403 | Malicious code in worldnormal (npm) | 2026-01-21T04:21:35Z | 2026-01-23T01:39:05Z |
| mal-2026-402 | Malicious code in vworldviewdir (npm) | 2026-01-21T04:21:35Z | 2026-01-23T01:39:05Z |
| mal-2026-373 | Malicious code in webmd-debug (npm) | 2026-01-20T06:13:03Z | 2026-01-23T01:39:05Z |
| mal-2026-372 | Malicious code in webmd-cookie (npm) | 2026-01-20T06:13:02Z | 2026-01-23T01:39:05Z |
| mal-2026-346 | Malicious code in zod-js (npm) | 2026-01-19T00:46:16Z | 2026-01-23T01:39:05Z |
| mal-2026-335 | Malicious code in wac-react-relay (npm) | 2026-01-19T00:45:11Z | 2026-01-23T01:39:05Z |
| mal-2026-466 | Malicious code in uuu8lgd (npm) | 2026-01-22T17:51:00Z | 2026-01-23T01:39:04Z |
| mal-2026-459 | Malicious code in un112 (npm) | 2026-01-22T09:55:45Z | 2026-01-23T01:39:04Z |
| mal-2026-439 | Malicious code in tv-admin-commons (npm) | 2026-01-21T07:40:29Z | 2026-01-23T01:39:04Z |
| mal-2026-438 | Malicious code in ts-tweetnacl-utils (npm) | 2026-01-21T07:37:23Z | 2026-01-23T01:39:04Z |
| mal-2026-432 | Malicious code in universal-provider (npm) | 2026-01-21T04:34:17Z | 2026-01-23T01:39:04Z |
| mal-2026-431 | Malicious code in testpkg-yilider690 (npm) | 2026-01-21T04:44:58Z | 2026-01-23T01:39:04Z |
| mal-2026-430 | Malicious code in storage-types (npm) | 2026-01-21T04:48:23Z | 2026-01-23T01:39:04Z |
| mal-2026-401 | Malicious code in victim-package-c (npm) | 2026-01-21T03:54:46Z | 2026-01-23T01:39:04Z |
| mal-2026-400 | Malicious code in victim-package-b (npm) | 2026-01-21T03:54:46Z | 2026-01-23T01:39:04Z |
| mal-2026-399 | Malicious code in torbaileys (npm) | 2026-01-21T04:11:24Z | 2026-01-23T01:39:04Z |
| mal-2026-398 | Malicious code in tor-libsignal (npm) | 2026-01-21T04:11:24Z | 2026-01-23T01:39:04Z |
| mal-2026-371 | Malicious code in theme-neutral (npm) | 2026-01-20T06:19:57Z | 2026-01-23T01:39:04Z |
| mal-2026-367 | Malicious code in uq-global-ec-uikit (npm) | 2026-01-20T04:16:09Z | 2026-01-23T01:39:04Z |
| mal-2026-366 | Malicious code in testing-package-bose (npm) | 2026-01-20T04:05:57Z | 2026-01-23T01:39:04Z |
| mal-2026-365 | Malicious code in telia-eventapi-client (npm) | 2026-01-20T04:16:08Z | 2026-01-23T01:39:04Z |
| mal-2026-349 | Malicious code in tutor_table (npm) | 2026-01-19T06:07:51Z | 2026-01-23T01:39:04Z |
| mal-2026-334 | Malicious code in viem-js (npm) | 2026-01-19T00:43:31Z | 2026-01-23T01:39:04Z |
| mal-2026-333 | Malicious code in tronweb-tool (npm) | 2026-01-19T00:34:59Z | 2026-01-23T01:39:04Z |
| mal-2026-332 | Malicious code in tailwin (npm) | 2026-01-19T00:43:31Z | 2026-01-23T01:39:04Z |
| mal-2026-324 | Malicious code in typedoc-plugin-fuel-variants (npm) | 2026-01-17T22:15:00Z | 2026-01-23T01:39:04Z |
| mal-2026-448 | Malicious code in rank253222 (npm) | 2026-01-22T07:50:51Z | 2026-01-23T01:39:03Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1157 | binutils: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-05-27T22:00:00.000+00:00 | 2025-12-02T23:00:00.000+00:00 |
| wid-sec-w-2025-1001 | Intel Prozessoren: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2025-05-12T22:00:00.000+00:00 | 2025-12-02T23:00:00.000+00:00 |
| wid-sec-w-2025-0775 | OpenSSH: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-04-09T22:00:00.000+00:00 | 2025-12-02T23:00:00.000+00:00 |
| wid-sec-w-2025-0456 | Xen: Schwachstelle ermöglicht Denial of Service | 2025-02-27T23:00:00.000+00:00 | 2025-12-02T23:00:00.000+00:00 |
| wid-sec-w-2024-0021 | X.Org X11: Mehrere Schwachstellen ermöglichen Denial of Service | 2019-08-06T22:00:00.000+00:00 | 2025-12-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2703 | Zabbix: Mehrere Schwachstellen | 2025-11-30T23:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-2701 | xwiki (XJetty): Schwachstelle ermöglicht Offenlegung von Informationen | 2025-11-30T23:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-2700 | CODESYS Control und Development System: Mehrere Schwachstellen | 2025-11-30T23:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-2636 | OpenVPN: Mehrere Schwachstellen | 2025-11-18T23:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-2533 | RedHat Multicluster Engine for Kubernetes: Schwachstelle ermöglicht Privilegieneskalation | 2025-11-09T23:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-2508 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Denial of Service | 2025-11-06T23:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-2430 | Linux Kernel: Mehrere Schwachstellen | 2025-10-27T23:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-2327 | binutils: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-16T22:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-2209 | HAProxy und HAProxy ALOHA: Schwachstelle ermöglicht Denial of Service | 2025-10-05T22:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-1719 | Red Hat Enterprise Linux (ncurses): Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-08-04T22:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-1679 | Linux Kernel: Schwachstelle ermöglicht Manipulation und Dos | 2025-07-29T22:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-1647 | binutils: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-27T22:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-1620 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-07-21T22:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-1543 | binutils: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-13T22:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-0709 | binutils: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-04-03T22:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-0372 | PostgreSQL: Schwachstelle ermöglicht SQL Injection und Codeausführung | 2025-02-13T23:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2025-0304 | binutils: Mehrere Schwachstellen | 2025-02-10T23:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2024-3475 | PostgreSQL: Mehrere Schwachstellen | 2024-11-14T23:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2024-1800 | PostgreSQL: Schwachstelle ermöglicht Privilegieneskalation | 2024-08-08T22:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2024-0335 | PostgreSQL: Schwachstelle ermöglicht Privilegieneskalation | 2024-02-08T23:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2023-2873 | PostgreSQL: Mehrere Schwachstellen | 2023-11-09T23:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2023-1882 | Linux Kernel: Mehrere Schwachstellen | 2023-07-25T22:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2023-0780 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2023-03-27T22:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2022-0417 | Red Hat OpenShift Service Mesh: Mehrere Schwachstellen | 2022-05-05T22:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2022-0235 | Red Hat Advanced Cluster Management: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2022-03-03T23:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0491 | Kwetsbaarheden verholpen in XWiki Platform | 2024-12-13T10:04:20.533908Z | 2024-12-13T10:04:20.533908Z |
| ncsc-2024-0490 | Kwetsbaarheden verholpen in GitLab | 2024-12-13T10:03:05.321565Z | 2024-12-13T10:03:05.321565Z |
| ncsc-2024-0489 | Kwetsbaarheid verholpen in Schneider Electric Modicon | 2024-12-13T09:58:33.792150Z | 2024-12-13T09:58:33.792150Z |
| ncsc-2024-0488 | Kwetsbaarheden verholpen in macOS | 2024-12-12T10:31:34.869451Z | 2024-12-12T10:31:34.869451Z |
| ncsc-2024-0487 | Kwetsbaarheden verholpen in Apple iPadOS en iOS | 2024-12-12T10:30:17.550009Z | 2024-12-12T10:30:17.550009Z |
| ncsc-2024-0486 | Kwetsbaarheden verholpen in Ivanti Cloud Security Appliance | 2024-12-11T08:58:00.974296Z | 2024-12-11T08:58:00.974296Z |
| ncsc-2024-0485 | Kwetsbaarheid verholpen in Splunk Enterprise | 2024-12-11T08:53:56.285002Z | 2024-12-11T08:53:56.285002Z |
