Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-60706 |
5.5 (3.1)
|
Windows Hyper-V Information Disclosure Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:22.264Z | 2026-02-13T20:45:48.116Z |
| CVE-2025-60705 |
7.8 (3.1)
|
Windows Client-Side Caching Elevation of Privilege Vul… |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:21.653Z | 2026-02-13T20:45:47.470Z |
| CVE-2025-60704 |
7.5 (3.1)
|
Windows Kerberos Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:21.068Z | 2026-02-13T20:45:46.978Z |
| CVE-2025-60703 |
7.8 (3.1)
|
Windows Remote Desktop Services Elevation of Privilege… |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:20.382Z | 2026-02-13T20:45:46.397Z |
| CVE-2025-59513 |
5.5 (3.1)
|
Windows Bluetooth RFCOM Protocol Driver Information Di… |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:19.799Z | 2026-02-13T20:45:45.803Z |
| CVE-2025-59512 |
7.8 (3.1)
|
Customer Experience Improvement Program (CEIP) Elevati… |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:19.195Z | 2026-02-13T20:45:45.245Z |
| CVE-2025-59511 |
7.8 (3.1)
|
Windows WLAN Service Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2025-11-11T17:59:18.514Z | 2026-02-13T20:45:44.650Z |
| CVE-2025-59510 |
5.5 (3.1)
|
Windows Routing and Remote Access Service (RRAS) Denia… |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:17.642Z | 2026-02-13T20:45:44.046Z |
| CVE-2025-59509 |
5.5 (3.1)
|
Windows Speech Recognition Information Disclosure Vuln… |
Microsoft |
Windows 10 Version 1809 |
2025-11-11T17:59:17.048Z | 2026-02-13T20:45:43.369Z |
| CVE-2025-59508 |
7 (3.1)
|
Windows Speech Recognition Elevation of Privilege Vuln… |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:16.400Z | 2026-02-13T20:45:42.832Z |
| CVE-2025-59507 |
7 (3.1)
|
Windows Speech Runtime Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:15.696Z | 2026-02-13T20:45:42.229Z |
| CVE-2025-59506 |
7 (3.1)
|
DirectX Graphics Kernel Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:14.652Z | 2026-02-13T20:45:41.717Z |
| CVE-2025-59505 |
7.8 (3.1)
|
Windows Smart Card Reader Elevation of Privilege Vulne… |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:13.264Z | 2026-02-13T20:45:41.089Z |
| CVE-2025-59504 |
7.3 (3.1)
|
Azure Monitor Agent Remote Code Execution Vulnerability |
Microsoft |
Azure Monitor |
2025-11-11T17:59:11.909Z | 2026-02-13T20:45:40.285Z |
| CVE-2025-64656 |
9.4 (3.1)
|
Azure Application Gateway Elevation of Privilege Vulne… |
Microsoft |
Azure App Gateway |
2025-11-26T00:20:06.606Z | 2026-02-13T20:45:39.531Z |
| CVE-2026-21509 |
7.8 (3.1)
|
Microsoft Office Security Feature Bypass Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-01-26T17:06:35.512Z | 2026-02-13T20:41:07.937Z |
| CVE-2026-21264 |
9.3 (3.1)
|
Microsoft Account Spoofing Vulnerability |
Microsoft |
Microsoft Account |
2026-01-22T22:47:38.744Z | 2026-02-13T20:41:07.265Z |
| CVE-2026-21521 |
7.4 (3.1)
|
Word Copilot Information Disclosure Vulnerability |
Microsoft |
Microsoft 365 Word Copilot |
2026-01-22T22:47:38.118Z | 2026-02-13T20:41:06.696Z |
| CVE-2026-21227 |
8.2 (3.1)
|
Azure Logic Apps Elevation of Privilege Vulnerability |
Microsoft |
Azure Logic Apps |
2026-01-22T22:47:37.562Z | 2026-02-13T20:41:06.145Z |
| CVE-2026-24307 |
9.3 (3.1)
|
M365 Copilot Information Disclosure Vulnerability |
Microsoft |
Microsoft 365 Copilot |
2026-01-22T22:47:36.934Z | 2026-02-13T20:41:05.649Z |
| CVE-2026-24305 |
9.3 (3.1)
|
Azure Entra ID Elevation of Privilege Vulnerability |
Microsoft |
Microsoft Entra |
2026-01-22T22:47:36.181Z | 2026-02-13T20:41:04.992Z |
| CVE-2026-21524 |
7.4 (3.1)
|
Azure Data Explorer Information Disclosure Vulnerability |
Microsoft |
Azure Data Explorer |
2026-01-22T22:47:35.505Z | 2026-02-13T20:41:04.468Z |
| CVE-2026-24306 |
9.8 (3.1)
|
Azure Front Door Elevation of Privilege Vulnerability |
Microsoft |
Azure Front Door |
2026-01-22T22:47:34.942Z | 2026-02-13T20:41:03.941Z |
| CVE-2026-24304 |
9.9 (3.1)
|
Azure Resource Manager Elevation of Privilege Vulnerability |
Microsoft |
Azure Resource Manager |
2026-01-23T01:18:55.469Z | 2026-02-13T20:41:03.329Z |
| CVE-2026-21520 |
7.5 (3.1)
|
Copilot Studio Information Disclosure Vulnerability |
Microsoft |
Microsoft Copilot Studio |
2026-01-22T22:47:33.536Z | 2026-02-13T20:41:02.655Z |
| CVE-2026-21223 |
5.1 (3.1)
|
Microsoft Edge (Chromium-based) Security Feature Bypas… |
Microsoft |
Microsoft Edge (Chromium-based) |
2026-01-16T21:28:30.158Z | 2026-02-13T20:41:02.117Z |
| CVE-2026-21226 |
7.5 (3.1)
|
Azure Core shared client library for Python Remote Cod… |
Microsoft |
Azure Core shared client library for Python |
2026-01-13T18:04:55.084Z | 2026-02-13T20:41:01.576Z |
| CVE-2026-20958 |
5.4 (3.1)
|
Microsoft SharePoint Information Disclosure Vulnerability |
Microsoft |
Microsoft SharePoint Enterprise Server 2016 |
2026-01-13T17:57:09.881Z | 2026-02-13T20:41:00.439Z |
| CVE-2026-20941 |
7.8 (3.1)
|
Host Process for Windows Tasks Elevation of Privilege … |
Microsoft |
Windows 11 Version 24H2 |
2026-01-13T17:57:10.464Z | 2026-02-13T20:41:00.952Z |
| CVE-2026-20957 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2026-01-13T17:57:09.187Z | 2026-02-13T20:40:59.530Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-70368 |
5.4 (3.1)
|
Worklenz version 2.1.5 contains a Stored Cross-Si… |
n/a |
n/a |
2026-01-26T00:00:00.000Z | 2026-01-27T19:56:00.363Z |
| CVE-2026-0810 |
6.8 (3.1)
|
Gix-date: gix-date: undefined behavior due to invalid … |
GitoxideLabs |
gitoxide |
2026-01-26T19:36:45.705Z | 2026-02-13T15:24:28.267Z |
| CVE-2026-26023 |
5.3 (4.0)
|
Client‑side DOM XSS in the web chat app of Dify when u… |
langgenius |
dify |
2026-02-11T21:23:09.866Z | 2026-02-12T21:16:35.748Z |
| CVE-2025-59471 |
5.9 (3.1)
|
A denial of service vulnerability exists in self-… |
vercel |
next |
2026-01-26T21:43:05.094Z | 2026-01-27T14:55:15.271Z |
| CVE-2026-2320 |
6.5 (3.1)
|
Inappropriate implementation in File input in Goo… |
Google |
Chrome |
2026-02-11T18:08:04.930Z | 2026-02-12T15:11:25.872Z |
| CVE-2026-2321 |
N/A
|
Use after free in Ozone in Google Chrome prior to… |
Google |
Chrome |
2026-02-11T18:08:05.439Z | 2026-02-12T04:55:21.843Z |
| CVE-2026-2322 |
5.4 (3.1)
|
Inappropriate implementation in File input in Goo… |
Google |
Chrome |
2026-02-11T18:08:05.832Z | 2026-02-12T14:05:40.432Z |
| CVE-2026-2323 |
4.3 (3.1)
|
Inappropriate implementation in Downloads in Goog… |
Google |
Chrome |
2026-02-11T18:08:06.261Z | 2026-02-12T17:01:31.747Z |
| CVE-2025-43403 |
5.5 (3.1)
|
An authorization issue was addressed with improve… |
Apple |
macOS |
2026-02-11T22:58:17.254Z | 2026-02-12T17:01:43.381Z |
| CVE-2025-43417 |
5.5 (3.1)
|
A path handling issue was addressed with improved… |
Apple |
macOS |
2026-02-11T22:58:31.572Z | 2026-02-12T16:47:54.266Z |
| CVE-2025-46290 |
7.5 (3.1)
|
A logic issue was addressed with improved checks.… |
Apple |
macOS |
2026-02-11T22:58:34.079Z | 2026-02-12T16:43:15.134Z |
| CVE-2026-20638 |
5.5 (3.1)
|
A logic issue was addressed with improved checks.… |
Apple |
iOS and iPadOS |
2026-02-11T22:58:34.881Z | 2026-02-12T19:34:32.280Z |
| CVE-2026-20645 |
4.6 (3.1)
|
An inconsistent user interface issue was addresse… |
Apple |
iOS and iPadOS |
2026-02-11T22:58:53.527Z | 2026-02-12T19:11:11.631Z |
| CVE-2026-20647 |
5.5 (3.1)
|
This issue was addressed with improved data prote… |
Apple |
macOS |
2026-02-11T22:58:01.687Z | 2026-02-12T15:47:36.057Z |
| CVE-2026-20648 |
5.5 (3.1)
|
A privacy issue was addressed by moving sensitive… |
Apple |
macOS |
2026-02-11T22:59:01.808Z | 2026-02-12T19:02:26.865Z |
| CVE-2026-20650 |
7.5 (3.1)
|
A denial-of-service issue was addressed with impr… |
Apple |
macOS |
2026-02-11T22:58:12.767Z | 2026-02-12T21:26:32.704Z |
| CVE-2026-20652 |
7.5 (3.1)
|
The issue was addressed with improved memory hand… |
Apple |
Safari |
2026-02-11T22:59:04.639Z | 2026-02-12T19:31:21.723Z |
| CVE-2026-20653 |
5.5 (3.1)
|
A parsing issue in the handling of directory path… |
Apple |
macOS |
2026-02-11T22:58:55.426Z | 2026-02-12T19:08:38.616Z |
| CVE-2026-20654 |
N/A
|
The issue was addressed with improved memory hand… |
Apple |
macOS |
2026-02-11T22:58:39.810Z | 2026-02-11T22:58:39.810Z |
| CVE-2026-20655 |
N/A
|
An authorization issue was addressed with improve… |
Apple |
iOS and iPadOS |
2026-02-11T22:58:37.366Z | 2026-02-11T22:58:37.366Z |
| CVE-2026-20656 |
N/A
|
A logic issue was addressed with improved validat… |
Apple |
Safari |
2026-02-11T22:58:23.667Z | 2026-02-11T22:58:23.667Z |
| CVE-2026-20658 |
N/A
|
A package validation issue was addressed by block… |
Apple |
macOS |
2026-02-11T22:58:44.414Z | 2026-02-13T04:56:30.083Z |
| CVE-2026-25593 |
8.4 (3.1)
|
OpenClaw Affected by Unauthenticated Local RCE via Web… |
openclaw |
openclaw |
2026-02-06T20:56:02.824Z | 2026-02-09T15:27:48.829Z |
| CVE-2026-25475 |
6.5 (3.1)
|
OpenClaw Vulnerable to Local File Inclusion via MEDIA:… |
openclaw |
openclaw |
2026-02-04T19:55:36.228Z | 2026-02-05T14:32:36.477Z |
| CVE-2026-20675 |
5.5 (3.1)
|
The issue was addressed with improved bounds chec… |
Apple |
macOS |
2026-02-11T22:58:29.051Z | 2026-02-12T21:30:16.009Z |
| CVE-2025-49756 |
3.3 (3.1)
|
Office Developer Platform Security Feature Bypass Vuln… |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-07-08T16:57:27.411Z | 2026-02-13T19:07:02.680Z |
| CVE-2025-49737 |
7 (3.1)
|
Microsoft Teams Elevation of Privilege Vulnerability |
Microsoft |
Microsoft Teams for Mac, New Edition |
2025-07-08T16:58:14.537Z | 2026-02-13T19:07:49.711Z |
| CVE-2025-49735 |
8.1 (3.1)
|
Windows KDC Proxy Service (KPSSVC) Remote Code Executi… |
Microsoft |
Windows Server 2012 |
2025-07-08T16:57:25.143Z | 2026-02-13T19:07:00.391Z |
| CVE-2026-25157 |
7.8 (3.1)
|
OpenClaw/Clawdbot has OS Command Injection via Project… |
openclaw |
openclaw |
2026-02-04T19:55:38.493Z | 2026-02-05T14:32:32.289Z |
| CVE-2025-49731 |
3.1 (3.1)
|
Microsoft Teams Elevation of Privilege Vulnerability |
Microsoft |
Microsoft Teams for Android |
2025-07-08T16:57:24.562Z | 2026-02-13T19:06:59.899Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-2320 | Inappropriate implementation in File input in Google Chrome prior to 145.0.7632.45 allowed a remote… | 2026-02-11T19:15:52.160 | 2026-02-13T14:52:29.383 |
| fkie_cve-2026-2321 | Use after free in Ozone in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convi… | 2026-02-11T19:15:52.273 | 2026-02-13T14:51:48.773 |
| fkie_cve-2026-2322 | Inappropriate implementation in File input in Google Chrome prior to 145.0.7632.45 allowed a remote… | 2026-02-11T19:15:52.400 | 2026-02-13T14:51:37.260 |
| fkie_cve-2026-2323 | Inappropriate implementation in Downloads in Google Chrome prior to 145.0.7632.45 allowed a remote … | 2026-02-11T19:15:52.497 | 2026-02-13T14:51:29.203 |
| fkie_cve-2025-43403 | An authorization issue was addressed with improved state management. This issue is fixed in macOS S… | 2026-02-11T23:16:01.597 | 2026-02-13T14:50:34.183 |
| fkie_cve-2025-43417 | A path handling issue was addressed with improved logic. This issue is fixed in macOS Sonoma 14.8.4… | 2026-02-11T23:16:02.200 | 2026-02-13T14:50:19.590 |
| fkie_cve-2025-46290 | A logic issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, macO… | 2026-02-11T23:16:02.407 | 2026-02-13T14:50:10.343 |
| fkie_cve-2026-20638 | A logic issue was addressed with improved checks. This issue is fixed in iOS 26.3 and iPadOS 26.3. … | 2026-02-11T23:16:06.923 | 2026-02-13T14:48:06.043 |
| fkie_cve-2026-20645 | An inconsistent user interface issue was addressed with improved state management. This issue is fi… | 2026-02-11T23:16:07.430 | 2026-02-13T14:47:57.417 |
| fkie_cve-2026-20647 | This issue was addressed with improved data protection. This issue is fixed in macOS Tahoe 26.3. An… | 2026-02-11T23:16:07.630 | 2026-02-13T14:47:31.107 |
| fkie_cve-2026-20648 | A privacy issue was addressed by moving sensitive data to a protected location. This issue is fixed… | 2026-02-11T23:16:07.730 | 2026-02-13T14:47:19.083 |
| fkie_cve-2026-20650 | A denial-of-service issue was addressed with improved validation. This issue is fixed in watchOS 26… | 2026-02-11T23:16:07.927 | 2026-02-13T14:46:52.993 |
| fkie_cve-2026-20652 | The issue was addressed with improved memory handling. This issue is fixed in macOS Tahoe 26.3, iOS… | 2026-02-11T23:16:08.033 | 2026-02-13T14:46:38.773 |
| fkie_cve-2026-20653 | A parsing issue in the handling of directory paths was addressed with improved path validation. Thi… | 2026-02-11T23:16:08.130 | 2026-02-13T14:46:14.923 |
