Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-59513 |
5.5 (3.1)
|
Windows Bluetooth RFCOM Protocol Driver Information Di… |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:19.799Z | 2026-02-13T20:45:45.803Z |
| CVE-2025-59512 |
7.8 (3.1)
|
Customer Experience Improvement Program (CEIP) Elevati… |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:19.195Z | 2026-02-13T20:45:45.245Z |
| CVE-2025-59511 |
7.8 (3.1)
|
Windows WLAN Service Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2025-11-11T17:59:18.514Z | 2026-02-13T20:45:44.650Z |
| CVE-2025-59510 |
5.5 (3.1)
|
Windows Routing and Remote Access Service (RRAS) Denia… |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:17.642Z | 2026-02-13T20:45:44.046Z |
| CVE-2025-59509 |
5.5 (3.1)
|
Windows Speech Recognition Information Disclosure Vuln… |
Microsoft |
Windows 10 Version 1809 |
2025-11-11T17:59:17.048Z | 2026-02-13T20:45:43.369Z |
| CVE-2025-59508 |
7 (3.1)
|
Windows Speech Recognition Elevation of Privilege Vuln… |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:16.400Z | 2026-02-13T20:45:42.832Z |
| CVE-2025-59507 |
7 (3.1)
|
Windows Speech Runtime Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:15.696Z | 2026-02-13T20:45:42.229Z |
| CVE-2025-59506 |
7 (3.1)
|
DirectX Graphics Kernel Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:14.652Z | 2026-02-13T20:45:41.717Z |
| CVE-2025-59505 |
7.8 (3.1)
|
Windows Smart Card Reader Elevation of Privilege Vulne… |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:13.264Z | 2026-02-13T20:45:41.089Z |
| CVE-2025-59504 |
7.3 (3.1)
|
Azure Monitor Agent Remote Code Execution Vulnerability |
Microsoft |
Azure Monitor |
2025-11-11T17:59:11.909Z | 2026-02-13T20:45:40.285Z |
| CVE-2025-64656 |
9.4 (3.1)
|
Azure Application Gateway Elevation of Privilege Vulne… |
Microsoft |
Azure App Gateway |
2025-11-26T00:20:06.606Z | 2026-02-13T20:45:39.531Z |
| CVE-2026-21509 |
7.8 (3.1)
|
Microsoft Office Security Feature Bypass Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-01-26T17:06:35.512Z | 2026-02-13T20:41:07.937Z |
| CVE-2026-21264 |
9.3 (3.1)
|
Microsoft Account Spoofing Vulnerability |
Microsoft |
Microsoft Account |
2026-01-22T22:47:38.744Z | 2026-02-13T20:41:07.265Z |
| CVE-2026-21521 |
7.4 (3.1)
|
Word Copilot Information Disclosure Vulnerability |
Microsoft |
Microsoft 365 Word Copilot |
2026-01-22T22:47:38.118Z | 2026-02-13T20:41:06.696Z |
| CVE-2026-21227 |
8.2 (3.1)
|
Azure Logic Apps Elevation of Privilege Vulnerability |
Microsoft |
Azure Logic Apps |
2026-01-22T22:47:37.562Z | 2026-02-13T20:41:06.145Z |
| CVE-2026-24307 |
9.3 (3.1)
|
M365 Copilot Information Disclosure Vulnerability |
Microsoft |
Microsoft 365 Copilot |
2026-01-22T22:47:36.934Z | 2026-02-13T20:41:05.649Z |
| CVE-2026-24305 |
9.3 (3.1)
|
Azure Entra ID Elevation of Privilege Vulnerability |
Microsoft |
Microsoft Entra |
2026-01-22T22:47:36.181Z | 2026-02-13T20:41:04.992Z |
| CVE-2026-21524 |
7.4 (3.1)
|
Azure Data Explorer Information Disclosure Vulnerability |
Microsoft |
Azure Data Explorer |
2026-01-22T22:47:35.505Z | 2026-02-13T20:41:04.468Z |
| CVE-2026-24306 |
9.8 (3.1)
|
Azure Front Door Elevation of Privilege Vulnerability |
Microsoft |
Azure Front Door |
2026-01-22T22:47:34.942Z | 2026-02-13T20:41:03.941Z |
| CVE-2026-24304 |
9.9 (3.1)
|
Azure Resource Manager Elevation of Privilege Vulnerability |
Microsoft |
Azure Resource Manager |
2026-01-23T01:18:55.469Z | 2026-02-13T20:41:03.329Z |
| CVE-2026-21520 |
7.5 (3.1)
|
Copilot Studio Information Disclosure Vulnerability |
Microsoft |
Microsoft Copilot Studio |
2026-01-22T22:47:33.536Z | 2026-02-13T20:41:02.655Z |
| CVE-2026-21223 |
5.1 (3.1)
|
Microsoft Edge (Chromium-based) Security Feature Bypas… |
Microsoft |
Microsoft Edge (Chromium-based) |
2026-01-16T21:28:30.158Z | 2026-02-13T20:41:02.117Z |
| CVE-2026-21226 |
7.5 (3.1)
|
Azure Core shared client library for Python Remote Cod… |
Microsoft |
Azure Core shared client library for Python |
2026-01-13T18:04:55.084Z | 2026-02-13T20:41:01.576Z |
| CVE-2026-20958 |
5.4 (3.1)
|
Microsoft SharePoint Information Disclosure Vulnerability |
Microsoft |
Microsoft SharePoint Enterprise Server 2016 |
2026-01-13T17:57:09.881Z | 2026-02-13T20:41:00.439Z |
| CVE-2026-20941 |
7.8 (3.1)
|
Host Process for Windows Tasks Elevation of Privilege … |
Microsoft |
Windows 11 Version 24H2 |
2026-01-13T17:57:10.464Z | 2026-02-13T20:41:00.952Z |
| CVE-2026-20957 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-01-13T17:57:09.187Z | 2026-02-13T20:40:59.530Z |
| CVE-2026-20952 |
8.4 (3.1)
|
Microsoft Office Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-01-13T17:57:08.490Z | 2026-02-13T20:40:58.804Z |
| CVE-2026-20950 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-01-13T17:57:07.761Z | 2026-02-13T20:40:58.343Z |
| CVE-2026-20949 |
7.8 (3.1)
|
Microsoft Excel Security Feature Bypass Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-01-13T17:57:07.146Z | 2026-02-13T20:40:57.735Z |
| CVE-2026-20948 |
7.8 (3.1)
|
Microsoft Word Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-01-13T17:57:06.605Z | 2026-02-13T20:40:57.146Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-12073 |
4.3 (3.1)
|
Server-Side Request Forgery (SSRF) in GitLab |
GitLab |
GitLab |
2026-02-11T11:34:46.437Z | 2026-02-11T15:14:53.506Z |
| CVE-2025-70368 |
5.4 (3.1)
|
Worklenz version 2.1.5 contains a Stored Cross-Si… |
n/a |
n/a |
2026-01-26T00:00:00.000Z | 2026-01-27T19:56:00.363Z |
| CVE-2026-0810 |
6.8 (3.1)
|
Gix-date: gix-date: undefined behavior due to invalid … |
GitoxideLabs |
gitoxide |
2026-01-26T19:36:45.705Z | 2026-02-13T15:24:28.267Z |
| CVE-2026-26023 |
5.3 (4.0)
|
Client‑side DOM XSS in the web chat app of Dify when u… |
langgenius |
dify |
2026-02-11T21:23:09.866Z | 2026-02-12T21:16:35.748Z |
| CVE-2025-59471 |
5.9 (3.1)
|
A denial of service vulnerability exists in self-… |
vercel |
next |
2026-01-26T21:43:05.094Z | 2026-01-27T14:55:15.271Z |
| CVE-2026-2320 |
6.5 (3.1)
|
Inappropriate implementation in File input in Goo… |
Google |
Chrome |
2026-02-11T18:08:04.930Z | 2026-02-12T15:11:25.872Z |
| CVE-2026-2321 |
N/A
|
Use after free in Ozone in Google Chrome prior to… |
Google |
Chrome |
2026-02-11T18:08:05.439Z | 2026-02-12T04:55:21.843Z |
| CVE-2026-2322 |
5.4 (3.1)
|
Inappropriate implementation in File input in Goo… |
Google |
Chrome |
2026-02-11T18:08:05.832Z | 2026-02-12T14:05:40.432Z |
| CVE-2026-2323 |
4.3 (3.1)
|
Inappropriate implementation in Downloads in Goog… |
Google |
Chrome |
2026-02-11T18:08:06.261Z | 2026-02-12T17:01:31.747Z |
| CVE-2025-43403 |
5.5 (3.1)
|
An authorization issue was addressed with improve… |
Apple |
macOS |
2026-02-11T22:58:17.254Z | 2026-02-12T17:01:43.381Z |
| CVE-2025-43417 |
5.5 (3.1)
|
A path handling issue was addressed with improved… |
Apple |
macOS |
2026-02-11T22:58:31.572Z | 2026-02-12T16:47:54.266Z |
| CVE-2025-46290 |
7.5 (3.1)
|
A logic issue was addressed with improved checks.… |
Apple |
macOS |
2026-02-11T22:58:34.079Z | 2026-02-12T16:43:15.134Z |
| CVE-2026-20638 |
5.5 (3.1)
|
A logic issue was addressed with improved checks.… |
Apple |
iOS and iPadOS |
2026-02-11T22:58:34.881Z | 2026-02-12T19:34:32.280Z |
| CVE-2026-20645 |
4.6 (3.1)
|
An inconsistent user interface issue was addresse… |
Apple |
iOS and iPadOS |
2026-02-11T22:58:53.527Z | 2026-02-12T19:11:11.631Z |
| CVE-2026-20647 |
5.5 (3.1)
|
This issue was addressed with improved data prote… |
Apple |
macOS |
2026-02-11T22:58:01.687Z | 2026-02-12T15:47:36.057Z |
| CVE-2026-20648 |
5.5 (3.1)
|
A privacy issue was addressed by moving sensitive… |
Apple |
macOS |
2026-02-11T22:59:01.808Z | 2026-02-12T19:02:26.865Z |
| CVE-2026-20650 |
7.5 (3.1)
|
A denial-of-service issue was addressed with impr… |
Apple |
macOS |
2026-02-11T22:58:12.767Z | 2026-02-12T21:26:32.704Z |
| CVE-2026-20652 |
7.5 (3.1)
|
The issue was addressed with improved memory hand… |
Apple |
Safari |
2026-02-11T22:59:04.639Z | 2026-02-12T19:31:21.723Z |
| CVE-2026-20653 |
5.5 (3.1)
|
A parsing issue in the handling of directory path… |
Apple |
macOS |
2026-02-11T22:58:55.426Z | 2026-02-12T19:08:38.616Z |
| CVE-2026-20654 |
N/A
|
The issue was addressed with improved memory hand… |
Apple |
macOS |
2026-02-11T22:58:39.810Z | 2026-02-11T22:58:39.810Z |
| CVE-2026-20655 |
N/A
|
An authorization issue was addressed with improve… |
Apple |
iOS and iPadOS |
2026-02-11T22:58:37.366Z | 2026-02-11T22:58:37.366Z |
| CVE-2026-20656 |
N/A
|
A logic issue was addressed with improved validat… |
Apple |
Safari |
2026-02-11T22:58:23.667Z | 2026-02-11T22:58:23.667Z |
| CVE-2026-20658 |
N/A
|
A package validation issue was addressed by block… |
Apple |
macOS |
2026-02-11T22:58:44.414Z | 2026-02-13T04:56:30.083Z |
| CVE-2026-25593 |
8.4 (3.1)
|
OpenClaw Affected by Unauthenticated Local RCE via Web… |
openclaw |
openclaw |
2026-02-06T20:56:02.824Z | 2026-02-09T15:27:48.829Z |
| CVE-2026-25475 |
6.5 (3.1)
|
OpenClaw Vulnerable to Local File Inclusion via MEDIA:… |
openclaw |
openclaw |
2026-02-04T19:55:36.228Z | 2026-02-05T14:32:36.477Z |
| CVE-2026-20675 |
5.5 (3.1)
|
The issue was addressed with improved bounds chec… |
Apple |
macOS |
2026-02-11T22:58:29.051Z | 2026-02-12T21:30:16.009Z |
| CVE-2025-49756 |
3.3 (3.1)
|
Office Developer Platform Security Feature Bypass Vuln… |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-07-08T16:57:27.411Z | 2026-02-13T19:07:02.680Z |
| CVE-2025-49737 |
7 (3.1)
|
Microsoft Teams Elevation of Privilege Vulnerability |
Microsoft |
Microsoft Teams for Mac, New Edition |
2025-07-08T16:58:14.537Z | 2026-02-13T19:07:49.711Z |
| CVE-2025-49735 |
8.1 (3.1)
|
Windows KDC Proxy Service (KPSSVC) Remote Code Executi… |
Microsoft |
Windows Server 2012 |
2025-07-08T16:57:25.143Z | 2026-02-13T19:07:00.391Z |
| CVE-2026-25157 |
7.8 (3.1)
|
OpenClaw/Clawdbot has OS Command Injection via Project… |
openclaw |
openclaw |
2026-02-04T19:55:38.493Z | 2026-02-05T14:32:32.289Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-2320 | Inappropriate implementation in File input in Google Chrome prior to 145.0.7632.45 allowed a remote… | 2026-02-11T19:15:52.160 | 2026-02-13T14:52:29.383 |
| fkie_cve-2026-2321 | Use after free in Ozone in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convi… | 2026-02-11T19:15:52.273 | 2026-02-13T14:51:48.773 |
| fkie_cve-2026-2322 | Inappropriate implementation in File input in Google Chrome prior to 145.0.7632.45 allowed a remote… | 2026-02-11T19:15:52.400 | 2026-02-13T14:51:37.260 |
| fkie_cve-2026-2323 | Inappropriate implementation in Downloads in Google Chrome prior to 145.0.7632.45 allowed a remote … | 2026-02-11T19:15:52.497 | 2026-02-13T14:51:29.203 |
| fkie_cve-2025-43403 | An authorization issue was addressed with improved state management. This issue is fixed in macOS S… | 2026-02-11T23:16:01.597 | 2026-02-13T14:50:34.183 |
| fkie_cve-2025-43417 | A path handling issue was addressed with improved logic. This issue is fixed in macOS Sonoma 14.8.4… | 2026-02-11T23:16:02.200 | 2026-02-13T14:50:19.590 |
| fkie_cve-2025-46290 | A logic issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, macO… | 2026-02-11T23:16:02.407 | 2026-02-13T14:50:10.343 |
| fkie_cve-2026-20638 | A logic issue was addressed with improved checks. This issue is fixed in iOS 26.3 and iPadOS 26.3. … | 2026-02-11T23:16:06.923 | 2026-02-13T14:48:06.043 |
| fkie_cve-2026-20645 | An inconsistent user interface issue was addressed with improved state management. This issue is fi… | 2026-02-11T23:16:07.430 | 2026-02-13T14:47:57.417 |
