Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-62202 |
7.1 (3.1)
|
Microsoft Excel Information Disclosure Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-11-11T17:59:42.941Z | 2026-02-13T20:46:09.722Z |
| CVE-2025-62201 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-11-11T17:59:42.387Z | 2026-02-13T20:46:09.180Z |
| CVE-2025-62200 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-11-11T17:59:41.808Z | 2026-02-13T20:46:08.727Z |
| CVE-2025-60724 |
9.8 (3.1)
|
GDI+ Remote Code Execution Vulnerability |
Microsoft |
Microsoft Office for Android |
2025-11-11T17:59:41.177Z | 2026-02-13T20:46:08.096Z |
| CVE-2025-60723 |
6.3 (3.1)
|
DirectX Graphics Kernel Denial of Service Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2025-11-11T17:59:40.522Z | 2026-02-13T20:46:07.529Z |
| CVE-2025-60720 |
7.8 (3.1)
|
Windows Transport Driver Interface (TDI) Translation D… |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:39.877Z | 2026-02-13T20:46:06.973Z |
| CVE-2025-60718 |
7.8 (3.1)
|
Windows Administrator Protection Elevation of Privileg… |
Microsoft |
Windows 11 Version 24H2 |
2025-11-11T17:59:39.236Z | 2026-02-13T20:46:06.306Z |
| CVE-2025-60717 |
7 (3.1)
|
Windows Broadcast DVR User Service Elevation of Privil… |
Microsoft |
Windows 10 Version 1809 |
2025-11-11T17:59:38.592Z | 2026-02-13T20:46:05.691Z |
| CVE-2025-60716 |
7 (3.1)
|
DirectX Graphics Kernel Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2025-11-11T17:59:37.998Z | 2026-02-13T20:46:05.077Z |
| CVE-2025-60715 |
8 (3.1)
|
Windows Routing and Remote Access Service (RRAS) Remot… |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:37.399Z | 2026-02-13T20:46:04.432Z |
| CVE-2025-60714 |
7.8 (3.1)
|
Windows OLE Remote Code Execution Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:36.834Z | 2026-02-13T20:46:03.878Z |
| CVE-2025-60713 |
7.8 (3.1)
|
Windows Routing and Remote Access Service (RRAS) Eleva… |
Microsoft |
Windows Server 2016 |
2025-11-11T17:59:36.265Z | 2026-02-13T20:46:03.329Z |
| CVE-2025-59515 |
7 (3.1)
|
Windows Broadcast DVR User Service Elevation of Privil… |
Microsoft |
Windows 10 Version 1809 |
2025-11-11T17:59:35.615Z | 2026-02-13T20:46:02.678Z |
| CVE-2025-59514 |
7.8 (3.1)
|
Microsoft Streaming Service Proxy Elevation of Privile… |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:35.037Z | 2026-02-13T20:46:02.108Z |
| CVE-2025-47179 |
6.7 (3.1)
|
Configuration Manager Elevation of Privilege Vulnerability |
Microsoft |
Microsoft Configuration Manager |
2025-11-11T17:59:34.472Z | 2026-02-13T20:46:01.564Z |
| CVE-2025-62207 |
8.6 (3.1)
|
Azure Monitor Elevation of Privilege Vulnerability |
Microsoft |
Azure Monitor Control Service |
2025-11-20T22:18:38.189Z | 2026-02-13T20:46:00.258Z |
| CVE-2025-59240 |
5.5 (3.1)
|
Microsoft Excel Information Disclosure Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-11-11T17:59:33.945Z | 2026-02-13T20:46:00.911Z |
| CVE-2025-59245 |
9.8 (3.1)
|
Microsoft SharePoint Online Elevation of Privilege Vul… |
Microsoft |
Microsoft SharePoint Online |
2025-11-20T22:18:36.895Z | 2026-02-13T20:45:59.170Z |
| CVE-2025-49752 |
10 (3.1)
|
Azure Bastion Elevation of Privilege Vulnerability |
Microsoft |
Azure Bastion Developer |
2025-11-20T22:18:37.511Z | 2026-02-13T20:45:59.672Z |
| CVE-2025-64655 |
8.8 (3.1)
|
Dynamics OmniChannel SDK Storage Containers Elevation … |
Microsoft |
Dynamics OmniChannel SDK Storage Containers |
2025-11-20T22:18:36.195Z | 2026-02-13T20:45:58.697Z |
| CVE-2025-62452 |
8 (3.1)
|
Windows Routing and Remote Access Service (RRAS) Remot… |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:33.306Z | 2026-02-13T20:45:58.084Z |
| CVE-2025-62220 |
8.8 (3.1)
|
Windows Subsystem for Linux GUI Remote Code Execution … |
Microsoft |
Windows Subsystem for Linux GUI |
2025-11-11T17:59:32.750Z | 2026-02-13T20:45:57.543Z |
| CVE-2025-62219 |
7 (3.1)
|
Microsoft Wireless Provisioning System Elevation of Pr… |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:32.270Z | 2026-02-13T20:45:57.004Z |
| CVE-2025-62218 |
7 (3.1)
|
Microsoft Wireless Provisioning System Elevation of Pr… |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:31.687Z | 2026-02-13T20:45:56.390Z |
| CVE-2025-62217 |
7 (3.1)
|
Windows Ancillary Function Driver for WinSock Elevatio… |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:31.180Z | 2026-02-13T20:45:55.825Z |
| CVE-2025-60722 |
6.5 (3.1)
|
Microsoft OneDrive for Android Elevation of Privilege … |
Microsoft |
OneDrive for Android |
2025-11-11T17:59:30.528Z | 2026-02-13T20:45:55.292Z |
| CVE-2025-62216 |
7.8 (3.1)
|
Microsoft Office Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-11-11T17:59:29.420Z | 2026-02-13T20:45:54.050Z |
| CVE-2025-60719 |
7 (3.1)
|
Windows Ancillary Function Driver for WinSock Elevatio… |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:29.947Z | 2026-02-13T20:45:54.656Z |
| CVE-2025-62210 |
8.7 (3.1)
|
Dynamics 365 Field Service (online) Spoofing Vulnerability |
Microsoft |
Dynamics 365 Field Service (online) |
2025-11-11T17:59:28.905Z | 2026-02-13T20:45:53.419Z |
| CVE-2025-62206 |
6.5 (3.1)
|
Microsoft Dynamics 365 (On-Premises) Information Discl… |
Microsoft |
Microsoft Dynamics 365 (on-premises) version 9.1 |
2025-11-11T17:59:28.307Z | 2026-02-13T20:45:52.934Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2019-25348 |
N/A
|
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | N/A | N/A | 2026-02-12T19:02:37.107Z | 2026-02-13T15:19:50.724Z |
| CVE-2025-63226 |
5.7 (3.1)
|
The Sencore SMP100 SMP Media Platform (firmware v… |
n/a |
n/a |
2025-11-18T00:00:00.000Z | 2025-11-19T18:52:23.807Z |
| CVE-2025-66409 |
2.7 (4.0)
|
ESF-IDF has an Out-of-Bounds Read in ESP32 Bluetooth A… |
espressif |
esp-idf |
2025-12-02T18:09:03.069Z | 2025-12-02T18:46:18.126Z |
| CVE-2025-66411 |
7.8 (3.1)
|
Coder logged sensitive objects unsanitized |
coder |
coder |
2025-12-03T19:25:24.207Z | 2025-12-03T21:42:17.349Z |
| CVE-2025-66489 |
9.9 (4.0)
|
Cal.com Authentication Bypass via bad TOTP + password checks |
calcom |
cal.com |
2025-12-03T19:44:35.303Z | 2025-12-03T21:48:27.861Z |
| CVE-2025-22042 |
N/A
|
ksmbd: add bounds check for create lease context |
Linux |
Linux |
2025-04-16T14:12:03.896Z | 2025-11-03T19:41:24.487Z |
| CVE-2025-38501 |
7.5 (3.1)
|
ksmbd: limit repeated connections from clients with th… |
Linux |
Linux |
2025-08-16T05:30:09.138Z | 2025-11-04T21:10:11.398Z |
| CVE-2025-37947 |
7.8 (3.1)
|
ksmbd: prevent out-of-bounds stream writes by validati… |
Linux |
Linux |
2025-05-20T16:01:43.788Z | 2025-11-03T19:57:37.368Z |
| CVE-2025-8280 |
5.8 (3.1)
|
Contact Form 7 reCAPTCHA <= 1.2.0 - Reflected XSS via … |
Unknown |
Contact Form 7 reCAPTCHA |
2025-09-12T06:00:06.157Z | 2025-09-12T16:22:30.609Z |
| CVE-2025-37778 |
N/A
|
ksmbd: Fix dangling pointer in krb_authenticate |
Linux |
Linux |
2025-05-01T13:07:16.472Z | 2025-11-03T19:54:55.466Z |
| CVE-2025-37775 |
N/A
|
ksmbd: fix the warning from __kernel_write_iter |
Linux |
Linux |
2025-05-01T13:07:14.356Z | 2025-11-03T19:54:54.085Z |
| CVE-2025-38575 |
N/A
|
ksmbd: use aead_request_free to match aead_request_alloc |
Linux |
Linux |
2025-04-18T07:01:33.904Z | 2025-11-03T19:58:31.892Z |
| CVE-2025-46310 |
6 (3.1)
|
This issue was addressed through improved state m… |
Apple |
macOS |
2026-02-11T22:58:56.379Z | 2026-02-12T16:12:49.303Z |
| CVE-2026-20605 |
4.6 (3.1)
|
The issue was addressed with improved memory hand… |
Apple |
macOS |
2026-02-11T22:59:03.734Z | 2026-02-12T17:48:34.491Z |
| CVE-2026-20606 |
7.1 (3.1)
|
This issue was addressed by removing the vulnerab… |
Apple |
macOS |
2026-02-11T22:58:00.743Z | 2026-02-12T15:46:14.846Z |
| CVE-2026-20610 |
7.8 (3.1)
|
This issue was addressed with improved handling o… |
Apple |
macOS |
2026-02-11T22:58:02.574Z | 2026-02-13T04:56:30.797Z |
| CVE-2024-35224 |
7.6 (3.1)
|
Stored Cross-Site Scripting (XSS) in OpenProject |
opf |
openproject |
2024-05-23T12:53:04.336Z | 2024-08-02T03:07:46.774Z |
| CVE-2026-20612 |
5.5 (3.1)
|
A privacy issue was addressed with improved check… |
Apple |
macOS |
2026-02-11T22:58:52.712Z | 2026-02-12T19:13:35.179Z |
| CVE-2026-1578 |
5.1 (4.0)
|
HP App – Potential Cross-Site Scripting |
HP Inc |
HP App |
2026-02-13T14:56:42.725Z | 2026-02-13T16:14:36.813Z |
| CVE-2022-37020 |
6.8 (3.1)
|
HP PC BIOS May 2024 Security Updates for Potential Sta… |
HP Inc. |
HP PC products |
2024-06-10T22:13:26.904Z | 2024-10-28T18:34:17.212Z |
| CVE-2026-0958 |
7.5 (3.1)
|
Interpretation Conflict in GitLab |
GitLab |
GitLab |
2026-02-11T11:33:46.426Z | 2026-02-11T15:19:41.414Z |
| CVE-2025-8099 |
7.5 (3.1)
|
Allocation of Resources Without Limits or Throttling i… |
GitLab |
GitLab |
2026-02-11T11:35:11.456Z | 2026-02-11T15:14:09.487Z |
| CVE-2025-7659 |
8 (3.1)
|
Origin Validation Error in GitLab |
GitLab |
GitLab |
2026-02-11T11:35:16.441Z | 2026-02-12T04:55:14.841Z |
| CVE-2025-14594 |
3.5 (3.1)
|
Authorization Bypass Through User-Controlled Key in GitLab |
GitLab |
GitLab |
2026-02-11T11:34:06.815Z | 2026-02-11T15:17:25.802Z |
| CVE-2024-31397 |
4.9 (3.1)
|
Improper handling of extra values issue exists in… |
Cybozu, Inc. |
Cybozu Garoon |
2024-06-11T05:34:39.924Z | 2024-08-02T01:52:56.934Z |
| CVE-2026-23864 |
7.5 (3.1)
|
Multiple denial of service vulnerabilities exist … |
Meta |
react-server-dom-webpack |
2026-01-26T19:16:38.250Z | 2026-01-26T20:26:45.709Z |
| CVE-2025-57785 |
6.5 (3.1)
|
Double free in XSLT in 'show_index' |
Hiawatha |
Hiawatha Web server |
2026-01-26T17:46:09.707Z | 2026-01-26T20:54:04.714Z |
| CVE-2025-14592 |
3.7 (3.1)
|
Missing Authorization in GitLab |
GitLab |
GitLab |
2026-02-11T11:34:01.432Z | 2026-02-11T15:18:04.995Z |
| CVE-2025-14560 |
7.3 (3.1)
|
Improper Neutralization of Input During Web Page Gener… |
GitLab |
GitLab |
2026-02-11T11:34:16.431Z | 2026-02-12T04:55:14.011Z |
| CVE-2025-12575 |
5.4 (3.1)
|
Server-Side Request Forgery (SSRF) in GitLab |
GitLab |
GitLab |
2026-02-11T11:34:36.432Z | 2026-02-11T15:15:26.432Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-63226 | The Sencore SMP100 SMP Media Platform (firmware versions V4.2.160, V60.1.4, V60.1.29) is vulnerable… | 2025-11-18T20:15:47.583 | 2026-02-13T16:13:55.730 |
| fkie_cve-2025-66409 | ESF-IDF is the Espressif Internet of Things (IOT) Development Framework. In 5.5.1, 5.4.3, 5.3.4, 5.… | 2025-12-02T19:15:52.133 | 2026-02-13T16:12:30.543 |
| fkie_cve-2025-66411 | Coder allows organizations to provision remote development environments via Terraform. Prior to 2.2… | 2025-12-03T20:16:26.727 | 2026-02-13T16:09:09.850 |
| fkie_cve-2025-66489 | Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provide… | 2025-12-03T20:16:27.057 | 2026-02-13T16:03:36.057 |
| fkie_cve-2025-22042 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: add bounds check for cr… | 2025-04-16T15:15:57.593 | 2026-02-13T15:58:50.887 |
| fkie_cve-2025-38501 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: limit repeated connecti… | 2025-08-16T06:15:27.923 | 2026-02-13T15:58:02.790 |
| fkie_cve-2025-37947 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: prevent out-of-bounds s… | 2025-05-20T16:15:32.677 | 2026-02-13T15:57:44.103 |
| fkie_cve-2025-8280 | The Contact Form 7 reCAPTCHA WordPress plugin through 1.2.0 does not escape the $_SERVER['REQUEST_U… | 2025-09-12T06:15:43.660 | 2026-02-13T15:54:12.670 |
| fkie_cve-2025-37778 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: Fix dangling pointer in… | 2025-05-01T14:15:41.617 | 2026-02-13T15:52:51.533 |
| fkie_cve-2025-37775 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix the warning from __… | 2025-05-01T14:15:41.197 | 2026-02-13T15:52:21.587 |
| fkie_cve-2025-38575 | In the Linux kernel, the following vulnerability has been resolved: ksmbd: use aead_request_free t… | 2025-04-18T07:15:43.717 | 2026-02-13T15:50:14.600 |