| fkie_cve-2026-20654 | The issue was addressed with improved memory handling. This issue is fixed in watchOS 26.3, tvOS 26… | 2026-02-11T23:16:08.233 | 2026-02-13T14:45:57.070 |
| fkie_cve-2026-20655 | An authorization issue was addressed with improved state management. This issue is fixed in iOS 26.… | 2026-02-11T23:16:08.330 | 2026-02-13T14:45:45.517 |
| fkie_cve-2026-20656 | A logic issue was addressed with improved validation. This issue is fixed in iOS 18.7.5 and iPadOS … | 2026-02-11T23:16:08.427 | 2026-02-13T14:45:31.937 |
| fkie_cve-2026-20658 | A package validation issue was addressed by blocking the vulnerable package. This issue is fixed in… | 2026-02-11T23:16:08.530 | 2026-02-13T14:45:17.953 |
| fkie_cve-2026-25593 | OpenClaw is a personal AI assistant. Prior to 2026.1.20, an unauthenticated local client could use … | 2026-02-06T21:16:17.790 | 2026-02-13T14:44:08.340 |
| fkie_cve-2026-25475 | OpenClaw is a personal AI assistant. Prior to version 2026.1.30, the isValidMedia() function in src… | 2026-02-04T20:16:07.287 | 2026-02-13T14:42:29.397 |
| fkie_cve-2026-20675 | The issue was addressed with improved bounds checks. This issue is fixed in watchOS 26.3, tvOS 26.3… | 2026-02-11T23:16:09.870 | 2026-02-13T14:39:51.920 |
| fkie_cve-2025-49756 | Use of a broken or risky cryptographic algorithm in Office Developer Platform allows an authorized … | 2025-07-08T17:16:04.020 | 2026-02-13T14:35:27.727 |
| fkie_cve-2025-49737 | Concurrent execution using shared resource with improper synchronization ('race condition') in Micr… | 2025-07-08T17:16:02.460 | 2026-02-13T14:34:47.430 |
| fkie_cve-2025-49735 | Use after free in Windows KDC Proxy Service (KPSSVC) allows an unauthorized attacker to execute cod… | 2025-07-08T17:16:02.270 | 2026-02-13T14:34:19.893 |
| fkie_cve-2026-25157 | OpenClaw is a personal AI assistant. Prior to version 2026.1.29, there is an OS command injection v… | 2026-02-04T20:16:06.577 | 2026-02-13T14:33:31.043 |
| fkie_cve-2025-49731 | Improper handling of insufficient permissions or privileges in Microsoft Teams allows an authorized… | 2025-07-08T17:16:01.653 | 2026-02-13T14:32:33.727 |
| fkie_cve-2026-24763 | OpenClaw (formerly Clawdbot) is a personal AI assistant you run on your own devices. Prior to 2026… | 2026-02-02T23:16:08.593 | 2026-02-13T14:28:51.560 |
| fkie_cve-2026-26225 | Intego Personal Backup, a macOS backup utility that allows users to create scheduled backups and bo… | 2026-02-12T22:16:07.477 | 2026-02-13T14:23:48.007 |
| fkie_cve-2026-26224 | Intego Log Reporter, a macOS diagnostic utility bundled with Intego security products that collects… | 2026-02-12T22:16:07.320 | 2026-02-13T14:23:48.007 |
| fkie_cve-2026-26219 | newbee-mall stores and verifies user passwords using an unsalted MD5 hashing algorithm. The impleme… | 2026-02-12T19:15:52.300 | 2026-02-13T14:23:48.007 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-m4mv-q6m2-24j4 |
5.5 (3.1)
|
The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, i… | 2026-02-12T00:31:03Z | 2026-02-12T18:30:21Z |
| ghsa-hfmq-6wjv-c7r3 |
9.8 (3.1)
|
An issue was discovered in OpenSatKit 2.2.1. The EventErrStr buffer has a fixed size of 256 bytes. … | 2026-02-11T18:31:31Z | 2026-02-12T18:30:21Z |
| ghsa-h9c8-jr46-gp7p |
8.8 (3.1)
|
Unrestricted Upload of File with Dangerous Type vulnerabilities exist in the rich text editor and d… | 2026-02-11T21:30:42Z | 2026-02-12T18:30:21Z |
| ghsa-gvjm-pmwp-75mw |
6.5 (3.1)
|
Inappropriate implementation in Animation in Google Chrome prior to 145.0.7632.45 allowed a remote … | 2026-02-11T21:30:40Z | 2026-02-12T18:30:21Z |
| ghsa-g32q-3228-m26p |
5.5 (3.1)
|
A path handling issue was addressed with improved logic. This issue is fixed in macOS Sonoma 14.8.4… | 2026-02-12T00:31:03Z | 2026-02-12T18:30:21Z |
| ghsa-fmxw-gfwm-67w3 |
7.5 (3.1)
|
The /dbviewer/ web endpoint in METIS WIC devices is exposed without authentication. A remote attack… | 2026-02-11T15:30:27Z | 2026-02-12T18:30:21Z |
| ghsa-f7qx-wh9j-7278 |
5.5 (3.1)
|
The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, i… | 2026-02-12T00:31:03Z | 2026-02-12T18:30:21Z |
| ghsa-f24m-jwf4-xpxc |
5.5 (3.1)
|
An authorization issue was addressed with improved state management. This issue is fixed in macOS S… | 2026-02-12T00:31:03Z | 2026-02-12T18:30:21Z |
| ghsa-cp3m-5wf6-4649 |
9.8 (3.1)
|
METIS WIC devices (versions <= oscore 2.1.234-r18) expose a web-based shell at the /console endpoin… | 2026-02-11T15:30:27Z | 2026-02-12T18:30:21Z |
| ghsa-c37x-p7mp-hh29 |
6.5 (3.1)
|
Insufficient policy enforcement in Frames in Google Chrome prior to 145.0.7632.45 allowed a remote … | 2026-02-11T21:30:39Z | 2026-02-12T18:30:21Z |
| ghsa-99pv-pwgp-5cm5 |
5.5 (3.1)
|
The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, i… | 2026-02-12T00:31:04Z | 2026-02-12T18:30:21Z |
| ghsa-96rf-whf9-r5vh |
8.8 (3.1)
|
Vulnerabilities in the My Account and User Management components in CIPPlanner CIPAce before 9.17 a… | 2026-02-12T00:31:03Z | 2026-02-12T18:30:21Z |
| ghsa-926h-3qgq-9w39 |
7.5 (3.1)
|
A logic issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, macO… | 2026-02-12T00:31:03Z | 2026-02-12T18:30:21Z |
| ghsa-6r9h-3c6p-4chm |
8.1 (3.1)
|
A race condition vulnerability exists in MedusaJS Medusa v2.12.2 and earlier in the registerUsage()… | 2026-02-11T21:30:39Z | 2026-02-12T18:30:21Z |
| ghsa-3x5q-gxp5-wv27 |
9.8 (3.1)
|
METIS DFS devices (versions <= oscore 2.1.234-r18) expose a web-based shell at the /console endpoin… | 2026-02-11T15:30:27Z | 2026-02-12T18:30:21Z |
| ghsa-3wh2-2wc5-f45w |
9.8 (3.1)
9.2 (4.0)
|
A link following vulnerability has been reported to affect several QNAP operating system versions. … | 2026-02-11T15:30:26Z | 2026-02-12T18:30:21Z |
| ghsa-3rgq-74p3-8xc5 |
4.9 (3.1)
1.2 (4.0)
|
A use of uninitialized variable vulnerability has been reported to affect several QNAP operating sy… | 2026-02-11T15:30:26Z | 2026-02-12T18:30:21Z |
| ghsa-3fcr-xq7p-rffp |
7.5 (3.1)
|
Vulnerabilities in the File Download and Get File handler components in CIPPlanner CIPAce before 9.… | 2026-02-12T00:31:03Z | 2026-02-12T18:30:21Z |
| ghsa-2prw-jcj2-h5xf |
6.5 (3.1)
|
Inappropriate implementation in PictureInPicture in Google Chrome prior to 145.0.7632.45 allowed a … | 2026-02-11T21:30:39Z | 2026-02-12T18:30:21Z |
| ghsa-2cmj-fc9r-6h5j |
5.5 (3.1)
|
The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, i… | 2026-02-12T00:31:03Z | 2026-02-12T18:30:21Z |
| ghsa-q6v4-fwc8-3mpc |
5.6 (3.1)
5.9 (4.0)
|
The response coming from TP-Link Archer MR200 v5.2, C20 v6, TL-WR850N v3, and TL-WR845N v4 for any … | 2026-02-05T18:30:32Z | 2026-02-12T18:30:20Z |
| ghsa-7688-cfp6-gj62 |
6.5 (3.1)
5.3 (4.0)
|
A truncated 802.15.4 packet can lead to an assert, resulting in a denial of service. | 2026-02-05T21:32:42Z | 2026-02-12T18:30:20Z |
| ghsa-2x8h-ggxv-ww4j |
8.8 (3.1)
7.5 (4.0)
|
An Improper Certificate Validation vulnerability in TP-Link Tapo H100 v1 and Tapo P100 v1 allows an… | 2026-02-05T18:30:32Z | 2026-02-12T18:30:20Z |
| ghsa-wfx5-6vpf-vmpx |
5.4 (3.1)
2.3 (4.0)
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-01-09T00:30:28Z | 2026-02-12T18:30:19Z |
| ghsa-mrvc-5w25-h6c4 |
4.3 (3.1)
2.3 (4.0)
|
Improper Encoding or Escaping of Output due to magic word replacement in ParserAfterTidy vulnerabil… | 2026-01-09T00:30:28Z | 2026-02-12T18:30:19Z |
| ghsa-jvf4-gm9f-33g9 |
8.0 (3.1)
4.8 (4.0)
|
An insufficient input validation vulnerability in NETGEAR Orbi devices' DHCPv6 functionality allow… | 2026-01-13T18:31:07Z | 2026-02-12T18:30:19Z |
| ghsa-jjx2-jhcm-j26c |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: cpufreq: amd-pstate-ut: Fix ke… | 2025-10-04T18:31:15Z | 2026-02-12T18:30:19Z |
| ghsa-972g-439m-qvrv |
5.4 (3.1)
2.3 (4.0)
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-01-09T00:30:28Z | 2026-02-12T18:30:19Z |
| ghsa-5576-c4r8-hvqj |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ext2: Check block size validit… | 2025-10-04T18:31:15Z | 2026-02-12T18:30:19Z |
| ghsa-3pwq-c4jq-fp68 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix defrag path trigger… | 2025-10-04T18:31:15Z | 2026-02-12T18:30:19Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-78 |
8.8 (3.1)
|
An arbitrary code execution vulnerability exists in versions 23.12.4.0 up to 24.7.4.1 of … | mindsdb | 2024-09-12T13:15:00+00:00 | 2024-09-16T19:20:04.697678+00:00 |
| pysec-2024-77 |
8.8 (3.1)
|
An arbitrary code execution vulnerability exists in versions 23.10.3.0 up to 24.7.4.1 of … | mindsdb | 2024-09-12T13:15:00+00:00 | 2024-09-16T19:20:04.616691+00:00 |
| pysec-2024-76 |
7.5 (3.1)
|
An XML External Entity (XXE) vulnerability in the ebookmeta.get_metadata function of eboo… | ebookmeta | 2024-06-07T19:15:00+00:00 | 2024-09-13T21:22:04.531357+00:00 |
| pysec-2024-75 |
6.1 (3.1)
|
Twisted is an event-based framework for internet applications, supporting Python 3.6+. Th… | twisted | 2024-07-29T16:15:00+00:00 | 2024-09-11T19:19:18.005250+00:00 |
| pysec-2024-71 |
7.5 (3.1)
|
A vulnerability in corydolphin/flask-cors up to version 4.0.1 allows the `Access-Control-… | flask-cors | 2024-08-18T19:15:00Z | 2024-09-09T07:59:30.591275Z |
| pysec-2024-74 |
9.1 (3.1)
|
MindsDB is a platform for building artificial intelligence from enterprise data. Prior to… | mindsdb | 2024-09-05T17:15:00+00:00 | 2024-09-06T15:22:53.971446+00:00 |
| pysec-2024-73 |
9.1 (3.1)
|
A vulnerability in the JSON file handling of gaizhenbiao/chuanhuchatgpt version 20240410 … | chuanhuchatgpt | 2024-07-31T01:15:00+00:00 | 2024-08-27T15:22:40.259109+00:00 |
| pysec-2024-70 |
|
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. QuerySet.values… | django | 2024-08-07T15:15:00+00:00 | 2024-08-07T17:22:10.804411+00:00 |
| pysec-2024-69 |
|
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize and … | django | 2024-08-07T15:15:00+00:00 | 2024-08-07T17:22:10.745844+00:00 |
| pysec-2024-68 |
|
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The urlize() an… | django | 2024-08-07T15:15:00+00:00 | 2024-08-07T17:22:10.682679+00:00 |
| pysec-2024-67 |
|
An issue was discovered in Django 5.0 before 5.0.8 and 4.2 before 4.2.15. The floatformat… | django | 2024-08-07T15:15:00+00:00 | 2024-08-07T17:22:10.613440+00:00 |
| pysec-2024-66 |
7.8 (3.1)
|
dbt enables data analysts and engineers to transform their data using the same practices … | dbt-core | 2024-07-16T23:15:00+00:00 | 2024-07-19T17:21:49.664320+00:00 |
| pysec-2024-65 |
|
Roundup before 2.4.0 allows XSS via JavaScript in PDF, XML, and SVG documents. | roundup | 2024-07-17T20:15:00+00:00 | 2024-07-17T23:22:05.024899+00:00 |
| pysec-2024-64 |
|
Roundup before 2.4.0 allows XSS via a SCRIPT element in an HTTP Referer header. | roundup | 2024-07-17T20:15:00+00:00 | 2024-07-17T23:22:04.987078+00:00 |
| pysec-2024-63 |
|
In Roundup before 2.4.0, classhelpers (_generic.help.html) allow XSS. | roundup | 2024-07-17T20:15:00+00:00 | 2024-07-17T23:22:04.949977+00:00 |
| pysec-2024-62 |
|
Versions of the package langchain-experimental from 0.0.15 and before 0.0.21 are vulnerab… | langchain-experimental | 2024-07-15T05:15:00+00:00 | 2024-07-15T11:19:36.686972+00:00 |
| pysec-2024-61 |
6.1 (3.1)
|
A Stored Cross-Site Scripting (XSS) vulnerability exists in gaizhenbiao/chuanhuchatgpt ve… | chuanhuchatgpt | 2024-07-11T11:15:00+00:00 | 2024-07-12T21:33:00.657381+00:00 |
| pysec-2024-60 |
7.5 (3.1)
|
A vulnerability was identified in the kjd/idna library, specifically within the `idna.enc… | idna | 2024-07-07T18:15:00+00:00 | 2024-07-11T17:21:37.216928+00:00 |
| pysec-2024-59 |
|
An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. get_supported_l… | django | 2024-07-10T05:15:00+00:00 | 2024-07-10T11:20:07.800540+00:00 |
| pysec-2024-58 |
|
An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. Derived classes… | django | 2024-07-10T05:15:00+00:00 | 2024-07-10T11:20:07.704786+00:00 |
| pysec-2024-57 |
|
An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. The django.cont… | django | 2024-07-10T05:15:00+00:00 | 2024-07-10T11:20:07.604887+00:00 |
| pysec-2024-56 |
|
An issue was discovered in Django 4.2 before 4.2.14 and 5.0 before 5.0.7. urlize and urli… | django | 2024-07-10T05:15:00+00:00 | 2024-07-10T11:20:07.495359+00:00 |
| pysec-2024-54 |
6.5 (3.1)
|
CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang St… | codechecker | 2024-06-24T18:15:00+00:00 | 2024-06-26T19:19:24.981233+00:00 |
| pysec-2024-53 |
|
langchain_experimental (aka LangChain Experimental) before 0.0.61 for LangChain provides … | langchain-experimental | 2024-06-16T15:15:00+00:00 | 2024-06-16T17:20:32.187558+00:00 |
| pysec-2024-52 |
|
lepture Authlib before 1.3.1 has algorithm confusion with asymmetric public keys. Unless … | authlib | 2024-06-09T19:15:00+00:00 | 2024-06-09T21:20:21.309692+00:00 |