| fkie_cve-2026-20647 | This issue was addressed with improved data protection. This issue is fixed in macOS Tahoe 26.3. An… | 2026-02-11T23:16:07.630 | 2026-02-13T14:47:31.107 |
| fkie_cve-2026-20648 | A privacy issue was addressed by moving sensitive data to a protected location. This issue is fixed… | 2026-02-11T23:16:07.730 | 2026-02-13T14:47:19.083 |
| fkie_cve-2026-20650 | A denial-of-service issue was addressed with improved validation. This issue is fixed in watchOS 26… | 2026-02-11T23:16:07.927 | 2026-02-13T14:46:52.993 |
| fkie_cve-2026-20652 | The issue was addressed with improved memory handling. This issue is fixed in macOS Tahoe 26.3, iOS… | 2026-02-11T23:16:08.033 | 2026-02-13T14:46:38.773 |
| fkie_cve-2026-20653 | A parsing issue in the handling of directory paths was addressed with improved path validation. Thi… | 2026-02-11T23:16:08.130 | 2026-02-13T14:46:14.923 |
| fkie_cve-2026-20654 | The issue was addressed with improved memory handling. This issue is fixed in watchOS 26.3, tvOS 26… | 2026-02-11T23:16:08.233 | 2026-02-13T14:45:57.070 |
| fkie_cve-2026-20655 | An authorization issue was addressed with improved state management. This issue is fixed in iOS 26.… | 2026-02-11T23:16:08.330 | 2026-02-13T14:45:45.517 |
| fkie_cve-2026-20656 | A logic issue was addressed with improved validation. This issue is fixed in iOS 18.7.5 and iPadOS … | 2026-02-11T23:16:08.427 | 2026-02-13T14:45:31.937 |
| fkie_cve-2026-20658 | A package validation issue was addressed by blocking the vulnerable package. This issue is fixed in… | 2026-02-11T23:16:08.530 | 2026-02-13T14:45:17.953 |
| fkie_cve-2026-25593 | OpenClaw is a personal AI assistant. Prior to 2026.1.20, an unauthenticated local client could use … | 2026-02-06T21:16:17.790 | 2026-02-13T14:44:08.340 |
| fkie_cve-2026-25475 | OpenClaw is a personal AI assistant. Prior to version 2026.1.30, the isValidMedia() function in src… | 2026-02-04T20:16:07.287 | 2026-02-13T14:42:29.397 |
| fkie_cve-2026-20675 | The issue was addressed with improved bounds checks. This issue is fixed in watchOS 26.3, tvOS 26.3… | 2026-02-11T23:16:09.870 | 2026-02-13T14:39:51.920 |
| fkie_cve-2025-49756 | Use of a broken or risky cryptographic algorithm in Office Developer Platform allows an authorized … | 2025-07-08T17:16:04.020 | 2026-02-13T14:35:27.727 |
| fkie_cve-2025-49737 | Concurrent execution using shared resource with improper synchronization ('race condition') in Micr… | 2025-07-08T17:16:02.460 | 2026-02-13T14:34:47.430 |
| fkie_cve-2025-49735 | Use after free in Windows KDC Proxy Service (KPSSVC) allows an unauthorized attacker to execute cod… | 2025-07-08T17:16:02.270 | 2026-02-13T14:34:19.893 |
| fkie_cve-2026-25157 | OpenClaw is a personal AI assistant. Prior to version 2026.1.29, there is an OS command injection v… | 2026-02-04T20:16:06.577 | 2026-02-13T14:33:31.043 |
| fkie_cve-2025-49731 | Improper handling of insufficient permissions or privileges in Microsoft Teams allows an authorized… | 2025-07-08T17:16:01.653 | 2026-02-13T14:32:33.727 |
| fkie_cve-2026-24763 | OpenClaw (formerly Clawdbot) is a personal AI assistant you run on your own devices. Prior to 2026… | 2026-02-02T23:16:08.593 | 2026-02-13T14:28:51.560 |
| fkie_cve-2026-26225 | Intego Personal Backup, a macOS backup utility that allows users to create scheduled backups and bo… | 2026-02-12T22:16:07.477 | 2026-02-13T14:23:48.007 |
| fkie_cve-2026-26224 | Intego Log Reporter, a macOS diagnostic utility bundled with Intego security products that collects… | 2026-02-12T22:16:07.320 | 2026-02-13T14:23:48.007 |
| fkie_cve-2026-26219 | newbee-mall stores and verifies user passwords using an unsalted MD5 hashing algorithm. The impleme… | 2026-02-12T19:15:52.300 | 2026-02-13T14:23:48.007 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-hjj6-wmh2-qhwj |
4.3 (3.1)
|
The issue was addressed with improved memory handling. This issue is fixed in watchOS 26.3, tvOS 26… | 2026-02-12T00:31:04Z | 2026-02-12T18:30:22Z |
| ghsa-frmq-2cmp-gh32 |
7.1 (3.1)
|
This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Tahoe 26.3, … | 2026-02-12T00:31:04Z | 2026-02-12T18:30:22Z |
| ghsa-c5gm-v7v7-vjx9 |
7.5 (3.1)
|
A path handling issue was addressed with improved logic. This issue is fixed in macOS Tahoe 26.3, m… | 2026-02-12T00:31:05Z | 2026-02-12T18:30:22Z |
| ghsa-8cmp-jqmx-pj7w |
4.6 (3.1)
|
The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.7.4,… | 2026-02-12T00:31:04Z | 2026-02-12T18:30:22Z |
| ghsa-649p-9q32-vwxc |
5.5 (3.1)
|
This issue was addressed with improved data protection. This issue is fixed in macOS Tahoe 26.3. An… | 2026-02-12T00:31:04Z | 2026-02-12T18:30:22Z |
| ghsa-3ww4-528c-xcv7 |
5.5 (3.1)
|
A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Tahoe … | 2026-02-12T00:31:04Z | 2026-02-12T18:30:22Z |
| ghsa-2jw9-xm3m-75jh |
5.5 (3.1)
|
The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, i… | 2026-02-12T00:31:04Z | 2026-02-12T18:30:22Z |
| ghsa-2hr4-372m-m24q |
7.8 (3.1)
|
This issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 26.… | 2026-02-12T00:31:04Z | 2026-02-12T18:30:22Z |
| ghsa-xmr6-mm5f-8mf2 |
4.9 (3.1)
1.2 (4.0)
|
A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system … | 2026-02-11T15:30:26Z | 2026-02-12T18:30:21Z |
| ghsa-vf98-8xxx-fp8w |
4.9 (3.1)
1.2 (4.0)
|
A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system … | 2026-02-11T15:30:26Z | 2026-02-12T18:30:21Z |
| ghsa-rj79-m8w5-gpw8 |
6.5 (3.1)
|
Inappropriate implementation in File input in Google Chrome prior to 145.0.7632.45 allowed a remote… | 2026-02-11T21:30:40Z | 2026-02-12T18:30:21Z |
| ghsa-mw3g-2cmq-pj57 |
7.5 (3.1)
|
An issue in Statping-ng v.0.91.0 allows an attacker to obtain sensitive information via a crafted r… | 2026-02-11T21:30:40Z | 2026-02-12T18:30:21Z |
| ghsa-m4mv-q6m2-24j4 |
5.5 (3.1)
|
The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, i… | 2026-02-12T00:31:03Z | 2026-02-12T18:30:21Z |
| ghsa-hfmq-6wjv-c7r3 |
9.8 (3.1)
|
An issue was discovered in OpenSatKit 2.2.1. The EventErrStr buffer has a fixed size of 256 bytes. … | 2026-02-11T18:31:31Z | 2026-02-12T18:30:21Z |
| ghsa-h9c8-jr46-gp7p |
8.8 (3.1)
|
Unrestricted Upload of File with Dangerous Type vulnerabilities exist in the rich text editor and d… | 2026-02-11T21:30:42Z | 2026-02-12T18:30:21Z |
| ghsa-gvjm-pmwp-75mw |
6.5 (3.1)
|
Inappropriate implementation in Animation in Google Chrome prior to 145.0.7632.45 allowed a remote … | 2026-02-11T21:30:40Z | 2026-02-12T18:30:21Z |
| ghsa-g32q-3228-m26p |
5.5 (3.1)
|
A path handling issue was addressed with improved logic. This issue is fixed in macOS Sonoma 14.8.4… | 2026-02-12T00:31:03Z | 2026-02-12T18:30:21Z |
| ghsa-fmxw-gfwm-67w3 |
7.5 (3.1)
|
The /dbviewer/ web endpoint in METIS WIC devices is exposed without authentication. A remote attack… | 2026-02-11T15:30:27Z | 2026-02-12T18:30:21Z |
| ghsa-f7qx-wh9j-7278 |
5.5 (3.1)
|
The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, i… | 2026-02-12T00:31:03Z | 2026-02-12T18:30:21Z |
| ghsa-f24m-jwf4-xpxc |
5.5 (3.1)
|
An authorization issue was addressed with improved state management. This issue is fixed in macOS S… | 2026-02-12T00:31:03Z | 2026-02-12T18:30:21Z |
| ghsa-cp3m-5wf6-4649 |
9.8 (3.1)
|
METIS WIC devices (versions <= oscore 2.1.234-r18) expose a web-based shell at the /console endpoin… | 2026-02-11T15:30:27Z | 2026-02-12T18:30:21Z |
| ghsa-c37x-p7mp-hh29 |
6.5 (3.1)
|
Insufficient policy enforcement in Frames in Google Chrome prior to 145.0.7632.45 allowed a remote … | 2026-02-11T21:30:39Z | 2026-02-12T18:30:21Z |
| ghsa-99pv-pwgp-5cm5 |
5.5 (3.1)
|
The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, i… | 2026-02-12T00:31:04Z | 2026-02-12T18:30:21Z |
| ghsa-96rf-whf9-r5vh |
8.8 (3.1)
|
Vulnerabilities in the My Account and User Management components in CIPPlanner CIPAce before 9.17 a… | 2026-02-12T00:31:03Z | 2026-02-12T18:30:21Z |
| ghsa-926h-3qgq-9w39 |
7.5 (3.1)
|
A logic issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, macO… | 2026-02-12T00:31:03Z | 2026-02-12T18:30:21Z |
| ghsa-6r9h-3c6p-4chm |
8.1 (3.1)
|
A race condition vulnerability exists in MedusaJS Medusa v2.12.2 and earlier in the registerUsage()… | 2026-02-11T21:30:39Z | 2026-02-12T18:30:21Z |
| ghsa-3x5q-gxp5-wv27 |
9.8 (3.1)
|
METIS DFS devices (versions <= oscore 2.1.234-r18) expose a web-based shell at the /console endpoin… | 2026-02-11T15:30:27Z | 2026-02-12T18:30:21Z |
| ghsa-3wh2-2wc5-f45w |
9.8 (3.1)
9.2 (4.0)
|
A link following vulnerability has been reported to affect several QNAP operating system versions. … | 2026-02-11T15:30:26Z | 2026-02-12T18:30:21Z |
| ghsa-3rgq-74p3-8xc5 |
4.9 (3.1)
1.2 (4.0)
|
A use of uninitialized variable vulnerability has been reported to affect several QNAP operating sy… | 2026-02-11T15:30:26Z | 2026-02-12T18:30:21Z |
| ghsa-3fcr-xq7p-rffp |
7.5 (3.1)
|
Vulnerabilities in the File Download and Get File handler components in CIPPlanner CIPAce before 9.… | 2026-02-12T00:31:03Z | 2026-02-12T18:30:21Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-109 |
7.8 (3.1)
|
DeepSpeed Remote Code Execution Vulnerability | deepspeed | 2024-10-08T18:15:00+00:00 | 2024-10-17T23:22:43.000269+00:00 |
| pysec-2024-108 |
7.5 (3.1)
|
A path traversal vulnerability exists in the parisneo/lollms application, affecting versi… | lollms | 2024-06-06T19:16:00+00:00 | 2024-10-17T17:21:59.592496+00:00 |
| pysec-2021-879 |
6.5 (3.1)
|
An uncontrolled memory allocation in DataBufdata(subBox.length-sizeof(box)) function of E… | exiv2 | 2021-08-19T22:15:00+00:00 | 2024-10-15T17:22:01.866867+00:00 |
| pysec-2024-105 |
3.1 (3.1)
|
A race condition vulnerability exists in zenml-io/zenml versions up to and including 0.55… | zenml | 2024-06-06T19:15:00+00:00 | 2024-10-11T17:21:29.672975+00:00 |
| pysec-2024-104 |
5.3 (3.1)
|
A vulnerability was found in JWCrypto. This flaw allows an attacker to cause a denial of … | jwcrypto | 2024-02-12T14:15:00+00:00 | 2024-10-10T17:22:00.587279+00:00 |
| pysec-2024-103 |
9.8 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. The `concat… | vyper | 2024-01-18T19:15:00+00:00 | 2024-10-09T23:22:49.818476+00:00 |
| pysec-2023-262 |
9.8 (3.1)
|
main.py in Searchor before 2.4.2 uses eval on CLI input, which may cause unexpected code … | searchor | 2023-12-12T18:15:00+00:00 | 2024-10-09T19:20:24.594458+00:00 |
| pysec-2023-243 |
7.4 (3.1)
|
Missing SSL certificate validation in localstack v2.3.2 allows attackers to eavesdrop on … | localstack | 2023-11-16T18:15:00Z | 2024-10-09T12:05:48.156835Z |
| pysec-2024-102 |
|
An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.… | django | 2024-10-08T16:15:00+00:00 | 2024-10-08T19:19:01.400873+00:00 |
| pysec-2024-101 |
6.5 (3.1)
|
OpenC3 COSMOS provides the functionality needed to send commands to and receive data from… | openc3 | 2024-10-02T20:15:00+00:00 | 2024-10-08T17:22:06.539206+00:00 |
| pysec-2024-100 |
6.1 (3.1)
|
OpenC3 COSMOS provides the functionality needed to send commands to and receive data from… | openc3 | 2024-10-02T20:15:00+00:00 | 2024-10-08T17:22:06.493109+00:00 |
| pysec-2024-99 |
7.5 (3.1)
|
OpenSlides 4.0.15 was discovered to be using a weak hashing algorithm to store passwords. | openslides | 2024-09-25T15:15:00+00:00 | 2024-10-01T21:22:35.777428+00:00 |
| pysec-2023-261 |
9.8 (3.1)
|
SAP BTP Security Services Integration Library ([Python] sap-xssec) - versions < 4.1.0, al… | sap-xssec | 2023-12-12T02:15:00+00:00 | 2024-09-29T00:37:11.092461+00:00 |