| fkie_cve-2025-46310 | This issue was addressed through improved state management. This issue is fixed in macOS Sequoia 15… | 2026-02-11T23:16:03.120 | 2026-02-13T15:47:47.473 |
| fkie_cve-2026-20605 | The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.7.4,… | 2026-02-11T23:16:04.210 | 2026-02-13T15:47:23.443 |
| fkie_cve-2026-20606 | This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Tahoe 26.3, … | 2026-02-11T23:16:04.310 | 2026-02-13T15:46:40.683 |
| fkie_cve-2026-20610 | This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Tahoe 26.… | 2026-02-11T23:16:04.643 | 2026-02-13T15:45:52.137 |
| fkie_cve-2024-35224 | OpenProject is the leading open source project management software. OpenProject utilizes `tablesort… | 2024-05-23T13:15:09.380 | 2026-02-13T15:44:32.677 |
| fkie_cve-2026-20612 | A privacy issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, ma… | 2026-02-11T23:16:04.857 | 2026-02-13T15:43:59.103 |
| fkie_cve-2026-1578 | HP App for Android is potentially vulnerable to cross-site scripting (XSS) when using an outdated v… | 2026-02-13T15:15:57.853 | 2026-02-13T15:43:55.060 |
| fkie_cve-2022-37020 | Potential vulnerabilities have been identified in the system BIOS for certain HP PC products, which… | 2024-06-10T23:15:49.503 | 2026-02-13T15:36:39.150 |
| fkie_cve-2026-0958 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.4 before 18.6.6, 18.7… | 2026-02-11T12:16:03.970 | 2026-02-13T15:33:52.310 |
| fkie_cve-2025-8099 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.8 before 18.6.6, 18.7… | 2026-02-11T12:16:03.687 | 2026-02-13T15:33:05.570 |
| fkie_cve-2025-7659 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.2 before 18.6.6, 18.7… | 2026-02-11T12:16:03.533 | 2026-02-13T15:32:18.967 |
| fkie_cve-2025-14594 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.11 before 18.6.6, 18.… | 2026-02-11T12:16:03.267 | 2026-02-13T15:30:42.347 |
| fkie_cve-2024-31397 | Improper handling of extra values issue exists in Cybozu Garoon 5.0.0 to 5.15.2. If this vulnerabil… | 2024-06-11T06:15:10.057 | 2026-02-13T15:30:05.950 |
| fkie_cve-2026-23864 | Multiple denial of service vulnerabilities exist in React Server Components, affecting the followin… | 2026-01-26T20:16:16.773 | 2026-02-13T15:23:05.013 |
| fkie_cve-2025-57785 | A Double Free in XSLT `show_index` has been identified in Hiawatha webserver version 11.7 which all… | 2026-01-26T18:16:27.570 | 2026-02-13T15:21:40.900 |
| fkie_cve-2025-14592 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.6 before 18.6.6, 18.7… | 2026-02-11T12:16:03.123 | 2026-02-13T15:18:16.647 |
| fkie_cve-2025-14560 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.1 before 18.6.6, 18.7… | 2026-02-11T12:16:02.980 | 2026-02-13T15:16:54.370 |
| fkie_cve-2025-12575 | GitLab has remediated an issue in GitLab EE affecting all versions from 18.0 before 18.6.6, 18.7 be… | 2026-02-11T12:16:02.833 | 2026-02-13T15:16:07.330 |
| fkie_cve-2025-68723 | Axigen Mail Server before 10.5.57 contains multiple stored Cross-Site Scripting (XSS) vulnerabiliti… | 2026-02-05T17:16:12.700 | 2026-02-13T15:15:57.503 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-59g4-3crj-9w92 |
4.4 (3.1)
1.3 (4.0)
|
A path traversal vulnerability has been reported to affect File Station 5. If a local attacker gain… | 2026-02-11T15:30:26Z | 2026-02-12T21:31:25Z |
| ghsa-3v9p-vgm5-cgm3 |
8.8 (3.1)
1.1 (4.0)
|
An improper neutralization of directives in statically saved code ('Static Code Injection') vulnera… | 2026-02-11T15:30:25Z | 2026-02-12T21:31:25Z |
| ghsa-m83h-48rr-jcrh |
8.1 (3.1)
|
SolarWinds Web Help Desk was found to be susceptible to a security control bypass vulnerability tha… | 2026-01-28T09:30:30Z | 2026-02-12T21:31:24Z |
| ghsa-m786-h9gp-8q53 |
9.8 (3.1)
|
Microsoft Configuration Manager Remote Code Execution Vulnerability | 2024-10-08T18:33:14Z | 2026-02-12T21:31:24Z |
| ghsa-vx5f-vmr6-32wf |
5.2 (4.0)
|
cap-go/capacitor-native-biometric Authentication Bypass | 2026-02-10T14:33:50Z | 2026-02-12T20:25:16Z |
| ghsa-5882-5rx9-xgxp |
10.0 (4.0)
|
Crawl4AI is Vulnerable to Remote Code Execution in Docker API via Hooks Parameter | 2026-01-16T20:59:16Z | 2026-02-12T20:09:29Z |
| ghsa-vx9w-5cx4-9796 |
8.6 (3.1)
9.2 (4.0)
|
Crawl4AI Has Local File Inclusion in Docker API via file:// URLs | 2026-01-16T20:58:51Z | 2026-02-12T20:09:06Z |
| ghsa-w7fw-mjwx-w883 |
3.7 (3.1)
|
qs's arrayLimit bypass in comma parsing allows denial of service | 2026-02-12T17:04:39Z | 2026-02-12T20:07:59Z |
| ghsa-r8w2-w357-9pjv |
9.8 (3.1)
|
XDocReport affected by a Server-Side Template Injection (SSTI) vulnerability | 2026-01-20T18:31:57Z | 2026-02-12T19:51:02Z |
| ghsa-436v-jg82-p533 |
9.8 (3.1)
|
Azure AI Language Authoring Elevation of Privilege Vulnerability can Lead to RCE | 2026-02-10T18:30:42Z | 2026-02-12T19:19:53Z |
| ghsa-pj3r-q6m4-wfcw |
8.7 (4.0)
|
Improper Access Control in an on-chip debug interface could allow a privileged attacker to enable a… | 2026-02-12T18:30:24Z | 2026-02-12T18:30:24Z |
| ghsa-ghfm-hghj-9j75 |
|
p2r3 bareiron commit: 8e4d4020d contains an Out-of-bounds Read, which allows unauthenticated remote… | 2026-02-12T18:30:24Z | 2026-02-12T18:30:24Z |
| ghsa-fr6m-j2m3-hgw4 |
6.3 (4.0)
|
Debug code left active in AMD's Video Decoder Engine Firmware (VCN FW) could allow a attacker to su… | 2026-02-12T18:30:24Z | 2026-02-12T18:30:24Z |
| ghsa-fcfm-mfmf-7xm3 |
4.6 (4.0)
|
Improper input validation within RAS TA Driver can allow a local attacker to access out-of-bounds m… | 2026-02-12T18:30:24Z | 2026-02-12T18:30:24Z |
| ghsa-ccq3-qfjv-47q4 |
7.3 (3.1)
|
A DLL hijacking vulnerability in Doc Nav could allow a local attacker to achieve privilege escalati… | 2026-02-12T18:30:24Z | 2026-02-12T18:30:24Z |
| ghsa-9w8m-7cg3-7mh9 |
8.4 (4.0)
|
Type confusion in the AMD Secure Processor (ASP) could allow an attacker to pass a malformed argume… | 2026-02-12T18:30:24Z | 2026-02-12T18:30:24Z |
| ghsa-xp6f-p933-2gqg |
7.4 (3.1)
9.1 (4.0)
|
Galaxy FDS Android SDK (XiaoMi/galaxy-fds-sdk-android) version 3.0.8 and prior disable TLS hostname… | 2026-02-12T18:30:23Z | 2026-02-12T18:30:23Z |
| ghsa-v9g2-54rr-mxmg |
4.6 (3.1)
|
An authorization issue was addressed with improved state management. This issue is fixed in iOS 26.… | 2026-02-12T00:31:05Z | 2026-02-12T18:30:23Z |
| ghsa-rmgp-99fm-wv32 |
6.5 (3.1)
|
When connecting to the Solax Cloud MQTT server the username is the "registration number", which is … | 2026-02-12T12:31:00Z | 2026-02-12T18:30:23Z |
| ghsa-r942-7mj9-p58w |
3.3 (3.1)
|
The issue was resolved by sanitizing logging. This issue is fixed in iOS 26.3 and iPadOS 26.3, iOS … | 2026-02-12T00:31:05Z | 2026-02-12T18:30:23Z |
| ghsa-pc38-57g8-39gg |
|
An issue in the "My Details" user profile functionality of Ideagen Q-Pulse 7.1.0.32 allows an authe… | 2026-02-12T18:30:23Z | 2026-02-12T18:30:23Z |
| ghsa-j8xr-3xqm-72rh |
8.4 (3.1)
8.6 (4.0)
|
BrightSign players running BrightSign OS series 4 prior to v8.5.53.1 or series 5 prior to v9.0.166… | 2026-02-12T18:30:23Z | 2026-02-12T18:30:23Z |
| ghsa-hfj8-gv3c-fx7w |
9.0 (3.1)
|
Cross Site Request Forgery vulnerability in Dolibarr ERP & CRM v.22.0.9 allows a remote attacker to… | 2026-02-12T18:30:23Z | 2026-02-12T18:30:23Z |
| ghsa-fqf2-x743-9564 |
4.6 (3.1)
|
An authorization issue was addressed with improved state management. This issue is fixed in macOS S… | 2026-02-12T00:31:05Z | 2026-02-12T18:30:23Z |
| ghsa-84wm-58x3-8fvc |
5.5 (3.1)
|
An authorization issue was addressed with improved state management. This issue is fixed in macOS T… | 2026-02-12T00:31:05Z | 2026-02-12T18:30:23Z |
| ghsa-4gx8-h22x-pf65 |
5.3 (3.1)
|
The firmware update functionality does not verify the authenticity of the supplied firmware update … | 2026-02-12T12:31:00Z | 2026-02-12T18:30:23Z |
| ghsa-3qr2-wf7p-c9f8 |
3.1 (3.1)
|
A logic issue was addressed with improved checks. This issue is fixed in watchOS 26.3, tvOS 26.3, m… | 2026-02-12T00:31:05Z | 2026-02-12T18:30:23Z |
| ghsa-355c-f243-w6f5 |
5.5 (3.1)
|
A parsing issue in the handling of directory paths was addressed with improved path validation. Thi… | 2026-02-12T00:31:05Z | 2026-02-12T18:30:23Z |
| ghsa-2jp6-x3f3-3m72 |
8.8 (3.1)
|
A logic issue was addressed with improved checks. This issue is fixed in watchOS 26.3, macOS Tahoe … | 2026-02-12T00:31:05Z | 2026-02-12T18:30:23Z |
| ghsa-r28c-wjwj-4xgv |
9.8 (3.1)
|
Weak Security in the PF-50 1.2 keyfob of PGST PG107 Alarm System 1.25.05.hf allows attackers to com… | 2026-02-12T00:31:03Z | 2026-02-12T18:30:22Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-47 |
|
In Django 3.2 before 3.2.25, 4.2 before 4.2.11, and 5.0 before 5.0.3, the django.utils.te… | django | 2024-03-15T20:15:00+00:00 | 2024-03-15T23:20:34.975097+00:00 |
| pysec-2024-46 |
|
Apache Airflow, versions 2.8.0 through 2.8.2, has a vulnerability that allows an authenti… | apache-airflow | 2024-03-14T09:15:00+00:00 | 2024-03-14T11:19:09.515892+00:00 |
| pysec-2024-45 |
|
LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to contro… | langchain-core | 2024-03-04T00:15:00+00:00 | 2024-03-13T23:20:07.486731+00:00 |
| pysec-2024-44 |
|
In RPyC before 6.0.0, when a server exposes a method that calls the attribute named __arr… | rpyc | 2024-03-12T16:15:00+00:00 | 2024-03-12T19:19:21.886478+00:00 |
| pysec-2024-43 |
|
LangChain through 0.1.10 allows ../ directory traversal by an actor who is able to contro… | langchain | 2024-03-04T00:15:00+00:00 | 2024-03-05T10:22:15.555734+00:00 |
| pysec-2024-42 |
|
Apache Airflow, versions before 2.8.2, has a vulnerability that allows authenticated Ops … | apache-airflow | 2024-03-01T11:15:00+00:00 | 2024-03-01T14:20:34.498842+00:00 |
| pysec-2023-259 |
9.8 (3.1)
|
A vulnerability, which was classified as critical, has been found in MicroPython 1.21.0/1… | micropython-select | 2023-12-29T05:15:00+00:00 | 2024-02-29T07:20:31.851255+00:00 |
| pysec-2023-258 |
9.8 (3.1)
|
A vulnerability, which was classified as critical, has been found in MicroPython 1.21.0/1… | micropython-os | 2023-12-29T05:15:00+00:00 | 2024-02-29T07:20:31.721783+00:00 |
| pysec-2023-257 |
9.8 (3.1)
|
A vulnerability, which was classified as critical, has been found in MicroPython 1.21.0/1… | micropython-io | 2023-12-29T05:15:00+00:00 | 2024-02-29T07:20:31.603749+00:00 |
| pysec-2023-256 |
9.8 (3.1)
|
A vulnerability, which was classified as critical, has been found in MicroPython 1.21.0/1… | micropython-copy | 2023-12-29T05:15:00+00:00 | 2024-02-29T07:20:31.464203+00:00 |
| pysec-2023-255 |
8.1 (3.1)
|
Command Injection in GitHub repository gradio-app/gradio prior to main. | gradio | 2023-12-14T14:15:00+00:00 | 2024-02-28T16:22:37.359017+00:00 |
| pysec-2024-41 |
|
diffoscope before 256 allows directory traversal via an embedded filename in a GPG file. … | diffoscope | 2024-02-27T02:15:00+00:00 | 2024-02-27T07:20:27.954412+00:00 |
| pysec-2024-40 |
|
orjson.loads in orjson before 3.9.15 does not limit recursion for deeply nested JSON documents. | orjson | 2024-02-26T16:28:00+00:00 | 2024-02-26T18:22:26.039698+00:00 |
| pysec-2024-39 |
|
Versions of the package fastecdsa before 2.3.2 are vulnerable to Use of Uninitialized Var… | fastecdsa | 2024-02-24T05:15:00+00:00 | 2024-02-24T07:19:09.418536+00:00 |
| pysec-2023-254 |
7.5 (3.1)
|
cryptography is a package designed to expose cryptographic primitives and recipes to Pyth… | cryptography | 2023-11-29T19:15:00+00:00 | 2024-02-17T07:18:27.688636+00:00 |
| pysec-2024-38 |
7.5 (3.1)
|
FastAPI is a web framework for building APIs with Python 3.8+ based on standard Python ty… | fastapi | 2024-02-05T15:15:00+00:00 | 2024-02-16T18:22:32.607118+00:00 |
| pysec-2024-37 |
6.5 (3.1)
|
nonebot2 is a cross-platform Python asynchronous chatbot framework written in Python. Thi… | nonebot2 | 2024-02-09T23:15:00+00:00 | 2024-02-16T16:22:37.389642+00:00 |