| ncsc-2024-0483 | Kwetsbaarheden verholpen in Adobe Connect | 2024-12-11T08:46:09.788540Z | 2024-12-11T08:46:09.788540Z |
| ncsc-2024-0482 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2024-12-11T08:42:21.663200Z | 2024-12-11T08:42:21.663200Z |
| ncsc-2024-0481 | Kwetsbaarheden verholpen in Adobe Illustrator | 2024-12-11T08:37:21.228987Z | 2024-12-11T08:37:21.228987Z |
| ncsc-2024-0480 | Kwetsbaarheid verholpen in Adobe After Effects | 2024-12-11T08:34:49.812349Z | 2024-12-11T08:34:49.812349Z |
| ncsc-2024-0479 | Kwetsbaarheden verholpen in Animate | 2024-12-11T08:31:02.174506Z | 2024-12-11T08:31:02.174506Z |
| ncsc-2024-0478 | Kwetsbaarheden verholpen in Adobe InDesign Desktop | 2024-12-11T08:20:20.778758Z | 2024-12-11T08:20:20.778758Z |
| ncsc-2024-0477 | Kwetsbaarheid verholpen in Adobe Photoshop | 2024-12-11T08:17:46.923581Z | 2024-12-11T08:17:46.923581Z |
| ncsc-2024-0476 | Kwetsbaarheid verholpen in Adobe Premiere Pro | 2024-12-11T08:12:35.655333Z | 2024-12-11T08:12:35.655333Z |
| ncsc-2024-0475 | Kwetsbaarheid verholpen in Adobe Framemaker | 2024-12-11T08:06:34.387394Z | 2024-12-11T08:06:34.387394Z |
| ncsc-2024-0474 | Kwetsbaarheden verholpen in Drupal Core | 2024-12-10T19:35:37.345875Z | 2024-12-10T19:35:37.345875Z |
| ncsc-2024-0473 | Kwetsbaarheden verholpen in Siemens producten | 2024-12-10T19:34:53.515240Z | 2024-12-10T19:34:53.515240Z |
| ncsc-2024-0472 | Kwetsbaarheden verholpen in SAP producten | 2024-12-10T19:34:10.105945Z | 2024-12-10T19:34:10.105945Z |
| ncsc-2024-0471 | Kwetsbaarheden verholpen in Microsoft Office | 2024-12-10T19:33:29.415423Z | 2024-12-10T19:33:29.415423Z |
| ncsc-2024-0469 | Kwetsbaarheden verholpen in Qlik Sense Enterprise voor Windows | 2024-12-09T13:38:50.887753Z | 2024-12-09T13:38:50.887753Z |
| ncsc-2024-0468 | Kwetsbaarheden verholpen in Mitel MiCollab | 2024-12-09T13:37:33.039167Z | 2024-12-09T13:37:33.039167Z |
| ncsc-2024-0467 | Kwetsbaarheden verholpen in QNAP besturingssystemen | 2024-12-09T13:36:33.362104Z | 2024-12-09T13:36:33.362104Z |
| ncsc-2024-0466 | Kwetsbaarheden verholpen in Atlassian producten | 2024-12-06T13:05:55.904619Z | 2024-12-06T13:05:55.904619Z |
| ncsc-2024-0465 | Kwetsbaarheden verholpen in ABB ASPECT, NEXUS Series en MATRIX Series | 2024-12-06T11:49:21.695542Z | 2024-12-06T11:49:21.695542Z |
| ncsc-2024-0464 | Kwetsbaarheden verholpen in SonicWall SMA100 SSLVPN | 2024-12-06T11:48:08.461746Z | 2024-12-06T11:48:08.461746Z |
| ncsc-2024-0463 | Kwetsbaarheden verholpen in Veeam Backup & Replication | 2024-12-06T11:47:19.699742Z | 2024-12-06T11:47:19.699742Z |
| ncsc-2024-0462 | Kwetsbaarheden verholpen in Zabbix | 2024-12-02T12:51:47.361749Z | 2024-12-02T12:51:47.361749Z |
| ncsc-2024-0461 | Kwetsbaarheden verholpen in IBM Security Verify Access Appliance | 2024-12-02T10:55:14.978137Z | 2024-12-02T10:55:14.978137Z |
| ncsc-2024-0460 | Kwetsbaarheid verholpen in Zabbix | 2024-11-28T14:24:11.654121Z | 2024-11-28T14:24:11.654121Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-761844 | SSA-761844: Multiple Vulnerabilities in Control Center Server (CCS) | 2021-04-13T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-761617 | SSA-761617: Authentication Bypass and Information Disclosure Vulnerabilities in SiNVR/SiVMS Video Server | 2019-12-10T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-702935 | SSA-702935: Redfish Server Vulnerability in maxView Storage Manager | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-589891 | SSA-589891: Multiple PAR File Parsing Vulnerabilities in Solid Edge | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-583634 | SSA-583634: Command Injection Vulnerability in the CPCI85 Firmware of SICAM A8000 Devices | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-570294 | SSA-570294: Multiple Vulnerabilities in SICAM Q100 Before V2.50 | 2022-11-08T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-480095 | SSA-480095: Vulnerabilities in the Web Interface of SICAM Q100 Devices before V2.60 | 2023-12-12T00:00:00Z | 2024-01-09T00:00:00Z |
| SSA-844761 | SSA-844761: Multiple Vulnerabilities in SiNVR/SiVMS Video Server | 2020-03-10T00:00:00Z | 2024-01-09T00:00:00Z |
| SSA-794653 | SSA-794653: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| SSA-786191 | SSA-786191: Local Privilege Escalation Vulnerability in Spectrum Power 7 | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| SSA-777015 | SSA-777015: Multiple Vulnerabilities in SIMATIC CN 4100 before V2.7 | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| SSA-772220 | SSA-772220: OpenSSL Vulnerabilities in Industrial Products | 2021-07-13T00:00:00Z | 2024-01-09T00:00:00Z |
| SSA-761844 | SSA-761844: Multiple Vulnerabilities in Control Center Server (CCS) | 2021-04-13T00:00:00Z | 2024-01-09T00:00:00Z |
| SSA-761617 | SSA-761617: Authentication Bypass and Information Disclosure Vulnerabilities in SiNVR/SiVMS Video Server | 2019-12-10T00:00:00Z | 2024-01-09T00:00:00Z |
| SSA-702935 | SSA-702935: Redfish Server Vulnerability in maxView Storage Manager | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| SSA-589891 | SSA-589891: Multiple PAR File Parsing Vulnerabilities in Solid Edge | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| SSA-583634 | SSA-583634: Command Injection Vulnerability in the CPCI85 Firmware of SICAM A8000 Devices | 2024-01-09T00:00:00Z | 2024-01-09T00:00:00Z |
| SSA-570294 | SSA-570294: Multiple Vulnerabilities in SICAM Q100 Before V2.50 | 2022-11-08T00:00:00Z | 2024-01-09T00:00:00Z |
| SSA-480095 | SSA-480095: Vulnerabilities in the Web Interface of SICAM Q100 Devices before V2.60 | 2023-12-12T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-983300 | SSA-983300: Vulnerabilities in LOGO! Soft Comfort | 2021-04-13T00:00:00Z | 2023-12-12T00:00:00Z |
| ssa-892915 | SSA-892915: Multiple Denial of Service Vulnerabilities in the Webserver of Industrial Products | 2023-12-12T00:00:00Z | 2023-12-12T00:00:00Z |
| ssa-887801 | SSA-887801: Information Disclosure Vulnerability in SIMATIC STEP 7 (TIA Portal) | 2023-12-12T00:00:00Z | 2023-12-12T00:00:00Z |
| ssa-618620 | SSA-618620: Vulnerabilities in Boot Loader (U-Boot) of RUGGEDCOM ROS Devices | 2019-12-10T00:00:00Z | 2023-12-12T00:00:00Z |
| ssa-118850 | SSA-118850: Denial of Service Vulnerability in the OPC UA Implementation in SINUMERIK ONE and SINUMERIK MC | 2023-12-12T00:00:00Z | 2023-12-12T00:00:00Z |
| ssa-077170 | SSA-077170: Multiple Vulnerabilities in SINEC INS before V1.0 SP2 Update 2 | 2023-12-12T00:00:00Z | 2023-12-12T00:00:00Z |
| SSA-887801 | SSA-887801: Information Disclosure Vulnerability in SIMATIC STEP 7 (TIA Portal) | 2023-12-12T00:00:00Z | 2023-12-12T00:00:00Z |
| SSA-844582 | SSA-844582: Electromagnetic Fault Injection in LOGO! V8.3 BM Devices Results in Broken LOGO! V8.3 Product CA | 2023-12-12T00:00:00Z | 2024-10-08T00:00:00Z |
| SSA-783481 | SSA-783481: Denial-of-Service Vulnerability in LOGO! 8 BM | 2021-03-09T00:00:00Z | 2024-10-08T00:00:00Z |
| SSA-618620 | SSA-618620: Vulnerabilities in Boot Loader (U-Boot) of RUGGEDCOM ROS Devices | 2019-12-10T00:00:00Z | 2023-12-12T00:00:00Z |
| SSA-280603 | SSA-280603: Denial of Service Vulnerability in SINUMERIK ONE and SINUMERIK MC | 2023-12-12T00:00:00Z | 2024-09-10T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:1451 | Red Hat Security Advisory: OpenShift Container Platform 4.14.48 security update | 2025-02-19T23:10:54+00:00 | 2026-02-15T01:27:57+00:00 |
| rhsa-2025:1448 | Red Hat Security Advisory: RHOAI 2.17.0 - Red Hat OpenShift AI | 2025-02-13T15:51:37+00:00 | 2026-02-15T01:27:56+00:00 |
| rhsa-2025:14060 | Red Hat Security Advisory: OpenShift Container Platform 4.17.38 bug fix and security update | 2025-08-27T17:58:19+00:00 | 2026-02-15T01:27:54+00:00 |
| rhsa-2025:14048 | Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 10.19 product release | 2025-08-18T21:34:48+00:00 | 2026-02-15T01:27:54+00:00 |