| pysec-2024-98 |
9.8 (3.1)
|
** UNSUPPORTED WHEN ASSIGNED ** Incorrect Authorization vulnerability in Apache Submarine… | apache-submarine | 2024-06-12T15:15:00+00:00 | 2024-09-26T17:22:54.526846+00:00 |
| pysec-2024-97 |
9.8 (3.1)
|
** UNSUPPORTED WHEN ASSIGNED ** Improper Authentication vulnerability in Apache Submarine… | apache-submarine | 2024-06-12T14:15:00+00:00 | 2024-09-26T17:22:54.470974+00:00 |
| pysec-2024-96 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affe… | micropython-string | 2024-09-17T19:15:00+00:00 | 2024-09-25T06:23:56.151249+00:00 |
| pysec-2024-95 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affe… | micropython-os-path | 2024-09-17T19:15:00+00:00 | 2024-09-25T06:23:56.045949+00:00 |
| pysec-2024-94 |
8.1 (3.1)
|
A vulnerability was found in MicroPython 1.22.2. It has been declared as critical. Affect… | micropython-io | 2024-09-17T19:15:00+00:00 | 2024-09-25T06:23:55.930133+00:00 |
| pysec-2024-93 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affe… | micropython-io | 2024-09-17T19:15:00+00:00 | 2024-09-25T06:23:55.864558+00:00 |
| pysec-2024-92 |
8.1 (3.1)
|
A vulnerability was found in MicroPython 1.22.2. It has been declared as critical. Affect… | micropython-copy | 2024-09-17T19:15:00+00:00 | 2024-09-25T06:23:55.787891+00:00 |
| pysec-2024-91 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been classified as critical. Affe… | micropython-copy | 2024-09-17T19:15:00+00:00 | 2024-09-25T06:23:55.729708+00:00 |
| pysec-2024-90 |
6.1 (3.1)
|
Indico is an event management system that uses Flask-Multipass, a multi-backend authentic… | indico | 2024-09-04T20:15:00+00:00 | 2024-09-25T06:23:55.564403+00:00 |
| pysec-2024-89 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been rated as critical. Affected … | micropython-os | 2024-09-17T19:15:00+00:00 | 2024-09-23T21:22:09.689786+00:00 |
| pysec-2024-88 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been rated as critical. Affected … | micropython-io | 2024-09-17T19:15:00+00:00 | 2024-09-23T21:22:09.570550+00:00 |
| pysec-2024-87 |
7.5 (3.1)
|
A vulnerability was found in MicroPython 1.23.0. It has been rated as critical. Affected … | micropython-copy | 2024-09-17T19:15:00+00:00 | 2024-09-23T21:22:09.445188+00:00 |
| pysec-2024-86 |
4.9 (3.1)
|
Wagtail is an open source content management system built on Django. A bug in Wagtail's `… | wagtail | 2024-07-11T16:15:00+00:00 | 2024-09-19T19:20:17.668744+00:00 |
| pysec-2024-72 |
8.8 (3.1)
|
LF Edge eKuiper is a lightweight IoT data analytics and stream processing engine running … | ekuiper | 2024-08-20T15:15:00Z | 2024-09-18T07:04:07.042699Z |
| pysec-2024-81 |
8.8 (3.1)
|
An arbitrary code execution vulnerability exists in versions 23.10.5.0 up to 24.7.4.1 of … | mindsdb | 2024-09-12T13:15:00+00:00 | 2024-09-16T19:20:05.004524+00:00 |
| pysec-2024-80 |
8.8 (3.1)
|
An arbitrary code execution vulnerability exists in versions 23.10.5.0 up to 24.7.4.1 of … | mindsdb | 2024-09-12T13:15:00+00:00 | 2024-09-16T19:20:04.922906+00:00 |
| pysec-2024-79 |
8.8 (3.1)
|
An arbitrary code execution vulnerability exists in versions 23.10.5.0 up to 24.7.4.1 of … | mindsdb | 2024-09-12T13:15:00+00:00 | 2024-09-16T19:20:04.841635+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33523 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.634683Z |
| gsd-2024-33522 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.605717Z |
| gsd-2024-33521 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.759531Z |
| gsd-2024-33520 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.731072Z |
| gsd-2024-33519 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.616036Z |
| gsd-2024-33518 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.701479Z |
| gsd-2024-33517 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.679527Z |
| gsd-2024-33516 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.726125Z |
| gsd-2024-33515 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.719673Z |
| gsd-2024-33514 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.707115Z |
| gsd-2024-33513 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.687157Z |
| gsd-2024-33512 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.696971Z |
| gsd-2024-33511 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.739229Z |
| gsd-2024-33510 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.737559Z |
| gsd-2024-33509 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.713025Z |
| gsd-2024-33508 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.631914Z |
| gsd-2024-33507 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.762188Z |
| gsd-2024-33506 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.716022Z |
| gsd-2024-33505 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.761772Z |
| gsd-2024-33504 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.762620Z |
| gsd-2024-33503 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.740448Z |
| gsd-2024-33502 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.617928Z |
| gsd-2024-33501 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.618843Z |
| gsd-2024-33500 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.681053Z |
| gsd-2024-33499 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.696759Z |
| gsd-2024-33498 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.620725Z |
| gsd-2024-33497 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.608373Z |
| gsd-2024-33496 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.734379Z |
| gsd-2024-33495 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.615415Z |
| gsd-2024-33494 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.649122Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-321 | Malicious code in flip-prx (npm) | 2026-01-16T11:12:53Z | 2026-01-23T01:39:00Z |
| mal-2026-463 | Malicious code in corporate-blocking (npm) | 2026-01-22T12:17:58Z | 2026-01-23T01:38:59Z |
| mal-2026-458 | Malicious code in csv-parsing-xz (npm) | 2026-01-22T09:02:30Z | 2026-01-23T01:38:59Z |
| mal-2026-457 | Malicious code in csv-parsing-xx (npm) | 2026-01-22T09:02:29Z | 2026-01-23T01:38:59Z |
| mal-2026-435 | Malicious code in aligntype (npm) | 2026-01-21T06:49:59Z | 2026-01-23T01:38:59Z |
| mal-2026-414 | Malicious code in debox-rn (npm) | 2026-01-21T04:46:05Z | 2026-01-23T01:38:59Z |
| mal-2026-413 | Malicious code in coopshares-webcomponent (npm) | 2026-01-21T04:39:38Z | 2026-01-23T01:38:59Z |
| mal-2026-412 | Malicious code in connect-web (npm) | 2026-01-21T04:39:39Z | 2026-01-23T01:38:59Z |
| mal-2026-411 | Malicious code in collaborate (npm) | 2026-01-21T04:39:39Z | 2026-01-23T01:38:59Z |
| mal-2026-410 | Malicious code in clerk-js (npm) | 2026-01-21T04:39:39Z | 2026-01-23T01:38:59Z |
| mal-2026-409 | Malicious code in chai-async-test (npm) | 2026-01-21T04:51:11Z | 2026-01-23T01:38:59Z |
| mal-2026-408 | Malicious code in bitbot (npm) | 2026-01-21T04:39:38Z | 2026-01-23T01:38:59Z |
| mal-2026-407 | Malicious code in babel-js (npm) | 2026-01-21T04:48:23Z | 2026-01-23T01:38:59Z |
| mal-2026-406 | Malicious code in aws-crt-nodejs (npm) | 2026-01-21T04:46:06Z | 2026-01-23T01:38:59Z |
| mal-2026-405 | Malicious code in anthropic-sdk (npm) | 2026-01-21T04:34:17Z | 2026-01-23T01:38:59Z |
| mal-2026-388 | Malicious code in charlie_charlie_kirky (npm) | 2026-01-21T04:00:58Z | 2026-01-23T01:38:59Z |
| mal-2026-387 | Malicious code in chai-dex (npm) | 2026-01-21T04:24:06Z | 2026-01-23T01:38:59Z |
| mal-2026-386 | Malicious code in chai-chain-async (npm) | 2026-01-21T04:23:01Z | 2026-01-23T01:38:59Z |
| mal-2026-385 | Malicious code in blocks-builder-manifest-generator (npm) | 2026-01-21T03:56:28Z | 2026-01-23T01:38:59Z |
| mal-2026-357 | Malicious code in chai-bin (npm) | 2026-01-20T03:57:46Z | 2026-01-23T01:38:59Z |
| mal-2026-337 | Malicious code in chai-as-executed (npm) | 2026-01-19T00:56:45Z | 2026-01-23T01:38:59Z |
| mal-2026-331 | Malicious code in cyrpto (npm) | 2026-01-19T00:43:31Z | 2026-01-23T01:38:59Z |
| mal-2026-465 | Malicious code in @ikeacn/utils (npm) | 2026-01-22T15:49:16Z | 2026-01-23T01:38:58Z |
| mal-2026-464 | Malicious code in @ikeacn/icons (npm) | 2026-01-22T15:49:16Z | 2026-01-23T01:38:58Z |
| mal-2026-462 | Malicious code in @ikeacn/ui (npm) | 2026-01-22T12:23:23Z | 2026-01-23T01:38:58Z |
| mal-2026-461 | Malicious code in @corp-front/corporate-filter-company-select (npm) | 2026-01-22T12:24:27Z | 2026-01-23T01:38:58Z |
| mal-2026-456 | Malicious code in @mailpoet/eslint-config (npm) | 2026-01-22T09:07:20Z | 2026-01-23T01:38:58Z |
| mal-2026-455 | Malicious code in @mailpoet/components (npm) | 2026-01-22T09:07:20Z | 2026-01-23T01:38:58Z |
| mal-2026-454 | Malicious code in @mailpoet/component (npm) | 2026-01-22T09:07:20Z | 2026-01-23T01:38:58Z |
| mal-2026-453 | Malicious code in @fortinet/fortigate-autoscale (npm) | 2026-01-22T09:07:20Z | 2026-01-23T01:38:58Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2416 | Proxmox Backup Server: Mehrere Schwachstellen | 2025-10-26T23:00:00.000+00:00 | 2025-11-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2058 | Apple Safari: Mehrere Schwachstellen | 2025-09-15T22:00:00.000+00:00 | 2025-11-03T23:00:00.000+00:00 |
| wid-sec-w-2025-2445 | Google Chrome/Microsoft Edge: Mehrere Schwachstellen | 2025-10-29T23:00:00.000+00:00 | 2025-11-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2334 | Squid: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen und Offenlegung von Informationen | 2025-10-16T22:00:00.000+00:00 | 2025-11-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2444 | Dell Secure Connect Gateway: Mehrere Schwachstellen | 2025-10-29T23:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2427 | strongSwan (eap-mschapv2 plugin): Schwachstelle ermöglicht Codeausführung und DoS | 2025-10-27T23:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2403 | Ubiquiti UniFi: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-10-23T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2398 | Moxa Switch: Mehrere Schwachstellen | 2025-10-23T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2375 | Google Chrome: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-10-21T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2344 | Checkmk: Schwachstelle ermöglicht Cross-Site Scripting | 2025-10-20T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2339 | ImageMagick (BMP decoder): Schwachstelle ermöglicht Denial of Service | 2025-10-19T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2317 | Ubiquiti UniFi: Schwachstelle ermöglicht Ausführung von Debug-Funktionen | 2025-10-15T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2274 | Veeam Backup & Replication: Mehrere Schwachstellen | 2025-10-13T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2247 | Nvidia GPU Display Treiber: Mehrere Schwachstellen | 2025-10-08T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2150 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-09-29T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2132 | Linux Kernel: Mehrere Schwachstellen | 2025-09-24T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2114 | Dell PowerEdge BIOS und iDRAC9: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-09-23T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2002 | libssh: Schwachstelle ermöglicht Denial of Service | 2025-09-09T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-1974 | Podman: Schwachstelle ermöglicht Manipulation von Dateien | 2025-09-04T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-1921 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-08-27T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2440 | Red Hat JBoss Enterprise Application Platform: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes | 2015-11-22T23:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-2395 | Rancher Manager: Mehrere Schwachstellen | 2025-10-23T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-2390 | PowerDNS Recursor: Mehrere Schwachstellen ermöglichen Manipulation von Dateien | 2025-10-22T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-2385 | Drupal Module: Mehrere Schwachstellen | 2025-10-22T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-2275 | Mozilla Firefox: Mehrere Schwachstellen | 2025-10-14T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-2126 | Drupal Module: Mehrere Schwachstellen | 2025-09-24T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-1954 | Drupal: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-09-03T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-1785 | Intel Prozessoren: Mehrere Schwachstellen | 2025-08-12T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-1656 | Red Hat Enterprise Linux (unbound): Schwachstelle ermöglicht Manipulation von Daten | 2025-07-27T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-1055 | Node.js: Mehrere Schwachstellen | 2025-05-14T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0403 | Kwetsbaarheid verholpen in Mozilla Firefox | 2024-10-10T07:20:38.171954Z | 2024-10-10T07:20:38.171954Z |