| pysec-2022-43059 |
5.5 (3.1)
|
AIOHTTP 3.8.1 can report a "ValueError: Invalid IPv6 URL" outcome, which can lead to a De… | aiohttp | 2022-06-23T17:15:00Z | 2024-02-16T13:47:54.655573Z |
| pysec-2024-36 |
5.5 (3.1)
|
An information disclosure flaw was found in ansible-core due to a failure to respect the … | ansible-core | 2024-02-06T12:15:00+00:00 | 2024-02-14T07:20:09.911618+00:00 |
| pysec-2023-253 |
8.1 (3.1)
|
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.9.2. | mlflow | 2023-12-15T01:15:00+00:00 | 2024-02-14T00:26:12.242703+00:00 |
| pysec-2024-35 |
5.4 (3.1)
|
Versions of the package dash-core-components before 2.13.0; all versions of the package d… | dash | 2024-02-02T05:15:00+00:00 | 2024-02-10T07:18:43.563257+00:00 |
| pysec-2024-12 |
|
LlamaIndex (aka llama_index) through 0.9.34 allows SQL injection via the Text-to-SQL feat… | llama-index | 2024-01-22T01:15:00Z | 2024-02-10T01:22:25.611009Z |
| pysec-2024-34 |
9.8 (3.1)
|
The vantage6 technology enables to manage and deploy privacy enhancing technologies like … | vantage6-server | 2024-01-30T16:15:00+00:00 | 2024-02-08T20:20:16.896186+00:00 |
| pysec-2024-33 |
9.8 (3.1)
|
The vantage6 technology enables to manage and deploy privacy enhancing technologies like … | vantage6-node | 2024-01-30T16:15:00+00:00 | 2024-02-08T20:20:16.842528+00:00 |
| pysec-2024-32 |
4.3 (3.1)
|
The vantage6 technology enables to manage and deploy privacy enhancing technologies like … | vantage6 | 2024-01-30T16:15:00+00:00 | 2024-02-08T18:22:28.342089+00:00 |
| pysec-2024-31 |
3.7 (3.1)
|
The vantage6 technology enables to manage and deploy privacy enhancing technologies like … | vantage6 | 2024-01-30T16:15:00+00:00 | 2024-02-08T18:22:28.276390+00:00 |
| pysec-2024-30 |
8.8 (3.1)
|
The vantage6 technology enables to manage and deploy privacy enhancing technologies like … | vantage6 | 2024-01-30T16:15:00+00:00 | 2024-02-08T18:22:28.210087+00:00 |
| pysec-2024-29 |
4.9 (3.1)
|
OctoPrint is a web interface for 3D printer.s OctoPrint versions up until and including 1… | octoprint | 2024-01-31T18:15:00+00:00 | 2024-02-08T07:19:40.535297+00:00 |
| pysec-2024-28 |
|
An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 be… | django | 2024-02-06T22:16:00+00:00 | 2024-02-07T00:25:46.826634+00:00 |
| pysec-2023-252 |
7.5 (3.1)
|
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.9.2. | mlflow | 2023-12-18T04:15:00+00:00 | 2024-02-06T22:20:23.832000+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33463 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.741491Z |
| gsd-2024-33462 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.683814Z |
| gsd-2024-33461 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.675113Z |
| gsd-2024-33460 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.688393Z |
| gsd-2024-33459 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.692449Z |
| gsd-2024-33458 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.624212Z |
| gsd-2024-33457 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.696566Z |
| gsd-2024-33456 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.717737Z |
| gsd-2024-33455 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.655789Z |
| gsd-2024-33454 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.650999Z |
| gsd-2024-33453 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.698683Z |
| gsd-2024-33452 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.703341Z |
| gsd-2024-33451 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.726764Z |
| gsd-2024-33450 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.751570Z |
| gsd-2024-33449 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.610062Z |
| gsd-2024-33448 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.631490Z |
| gsd-2024-33447 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.747407Z |
| gsd-2024-33446 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.658390Z |
| gsd-2024-33445 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.724418Z |
| gsd-2024-33444 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.653354Z |
| gsd-2024-33443 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.759133Z |
| gsd-2024-33442 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.710054Z |
| gsd-2024-33441 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.733108Z |
| gsd-2024-33440 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.719884Z |
| gsd-2024-33439 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.753324Z |
| gsd-2024-33438 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.689433Z |
| gsd-2024-33437 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.743513Z |
| gsd-2024-33436 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.653792Z |
| gsd-2024-33435 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.737152Z |
| gsd-2024-33434 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.628304Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-653 | Malicious code in credit-decision-metrics (PyPI) | 2026-02-02T14:42:50Z | 2026-02-02T14:42:50Z |
| MAL-2026-653 | Malicious code in credit-decision-metrics (PyPI) | 2026-02-02T14:42:50Z | 2026-02-02T14:42:50Z |
| mal-2026-654 | Malicious code in zabitog (PyPI) | 2026-02-02T14:41:04Z | 2026-02-02T14:41:04Z |
| MAL-2026-654 | Malicious code in zabitog (PyPI) | 2026-02-02T14:41:04Z | 2026-02-02T14:41:04Z |
| mal-2026-650 | Malicious code in tableapy (PyPI) | 2026-02-02T12:56:55Z | 2026-02-02T12:56:55Z |
| MAL-2026-650 | Malicious code in tableapy (PyPI) | 2026-02-02T12:56:55Z | 2026-02-02T12:56:55Z |
| mal-2026-649 | Malicious code in callapirequests (PyPI) | 2026-02-02T09:08:10Z | 2026-02-02T09:08:10Z |
| MAL-2026-649 | Malicious code in callapirequests (PyPI) | 2026-02-02T09:08:10Z | 2026-02-02T09:08:10Z |
| mal-2026-641 | Malicious code in connections-api-requests (PyPI) | 2026-02-02T06:54:40Z | 2026-02-02T06:54:40Z |
| MAL-2026-641 | Malicious code in connections-api-requests (PyPI) | 2026-02-02T06:54:40Z | 2026-02-02T06:54:40Z |
| mal-2026-640 | Malicious code in connections-api-request (PyPI) | 2026-02-02T06:52:24Z | 2026-02-02T06:52:24Z |
| MAL-2026-640 | Malicious code in connections-api-request (PyPI) | 2026-02-02T06:52:24Z | 2026-02-02T06:52:24Z |
| mal-2026-639 | Malicious code in connection-api-requests (PyPI) | 2026-02-02T06:49:31Z | 2026-02-02T06:49:31Z |
| MAL-2026-639 | Malicious code in connection-api-requests (PyPI) | 2026-02-02T06:49:31Z | 2026-02-02T06:49:31Z |
| mal-2026-616 | Malicious code in c11dff444 (npm) | 2026-01-31T16:58:54Z | 2026-02-02T06:41:02Z |
| MAL-2026-616 | Malicious code in c11dff444 (npm) | 2026-01-31T16:58:54Z | 2026-02-02T06:41:02Z |
| mal-2026-598 | Malicious code in wallet-icon-font (npm) | 2026-01-29T03:47:06Z | 2026-02-02T05:56:31Z |
| mal-2026-596 | Malicious code in turbotax (npm) | 2026-01-29T00:03:56Z | 2026-02-02T05:56:31Z |
| mal-2026-583 | Malicious code in vuejavascript (npm) | 2026-01-28T13:59:24Z | 2026-02-02T05:56:31Z |
| mal-2026-577 | Malicious code in transform-vue-jsx (npm) | 2026-01-28T07:43:54Z | 2026-02-02T05:56:31Z |
| mal-2026-561 | Malicious code in transform-regenerator (npm) | 2026-01-28T06:44:48Z | 2026-02-02T05:56:31Z |
| mal-2026-560 | Malicious code in transform-async-to-generator (npm) | 2026-01-28T06:44:48Z | 2026-02-02T05:56:31Z |
| mal-2026-546 | Malicious code in xhjxhjhiagent (npm) | 2026-01-27T08:09:00Z | 2026-02-02T05:56:31Z |
| mal-2026-507 | Malicious code in tripica-library (npm) | 2026-01-26T15:31:06Z | 2026-02-02T05:56:31Z |
| mal-2026-500 | Malicious code in zabittest11 (npm) | 2026-01-25T06:56:37Z | 2026-02-02T05:56:31Z |
| MAL-2026-598 | Malicious code in wallet-icon-font (npm) | 2026-01-29T03:47:06Z | 2026-02-02T05:56:31Z |
| MAL-2026-596 | Malicious code in turbotax (npm) | 2026-01-29T00:03:56Z | 2026-02-02T05:56:31Z |
| MAL-2026-583 | Malicious code in vuejavascript (npm) | 2026-01-28T13:59:24Z | 2026-02-02T05:56:31Z |
| MAL-2026-577 | Malicious code in transform-vue-jsx (npm) | 2026-01-28T07:43:54Z | 2026-02-02T05:56:31Z |
| MAL-2026-561 | Malicious code in transform-regenerator (npm) | 2026-01-28T06:44:48Z | 2026-02-02T05:56:31Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2224 | Keycloak: Mehrere Schwachstellen | 2025-10-07T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2202 | fetchmail: Schwachstelle ermöglicht Denial of Service | 2025-10-05T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2036 | IBM WebSphere Application Server: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-09-10T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1925 | Hashicorp Vault: Schwachstelle ermöglicht Denial of Service | 2025-08-28T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1866 | Mozilla Firefox und Thunderbird: Mehrere Schwachstellen | 2025-08-19T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1653 | Linux Kernel: Mehrere Schwachstellen | 2025-07-27T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1613 | Linux Kernel: Mehrere Schwachstellen | 2025-07-20T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1465 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-06T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1463 | Redis: Mehrere Schwachstellen | 2025-07-06T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-0837 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-04-15T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-0683 | Linux Kernel: Mehrere Schwachstellen | 2025-04-01T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2024-3690 | Gitea: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-12-11T23:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2024-3368 | Linux Kernel: Mehrere Schwachstellen | 2024-11-06T23:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2024-1944 | Red Hat multicluster engine for Kubernetes: Schwachstelle ermöglicht Denial of Service | 2024-08-28T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2024-1606 | Bootstrap: Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2024-07-11T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2024-0459 | Linux Kernel: Mehrere Schwachstellen | 2024-02-21T23:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2023-2864 | Linux Kernel: Mehrere Schwachstellen | 2023-11-08T23:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2023-2434 | Linux Kernel: Schwachstelle ermöglicht Codeausführung | 2023-09-24T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2023-1666 | Linux Kernel: Mehrere Schwachstellen | 2023-07-05T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2023-1542 | Red Hat OpenShift: Mehrere Schwachstellen | 2023-06-22T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2023-0637 | Linux Kernel: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-03-13T23:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2023-0328 | Red Hat OpenShift: Mehrere Schwachstellen | 2023-02-09T23:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2022-1792 | Linux Kernel: Mehrere Schwachstellen | 2022-10-18T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2022-1374 | Linux Kernel: Mehrere Schwachstellen | 2022-09-11T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2022-1186 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2022-08-24T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2228 | ESRI ArcGIS: Schwachstelle ermöglicht SQL injection | 2025-10-07T22:00:00.000+00:00 | 2025-10-22T22:00:00.000+00:00 |
| wid-sec-w-2025-1999 | Adobe Magento SessionReaper: Schwachstelle ermöglicht Umgehung von Sicherheitsmaßnahmen | 2025-09-08T22:00:00.000+00:00 | 2025-10-22T22:00:00.000+00:00 |
| wid-sec-w-2025-2195 | Oracle E-Business Suite: Schwachstelle ermöglicht Codeausführung | 2025-10-05T22:00:00.000+00:00 | 2025-10-21T22:00:00.000+00:00 |