| rhsa-2025:13848 | Red Hat Security Advisory: OpenShift Container Platform 4.19.9 bug fix and security update | 2025-08-19T18:53:28+00:00 | 2026-02-15T01:27:54+00:00 |
| rhsa-2025:13671 | Red Hat Security Advisory: Updated 7.1 container image is now available in the Red Hat Ecosystem Catalog | 2025-08-12T04:43:04+00:00 | 2026-02-15T01:27:54+00:00 |
| rhsa-2025:1334 | Red Hat Security Advisory: ACS 4.5 enhancement and security update | 2025-02-11T21:20:30+00:00 | 2026-02-15T01:27:52+00:00 |
| rhsa-2025:1326 | Red Hat Security Advisory: RHTAS 1.1.1 - Red Hat Trusted Artifact Signer Release | 2025-02-11T15:41:51+00:00 | 2026-02-15T01:27:52+00:00 |
| rhsa-2025:1333 | Red Hat Security Advisory: Gatekeeper v3.14.3 | 2025-02-12T17:36:57+00:00 | 2026-02-15T01:27:51+00:00 |
| rhsa-2025:1332 | Red Hat Security Advisory: Gatekeeper v3.15.3 | 2025-02-12T17:48:36+00:00 | 2026-02-15T01:27:51+00:00 |
| rhsa-2025:1331 | Red Hat Security Advisory: Gatekeeper v3.17.1 | 2025-02-12T17:47:51+00:00 | 2026-02-15T01:27:50+00:00 |
| rhsa-2025:1325 | Red Hat Security Advisory: RHTAS 1.1.1 - Red Hat Trusted Artifact Signer Release | 2025-02-11T15:41:41+00:00 | 2026-02-15T01:27:50+00:00 |
| rhsa-2025:1327 | Red Hat Security Advisory: RHTAS 1.1.1 - Red Hat Trusted Artifact Signer Release | 2025-02-11T15:44:02+00:00 | 2026-02-15T01:27:48+00:00 |
| rhsa-2025:13241 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 6.2.4 | 2025-08-06T13:12:09+00:00 | 2026-02-15T01:27:46+00:00 |
| rhsa-2025:1324 | Red Hat Security Advisory: RHTAS 1.1.1 - Red Hat Trusted Artifact Signer Release | 2025-02-11T15:39:16+00:00 | 2026-02-15T01:27:45+00:00 |
| rhsa-2025:1322 | Red Hat Security Advisory: RHTAS 1.1.1 - Red Hat Trusted Artifact Signer Release | 2025-02-11T15:37:40+00:00 | 2026-02-15T01:27:45+00:00 |
| rhsa-2025:12891 | Red Hat Security Advisory: Red Hat multicluster global hub 1.4.2 security update | 2025-08-05T00:44:17+00:00 | 2026-02-15T01:27:44+00:00 |
| rhsa-2025:1289 | Red Hat Security Advisory: RHTAS 1.1.1 - Red Hat Trusted Artifact Signer Release | 2025-02-11T10:53:10+00:00 | 2026-02-15T01:27:43+00:00 |
| rhsa-2025:1287 | Red Hat Security Advisory: RHTAS 1.1.1 - Red Hat Trusted Artifact Signer Release | 2025-02-11T10:52:52+00:00 | 2026-02-15T01:27:43+00:00 |
| rhsa-2025:12850 | Red Hat Security Advisory: opentelemetry-collector security update | 2025-08-05T01:36:07+00:00 | 2026-02-15T01:27:42+00:00 |
| rhsa-2025:1285 | Red Hat Security Advisory: RHTAS 1.1.1 - Red Hat Trusted Artifact Signer Release | 2025-02-11T10:50:52+00:00 | 2026-02-15T01:27:42+00:00 |
| rhsa-2025:12831 | Red Hat Security Advisory: opentelemetry-collector security update | 2025-08-05T02:08:27+00:00 | 2026-02-15T01:27:40+00:00 |
| rhsa-2025:12359 | Red Hat Security Advisory: Red Hat OpenShift sandboxed containers release | 2025-07-31T10:50:08+00:00 | 2026-02-15T01:27:40+00:00 |
| rhsa-2025:12323 | Red Hat Security Advisory: OpenShift Container Platform 4.12.79 bug fix and security update | 2025-08-07T18:02:35+00:00 | 2026-02-15T01:27:38+00:00 |
| rhsa-2025:12091 | Red Hat Security Advisory: Security release of Control plane Operators: RHOSO 18.0.10 (Feature Release 3) | 2025-07-31T15:53:04+00:00 | 2026-02-15T01:27:37+00:00 |
| rhsa-2025:11889 | Red Hat Security Advisory: 7.1 container image is now available in the Red Hat Ecosystem Catalog. | 2025-07-28T10:55:23+00:00 | 2026-02-15T01:27:37+00:00 |
| rhsa-2025:11830 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.18 security, enhancement & bug fix update | 2025-07-28T05:56:59+00:00 | 2026-02-15T01:27:35+00:00 |
| rhsa-2025:11749 | Red Hat Security Advisory: Updated 8.1 container image is now available: security and bug fix update | 2025-07-24T15:20:25+00:00 | 2026-02-15T01:27:35+00:00 |
| rhsa-2025:11682 | Red Hat Security Advisory: OpenShift Container Platform 4.16.45 packages and security update | 2025-07-30T13:27:32+00:00 | 2026-02-15T01:27:33+00:00 |
| rhsa-2025:11678 | Red Hat Security Advisory: OpenShift Container Platform 4.18.21 packages and security update | 2025-07-30T22:44:53+00:00 | 2026-02-15T01:27:29+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-15-034-01 | Siemens SCALANCE X-200IRT Switch Family User Impersonation Vulnerability | 2015-11-06T07:00:00.000000Z | 2025-06-18T19:25:20.526318Z |
| icsa-13-022-02 | GE Intelligent Platforms Proficy Cimplicity Multiple Vulnerabilities | 2013-10-26T06:00:00.000000Z | 2025-06-18T19:25:08.106052Z |
| icsa-12-354-01a | Ruggedcom ROS Hard-Coded RSA SSL Private Key | 2012-09-22T06:00:00.000000Z | 2025-06-18T19:25:01.798871Z |
| icsa-12-342-01b | Rockwell Allen-Bradley MicroLogix, SLC 500, and PLC-5 Fault Generation Vulnerability | 2012-09-10T06:00:00.000000Z | 2025-06-18T19:24:55.231514Z |
| icsa-12-249-03 | InduSoft ISSymbol ActiveX Control Buffer Overflow | 2012-06-09T06:00:00.000000Z | 2025-06-18T19:04:35.253383Z |
| icsa-12-228-01a | Tridium Niagara Vulnerabilities | 2012-05-19T06:00:00.000000Z | 2025-06-18T19:04:29.046428Z |
| icsa-15-099-01e | Siemens SIMATIC HMI Devices Vulnerabilities (Update E) | 2015-01-10T07:00:00.000000Z | 2025-06-18T19:04:22.822443Z |
| icsa-15-146-01 | Mitsubishi Electric MELSEC FX-Series Controllers Denial of Service | 2015-02-26T07:00:00.000000Z | 2025-06-18T19:04:16.618149Z |
| icsa-15-153-01 | Beckwith Electric TCP Initial Sequence Vulnerability | 2015-03-05T07:00:00.000000Z | 2025-06-18T19:04:10.391763Z |
| icsa-15-169-02 | Schneider Electric Wonderware System Platform Vulnerabilities | 2015-03-21T06:00:00.000000Z | 2025-06-18T19:04:04.192744Z |
| icsa-15-169-01b | Wind River VXWorks TCP Predictability Vulnerability in ICS Devices (Update B) | 2015-03-21T06:00:00.000000Z | 2025-06-18T19:03:57.981923Z |
| icsa-12-032-03 | GE Intelligent Platforms Proficy Real-Time Information Portal Directory Traversal | 2012-11-04T06:00:00.000000Z | 2025-06-18T19:03:51.787688Z |
| icsa-12-079-01 | Microsoft Remote Desktop Protocol Memory Corruption Vulnerability | 2012-12-21T07:00:00.000000Z | 2025-06-18T19:03:45.218685Z |
| icsa-10-348-01a | Wonderware InBatch Vulnerability | 2010-09-16T06:00:00.000000Z | 2025-06-17T16:50:19.269504Z |
| icsa-10-322-02a | Automated Solutions OPC Vulnerability | 2010-08-21T06:00:00.000000Z | 2025-06-17T16:50:13.013737Z |
| icsa-16-343-01 | Moxa MiiNePort Session Hijack Vulnerabilities | 2016-09-11T06:00:00.000000Z | 2025-06-17T16:50:00.161907Z |
| icsa-12-047-01a | Advantech WebAccess Vulnerabilities | 2012-11-19T07:00:00.000000Z | 2025-06-17T15:46:30.792399Z |
| icsa-12-150-01 | Honeywell HMIWeb Browser Buffer Overflow Vulnerability | 2012-03-02T07:00:00.000000Z | 2025-06-17T15:46:24.572627Z |
| icsa-12-146-01a | RuggedCom Weak Cryptography for Password Vulnerability | 2012-02-26T07:00:00.000000Z | 2025-06-17T15:46:18.307459Z |
| icsa-12-138-01 | Emerson DeltaV Multiple Vulnerabilities | 2012-02-18T07:00:00.000000Z | 2025-06-17T15:45:47.164093Z |
| icsa-12-062-01 | Wonderware Information Server Multiple Vulnerabilities | 2012-12-04T07:00:00.000000Z | 2025-06-17T15:45:28.468819Z |
| icsa-12-059-01 | ABB Robot Communications Runtime Buffer Overflow | 2012-12-01T07:00:00.000000Z | 2025-06-17T15:45:21.808130Z |
| icsa-25-168-05 | Dover Fueling Solutions ProGauge MagLink LX consoles | 2025-06-17T06:00:00.000000Z | 2025-06-17T06:00:00.000000Z |
| icsa-25-168-04 | Fuji Electric Smart Editor | 2025-06-17T06:00:00.000000Z | 2025-06-17T06:00:00.000000Z |
| icsa-25-168-02 | LS Electric GMWin 4 | 2025-06-17T06:00:00.000000Z | 2025-06-17T06:00:00.000000Z |
| va-25-136-01 | IBM Security Guardium stored cross-site scripting | 2025-05-16T20:14:51Z | 2025-06-16T00:00:00Z |
| icsa-13-352-01 | NovaTech Orion DNP3 Improper Input Validation Vulnerability | 2013-09-20T06:00:00.000000Z | 2025-06-12T21:23:06.621585Z |
| icsa-13-113-01 | Wonderware Information Server Vulnerabilities | 2013-01-25T07:00:00.000000Z | 2025-06-12T18:45:02.717561Z |