| ncsc-2024-0402 | Kwetsbaarheden verholpen in Adobe Commerce en Magento | 2024-10-09T13:38:09.912496Z | 2024-10-09T13:38:09.912496Z |
| ncsc-2024-0401 | Kwetsbaarheid verholpen in Ivanti Endpoint Manager Mobile | 2024-10-09T11:21:34.434721Z | 2024-10-09T11:21:34.434721Z |
| ncsc-2024-0400 | Kwetsbaarheden verholpen in Ivanti Avalanche | 2024-10-09T10:45:10.558311Z | 2024-10-09T10:45:10.558311Z |
| ncsc-2024-0399 | Kwetsbaarheden verholpen in Ivanti Cloud Services Appliance | 2024-10-09T09:49:35.398654Z | 2024-10-09T09:49:35.398654Z |
| ncsc-2024-0397 | Kwetsbaarheden verholpen in Microsoft System Center | 2024-10-08T20:02:55.249830Z | 2024-10-08T20:02:55.249830Z |
| ncsc-2024-0396 | Kwetsbaarheden verholpen in Microsoft Office | 2024-10-08T20:00:57.142744Z | 2024-10-08T20:00:57.142744Z |
| ncsc-2024-0395 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2024-10-08T19:59:28.385237Z | 2024-10-08T19:59:28.385237Z |
| ncsc-2024-0394 | Kwetsbaarheden verholpen in Microsoft SQL Server Power BI Report Server | 2024-10-08T19:58:15.839568Z | 2024-10-08T19:58:15.839568Z |
| ncsc-2024-0393 | Kwetsbaarheden verholpen in Microsoft Azure componenten | 2024-10-08T19:57:08.426643Z | 2024-10-08T19:57:08.426643Z |
| ncsc-2024-0392 | Kwetsbaarheden verholpen in Microsoft Windows | 2024-10-08T19:55:28.028805Z | 2024-10-08T19:55:28.028805Z |
| ncsc-2024-0391 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2024-10-08T13:55:56.095947Z | 2024-10-08T13:55:56.095947Z |
| ncsc-2024-0390 | Kwetsbaarheden verholpen in Siemens producten | 2024-10-08T13:49:37.486004Z | 2024-10-08T13:49:37.486004Z |
| ncsc-2024-0389 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2024-10-04T10:11:42.963861Z | 2024-10-04T10:11:42.963861Z |
| ncsc-2024-0388 | Kwetsbaarheden verholpen in Draytek Vigor routers | 2024-10-04T09:52:41.945864Z | 2024-10-04T09:52:41.945864Z |
| ncsc-2024-0387 | Kwetsbaarheden verholpen in Mozilla Firefox en Thunderbird | 2024-10-02T09:07:21.241299Z | 2024-10-02T09:07:21.241299Z |
| ncsc-2024-0384 | Kwetsbaarheden ontdekt in CUPS | 2024-09-27T08:45:53.798141Z | 2024-10-02T08:45:09.718543Z |
| ncsc-2024-0385 | Kwetsbaarheden verholpen in Foxit PDF Editor en PDF Reader | 2024-09-30T09:41:20.295003Z | 2024-09-30T09:41:20.295003Z |
| ncsc-2024-0383 | Kwetsbaarheden verholpen in Aruba Networks ArubaOS | 2024-09-26T09:00:05.136774Z | 2024-09-26T09:00:05.136774Z |
| ncsc-2024-0382 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2024-09-26T08:52:21.805564Z | 2024-09-26T08:52:21.805564Z |
| ncsc-2024-0381 | Kwetsbaarheden verholpen in Apple MacOS | 2024-09-26T08:48:34.451990Z | 2024-09-26T08:48:34.451990Z |
| ncsc-2024-0380 | Kwetsbaarheid verholpen in pgAdmin | 2024-09-24T06:36:30.438686Z | 2024-09-24T07:31:32.768856Z |
| ncsc-2024-0379 | Kwetsbaarheden verholpen in Ivanti Cloud Services Appliance | 2024-09-20T07:57:16.737952Z | 2024-09-20T07:57:16.737952Z |
| ncsc-2024-0378 | Kwetsbaarheden verholpen in SAP producten | 2024-09-19T11:37:39.757598Z | 2024-09-19T11:37:39.757598Z |
| ncsc-2024-0376 | Kwetsbaarheden verholpen in Docker Desktop | 2024-09-18T11:25:01.116345Z | 2024-09-18T11:25:01.116345Z |
| ncsc-2024-0369 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2024-09-11T09:39:20.224400Z | 2024-09-13T17:00:35.302643Z |
| ncsc-2024-0375 | Kwetsbaarheid verholpen in Rockwell Automation FactoryTalk View Site | 2024-09-13T08:52:23.143943Z | 2024-09-13T08:52:23.143943Z |
| ncsc-2024-0374 | Kwetsbaarheid verholpen in Rockwell Automation ThinManager | 2024-09-13T08:46:33.745410Z | 2024-09-13T08:46:33.745410Z |
| ncsc-2024-0373 | Kwetsbaarheden verholpen in GitLab Enterprise Edition en Community Edition | 2024-09-13T08:44:24.003809Z | 2024-09-13T08:44:24.003809Z |
| ncsc-2024-0372 | Kwetsbaarheden verholpen in Citrix Workspace App for Windows | 2024-09-13T08:42:05.882665Z | 2024-09-13T08:42:05.882665Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-942865 | SSA-942865: Multiple Vulnerabilities in the Integrated SCALANCE S615 of SINAMICS Medium Voltage Products | 2023-06-13T00:00:00Z | 2023-06-14T00:00:00Z |
| ssa-988345 | SSA-988345: Local Privilege Escalation Vulnerability in Xpedition Designer | 2022-06-14T00:00:00Z | 2023-06-13T00:00:00Z |
| ssa-914026 | SSA-914026: Local Code Execution Vulnerability in SIMATIC WinCC V7 | 2023-06-13T00:00:00Z | 2023-06-13T00:00:00Z |
| ssa-887249 | SSA-887249: Multiple Vulnerabilities in the Web Interface of SICAM Q200 Devices | 2023-06-13T00:00:00Z | 2023-06-13T00:00:00Z |
| ssa-824231 | SSA-824231: Unauthenticated Firmware Upload Vulnerability in Desigo PX Controllers | 2018-01-24T00:00:00Z | 2023-06-13T00:00:00Z |
| ssa-731916 | SSA-731916: Multiple Vulnerabilities in CPCI85 Firmware of SICAM A8000 Devices | 2023-06-13T00:00:00Z | 2023-06-13T00:00:00Z |
| ssa-572005 | SSA-572005: Vulnerabilities in the Web Server of SICAM P850 and SICAM P855 Devices | 2022-10-11T00:00:00Z | 2023-06-13T00:00:00Z |
| ssa-538795 | SSA-538795: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2023-06-13T00:00:00Z | 2023-06-13T00:00:00Z |
| ssa-508677 | SSA-508677: Use of Obsolete Function Vulnerability in SIMATIC WinCC before V8 | 2023-06-13T00:00:00Z | 2023-06-13T00:00:00Z |
| ssa-482956 | SSA-482956: Information Disclosure Vulnerability in SIMOTION before V5.5 | 2023-06-13T00:00:00Z | 2023-06-13T00:00:00Z |
| ssa-120378 | SSA-120378: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2022-11-08T00:00:00Z | 2023-06-13T00:00:00Z |
| ssa-892048 | SSA-892048: Third-Party Component Vulnerabilities in SINEC NMS before V1.0.3.1 | 2023-05-09T00:00:00Z | 2023-05-09T00:00:00Z |
| ssa-789345 | SSA-789345: Code Execution Vulnerabilities in Siveillance Video Event and Management Servers | 2023-05-09T00:00:00Z | 2023-05-09T00:00:00Z |
| ssa-632164 | SSA-632164: External Entity Injection Vulnerability in Polarion ALM | 2023-04-11T00:00:00Z | 2023-05-09T00:00:00Z |
| ssa-592007 | SSA-592007: Denial of Service Vulnerability in Industrial Products | 2018-03-20T00:00:00Z | 2023-05-09T00:00:00Z |
| ssa-555292 | SSA-555292: Security Vulnerabilities Fixed in SIMATIC Cloud Connect 7 V2.1 | 2023-05-09T00:00:00Z | 2023-05-09T00:00:00Z |
| ssa-480230 | SSA-480230: Denial of Service Vulnerability in Webserver of Industrial Products | 2019-04-09T00:00:00Z | 2023-05-09T00:00:00Z |
| ssa-325383 | SSA-325383: Multiple Vulnerabilities in SCALANCE LPE9403 before V2.1 | 2023-05-09T00:00:00Z | 2023-05-09T00:00:00Z |
| ssa-113131 | SSA-113131: Denial of Service Vulnerabilities in SIMATIC S7-400 CPUs | 2018-11-13T00:00:00Z | 2023-05-09T00:00:00Z |
| ssa-978220 | SSA-978220: Denial of Service Vulnerability over SNMP in Multiple Industrial Products | 2020-02-11T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-840188 | SSA-840188: Multiple Vulnerabilities in SIMATIC WinCC Affecting Other SIMATIC Software Products | 2021-11-09T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-838121 | SSA-838121: Multiple Denial of Service Vulnerabilities in Industrial Products | 2022-02-08T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-792594 | SSA-792594: Host Header Injection Vulnerability in Polarion ALM | 2022-12-13T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-700053 | SSA-700053: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2022-12-13T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-699404 | SSA-699404: Observable Response Discrepancy in Mendix Forgot Password Module | 2023-04-11T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-676336 | SSA-676336: OpenSSH Vulnerabilities in SCALANCE X-200 and X-300/X408 Switches | 2021-09-14T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-642810 | SSA-642810: JT File Parsing Vulnerability in JT Open and JT Utilities | 2023-04-11T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-629917 | SSA-629917: Datalogics File Parsing Vulnerability in Teamcenter Visualization and JT2Go | 2023-04-11T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-603476 | SSA-603476: Web Vulnerabilities in SIMATIC NET CP 343-1/CP 443-1 Modules and SIMATIC S7-300/S7-400 CPUs | 2016-11-21T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-572164 | SSA-572164: Luxion KeyShot Vulnerability in Solid Edge | 2023-04-11T00:00:00Z | 2023-04-11T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2023:6271 | Red Hat Security Advisory: OpenShift Container Platform 4.11.53 security and extras update | 2023-11-08T09:43:47+00:00 | 2026-02-16T01:08:18+00:00 |
| rhsa-2023:6269 | Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.12.1 | 2023-11-15T03:12:52+00:00 | 2026-02-16T01:08:17+00:00 |
| rhsa-2023:6257 | Red Hat Security Advisory: OpenShift Container Platform 4.13.21 bug fix and security update | 2023-11-08T08:43:21+00:00 | 2026-02-16T01:08:16+00:00 |
| rhsa-2023:6256 | Red Hat Security Advisory: OpenShift Container Platform 4.13.21 security and extras update | 2023-11-08T08:40:09+00:00 | 2026-02-16T01:08:16+00:00 |
| rhsa-2023:6251 | Red Hat Security Advisory: OpenShift Virtualization 4.11.7 Images security and bug fix update | 2023-11-01T16:14:42+00:00 | 2026-02-16T01:08:16+00:00 |
| rhsa-2023:6248 | Red Hat Security Advisory: OpenShift Virtualization 4.12.8 Images security update | 2023-11-01T14:42:20+00:00 | 2026-02-16T01:08:15+00:00 |
| rhsa-2023:6243 | Red Hat Security Advisory: openshift-gitops-kam security update | 2023-11-01T14:08:03+00:00 | 2026-02-16T01:08:14+00:00 |
| rhsa-2023:6240 | Red Hat Security Advisory: OpenShift Container Platform 4.13 low-latency extras security update | 2023-11-01T13:41:55+00:00 | 2026-02-16T01:08:14+00:00 |
| rhsa-2023:6235 | Red Hat Security Advisory: OpenShift Virtualization 4.13.5 Images security update | 2023-11-01T12:04:35+00:00 | 2026-02-16T01:08:13+00:00 |
| rhsa-2023:6233 | Red Hat Security Advisory: Red Hat OpenShift Enterprise security update | 2023-11-01T11:34:35+00:00 | 2026-02-16T01:08:13+00:00 |
| rhsa-2023:6220 | Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.10.1 security update | 2023-10-31T18:22:09+00:00 | 2026-02-16T01:08:12+00:00 |