| wid-sec-w-2025-2026 | ffmpeg: Schwachstelle ermöglicht Denial of Service | 2025-09-10T22:00:00.000+00:00 | 2025-10-21T22:00:00.000+00:00 |
| wid-sec-w-2025-1998 | ffmpeg: Schwachstelle ermöglicht Codeausführung und potenziell Denial of Service | 2025-09-08T22:00:00.000+00:00 | 2025-10-21T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0341 | Kwetsbaarheden verholpen in Ivanti Neurons for ITSM | 2024-08-14T09:54:26.701111Z | 2024-08-14T09:54:26.701111Z |
| ncsc-2024-0339 | Kwetsbaarheden verholpen in Microsoft Mariner | 2024-08-13T18:23:22.271316Z | 2024-08-13T18:23:22.271316Z |
| ncsc-2024-0338 | Kwetsbaarheden verholpen in Microsoft Dynamics | 2024-08-13T18:22:21.160613Z | 2024-08-13T18:22:21.160613Z |
| ncsc-2024-0337 | Kwetsbaarheden verholpen in Microsoft Office | 2024-08-13T18:21:45.385690Z | 2024-08-13T18:21:45.385690Z |
| ncsc-2024-0336 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2024-08-13T18:21:06.220640Z | 2024-08-13T18:21:06.220640Z |
| ncsc-2024-0335 | Kwetsbaarheden verholpen in Microsoft Azure componenten | 2024-08-13T18:20:23.647785Z | 2024-08-13T18:20:23.647785Z |
| ncsc-2024-0333 | Kwetsbaarheden verholpen in SAP producten | 2024-08-13T13:47:02.764070Z | 2024-08-13T13:47:02.764070Z |
| ncsc-2024-0332 | Kwetsbaarheden verholpen in Siemens producten | 2024-08-13T09:21:28.381575Z | 2024-08-13T09:21:28.381575Z |
| ncsc-2024-0331 | Kwetsbaarheden verholpen in Zabbix | 2024-08-12T10:34:15.273912Z | 2024-08-12T10:34:15.273912Z |
| ncsc-2024-0330 | Kwetsbaarheid verholpen in Asterisk | 2024-08-12T10:31:33.788930Z | 2024-08-12T10:31:33.788930Z |
| ncsc-2024-0329 | Kwetsbaarheden verholpen in GitLab Enterprise Edition en Community Edition | 2024-08-12T08:24:49.808846Z | 2024-08-12T08:24:49.808846Z |
| ncsc-2024-0328 | Kwetsbaarheden verholpen in IBM InfoSphere | 2024-08-12T08:22:38.701674Z | 2024-08-12T08:22:38.701674Z |
| ncsc-2024-0327 | Kwetsbaarheden verholpen in Cisco Small Business IP Phones | 2024-08-08T08:01:30.827296Z | 2024-08-08T08:01:30.827296Z |
| ncsc-2024-0268 | Kwetsbaarheden verholpen in Progress WhatsUp Gold | 2024-06-26T07:43:11.795773Z | 2024-08-08T07:50:41.453544Z |
| ncsc-2024-0326 | Kwetsbaarheden verholpen in RoundCube Webmail | 2024-08-08T07:45:42.674316Z | 2024-08-08T07:45:42.674316Z |
| ncsc-2024-0325 | Kwetsbaarheden verholpen in Aruba Networks ArubaOS en InstantOS | 2024-08-07T09:04:14.955844Z | 2024-08-07T09:04:14.955844Z |
| ncsc-2024-0324 | Kwetsbaarheden verholpen in Mozilla Firefox en Thunderbird | 2024-08-07T08:58:12.457235Z | 2024-08-07T08:58:12.457235Z |
| ncsc-2024-0323 | Kwetsbaarheden verholpen in Siemens Omnivise | 2024-08-06T09:29:53.292433Z | 2024-08-06T09:29:53.292433Z |
| ncsc-2024-0322 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2024-08-06T09:25:08.253832Z | 2024-08-06T09:25:08.253832Z |
| ncsc-2024-0269 | Kwetsbaarheden verholpen in VMware ESXi en vCenter Server | 2024-06-26T09:02:10.988453Z | 2024-07-30T09:32:13.311694Z |
| ncsc-2024-0321 | Kwetsbaarheid verholpen in Progress MOVEit Transfer | 2024-07-30T08:45:50.286085Z | 2024-07-30T08:45:50.286085Z |
| ncsc-2024-0320 | Kwetsbaarheden verholpen in Apple MacOS | 2024-07-30T08:42:07.365674Z | 2024-07-30T08:42:07.365674Z |
| ncsc-2024-0319 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2024-07-30T08:39:16.399394Z | 2024-07-30T08:39:16.399394Z |
| ncsc-2024-0318 | Kwetsbaarheden verholpen in Docker Moby | 2024-07-25T11:28:37.900721Z | 2024-07-25T11:28:37.900721Z |
| ncsc-2024-0317 | Kwetsbaarheid gevonden in Ivanti Endpoint Manager | 2024-07-24T14:37:09.864241Z | 2024-07-24T14:37:09.864241Z |
| ncsc-2024-0316 | Kwetsbaarheid verholpen in Broadcom Symantec Privileged Access Management | 2024-07-22T09:17:29.853486Z | 2024-07-22T09:17:29.853486Z |
| ncsc-2024-0315 | Kwetsbaarheid verholpen in Cisco Smart Software Manager On-Prem | 2024-07-19T13:06:00.004663Z | 2024-07-19T13:06:00.004663Z |
| ncsc-2024-0314 | Kwetsbaarheden verholpen in Apache HTTP Server | 2024-07-19T07:34:12.997118Z | 2024-07-19T07:34:12.997118Z |
| ncsc-2024-0313 | Kwetsbaarheid verholpen in HPE 3PAR Service Processor | 2024-07-18T13:58:07.127103Z | 2024-07-18T13:58:07.127103Z |
| ncsc-2024-0312 | Kwetsbaarheden verholpen in Solarwinds Platform | 2024-07-18T13:23:55.561789Z | 2024-07-18T13:23:55.561789Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-568428 | SSA-568428: Weak Key Protection Vulnerability in SINUMERIK ONE and SINUMERIK MC | 2022-11-08T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-565356 | SSA-565356: X_T File Parsing Vulnerabilities in Simcenter Femap before V2023.1 | 2023-02-14T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-506569 | SSA-506569: Multiple Vulnerabilities in SCALANCE W1750D | 2022-11-08T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-313313 | SSA-313313: Denial of Service Vulnerability in the FTP Server of Nucleus RTOS | 2022-10-11T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-252808 | SSA-252808: XPath Constraint Vulnerability in Mendix Runtime | 2023-02-14T00:00:00Z | 2023-02-14T00:00:00Z |
| ssa-997779 | SSA-997779: File Parsing Vulnerability in Solid Edge before V2023 MP1 | 2023-01-10T00:00:00Z | 2023-01-10T00:00:00Z |
| ssa-936212 | SSA-936212: JT File Parsing Vulnerabilities in JT Open, JT Utilities and Solid Edge | 2023-01-10T00:00:00Z | 2023-01-10T00:00:00Z |
| ssa-547714 | SSA-547714: Argument Injection Vulnerability in SIMATIC WinCC OA Ultralight Client | 2022-12-13T00:00:00Z | 2023-01-10T00:00:00Z |
| ssa-496604 | SSA-496604: Cross-Site Scripting Vulnerability in Mendix SAML Module | 2023-01-10T00:00:00Z | 2023-01-10T00:00:00Z |
| ssa-431678 | SSA-431678: Denial of Service Vulnerability in SIMATIC S7 CPU Families | 2020-02-11T00:00:00Z | 2023-01-10T00:00:00Z |
| ssa-332410 | SSA-332410: Multiple Vulnerabilities in SINEC INS before V1.0 SP2 Update 1 | 2023-01-10T00:00:00Z | 2023-01-10T00:00:00Z |
| ssa-210822 | SSA-210822: Improper Access Control Vulnerability in Mendix Workflow Commons Module | 2022-12-13T00:00:00Z | 2023-01-10T00:00:00Z |
| ssa-951513 | SSA-951513: Clickjacking Vulnerability in SCALANCE S, SCALANCE X-300, X-200IRT, X-200RNA and X-200 Switch Families | 2020-02-11T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-849072 | SSA-849072: Several Vulnerabilities in SICAM PAS before V8.06 | 2022-12-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-678983 | SSA-678983: Vulnerabilities in Industrial PCs and CNC devices using Intel CPUs (November 2020) | 2021-05-11T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-638652 | SSA-638652: Authentication Bypass Vulnerability in Mendix SAML Module | 2022-09-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-588101 | SSA-588101: Multiple File Parsing Vulnerabilities in Parasolid | 2022-12-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-480829 | SSA-480829: Cross-Site Scripting Vulnerabilities in SCALANCE X Switches | 2018-06-12T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-443566 | SSA-443566: Authentication Bypass in SCALANCE X Switches Families | 2020-01-14T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-436469 | SSA-436469: TCP Vulnerability in APOGEE/TALON Field Panels | 2022-12-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-412672 | SSA-412672: Multiple OpenSSL and OpenSSH Vulnerabilities in SCALANCE X-200RNA Switch Devices before V3.2.7 | 2022-12-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-363821 | SSA-363821: Multiple Vulnerabilities in SCALANCE X-200RNA Switch Devices before V3.2.7 | 2022-12-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-360681 | SSA-360681: Datalogics File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2022-12-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-333517 | SSA-333517: Multiple Vulnerabilities in SCALANCE SC-600 Family before V3.0 | 2022-12-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-312271 | SSA-312271: Unquoted Search Path Vulnerability in Windows-based Industrial Software Applications | 2020-06-09T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-274900 | SSA-274900: Use of Hardcoded Key in SCALANCE X Devices Under Certain Conditions | 2021-01-12T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-274282 | SSA-274282: Cross Site Scripting Vulnerability in PLM Help Server V4.2 | 2022-12-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-224632 | SSA-224632: Improper Access Control Vulnerability in Mendix Email Connector Module | 2022-12-13T00:00:00Z | 2022-12-13T00:00:00Z |
| ssa-853037 | SSA-853037: File Parsing Vulnerabilities in Parasolid | 2022-11-08T00:00:00Z | 2022-11-08T00:00:00Z |
| ssa-501891 | SSA-501891: Cross-Site Scripting Vulnerability in SCALANCE X-200 and X-200IRT Families | 2022-10-11T00:00:00Z | 2022-11-08T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:0323 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.14.13 Bug Fix Update | 2025-01-15T01:19:29+00:00 | 2026-02-17T07:52:27+00:00 |
| rhsa-2025:0308 | Red Hat Security Advisory: fence-agents security update | 2025-01-14T09:02:29+00:00 | 2026-02-17T07:52:22+00:00 |
| rhsa-2025:0164 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.15.9 Bug Fix Update | 2025-01-09T11:27:57+00:00 | 2026-02-17T07:52:19+00:00 |
| rhsa-2025:0082 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.16.5 Bug Fix Update | 2025-01-08T11:31:01+00:00 | 2026-02-17T07:52:14+00:00 |
| rhsa-2025:0079 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.17.2 Bug Fix Update | 2025-01-08T10:04:05+00:00 | 2026-02-17T07:52:11+00:00 |
| rhsa-2024:9985 | Red Hat Security Advisory: RHOSP 17.1.4 (python-urllib3) security update | 2024-11-21T09:30:00+00:00 | 2026-02-17T07:52:09+00:00 |
| rhsa-2024:9923 | Red Hat Security Advisory: python3.12-urllib3 security update | 2024-11-19T01:25:27+00:00 | 2026-02-17T07:52:07+00:00 |
| rhsa-2024:9922 | Red Hat Security Advisory: python3.11-urllib3 security update | 2024-11-19T01:27:02+00:00 | 2026-02-17T07:52:05+00:00 |
| rhsa-2024:9885 | Red Hat Security Advisory: Red Hat Trusted Profile Analyzer 1.2.0 | 2024-11-18T15:17:19+00:00 | 2026-02-17T07:52:02+00:00 |
| rhsa-2024:9884 | Red Hat Security Advisory: Red Hat Trusted Profile Analyzer 1.2.0 | 2024-11-18T14:52:00+00:00 | 2026-02-17T07:52:00+00:00 |
| rhsa-2024:9583 | Red Hat Security Advisory: ACS 4.4 enhancement update | 2024-11-13T18:00:45+00:00 | 2026-02-17T07:51:58+00:00 |
| rhsa-2024:9458 | Red Hat Security Advisory: python3.11-urllib3 security update | 2024-11-12T10:24:37+00:00 | 2026-02-17T07:51:56+00:00 |
| rhsa-2024:9457 | Red Hat Security Advisory: python3.12-urllib3 security update | 2024-11-12T10:24:24+00:00 | 2026-02-17T07:51:54+00:00 |
| rhsa-2024:8981 | Red Hat Security Advisory: OpenShift Container Platform 4.17.4 bug fix and security update | 2024-11-13T04:13:47+00:00 | 2026-02-17T07:51:46+00:00 |
| rhsa-2024:8906 | Red Hat Security Advisory: Satellite 6.16.0 release | 2024-11-05T17:49:17+00:00 | 2026-02-17T07:51:44+00:00 |
| rhsa-2024:8843 | Red Hat Security Advisory: python3.11-urllib3 security update | 2024-11-05T02:35:40+00:00 | 2026-02-17T07:51:44+00:00 |
| rhsa-2024:8842 | Red Hat Security Advisory: python3.12-urllib3 security update | 2024-11-05T02:46:15+00:00 | 2026-02-17T07:51:42+00:00 |
| rhsa-2024:8676 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.17.0 Security, Enhancement, & Bug Fix Update | 2024-10-30T14:25:22+00:00 | 2026-02-17T07:51:40+00:00 |
| rhsa-2024:8113 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.16.3 security and bug fix update | 2024-10-15T08:52:38+00:00 | 2026-02-17T07:51:40+00:00 |
| rhsa-2024:8035 | Red Hat Security Advisory: python3.11-urllib3 security update | 2024-10-14T02:05:56+00:00 | 2026-02-17T07:51:36+00:00 |