| icsa-14-205-02a | Siemens SIMATIC WinCC Vulnerabilities (Update A) | 2014-04-26T06:00:00.000000Z | 2025-06-12T18:44:31.147692Z |
| icsa-14-105-01 | Progea Movicon SCADA Information Disclosure Vulnerability | 2014-01-16T07:00:00.000000Z | 2025-06-12T18:44:24.886887Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-asaftd-saml-bypass-kknvxykw | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Authorization Bypass Vulnerability | 2024-05-22T16:00:00+00:00 | 2024-05-22T16:00:00+00:00 |
| cisco-sa-asaftd-saml-bypass-KkNvXyKW | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Authorization Bypass Vulnerability | 2024-05-22T16:00:00+00:00 | 2024-05-22T16:00:00+00:00 |
| cisco-sa-asaftd-ogsnsg-aclbyp-3xb8q6jx | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Inactive-to-Active ACL Bypass Vulnerability | 2024-05-22T16:00:00+00:00 | 2024-05-22T16:00:00+00:00 |
| cisco-sa-asaftd-ogsnsg-aclbyp-3XB8q6jX | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Inactive-to-Active ACL Bypass Vulnerability | 2024-05-22T16:00:00+00:00 | 2024-05-22T16:00:00+00:00 |
| cisco-sa-asaftd-dos-njvawoeq | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software DNS Inspection Denial of Service Vulnerability | 2022-04-27T16:00:00+00:00 | 2024-05-22T15:57:10+00:00 |
| cisco-sa-asaftd-dos-nJVAwOeq | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software DNS Inspection Denial of Service Vulnerability | 2022-04-27T16:00:00+00:00 | 2024-05-22T15:57:10+00:00 |
| cisco-sa-cucm-apidos-pgsdcdnf | Multiple Cisco Unified Communications Products Unauthenticated API High CPU Utilization Denial of Service Vulnerability | 2023-10-04T16:00:00+00:00 | 2024-05-17T15:07:50+00:00 |
| cisco-sa-secure-nam-priv-esc-szu2vypz | Cisco Secure Client for Windows with Network Access Manager Module Privilege Escalation Vulnerability | 2024-05-15T16:00:00+00:00 | 2024-05-15T16:00:00+00:00 |
| cisco-sa-nso-rwpesc-qrqgnh3f | Cisco Crosswork Network Services Orchestrator Vulnerabilities | 2024-05-15T16:00:00+00:00 | 2024-05-15T16:00:00+00:00 |
| cisco-sa-nso-rwpesc-qrQGnh3f | Cisco Crosswork Network Services Orchestrator Vulnerabilities | 2024-05-15T16:00:00+00:00 | 2024-05-15T16:00:00+00:00 |
| cisco-sa-nso-ordir-mnm8yqzo | Cisco Crosswork Network Services Orchestrator Open Redirect Vulnerability | 2024-05-15T16:00:00+00:00 | 2024-05-15T16:00:00+00:00 |
| cisco-sa-nso-ordir-MNM8YqzO | Cisco Crosswork Network Services Orchestrator Open Redirect Vulnerability | 2024-05-15T16:00:00+00:00 | 2024-05-15T16:00:00+00:00 |
| cisco-sa-nso-hcc-priv-esc-owbwcs5d | Cisco Crosswork Network Services Orchestrator Privilege Escalation Vulnerability | 2024-05-15T16:00:00+00:00 | 2024-05-15T16:00:00+00:00 |
| cisco-sa-nso-hcc-priv-esc-OWBWCs5D | Cisco Crosswork Network Services Orchestrator Privilege Escalation Vulnerability | 2024-05-15T16:00:00+00:00 | 2024-05-15T16:00:00+00:00 |
| cisco-sa-cnfd-rwpesc-zaoufyx8 | ConfD CLI Privilege Escalation and Arbitrary File Read and Write Vulnerabilities | 2024-05-15T16:00:00+00:00 | 2024-05-15T16:00:00+00:00 |
| cisco-sa-appd-netvisdos-9znbsjtk | Cisco AppDynamics Network Visibility Service Denial of Service Vulnerability | 2024-05-15T16:00:00+00:00 | 2024-05-15T16:00:00+00:00 |
| cisco-sa-ipphone-multi-vulns-cxahcvs | Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Vulnerabilities | 2024-05-01T16:00:00+00:00 | 2024-05-01T16:00:00+00:00 |
| cisco-sa-asaftd-websrvs-dos-x8gnucd2 | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Web Services Denial of Service Vulnerability | 2024-04-24T16:00:00+00:00 | 2024-04-24T16:00:00+00:00 |
| cisco-sa-asaftd-websrvs-dos-X8gNucD2 | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Web Services Denial of Service Vulnerability | 2024-04-24T16:00:00+00:00 | 2024-04-24T16:00:00+00:00 |
| cisco-sa-asaftd-persist-rce-flsnxf4h | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Persistent Local Code Execution Vulnerability | 2024-04-24T16:00:00+00:00 | 2024-04-24T16:00:00+00:00 |
| cisco-sa-asaftd-persist-rce-FLsNXF4h | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Persistent Local Code Execution Vulnerability | 2024-04-24T16:00:00+00:00 | 2024-04-24T16:00:00+00:00 |
| cisco-sa-asaftd-cmd-inj-zjv8wysm | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Command Injection Vulnerability | 2024-04-24T16:00:00+00:00 | 2024-04-24T16:00:00+00:00 |
| cisco-sa-asaftd-cmd-inj-ZJV8Wysm | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Command Injection Vulnerability | 2024-04-24T16:00:00+00:00 | 2024-04-24T16:00:00+00:00 |
| cisco-sa-snmp-uwbxfqww | Cisco IOS and IOS XE Software SNMP Extended Named Access Control List Bypass Vulnerability | 2024-04-17T16:00:00+00:00 | 2024-04-17T16:00:00+00:00 |
| cisco-sa-snmp-uwBXfqww | Cisco IOS and IOS XE Software SNMP Extended Named Access Control List Bypass Vulnerability | 2024-04-17T16:00:00+00:00 | 2024-04-17T16:00:00+00:00 |
| cisco-sa-ios-dos-hq4d3tzg | Cisco IOS Software for Catalyst 6000 Series Switches Denial of Service Vulnerability | 2024-03-27T16:00:00+00:00 | 2024-04-04T15:31:55+00:00 |
| cisco-sa-tms-xss-kgw4dx9y | Cisco TelePresence Management Suite Cross-Site Scripting Vulnerability | 2024-04-03T16:00:00+00:00 | 2024-04-03T16:00:00+00:00 |
| cisco-sa-sbiz-rv-xss-oqertup | Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers Cross-Site Scripting Vulnerability | 2024-04-03T16:00:00+00:00 | 2024-04-03T16:00:00+00:00 |
| cisco-sa-ndru-pesc-kz2pqlzh | Cisco Nexus Dashboard Privilege Escalation Vulnerability | 2024-04-03T16:00:00+00:00 | 2024-04-03T16:00:00+00:00 |
| cisco-sa-ndo-upav-yrqsccsp | Cisco Nexus Dashboard Orchestrator Unauthorized Policy Actions Vulnerability | 2024-04-03T16:00:00+00:00 | 2024-04-03T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2023-27043 | The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python. | 2023-04-01T00:00:00.000Z | 2026-01-08T14:35:46.000Z |
| msrc_cve-2025-61106 | FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the show_vty_ext_pref_pref_sid function at ospf_ext.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted OSPF packet. | 2025-10-02T00:00:00.000Z | 2026-01-08T14:35:31.000Z |
| msrc_cve-2025-22026 | nfsd: don't ignore the return code of svc_proc_register() | 2025-04-02T00:00:00.000Z | 2026-01-08T14:35:28.000Z |
| msrc_cve-2025-61103 | FRRouting/frr from v4.0 through v10.4.1 was discovered to contain a NULL pointer dereference via the show_vty_ext_link_lan_adj_sid function at ospf_ext.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted OSPF packet. | 2025-10-02T00:00:00.000Z | 2026-01-08T14:35:21.000Z |
| msrc_cve-2024-23848 | In the Linux kernel through 6.7.1, there is a use-after-free in cec_queue_msg_fh, related to drivers/media/cec/core/cec-adap.c and drivers/media/cec/core/cec-api.c. | 2024-01-01T08:00:00.000Z | 2026-01-08T14:35:15.000Z |
| msrc_cve-2025-1744 | Out-of-bounds Write in radare2 | 2025-02-02T00:00:00.000Z | 2026-01-08T01:40:54.000Z |
| msrc_cve-2025-68766 | irqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc() | 2026-01-02T00:00:00.000Z | 2026-01-08T01:40:49.000Z |
| msrc_cve-2025-68753 | ALSA: firewire-motu: add bounds check in put_user loop for DSP events | 2026-01-02T00:00:00.000Z | 2026-01-08T01:40:44.000Z |
| msrc_cve-2025-15284 | arrayLimit bypass in bracket notation allows DoS via memory exhaustion | 2025-12-02T00:00:00.000Z | 2026-01-08T01:40:35.000Z |
| msrc_cve-2025-34468 | libcoap Stack-Based Buffer Overflow in Address Resolution DoS or Potential RCE | 2025-12-02T00:00:00.000Z | 2026-01-08T01:40:21.000Z |
| msrc_cve-2025-68380 | wifi: ath11k: fix peer HE MCS assignment | 2025-12-02T00:00:00.000Z | 2026-01-08T01:40:16.000Z |
| msrc_cve-2025-68346 | ALSA: dice: fix buffer overflow in detect_stream_formats() | 2025-12-02T00:00:00.000Z | 2026-01-08T01:40:11.000Z |