| pysec-2024-51 |
|
A broken access control vulnerability exists in mlflow/mlflow versions before 2.10.1, whe… | mlflow | 2024-05-16T09:15:00+00:00 | 2024-05-16T11:19:52.866536+00:00 |
| pysec-2024-50 |
|
Synapse is an open-source Matrix homeserver. A remote Matrix user with malicious intent, … | matrix-synapse | 2024-04-23T18:15:00+00:00 | 2024-04-23T21:18:51.688096+00:00 |
| pysec-2023-260 |
6.1 (3.1)
|
A reflected Cross-Site Scripting (XSS) vulnerability exists in the mlflow/mlflow reposito… | mlflow | 2023-12-07T05:15:00+00:00 | 2024-04-16T15:20:55.191003+00:00 |
| pysec-2024-49 |
|
Lektor before 3.3.11 does not sanitize DB path traversal. Thus, shell commands might be e… | lektor | 2024-03-27T06:15:00+00:00 | 2024-03-27T11:18:36.506150+00:00 |
| pysec-2024-48 |
|
Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial o… | black | 2024-03-19T05:15:00+00:00 | 2024-03-19T11:18:50.379002+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33493 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.619288Z |
| gsd-2024-33492 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.731337Z |
| gsd-2024-33491 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.718371Z |
| gsd-2024-33490 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.665553Z |
| gsd-2024-33489 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.611685Z |
| gsd-2024-33488 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.694115Z |
| gsd-2024-33487 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.639566Z |
| gsd-2024-33486 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.748923Z |
| gsd-2024-33485 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.745744Z |
| gsd-2024-33484 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.661953Z |
| gsd-2024-33483 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.701680Z |
| gsd-2024-33482 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.716648Z |
| gsd-2024-33481 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.698021Z |
| gsd-2024-33480 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.675618Z |
| gsd-2024-33479 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.623322Z |
| gsd-2024-33478 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.740835Z |
| gsd-2024-33477 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.655326Z |
| gsd-2024-33476 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.701273Z |
| gsd-2024-33475 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.736524Z |
| gsd-2024-33474 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.614325Z |
| gsd-2024-33473 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.742910Z |
| gsd-2024-33472 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.672300Z |
| gsd-2024-33471 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.699196Z |
| gsd-2024-33470 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.605391Z |
| gsd-2024-33469 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.670615Z |
| gsd-2024-33468 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.730709Z |
| gsd-2024-33467 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.659390Z |
| gsd-2024-33466 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.737764Z |
| gsd-2024-33465 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.757068Z |
| gsd-2024-33464 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.753578Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-462 | Malicious code in @ikeacn/ui (npm) | 2026-01-22T12:23:23Z | 2026-01-23T01:38:58Z |
| mal-2026-461 | Malicious code in @corp-front/corporate-filter-company-select (npm) | 2026-01-22T12:24:27Z | 2026-01-23T01:38:58Z |
| mal-2026-456 | Malicious code in @mailpoet/eslint-config (npm) | 2026-01-22T09:07:20Z | 2026-01-23T01:38:58Z |
| mal-2026-455 | Malicious code in @mailpoet/components (npm) | 2026-01-22T09:07:20Z | 2026-01-23T01:38:58Z |
| mal-2026-454 | Malicious code in @mailpoet/component (npm) | 2026-01-22T09:07:20Z | 2026-01-23T01:38:58Z |
| mal-2026-453 | Malicious code in @fortinet/fortigate-autoscale (npm) | 2026-01-22T09:07:20Z | 2026-01-23T01:38:58Z |
| mal-2026-452 | Malicious code in @brl-laiwb/ng-laiwb-api (npm) | 2026-01-22T09:07:19Z | 2026-01-23T01:38:58Z |
| mal-2026-451 | Malicious code in @alluxio/common-ui (npm) | 2026-01-22T09:07:19Z | 2026-01-23T01:38:58Z |
| mal-2026-384 | Malicious code in @mikudev/signal (npm) | 2026-01-21T04:14:15Z | 2026-01-23T01:38:58Z |
| mal-2026-383 | Malicious code in @mikudev/ridwan-signal (npm) | 2026-01-21T04:14:14Z | 2026-01-23T01:38:58Z |
| mal-2026-382 | Malicious code in @mikudev/ridwan-baileys-mod (npm) | 2026-01-21T04:14:15Z | 2026-01-23T01:38:58Z |
| mal-2026-381 | Malicious code in @mikudev/beles (npm) | 2026-01-21T04:14:15Z | 2026-01-23T01:38:58Z |
| mal-2026-380 | Malicious code in @kyriba/platform-frontend (npm) | 2026-01-21T04:29:26Z | 2026-01-23T01:38:58Z |
| mal-2026-379 | Malicious code in @joaoxxx/internallib-v325 (npm) | 2026-01-21T04:28:02Z | 2026-01-23T01:38:58Z |
| mal-2026-378 | Malicious code in @diendh/n8n-nodes-tiktok-v2 (npm) | 2026-01-21T03:58:08Z | 2026-01-23T01:38:58Z |
| mal-2026-353 | Malicious code in advanced-svg-fetcher (npm) | 2026-01-20T03:46:08Z | 2026-01-23T01:38:58Z |
| mal-2026-347 | Malicious code in @bingads-webui-theme-2018/theme-fluent (npm) | 2026-01-19T05:13:17Z | 2026-01-23T01:38:58Z |
| mal-2026-336 | Malicious code in @cda-apps/source (npm) | 2026-01-19T00:57:36Z | 2026-01-23T01:38:58Z |
| mal-2026-330 | Malicious code in @daffadeveloper/signal-node (npm) | 2026-01-19T00:33:19Z | 2026-01-23T01:38:58Z |
| mal-2026-329 | Malicious code in @brokenzzz/garfish (npm) | 2026-01-19T00:45:11Z | 2026-01-23T01:38:58Z |
| mal-2026-328 | Malicious code in 1231dai (npm) | 2026-01-19T00:43:46Z | 2026-01-23T01:38:58Z |
| mal-2026-322 | Malicious code in admin10001 (npm) | 2026-01-16T13:51:12Z | 2026-01-23T01:38:58Z |
| mal-2026-483 | Malicious code in public-site-cms-ui (npm) | 2026-01-23T01:13:12Z | 2026-01-23T01:13:12Z |
| mal-2026-482 | Malicious code in public-site-boostmoney-ui (npm) | 2026-01-23T01:13:12Z | 2026-01-23T01:13:12Z |
| mal-2026-481 | Malicious code in oasis-os-provider-messaging (npm) | 2026-01-23T01:13:12Z | 2026-01-23T01:13:12Z |
| mal-2026-479 | Malicious code in integromat-ui (npm) | 2026-01-23T01:13:12Z | 2026-01-23T01:13:12Z |
| mal-2026-478 | Malicious code in domino-elements (npm) | 2026-01-23T01:13:12Z | 2026-01-23T01:13:12Z |
| mal-2026-477 | Malicious code in bttr-devs (npm) | 2026-01-23T01:13:12Z | 2026-01-23T01:13:12Z |
| mal-2026-476 | Malicious code in @transaction-list/transaction-list-xs (npm) | 2026-01-23T01:13:12Z | 2026-01-23T01:13:12Z |
| mal-2026-475 | Malicious code in @transaction-list/transaction-list-sm (npm) | 2026-01-23T01:13:12Z | 2026-01-23T01:13:12Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2339 | ImageMagick (BMP decoder): Schwachstelle ermöglicht Denial of Service | 2025-10-19T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2317 | Ubiquiti UniFi: Schwachstelle ermöglicht Ausführung von Debug-Funktionen | 2025-10-15T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2274 | Veeam Backup & Replication: Mehrere Schwachstellen | 2025-10-13T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2247 | Nvidia GPU Display Treiber: Mehrere Schwachstellen | 2025-10-08T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2150 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-09-29T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2132 | Linux Kernel: Mehrere Schwachstellen | 2025-09-24T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2114 | Dell PowerEdge BIOS und iDRAC9: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-09-23T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2002 | libssh: Schwachstelle ermöglicht Denial of Service | 2025-09-09T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-1974 | Podman: Schwachstelle ermöglicht Manipulation von Dateien | 2025-09-04T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-1921 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2025-08-27T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2440 | Red Hat JBoss Enterprise Application Platform: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes | 2015-11-22T23:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-2395 | Rancher Manager: Mehrere Schwachstellen | 2025-10-23T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-2390 | PowerDNS Recursor: Mehrere Schwachstellen ermöglichen Manipulation von Dateien | 2025-10-22T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-2385 | Drupal Module: Mehrere Schwachstellen | 2025-10-22T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-2275 | Mozilla Firefox: Mehrere Schwachstellen | 2025-10-14T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-2126 | Drupal Module: Mehrere Schwachstellen | 2025-09-24T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-1954 | Drupal: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-09-03T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-1785 | Intel Prozessoren: Mehrere Schwachstellen | 2025-08-12T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-1656 | Red Hat Enterprise Linux (unbound): Schwachstelle ermöglicht Manipulation von Daten | 2025-07-27T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-1055 | Node.js: Mehrere Schwachstellen | 2025-05-14T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-0403 | libxml2: Mehrere Schwachstellen | 2025-02-18T23:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2024-3338 | Red Hat OpenShift: Mehrere Schwachstelle | 2024-11-05T23:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2024-1547 | OpenSSH auf Red Hat Enterprise Linux 9: Schwachstelle ermöglicht Denial of Service | 2024-07-08T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2023-3022 | Apache ActiveMQ: Schwachstelle ermöglicht Codeausführung | 2023-11-28T23:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2023-2119 | Python: Mehrere Schwachstellen | 2023-08-22T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2023-0611 | Red Hat JBoss Enterprise Application Platform: Schwachstelle ermöglicht Denial of Service | 2023-03-09T23:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2023-0433 | Apache Commons und Apache Tomcat: Schwachstelle ermöglicht Denial of Service | 2023-02-20T23:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-2391 | OpenBao: Mehrere Schwachstellen | 2025-10-22T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2388 | MongoDB: Schwachstelle ermöglicht Privilegieneskalation | 2025-10-22T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2272 | Moodle: Mehrere Schwachstellen | 2025-10-13T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0371 | Kwetsbaarheden verholpen in Cisco IOS XR | 2024-09-13T08:40:26.656280Z | 2024-09-13T08:40:26.656280Z |
| ncsc-2024-0370 | Kwetsbaarheden verholpen in Solarwinds Access Rights Manager | 2024-09-13T08:30:38.806820Z | 2024-09-13T08:30:38.806820Z |
| ncsc-2024-0368 | Kwetsbaarheden verholpen in Adobe producten | 2024-09-11T09:31:21.515977Z | 2024-09-11T09:31:21.515977Z |
| ncsc-2024-0367 | Kwetsbaarheden verholpen in Microsoft Dynamics | 2024-09-10T18:28:04.110959Z | 2024-09-10T18:28:04.110959Z |
| ncsc-2024-0366 | Kwetsbaarheden verholpen in Microsoft Azure | 2024-09-10T18:27:15.880741Z | 2024-09-10T18:27:15.880741Z |
| ncsc-2024-0365 | Kwetsbaarheden verholpen in Microsoft Office | 2024-09-10T18:23:10.239728Z | 2024-09-10T18:23:10.239728Z |
| ncsc-2024-0364 | Kwetsbaarheden verholpen in Microsoft SQL Server | 2024-09-10T18:22:18.355522Z | 2024-09-10T18:22:18.355522Z |
| ncsc-2024-0363 | Kwetsbaarheden verholpen in Microsoft Windows | 2024-09-10T18:21:28.305189Z | 2024-09-10T18:21:28.305189Z |
| ncsc-2024-0362 | Kwetsbaarheden verholpen in Siemens producten | 2024-09-10T18:20:41.668720Z | 2024-09-10T18:20:41.668720Z |
| ncsc-2024-0353 | Kwetsbaarheid verholpen in Sonicwall SonicOS | 2024-08-27T12:45:37.679365Z | 2024-09-10T12:34:18.650826Z |
| ncsc-2024-0361 | Kwetsbaarheden verholpen in QNAP QTS en QTS Hero | 2024-09-10T10:56:51.207746Z | 2024-09-10T10:56:51.207746Z |
| ncsc-2024-0360 | Kwetsbaarheid verholpen in Kemp LoadMaster | 2024-09-06T08:02:25.414309Z | 2024-09-06T08:02:25.414309Z |
| ncsc-2024-0358 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2024-09-05T12:02:20.203769Z | 2024-09-05T12:02:20.203769Z |
| ncsc-2024-0340 | Kwetsbaarheid verholpen in Ivanti Virtual Traffic Manager | 2024-08-14T09:48:46.175634Z | 2024-09-03T11:19:00.763993Z |