| rhsa-2024:8023 | Red Hat Security Advisory: Release of OpenShift Serverless Logic 1.34.0 security update & enhancements | 2024-10-14T00:59:58+00:00 | 2026-02-17T07:51:33+00:00 |
| rhsa-2024:8014 | Red Hat Security Advisory: Network Observability 1.7.0 for OpenShift | 2024-10-22T01:05:39+00:00 | 2026-02-17T07:51:33+00:00 |
| rhsa-2024:7922 | Red Hat Security Advisory: OpenShift Container Platform 4.17.1 bug fix and security update | 2024-10-16T02:39:40+00:00 | 2026-02-17T07:51:31+00:00 |
| rhsa-2024:7726 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.6.2 | 2024-10-07T09:24:48+00:00 | 2026-02-17T07:51:30+00:00 |
| rhsa-2024:7725 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.5.5 | 2024-10-07T09:24:53+00:00 | 2026-02-17T07:51:29+00:00 |
| rhsa-2024:7724 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh Containers for 2.4.11 | 2024-10-07T09:22:37+00:00 | 2026-02-17T07:51:28+00:00 |
| rhsa-2024:7599 | Red Hat Security Advisory: OpenShift Container Platform 4.16.16 bug fix and security update | 2024-10-09T05:32:16+00:00 | 2026-02-17T07:51:27+00:00 |
| rhsa-2024:7324 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 5.9.7 | 2024-10-02T12:03:29+00:00 | 2026-02-17T07:51:27+00:00 |
| rhsa-2024:7312 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.4 Product Security and Bug Fix Update | 2024-09-27T04:34:17+00:00 | 2026-02-17T07:51:25+00:00 |
| rhsa-2024:7164 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.8.4 security and bug fix update | 2024-09-26T03:46:53+00:00 | 2026-02-17T07:51:24+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-12-018-01b | Schneider Electric Quantum Ethernet Module Hard-Coded Credentials | 2012-10-21T06:00:00.000000Z | 2025-06-09T16:35:02.023038Z |
| icsa-12-016-01 | Cogent DataHub XSS and CRLF | 2012-10-19T06:00:00.000000Z | 2025-06-09T16:34:49.600837Z |
| icsa-12-013-01 | ING. Punzenberger COPA-DATA GMBH DoS Vulnerabilities | 2012-10-16T06:00:00.000000Z | 2025-06-09T16:34:37.147014Z |
| icsa-12-012-01a | Open Automation Software OPC Systems.NET Vulnerability | 2012-10-15T06:00:00.000000Z | 2025-06-09T16:34:24.700109Z |
| icsa-12-006-01 | 3S CoDeSys Vulnerabilities | 2012-10-09T06:00:00.000000Z | 2025-06-09T16:34:06.000552Z |
| icsa-11-362-01 | ScadaTEC ScadaPhone & Modbus TagServer Buffer Overflow Vulnerability | 2011-09-30T06:00:00.000000Z | 2025-06-09T16:33:59.781942Z |
| icsa-11-361-01 | Siemens Automation License Manager Vulnerabilities | 2011-09-29T06:00:00.000000Z | 2025-06-09T16:33:34.827604Z |
| icsa-11-355-02 | WellinTech KingView History Server Buffer Overflow | 2011-09-23T06:00:00.000000Z | 2025-06-09T16:33:28.540538Z |
| icsa-11-355-01 | 7-Technologies IGSS Buffer Overflow | 2011-09-23T06:00:00.000000Z | 2025-06-09T16:33:22.315361Z |
| icsa-11-353-01 | 7-Technologies Interactive Graphical SCADA | 2011-09-21T06:00:00.000000Z | 2025-06-09T16:33:16.051366Z |
| icsa-11-343-01 | Siemens FactoryLink Multiple ActiveX Vulnerabilities | 2011-09-11T06:00:00.000000Z | 2025-06-09T16:33:03.608185Z |
| icsa-16-026-02 | Rockwell Automation MicroLogix 1100 PLC Overflow Vulnerability | 2016-10-29T06:00:00.000000Z | 2025-06-09T16:32:57.382277Z |
| icsa-16-026-01 | MICROSYS PROMOTIC Memory Corruption Vulnerability | 2016-10-29T06:00:00.000000Z | 2025-06-09T16:32:51.175680Z |
| icsa-16-019-01 | Siemens OZW672 and OZW772 XSS Vulnerability | 2016-10-22T06:00:00.000000Z | 2025-06-09T16:32:44.948067Z |
| icsa-16-014-01 | Advantech WebAccess Vulnerabilities | 2016-10-17T06:00:00.000000Z | 2025-06-09T16:31:10.642130Z |
| icsa-15-356-01 | Siemens RUGGEDCOM ROX-based Devices NTP Vulnerabilities | 2015-09-24T06:00:00.000000Z | 2025-06-09T16:30:45.504574Z |
| icsa-15-351-03 | eWON Vulnerabilities | 2015-09-19T06:00:00.000000Z | 2025-06-09T16:30:08.163522Z |
| icsa-15-351-02 | Motorola MOSCAD SCADA IP Gateway Vulnerabilities | 2015-09-19T06:00:00.000000Z | 2025-06-09T16:29:55.412118Z |
| icsa-15-351-01 | Schneider Electric Modicon M340 Buffer Overflow Vulnerability | 2015-09-19T06:00:00.000000Z | 2025-06-09T16:29:49.200182Z |
| icsa-15-349-01 | Adcon Telemetry A840 Vulnerabilities | 2015-09-17T06:00:00.000000Z | 2025-06-09T16:29:24.204966Z |
| icsa-15-344-02 | Open Automation Software OPC Systems NET DLL Hijacking Vulnerability | 2015-09-12T06:00:00.000000Z | 2025-06-09T16:29:17.938829Z |
| icsa-15-344-01b | Advantech EKI Vulnerabilities (Update B) | 2015-09-12T06:00:00.000000Z | 2025-06-09T16:28:52.618727Z |
| icsa-15-342-02 | LOYTEC Router Information Exposure Vulnerability | 2015-09-10T06:00:00.000000Z | 2025-06-09T16:28:46.089562Z |
| icsa-15-337-03 | Pacom 1000 CCU GMS System Cryptographic Implementation Vulnerabilities | 2015-09-05T06:00:00.000000Z | 2025-06-09T16:28:39.850718Z |
| icsa-15-337-02 | Hospira Multiple Products Buffer Overflow Vulnerability | 2015-09-05T06:00:00.000000Z | 2025-06-09T16:28:33.444166Z |
| icsa-15-337-01 | SearchBlox File Exfiltration Vulnerability | 2015-09-05T06:00:00.000000Z | 2025-06-09T16:28:27.223837Z |
| icsa-15-328-01 | Moxa OnCell Central Manager Vulnerabilities | 2015-08-27T06:00:00.000000Z | 2025-06-09T16:28:04.742080Z |
| icsa-15-323-01 | Tibbo AggreGate Platform Vulnerabilities | 2015-08-22T06:00:00.000000Z | 2025-06-09T16:27:52.277295Z |
| icsa-15-321-01 | Exemys Web Server Bypass Vulnerability | 2015-08-20T06:00:00.000000Z | 2025-06-09T16:27:45.949280Z |
| icsa-15-309-02 | Honeywell Midas Gas Detector Vulnerabilities | 2015-08-08T06:00:00.000000Z | 2025-06-09T16:27:33.405162Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-struts-C2kCMkmT | Apache Struts Vulnerability Affecting Cisco Products: December 2023 | 2023-12-12T16:00:00+00:00 | 2023-12-21T22:23:04+00:00 |
| cisco-sa-http2-reset-d8kf32vz | HTTP/2 Rapid Reset Attack Affecting Cisco Products: October 2023 | 2023-10-16T16:00:00+00:00 | 2023-12-21T17:09:38+00:00 |
| cisco-sa-http2-reset-d8Kf32vZ | HTTP/2 Rapid Reset Attack Affecting Cisco Products: October 2023 | 2023-10-16T16:00:00+00:00 | 2023-12-21T17:09:38+00:00 |
| cisco-sa-asa-ssl-vpn-y88qom77 | Cisco Adaptive Security Appliance and Firepower Threat Defense Software VPN Packet Validation Vulnerability | 2023-12-05T16:00:00+00:00 | 2023-12-05T16:00:00+00:00 |
| cisco-sa-asa-ssl-vpn-Y88QOm77 | Cisco Adaptive Security Appliance and Firepower Threat Defense Software VPN Packet Validation Vulnerability | 2023-12-05T16:00:00+00:00 | 2023-12-05T16:00:00+00:00 |
| cisco-sa-ftd-icmpv6-dos-4emklun | Cisco Firepower Threat Defense Software and Cisco FirePOWER Services ICMPv6 with Snort 2 Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-16T21:10:27+00:00 |
| cisco-sa-ftd-icmpv6-dos-4eMkLuN | Cisco Firepower Threat Defense Software and Cisco FirePOWER Services ICMPv6 with Snort 2 Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-16T21:10:27+00:00 |
| cisco-sa-uipphone-xss-ncmuykqa | Cisco IP Phone Stored Cross-Site Scripting Vulnerability | 2023-11-15T16:00:00+00:00 | 2023-11-15T16:00:00+00:00 |
| cisco-sa-uipphone-xss-NcmUykqA | Cisco IP Phone Stored Cross-Site Scripting Vulnerability | 2023-11-15T16:00:00+00:00 | 2023-11-15T16:00:00+00:00 |
| cisco-sa-secure-endpoint-dos-rzogfknd | Cisco Secure Endpoint for Windows Scanning Evasion Vulnerability | 2023-11-15T16:00:00+00:00 | 2023-11-15T16:00:00+00:00 |
| cisco-sa-secure-endpoint-dos-RzOgFKnd | Cisco Secure Endpoint for Windows Scanning Evasion Vulnerability | 2023-11-15T16:00:00+00:00 | 2023-11-15T16:00:00+00:00 |
| cisco-sa-ise-mult-j-kxpnynr | Cisco Identity Services Engine Vulnerabilities | 2023-11-15T16:00:00+00:00 | 2023-11-15T16:00:00+00:00 |
| cisco-sa-ise-mult-j-KxpNynR | Cisco Identity Services Engine Vulnerabilities | 2023-11-15T16:00:00+00:00 | 2023-11-15T16:00:00+00:00 |
| cisco-sa-appd-php-authpriv-gebwtvu5 | Cisco AppDynamics PHP Agent Privilege Escalation Vulnerability | 2023-11-15T16:00:00+00:00 | 2023-11-15T16:00:00+00:00 |
| cisco-sa-appd-php-authpriv-gEBwTvu5 | Cisco AppDynamics PHP Agent Privilege Escalation Vulnerability | 2023-11-15T16:00:00+00:00 | 2023-11-15T16:00:00+00:00 |
| cisco-sa-accsc-dos-9slzkz8 | Cisco Secure Client Software Denial of Service Vulnerabilities | 2023-11-15T16:00:00+00:00 | 2023-11-15T16:00:00+00:00 |
| cisco-sa-accsc-dos-9SLzkZ8 | Cisco Secure Client Software Denial of Service Vulnerabilities | 2023-11-15T16:00:00+00:00 | 2023-11-15T16:00:00+00:00 |
| cisco-sa-asa-icmpv6-t5tzqwnd | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software ICMPv6 Message Processing Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-02T13:50:35+00:00 |
| cisco-sa-asa-icmpv6-t5TzqwNd | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software ICMPv6 Message Processing Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-02T13:50:35+00:00 |
| cisco-sa-asa-webvpn-dos-3ghzqbas | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Access VPN Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-02T13:47:35+00:00 |
| cisco-sa-asa-webvpn-dos-3GhZQBAS | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Access VPN Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-02T13:47:35+00:00 |
| cisco-sa-asa-webvpn-loeksnmo | Cisco Adaptive Security Appliance and Firepower Threat Defense Software VPN Web Client Services Client-Side Request Smuggling Vulnerability | 2022-08-10T16:00:00+00:00 | 2023-11-01T16:00:01+00:00 |
| cisco-sa-asa-webvpn-LOeKsNmO | Cisco Adaptive Security Appliance and Firepower Threat Defense Software VPN Web Client Services Client-Side Request Smuggling Vulnerability | 2022-08-10T16:00:00+00:00 | 2023-11-01T16:00:01+00:00 |
| cisco-sa-snort-ftd-zxytnjom | Multiple Cisco Products Snort FTP Inspection Bypass Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-snort-ftd-zXYtnjOM | Multiple Cisco Products Snort FTP Inspection Bypass Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-sa-ftd-snort3-urldos-occfqtex | Cisco Firepower Threat Defense Software SSL/TLS URL Category and Snort 3 Detection Engine Bypass and Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-sa-ftd-snort3-urldos-OccFQTeX | Cisco Firepower Threat Defense Software SSL/TLS URL Category and Snort 3 Detection Engine Bypass and Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ise-injection-qexegrcw | Cisco Identity Services Engine Command Injection Vulnerabilities | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ise-injection-QeXegrCw | Cisco Identity Services Engine Command Injection Vulnerabilities | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ise-file-upload-fcelp4xs | Cisco Identity Services Engine Vulnerabilities | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-64432 | KubeVirt Affected by an Authentication Bypass in Kubernetes Aggregation Layer | 2025-11-02T00:00:00.000Z | 2026-01-02T14:39:19.000Z |
| msrc_cve-2025-6857 | HDF5 H5Gnode.c H5G__node_cmp3 stack-based overflow | 2025-06-02T00:00:00.000Z | 2026-01-02T14:38:12.000Z |
| msrc_cve-2025-6750 | HDF5 H5Omtime.c H5O__mtime_new_encode heap-based overflow | 2025-06-02T00:00:00.000Z | 2026-01-02T14:38:06.000Z |
| msrc_cve-2025-6816 | HDF5 H5Ofsinfo.c H5O__fsinfo_encode heap-based overflow | 2025-06-02T00:00:00.000Z | 2026-01-02T14:38:00.000Z |
| msrc_cve-2025-6818 | HDF5 H5Ochunk.c H5O__chunk_protect heap-based overflow | 2025-06-02T00:00:00.000Z | 2026-01-02T14:37:55.000Z |
| msrc_cve-2025-6858 | HDF5 H5Centry.c H5C__flush_single_entry null pointer dereference | 2025-06-02T00:00:00.000Z | 2026-01-02T14:37:49.000Z |
| msrc_cve-2025-6269 | HDF5 H5Cimage.c H5C__reconstruct_cache_entry heap-based overflow | 2025-06-02T00:00:00.000Z | 2026-01-02T14:37:44.000Z |
| msrc_cve-2025-6270 | HDF5 H5FSsection.c H5FS__sect_find_node heap-based overflow | 2025-06-02T00:00:00.000Z | 2026-01-02T14:37:38.000Z |
| msrc_cve-2024-56738 | GNU GRUB (aka GRUB2) through 2.12 does not use a constant-time algorithm for grub_crypto_memcmp and thus allows side-channel attacks. | 2024-12-02T00:00:00.000Z | 2026-01-02T14:35:52.000Z |