| msrc_cve-2025-68367 | macintosh/mac_hid: fix race condition in mac_hid_toggle_emumouse | 2025-12-02T00:00:00.000Z | 2026-01-08T01:40:06.000Z |
| msrc_cve-2025-68729 | wifi: ath12k: Fix MSDU buffer types handling in RX error path | 2025-12-02T00:00:00.000Z | 2026-01-08T01:40:01.000Z |
| msrc_cve-2025-38425 | i2c: tegra: check msg length in SMBUS block read | 2025-07-02T00:00:00.000Z | 2026-01-08T01:39:56.000Z |
| msrc_cve-2025-38476 | rpl: Fix use-after-free in rpl_do_srh_inline(). | 2025-07-02T00:00:00.000Z | 2026-01-08T01:39:51.000Z |
| msrc_cve-2025-38437 | ksmbd: fix potential use-after-free in oplock/lease break ack | 2025-07-02T00:00:00.000Z | 2026-01-08T01:39:46.000Z |
| msrc_cve-2025-68476 | KEDA has Arbitrary File Read via Insufficient Path Validation in HashiCorp Vault Service Account Credential | 2025-12-02T00:00:00.000Z | 2026-01-08T01:39:41.000Z |
| msrc_cve-2025-38377 | rose: fix dangling neighbour pointers in rose_rt_device_down() | 2025-07-02T00:00:00.000Z | 2026-01-08T01:39:34.000Z |
| msrc_cve-2025-38259 | ASoC: codecs: wcd9335: Fix missing free of regulator supplies | 2025-07-02T00:00:00.000Z | 2026-01-08T01:39:29.000Z |
| msrc_cve-2025-38257 | s390/pkey: Prevent overflow in size calculation for memdup_user() | 2025-07-02T00:00:00.000Z | 2026-01-08T01:39:24.000Z |
| msrc_cve-2025-38230 | jfs: validate AG parameters in dbMount() to prevent crashes | 2025-07-02T00:00:00.000Z | 2026-01-08T01:39:19.000Z |
| msrc_cve-2025-68156 | Expr has Denial of Service via Unbounded Recursion in Builtin Functions | 2025-12-02T00:00:00.000Z | 2026-01-08T01:39:14.000Z |
| msrc_cve-2025-38131 | coresight: prevent deactivate active config while enabling the config | 2025-07-02T00:00:00.000Z | 2026-01-08T01:39:09.000Z |
| msrc_cve-2025-68287 | usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths | 2025-12-02T00:00:00.000Z | 2026-01-08T01:39:04.000Z |
| msrc_cve-2025-68290 | most: usb: fix double free on late probe failure | 2025-12-02T00:00:00.000Z | 2026-01-08T01:38:59.000Z |
| msrc_cve-2025-68301 | net: atlantic: fix fragment overflow handling in RX path | 2025-12-02T00:00:00.000Z | 2026-01-08T01:38:53.000Z |
| msrc_cve-2025-68311 | tty: serial: ip22zilog: Use platform device for probing | 2025-12-02T00:00:00.000Z | 2026-01-08T01:38:46.000Z |
| msrc_cve-2025-68303 | platform/x86: intel: punit_ipc: fix memory corruption | 2025-12-02T00:00:00.000Z | 2026-01-08T01:38:41.000Z |
| msrc_cve-2025-2296 | Un-verified kernel bypass Secure Boot mechanism in direct boot mode | 2025-12-02T00:00:00.000Z | 2026-01-08T01:38:35.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15713-1 | python315-3.15.0~a1-1.1 on GA media | 2025-11-07T00:00:00Z | 2025-11-07T00:00:00Z |
| opensuse-su-2025:15712-1 | python311-Django-5.2.8-1.1 on GA media | 2025-11-07T00:00:00Z | 2025-11-07T00:00:00Z |
| opensuse-su-2025:15711-1 | opentofu-1.10.7-1.1 on GA media | 2025-11-07T00:00:00Z | 2025-11-07T00:00:00Z |
| opensuse-su-2025:15710-1 | govulncheck-vulndb-0.0.20251105T184115-1.1 on GA media | 2025-11-07T00:00:00Z | 2025-11-07T00:00:00Z |
| opensuse-su-2025:15709-1 | google-osconfig-agent-20251028.00-1.1 on GA media | 2025-11-07T00:00:00Z | 2025-11-07T00:00:00Z |
| opensuse-su-2025:15708-1 | python311-Django4-4.2.26-1.1 on GA media | 2025-11-06T00:00:00Z | 2025-11-06T00:00:00Z |
| opensuse-su-2025:15707-1 | ghostscript-10.06.0-2.1 on GA media | 2025-11-06T00:00:00Z | 2025-11-06T00:00:00Z |
| opensuse-su-2025:15706-1 | erlang-28.1.1-1.1 on GA media | 2025-11-06T00:00:00Z | 2025-11-06T00:00:00Z |
| opensuse-su-2025:15705-1 | runc-1.3.3-1.1 on GA media | 2025-11-05T00:00:00Z | 2025-11-05T00:00:00Z |
| opensuse-su-2025:15704-1 | zellij-0.43.1-2.1 on GA media | 2025-11-04T00:00:00Z | 2025-11-04T00:00:00Z |
| opensuse-su-2025:15703-1 | kubecolor-0.5.3-1.1 on GA media | 2025-11-04T00:00:00Z | 2025-11-04T00:00:00Z |
| opensuse-su-2025:15702-1 | kernel-devel-6.17.7-1.1 on GA media | 2025-11-04T00:00:00Z | 2025-11-04T00:00:00Z |
| opensuse-su-2025:15701-1 | java-1_8_0-openjdk-1.8.0.472-1.1 on GA media | 2025-11-04T00:00:00Z | 2025-11-04T00:00:00Z |
| opensuse-su-2025:15700-1 | OpenSMTPD-7.8.0p0-1.1 on GA media | 2025-11-04T00:00:00Z | 2025-11-04T00:00:00Z |
| opensuse-su-2025:15699-1 | python311-djangorestframework-simplejwt-5.5.1-1.1 on GA media | 2025-11-03T00:00:00Z | 2025-11-03T00:00:00Z |
| opensuse-su-2025:15698-1 | redis-8.2.3-1.1 on GA media | 2025-11-02T00:00:00Z | 2025-11-02T00:00:00Z |
| opensuse-su-2025:15697-1 | kumactl-2.12.3-1.1 on GA media | 2025-11-02T00:00:00Z | 2025-11-02T00:00:00Z |
| opensuse-su-2025:15696-1 | python311-starlette-0.49.1-1.1 on GA media | 2025-11-01T00:00:00Z | 2025-11-01T00:00:00Z |
| opensuse-su-2025:15695-1 | govulncheck-vulndb-0.0.20251029T215107-1.1 on GA media | 2025-11-01T00:00:00Z | 2025-11-01T00:00:00Z |
| opensuse-su-2025:20022-1 | Security update for python-Django | 2025-10-31T08:58:03Z | 2025-10-31T08:58:03Z |
| opensuse-su-2025-20022-1 | Security update for python-Django | 2025-10-31T08:58:03Z | 2025-10-31T08:58:03Z |
| opensuse-su-2025:16756-1 | java-25-openj9-25.0.1.0-1.1 on GA media | 2025-10-31T00:00:00Z | 2025-10-31T00:00:00Z |
| opensuse-su-2025:16755-1 | java-21-openj9-21.0.9.0-1.1 on GA media | 2025-10-31T00:00:00Z | 2025-10-31T00:00:00Z |
| opensuse-su-2025:16754-1 | java-1_8_0-openj9-1.8.0.472-1.1 on GA media | 2025-10-31T00:00:00Z | 2025-10-31T00:00:00Z |
| opensuse-su-2025:16753-1 | java-17-openj9-17.0.17.0-1.1 on GA media | 2025-10-31T00:00:00Z | 2025-10-31T00:00:00Z |
| opensuse-su-2025:16752-1 | java-11-openj9-11.0.29.0-1.1 on GA media | 2025-10-31T00:00:00Z | 2025-10-31T00:00:00Z |
| opensuse-su-2025:16751-1 | gomuks-0.3.1-2.1 on GA media | 2025-10-31T00:00:00Z | 2025-10-31T00:00:00Z |
| opensuse-su-2025:15694-1 | java-25-openj9-25.0.1.0-1.1 on GA media | 2025-10-31T00:00:00Z | 2025-10-31T00:00:00Z |
| opensuse-su-2025:15693-1 | java-21-openj9-21.0.9.0-1.1 on GA media | 2025-10-31T00:00:00Z | 2025-10-31T00:00:00Z |
| opensuse-su-2025:15692-1 | java-1_8_0-openj9-1.8.0.472-1.1 on GA media | 2025-10-31T00:00:00Z | 2025-10-31T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-python-2024-4032 | Incorrect IPv4 and IPv6 private ranges | 2024-06-20T11:17:24.961Z | 2025-11-06T13:25:46.476Z |
| bit-python-2024-11168 | Improper validation of IPv6 and IPvFuture addresses | 2024-12-10T11:25:45.323Z | 2025-11-06T13:25:46.476Z |
| bit-python-2024-0450 | Quoted zip-bomb protection for zipfile | 2024-12-13T12:41:10.011Z | 2025-11-06T13:25:46.476Z |
| bit-python-2024-0397 | Memory race condition in ssl.SSLContext certificate store methods | 2024-06-20T11:18:14.556Z | 2025-11-06T13:25:46.476Z |
| bit-python-2023-6597 | 2024-12-13T12:41:26.412Z | 2025-11-06T13:25:46.476Z | |
| bit-python-2023-40217 | 2024-03-06T11:03:14.481Z | 2025-11-06T13:25:46.476Z | |
| bit-python-2023-27043 | 2024-10-22T12:06:11.918Z | 2025-11-06T13:25:46.476Z | |
| bit-python-2023-24329 | 2024-03-06T11:04:03.580Z | 2025-11-06T13:25:46.476Z | |
| bit-python-2022-42919 | 2024-03-06T11:05:06.167Z | 2025-11-06T13:25:46.476Z | |
| bit-python-2022-0391 | 2024-03-06T11:05:40.083Z | 2025-11-06T13:25:46.476Z | |
| bit-python-2021-4189 | 2024-03-06T11:05:50.693Z | 2025-11-06T13:25:46.476Z | |
| bit-python-2021-3737 | 2024-03-06T11:06:04.065Z | 2025-11-06T13:25:46.476Z | |
| bit-python-2021-3733 | 2024-03-06T11:06:14.679Z | 2025-11-06T13:25:46.476Z | |
| bit-python-2021-3426 | 2024-03-06T11:06:24.568Z | 2025-11-06T13:25:46.476Z | |
| bit-python-2021-29921 | 2024-03-06T11:06:43.578Z | 2025-11-06T13:25:46.476Z | |
| bit-python-2021-28861 | 2024-03-06T11:06:51.991Z | 2025-11-06T13:25:46.476Z | |
| bit-python-2020-10735 | 2024-03-06T11:08:16.884Z | 2025-11-06T13:25:46.476Z | |
| bit-postgresql-2024-10979 | PostgreSQL PL/Perl environment variable changes execute arbitrary code | 2024-11-16T07:16:38.797Z | 2025-11-06T13:25:46.476Z |