| ncsc-2024-0357 | Kwetsbaarheden verholpen in Zyxel Flex en USG Firewalls | 2024-09-03T09:51:27.134213Z | 2024-09-03T09:51:27.134213Z |
| ncsc-2024-0356 | Kwetsbaarheid verholpen in Zyxel Access Points en Secure Routers | 2024-09-03T09:45:01.012004Z | 2024-09-03T09:45:01.012004Z |
| ncsc-2024-0355 | Kwetsbaarheden verholpen in Progress WhatsUp Gold | 2024-08-30T13:44:34.239519Z | 2024-09-02T11:51:17.688561Z |
| ncsc-2024-0354 | Kwetsbaarheden verholpen in Progress WS_FTP server | 2024-08-30T13:42:50.517100Z | 2024-08-30T13:42:50.517100Z |
| ncsc-2024-0334 | Kwetsbaarheden verholpen in Microsoft Windows | 2024-08-13T18:19:27.728322Z | 2024-08-27T07:59:08.391850Z |
| ncsc-2024-0351 | Kwetsbaarheden verholpen in Google Chrome, Chromium & Microsoft Edge | 2024-08-22T11:42:49.629133Z | 2024-08-23T12:59:41.787815Z |
| ncsc-2024-0352 | Kwetsbaarheden verholpen in Solarwinds Web Helpdesk | 2024-08-22T13:05:56.658579Z | 2024-08-22T13:05:56.658579Z |
| ncsc-2024-0350 | Kwetsbaarheden verholpen in GitHub Enterprise Server | 2024-08-22T11:40:38.472495Z | 2024-08-22T11:40:38.472495Z |
| ncsc-2024-0349 | Kwetsbaarheid verholpen in Kubernetes | 2024-08-19T11:37:30.925578Z | 2024-08-19T11:37:30.925578Z |
| ncsc-2024-0348 | Kwetsbaarheden verholpen in Adobe Commerce en Magento | 2024-08-14T12:58:38.046219Z | 2024-08-14T12:58:38.046219Z |
| ncsc-2024-0347 | Kwetsbaarheden verholpen in Adobe Acrobat en Acrobat Reader | 2024-08-14T12:52:29.316273Z | 2024-08-14T12:52:29.316273Z |
| ncsc-2024-0346 | Kwetsbaarheden verholpen in Adobe InDesign | 2024-08-14T12:47:08.240249Z | 2024-08-14T12:47:08.240249Z |
| ncsc-2024-0345 | Kwetsbaarheid verholpen in Adobe Photoshop | 2024-08-14T12:44:49.541083Z | 2024-08-14T12:44:49.541083Z |
| ncsc-2024-0344 | Kwetsbaarheden verholpen in Adobe Dimension | 2024-08-14T12:42:00.097800Z | 2024-08-14T12:42:00.097800Z |
| ncsc-2024-0343 | Kwetsbaarheden verholpen in Adobe Illustrator | 2024-08-14T12:38:58.918490Z | 2024-08-14T12:38:58.918490Z |
| ncsc-2024-0342 | Kwetsbaarheden verholpen in Ivanti Avalanche | 2024-08-14T09:56:40.653912Z | 2024-08-14T09:56:40.653912Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-558014 | SSA-558014: Third-Party Component Vulnerabilities in SCALANCE XCM332 before V2.2 | 2023-04-11T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-557541 | SSA-557541: Denial-of-Service Vulnerability in SIMATIC S7-400 CPUs | 2022-04-12T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-552702 | SSA-552702: Privilege Escalation Vulnerability in the Web Interface of SCALANCE and RUGGEDCOM Products | 2022-10-11T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-549234 | SSA-549234: Denial-of-Service Vulnerability in SIMATIC NET CP Modules | 2021-09-14T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-511182 | SSA-511182: Use of Static TLS Certificate Known Hard Coded Private Keys in Adaptec Maxview Application | 2023-04-11T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-479249 | SSA-479249: Weak Encryption Vulnerability in SCALANCE X-200IRT Devices | 2023-04-11T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-472454 | SSA-472454: Command Injection Vulnerability in CPCI85 Firmware of SICAM A8000 Devices | 2023-04-11T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-462066 | SSA-462066: Vulnerability known as TCP SACK PANIC in Industrial Products | 2019-09-10T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-459643 | SSA-459643: Denial of Service Vulnerability in RUGGEDCOM ROS before V5.6.0 | 2022-09-13T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-310038 | SSA-310038: Multiple Vulnerabilities in SCALANCE X Switch Devices | 2022-07-12T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-270778 | SSA-270778: Denial-of-Service Vulnerability in SIMATIC PCS 7, SIMATIC WinCC and SIMATIC NET PC Software | 2020-02-11T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-244969 | SSA-244969: OpenSSL Vulnerability in Industrial Products | 2022-02-08T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-102233 | SSA-102233: SegmentSmack in VxWorks-based Industrial Devices | 2020-04-14T00:00:00Z | 2023-04-11T00:00:00Z |
| ssa-941426 | SSA-941426: Multiple LLDP Vulnerabilities in Industrial Products | 2021-07-13T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-847261 | SSA-847261: Multiple SPP File Parsing Vulnerabilities in Tecnomatix Plant Simulation | 2023-02-14T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-726834 | SSA-726834: Denial of Service Vulnerability in the RADIUS Client of SIPROTEC 5 Devices | 2023-03-14T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-565386 | SSA-565386: Third-Party Component Vulnerabilities in SCALANCE W-700 IEEE 802.11ax devices before V2.0 | 2023-03-14T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-539476 | SSA-539476: Siemens SIMATIC NET CP, SINEMA and SCALANCE Products Affected by Vulnerabilities in Third-Party Component strongSwan | 2022-02-08T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-517377 | SSA-517377: Multiple Vulnerabilities in the SRCS VPN Feature in SIMATIC CP Devices | 2022-07-12T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-491245 | SSA-491245: Multiple File Parsing Vulnerabilities in Solid Edge | 2023-02-14T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-476715 | SSA-476715: Two Vulnerabilities in Automation License Manager | 2023-01-10T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-419740 | SSA-419740: Multiple Third-Party Component Vulnerabilities in RUGGEDCOM and SCALANCE Products before V7.2 | 2023-03-14T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-324955 | SSA-324955: SAD DNS Attack in Linux Based Products | 2021-05-11T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-320629 | SSA-320629: Security Vulnerabilities Fixed in RUGGEDCOM CROSSBOW V5.3 | 2023-03-14T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-260625 | SSA-260625: Security Vulnerabilities Fixed in RUGGEDCOM CROSSBOW V5.2 | 2023-03-14T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-953464 | SSA-953464: Multiple Vulnerabilites in Siemens Brownfield Connectivity - Client before V2.15 | 2023-02-14T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-836777 | SSA-836777: JT File Parsing Vulnerabilities in JT Open, JT Utilities and Parasolid | 2023-02-14T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-744259 | SSA-744259: Golang Vulnerabilities in Brownfield Connectivity - Gateway before V1.10.1 | 2023-02-14T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-658793 | SSA-658793: Command Injection Vulnerability in SiPass integrated AC5102 / ACC-G2 and ACC-AP | 2023-02-14T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-617755 | SSA-617755: Denial of Service Vulnerability in the SNMP Agent of SCALANCE X-200IRT Products | 2023-02-14T00:00:00Z | 2023-02-14T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2023:7478 | Red Hat Security Advisory: OpenShift Container Platform 4.11.54 security and extras update | 2023-11-29T00:44:58+00:00 | 2026-02-16T07:06:22+00:00 |
| rhsa-2023:7475 | Red Hat Security Advisory: OpenShift Container Platform 4.13.24 bug fix and security update | 2023-11-29T01:47:09+00:00 | 2026-02-16T07:06:21+00:00 |
| rhsa-2023:7474 | Red Hat Security Advisory: OpenShift Container Platform 4.13.24 security and extras update | 2023-11-29T00:33:54+00:00 | 2026-02-16T07:06:21+00:00 |
| rhsa-2023:7470 | Red Hat Security Advisory: OpenShift Container Platform 4.14.4 bug fix and security update | 2023-11-29T11:36:57+00:00 | 2026-02-16T07:06:21+00:00 |
| rhsa-2023:7469 | Red Hat Security Advisory: OpenShift Container Platform 4.14.4 security and extras update | 2023-11-29T10:27:24+00:00 | 2026-02-16T07:06:19+00:00 |
| rhsa-2023:7345 | Red Hat Security Advisory: Red Hat OpenShift GitOps v1.9.3 security update | 2023-11-20T08:34:18+00:00 | 2026-02-16T07:06:19+00:00 |
| rhsa-2023:7344 | Red Hat Security Advisory: openshift-gitops-kam security update | 2023-11-20T07:53:42+00:00 | 2026-02-16T07:06:19+00:00 |
| rhsa-2023:7342 | Red Hat Security Advisory: OpenShift Container Platform 4.11 low-latency extras update | 2023-11-16T20:48:36+00:00 | 2026-02-16T07:06:19+00:00 |
| rhsa-2023:7323 | Red Hat Security Advisory: OpenShift Container Platform 4.13.23 bug fix and security update | 2023-11-21T11:27:12+00:00 | 2026-02-16T07:06:18+00:00 |
| rhsa-2023:7322 | Red Hat Security Advisory: OpenShift Container Platform 4.13.23 security and extras update | 2023-11-21T11:27:54+00:00 | 2026-02-16T07:06:18+00:00 |
| rhsa-2023:7315 | Red Hat Security Advisory: OpenShift Container Platform 4.14.3 bug fix and security update | 2023-11-21T11:26:31+00:00 | 2026-02-16T07:06:17+00:00 |
| rhsa-2023:6893 | Red Hat Security Advisory: OpenShift Container Platform 4.12.44 security and extras update | 2023-11-21T12:20:30+00:00 | 2026-02-16T07:06:17+00:00 |
| rhsa-2023:7288 | Red Hat Security Advisory: Red Hat Product OCP Tools 4.14 Openshift Jenkins security update | 2023-11-16T05:58:26+00:00 | 2026-02-16T07:06:16+00:00 |
| rhsa-2023:7215 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.2.12 | 2023-11-15T00:16:31+00:00 | 2026-02-16T07:06:16+00:00 |
| rhsa-2023:7201 | Red Hat Security Advisory: OpenShift Container Platform 4.15.0 packages and security update | 2024-02-27T22:34:13+00:00 | 2026-02-16T07:06:16+00:00 |
| rhsa-2023:7200 | Red Hat Security Advisory: OpenShift Container Platform 4.15.z security update | 2024-02-27T22:49:18+00:00 | 2026-02-16T07:06:15+00:00 |
| rhsa-2023:7198 | Red Hat Security Advisory: OpenShift Container Platform 4.15.0 bug fix and security update | 2024-02-27T20:49:10+00:00 | 2026-02-16T07:06:14+00:00 |
| rhsa-2023:6894 | Red Hat Security Advisory: OpenShift Container Platform 4.12.44 bug fix and security update | 2023-11-21T12:36:12+00:00 | 2026-02-16T07:06:13+00:00 |
| rhsa-2023:6846 | Red Hat Security Advisory: OpenShift Container Platform 4.13.22 bug fix and security update | 2023-11-15T01:45:54+00:00 | 2026-02-16T07:06:12+00:00 |
| rhsa-2023:6845 | Red Hat Security Advisory: OpenShift Container Platform 4.13.22 security and extras update | 2023-11-15T00:43:04+00:00 | 2026-02-16T07:06:11+00:00 |
| rhsa-2023:6842 | Red Hat Security Advisory: OpenShift Container Platform 4.12.43 bug fix and security update | 2023-11-16T20:31:52+00:00 | 2026-02-16T07:06:11+00:00 |
| rhsa-2023:6841 | Red Hat Security Advisory: Red Hat OpenShift Enterprise security update | 2023-11-16T20:14:47+00:00 | 2026-02-16T07:06:10+00:00 |
| rhsa-2023:6840 | Red Hat Security Advisory: OpenShift Container Platform 4.14.2 packages and security update | 2023-11-15T07:24:02+00:00 | 2026-02-16T07:06:09+00:00 |
| rhsa-2023:6832 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.14.0 security, enhancement & bug fix update | 2023-11-08T18:49:17+00:00 | 2026-02-16T07:06:09+00:00 |
| rhsa-2023:6788 | Red Hat Security Advisory: Red Hat OpenShift GitOps security update | 2023-11-08T02:05:06+00:00 | 2026-02-16T07:06:09+00:00 |
| rhsa-2023:6839 | Red Hat Security Advisory: OpenShift Container Platform 4.14.2 security update | 2023-11-16T05:56:26+00:00 | 2026-02-16T07:06:08+00:00 |
| rhsa-2023:6837 | Red Hat Security Advisory: OpenShift Container Platform 4.14.2 bug fix and security update | 2023-11-15T04:22:30+00:00 | 2026-02-16T07:06:07+00:00 |
| rhsa-2023:6836 | Red Hat Security Advisory: OpenShift Container Platform 4.14.2 security and extras update | 2023-11-15T00:47:45+00:00 | 2026-02-16T07:06:07+00:00 |
| rhsa-2023:6828 | Red Hat Security Advisory: ACS 4.1 enhancement update | 2023-11-08T18:34:59+00:00 | 2026-02-16T07:06:06+00:00 |
| rhsa-2023:6818 | Red Hat Security Advisory: Satellite 6.14 security and bug fix update | 2023-11-08T14:26:58+00:00 | 2026-02-16T07:06:06+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-16-252-01 | GE Bently Nevada 3500/22M Improper Authorization Vulnerability | 2016-06-12T06:00:00.000000Z | 2025-06-09T17:25:24.979586Z |
| icsa-16-250-01 | Siemens SIPROTEC 4 and SIPROTEC Compact Vulnerabilities | 2016-06-10T06:00:00.000000Z | 2025-06-09T17:25:06.309002Z |
| icsa-16-236-01a | Moxa OnCell Vulnerabilities (Update A) | 2016-05-27T06:00:00.000000Z | 2025-06-09T17:24:47.614316Z |
| icsa-16-224-02a | Rockwell Automation RSLogix 500 and RSLogix Micro File Parser Buffer Overflow Vulnerability (Update A) | 2016-05-15T06:00:00.000000Z | 2025-06-09T17:24:28.897472Z |
| icsa-16-224-01 | Rockwell Automation MicroLogix 1400 SNMP Credentials Vulnerability | 2016-05-15T06:00:00.000000Z | 2025-06-09T17:24:22.668983Z |
| icsa-16-215-02a | Siemens SINEMA Server Privilege Escalation Vulnerability (Update A) | 2016-05-06T06:00:00.000000Z | 2025-06-09T17:24:16.438062Z |