| msrc_cve-2024-30896 | InfluxDB OSS 2.x through 2.7.11 stores the administrative operator token under the default organization which allows authorized users with read access to the authorization resource of the default organization to retrieve the operator token. InfluxDB OSS 1.x, Enterprise, Cloud, Cloud Dedicated and Clustered are not affected. NOTE: The researcher states that InfluxDB allows allAccess administrators to retrieve all raw tokens via an "influx auth ls" command. The supplier indicates that the organizations feature is operating as intended and that users may choose to add users to non-default organizations. A future release of InfluxDB 2.x will remove the ability to retrieve tokens from the API. | 2024-11-02T00:00:00.000Z | 2026-01-02T14:35:38.000Z |
| msrc_cve-2024-3177 | Bypassing mountable secrets policy imposed by the ServiceAccount admission plugin | 2024-04-02T07:00:00.000Z | 2026-01-02T14:35:05.000Z |
| msrc_cve-2025-60710 | Host Process for Windows Tasks Elevation of Privilege Vulnerability | 2025-11-11T08:00:00.000Z | 2026-01-02T08:00:00.000Z |
| msrc_cve-2025-59184 | Storage Spaces Direct Information Disclosure Vulnerability | 2025-10-14T00:00:00.000Z | 2026-01-02T00:00:00.000Z |
| msrc_cve-2025-55683 | Windows Kernel Information Disclosure Vulnerability | 2025-10-14T00:00:00.000Z | 2026-01-02T00:00:00.000Z |
| msrc_cve-2025-58436 | OpenPrinting CUPS slow client can halt cupsd, leading to a possible DoS attack | 2025-11-02T00:00:00.000Z | 2025-12-31T14:36:30.000Z |
| msrc_cve-2025-2915 | HDF5 H5Faccum.c H5F__accum_free heap-based overflow | 2025-03-02T00:00:00.000Z | 2025-12-31T14:36:01.000Z |
| msrc_cve-2025-2914 | HDF5 H5FScache.c H5FS__sinfo_Srialize_Sct_cb heap-based overflow | 2025-03-02T00:00:00.000Z | 2025-12-31T14:35:56.000Z |
| msrc_cve-2025-2924 | HDF5 H5HLcache.c H5HL__fl_deserialize heap-based overflow | 2025-03-02T00:00:00.000Z | 2025-12-31T14:35:50.000Z |
| msrc_cve-2025-2926 | HDF5 H5Ocache.c H5O__cache_chk_serialize null pointer dereference | 2025-03-02T00:00:00.000Z | 2025-12-31T14:35:44.000Z |
| msrc_cve-2025-2925 | HDF5 H5MM.c H5MM_realloc double free | 2025-03-02T00:00:00.000Z | 2025-12-31T14:35:38.000Z |
| msrc_cve-2025-2310 | HDF5 Metadata Attribute Decoder H5MM_strndup heap-based overflow | 2025-03-02T00:00:00.000Z | 2025-12-31T14:35:33.000Z |
| msrc_cve-2025-2309 | HDF5 Type Conversion Logic H5T__bit_copy heap-based overflow | 2025-03-02T00:00:00.000Z | 2025-12-31T14:35:27.000Z |
| msrc_cve-2025-2308 | HDF5 Scale-Offset Filter H5Z__scaleoffset_decompress_one_byte heap-based overflow | 2025-03-02T00:00:00.000Z | 2025-12-31T14:35:22.000Z |
| msrc_cve-2025-2153 | HDF5 h5 File H5SM.c H5SM_delete heap-based overflow | 2025-03-02T00:00:00.000Z | 2025-12-31T14:35:17.000Z |
| msrc_cve-2025-68615 | Net-SNMP snmptrapd crash | 2025-12-02T00:00:00.000Z | 2025-12-31T01:37:13.000Z |
| msrc_cve-2025-12084 | Quadratic complexity in node ID cache clearing | 2025-12-02T00:00:00.000Z | 2025-12-31T01:36:45.000Z |
| msrc_cve-2025-13837 | Out-of-memory when loading Plist | 2025-12-02T00:00:00.000Z | 2025-12-31T01:36:37.000Z |
| msrc_cve-2025-13836 | Excessive read buffering DoS in http.client | 2025-12-02T00:00:00.000Z | 2025-12-31T01:36:27.000Z |
| msrc_cve-2021-44964 | Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file. | 2022-03-02T00:00:00.000Z | 2025-12-31T01:35:10.000Z |
| msrc_cve-2025-58160 | Tracing logging user input may result in poisoning logs with ANSI escape sequences | 2025-08-02T00:00:00.000Z | 2025-12-31T01:02:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15583-1 | cJSON-devel-1.7.19-1.1 on GA media | 2025-09-29T00:00:00Z | 2025-09-29T00:00:00Z |
| opensuse-su-2025:15582-1 | tree-sitter-ruby-0.23.1-2.1 on GA media | 2025-09-26T00:00:00Z | 2025-09-26T00:00:00Z |
| opensuse-su-2025:15581-1 | traefik2-2.11.29-2.1 on GA media | 2025-09-26T00:00:00Z | 2025-09-26T00:00:00Z |
| opensuse-su-2025:15580-1 | postgresql17-17.6-2.1 on GA media | 2025-09-26T00:00:00Z | 2025-09-26T00:00:00Z |
| opensuse-su-2025:15579-1 | openbao-2.4.1-1.1 on GA media | 2025-09-26T00:00:00Z | 2025-09-26T00:00:00Z |
| opensuse-su-2025:15578-1 | chromedriver-140.0.7339.207-1.1 on GA media | 2025-09-26T00:00:00Z | 2025-09-26T00:00:00Z |
| opensuse-su-2025:15577-1 | krita-5.2.13-1.1 on GA media | 2025-09-25T00:00:00Z | 2025-09-25T00:00:00Z |
| opensuse-su-2025:15576-1 | govulncheck-vulndb-0.0.20250924T192141-1.1 on GA media | 2025-09-25T00:00:00Z | 2025-09-25T00:00:00Z |
| opensuse-su-2025:15575-1 | avahi-0.8-40.1 on GA media | 2025-09-24T00:00:00Z | 2025-09-24T00:00:00Z |
| opensuse-su-2025:15574-1 | govulncheck-vulndb-0.0.20250922T204835-1.1 on GA media | 2025-09-23T00:00:00Z | 2025-09-23T00:00:00Z |
| opensuse-su-2025:15573-1 | expat-2.7.2-1.1 on GA media | 2025-09-23T00:00:00Z | 2025-09-23T00:00:00Z |
| opensuse-su-2025:15572-1 | bird3-3.1.4-1.1 on GA media | 2025-09-23T00:00:00Z | 2025-09-23T00:00:00Z |
| opensuse-su-2025:15571-1 | tor-0.4.8.18-1.1 on GA media | 2025-09-22T00:00:00Z | 2025-09-22T00:00:00Z |
| opensuse-su-2025:15570-1 | tcpreplay-4.5.1-2.1 on GA media | 2025-09-22T00:00:00Z | 2025-09-22T00:00:00Z |
| opensuse-su-2025:15569-1 | rke2-1.33-1.33.5+rke2r1-1.1 on GA media | 2025-09-20T00:00:00Z | 2025-09-20T00:00:00Z |
| opensuse-su-2025:15568-1 | ognl-3.4.7-1.1 on GA media | 2025-09-19T00:00:00Z | 2025-09-19T00:00:00Z |
| opensuse-su-2025:15567-1 | mybatis-3.5.19-1.1 on GA media | 2025-09-19T00:00:00Z | 2025-09-19T00:00:00Z |
| opensuse-su-2025:15566-1 | govulncheck-vulndb-0.0.20250918T182144-1.1 on GA media | 2025-09-19T00:00:00Z | 2025-09-19T00:00:00Z |
| opensuse-su-2025:15565-1 | MozillaFirefox-143.0-1.1 on GA media | 2025-09-19T00:00:00Z | 2025-09-19T00:00:00Z |
| opensuse-su-2025:15564-1 | govulncheck-vulndb-0.0.20250917T170349-1.1 on GA media | 2025-09-18T00:00:00Z | 2025-09-18T00:00:00Z |
| opensuse-su-2025:15563-1 | cups-filters-1.28.17-5.1 on GA media | 2025-09-18T00:00:00Z | 2025-09-18T00:00:00Z |
| opensuse-su-2025:15562-1 | cups-2.4.14-1.1 on GA media | 2025-09-18T00:00:00Z | 2025-09-18T00:00:00Z |
| opensuse-su-2025:15561-1 | coredns-1.12.4-2.1 on GA media | 2025-09-18T00:00:00Z | 2025-09-18T00:00:00Z |
| opensuse-su-2025:15560-1 | MozillaThunderbird-140.3.0-1.1 on GA media | 2025-09-18T00:00:00Z | 2025-09-18T00:00:00Z |
| opensuse-su-2025:15559-1 | element-web-1.11.112-1.1 on GA media | 2025-09-17T00:00:00Z | 2025-09-17T00:00:00Z |
| opensuse-su-2025:15558-1 | element-desktop-1.11.112-1.1 on GA media | 2025-09-17T00:00:00Z | 2025-09-17T00:00:00Z |
| opensuse-su-2025:15557-1 | autogen-5.18.16-8.1 on GA media | 2025-09-17T00:00:00Z | 2025-09-17T00:00:00Z |
| opensuse-su-2025:15556-1 | tkimg-2.1.0-1.1 on GA media | 2025-09-16T00:00:00Z | 2025-09-16T00:00:00Z |
| opensuse-su-2025:15555-1 | firefox-esr-140.3.0-1.1 on GA media | 2025-09-16T00:00:00Z | 2025-09-16T00:00:00Z |
| opensuse-su-2025:15554-1 | watchexec-2.3.2-2.1 on GA media | 2025-09-15T00:00:00Z | 2025-09-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2024-668 | Security exception in jflex.core.NFA.insertNFA | 2024-07-20T00:01:48.807354Z | 2024-07-20T00:01:48.807879Z |
| osv-2024-517 | Segv on unknown address in od_ec_dec_init | 2024-05-30T00:05:57.060200Z | 2024-07-16T14:24:59.011170Z |
| osv-2024-538 | Use-of-uninitialized-value in QUICVariableInt::size | 2024-06-06T00:12:59.950768Z | 2024-07-16T14:22:07.747083Z |
| osv-2024-473 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-05-15T00:13:12.880068Z | 2024-07-16T14:20:15.561933Z |
| osv-2024-539 | Security exception in com.github.javaparser.CommentsInserter.insertComments | 2024-06-07T00:08:30.308579Z | 2024-07-16T14:19:14.406686Z |
| osv-2024-638 | Heap-buffer-overflow in ih264d_format_convert | 2024-07-13T00:12:13.793261Z | 2024-07-16T14:18:45.507955Z |
| osv-2024-637 | Heap-buffer-overflow in ih264d_format_convert | 2024-07-13T00:08:20.097992Z | 2024-07-16T14:17:43.815608Z |
| osv-2024-22 | Heap-use-after-free in ucl_hash_func | 2024-01-19T00:14:18.833531Z | 2024-07-16T04:35:26.847250Z |
| osv-2024-640 | Null-dereference READ | 2024-07-13T00:15:12.997693Z | 2024-07-13T00:15:12.998025Z |
| osv-2024-636 | Null-dereference READ in evp_mac_final | 2024-07-13T00:04:18.446520Z | 2024-07-13T00:04:18.446812Z |
| osv-2024-635 | Null-dereference READ in do_evp_kdf | 2024-07-13T00:03:44.593921Z | 2024-07-13T00:03:44.594307Z |
| osv-2024-634 | Heap-buffer-overflow in htmlCurrentChar | 2024-07-13T00:03:44.049545Z | 2024-07-13T00:03:44.049863Z |
| osv-2024-627 | Heap-buffer-overflow in gf_hevc_parse_nalu_bs | 2024-07-12T00:01:41.960899Z | 2024-07-12T00:01:41.961272Z |
| osv-2024-602 | Heap-buffer-overflow in ultrahdr::getYuv420Pixel | 2024-06-29T00:09:20.554523Z | 2024-06-29T00:09:20.554958Z |
| osv-2024-555 | Heap-buffer-overflow in ArduinoJson::V704HB22::detail::MsgPackDeserializer<ArduinoJson::V704HB22::detail | 2024-06-13T00:06:28.782972Z | 2024-06-28T14:18:08.360826Z |
| osv-2024-574 | Heap-buffer-overflow in spvtools::disassemble::InstructionDisassembler::EmitInstruction | 2024-06-19T00:15:01.983925Z | 2024-06-25T14:22:08.649397Z |
| osv-2024-535 | Use-of-uninitialized-value in spvTextEncodeOperand | 2024-06-06T00:00:55.007699Z | 2024-06-25T14:21:53.898093Z |
| osv-2024-518 | Security exception in com.github.javaparser.CommentsInserter.insertComments | 2024-05-30T00:16:42.628026Z | 2024-06-24T14:17:55.597576Z |
| osv-2024-577 | Heap-use-after-free in sputs | 2024-06-22T00:14:08.186738Z | 2024-06-22T00:14:08.187320Z |
| osv-2024-575 | UNKNOWN READ in H5SL_remove | 2024-06-20T00:03:37.435999Z | 2024-06-20T00:03:37.436551Z |
| osv-2024-567 | Security exception in jflex.core.NFA.insertNFA | 2024-06-16T00:06:55.824759Z | 2024-06-16T00:06:55.825276Z |
| osv-2024-552 | UNKNOWN READ in ndpi_search_zoom | 2024-06-12T00:12:06.312903Z | 2024-06-12T00:12:06.313282Z |
| osv-2024-551 | Heap-buffer-overflow in mz_zip_mem_read_func | 2024-06-12T00:06:30.075962Z | 2024-06-12T00:06:30.076324Z |
| osv-2024-550 | Heap-buffer-overflow in mz_zip_mem_read_func | 2024-06-12T00:06:02.418206Z | 2024-06-12T00:06:02.418563Z |
| osv-2024-548 | Use-of-uninitialized-value in icalmemory_strdup | 2024-06-12T00:00:26.364017Z | 2024-06-12T00:00:26.364669Z |
| osv-2024-521 | Heap-buffer-overflow in ubidi_writeReordered_76 | 2024-05-31T00:06:51.180600Z | 2024-05-31T00:06:51.181049Z |
| osv-2024-345 | Use-of-uninitialized-value in aesEncryptBlock | 2024-04-30T00:03:14.686810Z | 2024-05-27T14:03:03.110153Z |
| osv-2024-456 | Heap-buffer-overflow in ih264d_read_coeff4x4_cabac | 2024-05-09T00:08:35.451422Z | 2024-05-27T14:02:56.983104Z |
| osv-2024-323 | Security exception in com.puppycrawl.tools.checkstyle.JavaAstVisitor.getInnerBopAst | 2024-04-29T05:41:42.743610Z | 2024-05-27T14:02:31.976819Z |