| bit-postgresql-2024-10978 | PostgreSQL SET ROLE, SET SESSION AUTHORIZATION reset to wrong user ID | 2024-11-16T07:16:45.984Z | 2025-11-06T13:25:46.476Z |
| bit-postgresql-2024-10977 | PostgreSQL libpq retains an error message from man-in-the-middle | 2024-11-16T07:16:52.278Z | 2025-11-06T13:25:46.476Z |
| bit-postgresql-2024-10976 | PostgreSQL row security below e.g. subqueries disregards user ID changes | 2024-11-16T07:16:59.886Z | 2025-11-06T13:25:46.476Z |
| bit-postgresql-2023-5870 | Postgresql: role pg_signal_backend can signal certain superuser processes. | 2024-03-06T11:02:29.084Z | 2025-11-06T13:25:46.476Z |
| bit-postgresql-2023-5869 | Postgresql: buffer overrun from integer overflow in array modification | 2024-03-06T11:02:41.294Z | 2025-11-06T13:25:46.476Z |
| bit-postgresql-2023-5868 | Postgresql: memory disclosure in aggregate function calls | 2024-03-06T11:02:52.082Z | 2025-11-06T13:25:46.476Z |
| bit-pip-2025-8869 | Fallback tar extraction in pip doesn't check symbolic links point to extraction directory | 2025-09-26T08:48:13.610Z | 2025-11-06T13:25:46.476Z |
| bit-pip-2023-5752 | Mercurial configuration injectable in repo revision when installing via pip | 2024-03-06T11:01:43.973Z | 2025-11-06T13:25:46.476Z |
| bit-phpmyadmin-2025-24530 | 2025-04-24T07:21:48.097Z | 2025-11-06T13:25:46.476Z | |
| bit-phpmyadmin-2025-24529 | 2025-04-24T07:21:41.489Z | 2025-11-06T13:25:46.476Z | |
| bit-phpmyadmin-2023-25727 | 2024-03-06T11:01:27.502Z | 2025-11-06T13:25:46.476Z | |
| bit-php-2025-6491 | NULL Pointer Dereference in PHP SOAP Extension via Large XML Namespace Prefix | 2025-07-16T08:19:30.475Z | 2025-11-06T13:25:46.476Z |
| ID | Description | Updated |
|---|---|---|
| var-201912-0636 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:24:52.133000Z |
| var-200102-0077 | Memory leak in Cisco Catalyst 4000, 5000, and 6000 series switches allows remote attacker… | 2024-07-23T21:24:52.601000Z |
| var-200504-0293 | Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allo… | 2024-07-23T21:24:51.414000Z |
| var-202006-1831 | A memory corruption issue was addressed with improved state management. This issue is fix… | 2024-07-23T21:24:50.411000Z |
| var-202106-0349 | Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to pote… | 2024-07-23T21:24:47.280000Z |
| var-201410-1144 | Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0… | 2024-07-23T21:24:46.357000Z |
| var-200809-0190 | Multiple integer overflows in the SearchKit API in Apple Mac OS X 10.4.11 and 10.5 throug… | 2024-07-23T21:24:45.643000Z |
| var-200701-0295 | The KDE HTML library (kdelibs), as used by Konqueror 3.5.5, does not properly parse HTML … | 2024-07-23T21:24:06.215000Z |
| var-202003-1779 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2024-07-23T21:23:59.719000Z |
| var-201304-0317 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:23:59.799000Z |
| var-200110-0170 | The Legion of the Bouncy Castle Java Cryptography API before release 1.38, as used in Cry… | 2024-07-23T21:23:39.977000Z |
| var-201504-0150 | cURL and libcurl 7.10.6 through 7.41.0 do not properly re-use authenticated Negotiate con… | 2024-07-23T21:23:08.257000Z |
| var-202108-2123 | A memory corruption vulnerability was addressed with improved locking. This issue is fixe… | 2024-07-23T21:23:07.966000Z |
| var-201503-0388 | Use-after-free vulnerability in the _zend_shared_memdup function in zend_shared_alloc.c i… | 2024-07-23T21:23:07.716000Z |
| var-201003-1075 | Use-after-free vulnerability in the abstract file-descriptor handling interface in the cu… | 2024-07-23T21:23:07.044000Z |
| var-200801-0561 | Cross-site scripting (XSS) vulnerability in mod_status in the Apache HTTP Server 2.2.0 th… | 2024-07-23T21:23:07.143000Z |
| var-201711-0454 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T21:23:03.598000Z |
| var-201506-0264 | The phar_parse_tarfile function in ext/phar/tar.c in PHP before 5.4.41, 5.5.x before 5.5.… | 2024-07-23T21:23:02.233000Z |
| var-202004-0812 | In ksh version 20120801, a flaw was found in the way it evaluates certain environment var… | 2024-07-23T21:22:46.394000Z |
| var-200506-0133 | Certain BSD-based Telnet clients, including those used on Solaris and SuSE Linux, allow r… | 2024-07-23T21:22:45.018000Z |
| var-202001-0472 | Insufficient control flow in certain data structures for some Intel(R) Processors with In… | 2024-07-23T21:22:25.122000Z |
| var-201710-1406 | An issue was discovered in certain Apple products. iOS before 11 is affected. Safari befo… | 2024-07-23T21:22:23.796000Z |
| var-201302-0233 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:21:52.515000Z |
| var-201105-0197 | Unspecified vulnerability in the Java Embedding Plugin (JEP) in Mozilla Firefox before 3.… | 2024-07-23T21:21:47.763000Z |
| var-200803-0028 | The Kerberos 4 support in KDC in MIT Kerberos 5 (krb5kdc) does not properly clear the unu… | 2024-07-23T21:21:47.664000Z |
| var-201311-0106 | Heap-based buffer overflow in Ruby 1.8, 1.9 before 1.9.3-p484, 2.0 before 2.0.0-p353, 2.1… | 2024-07-23T21:21:38.043000Z |
| var-201904-1401 | A cross-site scripting issue existed in Safari. This issue was addressed with improved UR… | 2024-07-23T21:21:37.851000Z |
| var-202004-2200 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T21:21:06.954000Z |
| var-201912-0525 | A logic issue was addressed with improved state management. This issue is fixed in tvOS 1… | 2024-07-23T21:21:06.108000Z |
| var-200312-0218 | OpenSSL 0.9.6k allows remote attackers to cause a denial of service (crash via large recu… | 2024-07-23T21:21:01.334000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2022-002451 | Multiple vulnerabilities in SVMPC1 and SVMPC2 | 2022-10-13T17:27+09:00 | 2024-05-30T16:38+09:00 |
| jvndb-2023-000037 | Joruri Gw vulnerable to cross-site scripting | 2023-04-17T14:19+09:00 | 2024-05-30T16:19+09:00 |
| jvndb-2023-001493 | Multiple mobile printing apps for Android vulnerable to improper intent handling | 2023-04-13T11:09+09:00 | 2024-05-30T15:48+09:00 |
| jvndb-2023-000038 | EC-CUBE plugin "NEXT ENGINE Integration Plugin (for EC-CUBE 2.0 series)" vulnerable to authentication bypass | 2023-04-19T14:06+09:00 | 2024-05-30T15:11+09:00 |
| jvndb-2024-000056 | awkblog vulnerable to OS command injection | 2024-05-30T14:39+09:00 | 2024-05-30T14:39+09:00 |
| jvndb-2023-001411 | Yokogawa Electric CENTUM series vulnerable to cleartext storage of sensitive information | 2023-04-06T14:59+09:00 | 2024-05-29T18:23+09:00 |
| jvndb-2022-000097 | Multiple vulnerabilities in DENSHI NYUSATSU CORE SYSTEM | 2022-12-15T15:18+09:00 | 2024-05-29T17:40+09:00 |
| jvndb-2023-000031 | Multiple vulnerabilities in JustSystems products | 2023-04-04T15:22+09:00 | 2024-05-29T17:32+09:00 |
| jvndb-2023-000035 | Improper restriction of XML external entity references (XXE) in Shinseiyo Sogo Soft | 2023-04-19T14:49+09:00 | 2024-05-29T16:58+09:00 |
| jvndb-2023-000034 | JB Inquiry form vulnerable to exposure of private personal information to an unauthorized actor | 2023-04-14T15:48+09:00 | 2024-05-29T16:44+09:00 |
| jvndb-2023-000050 | Multiple vulnerabilities in WordPress Plugin "MW WP Form" and "Snow Monkey Forms" | 2023-05-15T14:29+09:00 | 2024-05-29T16:27+09:00 |
| jvndb-2024-000055 | Redmine DMSF Plugin vulnerable to path traversal | 2024-05-29T14:13+09:00 | 2024-05-29T14:13+09:00 |
| jvndb-2024-000054 | EC-Orange vulnerable to authorization bypass | 2024-05-29T14:06+09:00 | 2024-05-29T14:06+09:00 |
| jvndb-2024-003249 | ELECOM wireless LAN routers vulnerable to OS command injection | 2024-05-29T12:33+09:00 | 2024-05-29T12:33+09:00 |
| jvndb-2023-000040 | WordPress Plugin "Appointment and Event Booking Calendar for WordPress - Amelia" vulnerable to cross-site scripting | 2023-04-24T13:41+09:00 | 2024-05-28T16:59+09:00 |