| icsa-16-215-01 | Moxa SoftCMS SQL Injection Vulnerability | 2016-05-06T06:00:00.000000Z | 2025-06-09T17:24:09.907471Z |
| icsa-16-208-03 | Siemens SINEMA Remote Connect Server Cross-site Scripting Vulnerability | 2016-04-29T06:00:00.000000Z | 2025-06-09T17:24:03.623977Z |
| icsa-16-208-02 | Siemens SIMATIC NET PC-Software Denial-of-Service Vulnerability | 2016-04-29T06:00:00.000000Z | 2025-06-09T17:23:57.388610Z |
| icsa-16-196-03 | Schneider Electric SoMachine HVAC Unsafe ActiveX Control Vulnerability | 2016-04-17T06:00:00.000000Z | 2025-06-09T17:23:38.592319Z |
| icsa-16-196-02 | Moxa MGate Authentication Bypass Vulnerability | 2016-04-17T06:00:00.000000Z | 2025-06-09T17:23:32.371585Z |
| icsa-16-194-02 | GE Proficy HMI SCADA CIMPLICITY Privilege Management Vulnerability | 2016-04-15T06:00:00.000000Z | 2025-06-09T17:23:26.098354Z |
| icsa-16-194-01 | Tollgrade Smart Grid EMS LightHouse Vulnerabilities | 2016-04-15T06:00:00.000000Z | 2025-06-09T17:23:07.404201Z |
| icsa-16-189-02 | Moxa Device Server Web Console Authorization Bypass Vulnerability | 2016-04-10T06:00:00.000000Z | 2025-06-09T17:23:01.168936Z |
| icsa-16-187-01 | Rexroth Bosch BLADEcontrol-WebVIS Vulnerabilities | 2016-04-08T06:00:00.000000Z | 2025-06-09T17:22:48.711804Z |
| icsa-16-182-02b | Siemens SICAM PAS Information Disclosure Vulnerabilities (Update B) | 2016-04-03T06:00:00.000000Z | 2025-06-09T17:22:36.258239Z |
| icsa-16-182-01 | Eaton ELCSoft Programming Software Memory Vulnerabilities | 2016-04-03T06:00:00.000000Z | 2025-06-09T17:22:23.490004Z |
| icsa-16-175-03 | Meinberg NTP Time Server Vulnerabilities | 2016-03-27T06:00:00.000000Z | 2025-06-09T17:22:04.840219Z |
| icsa-16-175-01 | Rockwell Automation Allen-Bradley Stratix 5400 and 5410 Packet Corruption Vulnerability | 2016-03-27T06:00:00.000000Z | 2025-06-09T17:21:58.604196Z |
| icsa-16-173-03 | Rockwell Automation FactoryTalk EnergyMetrix Vulnerabilities | 2016-03-25T06:00:00.000000Z | 2025-06-09T17:21:46.144304Z |
| icsa-16-173-02 | Schneider Electric PowerLogic PM8ECC Cross-site Scripting Vulnerability | 2016-03-25T06:00:00.000000Z | 2025-06-09T17:21:39.931685Z |
| icsa-16-173-01a | Advantech WebAccess ActiveX Vulnerabilities (Update A) | 2016-03-25T06:00:00.000000Z | 2025-06-09T17:21:20.975954Z |
| icsa-16-168-01 | Moxa PT-7728 Series Switch Improper Authorization Vulnerability | 2016-03-20T06:00:00.000000Z | 2025-06-09T17:21:14.745293Z |
| icsa-16-166-02 | OSIsoft PI AF Server Input Validation Vulnerability | 2016-03-18T06:00:00.000000Z | 2025-06-09T17:21:08.204759Z |
| icsa-16-166-01 | OSIsoft PI SQL Data Access Server Input Validation Vulnerability | 2016-03-18T06:00:00.000000Z | 2025-06-09T17:21:01.997483Z |
| icsa-16-161-02 | Siemens SIMATIC WinCC Flexible Weakly Protected Credentials Vulnerability | 2016-03-13T07:00:00.000000Z | 2025-06-09T17:20:55.764569Z |
| icsa-16-161-01 | Siemens SIMATIC S7-300 Denial-of-Service Vulnerability | 2016-03-13T07:00:00.000000Z | 2025-06-09T17:20:49.461799Z |
| icsa-12-030-01a | Siemens SIMATIC WinCC Vulnerabilities | 2012-11-02T06:00:00.000000Z | 2025-06-09T16:35:39.943110Z |
| icsa-12-024-02 | MICROSYS PROMOTIC Vulnerabilities | 2012-10-27T06:00:00.000000Z | 2025-06-09T16:35:20.987121Z |
| icsa-12-024-01 | Ocean Data Systems Dream Reports XSS and Write Access Violation Vulnerabilities | 2012-10-27T06:00:00.000000Z | 2025-06-09T16:35:08.232133Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-expressway-csrf-KnnZDMj3 | Cisco Expressway Series Cross-Site Request Forgery Vulnerabilities | 2024-02-07T16:00:00+00:00 | 2024-02-12T17:55:43+00:00 |
| cisco-sa-ftd-snort3acp-bypass-3bdr2beh | Multiple Cisco Products Snort 3 Access Control Policy Bypass Vulnerability | 2023-11-01T16:00:00+00:00 | 2024-02-06T18:30:17+00:00 |
| cisco-sa-ftd-snort3acp-bypass-3bdR2BEh | Multiple Cisco Products Snort 3 Access Control Policy Bypass Vulnerability | 2023-11-01T16:00:00+00:00 | 2024-02-06T18:30:17+00:00 |
| cisco-sa-cuc-unauth-afu-froyscsd | Cisco Unity Connection Unauthenticated Arbitrary File Upload Vulnerability | 2024-01-10T16:00:00+00:00 | 2024-02-05T17:23:14+00:00 |
| cisco-sa-cuc-unauth-afu-FROYsCsD | Cisco Unity Connection Unauthenticated Arbitrary File Upload Vulnerability | 2024-01-10T16:00:00+00:00 | 2024-02-05T17:23:14+00:00 |
| cisco-sa-cucm-rce-bwnzqcum | Cisco Unified Communications Products Remote Code Execution Vulnerability | 2024-01-24T16:00:00+00:00 | 2024-01-30T19:16:46+00:00 |
| cisco-sa-cucm-rce-bWNzQcUm | Cisco Unified Communications Products Remote Code Execution Vulnerability | 2024-01-24T16:00:00+00:00 | 2024-01-30T19:16:46+00:00 |
| cisco-sa-sb-bus-acl-bypass-5zn9hnjk | Cisco Small Business Series Switches Stacked Reload ACL Bypass Vulnerability | 2024-01-24T16:00:00+00:00 | 2024-01-24T16:00:00+00:00 |
| cisco-sa-sb-bus-acl-bypass-5zn9hNJk | Cisco Small Business Series Switches Stacked Reload ACL Bypass Vulnerability | 2024-01-24T16:00:00+00:00 | 2024-01-24T16:00:00+00:00 |
| cisco-sa-cuc-xss-9tfuu5ms | Cisco Unity Connection Cross-Site Scripting Vulnerability | 2024-01-24T16:00:00+00:00 | 2024-01-24T16:00:00+00:00 |
| cisco-sa-cuc-xss-9TFuu5MS | Cisco Unity Connection Cross-Site Scripting Vulnerability | 2024-01-24T16:00:00+00:00 | 2024-01-24T16:00:00+00:00 |
| cisco-sa-sdwan-privesc-cli-xkgwmqku | Cisco SD-WAN Software Arbitrary File Corruption Vulnerability | 2022-09-28T16:00:00+00:00 | 2024-01-23T23:05:35+00:00 |
| cisco-sa-sdwan-privesc-cli-xkGwmqKu | Cisco SD-WAN Software Arbitrary File Corruption Vulnerability | 2022-09-28T16:00:00+00:00 | 2024-01-23T23:05:35+00:00 |
| cisco-sa-sd-wan-file-access-vw36d28p | Cisco SD-WAN Solution Improper Access Control Vulnerability | 2022-04-13T16:00:00+00:00 | 2024-01-23T21:31:33+00:00 |
| cisco-sa-sd-wan-file-access-VW36d28P | Cisco SD-WAN Solution Improper Access Control Vulnerability | 2022-04-13T16:00:00+00:00 | 2024-01-23T21:31:33+00:00 |
| cisco-sa-broadworks-xss-6syj82ju | Cisco BroadWorks Application Delivery Platform and Xtended Services Platform Stored Cross-Site Scripting Vulnerability | 2024-01-10T16:00:00+00:00 | 2024-01-23T17:43:55+00:00 |
| cisco-sa-broadworks-xss-6syj82Ju | Cisco BroadWorks Application Delivery Platform and Xtended Services Platform Stored Cross-Site Scripting Vulnerability | 2024-01-10T16:00:00+00:00 | 2024-01-23T17:43:55+00:00 |
| cisco-sa-tms-portal-xss-axnevg3s | Cisco TelePresence Management Suite Cross-Site Scripting Vulnerabilities | 2024-01-10T16:00:00+00:00 | 2024-01-12T15:18:40+00:00 |
| cisco-sa-tms-portal-xss-AXNeVg3s | Cisco TelePresence Management Suite Cross-Site Scripting Vulnerabilities | 2024-01-10T16:00:00+00:00 | 2024-01-12T15:18:40+00:00 |
| cisco-sa-thouseyes-privesc-dmzhg3qv | Cisco ThousandEyes Enterprise Agent Virtual Appliance Privilege Escalation Vulnerability | 2024-01-10T16:00:00+00:00 | 2024-01-10T16:00:00+00:00 |
| cisco-sa-thouseyes-privesc-DmzHG3Qv | Cisco ThousandEyes Enterprise Agent Virtual Appliance Privilege Escalation Vulnerability | 2024-01-10T16:00:00+00:00 | 2024-01-10T16:00:00+00:00 |
| cisco-sa-sb-wap-inject-bhstwgxo | Cisco WAP371 Wireless Access Point Command Injection Vulnerability | 2024-01-10T16:00:00+00:00 | 2024-01-10T16:00:00+00:00 |
| cisco-sa-sb-wap-inject-bHStWgXO | Cisco WAP371 Wireless Access Point Command Injection Vulnerability | 2024-01-10T16:00:00+00:00 | 2024-01-10T16:00:00+00:00 |
| cisco-sa-pi-epnm-wkzjeyeq | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Vulnerabilities | 2024-01-10T16:00:00+00:00 | 2024-01-10T16:00:00+00:00 |
| cisco-sa-pi-epnm-wkZJeyeq | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Vulnerabilities | 2024-01-10T16:00:00+00:00 | 2024-01-10T16:00:00+00:00 |
| cisco-sa-ise-xss-bl4vtml | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerability | 2024-01-10T16:00:00+00:00 | 2024-01-10T16:00:00+00:00 |
| cisco-sa-ISE-XSS-bL4VTML | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerability | 2024-01-10T16:00:00+00:00 | 2024-01-10T16:00:00+00:00 |
| cisco-sa-ise-priv-esc-kjlp2aw | Cisco Identity Services Engine Privilege Escalation Vulnerabilities | 2023-09-06T16:00:00+00:00 | 2024-01-08T19:01:50+00:00 |
| cisco-sa-ise-priv-esc-KJLp2Aw | Cisco Identity Services Engine Privilege Escalation Vulnerabilities | 2023-09-06T16:00:00+00:00 | 2024-01-08T19:01:50+00:00 |
| cisco-sa-struts-c2kcmkmt | Apache Struts Vulnerability Affecting Cisco Products: December 2023 | 2023-12-12T16:00:00+00:00 | 2023-12-21T22:23:04+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2024-6485 | XSS in Bootstrap button component | 2024-07-01T07:00:00.000Z | 2026-01-03T01:39:48.000Z |
| msrc_cve-2025-2486 | UEFI Shell accessible in AAVMF with Secure Boot enabled on Ubuntu | 2025-11-02T00:00:00.000Z | 2026-01-03T01:39:24.000Z |
| msrc_cve-2025-52881 | runc: LSM labels can be bypassed with malicious config using dummy procfs files | 2025-11-02T00:00:00.000Z | 2026-01-03T01:39:17.000Z |
| msrc_cve-2025-61661 | Grub2: grub2: out-of-bounds write via malicious usb device | 2025-11-02T00:00:00.000Z | 2026-01-03T01:39:08.000Z |
| msrc_cve-2025-61663 | Grub2: missing unregister call for normal commands may lead to use-after-free | 2025-11-02T00:00:00.000Z | 2026-01-03T01:39:02.000Z |
| msrc_cve-2025-61662 | Grub2: missing unregister call for gettext command may lead to use-after-free | 2025-11-02T00:00:00.000Z | 2026-01-03T01:38:57.000Z |
| msrc_cve-2025-10911 | Libxslt: use-after-free with key data stored cross-rvt | 2025-09-02T00:00:00.000Z | 2026-01-03T01:37:47.000Z |
| msrc_cve-2025-9288 | Missing type checks leading to hash rewind and passing on crafted data | 2025-08-02T00:00:00.000Z | 2026-01-03T01:37:40.000Z |
| msrc_cve-2021-23445 | Cross-site Scripting (XSS) | 2021-09-02T00:00:00.000Z | 2026-01-03T01:37:36.000Z |
| msrc_cve-2025-7424 | Libxslt: type confusion in xmlnode.psvi between stylesheet and source nodes | 2025-07-02T00:00:00.000Z | 2026-01-03T01:37:21.000Z |
| msrc_cve-2025-32387 | Helm Allows A Specially Crafted JSON Schema To Cause A Stack Overflow | 2025-04-02T00:00:00.000Z | 2026-01-03T01:36:46.000Z |
| msrc_cve-2025-2912 | HDF5 H5Omessage.c H5O_msg_flush heap-based overflow | 2025-03-02T00:00:00.000Z | 2026-01-03T01:36:40.000Z |
| msrc_cve-2024-7598 | Network restriction bypass via race condition during namespace termination | 2025-03-02T00:00:00.000Z | 2026-01-03T01:36:35.000Z |
| msrc_cve-2025-14180 | NULL Pointer Dereference in PDO quoting | 2025-12-02T00:00:00.000Z | 2026-01-03T01:36:31.000Z |
| msrc_cve-2025-2295 | Potential iSCSI R2T PDU Vulnerability | 2025-03-02T00:00:00.000Z | 2026-01-03T01:36:30.000Z |
| msrc_cve-2025-14178 | Heap buffer overflow in array_merge() | 2025-12-02T00:00:00.000Z | 2026-01-03T01:36:22.000Z |
| msrc_cve-2023-52969 | MariaDB Server 10.4 through 10.5.*, 10.6 through 10.6.*, 10.7 through 10.11.*, and 11.0 through 11.0.* can sometimes crash with an empty backtrace log. This may be related to make_aggr_tables_info and optimize_stage2. | 2025-03-02T00:00:00.000Z | 2026-01-03T01:36:21.000Z |
| msrc_cve-2025-14177 | Information Leak of Memory in getimagesize | 2025-12-02T00:00:00.000Z | 2026-01-03T01:36:13.000Z |
| msrc_cve-2023-52970 | MariaDB Server 10.4 through 10.5.*, 10.6 through 10.6.*, 10.7 through 10.11.*, 11.0 through 11.0.*, and 11.1 through 11.4.* crashes in Item_direct_view_ref::derived_field_transformer_for_where. | 2025-03-02T00:00:00.000Z | 2026-01-03T01:36:09.000Z |
| msrc_cve-2025-13699 | MariaDB mariadb-dump Utility Directory Traversal Remote Code Execution Vulnerability | 2025-12-02T00:00:00.000Z | 2026-01-03T01:36:02.000Z |
| msrc_cve-2024-6531 | Rejected reason: This was not a security issue in Bootstrap. Bootstrap’s JavaScript is not intended to sanitize unsafe or intentionally dangerous HTML. As such, the reported behavior fell outside the scope of Bootstrap’s security model, and the associated CVE has been rescinded. | 2024-07-01T07:00:00.000Z | 2026-01-03T01:35:52.000Z |
| msrc_cve-2024-45310 | runc can be confused to create empty files/directories on the host | 2024-09-01T07:00:00.000Z | 2026-01-03T01:35:10.000Z |
| msrc_cve-2025-69277 | libsodium before ad3004e, in atypical use cases involving certain custom cryptography or untrusted data to crypto_core_ed25519_is_valid_point, mishandles checks for whether an elliptic curve point is valid because it sometimes allows points that aren't in the main cryptographic group. | 2025-12-02T00:00:00.000Z | 2026-01-03T01:01:58.000Z |
| msrc_cve-2025-13281 | Portworx Half-Blind SSRF in kube-controller-manager | 2025-12-02T00:00:00.000Z | 2026-01-02T14:40:26.000Z |
| msrc_cve-2025-61915 | OpenPrinting CUPS vulnerable to stack based out-of-bound write | 2025-11-02T00:00:00.000Z | 2026-01-02T14:40:04.000Z |