| osv-2024-333 | UNKNOWN READ in Mat_VarPrint | 2024-04-30T00:01:20.039792Z | 2024-05-27T14:01:03.854129Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2020-0102 | LateStatic has incorrect Sync bound | 2020-11-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0101 | conquer-once's OnceCell lacks Send bound for its Sync trait. | 2020-12-22T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0100 | Double free when calling `sys_info::disk_info` from multiple threads | 2020-05-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0099 | Aovec<T> lacks bound on its Send and Sync traits allowing data races | 2020-12-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0098 | UsbContext trait did not require implementers to be Send and Sync. | 2020-12-18T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0097 | Soundness issue with base::Error | 2020-12-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0096 | TreeFocus lacks bounds on its Send and Sync traits | 2020-11-09T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0094 | Unsound: can make `ARefss` contain a !Send, !Sync object. | 2020-12-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0093 | Async-h1 request smuggling possible with long unread bodies | 2020-12-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0092 | Send/Sync bound needed on V in `impl Send/Sync for ARCache<K, V>` | 2020-11-13T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0091 | Dangling reference in `access::Map` with Constant | 2020-12-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0090 | Thex<T> allows data races of non-Send types across threads | 2020-12-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0089 | nanorand 0.5.0 - RNGs failed to generate properly for non-64-bit numbers | 2020-12-09T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0088 | MPMCConsumer/Producer allows sending non-Send type across threads | 2020-11-29T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0087 | TryMutex<T> allows sending non-Send type across threads | 2020-11-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0082 | ordered_float:NotNan may contain NaN after panic in assignment operators | 2020-12-06T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0081 | `mio` invalidly assumes the memory layout of std::net::SocketAddr | 2020-11-02T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0080 | `miow` invalidly assumes the memory layout of std::net::SocketAddr | 2020-11-13T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0075 | Unexpected panic when decoding tokens | 2020-11-29T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0074 | Reference counting error in `From<Py<T>>` | 2020-11-28T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0073 | Mutable reference with immutable provenance | 2020-11-12T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0072 | GenericMutexGuard allows data races of non-Sync types across threads | 2020-10-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0070 | Some lock_api lock guard objects can cause data races | 2020-11-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0069 | Argument injection in sendmail transport | 2020-11-11T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0068 | Unexpected panic in multihash `from_slice` parsing code | 2020-11-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0062 | Improper `Sync` implementation on `FuturesUnordered` in futures-utils can cause data corruption | 2020-01-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0061 | futures_task::noop_waker_ref can segfault due to dereferencing a NULL pointer | 2020-05-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0060 | futures_task::waker may cause a use-after-free if used on a type that isn't 'static | 2020-09-04T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0059 | MutexGuard::map can cause a data race in safe code | 2020-10-22T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0052 | Undefined Behavior in bounded channel | 2020-06-26T12:00:00Z | 2023-06-13T13:10:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-libphp-2024-11234 | Configuring a proxy in a stream context might allow for CRLF injection in URIs | 2025-08-11T13:54:03.025Z | 2025-11-06T13:25:46.476Z |
| bit-libphp-2024-11233 | Single byte overread with convert.quoted-printable-decode filter | 2025-08-11T13:54:01.202Z | 2025-11-06T13:25:46.476Z |
| bit-libphp-2022-31629 | $_COOKIE names string replacement (. -> _): cookie integrity vulnerabilities | 2025-08-11T13:53:41.681Z | 2025-11-06T13:25:46.476Z |
| bit-kibana-2025-25018 | Kibana Stored Cross-Site Scripting (XSS) | 2025-10-14T08:43:02.190Z | 2025-11-06T13:25:46.476Z |
| bit-kibana-2025-25017 | Kibana Stored Cross-Site Scripting (XSS) | 2025-10-14T08:43:00.623Z | 2025-11-06T13:25:46.476Z |
| bit-kibana-2025-25009 | Kibana Cross-Site Scripting (XSS) | 2025-10-09T08:43:15.178Z | 2025-11-06T13:25:46.476Z |
| bit-keydb-2025-49844 | Redis Lua Use-After-Free may lead to remote code execution | 2025-10-16T09:12:52.562Z | 2025-11-06T13:25:46.476Z |
| bit-keydb-2025-46819 | Redis is vulnerable to DoS via specially crafted LUA scripts | 2025-10-08T08:43:23.522Z | 2025-11-06T13:25:46.476Z |
| bit-keydb-2024-31228 | Denial-of-service due to unbounded pattern matching in Redis | 2024-10-09T16:30:39.030Z | 2025-11-06T13:25:46.476Z |
| bit-keydb-2022-35977 | Integer overflow in certain command arguments can drive Redis to OOM panic | 2024-08-22T19:25:58.150Z | 2025-11-06T13:25:46.476Z |
| bit-joomla-2020-13763 | 2025-04-03T14:10:16.806Z | 2025-11-06T13:25:46.476Z | |
| bit-joomla-2020-13761 | 2025-04-03T14:10:08.600Z | 2025-11-06T13:25:46.476Z | |
| bit-joomla-2020-13760 | 2025-04-03T14:10:04.787Z | 2025-11-06T13:25:46.476Z | |
| bit-jenkins-2025-59476 | 2025-09-19T09:57:11.182Z | 2025-11-06T13:25:46.476Z | |
| bit-jenkins-2025-59475 | 2025-09-19T09:57:09.400Z | 2025-11-06T13:25:46.476Z | |
| bit-jenkins-2025-59474 | 2025-09-19T09:57:07.574Z | 2025-11-06T13:25:46.476Z | |
| bit-jenkins-2021-43859 | Denial of Service by injecting highly recursive collections or maps in XStream | 2025-05-26T07:13:32.699Z | 2025-11-06T13:25:46.476Z |
| bit-harbor-2025-32019 | Harbor's repository description page allows for XSS | 2025-07-29T05:40:29.320Z | 2025-11-06T13:25:46.476Z |
| bit-grafana-2022-39201 | Data source and plugin proxy endpoints could leak the authentication cookie to some destination plugins | 2024-03-06T10:55:22.080Z | 2025-11-06T13:25:46.476Z |
| bit-golang-2025-61724 | Excessive CPU consumption in Reader.ReadResponse in net/textproto | 2025-11-06T12:58:38.217Z | 2025-11-06T13:25:46.476Z |
| bit-golang-2025-61723 | Quadratic complexity when parsing some invalid inputs in encoding/pem | 2025-11-06T12:58:34.335Z | 2025-11-06T13:25:46.476Z |
| bit-golang-2025-58189 | ALPN negotiation error contains attacker controlled information in crypto/tls | 2025-11-06T12:58:30.596Z | 2025-11-06T13:25:46.476Z |
| bit-golang-2025-58188 | Panic when validating certificates with DSA public keys in crypto/x509 | 2025-11-06T12:58:26.740Z | 2025-11-06T13:25:46.476Z |
| bit-golang-2025-58186 | Lack of limit when parsing cookies can cause memory exhaustion in net/http | 2025-11-06T12:58:17.587Z | 2025-11-06T13:25:46.476Z |
| bit-golang-2025-58185 | Parsing DER payload can cause memory exhaustion in encoding/asn1 | 2025-11-06T12:58:12.795Z | 2025-11-06T13:25:46.476Z |
| bit-golang-2025-58183 | Unbounded allocation when parsing GNU sparse map in archive/tar | 2025-11-06T12:58:07.546Z | 2025-11-06T13:25:46.476Z |
| bit-golang-2025-47912 | Insufficient validation of bracketed IPv6 hostnames in net/url | 2025-11-06T12:58:02.636Z | 2025-11-06T13:25:46.476Z |
| bit-golang-2025-47907 | Incorrect results returned from Rows.Scan in database/sql | 2025-08-10T23:42:00.295Z | 2025-11-06T13:25:46.476Z |
| bit-golang-2025-47906 | Unexpected paths returned from LookPath in os/exec | 2025-09-20T08:43:22.590Z | 2025-11-06T13:25:46.476Z |
| bit-golang-2025-4674 | Unexpected command execution in untrusted VCS repositories in cmd/go | 2025-07-31T05:44:23.042Z | 2025-11-06T13:25:46.476Z |
| ID | Description | Updated |
|---|---|---|
| var-202006-1832 | A memory corruption issue was addressed with improved validation. This issue is fixed in … | 2024-07-23T21:03:26.090000Z |
| var-201801-1712 | Systems with microprocessors utilizing speculative execution and branch prediction may al… | 2024-07-23T21:03:25.229000Z |
| var-201302-0404 | Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE 7 U… | 2024-07-23T21:03:25.858000Z |
| var-202201-0104 | In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) places in the storeAtt… | 2024-07-23T21:03:24.853000Z |
| var-201108-0145 | Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before … | 2024-07-23T21:03:24.463000Z |
| var-201904-1403 | The issue was addressed by removing origin information. This issue affected versions prio… | 2024-07-23T21:03:18.489000Z |
| var-200703-0023 | Integer overflow in Apple Mac OS X 10.3.9 and 10.4 through 10.4.8 allows remote user-assi… | 2024-07-23T21:03:17.231000Z |
| var-201112-0047 | The Cascading Style Sheets (CSS) implementation in Google Chrome before 16.0.912.63 on 64… | 2024-07-23T21:03:15.583000Z |
| var-201210-0132 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:03:14.420000Z |
| var-200512-0749 | The khtml::RenderTableSection::ensureRows function in KHTMLParser in Apple Mac OS X 10.4.… | 2024-07-23T21:03:14.261000Z |
| var-201906-1174 | Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. T… | 2024-07-23T21:03:12.658000Z |
| var-200904-0798 | The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.1… | 2024-07-23T21:03:08.190000Z |
| var-202201-0304 | A logic issue was addressed with improved state management. This issue is fixed in iOS 15… | 2024-07-23T21:03:06.170000Z |
| var-201107-0023 | WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrar… | 2024-07-23T21:03:05.834000Z |
| var-202103-1001 | An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G… | 2024-07-23T21:02:01.229000Z |
| var-201206-0059 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:01:58.493000Z |
| var-202008-0248 | An elevation of privilege vulnerability exists when an attacker establishes a vulnerable … | 2024-07-23T21:01:54.969000Z |
| var-201910-1646 | By design, BIND is intended to limit the number of TCP clients that can be connected at a… | 2024-07-23T21:01:53.208000Z |
| var-201811-0987 | nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, whic… | 2024-07-23T21:01:53.545000Z |
| var-201306-0225 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T21:01:21.795000Z |
| var-201205-0393 | Multiple stack-based buffer overflows in Apple QuickTime before 7.7.2 on Windows allow re… | 2024-07-23T21:01:21.160000Z |
| var-201204-0092 | Google Chrome before 18.0.1025.151 allows remote attackers to bypass the Same Origin Poli… | 2024-07-23T21:01:20.651000Z |
| var-201302-0306 | Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on … | 2024-07-23T21:01:18.595000Z |
| var-200712-0594 | Cross-site scripting (XSS) vulnerability in the (1) mod_imap module in the Apache HTTP Se… | 2024-07-23T21:01:17.067000Z |
| var-201512-0485 | ssl/s3_clnt.c in OpenSSL 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1p, and 1.0.2 before 1.0.2… | 2024-07-23T21:00:45.295000Z |
| var-200810-0143 | Buffer overflow in PSNormalizer in Mac OS X 10.4.11 and 10.5.5 allows remote attackers to… | 2024-07-23T21:00:45.115000Z |
| var-200809-0195 | Cross-site scripting (XSS) vulnerability in Wiki Server in Apple Mac OS X 10.5 through 10… | 2024-07-23T21:00:44.978000Z |
| var-202003-1786 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2024-07-23T21:00:14.087000Z |
| var-200609-0703 | The Installer application in Apple Mac OS X 10.4.8 and earlier, when used by a user with … | 2024-07-23T21:00:06.153000Z |
| var-201711-0473 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T20:59:26.236000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2024-000035 | Multiple vulnerabilities in WordPress Plugin "Survey Maker" | 2024-03-27T14:48+09:00 | 2024-03-27T14:48+09:00 |
| jvndb-2024-000034 | SonicDICOM Media Viewer may insecurely load Dynamic Link Libraries | 2024-03-27T14:31+09:00 | 2024-03-27T14:31+09:00 |
| jvndb-2023-000086 | Rakuten WiFi Pocket vulnerable to improper authentication | 2023-08-23T12:42+09:00 | 2024-03-27T13:43+09:00 |
| jvndb-2024-000905 | Mini Thread vulnerable to cross-site scripting | 2024-03-26T17:43+09:00 | 2024-03-26T17:43+09:00 |
| jvndb-2023-012042 | WordPress plugin "MW WP Form" vulnerable to arbitrary file upload | 2023-12-15T15:17+09:00 | 2024-03-26T17:39+09:00 |
| jvndb-2023-000083 | Multiple vulnerabilities in LuxCal Web Calendar | 2023-08-21T13:29+09:00 | 2024-03-26T17:09+09:00 |
| jvndb-2024-000906 | ffBull vulnerable to OS command injection | 2024-03-26T16:07+09:00 | 2024-03-26T16:07+09:00 |