| rhsa-2023:6217 | Red Hat Security Advisory: Red Hat OpenShift Enterprise security update | 2023-10-31T14:40:40+00:00 | 2026-02-16T01:08:11+00:00 |
| rhsa-2023:6202 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6.8 security and bug fix updates | 2023-10-30T20:13:48+00:00 | 2026-02-16T01:08:10+00:00 |
| rhsa-2023:6172 | Red Hat Security Advisory: Red Hat Product OCP Tools 4.12 Openshift Jenkins security update | 2023-10-30T11:24:00+00:00 | 2026-02-16T01:08:10+00:00 |
| rhsa-2023:6200 | Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.1.9 security updates and bug fixes | 2023-10-30T18:15:21+00:00 | 2026-02-16T01:08:09+00:00 |
| rhsa-2023:6179 | Red Hat Security Advisory: Red Hat Product OCP Tools 4.13 OpenShift Jenkins security update | 2023-10-30T13:03:06+00:00 | 2026-02-16T01:08:09+00:00 |
| rhsa-2023:6171 | Red Hat Security Advisory: Red Hat Product OCP Tools 4.11 Openshift Jenkins security update | 2023-10-30T11:10:10+00:00 | 2026-02-16T01:08:08+00:00 |
| rhsa-2023:6165 | Red Hat Security Advisory: skupper-cli and skupper-router security update | 2023-10-30T08:22:15+00:00 | 2026-02-16T01:08:07+00:00 |
| rhsa-2023:6161 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.14 security and bug fix update | 2023-10-30T02:16:18+00:00 | 2026-02-16T01:08:07+00:00 |
| rhsa-2023:6156 | Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 8.1.0 security update | 2023-10-30T00:25:10+00:00 | 2026-02-16T01:08:05+00:00 |
| rhsa-2023:6154 | Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.2.0 | 2023-11-01T00:30:41+00:00 | 2026-02-16T01:08:05+00:00 |
| rhsa-2023:6143 | Red Hat Security Advisory: OpenShift Container Platform 4.14.0 CNF vRAN extras security update | 2023-10-26T16:29:51+00:00 | 2026-02-16T01:08:05+00:00 |
| rhsa-2023:6130 | Red Hat Security Advisory: OpenShift Container Platform 4.13.19 bug fix and security update | 2023-10-30T13:49:24+00:00 | 2026-02-16T01:08:03+00:00 |
| rhsa-2023:6129 | Red Hat Security Advisory: OpenShift Container Platform 4.13.19 security and extras update | 2023-10-30T12:59:18+00:00 | 2026-02-16T01:08:02+00:00 |
| rhsa-2023:6126 | Red Hat Security Advisory: OpenShift Container Platform 4.12.41 bug fix and security update | 2023-11-01T11:07:20+00:00 | 2026-02-16T01:08:01+00:00 |
| rhsa-2023:6125 | Red Hat Security Advisory: OpenShift Container Platform 4.12.41 security and extras update | 2023-11-01T10:27:35+00:00 | 2026-02-16T01:08:01+00:00 |
| rhsa-2023:6121 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.8.1 security and bug fix update | 2023-10-25T15:56:00+00:00 | 2026-02-16T01:08:00+00:00 |
| rhsa-2023:6118 | Red Hat Security Advisory: OpenShift API for Data Protection security update | 2023-10-25T14:23:36+00:00 | 2026-02-16T01:07:59+00:00 |
| rhsa-2023:6116 | Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.0.14 security and bug fix update | 2023-10-25T14:16:47+00:00 | 2026-02-16T01:07:59+00:00 |
| rhsa-2023:6059 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Client tkn for 1.12.1 release and security update | 2023-10-23T21:20:26+00:00 | 2026-02-16T01:07:58+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-14-070-01a | Yokogawa CENTUM CS 3000 Vulnerabilities (Update A) | 2014-12-12T07:00:00.000000Z | 2025-06-09T19:43:46.423532Z |
| icsa-14-058-02 | Schneider Electric OFS Buffer Overflow Vulnerability | 2014-11-30T07:00:00.000000Z | 2025-06-09T19:43:40.210642Z |
| icsa-14-058-01 | Schneider Electric Floating License Manager Vulnerability | 2014-11-30T07:00:00.000000Z | 2025-06-09T19:43:33.991609Z |
| icsa-14-051-04 | NTP Reflection Attack | 2014-11-23T07:00:00.000000Z | 2025-06-09T19:43:27.743131Z |
| icsa-14-051-03b | Siemens RuggedCom Uncontrolled Resource Consumption Vulnerability (Update B) | 2014-11-23T07:00:00.000000Z | 2025-06-09T19:43:21.515365Z |
| icsa-14-051-02 | Mitsubishi Electric Automation MC-WorX Suite Unsecure ActiveX Control | 2014-11-23T07:00:00.000000Z | 2025-06-09T19:43:15.290237Z |
| icsa-14-051-01 | ICONICS GENESIS32 Insecure ActiveX Control | 2014-11-23T07:00:00.000000Z | 2025-06-09T19:43:09.046616Z |
| icsa-14-035-01 | Siemens SIMATIC WinCC OA Multiple Vulnerabilities | 2014-11-07T07:00:00.000000Z | 2025-06-09T19:42:44.156944Z |
| icsa-14-030-01 | 3S CoDeSys Runtime Toolkit NULL Pointer Dereference | 2014-11-02T06:00:00.000000Z | 2025-06-09T19:42:37.929242Z |
| icsa-14-023-01 | GE Proficy Vulnerabilities | 2014-10-26T06:00:00.000000Z | 2025-06-09T19:42:31.704274Z |
| icsa-14-021-01 | Rockwell RSLogix 5000 Password Vulnerability | 2014-10-24T06:00:00.000000Z | 2025-06-09T19:42:25.052428Z |
| icsa-11-175-01 | Rockwell FactoryTalk Diag Viewer Memory Corruption | 2011-03-27T06:00:00.000000Z | 2025-06-09T17:27:42.494579Z |
| icsa-11-167-01 | Sunway Force Control | 2011-03-19T06:00:00.000000Z | 2025-06-09T17:27:36.242999Z |
| icsa-11-131-01 | ICONICS GENESIS32 and BizViz ActiveX Stack Overflow | 2011-02-11T07:00:00.000000Z | 2025-06-09T17:27:30.000102Z |
| icsa-11-119-01 | 7-Technologies IGSS ODBC Remote Stack Overflow | 2011-01-30T07:00:00.000000Z | 2025-06-09T17:27:17.552804Z |
| icsa-11-094-01 | Wonderware InBatch Client ActiveX Buffer Overflow | 2011-01-05T07:00:00.000000Z | 2025-06-09T17:27:11.317840Z |
| icsa-11-082-01 | Ecava IntegraXor SQL | 2011-12-24T07:00:00.000000Z | 2025-06-09T17:27:05.078770Z |
| icsa-11-074-01 | WellinTech KingView 6.53 KVWebSvr ActiveX | 2011-12-16T07:00:00.000000Z | 2025-06-09T17:26:58.846835Z |
| icsa-11-069-01b | Samsung Data Management Server (Update B) | 2011-12-11T07:00:00.000000Z | 2025-06-09T17:26:52.608805Z |
| icsa-11-018-02 | 7-Technologies IGSS 8 ODBC Server Remote Heap Corruption | 2011-10-21T06:00:00.000000Z | 2025-06-09T17:26:46.401729Z |
| icsa-11-017-02 | Sielco Sistemi WinLog Stack Overflow | 2011-10-20T06:00:00.000000Z | 2025-06-09T17:26:40.152728Z |
| icsa-11-017-01 | WellinTech Kingview 6.53 Remote Heap Overflow | 2011-10-20T06:00:00.000000Z | 2025-06-09T17:26:33.851054Z |
| icsa-16-278-02 | Beckhoff Embedded PC Images and TwinCAT Components Vulnerabilities | 2016-07-08T06:00:00.000000Z | 2025-06-09T17:26:21.351731Z |
| icsa-16-278-01 | INDAS Web SCADA Path Traversal Vulnerability | 2016-07-08T06:00:00.000000Z | 2025-06-09T17:26:15.107305Z |
| icsa-16-273-01 | American Auto-Matrix Front-End Solutions Vulnerabilities | 2016-07-03T06:00:00.000000Z | 2025-06-09T17:26:02.661948Z |
| icsa-16-271-01 | Siemens SCALANCE M-800/S615 Web Vulnerability | 2016-07-01T06:00:00.000000Z | 2025-06-09T17:25:56.431711Z |
| icsa-16-264-01 | Moxa Active OPC Server Unquoted Service Path Escalation Vulnerability | 2016-06-24T06:00:00.000000Z | 2025-06-09T17:25:49.863879Z |
| icsa-16-259-03 | Trane Tracer SC Sensitive Information Exposure Vulnerability | 2016-06-19T06:00:00.000000Z | 2025-06-09T17:25:43.638859Z |
| icsa-16-259-02 | ABB DataManagerPro Credential Management Vulnerability | 2016-06-19T06:00:00.000000Z | 2025-06-09T17:25:37.418487Z |
| icsa-16-259-01 | Yokogawa STARDOM Authentication Bypass Vulnerability | 2016-06-19T06:00:00.000000Z | 2025-06-09T17:25:31.208192Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-secure-privesc-syxqo6ds | Cisco Secure Client for Linux with ISE Posture Module Privilege Escalation Vulnerability | 2024-03-06T16:00:00+00:00 | 2024-03-06T16:00:00+00:00 |
| cisco-sa-secure-privesc-sYxQO6ds | Cisco Secure Client for Linux with ISE Posture Module Privilege Escalation Vulnerability | 2024-03-06T16:00:00+00:00 | 2024-03-06T16:00:00+00:00 |
| cisco-sa-secure-client-crlf-W43V4G7 | Cisco Secure Client Carriage Return Line Feed Injection Vulnerability | 2024-03-06T16:00:00+00:00 | 2024-03-12T14:17:07+00:00 |
| cisco-sa-sb-wap-multi-85g83crb | Cisco Small Business 100, 300, and 500 Series Wireless Access Points Command Injection and Buffer Overflow Vulnerabilities | 2024-03-06T16:00:00+00:00 | 2024-03-06T16:00:00+00:00 |
| cisco-sa-sb-wap-multi-85G83CRB | Cisco Small Business 100, 300, and 500 Series Wireless Access Points Command Injection and Buffer Overflow Vulnerabilities | 2024-03-06T16:00:00+00:00 | 2024-03-06T16:00:00+00:00 |
| cisco-sa-duo-win-bypass-pn42kkbm | Cisco Duo Authentication for Windows Logon and RDP Authentication Bypass Vulnerability | 2024-03-06T16:00:00+00:00 | 2024-03-06T16:00:00+00:00 |
| cisco-sa-duo-win-bypass-pn42KKBm | Cisco Duo Authentication for Windows Logon and RDP Authentication Bypass Vulnerability | 2024-03-06T16:00:00+00:00 | 2024-03-06T16:00:00+00:00 |
| cisco-sa-appd-xss-3jwqsmnt | Cisco AppDynamics Controller Cross-Site Scripting Vulnerability | 2024-03-06T16:00:00+00:00 | 2024-03-06T16:00:00+00:00 |
| cisco-sa-appd-xss-3JwqSMNT | Cisco AppDynamics Controller Cross-Site Scripting Vulnerability | 2024-03-06T16:00:00+00:00 | 2024-03-06T16:00:00+00:00 |
| cisco-sa-appd-traversal-m7n8mzpf | Cisco AppDynamics Controller Path Traversal Vulnerability | 2024-03-06T16:00:00+00:00 | 2024-03-06T16:00:00+00:00 |
| cisco-sa-appd-traversal-m7N8mZpF | Cisco AppDynamics Controller Path Traversal Vulnerability | 2024-03-06T16:00:00+00:00 | 2024-03-06T16:00:00+00:00 |
| cisco-sa-ucsfi-imm-syn-p6kztdqc | Cisco UCS 6400 and 6500 Series Fabric Interconnects Intersight Managed Mode Denial of Service Vulnerability | 2024-02-28T16:00:00+00:00 | 2024-02-28T16:00:00+00:00 |
| cisco-sa-ucsfi-imm-syn-p6kZTDQC | Cisco UCS 6400 and 6500 Series Fabric Interconnects Intersight Managed Mode Denial of Service Vulnerability | 2024-02-28T16:00:00+00:00 | 2024-02-28T16:00:00+00:00 |
| cisco-sa-nxos-po-acl-tkyepgvl | Cisco Nexus 3000 and 9000 Series Switches Port Channel ACL Programming Vulnerability | 2024-02-28T16:00:00+00:00 | 2024-02-28T16:00:00+00:00 |
| cisco-sa-nxos-po-acl-TkyePgvL | Cisco Nexus 3000 and 9000 Series Switches Port Channel ACL Programming Vulnerability | 2024-02-28T16:00:00+00:00 | 2024-02-28T16:00:00+00:00 |
| cisco-sa-nxos-lldp-dos-z7pnctgt | Cisco FXOS and NX-OS Software Link Layer Discovery Protocol Denial of Service Vulnerability | 2024-02-28T16:00:00+00:00 | 2024-02-28T16:00:00+00:00 |
| cisco-sa-nxos-lldp-dos-z7PncTgt | Cisco FXOS and NX-OS Software Link Layer Discovery Protocol Denial of Service Vulnerability | 2024-02-28T16:00:00+00:00 | 2024-02-28T16:00:00+00:00 |
| cisco-sa-nxos-ebgp-dos-l3qcwvj | Cisco NX-OS Software External Border Gateway Protocol Denial of Service Vulnerability | 2024-02-28T16:00:00+00:00 | 2024-02-28T16:00:00+00:00 |
| cisco-sa-nxos-ebgp-dos-L3QCwVJ | Cisco NX-OS Software External Border Gateway Protocol Denial of Service Vulnerability | 2024-02-28T16:00:00+00:00 | 2024-02-28T16:00:00+00:00 |
| cisco-sa-ipv6-mpls-dos-r9ycxkwm | Cisco NX-OS Software MPLS Encapsulated IPv6 Denial of Service Vulnerability | 2024-02-28T16:00:00+00:00 | 2024-02-28T16:00:00+00:00 |
| cisco-sa-ipv6-mpls-dos-R9ycXkwM | Cisco NX-OS Software MPLS Encapsulated IPv6 Denial of Service Vulnerability | 2024-02-28T16:00:00+00:00 | 2024-02-28T16:00:00+00:00 |
| cisco-sa-cimc-xss-umytyetr | Cisco Integrated Management Controller Cross-Site Scripting Vulnerability | 2023-08-16T16:00:00+00:00 | 2024-02-22T20:57:19+00:00 |
| cisco-sa-cimc-xss-UMYtYEtr | Cisco Integrated Management Controller Cross-Site Scripting Vulnerability | 2023-08-16T16:00:00+00:00 | 2024-02-22T20:57:19+00:00 |
| cisco-sa-cuic-access-control-jjszqmjj | Cisco Unified Intelligence Center Insufficient Access Control Vulnerability | 2024-02-21T16:00:00+00:00 | 2024-02-21T16:00:00+00:00 |
| cisco-sa-cuic-access-control-jJsZQMjj | Cisco Unified Intelligence Center Insufficient Access Control Vulnerability | 2024-02-21T16:00:00+00:00 | 2024-02-21T16:00:00+00:00 |