| msrc_cve-2025-64437 | KubeVirt Isolation Detection Flaw Allows Arbitrary File Permission Changes | 2025-11-02T00:00:00.000Z | 2026-01-02T14:39:46.000Z |
| msrc_cve-2025-64436 | KubeVirt Excessive Role Permissions Could Enable Unauthorized VMI Migrations Between Nodes | 2025-11-02T00:00:00.000Z | 2026-01-02T14:39:41.000Z |
| msrc_cve-2025-64435 | KubeVirt VMI Denial-of-Service (DoS) Using Pod Impersonation | 2025-11-02T00:00:00.000Z | 2026-01-02T14:39:36.000Z |
| msrc_cve-2025-64434 | KubeVirt Improper TLS Certificate Management Handling Allows API Identity Spoofing | 2025-11-02T00:00:00.000Z | 2026-01-02T14:39:30.000Z |
| msrc_cve-2025-64433 | KubeVirt Arbitrary Container File Read | 2025-11-02T00:00:00.000Z | 2026-01-02T14:39:25.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15613-1 | python311-python-socketio-5.14.1-1.1 on GA media | 2025-10-08T00:00:00Z | 2025-10-08T00:00:00Z |
| opensuse-su-2025:15612-1 | pgadmin4-9.8-1.1 on GA media | 2025-10-08T00:00:00Z | 2025-10-08T00:00:00Z |
| opensuse-su-2025:15611-1 | libexslt0-1.1.43-3.1 on GA media | 2025-10-08T00:00:00Z | 2025-10-08T00:00:00Z |
| opensuse-su-2025:15610-1 | grafana-11.6.6-1.1 on GA media | 2025-10-08T00:00:00Z | 2025-10-08T00:00:00Z |
| opensuse-su-2025:15609-1 | go1.25-1.25.2-1.1 on GA media | 2025-10-08T00:00:00Z | 2025-10-08T00:00:00Z |
| opensuse-su-2025:15608-1 | go1.24-1.24.8-1.1 on GA media | 2025-10-08T00:00:00Z | 2025-10-08T00:00:00Z |
| opensuse-su-2025:15607-1 | glow-2.1.1-2.1 on GA media | 2025-10-08T00:00:00Z | 2025-10-08T00:00:00Z |
| opensuse-su-2025:15606-1 | digger-cli-0.6.127-1.1 on GA media | 2025-10-08T00:00:00Z | 2025-10-08T00:00:00Z |
| opensuse-su-2025:15605-1 | ansible-11-11.11.0-1.1 on GA media | 2025-10-08T00:00:00Z | 2025-10-08T00:00:00Z |
| opensuse-su-2025:15604-1 | valkey-8.1.4-1.1 on GA media | 2025-10-07T00:00:00Z | 2025-10-07T00:00:00Z |
| opensuse-su-2025:15603-1 | matrix-synapse-1.139.1-1.1 on GA media | 2025-10-07T00:00:00Z | 2025-10-07T00:00:00Z |
| opensuse-su-2025:15602-1 | gimp-3.0.4-4.1 on GA media | 2025-10-06T00:00:00Z | 2025-10-06T00:00:00Z |
| opensuse-su-2025:15601-1 | chromedriver-141.0.7390.54-1.1 on GA media | 2025-10-05T00:00:00Z | 2025-10-05T00:00:00Z |
| opensuse-su-2025:15600-1 | redis-8.2.2-1.1 on GA media | 2025-10-04T00:00:00Z | 2025-10-04T00:00:00Z |
| opensuse-su-2025:15599-1 | haproxy-3.2.6+git0.81568b2d1-1.1 on GA media | 2025-10-04T00:00:00Z | 2025-10-04T00:00:00Z |
| opensuse-su-2025:15598-1 | python311-Django-5.2.7-1.1 on GA media | 2025-10-03T00:00:00Z | 2025-10-03T00:00:00Z |
| opensuse-su-2025:15597-1 | logback-1.2.13-1.1 on GA media | 2025-10-03T00:00:00Z | 2025-10-03T00:00:00Z |
| opensuse-su-2025:15596-1 | python311-Django4-4.2.25-1.1 on GA media | 2025-10-02T00:00:00Z | 2025-10-02T00:00:00Z |
| opensuse-su-2025:15595-1 | libvmtools-devel-13.0.5-1.1 on GA media | 2025-10-02T00:00:00Z | 2025-10-02T00:00:00Z |
| opensuse-su-2025:15594-1 | azure-storage-azcopy-10.30.1-1.1 on GA media | 2025-10-02T00:00:00Z | 2025-10-02T00:00:00Z |
| opensuse-su-2025:15593-1 | MozillaFirefox-143.0.3-1.1 on GA media | 2025-10-02T00:00:00Z | 2025-10-02T00:00:00Z |
| opensuse-su-2025:15592-1 | libsuricata8_0_1-8.0.1-1.1 on GA media | 2025-10-01T00:00:00Z | 2025-10-01T00:00:00Z |
| opensuse-su-2025:15591-1 | jupyter-jupyterlab-4.4.9-1.1 on GA media | 2025-10-01T00:00:00Z | 2025-10-01T00:00:00Z |
| opensuse-su-2025:15590-1 | curl-8.16.0-1.1 on GA media | 2025-10-01T00:00:00Z | 2025-10-01T00:00:00Z |
| opensuse-su-2025:15589-1 | docker-stable-24.0.9_ce-15.1 on GA media | 2025-09-30T00:00:00Z | 2025-09-30T00:00:00Z |
| opensuse-su-2025:15588-1 | afterburn-5.9.0.git21.a73f509-2.1 on GA media | 2025-09-30T00:00:00Z | 2025-09-30T00:00:00Z |
| opensuse-su-2025:15587-1 | ruby3.4-rubygem-rack-2.2-2.2.18-1.1 on GA media | 2025-09-29T00:00:00Z | 2025-09-29T00:00:00Z |
| opensuse-su-2025:15586-1 | kubecolor-0.5.2-1.1 on GA media | 2025-09-29T00:00:00Z | 2025-09-29T00:00:00Z |
| opensuse-su-2025:15585-1 | kernel-devel-6.16.9-1.1 on GA media | 2025-09-29T00:00:00Z | 2025-09-29T00:00:00Z |
| opensuse-su-2025:15584-1 | gimp-3.0.4-3.1 on GA media | 2025-09-29T00:00:00Z | 2025-09-29T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2024-1029 | Stack-buffer-overflow in gf_hevc_parse_nalu_bs | 2024-08-17T00:13:24.697197Z | 2024-08-17T00:13:24.697938Z |
| osv-2024-996 | Use-of-uninitialized-value in cups_array_find | 2024-08-16T00:15:52.987192Z | 2024-08-16T00:15:52.987525Z |
| osv-2024-994 | Use-of-uninitialized-value in packet_parse | 2024-08-16T00:15:48.093497Z | 2024-08-16T00:15:48.093872Z |
| osv-2024-985 | Heap-double-free in libssh2_default_free | 2024-08-16T00:15:23.884058Z | 2024-08-16T00:15:23.884369Z |
| osv-2024-983 | UNKNOWN READ in ireclaim | 2024-08-16T00:15:21.362695Z | 2024-08-16T00:15:21.363094Z |
| osv-2024-969 | Security exception in com.github.javaparser.GeneratedJavaParser.Expression | 2024-08-16T00:14:31.527023Z | 2024-08-16T00:14:31.527538Z |
| osv-2024-965 | Stack-buffer-overflow in FLAC__stream_encoder_init_ogg_file | 2024-08-16T00:14:23.665242Z | 2024-08-16T00:14:23.665768Z |
| osv-2024-964 | Security exception in com.alibaba.fastjson2.JSONPathSegment$CycleNameSegment$MapLoop.accept | 2024-08-16T00:14:15.405443Z | 2024-08-16T00:14:15.405835Z |
| osv-2024-963 | Heap-buffer-overflow in GfxTilingPattern::scanXObjectForBlendMode | 2024-08-16T00:14:14.315705Z | 2024-08-16T00:14:14.316160Z |
| osv-2024-955 | Use-of-uninitialized-value in pcpp::IPv6Address::toString | 2024-08-16T00:13:46.718533Z | 2024-08-16T00:13:46.718830Z |
| osv-2024-951 | Index-out-of-bounds in hevc_ref_pic_lists_modification | 2024-08-16T00:13:38.322516Z | 2024-08-16T00:13:38.322849Z |
| osv-2024-939 | Security exception in org.apache.poi.util.LZWDecompresser.decompress | 2024-08-16T00:13:05.088720Z | 2024-08-16T00:13:05.089105Z |
| osv-2024-925 | Index-out-of-bounds in derive_collocated_motion_vectors | 2024-08-16T00:11:02.964872Z | 2024-08-16T00:11:02.965320Z |
| osv-2024-883 | Security exception in com.puppycrawl.tools.checkstyle.JavaAstVisitor.getInnerBopAst | 2024-08-16T00:06:29.139503Z | 2024-08-16T00:06:29.139893Z |
| osv-2024-879 | Security exception in java.base/java.util.Arrays.copyOf | 2024-08-16T00:06:11.887593Z | 2024-08-16T00:06:11.888006Z |
| osv-2024-861 | UNKNOWN READ in chunk_free_object | 2024-08-16T00:05:25.024909Z | 2024-08-16T00:05:25.025249Z |
| osv-2024-859 | Heap-double-free in libssh2_default_free | 2024-08-16T00:05:16.221580Z | 2024-08-16T00:05:16.221993Z |
| osv-2024-856 | Use-of-uninitialized-value in cups_fill | 2024-08-16T00:05:10.919440Z | 2024-08-16T00:05:10.919721Z |
| osv-2024-852 | UNKNOWN READ in jvp_object_free | 2024-08-16T00:04:43.641868Z | 2024-08-16T00:04:43.642269Z |
| osv-2024-833 | UNKNOWN READ in chunk_free_object | 2024-08-16T00:03:18.896326Z | 2024-08-16T00:03:18.896644Z |
| osv-2024-830 | UNKNOWN READ in ShadingImage::generateAxialBitmap | 2024-08-16T00:03:09.951294Z | 2024-08-16T00:03:09.951596Z |
| osv-2024-828 | Use-of-uninitialized-value in packet_parse | 2024-08-16T00:03:08.665359Z | 2024-08-16T00:03:08.665719Z |
| osv-2024-805 | Use-of-uninitialized-value in pcpp::NflogLayer::parseNextLayer | 2024-08-16T00:02:19.436836Z | 2024-08-16T00:02:19.437200Z |
| osv-2024-792 | Index-out-of-bounds in AAHD::make_ahd_rb_hv | 2024-08-16T00:01:41.357755Z | 2024-08-16T00:01:41.358066Z |
| osv-2024-777 | Global-buffer-overflow in vte_write_debug | 2024-08-16T00:00:55.259153Z | 2024-08-16T00:00:55.259408Z |
| osv-2024-764 | Use-of-uninitialized-value in _cupsStrAlloc | 2024-08-16T00:00:28.318434Z | 2024-08-16T00:00:28.318983Z |
| osv-2024-748 | Security exception in com.github.javaparser.CommentsInserter.insertComments | 2024-08-13T00:04:40.789098Z | 2024-08-13T00:04:40.789448Z |
| osv-2024-747 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-08-13T00:03:34.008550Z | 2024-08-13T00:03:34.008929Z |
| osv-2024-326 | Heap-buffer-overflow in GfxFont::readFontDescriptor | 2024-04-29T05:42:32.273970Z | 2024-08-12T14:13:53.709919Z |
| osv-2024-668 | Security exception in jflex.core.NFA.insertNFA | 2024-07-20T00:01:48.807354Z | 2024-07-20T00:01:48.807879Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2020-0135 | Slock<T> allows sending non-Send types across thread boundaries | 2020-11-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0134 | `LockWeak<T>` allows to create data race to `T`. | 2020-11-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0133 | Queue<T> should have a Send bound on its Send/Sync traits | 2020-11-15T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0132 | `FixedCapacityDequeLike::clone()` can cause dropping uninitialized memory | 2020-12-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0131 | Send/Sync bound needed on T for Send/Sync impl of RcuCell<T> | 2020-11-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0130 | Bunch<T> unconditionally implements Send/Sync | 2020-11-12T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0129 | ShmWriter allows sending non-Send type across threads | 2020-12-18T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0128 | Cache<K>: Send/Sync impls needs trait bounds on `K` | 2020-11-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0127 | SyncRef's clone() and debug() allow data races | 2020-12-18T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0126 | SyncChannel<T> can move 'T: !Send' to other threads | 2020-11-15T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0125 | convec::ConVec<T> unconditionally implements Send/Sync | 2020-11-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0124 | ArcGuard's Send and Sync should have bounds on RC | 2020-12-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0123 | Contents of uninitialized memory exposed in DeflateOutput's AsyncRead implementation | 2020-01-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0122 | beef::Cow lacks a Sync bound on its Send trait allowing for data races | 2020-10-28T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0121 | AtomicBox<T> implements Send/Sync for any `T: Sized` | 2020-11-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0120 | `Decoder<R>` can carry `R: !Send` to other threads | 2020-11-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0119 | ReadTicket and WriteTicket should only be sendable when T is Send | 2020-11-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0118 | Future<T> lacks bounds on Send and Sync. | 2020-12-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0117 | QueueSender<T>/QueueReceiver<T>: Send/Sync impls need `T: Send` | 2020-11-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0116 | PinSlab<T> and Unordered<T, S> need bounds on their Send/Sync traits | 2020-11-15T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0115 | Singleton lacks bounds on Send and Sync. | 2020-11-16T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0114 | `Demuxer` can carry non-Send types across thread boundaries | 2020-12-22T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0113 | AtomicOption should have Send + Sync bound on its type argument. | 2020-10-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0112 | ButtplugFutureStateShared allows data race to (!Send|!Sync) objects | 2020-12-18T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0108 | Soundness issue: Input<R> can be misused to create data race to an object | 2020-12-20T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0107 | hashconsing's HConsed lacks Send/Sync bound for its Send/Sync trait. | 2020-11-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0106 | Queues allow non-Send types to be sent to other threads, allowing data races | 2020-12-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0105 | Update unsound DrainFilter and RString::retain | 2020-12-21T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0104 | ImageChunkMut needs bounds on its Send and Sync traits | 2020-12-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0103 | `impl Random` on arrays can lead to dropping uninitialized memory | 2020-12-31T12:00:00Z | 2023-06-13T13:10:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-libphp-2024-8929 | Leak partial content of the heap through heap buffer over-read in mysqlnd | 2025-08-11T13:54:31.347Z | 2025-11-06T13:25:46.476Z |
| bit-libphp-2024-8927 | cgi.force_redirect configuration is bypassable due to the environment variable collision | 2025-08-11T13:54:29.171Z | 2025-11-06T13:25:46.476Z |
| bit-libphp-2024-8926 | PHP CGI Parameter Injection Vulnerability (CVE-2024-4577 bypass) | 2025-08-11T13:54:27.013Z | 2025-11-06T13:25:46.476Z |