| jvndb-2023-000039 | WordPress plugin "LIQUID SPEECH BALLOON" vulnerable to cross-site request forgery | 2023-04-19T14:24+09:00 | 2024-05-28T16:56+09:00 |
| jvndb-2024-000053 | Multiple vulnerabilities in Unifier and Unifier Cast | 2024-05-28T14:47+09:00 | 2024-05-28T14:47+09:00 |
| jvndb-2024-000052 | Multiple vulnerabilities in UTAU | 2024-05-28T14:23+09:00 | 2024-05-28T14:23+09:00 |
| jvndb-2023-001639 | Heap-based buffer overflow vulnerability in OMRON CX-Drive | 2023-04-25T14:31+09:00 | 2024-05-27T18:11+09:00 |
| jvndb-2023-000029 | Multiple vulnerabilities in Seiko Solutions SkyBridge MB-A100/A110/A200/A130 SkySpider MB-R210 | 2023-03-31T15:54+09:00 | 2024-05-27T17:08+09:00 |
| jvndb-2023-000059 | Multiple vulnerabilities in Inaba Denki Sangyo Wi-Fi AP UNIT | 2023-06-09T15:18+09:00 | 2024-05-27T16:38+09:00 |
| jvndb-2023-000043 | Multiple vulnerabilities in MicroEngine Mailform | 2023-05-10T13:57+09:00 | 2024-05-24T17:07+09:00 |
| jvndb-2023-000045 | WordPress Plugin "VK Blocks" and "VK All in One Expansion Unit" vulnerable to cross-site scripting | 2023-05-09T15:14+09:00 | 2024-05-24T17:05+09:00 |
| jvndb-2023-001926 | Cross-site Scripting Vulnerability in Hitachi Ops Center Analyzer | 2023-05-24T11:40+09:00 | 2024-05-24T17:01+09:00 |
| jvndb-2023-000047 | Beekeeper Studio vulnerable to code injection | 2023-05-12T16:42+09:00 | 2024-05-24T16:17+09:00 |
| jvndb-2023-000046 | SR-7100VN vulnerable to privilege escalation | 2023-05-09T13:58+09:00 | 2024-05-24T16:13+09:00 |
| jvndb-2023-000061 | Chatwork Desktop Application (Mac) vulnerable to code injection | 2023-06-13T13:38+09:00 | 2024-05-24T16:02+09:00 |
| jvndb-2023-002055 | Multiple vulnerabilities in KbDevice digital video recorders | 2023-06-07T11:52+09:00 | 2024-05-24T15:57+09:00 |
| jvndb-2023-000049 | Multiple vulnerabilities in Cybozu Garoon | 2023-05-15T14:29+09:00 | 2024-05-24T15:26+09:00 |
| jvndb-2024-000051 | Splunk Config Explorer vulnerable to cross-site scripting | 2024-05-24T13:50+09:00 | 2024-05-24T13:50+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:4257-2 | Security update for python311 | 2025-12-15T10:33:51Z | 2025-12-15T10:33:51Z |
| suse-su-2025:21211-1 | Security update for ImageMagick | 2025-12-15T09:56:13Z | 2025-12-15T09:56:13Z |
| suse-su-2025:4390-1 | Security update for rhino | 2025-12-12T16:18:03Z | 2025-12-12T16:18:03Z |
| suse-su-2025:21197-1 | Security update for binutils | 2025-12-12T15:58:29Z | 2025-12-12T15:58:29Z |
| suse-su-2025:21195-1 | Security update for binutils | 2025-12-12T15:58:29Z | 2025-12-12T15:58:29Z |
| suse-su-2025:4389-1 | Security update for python | 2025-12-12T13:49:14Z | 2025-12-12T13:49:14Z |
| suse-su-2025:4388-1 | Security update for postgresql16 | 2025-12-12T13:36:29Z | 2025-12-12T13:36:29Z |
| suse-su-2025:4387-1 | Security update for postgresql16 | 2025-12-12T13:35:46Z | 2025-12-12T13:35:46Z |
| suse-su-2025:4386-1 | Security update for postgresql16 | 2025-12-12T13:34:19Z | 2025-12-12T13:34:19Z |
| suse-su-2025:4384-1 | Security update for python-Django | 2025-12-12T13:28:27Z | 2025-12-12T13:28:27Z |
| suse-su-2025:4383-1 | Security update for libpng12 | 2025-12-12T13:13:47Z | 2025-12-12T13:13:47Z |
| suse-su-2025:4382-1 | Security update for gegl | 2025-12-12T13:06:54Z | 2025-12-12T13:06:54Z |
| suse-su-2025:4381-1 | Security update for kubernetes-client | 2025-12-12T10:19:11Z | 2025-12-12T10:19:11Z |
| suse-su-2025:4380-1 | Security update for kubernetes-client | 2025-12-12T10:18:54Z | 2025-12-12T10:18:54Z |
| suse-su-2025:21194-1 | Security update for keylime | 2025-12-12T09:45:03Z | 2025-12-12T09:45:03Z |
| suse-su-2025:4373-1 | Security update for container-suseconnect | 2025-12-12T09:05:38Z | 2025-12-12T09:05:38Z |
| suse-su-2025:21193-1 | Security update for go1.24 | 2025-12-12T07:45:36Z | 2025-12-12T07:45:36Z |
| suse-su-2025:21192-1 | Security update for go1.25 | 2025-12-12T07:24:50Z | 2025-12-12T07:24:50Z |
| suse-su-2025:4372-1 | Security update for postgresql15 | 2025-12-11T19:06:38Z | 2025-12-11T19:06:38Z |
| suse-su-2025:4371-1 | Security update for postgresql14 | 2025-12-11T19:04:45Z | 2025-12-11T19:04:45Z |
| suse-su-2025:4370-1 | Security update for postgresql14 | 2025-12-11T19:03:37Z | 2025-12-11T19:03:37Z |
| suse-su-2025:4368-1 | Security update for python3 | 2025-12-11T15:12:31Z | 2025-12-11T15:12:31Z |
| suse-su-2025:4364-1 | Security update for postgresql17, postgresql18 | 2025-12-11T10:12:26Z | 2025-12-11T10:12:26Z |
| suse-su-2025:4363-1 | Security update for postgresql17, postgresql18 | 2025-12-11T10:10:24Z | 2025-12-11T10:10:24Z |
| suse-su-2025:4353-1 | Security update for fontforge | 2025-12-10T18:03:31Z | 2025-12-10T18:03:31Z |
| suse-su-2025:4352-1 | Security update for python310 | 2025-12-10T17:18:21Z | 2025-12-10T17:18:21Z |
| suse-su-2025:4347-1 | Security update for glib2 | 2025-12-10T13:02:34Z | 2025-12-10T13:02:34Z |
| suse-su-2025:4346-1 | Security update for gnutls | 2025-12-10T10:39:49Z | 2025-12-10T10:39:49Z |
| suse-su-2025:1004-2 | Security update for python-Jinja2 | 2025-12-10T10:34:31Z | 2025-12-10T10:34:31Z |
| suse-su-2025:4337-1 | Security update for go1.24 | 2025-12-09T23:51:31Z | 2025-12-09T23:51:31Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-03188 | Land Record System forgot-password.php文件SQL注入漏洞 | 2025-02-18 | 2026-01-14 |
| cnvd-2026-03187 | Land Record System edit-propertytype.php文件SQL注入漏洞 | 2025-02-18 | 2026-01-14 |
| cnvd-2026-03186 | Land Record System /contactus.php文件SQL注入漏洞 | 2025-02-18 | 2026-01-14 |
| cnvd-2026-03185 | Land Record System todate参数SQL注入漏洞 | 2025-02-18 | 2026-01-14 |
| cnvd-2026-03184 | Land Record System bwdates-reports-details.php文件SQL注入漏洞 | 2025-02-18 | 2026-01-14 |
| cnvd-2026-03183 | Land Record System admin-profile.php文件SQL注入漏洞 | 2025-02-18 | 2026-01-14 |
| cnvd-2026-03165 | Online Security Guards Hiring System search-request.php文件SQL注入漏洞 | 2025-03-27 | 2026-01-14 |
| cnvd-2026-03164 | Online Security Guards Hiring System bwdates-reports-details.php文件SQL注入漏洞 | 2025-03-27 | 2026-01-14 |
| cnvd-2026-03163 | Online Security Guards Hiring System edit-guard-detail.php文件SQL注入漏洞 | 2025-04-09 | 2026-01-14 |
| cnvd-2026-03162 | Online Security Guards Hiring System changeimage.php文件SQL注入漏洞 | 2025-04-09 | 2026-01-14 |
| cnvd-2026-03161 | Men Salon Management System search-invoices.php 文件SQL注入漏洞 | 2025-04-09 | 2026-01-14 |
| cnvd-2026-03160 | Men Salon Management System appointment.php文件SQL注入漏洞 | 2025-04-09 | 2026-01-14 |
| cnvd-2026-03159 | Men Salon Management System add-customer-services.php文件SQL注入漏洞 | 2025-04-09 | 2026-01-14 |
| cnvd-2026-03158 | Men Salon Management System add-customer.php文件SQL注入漏洞 | 2025-04-09 | 2026-01-14 |
| cnvd-2026-03157 | Men Salon Management System about-us.php文件SQL注入漏洞 | 2025-04-09 | 2026-01-14 |
| cnvd-2026-03156 | Men Salon Management System add-services.php文件SQL注入漏洞 | 2025-04-16 | 2026-01-14 |
| cnvd-2026-03155 | Men Salon Management System admin-profile.php文件SQL注入漏洞 | 2025-04-18 | 2026-01-14 |
| cnvd-2026-03154 | Men Salon Management System view-appointment.php文件SQL注入漏洞 | 2025-04-30 | 2026-01-14 |
| cnvd-2026-03153 | Men Salon Management System /search-appointment.php文件SQL注入漏洞 | 2025-04-30 | 2026-01-14 |
| cnvd-2026-03152 | Men Salon Management System sales-reports-detail.php文件SQL注入漏洞 | 2025-04-30 | 2026-01-14 |
| cnvd-2026-03151 | Men Salon Management System forgot-password.php文件SQL注入漏洞 | 2025-04-30 | 2026-01-14 |
| cnvd-2026-03150 | Men Salon Management System contact-us.php文件SQL注入漏洞 | 2025-04-30 | 2026-01-14 |
| cnvd-2026-03149 | Men Salon Management System change-password.php文件SQL注入漏洞 | 2025-05-14 | 2026-01-14 |
| cnvd-2026-03148 | Student Result Management System /editmyexp.php文件SQL注入漏洞 | 2025-06-06 | 2026-01-14 |
| cnvd-2026-03147 | Student Management System using PHP and MySQL password-recovery.php文件SQL注入漏洞 | 2025-06-06 | 2026-01-14 |