| cisco-sa-asaftd-info-disclose-9ejtycmb | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Information Disclosure Vulnerability | 2020-05-06T16:00:00+00:00 | 2024-02-21T15:57:20+00:00 |
| cisco-sa-asaftd-info-disclose-9eJtycMB | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Information Disclosure Vulnerability | 2020-05-06T16:00:00+00:00 | 2024-02-21T15:57:20+00:00 |
| cisco-sa-clamav-hdffu6t | ClamAV OLE2 File Format Parsing Denial of Service Vulnerability | 2024-02-07T16:00:00+00:00 | 2024-02-13T17:57:43+00:00 |
| cisco-sa-clamav-hDffu6t | ClamAV OLE2 File Format Parsing Denial of Service Vulnerability | 2024-02-07T16:00:00+00:00 | 2024-02-13T17:57:43+00:00 |
| cisco-sa-expressway-csrf-knnzdmj3 | Cisco Expressway Series Cross-Site Request Forgery Vulnerabilities | 2024-02-07T16:00:00+00:00 | 2024-02-12T17:55:43+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-40257 | mptcp: fix a race in mptcp_pm_del_add_timer() | 2025-12-02T00:00:00.000Z | 2026-01-07T14:36:16.000Z |
| msrc_cve-2025-40261 | nvme: nvme-fc: Ensure ->ioerr_work is cancelled in nvme_fc_delete_ctrl() | 2025-12-02T00:00:00.000Z | 2026-01-07T14:36:10.000Z |
| msrc_cve-2025-39805 | net: macb: fix unregister_netdev call order in macb_remove() | 2025-09-02T00:00:00.000Z | 2026-01-07T14:35:45.000Z |
| msrc_cve-2025-38643 | wifi: cfg80211: Add missing lock in cfg80211_check_and_end_cac() | 2025-08-02T00:00:00.000Z | 2026-01-07T14:35:40.000Z |
| msrc_cve-2025-38627 | f2fs: compress: fix UAF of f2fs_inode_info in f2fs_free_dic | 2025-08-02T00:00:00.000Z | 2026-01-07T14:35:33.000Z |
| msrc_cve-2025-38556 | HID: core: Harden s32ton() against conversion to 0 bits | 2025-08-02T00:00:00.000Z | 2026-01-07T14:35:28.000Z |
| msrc_cve-2025-22105 | bonding: check xdp prog when set bond mode | 2025-04-02T00:00:00.000Z | 2026-01-07T14:35:21.000Z |
| msrc_cve-2026-21444 | libtpms returns wrong initialization vector when certain symmetric ciphers are used | 2026-01-02T00:00:00.000Z | 2026-01-07T01:01:25.000Z |
| msrc_cve-2025-68973 | In GnuPG through 2.4.8, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.) | 2025-12-02T00:00:00.000Z | 2026-01-06T14:36:10.000Z |
| msrc_cve-2025-68972 | In GnuPG through 2.4.8, if a signed message has \f at the end of a plaintext line, an adversary can construct a modified message that places additional text after the signed material, such that signature verification of the modified message succeeds (although an "invalid armor" message is printed during verification). This is related to use of \f as a marker to denote truncation of a long plaintext line. | 2025-12-02T00:00:00.000Z | 2026-01-06T14:36:03.000Z |
| msrc_cve-2025-11964 | OOBW in utf_16le_to_utf_8_truncated() in libpcap | 2025-12-02T00:00:00.000Z | 2026-01-06T01:35:42.000Z |
| msrc_cve-2025-11961 | OOBR and OOBW in pcap_ether_aton() in libpcap | 2025-12-02T00:00:00.000Z | 2026-01-06T01:35:35.000Z |
| msrc_cve-2025-68756 | block: Use RCU in blk_mq_[un]quiesce_tagset() instead of set->tag_list_lock | 2026-01-02T00:00:00.000Z | 2026-01-06T01:02:04.000Z |
| msrc_cve-2025-68758 | backlight: led-bl: Add devlink to supplier LEDs | 2026-01-02T00:00:00.000Z | 2026-01-06T01:01:59.000Z |
| msrc_cve-2025-68757 | drm/vgem-fence: Fix potential deadlock on release | 2026-01-02T00:00:00.000Z | 2026-01-06T01:01:54.000Z |
| msrc_cve-2025-68763 | crypto: starfive - Correctly handle return of sg_nents_for_len | 2026-01-02T00:00:00.000Z | 2026-01-06T01:01:48.000Z |
| msrc_cve-2025-68759 | wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring() | 2026-01-02T00:00:00.000Z | 2026-01-06T01:01:38.000Z |
| msrc_cve-2025-68765 | mt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add() | 2026-01-02T00:00:00.000Z | 2026-01-06T01:01:27.000Z |
| msrc_cve-2025-68755 | staging: most: remove broken i2c driver | 2026-01-02T00:00:00.000Z | 2026-01-06T01:01:22.000Z |
| msrc_cve-2025-68764 | NFS: Automounted filesystems should inherit ro,noexec,nodev,sync flags | 2026-01-02T00:00:00.000Z | 2026-01-06T01:01:16.000Z |
| msrc_cve-2025-61594 | URI Credential Leakage Bypass over CVE-2025-27221 | 2025-12-02T00:00:00.000Z | 2026-01-05T14:36:39.000Z |
| msrc_cve-2025-62408 | c-ares has a Use After Free vulnerability when connection is cleaned up after error | 2025-12-02T00:00:00.000Z | 2026-01-05T14:36:12.000Z |
| msrc_cve-2025-3001 | PyTorch torch.lstm_cell memory corruption | 2025-03-02T00:00:00.000Z | 2026-01-05T01:38:00.000Z |
| msrc_cve-2000-0006 | strace allows local users to read arbitrary files via memory mapped file names. | 2002-03-02T00:00:00.000Z | 2026-01-04T14:35:13.000Z |
| msrc_cve-2025-68146 | filelock has TOCTOU race condition that allows symlink attacks during lock file creation | 2025-12-02T00:00:00.000Z | 2026-01-03T01:41:03.000Z |
| msrc_cve-2025-13912 | Potential non-constant time compiled code with Clang LLVM | 2025-12-02T00:00:00.000Z | 2026-01-03T01:40:44.000Z |
| msrc_cve-2025-14104 | Util-linux: util-linux: heap buffer overread in setpwnam() when processing 256-byte usernames | 2025-12-02T00:00:00.000Z | 2026-01-03T01:40:23.000Z |
| msrc_cve-2025-14512 | Glib: integer overflow in glib gio attribute escaping causes heap buffer overflow | 2025-12-02T00:00:00.000Z | 2026-01-03T01:40:17.000Z |
| msrc_cve-2025-14087 | Glib: glib: buffer underflow in gvariant parser leads to heap corruption | 2025-12-02T00:00:00.000Z | 2026-01-03T01:40:11.000Z |
| msrc_cve-2025-65637 | A denial-of-service vulnerability exists in github.com/sirupsen/logrus when using Entry.Writer() to log a single-line payload larger than 64KB without newline characters. | 2025-12-02T00:00:00.000Z | 2026-01-03T01:40:04.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15639-1 | chromedriver-141.0.7390.107-1.1 on GA media | 2025-10-16T00:00:00Z | 2025-10-16T00:00:00Z |
| opensuse-su-2025:15638-1 | ansible-core-2.18-2.18.10-2.1 on GA media | 2025-10-16T00:00:00Z | 2025-10-16T00:00:00Z |
| opensuse-su-2025:20020-1 | Security update for chromium | 2025-10-15T13:33:21Z | 2025-10-15T13:33:21Z |
| opensuse-su-2025-20020-1 | Security update for chromium | 2025-10-15T13:33:21Z | 2025-10-15T13:33:21Z |
| opensuse-su-2025:20013-1 | Recommended update of flake-pilot | 2025-10-15T12:01:21Z | 2025-10-15T12:01:21Z |
| opensuse-su-2025-20013-1 | Recommended update of flake-pilot | 2025-10-15T12:01:21Z | 2025-10-15T12:01:21Z |
| opensuse-su-2025:15637-1 | python311-ldap-3.4.5-1.1 on GA media | 2025-10-15T00:00:00Z | 2025-10-15T00:00:00Z |
| opensuse-su-2025:15636-1 | libwireshark18-4.4.10-2.1 on GA media | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| opensuse-su-2025:15635-1 | libtiff-devel-32bit-4.7.1-2.1 on GA media | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| opensuse-su-2025:15634-1 | python3-gi-docgen-2025.5-1.1 on GA media | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| opensuse-su-2025:15633-1 | libsoup-3_0-0-3.6.5-7.1 on GA media | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| opensuse-su-2025:15632-1 | firefox-esr-140.4.0-1.1 on GA media | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| opensuse-su-2025:15631-1 | alloy-1.11.2-2.1 on GA media | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| opensuse-su-2025:15630-1 | libQt6Svg6-6.10.0-1.1 on GA media | 2025-10-13T00:00:00Z | 2025-10-13T00:00:00Z |
| opensuse-su-2025:15629-1 | python311-Authlib-1.6.5-1.1 on GA media | 2025-10-13T00:00:00Z | 2025-10-13T00:00:00Z |
| opensuse-su-2025:15628-1 | lsd-1.2.0-1.1 on GA media | 2025-10-13T00:00:00Z | 2025-10-13T00:00:00Z |
| opensuse-su-2025:15627-1 | libcryptopp-devel-8.9.0-4.1 on GA media | 2025-10-13T00:00:00Z | 2025-10-13T00:00:00Z |
| opensuse-su-2025:15626-1 | exim-4.98.2-4.1 on GA media | 2025-10-13T00:00:00Z | 2025-10-13T00:00:00Z |
| opensuse-su-2025:15625-1 | perl-CGI-Simple-1.282.0-1.1 on GA media | 2025-10-11T00:00:00Z | 2025-10-11T00:00:00Z |
| opensuse-su-2025:15624-1 | golang-github-v2fly-v2ray-core-5.40.0-1.1 on GA media | 2025-10-10T00:00:00Z | 2025-10-10T00:00:00Z |
| opensuse-su-2025:15623-1 | ruby3.4-rubygem-rack-session-2.1.1-1.1 on GA media | 2025-10-10T00:00:00Z | 2025-10-10T00:00:00Z |
| opensuse-su-2025:15622-1 | chromedriver-141.0.7390.65-1.1 on GA media | 2025-10-10T00:00:00Z | 2025-10-10T00:00:00Z |
| opensuse-su-2025:15621-1 | ruby3.4-rubygem-rack-2.2-2.2.19-1.1 on GA media | 2025-10-09T00:00:00Z | 2025-10-09T00:00:00Z |
| opensuse-su-2025:15620-1 | headscale-0.26.1-2.1 on GA media | 2025-10-09T00:00:00Z | 2025-10-09T00:00:00Z |
| opensuse-su-2025:15619-1 | gitea-tea-0.11.0-2.1 on GA media | 2025-10-09T00:00:00Z | 2025-10-09T00:00:00Z |
| opensuse-su-2025:15618-1 | forgejo-longterm-11.0.6-2.1 on GA media | 2025-10-09T00:00:00Z | 2025-10-09T00:00:00Z |
| opensuse-su-2025:15617-1 | forgejo-12.0.4-2.1 on GA media | 2025-10-09T00:00:00Z | 2025-10-09T00:00:00Z |
| opensuse-su-2025:15616-1 | distrobuilder-3.2-4.1 on GA media | 2025-10-09T00:00:00Z | 2025-10-09T00:00:00Z |
| opensuse-su-2025:15615-1 | weblate-5.13.3-1.1 on GA media | 2025-10-08T00:00:00Z | 2025-10-08T00:00:00Z |
| opensuse-su-2025:15614-1 | libruby3_4-3_4-3.4.7-1.1 on GA media | 2025-10-08T00:00:00Z | 2025-10-08T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-libpython-2024-7592 | Quadratic complexity parsing cookies with backslashes | 2025-08-11T13:52:56.070Z | 2025-11-06T13:25:46.476Z |
| bit-libpython-2024-6923 | Email header injection due to unquoted newlines | 2025-08-11T13:52:53.987Z | 2025-11-06T13:25:46.476Z |
| bit-libpython-2024-6232 | Regular-expression DoS when parsing TarFile headers | 2025-08-11T13:52:51.685Z | 2025-11-06T13:25:46.476Z |
| bit-libpython-2024-4032 | Incorrect IPv4 and IPv6 private ranges | 2025-08-11T13:52:45.426Z | 2025-11-06T13:25:46.476Z |
| bit-libpython-2024-11168 | Improper validation of IPv6 and IPvFuture addresses | 2025-08-11T13:52:38.571Z | 2025-11-06T13:25:46.476Z |
| bit-libpython-2024-0450 | Quoted zip-bomb protection for zipfile | 2025-08-11T13:52:36.704Z | 2025-11-06T13:25:46.476Z |
| bit-libpython-2024-0397 | Memory race condition in ssl.SSLContext certificate store methods | 2025-08-11T13:52:34.942Z | 2025-11-06T13:25:46.476Z |
| bit-libpython-2023-6597 | 2025-08-11T13:52:33.085Z | 2025-11-06T13:25:46.476Z | |
| bit-libpython-2023-40217 | 2025-08-11T13:52:27.063Z | 2025-11-06T13:25:46.476Z | |
| bit-libpython-2023-27043 | 2025-08-11T13:52:20.772Z | 2025-11-06T13:25:46.476Z | |
| bit-libpython-2023-24329 | 2025-08-11T13:52:18.649Z | 2025-11-06T13:25:46.476Z | |
| bit-libpython-2022-42919 | 2025-08-11T13:52:06.949Z | 2025-11-06T13:25:46.476Z | |
| bit-libpython-2022-0391 | 2025-08-11T13:52:00.191Z | 2025-11-06T13:25:46.476Z | |
| bit-libpython-2021-4189 | 2025-08-11T13:51:57.853Z | 2025-11-06T13:25:46.476Z | |
| bit-libpython-2021-3737 | 2025-08-11T13:51:55.583Z | 2025-11-06T13:25:46.476Z | |
| bit-libpython-2021-3733 | 2025-08-11T13:51:53.167Z | 2025-11-06T13:25:46.476Z | |
| bit-libpython-2021-3426 | 2025-08-11T13:51:50.836Z | 2025-11-06T13:25:46.476Z | |
| bit-libpython-2021-29921 | 2025-08-11T13:51:46.493Z | 2025-11-06T13:25:46.476Z | |
| bit-libpython-2021-28861 | 2025-08-11T13:51:44.193Z | 2025-11-06T13:25:46.476Z | |
| bit-libpython-2020-10735 | 2025-08-11T13:51:26.807Z | 2025-11-06T13:25:46.476Z | |
| bit-libphp-2025-6491 | NULL Pointer Dereference in PHP SOAP Extension via Large XML Namespace Prefix | 2025-08-11T13:54:53.967Z | 2025-11-06T13:25:46.476Z |