| bit-libphp-2024-8925 | Erroneous parsing of multipart form data | 2025-08-11T13:54:25.174Z | 2025-11-06T13:25:46.476Z |
| bit-libphp-2024-5458 | Filter bypass in filter_var (FILTER_VALIDATE_URL) | 2025-08-11T13:54:20.794Z | 2025-11-06T13:25:46.476Z |
| bit-libphp-2024-3096 | PHP function password_verify can erroneously return true when argument contains NUL | 2025-08-11T13:54:16.977Z | 2025-11-06T13:25:46.476Z |
| bit-libphp-2024-2757 | PHP mb_encode_mimeheader runs endlessly for some inputs | 2025-08-11T13:54:14.986Z | 2025-11-06T13:25:46.476Z |
| bit-libphp-2024-2756 | __Host-/__Secure- cookie bypass due to partial CVE-2022-31629 fix | 2025-08-11T13:54:12.793Z | 2025-11-06T13:25:46.476Z |
| bit-libphp-2024-1874 | Command injection via array-ish $command parameter of proc_open() | 2025-08-11T13:54:08.513Z | 2025-11-06T13:25:46.476Z |
| bit-libphp-2024-11236 | Integer overflow in the firebird and dblib quoters causing OOB writes | 2025-08-11T13:54:06.723Z | 2025-11-06T13:25:46.476Z |
| bit-libphp-2024-11234 | Configuring a proxy in a stream context might allow for CRLF injection in URIs | 2025-08-11T13:54:03.025Z | 2025-11-06T13:25:46.476Z |
| bit-libphp-2024-11233 | Single byte overread with convert.quoted-printable-decode filter | 2025-08-11T13:54:01.202Z | 2025-11-06T13:25:46.476Z |
| bit-libphp-2022-31629 | $_COOKIE names string replacement (. -> _): cookie integrity vulnerabilities | 2025-08-11T13:53:41.681Z | 2025-11-06T13:25:46.476Z |
| bit-kibana-2025-25018 | Kibana Stored Cross-Site Scripting (XSS) | 2025-10-14T08:43:02.190Z | 2025-11-06T13:25:46.476Z |
| bit-kibana-2025-25017 | Kibana Stored Cross-Site Scripting (XSS) | 2025-10-14T08:43:00.623Z | 2025-11-06T13:25:46.476Z |
| bit-kibana-2025-25009 | Kibana Cross-Site Scripting (XSS) | 2025-10-09T08:43:15.178Z | 2025-11-06T13:25:46.476Z |
| bit-keydb-2025-49844 | Redis Lua Use-After-Free may lead to remote code execution | 2025-10-16T09:12:52.562Z | 2025-11-06T13:25:46.476Z |
| bit-keydb-2025-46819 | Redis is vulnerable to DoS via specially crafted LUA scripts | 2025-10-08T08:43:23.522Z | 2025-11-06T13:25:46.476Z |
| bit-keydb-2024-31228 | Denial-of-service due to unbounded pattern matching in Redis | 2024-10-09T16:30:39.030Z | 2025-11-06T13:25:46.476Z |
| bit-keydb-2022-35977 | Integer overflow in certain command arguments can drive Redis to OOM panic | 2024-08-22T19:25:58.150Z | 2025-11-06T13:25:46.476Z |
| bit-joomla-2020-13763 | 2025-04-03T14:10:16.806Z | 2025-11-06T13:25:46.476Z | |
| bit-joomla-2020-13761 | 2025-04-03T14:10:08.600Z | 2025-11-06T13:25:46.476Z | |
| bit-joomla-2020-13760 | 2025-04-03T14:10:04.787Z | 2025-11-06T13:25:46.476Z | |
| bit-jenkins-2025-59476 | 2025-09-19T09:57:11.182Z | 2025-11-06T13:25:46.476Z | |
| bit-jenkins-2025-59475 | 2025-09-19T09:57:09.400Z | 2025-11-06T13:25:46.476Z | |
| bit-jenkins-2025-59474 | 2025-09-19T09:57:07.574Z | 2025-11-06T13:25:46.476Z | |
| bit-jenkins-2021-43859 | Denial of Service by injecting highly recursive collections or maps in XStream | 2025-05-26T07:13:32.699Z | 2025-11-06T13:25:46.476Z |
| bit-harbor-2025-32019 | Harbor's repository description page allows for XSS | 2025-07-29T05:40:29.320Z | 2025-11-06T13:25:46.476Z |
| bit-grafana-2022-39201 | Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins | 2024-03-06T10:55:22.080Z | 2025-11-06T13:25:46.476Z |
| bit-golang-2025-61724 | Excessive CPU consumption in Reader.ReadResponse in net/textproto | 2025-11-06T12:58:38.217Z | 2025-11-06T13:25:46.476Z |
| ID | Description | Updated |
|---|---|---|
| var-201905-0711 | Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessor… | 2024-07-23T21:06:26.228000Z |
| var-201410-0371 | Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows… | 2024-07-23T21:06:25.896000Z |
| var-200906-0605 | drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier… | 2024-07-23T21:06:23.926000Z |
| var-200701-0516 | Format string vulnerability in Apple iChat 3.1.6 allows remote attackers to cause a denia… | 2024-07-23T21:06:21.462000Z |
| var-200704-0217 | The Login Window in Apple Mac OS X 10.3.9 through 10.4.9 does not properly check certain … | 2024-07-23T21:05:47.835000Z |
| var-201302-0264 | Use-after-free vulnerability in Adobe Flash Player before 10.3.183.63 and 11.x before 11.… | 2024-07-23T21:05:46.754000Z |
| var-201110-0385 | Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK… | 2024-07-23T21:05:46.173000Z |
| var-202108-1140 | A device configuration issue was addressed with an updated configuration. This issue is f… | 2024-07-23T21:05:39.606000Z |
| var-202103-1463 | The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates p… | 2024-07-23T21:05:39.679000Z |
| var-201912-0642 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:05:39.981000Z |
| var-200701-0124 | The ufs_lookup function in the Mac OS X 10.4.8 and FreeBSD 6.1 kernels allows local users… | 2024-07-23T21:05:38.664000Z |
| var-201903-0440 | A type confusion issue was addressed with improved memory handling. This issue is fixed i… | 2024-07-23T21:05:02.081000Z |
| var-202112-0562 | It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete… | 2024-07-23T21:05:01.160000Z |
| var-201602-0272 | ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use… | 2024-07-23T21:05:01.067000Z |
| var-200704-0229 | Integer overflow in the FontFileInitTable function in X.Org libXfont before 20070403 allo… | 2024-07-23T21:05:01.347000Z |
| var-201806-1487 | An issue was discovered in certain Apple products. iOS before 11.3.1 is affected. Safari … | 2024-07-23T21:05:00.631000Z |
| var-201006-1194 | Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 throug… | 2024-07-23T21:05:00.580000Z |
| var-202002-1191 | An out-of-bounds read was addressed with improved input validation. This issue is fixed i… | 2024-07-23T21:04:58.267000Z |
| var-201504-0147 | cURL and libcurl 7.10.6 through 7.41.0 does not properly re-use NTLM connections, which a… | 2024-07-23T21:04:58.843000Z |
| var-200812-0322 | Integer overflow in the _cupsImageReadPNG function in CUPS 1.1.17 through 1.3.9 allows re… | 2024-07-23T21:04:56.685000Z |
| var-201912-1851 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:04:54.509000Z |
| var-201304-0091 | sudo 1.3.5 through 1.7.10 and 1.8.0 through 1.8.5, when the tty_tickets option is enabled… | 2024-07-23T21:04:54.405000Z |
| var-201912-0484 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T21:04:53.320000Z |
| var-200704-0214 | fsck, as used by the AirPort Disk feature of the AirPort Extreme Base Station with 802.11… | 2024-07-23T21:04:53.153000Z |
| var-201904-1473 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T21:04:52.392000Z |
| var-200701-0396 | Format string vulnerability in Apple Software Update 2.0.5 on Mac OS X 10.4.8 allows remo… | 2024-07-23T21:04:51.875000Z |
| var-201409-1155 | GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed functi… | 2024-07-23T21:04:41.941000Z |
| var-201003-1082 | The png_decompress_chunk function in pngrutil.c in libpng 1.0.x before 1.0.53, 1.2.x befo… | 2024-07-23T21:04:41.162000Z |
| var-201501-0339 | The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 b… | 2024-07-23T21:04:37.270000Z |
| var-200608-0042 | OpenSSH in Apple Mac OS X 10.4.7 allows remote attackers to cause a denial of service or … | 2024-07-23T21:04:03.433000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2023-000048 | ASUS Router RT-AX3000 vulnerable to using sensitive cookies without 'Secure' attribute | 2023-06-09T15:18+09:00 | 2024-04-18T17:44+09:00 |
| jvndb-2023-002022 | Multiple vulnerabilities in FUJI ELECTRIC FRENIC RHC Loader | 2023-06-05T15:55+09:00 | 2024-04-18T17:40+09:00 |
| jvndb-2023-002906 | Multiple vulnerabilities in Panasonic Control FPWIN Pro7 | 2023-08-22T18:02+09:00 | 2024-04-18T17:31+09:00 |
| jvndb-2023-011403 | ELECOM wireless LAN routers vulnerable to OS command injection | 2023-12-13T15:06+09:00 | 2024-04-18T17:22+09:00 |
| jvndb-2024-000041 | Multiple vulnerabilities in WordPress Plugin "Forminator" | 2024-04-18T13:53+09:00 | 2024-04-18T13:53+09:00 |
| jvndb-2023-000070 | Multiple vulnerabilities in WordPress Plugin "TS Webfonts for SAKURA" | 2023-07-20T16:05+09:00 | 2024-04-17T17:20+09:00 |
| jvndb-2022-017175 | Proscend Communications M330-W and M330-W5 vulnerable to OS command injection | 2024-04-16T14:30+09:00 | 2024-04-16T14:30+09:00 |
| jvndb-2024-000040 | Multiple vulnerabilities in BUFFALO wireless LAN routers | 2024-04-15T16:29+09:00 | 2024-04-15T16:29+09:00 |
| jvndb-2023-000074 | Fujitsu Real-time Video Transmission Gear "IP series" uses a hard-coded credentials | 2023-07-26T18:00+09:00 | 2024-04-12T18:04+09:00 |
| jvndb-2023-000073 | GBrowse vulnerable to unrestricted upload of files with dangerous types | 2023-07-21T15:02+09:00 | 2024-04-12T17:31+09:00 |
| jvndb-2023-002905 | Multiple vulnerabilities in CBC digital video recorders | 2023-08-22T17:35+09:00 | 2024-04-10T17:39+09:00 |
| jvndb-2024-000039 | Multiple vulnerabilities in a-blog cms | 2024-04-10T13:55+09:00 | 2024-04-10T13:55+09:00 |
| jvndb-2021-000088 | Multiple vulnerabilities in Cybozu Remote Service | 2021-09-30T16:03+09:00 | 2024-04-08T18:09+09:00 |
| jvndb-2024-000038 | Multiple vulnerabilities in WordPress Plugin "Ninja Forms" | 2024-04-08T13:44+09:00 | 2024-04-08T13:44+09:00 |
| jvndb-2022-002765 | Multiple vulnerabilities in OMRON CX-Programmer | 2022-11-28T15:40+09:00 | 2024-04-05T18:15+09:00 |
| jvndb-2023-002786 | Multiple vulnerabilities in OMRON CX-Programmer | 2023-08-03T13:42+09:00 | 2024-04-05T17:39+09:00 |
| jvndb-2024-000037 | Multiple vulnerabilities in NEC Aterm series | 2024-04-05T14:53+09:00 | 2024-04-05T14:53+09:00 |
| jvndb-2024-003067 | Multiple vulnerabilities in PLANEX COMMUNICATIONS wireless LAN routers | 2024-04-05T14:17+09:00 | 2024-04-05T14:17+09:00 |
| jvndb-2023-000077 | Fujitsu Software Infrastructure Manager (ISM) stores sensitive information in cleartext | 2023-08-04T17:31+09:00 | 2024-04-03T17:19+09:00 |
| jvndb-2024-003051 | FURUNO SYSTEMS Managed Switch ACERA 9010 running in non MS mode with the initial configuration has no password | 2024-04-02T18:03+09:00 | 2024-04-02T18:03+09:00 |
| jvndb-2024-003050 | KEYENCE VT STUDIO may insecurely load Dynamic Link Libraries | 2024-04-01T14:44+09:00 | 2024-04-01T14:44+09:00 |
| jvndb-2023-000071 | Multiple vulnerabilities in multiple ELECOM wireless LAN routers and wireless LAN repeaters | 2023-07-11T15:37+09:00 | 2024-03-29T15:28+09:00 |
| jvndb-2024-000036 | "Yahoo! JAPAN" App vulnerable to cross-site scripting | 2024-03-29T13:28+09:00 | 2024-03-29T13:28+09:00 |
| jvndb-2023-000079 | Multiple vulnerabilities in Special Interest Group Network for Analysis and Liaison's API | 2023-08-07T15:15+09:00 | 2024-03-28T18:08+09:00 |
| jvndb-2023-000081 | "Rikunabi NEXT" App for Android fails to restrict custom URL schemes properly | 2023-08-09T12:45+09:00 | 2024-03-28T18:01+09:00 |
| jvndb-2023-000080 | "FFRI yarai" and "FFRI yarai Home and Business Edition" handle exceptional conditions improperly | 2023-08-07T17:39+09:00 | 2024-03-28T17:54+09:00 |
| jvndb-2023-000078 | Multiple vulnerabilities in Proself | 2023-08-18T13:47+09:00 | 2024-03-28T17:43+09:00 |
| jvndb-2024-003047 | SEEnergy SVR-116 vulnerable to OS command injection | 2024-03-28T11:38+09:00 | 2024-03-28T11:38+09:00 |
| jvndb-2024-003026 | Security information for Hitachi Disk Array Systems | 2024-03-27T15:52+09:00 | 2024-03-27T15:52+09:00 |
| jvndb-2024-000035 | Multiple vulnerabilities in WordPress Plugin "Survey Maker" | 2024-03-27T14:48+09:00 | 2024-03-27T14:48+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:21150-1 | Security update for libvirt | 2025-11-27T10:24:18Z | 2025-11-27T10:24:18Z |
| suse-su-2025:21082-1 | Security update for libvirt | 2025-11-27T10:24:18Z | 2025-11-27T10:24:18Z |
| suse-su-2025:21149-1 | Security update for xwayland | 2025-11-27T10:10:58Z | 2025-11-27T10:10:58Z |
| suse-su-2025:4275-1 | Security update for the Linux Kernel (Live Patch 15 for SUSE Linux Enterprise 15 SP6) | 2025-11-27T10:04:14Z | 2025-11-27T10:04:14Z |
| suse-su-2025:4274-1 | Security update for buildah | 2025-11-27T08:13:05Z | 2025-11-27T08:13:05Z |
| suse-su-2025:4273-1 | Security update for rubygem-rack | 2025-11-27T08:12:25Z | 2025-11-27T08:12:25Z |
| suse-su-2025:4272-1 | Security update for gnutls | 2025-11-27T08:11:48Z | 2025-11-27T08:11:48Z |
| suse-su-2025:4271-1 | Security update for gnutls | 2025-11-27T08:11:37Z | 2025-11-27T08:11:37Z |
| suse-su-2025:4269-1 | Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise 15 SP6) | 2025-11-26T21:10:56Z | 2025-11-26T21:10:56Z |