| cnvd-2026-03146 | Student Management System using PHP and MySQL SQL注入漏洞 | 2025-06-06 | 2026-01-14 |
| cnvd-2026-03084 | Huawei HarmonyOS/EMUI接口权限管控漏洞 | 2023-12-07 | 2026-01-14 |
| cnvd-2026-03058 | Google Android混淆代理漏洞 | 2025-12-10 | 2026-01-14 |
| cnvd-2026-05016 | UTT 520W formUser函数缓冲区溢出漏洞 | 2026-01-09 | 2026-01-13 |
| cnvd-2026-05015 | UTT 512W formConfigCliForEngineerOnly函数缓冲区溢出漏洞 | 2026-01-09 | 2026-01-13 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-1005 | Multiples vulnérabilités dans les produits Siemens | 2025-11-13T00:00:00.000000 | 2025-11-13T00:00:00.000000 |
| certfr-2025-avi-1004 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2025-11-13T00:00:00.000000 | 2025-11-13T00:00:00.000000 |
| certfr-2025-avi-1003 | Multiples vulnérabilités dans Drupal | 2025-11-13T00:00:00.000000 | 2025-11-13T00:00:00.000000 |
| certfr-2025-avi-1002 | Multiples vulnérabilités dans GitLab | 2025-11-13T00:00:00.000000 | 2025-11-13T00:00:00.000000 |
| certfr-2025-avi-1001 | Multiples vulnérabilités dans Elastic Kibana | 2025-11-13T00:00:00.000000 | 2025-11-13T00:00:00.000000 |
| certfr-2025-avi-1000 | Multiples vulnérabilités dans les produits Splunk | 2025-11-13T00:00:00.000000 | 2025-11-13T00:00:00.000000 |
| certfr-2025-avi-0999 | Vulnérabilité dans les produits Symfony | 2025-11-13T00:00:00.000000 | 2025-11-13T00:00:00.000000 |
| CERTFR-2025-AVI-1005 | Multiples vulnérabilités dans les produits Siemens | 2025-11-13T00:00:00.000000 | 2025-11-13T00:00:00.000000 |
| CERTFR-2025-AVI-1004 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2025-11-13T00:00:00.000000 | 2025-11-13T00:00:00.000000 |
| CERTFR-2025-AVI-1003 | Multiples vulnérabilités dans Drupal | 2025-11-13T00:00:00.000000 | 2025-11-13T00:00:00.000000 |
| CERTFR-2025-AVI-1002 | Multiples vulnérabilités dans GitLab | 2025-11-13T00:00:00.000000 | 2025-11-13T00:00:00.000000 |
| CERTFR-2025-AVI-1001 | Multiples vulnérabilités dans Elastic Kibana | 2025-11-13T00:00:00.000000 | 2025-11-13T00:00:00.000000 |
| CERTFR-2025-AVI-1000 | Multiples vulnérabilités dans les produits Splunk | 2025-11-13T00:00:00.000000 | 2025-11-13T00:00:00.000000 |
| CERTFR-2025-AVI-0999 | Vulnérabilité dans les produits Symfony | 2025-11-13T00:00:00.000000 | 2025-11-13T00:00:00.000000 |
| certfr-2025-avi-0998 | Multiples vulnérabilités dans les produits Microsoft | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0997 | Multiples vulnérabilités dans Microsoft Azure | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0996 | Multiples vulnérabilités dans Microsoft Windows | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0995 | Multiples vulnérabilités dans Microsoft Office | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0994 | Multiples vulnérabilités dans Microsoft Edge | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0993 | Multiples vulnérabilités dans les produits Intel | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0992 | Multiples vulnérabilités dans Apache OpenOffice | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0991 | Multiples vulnérabilités dans les produits Mozilla | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0990 | Vulnérabilité dans Google Chrome | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0989 | Vulnérabilité dans Nagios XI | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0988 | Vulnérabilité dans Ivanti Endpoint Manager (EPM) | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0987 | Vulnérabilité dans les produits Citrix | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0986 | Vulnérabilité dans Schneider Electric EcoStruxure | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0985 | Multiples vulnérabilités dans les produits Axis | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0984 | Vulnérabilité dans Bitdefender Endpoint Security Tools pour Mac | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0983 | Vulnérabilité dans Synology BeeStation | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTA-2010-ALE-003 | Vulnérabilité dans Microsoft VBScript | 2010-03-02T00:00:00.000000 | 2010-04-13T00:00:00.000000 |
| certa-2010-ale-004 | Vulnérabilité dans Microsoft Internet Explorer | 2010-03-10T00:00:00.000000 | 2010-03-31T00:00:00.000000 |
| CERTA-2010-ALE-004 | Vulnérabilité dans Microsoft Internet Explorer | 2010-03-10T00:00:00.000000 | 2010-03-31T00:00:00.000000 |
| certa-2010-ale-002 | Vulnérabilité dans le sous-système MS-DOS de Microsoft Windows | 2010-01-21T00:00:00.000000 | 2010-02-10T00:00:00.000000 |
| CERTA-2010-ALE-002 | Vulnérabilité dans le sous-système MS-DOS de Microsoft Windows | 2010-01-21T00:00:00.000000 | 2010-02-10T00:00:00.000000 |
| certa-2010-ale-001 | Vulnérabilité dans Microsoft Internet Explorer | 2010-01-15T00:00:00.000000 | 2010-01-22T00:00:00.000000 |
| CERTA-2010-ALE-001 | Vulnérabilité dans Microsoft Internet Explorer | 2010-01-15T00:00:00.000000 | 2010-01-22T00:00:00.000000 |
| certa-2009-ale-023 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2009-12-15T00:00:00.000000 | 2010-01-13T00:00:00.000000 |
| CERTA-2009-ALE-023 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2009-12-15T00:00:00.000000 | 2010-01-13T00:00:00.000000 |
| certa-2009-ale-021 | Vulnérabilité dans Adobe Illustrator | 2009-12-10T00:00:00.000000 | 2010-01-08T00:00:00.000000 |
| CERTA-2009-ALE-021 | Vulnérabilité dans Adobe Illustrator | 2009-12-10T00:00:00.000000 | 2010-01-08T00:00:00.000000 |
| certa-2009-ale-022 | Vulnérabilité dans TANDBERG MXP | 2009-12-11T00:00:00.000000 | 2009-12-11T00:00:00.000000 |
| CERTA-2009-ALE-022 | Vulnérabilité dans TANDBERG MXP | 2009-12-11T00:00:00.000000 | 2009-12-11T00:00:00.000000 |
| certa-2009-ale-020 | Vulnérabilité dans Internet Explorer | 2009-11-21T00:00:00.000000 | 2009-12-09T00:00:00.000000 |
| CERTA-2009-ALE-020 | Vulnérabilité dans Internet Explorer | 2009-11-21T00:00:00.000000 | 2009-12-09T00:00:00.000000 |
| certa-2009-ale-018 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2009-10-09T00:00:00.000000 | 2009-10-14T00:00:00.000000 |
| certa-2009-ale-015 | Vulnérabilités du serveur FTP de Microsoft IIS | 2009-09-01T00:00:00.000000 | 2009-10-14T00:00:00.000000 |
| CERTA-2009-ALE-018 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2009-10-09T00:00:00.000000 | 2009-10-14T00:00:00.000000 |
| CERTA-2009-ALE-015 | Vulnérabilités du serveur FTP de Microsoft IIS | 2009-09-01T00:00:00.000000 | 2009-10-14T00:00:00.000000 |
| certa-2009-ale-016 | Vulnérabilité de SMBv2 dans Microsoft Windows | 2009-09-09T00:00:00.000000 | 2009-10-13T00:00:00.000000 |
| CERTA-2009-ALE-016 | Vulnérabilité de SMBv2 dans Microsoft Windows | 2009-09-09T00:00:00.000000 | 2009-10-13T00:00:00.000000 |
| certa-2009-ale-011 | Vulnérabilité dans Microsoft Office Web Components Control | 2009-07-13T00:00:00.000000 | 2009-08-12T00:00:00.000000 |
| CERTA-2009-ALE-011 | Vulnérabilité dans Microsoft Office Web Components Control | 2009-07-13T00:00:00.000000 | 2009-08-12T00:00:00.000000 |
| certa-2009-ale-013 | Vulnérabilité Shockwave Flash pour les produits Adobe | 2009-07-23T00:00:00.000000 | 2009-07-31T00:00:00.000000 |
| CERTA-2009-ALE-013 | Vulnérabilité Shockwave Flash pour les produits Adobe | 2009-07-23T00:00:00.000000 | 2009-07-31T00:00:00.000000 |
| certa-2009-ale-012 | Vulnérabilité dans Mozilla Firefox | 2009-07-15T00:00:00.000000 | 2009-07-17T00:00:00.000000 |
| CERTA-2009-ALE-012 | Vulnérabilité dans Mozilla Firefox | 2009-07-15T00:00:00.000000 | 2009-07-17T00:00:00.000000 |
| certa-2009-ale-010 | Vulnérabilité dans le contrôle ActiveX Microsoft Video | 2009-07-07T00:00:00.000000 | 2009-07-15T00:00:00.000000 |
| CERTA-2009-ALE-010 | Vulnérabilité dans le contrôle ActiveX Microsoft Video | 2009-07-07T00:00:00.000000 | 2009-07-15T00:00:00.000000 |
| certa-2009-ale-009 | Vulnérabilité dans Microsoft DirectShow | 2009-05-29T00:00:00.000000 | 2009-07-14T00:00:00.000000 |