| bit-libphp-2025-1861 | Stream HTTP wrapper truncates redirect location to 1024 bytes | 2025-08-11T13:54:51.879Z | 2025-11-06T13:25:46.476Z |
| bit-libphp-2025-1736 | Stream HTTP wrapper header check might omit basic auth header | 2025-08-11T13:54:49.369Z | 2025-11-06T13:25:46.476Z |
| bit-libphp-2025-1735 | pgsql extension does not check for errors during escaping | 2025-08-11T13:54:47.127Z | 2025-11-06T13:25:46.476Z |
| bit-libphp-2025-1734 | Streams HTTP wrapper does not fail for headers with invalid name and no colon | 2025-08-11T13:54:44.717Z | 2025-11-06T13:25:46.476Z |
| bit-libphp-2025-1220 | Null byte termination in hostnames | 2025-08-11T13:54:42.636Z | 2025-11-06T13:25:46.476Z |
| bit-libphp-2025-1219 | libxml streams use wrong content-type header when requesting a redirected resource | 2025-08-11T13:54:40.311Z | 2025-11-06T13:25:46.476Z |
| bit-libphp-2025-1217 | Header parser of http stream wrapper does not handle folded headers | 2025-08-11T13:54:37.988Z | 2025-11-06T13:25:46.476Z |
| bit-libphp-2024-9026 | PHP-FPM logs from children may be altered | 2025-08-11T13:54:35.937Z | 2025-11-06T13:25:46.476Z |
| bit-libphp-2024-8932 | OOB access in ldap_escape | 2025-08-11T13:54:33.535Z | 2025-11-06T13:25:46.476Z |
| ID | Description | Updated |
|---|---|---|
| var-202105-1432 | The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired… | 2024-07-23T21:12:24.589000Z |
| var-202109-1389 | A logic issue was addressed with improved state management. This issue is fixed in tvOS 1… | 2024-07-23T21:12:18.054000Z |
| var-200704-0223 | SMB in Apple Mac OS X 10.3.9 through 10.4.9 does not properly clean the environment when … | 2024-07-23T21:11:56.443000Z |
| var-201110-0380 | Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK… | 2024-07-23T21:11:55.453000Z |
| var-201406-0137 | The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 befo… | 2024-07-23T21:11:52.075000Z |
| var-202008-1140 | In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> … | 2024-07-23T21:11:50.528000Z |
| var-202002-1243 | There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_re… | 2024-07-23T21:11:15.557000Z |
| var-201205-0016 | The (1) IPv4 and (2) IPv6 implementations in the Linux kernel before 3.1 use a modified M… | 2024-07-23T21:11:14.011000Z |
| var-201304-0188 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:10:32.602000Z |
| var-202105-1457 | A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in … | 2024-07-23T21:10:31.569000Z |
| var-202003-1787 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2024-07-23T21:10:30.703000Z |
| var-201710-0211 | Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Group Temporal Key (GT… | 2024-07-23T21:10:29.332000Z |
| var-201304-0385 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:10:28.646000Z |
| var-201708-0212 | The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 all… | 2024-07-23T21:10:24.465000Z |
| var-201405-0541 | Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apache Tomcat before 6.… | 2024-07-23T21:10:24.545000Z |
| var-201912-0538 | An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in… | 2024-07-23T21:09:17.149000Z |
| var-201912-0575 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:09:16.163000Z |
| var-201211-0364 | Buffer overflow in Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on … | 2024-07-23T21:09:16.913000Z |
| var-200810-0393 | Unspecified vulnerability in rlogind in the rlogin component in Mac OS X 10.4.11 and 10.5… | 2024-07-23T21:09:15.254000Z |
| var-201212-0238 | Integer overflow in Adobe Flash Player before 10.3.183.48 and 11.x before 11.5.502.135 on… | 2024-07-23T21:09:08.496000Z |
| var-201912-1862 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:08:37.349000Z |
| var-201904-1407 | A use after free issue was addressed with improved memory management. This issue affected… | 2024-07-23T21:08:35.760000Z |
| var-201106-0034 | Adobe Flash Player before 10.3.181.26 on Windows, Mac OS X, Linux, and Solaris, and 10.3.… | 2024-07-23T21:08:34.015000Z |
| var-201904-1362 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:08:22.827000Z |
| var-200703-0007 | Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before 5.5.22 and … | 2024-07-23T21:07:51.634000Z |
| var-202012-1277 | A malicious server can use the FTP PASV response to trick curl 7.73.0 and earlier into co… | 2024-07-23T21:07:50.790000Z |
| var-202201-0567 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T21:07:30.070000Z |
| var-202109-1313 | An integer overflow was addressed with improved input validation. This issue is fixed in … | 2024-07-23T21:07:30.901000Z |
| var-201205-0406 | WebKit in Apple iOS before 5.1.1 allows remote attackers to execute arbitrary code or cau… | 2024-07-23T21:07:29.148000Z |
| var-201605-0492 | Heap-based buffer overflow in the xmlStrncat function in libxml2 before 2.9.4, as used in… | 2024-07-23T21:07:28.078000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2023-007152 | Multiple vulnerabilities in EXPRESSCLUSTER X | 2023-11-20T14:09+09:00 | 2024-05-01T18:10+09:00 |
| jvndb-2023-000113 | HOTELDRUID vulnerable to cross-site scripting | 2023-11-10T14:41+09:00 | 2024-05-01T17:47+09:00 |
| jvndb-2023-000115 | OSS Calendar vulnerable to SQL injection | 2023-11-14T14:05+09:00 | 2024-05-01T17:38+09:00 |
| jvndb-2023-000118 | Multiple vulnerabilities in CubeCart | 2023-11-17T14:22+09:00 | 2024-04-30T18:15+09:00 |
| jvndb-2023-000068 | "NewsPicks" App uses a hard-coded API key for an external service | 2023-06-30T15:06+09:00 | 2024-04-30T18:09+09:00 |
| jvndb-2023-006578 | ASUSTeK COMPUTER RT-AC87U vulnerable to improper access control | 2023-11-15T17:44+09:00 | 2024-04-30T18:08+09:00 |
| jvndb-2023-000064 | SYNCK GRAPHICA Mailform Pro CGI vulnerable to Regular expression Denial-of-Service (ReDoS) | 2023-06-20T14:48+09:00 | 2024-04-26T18:03+09:00 |
| jvndb-2023-000067 | WordPress Plugin "Snow Monkey Forms" vulnerable to directory traversal | 2023-06-27T17:05+09:00 | 2024-04-26T17:56+09:00 |
| jvndb-2023-000033 | Trend Micro Security may insecurely load Dynamic Link Libraries | 2023-04-14T15:44+09:00 | 2024-04-26T17:48+09:00 |
| jvndb-2023-006588 | Multiple vulnerabilities in ELECOM and LOGITEC routers | 2023-11-15T18:27+09:00 | 2024-04-26T15:22+09:00 |
| jvndb-2023-002511 | File and Directory Permissions Vulnerability in Hitachi Command Suite | 2023-07-19T14:48+09:00 | 2024-04-26T12:29+09:00 |
| jvndb-2023-002512 | EL Injection Vulnerability in Hitachi Replication Manager | 2023-07-19T14:48+09:00 | 2024-04-26T12:24+09:00 |
| jvndb-2024-003119 | NETGEAR routers vulnerable to buffer overflow | 2024-04-25T11:21+09:00 | 2024-04-25T11:21+09:00 |
| jvndb-2024-000042 | Multiple vulnerabilities in RoamWiFi R10 | 2024-04-24T13:44+09:00 | 2024-04-24T13:44+09:00 |
| jvndb-2024-003008 | Sangoma Technologies CG/MG family driver cg6kwin2k.sys vulnerable to insufficient access control on its IOCTL | 2024-03-22T13:50+09:00 | 2024-04-24T11:45+09:00 |
| jvndb-2023-003028 | Phoenix Technologies Windows kernel driver vulnerable to insufficient access control on its IOCTL | 2023-08-30T10:05+09:00 | 2024-04-24T11:43+09:00 |
| jvndb-2024-003116 | Multiple vulnerabilities in OMRON Sysmac Studio/CX-One and CX-Programmer | 2024-04-24T10:13+09:00 | 2024-04-24T10:13+09:00 |
| jvndb-2024-000901 | TvRock vulnerable to cross-site request forgery | 2024-04-23T18:22+09:00 | 2024-04-23T18:22+09:00 |
| jvndb-2024-000903 | TvRock vulnerable to denial-of-service (DoS) | 2024-04-23T18:21+09:00 | 2024-04-23T18:21+09:00 |
| jvndb-2023-000119 | Ruckus Access Point contains a cross-site scripting vulnerability. | 2023-12-01T14:58+09:00 | 2024-04-23T17:51+09:00 |
| jvndb-2023-000112 | Multiple vulnerabilities in Pleasanter | 2023-11-13T15:57+09:00 | 2024-04-22T17:56+09:00 |
| jvndb-2024-003108 | Armeria-saml improperly handles SAML messages | 2024-04-22T17:28+09:00 | 2024-04-22T17:28+09:00 |
| jvndb-2023-000122 | Multiple denial-of-service (DoS) vulnerabilities in JTEKT ELECTRONICS HMI GC-A2 series | 2023-12-11T14:12+09:00 | 2024-04-22T16:55+09:00 |
| jvndb-2023-002413 | Multiple vulnerabilities in ELECOM and LOGITEC wireless LAN routers | 2023-07-12T16:15+09:00 | 2024-04-22T16:18+09:00 |
| jvndb-2023-002270 | Null pointer dereference vulnerability in multiple printers and MFPs which implement BROTHER debut web server | 2023-06-30T11:49+09:00 | 2024-04-22T16:07+09:00 |
| jvndb-2023-014491 | LINE client for iOS vulnerable to improper server certificate verification | 2024-04-22T15:27+09:00 | 2024-04-22T15:27+09:00 |
| jvndb-2023-000075 | Improper restriction of XML external entity references (XXE) in Applicant Programme | 2023-07-24T15:44+09:00 | 2024-04-22T14:20+09:00 |
| jvndb-2023-002722 | Fujitsu network devices Si-R series and SR-M series vulnerable to authentication bypass | 2023-07-27T18:12+09:00 | 2024-04-19T18:07+09:00 |
| jvndb-2023-000076 | SEIKO EPSON printer Web Config vulnerable to denial-of-service (DoS) | 2023-08-02T14:55+09:00 | 2024-04-19T17:27+09:00 |
| jvndb-2023-000062 | "WPS Office" vulnerable to OS command injection | 2023-06-12T12:57+09:00 | 2024-04-18T17:49+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:21089-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_7 | 2025-11-28T08:19:29Z | 2025-11-28T08:19:29Z |
| suse-su-2025:21088-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_6 | 2025-11-28T08:19:29Z | 2025-11-28T08:19:29Z |
| suse-su-2025:21087-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 | 2025-11-28T08:19:29Z | 2025-11-28T08:19:29Z |
| suse-su-2025:21086-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 | 2025-11-28T08:19:29Z | 2025-11-28T08:19:29Z |
| suse-su-2025:21112-1 | Security update for kernel-livepatch-MICRO-6-0_Update_9 | 2025-11-28T08:19:28Z | 2025-11-28T08:19:28Z |
| suse-su-2025:21111-1 | Security update for kernel-livepatch-MICRO-6-0_Update_8 | 2025-11-28T08:19:28Z | 2025-11-28T08:19:28Z |
| suse-su-2025:21110-1 | Security update for kernel-livepatch-MICRO-6-0_Update_7 | 2025-11-28T08:19:28Z | 2025-11-28T08:19:28Z |
| suse-su-2025:21109-1 | Security update for kernel-livepatch-MICRO-6-0_Update_6 | 2025-11-28T08:19:28Z | 2025-11-28T08:19:28Z |
| suse-su-2025:21108-1 | Security update for kernel-livepatch-MICRO-6-0_Update_5 | 2025-11-28T08:19:28Z | 2025-11-28T08:19:28Z |
| suse-su-2025:21107-1 | Security update for kernel-livepatch-MICRO-6-0_Update_4 | 2025-11-28T08:19:28Z | 2025-11-28T08:19:28Z |
| suse-su-2025:21098-1 | Security update for kernel-livepatch-MICRO-6-0_Update_9 | 2025-11-28T08:19:28Z | 2025-11-28T08:19:28Z |
| suse-su-2025:21097-1 | Security update for kernel-livepatch-MICRO-6-0_Update_8 | 2025-11-28T08:19:28Z | 2025-11-28T08:19:28Z |
| suse-su-2025:21096-1 | Security update for kernel-livepatch-MICRO-6-0_Update_7 | 2025-11-28T08:19:28Z | 2025-11-28T08:19:28Z |
| suse-su-2025:21095-1 | Security update for kernel-livepatch-MICRO-6-0_Update_6 | 2025-11-28T08:19:28Z | 2025-11-28T08:19:28Z |
| suse-su-2025:21094-1 | Security update for kernel-livepatch-MICRO-6-0_Update_5 | 2025-11-28T08:19:28Z | 2025-11-28T08:19:28Z |
| suse-su-2025:21093-1 | Security update for kernel-livepatch-MICRO-6-0_Update_4 | 2025-11-28T08:19:28Z | 2025-11-28T08:19:28Z |
| suse-su-2025:21092-1 | Security update for kernel-livepatch-MICRO-6-0_Update_3 | 2025-11-28T08:19:28Z | 2025-11-28T08:19:28Z |
| suse-su-2025:21085-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_3 | 2025-11-28T08:14:04Z | 2025-11-28T08:14:04Z |
| suse-su-2025:21161-1 | Security update for openssh | 2025-11-28T07:46:20Z | 2025-11-28T07:46:20Z |