| suse-su-2025:4268-1 | Security update for the Linux Kernel (Live Patch 13 for SUSE Linux Enterprise 15 SP6) | 2025-11-26T19:33:47Z | 2025-11-26T19:33:47Z |
| suse-su-2025:4265-1 | Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise 15 SP6) | 2025-11-26T19:33:40Z | 2025-11-26T19:33:40Z |
| suse-su-2025:21147-1 | Security update for the Linux Kernel | 2025-11-26T15:59:00Z | 2025-11-26T15:59:00Z |
| suse-su-2025:21080-1 | Security update for the Linux Kernel | 2025-11-26T15:59:00Z | 2025-11-26T15:59:00Z |
| suse-su-2025:4264-1 | Security update for ruby2.5 | 2025-11-26T15:52:44Z | 2025-11-26T15:52:44Z |
| suse-su-2025:21180-1 | Security update for the Linux Kernel | 2025-11-26T15:35:38Z | 2025-11-26T15:35:38Z |
| suse-su-2025:4262-1 | Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP6) | 2025-11-26T15:07:47Z | 2025-11-26T15:07:47Z |
| suse-su-2025:4261-1 | Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise 15 SP6) | 2025-11-26T15:07:28Z | 2025-11-26T15:07:28Z |
| suse-su-2025:2169-1 | Security update for yelp | 2025-11-26T14:47:36Z | 2025-11-26T14:47:36Z |
| suse-su-2025:21145-1 | Security update for curl | 2025-11-26T14:28:47Z | 2025-11-26T14:28:47Z |
| suse-su-2025:21077-1 | Security update for curl | 2025-11-26T14:28:47Z | 2025-11-26T14:28:47Z |
| suse-su-2025:21066-1 | Security update for sssd | 2025-11-26T14:26:51Z | 2025-11-26T14:26:51Z |
| suse-su-2025:21065-1 | Security update for unbound | 2025-11-26T14:26:20Z | 2025-11-26T14:26:20Z |
| suse-su-2025:4258-1 | Security update for python312 | 2025-11-26T13:44:40Z | 2025-11-26T13:44:40Z |
| suse-su-2025:4257-1 | Security update for python311 | 2025-11-26T13:43:01Z | 2025-11-26T13:43:01Z |
| suse-su-2025:4256-1 | Security update for the Linux Kernel (Live Patch 27 for SUSE Linux Enterprise 15 SP5) | 2025-11-26T13:04:23Z | 2025-11-26T13:04:23Z |
| suse-su-2025:4254-1 | Security update for dpdk | 2025-11-26T11:33:12Z | 2025-11-26T11:33:12Z |
| suse-su-2025:4255-1 | Security update for the Linux Kernel (Live Patch 23 for SUSE Linux Enterprise 15 SP5) | 2025-11-26T09:35:19Z | 2025-11-26T09:35:19Z |
| suse-su-2025:4247-1 | Security update for sssd | 2025-11-26T08:56:55Z | 2025-11-26T08:56:55Z |
| suse-su-2025:4245-1 | Security update for buildah | 2025-11-26T08:39:12Z | 2025-11-26T08:39:12Z |
| suse-su-2025:4244-1 | Security update for amazon-ssm-agent | 2025-11-26T08:38:47Z | 2025-11-26T08:38:47Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-02777 | Orangescrum跨站脚本漏洞 | 2025-12-29 | 2026-01-09 |
| cnvd-2026-02776 | Orangescrum权限提升漏洞 | 2025-12-29 | 2026-01-09 |
| cnvd-2026-02696 | Google Pixel权限提升漏洞(CNVD-2026-0269620) | 2025-12-18 | 2026-01-09 |
| cnvd-2026-02695 | Google Pixel权限提升漏洞(CNVD-2026-0269521) | 2025-12-18 | 2026-01-09 |
| cnvd-2026-02694 | Google Pixel权限提升漏洞(CNVD-2026-0269422) | 2025-12-18 | 2026-01-09 |
| cnvd-2026-02693 | Google Pixel权限提升漏洞(CNVD-2026-0269323) | 2025-12-18 | 2026-01-09 |
| cnvd-2026-02684 | Orangescrum操作系统命令注入漏洞 | 2023-01-30 | 2026-01-09 |
| cnvd-2026-02683 | Orangescrum路径遍历漏洞 | 2023-02-09 | 2026-01-09 |
| cnvd-2026-02682 | Orangescrum跨站脚本漏洞(CNVD-2026-02682) | 2023-02-13 | 2026-01-09 |
| cnvd-2026-02681 | Orangescrum跨站脚本漏洞(CNVD-2026-02681) | 2023-04-07 | 2026-01-09 |
| cnvd-2026-02680 | Orangescrum跨站脚本漏洞(CNVD-2026-02680) | 2023-06-30 | 2026-01-09 |
| cnvd-2026-02679 | Orangescrum跨站脚本漏洞(CNVD-2026-02679) | 2025-02-08 | 2026-01-09 |
| cnvd-2026-00691 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-00691) | 2025-12-15 | 2026-01-09 |
| cnvd-2026-00690 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-00690) | 2025-12-15 | 2026-01-09 |
| cnvd-2026-00689 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-00689) | 2025-12-15 | 2026-01-09 |
| cnvd-2026-00688 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-00688) | 2025-12-15 | 2026-01-09 |
| cnvd-2026-00687 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-00687) | 2025-12-15 | 2026-01-09 |
| cnvd-2026-00686 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-00686) | 2025-12-15 | 2026-01-09 |
| cnvd-2026-00685 | Adobe Experience Manager跨站脚本洞(CNVD-2026-00685) | 2025-12-15 | 2026-01-09 |
| cnvd-2026-00684 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-00684) | 2025-12-15 | 2026-01-09 |
| cnvd-2026-02660 | CMSimple目录遍历漏洞 | 2022-04-15 | 2026-01-08 |
| cnvd-2026-02659 | CMSimple_XH代码执行漏洞 | 2022-05-11 | 2026-01-08 |
| cnvd-2026-02655 | CMSimple_XH跨站脚本漏洞(CNVD-2026-02655) | 2024-06-28 | 2026-01-08 |
| cnvd-2026-02646 | CMSimple不安全权限漏洞 | 2025-02-18 | 2026-01-08 |
| cnvd-2026-02645 | UTT 进取 750W未经验证的密码更改漏洞 | 2025-07-08 | 2026-01-08 |
| cnvd-2026-02644 | UTT 进取 750W缓冲区溢出漏洞(CNVD-2026-02644) | 2025-07-08 | 2026-01-08 |
| cnvd-2026-02643 | UTT 进取 750W缓冲区溢出漏洞(CNVD-2026-02643) | 2025-07-15 | 2026-01-08 |
| cnvd-2026-02642 | CMSimple_XH跨站脚本漏洞(CNVD-2026-02642) | 2025-11-11 | 2026-01-08 |
| cnvd-2026-02641 | CMSimple_XH跨站脚本漏洞 | 2025-11-11 | 2026-01-08 |
| cnvd-2026-02639 | CMSimple_XH代码执行漏洞 | 2025-12-29 | 2026-01-08 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2025-AVI-0945 | Vulnérabilité dans Qnap NetBak PC Agent | 2025-10-31T00:00:00.000000 | 2025-10-31T00:00:00.000000 |
| CERTFR-2025-AVI-0944 | Vulnérabilité dans Liferay | 2025-10-31T00:00:00.000000 | 2025-10-31T00:00:00.000000 |
| CERTFR-2025-AVI-0943 | Multiples vulnérabilités dans les produits Centreon | 2025-10-31T00:00:00.000000 | 2025-10-31T00:00:00.000000 |
| CERTFR-2025-AVI-0942 | Vulnérabilité dans Dovecot | 2025-10-31T00:00:00.000000 | 2025-10-31T00:00:00.000000 |
| certfr-2025-avi-0941 | Multiples vulnérabilités dans les produits Microsoft | 2025-10-30T00:00:00.000000 | 2025-10-30T00:00:00.000000 |
| certfr-2025-avi-0940 | Vulnérabilité dans Liferay | 2025-10-30T00:00:00.000000 | 2025-10-30T00:00:00.000000 |
| certfr-2025-avi-0939 | Multiples vulnérabilités dans les produits Splunk | 2025-10-30T00:00:00.000000 | 2025-10-30T00:00:00.000000 |
| certfr-2025-avi-0938 | Multiples vulnérabilités dans les produits VMware | 2025-10-30T00:00:00.000000 | 2025-10-30T00:00:00.000000 |
| certfr-2025-avi-0937 | Multiples vulnérabilités dans Google Chrome | 2025-10-30T00:00:00.000000 | 2025-10-30T00:00:00.000000 |
| CERTFR-2025-AVI-0941 | Multiples vulnérabilités dans les produits Microsoft | 2025-10-30T00:00:00.000000 | 2025-10-30T00:00:00.000000 |
| CERTFR-2025-AVI-0940 | Vulnérabilité dans Liferay | 2025-10-30T00:00:00.000000 | 2025-10-30T00:00:00.000000 |
| CERTFR-2025-AVI-0939 | Multiples vulnérabilités dans les produits Splunk | 2025-10-30T00:00:00.000000 | 2025-10-30T00:00:00.000000 |
| CERTFR-2025-AVI-0938 | Multiples vulnérabilités dans les produits VMware | 2025-10-30T00:00:00.000000 | 2025-10-30T00:00:00.000000 |
| CERTFR-2025-AVI-0937 | Multiples vulnérabilités dans Google Chrome | 2025-10-30T00:00:00.000000 | 2025-10-30T00:00:00.000000 |
| certfr-2025-avi-0935 | Multiples vulnérabilités dans les produits VMware | 2025-10-29T00:00:00.000000 | 2025-10-29T00:00:00.000000 |
| certfr-2025-avi-0934 | Vulnérabilité dans les produits Mozilla | 2025-10-29T00:00:00.000000 | 2025-10-29T00:00:00.000000 |
| CERTFR-2025-AVI-0935 | Multiples vulnérabilités dans les produits VMware | 2025-10-29T00:00:00.000000 | 2025-10-29T00:00:00.000000 |
| CERTFR-2025-AVI-0934 | Vulnérabilité dans les produits Mozilla | 2025-10-29T00:00:00.000000 | 2025-10-29T00:00:00.000000 |
| certfr-2025-avi-0933 | Multiples vulnérabilités dans Apache Tomcat | 2025-10-28T00:00:00.000000 | 2025-10-28T00:00:00.000000 |
| certfr-2025-avi-0932 | Multiples vulnérabilités dans Liferay | 2025-10-28T00:00:00.000000 | 2025-10-28T00:00:00.000000 |
| certfr-2025-avi-0931 | Vulnérabilité dans StrongSwan | 2025-10-28T00:00:00.000000 | 2025-10-28T00:00:00.000000 |
| CERTFR-2025-AVI-0933 | Multiples vulnérabilités dans Apache Tomcat | 2025-10-28T00:00:00.000000 | 2025-10-28T00:00:00.000000 |
| CERTFR-2025-AVI-0932 | Multiples vulnérabilités dans Liferay | 2025-10-28T00:00:00.000000 | 2025-10-28T00:00:00.000000 |
| CERTFR-2025-AVI-0931 | Vulnérabilité dans StrongSwan | 2025-10-28T00:00:00.000000 | 2025-10-28T00:00:00.000000 |
| certfr-2025-avi-0930 | Vulnérabilité dans Microsoft Windows Server Update Service | 2025-10-27T00:00:00.000000 | 2025-10-27T00:00:00.000000 |
| certfr-2025-avi-0929 | Vulnérabilité dans le client VPN de TheGreenBow | 2025-10-27T00:00:00.000000 | 2025-10-27T00:00:00.000000 |
| certfr-2025-avi-0928 | Vulnérabilité dans Microsoft Configuration Manager | 2025-10-27T00:00:00.000000 | 2025-10-27T00:00:00.000000 |
| certfr-2025-avi-0927 | Vulnérabilité dans Xen | 2025-10-27T00:00:00.000000 | 2025-10-27T00:00:00.000000 |
| certfr-2025-avi-0926 | Vulnérabilité dans le pilote ODBC de MongoDB | 2025-10-27T00:00:00.000000 | 2025-10-27T00:00:00.000000 |
| certfr-2025-avi-0925 | Vulnérabilité dans les produits Belden | 2025-10-27T00:00:00.000000 | 2025-10-27T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTA-2006-ALE-009 | Vulnérabilité de la librairie MSO.DLL dans Microsoft Office | 2006-07-15T00:00:00.000000 | 2006-08-09T00:00:00.000000 |
| certa-2006-ale-007 | Vulnérabilité dans Microsoft Excel | 2006-06-16T00:00:00.000000 | 2006-07-12T00:00:00.000000 |
| CERTA-2006-ALE-007 | Vulnérabilité dans Microsoft Excel | 2006-06-16T00:00:00.000000 | 2006-07-12T00:00:00.000000 |
| certa-2006-ale-008 | Vulnérabilité d'ExtCalendar | 2006-07-11T00:00:00.000000 | 2006-07-11T00:00:00.000000 |
| CERTA-2006-ALE-008 | Vulnérabilité d'ExtCalendar | 2006-07-11T00:00:00.000000 | 2006-07-11T00:00:00.000000 |
| certa-2006-ale-006 | Vulnérabilité dans Microsoft Word | 2006-05-20T00:00:00.000000 | 2006-06-14T00:00:00.000000 |
| CERTA-2006-ALE-006 | Vulnérabilité dans Microsoft Word | 2006-05-20T00:00:00.000000 | 2006-06-14T00:00:00.000000 |
| certa-2006-ale-004 | Multiples vulnérabilités sous Mac OS X d'Apple | 2006-04-22T00:00:00.000000 | 2006-05-12T00:00:00.000000 |
| CERTA-2006-ALE-004 | Multiples vulnérabilités sous Mac OS X d'Apple | 2006-04-22T00:00:00.000000 | 2006-05-12T00:00:00.000000 |
| certa-2006-ale-005 | Vulnérabilité dans Firefox | 2006-04-26T00:00:00.000000 | 2006-05-02T00:00:00.000000 |
| CERTA-2006-ALE-005 | Vulnérabilité dans Firefox | 2006-04-26T00:00:00.000000 | 2006-05-02T00:00:00.000000 |
| certa-2006-ale-002 | Multiples vulnérabilités dans Microsoft Internet Explorer | 2006-03-23T00:00:00.000000 | 2006-04-12T00:00:00.000000 |
| certa-2005-ale-012 | Vulnérabilité de Netscape 8 | 2005-09-27T00:00:00.000000 | 2006-04-12T00:00:00.000000 |
| certa-2005-ale-008 | Possible vulnérabilité de la bibliothèque msdds.dll | 2005-08-19T00:00:00.000000 | 2006-04-12T00:00:00.000000 |
| CERTA-2006-ALE-002 | Multiples vulnérabilités dans Microsoft Internet Explorer | 2006-03-23T00:00:00.000000 | 2006-04-12T00:00:00.000000 |
| CERTA-2005-ALE-012 | Vulnérabilité de Netscape 8 | 2005-09-27T00:00:00.000000 | 2006-04-12T00:00:00.000000 |
| CERTA-2005-ALE-008 | Possible vulnérabilité de la bibliothèque msdds.dll | 2005-08-19T00:00:00.000000 | 2006-04-12T00:00:00.000000 |
| certa-2006-ale-003 | Vulnérabilité de Sendmail | 2006-03-24T00:00:00.000000 | 2006-03-24T00:00:00.000000 |
| CERTA-2006-ALE-003 | Vulnérabilité de Sendmail | 2006-03-24T00:00:00.000000 | 2006-03-24T00:00:00.000000 |
| certa-2006-ale-001 | Vulnérabilité dans le traitement de certains fichiers sous MAC OS X | 2006-02-22T00:00:00.000000 | 2006-03-02T00:00:00.000000 |
| CERTA-2006-ALE-001 | Vulnérabilité dans le traitement de certains fichiers sous MAC OS X | 2006-02-22T00:00:00.000000 | 2006-03-02T00:00:00.000000 |
| certa-2005-ale-019 | Exploitation d'une vulnérabilité mal corrigée dans Microsoft Windows | 2005-12-28T00:00:00.000000 | 2006-01-06T00:00:00.000000 |
| CERTA-2005-ALE-019 | Exploitation d'une vulnérabilité mal corrigée dans Microsoft Windows | 2005-12-28T00:00:00.000000 | 2006-01-06T00:00:00.000000 |
| certa-2005-ale-017 | Vulnérabilité de Microsoft Internet Explorer | 2005-11-21T00:00:00.000000 | 2005-12-14T00:00:00.000000 |
| CERTA-2005-ALE-017 | Vulnérabilité de Microsoft Internet Explorer | 2005-11-21T00:00:00.000000 | 2005-12-14T00:00:00.000000 |
| certa-2005-ale-018 | Vulnérabilité du navigateur Firefox | 2005-12-08T00:00:00.000000 | 2005-12-08T00:00:00.000000 |
| CERTA-2005-ALE-018 | Vulnérabilité du navigateur Firefox | 2005-12-08T00:00:00.000000 | 2005-12-08T00:00:00.000000 |
| certa-2005-ale-016 | Vulnérabilité de Microsoft Windows RPC | 2005-11-18T00:00:00.000000 | 2005-11-18T00:00:00.000000 |
| CERTA-2005-ALE-016 | Vulnérabilité de Microsoft Windows RPC | 2005-11-18T00:00:00.000000 | 2005-11-18T00:00:00.000000 |
| certa-2005-ale-014 | Vulnérabilité d'un grand nombre d'antivirus | 2005-10-11T00:00:00.000000 | 2005-10-11T00:00:00.000000 |