| suse-su-2025:21128-1 | Security update for openssh | 2025-11-28T07:46:20Z | 2025-11-28T07:46:20Z |
| suse-su-2025:4285-1 | Security update for the Linux Kernel (Live Patch 62 for SUSE Linux Enterprise 15 SP3) | 2025-11-27T22:34:36Z | 2025-11-27T22:34:36Z |
| suse-su-2025:21159-1 | Security update for dovecot24 | 2025-11-27T20:19:42Z | 2025-11-27T20:19:42Z |
| suse-su-2025:21158-1 | Security update for himmelblau | 2025-11-27T20:17:50Z | 2025-11-27T20:17:50Z |
| suse-su-2025:4283-1 | Security update for the Linux Kernel (Live Patch 21 for SUSE Linux Enterprise 15 SP5) | 2025-11-27T19:04:00Z | 2025-11-27T19:04:00Z |
| suse-su-2025:4282-1 | Security update for the Linux Kernel (Live Patch 11 for SUSE Linux Enterprise 15 SP6) | 2025-11-27T16:34:16Z | 2025-11-27T16:34:16Z |
| suse-su-2025:21152-1 | Security update for tomcat11 | 2025-11-27T15:47:37Z | 2025-11-27T15:47:37Z |
| suse-su-2025:4281-1 | Security update for the Linux Kernel (Live Patch 43 for SUSE Linux Enterprise 15 SP4) | 2025-11-27T15:04:07Z | 2025-11-27T15:04:07Z |
| suse-su-2025:4278-1 | Security update for glib2 | 2025-11-27T13:13:51Z | 2025-11-27T13:13:51Z |
| suse-su-2025:4277-1 | Security update for python313 | 2025-11-27T13:13:43Z | 2025-11-27T13:13:43Z |
| suse-su-2025:21084-1 | Security update for sssd | 2025-11-27T11:13:31Z | 2025-11-27T11:13:31Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-03170 | Foxit PDF Editor Cloud跨站脚本漏洞(CNVD-2026-0317073) | 2025-12-25 | 2026-01-09 |
| cnvd-2026-03169 | Foxit PDF Editor Cloud跨站脚本漏洞(CNVD-2026-0316975) | 2025-12-25 | 2026-01-09 |
| cnvd-2026-03168 | Foxit PDF Editor Cloud跨站脚本漏洞(CNVD-2026-0316876) | 2025-12-25 | 2026-01-09 |
| cnvd-2026-03167 | Foxit PDF Editor Cloud跨站脚本漏洞(CNVD-2026-0316777) | 2025-12-25 | 2026-01-09 |
| cnvd-2026-03166 | Foxit PDF Editor Cloud跨站脚本漏洞 | 2025-12-25 | 2026-01-09 |
| cnvd-2026-03090 | Tenda WH450 goform/PPTPServer文件缓冲区溢出漏洞 | 2026-01-09 | 2026-01-09 |
| cnvd-2026-03089 | Tenda WH450 goform/PPTPDClient文件缓冲区溢出漏洞 | 2026-01-09 | 2026-01-09 |
| cnvd-2026-03088 | Tenda WH450 goform/PPTPClient文件缓冲区溢出漏洞 | 2026-01-09 | 2026-01-09 |
| cnvd-2026-03087 | Tenda WH450 goform/Natlimit文件缓冲区溢出漏洞 | 2026-01-09 | 2026-01-09 |
| cnvd-2026-03086 | FluentCMS输入验证错误漏洞 | 2026-01-09 | 2026-01-09 |
| cnvd-2026-02896 | Tenda AC7 GetParentControlInfo方法堆栈缓冲区溢出漏洞 | 2024-03-27 | 2026-01-09 |
| cnvd-2026-02895 | Tenda AC7 formWifiWpsStart方法栈缓冲区溢出漏洞 | 2024-03-27 | 2026-01-09 |
| cnvd-2026-02894 | Tenda AC7 formWifiWpsOOB方法堆栈缓冲区溢出漏洞 | 2024-03-27 | 2026-01-09 |
| cnvd-2026-02893 | Tenda AC7 formSetDeviceName方法堆栈缓冲区溢出漏洞 | 2024-03-27 | 2026-01-09 |
| cnvd-2026-02892 | Tenda FH1205 GetParentControlInfo方法堆栈缓冲区溢出漏洞 | 2024-03-29 | 2026-01-09 |
| cnvd-2026-02891 | Tenda FH1205 fromSetRouteStatic方法堆栈缓冲区溢出漏洞 | 2024-03-29 | 2026-01-09 |
| cnvd-2026-02890 | Tenda FH1205 fromNatStaticSetting方法堆栈缓冲区溢出漏洞 | 2024-03-29 | 2026-01-09 |
| cnvd-2026-02889 | Tenda FH1205 formSetCfm方法堆栈缓冲区溢出漏洞 | 2024-03-29 | 2026-01-09 |
| cnvd-2026-02888 | Tenda FH1205 formQuickIndex方法堆栈缓冲区溢出漏洞 | 2024-03-29 | 2026-01-09 |
| cnvd-2026-02887 | WordPress ilGhera Support System for WooCommerce plugin未经授权的数据修改漏洞 | 2026-01-09 | 2026-01-09 |
| cnvd-2026-02886 | WordPress Geo Controller plugin跨站脚本漏洞 | 2026-01-09 | 2026-01-09 |
| cnvd-2026-02885 | WordPress FS Registration Password plugin权限提升漏洞 | 2026-01-09 | 2026-01-09 |
| cnvd-2026-02884 | WordPress FlexTable plugin跨站脚本漏洞 | 2026-01-09 | 2026-01-09 |
| cnvd-2026-02883 | WordPress FastDup plugin路径遍历漏洞 | 2026-01-09 | 2026-01-09 |
| cnvd-2026-02882 | WordPress Car Rental Manager plugin缺少授权漏洞 | 2026-01-09 | 2026-01-09 |
| cnvd-2026-02881 | WordPress Calafate plugin文件包含漏洞 | 2026-01-09 | 2026-01-09 |
| cnvd-2026-02880 | WordPress Better Business Reviews plugin缺少授权漏洞 | 2026-01-09 | 2026-01-09 |
| cnvd-2026-02879 | WordPress AffiliateX plugin缺少授权漏洞 | 2026-01-09 | 2026-01-09 |
| cnvd-2026-02878 | WordPress Accordion plugin跨站脚本漏洞 | 2026-01-09 | 2026-01-09 |
| cnvd-2026-02778 | Orangescrum SQL注入漏洞 | 2025-12-29 | 2026-01-09 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2025-AVI-0962 | Vulnérabilité dans Dovecot | 2025-11-04T00:00:00.000000 | 2025-11-04T00:00:00.000000 |
| CERTFR-2025-AVI-0961 | Multiples vulnérabilités dans les produits Apple | 2025-11-04T00:00:00.000000 | 2025-11-04T00:00:00.000000 |
| CERTFR-2025-AVI-0960 | Multiples vulnérabilités dans VMware Tanzu | 2025-11-04T00:00:00.000000 | 2025-11-04T00:00:00.000000 |
| CERTFR-2025-AVI-0959 | Vulnérabilité dans Python | 2025-11-04T00:00:00.000000 | 2025-11-04T00:00:00.000000 |
| CERTFR-2025-AVI-0958 | Multiples vulnérabilités dans Tenable Identity Exposure | 2025-11-04T00:00:00.000000 | 2025-11-04T00:00:00.000000 |
| CERTFR-2025-AVI-0957 | Multiples vulnérabilités dans Moodle | 2025-11-03T00:00:00.000000 | 2025-11-04T00:00:00.000000 |
| certfr-2025-avi-0956 | Multiples vulnérabilités dans MariaDB | 2025-11-03T00:00:00.000000 | 2025-11-03T00:00:00.000000 |
| certfr-2025-avi-0955 | Multiples vulnérabilités dans Microsoft Edge | 2025-11-03T00:00:00.000000 | 2025-11-03T00:00:00.000000 |
| certfr-2025-avi-0953 | Vulnérabilité dans Elastic Cloud Enterprise | 2025-11-03T00:00:00.000000 | 2025-11-03T00:00:00.000000 |
| certfr-2025-avi-0952 | Vulnérabilité dans Mattermost Server | 2025-11-03T00:00:00.000000 | 2025-11-03T00:00:00.000000 |
| certfr-2025-avi-0951 | Multiples vulnérabilités dans Axis OS | 2025-11-03T00:00:00.000000 | 2025-11-03T00:00:00.000000 |
| CERTFR-2025-AVI-0956 | Multiples vulnérabilités dans MariaDB | 2025-11-03T00:00:00.000000 | 2025-11-03T00:00:00.000000 |
| CERTFR-2025-AVI-0955 | Multiples vulnérabilités dans Microsoft Edge | 2025-11-03T00:00:00.000000 | 2025-11-03T00:00:00.000000 |
| CERTFR-2025-AVI-0953 | Vulnérabilité dans Elastic Cloud Enterprise | 2025-11-03T00:00:00.000000 | 2025-11-03T00:00:00.000000 |
| CERTFR-2025-AVI-0952 | Vulnérabilité dans Mattermost Server | 2025-11-03T00:00:00.000000 | 2025-11-03T00:00:00.000000 |
| CERTFR-2025-AVI-0951 | Multiples vulnérabilités dans Axis OS | 2025-11-03T00:00:00.000000 | 2025-11-03T00:00:00.000000 |
| certfr-2025-avi-0950 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-10-31T00:00:00.000000 | 2025-10-31T00:00:00.000000 |
| certfr-2025-avi-0949 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-10-31T00:00:00.000000 | 2025-10-31T00:00:00.000000 |
| certfr-2025-avi-0948 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-10-31T00:00:00.000000 | 2025-10-31T00:00:00.000000 |
| certfr-2025-avi-0947 | Multiples vulnérabilités dans les produits IBM | 2025-10-31T00:00:00.000000 | 2025-10-31T00:00:00.000000 |
| certfr-2025-avi-0946 | Vulnérabilité dans Sonicwall Secure Mobile Access | 2025-10-31T00:00:00.000000 | 2025-10-31T00:00:00.000000 |
| certfr-2025-avi-0945 | Vulnérabilité dans Qnap NetBak PC Agent | 2025-10-31T00:00:00.000000 | 2025-10-31T00:00:00.000000 |
| certfr-2025-avi-0944 | Vulnérabilité dans Liferay | 2025-10-31T00:00:00.000000 | 2025-10-31T00:00:00.000000 |
| certfr-2025-avi-0943 | Multiples vulnérabilités dans les produits Centreon | 2025-10-31T00:00:00.000000 | 2025-10-31T00:00:00.000000 |
| certfr-2025-avi-0942 | Vulnérabilité dans Dovecot | 2025-10-31T00:00:00.000000 | 2025-10-31T00:00:00.000000 |
| CERTFR-2025-AVI-0950 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-10-31T00:00:00.000000 | 2025-10-31T00:00:00.000000 |
| CERTFR-2025-AVI-0949 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-10-31T00:00:00.000000 | 2025-10-31T00:00:00.000000 |
| CERTFR-2025-AVI-0948 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-10-31T00:00:00.000000 | 2025-10-31T00:00:00.000000 |
| CERTFR-2025-AVI-0947 | Multiples vulnérabilités dans les produits IBM | 2025-10-31T00:00:00.000000 | 2025-10-31T00:00:00.000000 |
| CERTFR-2025-AVI-0946 | Vulnérabilité dans Sonicwall Secure Mobile Access | 2025-10-31T00:00:00.000000 | 2025-10-31T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTA-2007-ALE-014 | Vulnérabilité dans Apple QuickTime | 2007-09-13T00:00:00.000000 | 2007-10-12T00:00:00.000000 |
| certa-2007-ale-013 | Vulnérabilité dans Mozilla Firefox | 2007-07-27T00:00:00.000000 | 2007-07-31T00:00:00.000000 |
| CERTA-2007-ALE-013 | Vulnérabilité dans Mozilla Firefox | 2007-07-27T00:00:00.000000 | 2007-07-31T00:00:00.000000 |
| certa-2007-ale-012 | Multiples vulnérabilités dans Mozilla Firefox | 2007-06-06T00:00:00.000000 | 2007-07-18T00:00:00.000000 |
| CERTA-2007-ALE-012 | Multiples vulnérabilités dans Mozilla Firefox | 2007-06-06T00:00:00.000000 | 2007-07-18T00:00:00.000000 |
| certa-2007-ale-010 | Vulnérabilité de Microsoft DNS Server | 2007-04-16T00:00:00.000000 | 2007-05-09T00:00:00.000000 |
| certa-2007-ale-006 | Vulnérabilité dans le logiciel Microsoft Word | 2007-02-16T00:00:00.000000 | 2007-05-09T00:00:00.000000 |
| CERTA-2007-ALE-010 | Vulnérabilité de Microsoft DNS Server | 2007-04-16T00:00:00.000000 | 2007-05-09T00:00:00.000000 |
| CERTA-2007-ALE-006 | Vulnérabilité dans le logiciel Microsoft Word | 2007-02-16T00:00:00.000000 | 2007-05-09T00:00:00.000000 |
| certa-2007-ale-009 | Vulnérabilité dans BrightStor ARCServe Backup | 2007-03-30T00:00:00.000000 | 2007-04-27T00:00:00.000000 |
| CERTA-2007-ALE-009 | Vulnérabilité dans BrightStor ARCServe Backup | 2007-03-30T00:00:00.000000 | 2007-04-27T00:00:00.000000 |
| certa-2007-ale-008 | Vulnérabilité dans Mirosoft Windows | 2007-03-29T00:00:00.000000 | 2007-04-03T00:00:00.000000 |
| certa-2007-ale-002 | Vulnérabilité dans Windows | 2007-01-12T00:00:00.000000 | 2007-04-03T00:00:00.000000 |
| CERTA-2007-ALE-008 | Vulnérabilité dans Mirosoft Windows | 2007-03-29T00:00:00.000000 | 2007-04-03T00:00:00.000000 |
| CERTA-2007-ALE-002 | Vulnérabilité dans Windows | 2007-01-12T00:00:00.000000 | 2007-04-03T00:00:00.000000 |
| certa-2006-ale-013 | Vulnérabilité de MacOS X | 2006-11-23T00:00:00.000000 | 2007-02-16T00:00:00.000000 |
| CERTA-2006-ALE-013 | Vulnérabilité de MacOS X | 2006-11-23T00:00:00.000000 | 2007-02-16T00:00:00.000000 |
| certa-2006-ale-014 | Vulnérabilités dans Microsoft Word | 2006-12-06T00:00:00.000000 | 2007-02-14T00:00:00.000000 |
| CERTA-2006-ALE-014 | Vulnérabilités dans Microsoft Word | 2006-12-06T00:00:00.000000 | 2007-02-14T00:00:00.000000 |
| certa-2007-ale-004 | Vulnérabilité dans Microsoft Office | 2007-02-03T00:00:00.000000 | 2007-02-13T00:00:00.000000 |
| CERTA-2007-ALE-004 | Vulnérabilité dans Microsoft Office | 2007-02-03T00:00:00.000000 | 2007-02-13T00:00:00.000000 |
| certa-2007-ale-001 | Vulnérablité dans Apple Quicktime | 2007-01-04T00:00:00.000000 | 2007-01-24T00:00:00.000000 |
| CERTA-2007-ALE-001 | Vulnérablité dans Apple Quicktime | 2007-01-04T00:00:00.000000 | 2007-01-24T00:00:00.000000 |
| certa-2007-ale-003 | Filoutage contre le site voyages-sncf.com | 2007-01-15T00:00:00.000000 | 2007-01-15T00:00:00.000000 |
| CERTA-2007-ALE-003 | Filoutage contre le site voyages-sncf.com | 2007-01-15T00:00:00.000000 | 2007-01-15T00:00:00.000000 |
| certa-2006-ale-011 | Multiples vulnérabilités de produits Microsoft | 2006-08-31T00:00:00.000000 | 2006-10-11T00:00:00.000000 |
| CERTA-2006-ALE-011 | Multiples vulnérabilités de produits Microsoft | 2006-08-31T00:00:00.000000 | 2006-10-11T00:00:00.000000 |
| certa-2006-ale-010 | Vulnérabilité dans Internet Explorer | 2006-08-23T00:00:00.000000 | 2006-08-25T00:00:00.000000 |
| CERTA-2006-ALE-010 | Vulnérabilité dans Internet Explorer | 2006-08-23T00:00:00.000000 | 2006-08-25T00:00:00.000000 |
| certa-2006-ale-009 | Vulnérabilité de la librairie MSO.DLL dans Microsoft Office | 2006-07-15T00:00:00.000000 | 2006-08-09T00:00:00.000000 |