| jvndb-2024-000900 | "EasyRange" may insecurely load executable files | 2024-03-26T15:50+09:00 | 2024-03-26T15:50+09:00 |
| jvndb-2024-000907 | 0ch BBS Script (0ch) vulnerable to cross-site scripting | 2024-03-26T15:35+09:00 | 2024-03-26T15:35+09:00 |
| jvndb-2024-000902 | TvRock vulnerable to cross-site scripting | 2024-03-26T14:27+09:00 | 2024-03-26T14:27+09:00 |
| jvndb-2024-000904 | WebProxy vulnerable to OS command injection | 2024-03-26T14:19+09:00 | 2024-03-26T14:19+09:00 |
| jvndb-2023-025113 | BUFFALO LinkStation 200 series vulnerable to arbitrary code execution | 2024-03-25T18:16+09:00 | 2024-03-25T18:16+09:00 |
| jvndb-2023-000082 | EC-CUBE 2 series vulnerable to cross-site scripting | 2023-08-17T15:12+09:00 | 2024-03-25T18:07+09:00 |
| jvndb-2023-000084 | WordPress Plugin "Advanced Custom Fields" vulnerable to cross-site scripting | 2023-08-21T14:05+09:00 | 2024-03-25T17:55+09:00 |
| jvndb-2024-000033 | WordPress Plugin "easy-popup-show" vulnerable to cross-site request forgery | 2024-03-25T13:31+09:00 | 2024-03-25T13:31+09:00 |
| jvndb-2023-000055 | ESS REC Agent Server Edition for Linux etc. vulnerable to directory traversal | 2023-05-26T13:58+09:00 | 2024-03-21T17:15+09:00 |
| jvndb-2023-000053 | Tornado vulnerable to open redirect | 2023-05-22T13:30+09:00 | 2024-03-21T17:05+09:00 |
| jvndb-2023-000058 | Pleasanter vulnerable to cross-site scripting | 2023-05-31T15:34+09:00 | 2024-03-19T18:17+09:00 |
| jvndb-2023-002002 | Multiple vulnerabilities in Contec CONPROSYS HMI System (CHS) | 2023-06-01T13:48+09:00 | 2024-03-19T18:13+09:00 |
| jvndb-2023-000072 | Improper restriction of XML external entity references (XXE) in XBRL data create application | 2023-07-18T15:22+09:00 | 2024-03-19T18:11+09:00 |
| jvndb-2023-000056 | Starlette vulnerable to directory traversal | 2023-05-30T13:34+09:00 | 2024-03-19T18:08+09:00 |
| jvndb-2023-000125 | Multiple vulnerabilities in BUFFALO VR-S1000 | 2023-12-26T15:51+09:00 | 2024-03-19T17:56+09:00 |
| jvndb-2023-000123 | Multiple vulnerabilities in GROWI | 2023-12-13T15:30+09:00 | 2024-03-19T17:46+09:00 |
| jvndb-2023-000052 | DataSpider Servista uses a hard-coded cryptographic key | 2023-05-31T15:34+09:00 | 2024-03-19T17:44+09:00 |
| jvndb-2024-000032 | Multiple vulnerabilities in FitNesse | 2024-03-18T14:08+09:00 | 2024-03-19T11:02+09:00 |
| jvndb-2023-014781 | Brother iPrint&Scan Desktop for Windows vulnerable to improper link resolution before file access | 2023-12-26T09:27+09:00 | 2024-03-18T18:05+09:00 |
| jvndb-2023-000126 | Multiple vulnerabilities in PowerCMS | 2023-12-26T16:46+09:00 | 2024-03-18T17:58+09:00 |
| jvndb-2024-000031 | "ABEMA" App for Android fails to restrict access permissions | 2024-03-15T16:37+09:00 | 2024-03-15T16:37+09:00 |
| jvndb-2024-000013 | Android App "Spoon" uses a hard-coded API key for an external service | 2024-01-23T16:53+09:00 | 2024-03-14T17:44+09:00 |
| jvndb-2024-000010 | Improper restriction of XML external entity references (XXE) in "Electronic Delivery Check System (Ministry of Agriculture, Forestry and Fisheries The Agriculture and Rural Development Project Version)" | 2024-01-23T15:25+09:00 | 2024-03-14T17:33+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:21144-1 | Security update for mysql-connector-java | 2025-11-26T08:13:19Z | 2025-11-26T08:13:19Z |
| suse-su-2025:4243-1 | Security update for the Linux Kernel (Live Patch 25 for SUSE Linux Enterprise 15 SP5) | 2025-11-25T22:06:17Z | 2025-11-25T22:06:17Z |
| suse-su-2025:4242-1 | Security update for the Linux Kernel (Live Patch 45 for SUSE Linux Enterprise 15 SP4) | 2025-11-25T21:11:35Z | 2025-11-25T21:11:35Z |
| suse-su-2025:21052-1 | Security update for the Linux Kernel | 2025-11-25T18:51:32Z | 2025-11-25T18:51:32Z |
| suse-su-2025:4239-1 | Security update for the Linux Kernel (Live Patch 39 for SUSE Linux Enterprise 15 SP4) | 2025-11-25T17:04:05Z | 2025-11-25T17:04:05Z |
| suse-su-2025:21064-1 | Security update for the Linux Kernel | 2025-11-25T16:39:37Z | 2025-11-25T16:39:37Z |
| suse-su-2025:4237-1 | Security update for the Linux Kernel (Live Patch 42 for SUSE Linux Enterprise 15 SP4) | 2025-11-25T16:04:17Z | 2025-11-25T16:04:17Z |
| suse-su-2025:4236-1 | Security update for curl | 2025-11-25T16:02:20Z | 2025-11-25T16:02:20Z |
| suse-su-2025:4233-1 | Security update for the Linux Kernel (Live Patch 41 for SUSE Linux Enterprise 15 SP4) | 2025-11-25T14:33:49Z | 2025-11-25T14:33:49Z |
| suse-su-2025:4232-1 | Security update for sssd | 2025-11-25T14:12:20Z | 2025-11-25T14:12:20Z |
| suse-su-2025:4231-1 | Security update for sssd | 2025-11-25T14:12:12Z | 2025-11-25T14:12:12Z |
| suse-su-2025:4230-1 | Security update for the Linux Kernel (Live Patch 37 for SUSE Linux Enterprise 15 SP4) | 2025-11-25T13:34:27Z | 2025-11-25T13:34:27Z |
| suse-su-2025:21140-1 | Security update for lasso | 2025-11-25T13:27:30Z | 2025-11-25T13:27:30Z |
| suse-su-2025:4229-1 | Security update for buildah | 2025-11-25T12:46:16Z | 2025-11-25T12:46:16Z |
| suse-su-2025:4227-1 | Security update for the Linux Kernel (Live Patch 36 for SUSE Linux Enterprise 15 SP4) | 2025-11-25T11:33:58Z | 2025-11-25T11:33:58Z |
| suse-su-2025:4224-1 | Security update for grub2 | 2025-11-25T09:53:55Z | 2025-11-25T09:53:55Z |
| suse-su-2025:4222-1 | Security update for bind | 2025-11-25T08:53:57Z | 2025-11-25T08:53:57Z |
| suse-su-2025:4221-1 | Security update for python39 | 2025-11-25T08:02:49Z | 2025-11-25T08:02:49Z |
| suse-su-2025:21139-1 | Security update for the Linux Kernel | 2025-11-25T07:34:57Z | 2025-11-25T07:34:57Z |
| suse-su-2025:21074-1 | Security update for the Linux Kernel | 2025-11-25T07:34:57Z | 2025-11-25T07:34:57Z |
| suse-su-2025:21179-1 | Security update for the Linux Kernel | 2025-11-25T07:34:55Z | 2025-11-25T07:34:55Z |
| suse-su-2025:4215-1 | Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP4) | 2025-11-24T17:43:06Z | 2025-11-24T17:43:06Z |
| suse-su-2025:4213-1 | Security update for the Linux Kernel (Live Patch 59 for SUSE Linux Enterprise 15 SP3) | 2025-11-24T17:42:25Z | 2025-11-24T17:42:25Z |
| suse-su-2025:4208-1 | Security update for the Linux Kernel RT (Live Patch 2 for SUSE Linux Enterprise 15 SP7) | 2025-11-24T17:42:02Z | 2025-11-24T17:42:02Z |
| suse-su-2025:4203-1 | Security update for the Linux Kernel (Live Patch 50 for SUSE Linux Enterprise 15 SP3) | 2025-11-24T17:39:50Z | 2025-11-24T17:39:50Z |
| suse-su-2025:4201-1 | Security update for the Linux Kernel RT (Live Patch 13 for SUSE Linux Enterprise 15 SP6) | 2025-11-24T14:04:15Z | 2025-11-24T14:04:15Z |
| suse-su-2025:4200-1 | Security update for the Linux Kernel RT (Live Patch 10 for SUSE Linux Enterprise 15 SP6) | 2025-11-24T14:04:08Z | 2025-11-24T14:04:08Z |
| suse-su-2025:4199-1 | Security update for the Linux Kernel (Live Patch 33 for SUSE Linux Enterprise 15 SP4) | 2025-11-24T12:33:54Z | 2025-11-24T12:33:54Z |
| suse-su-2025:4198-1 | Security update for cups-filters | 2025-11-24T11:59:54Z | 2025-11-24T11:59:54Z |
| suse-su-2025:4197-1 | Security update for grub2 | 2025-11-24T11:04:06Z | 2025-11-24T11:04:06Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-00820 | UTT HiPER 840G缓冲区溢出漏洞(CNVD-2026-00820) | 2025-07-01 | 2026-01-08 |
| cnvd-2026-00819 | UTT HiPER 840G缓冲区溢出漏洞(CNVD-2026-00819) | 2025-07-01 | 2026-01-08 |
| cnvd-2026-00818 | UTT HiPER 840G缓冲区溢出漏洞(CNVD-2026-00818) | 2025-07-01 | 2026-01-08 |
| cnvd-2026-00817 | UTT HiPER 840G缓冲区溢出漏洞(CNVD-2026-00817) | 2025-07-11 | 2026-01-08 |
| cnvd-2026-00816 | UTT HiPER 840G缓冲区溢出漏洞(CNVD-2026-00816) | 2025-07-11 | 2026-01-08 |
| cnvd-2026-00815 | UTT HiPER 840G aspRemoteApConfTempSend文件缓冲区溢出漏洞 | 2025-07-21 | 2026-01-08 |
| cnvd-2026-00814 | UTT HiPER 840G aspApBasicConfigUrcp文件缓冲区溢出漏洞 | 2025-07-21 | 2026-01-08 |
| cnvd-2026-00813 | UTT 1200GW缓冲区溢出漏洞 | 2025-09-11 | 2026-01-08 |
| cnvd-2026-00812 | UTT 1200GW缓冲区溢出漏洞 | 2025-09-11 | 2026-01-08 |
| cnvd-2026-00811 | UTT 1200GW缓冲区溢出漏洞(CNVD-2026-00811) | 2025-09-25 | 2026-01-08 |
| cnvd-2026-00810 | UTT 1250GW缓冲区溢出漏洞 | 2025-09-11 | 2026-01-08 |
| cnvd-2026-00809 | UTT 750W缓冲区溢出漏洞 | 2025-09-11 | 2026-01-08 |
| cnvd-2026-00808 | UTT HiPER 840G缓冲区溢出漏洞(CNVD-2026-00808) | 2025-09-25 | 2026-01-08 |
| cnvd-2026-00807 | UTT HiPER 840G缓冲区溢出漏洞 | 2025-10-15 | 2026-01-08 |
| cnvd-2026-00806 | UTT 1250GW缓冲区溢出漏洞 | 2025-10-15 | 2026-01-08 |
| cnvd-2026-00805 | UTT 1250GW缓冲区溢出漏洞(CNVD-2026-00805) | 2025-10-15 | 2026-01-08 |
| cnvd-2026-00804 | UTT HiPER 2620G缓冲区溢出漏洞 | 2025-10-17 | 2026-01-08 |
| cnvd-2026-00803 | UTT 进取 518G缓冲区溢出漏洞(CNVD-2026-00803) | 2025-10-17 | 2026-01-08 |
| cnvd-2026-00802 | UTT 进取 518G缓冲区溢出漏洞 | 2025-10-17 | 2026-01-08 |
| cnvd-2026-00801 | UTT 进取 750W命令注入漏洞 | 2025-11-24 | 2026-01-08 |
| cnvd-2026-00800 | UTT 进取 520W缓冲区溢出漏洞 | 2025-12-10 | 2026-01-08 |
| cnvd-2026-00799 | UTT 进取 520W缓冲区溢出漏洞(CNVD-2026-0079988) | 2025-12-10 | 2026-01-08 |
| cnvd-2026-00798 | UTT 进取 520W缓冲区溢出漏洞(CNVD-2026-0079889) | 2025-12-10 | 2026-01-08 |
| cnvd-2026-00797 | UTT 进取 512W缓冲区溢出漏洞(CNVD-2026-0079790) | 2025-12-10 | 2026-01-08 |
| cnvd-2026-00796 | UTT 进取 512W缓冲区溢出漏洞(CNVD-2026-0079609) | 2025-12-18 | 2026-01-08 |
| cnvd-2026-00795 | UTT 进取 512W缓冲区溢出漏洞(CNVD-2026-0079510) | 2025-12-18 | 2026-01-08 |
| cnvd-2026-00794 | UTT 进取 512W内存损坏漏洞 | 2025-12-25 | 2026-01-08 |
| cnvd-2026-00793 | UTT 进取 512W缓冲区溢出漏洞(CNVD-2026-0079375) | 2025-12-29 | 2026-01-08 |
| cnvd-2026-00792 | UTT 进取 512W缓冲区溢出漏洞(CNVD-2026-0079277) | 2025-12-29 | 2026-01-08 |
| cnvd-2026-00791 | UTT 进取 512W缓冲区溢出漏洞(CNVD-2026-0079178) | 2025-12-29 | 2026-01-08 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2025-AVI-1007 | Multiples vulnérabilités dans PostgreSQL | 2025-11-14T00:00:00.000000 | 2025-11-14T00:00:00.000000 |
| CERTFR-2025-AVI-1006 | Vulnérabilité dans Cisco Catalyst Center | 2025-11-14T00:00:00.000000 | 2025-11-14T00:00:00.000000 |
| CERTFR-2025-AVI-0954 | Multiples vulnérabilités dans Liferay | 2025-11-03T00:00:00.000000 | 2025-11-14T00:00:00.000000 |
| CERTFR-2025-AVI-0888 | Multiples vulnérabilités dans les produits Mattermost | 2025-10-16T00:00:00.000000 | 2025-10-16T00:00:00.000000 |
| certfr-2025-avi-1005 | Multiples vulnérabilités dans les produits Siemens | 2025-11-13T00:00:00.000000 | 2025-11-13T00:00:00.000000 |
| certfr-2025-avi-1004 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2025-11-13T00:00:00.000000 | 2025-11-13T00:00:00.000000 |
| certfr-2025-avi-1003 | Multiples vulnérabilités dans Drupal | 2025-11-13T00:00:00.000000 | 2025-11-13T00:00:00.000000 |
| certfr-2025-avi-1002 | Multiples vulnérabilités dans GitLab | 2025-11-13T00:00:00.000000 | 2025-11-13T00:00:00.000000 |
| certfr-2025-avi-1001 | Multiples vulnérabilités dans Elastic Kibana | 2025-11-13T00:00:00.000000 | 2025-11-13T00:00:00.000000 |
| certfr-2025-avi-1000 | Multiples vulnérabilités dans les produits Splunk | 2025-11-13T00:00:00.000000 | 2025-11-13T00:00:00.000000 |
| certfr-2025-avi-0999 | Vulnérabilité dans les produits Symfony | 2025-11-13T00:00:00.000000 | 2025-11-13T00:00:00.000000 |
| CERTFR-2025-AVI-1005 | Multiples vulnérabilités dans les produits Siemens | 2025-11-13T00:00:00.000000 | 2025-11-13T00:00:00.000000 |
| CERTFR-2025-AVI-1004 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2025-11-13T00:00:00.000000 | 2025-11-13T00:00:00.000000 |
| CERTFR-2025-AVI-1003 | Multiples vulnérabilités dans Drupal | 2025-11-13T00:00:00.000000 | 2025-11-13T00:00:00.000000 |
| CERTFR-2025-AVI-1002 | Multiples vulnérabilités dans GitLab | 2025-11-13T00:00:00.000000 | 2025-11-13T00:00:00.000000 |
| CERTFR-2025-AVI-1001 | Multiples vulnérabilités dans Elastic Kibana | 2025-11-13T00:00:00.000000 | 2025-11-13T00:00:00.000000 |
| CERTFR-2025-AVI-1000 | Multiples vulnérabilités dans les produits Splunk | 2025-11-13T00:00:00.000000 | 2025-11-13T00:00:00.000000 |
| CERTFR-2025-AVI-0999 | Vulnérabilité dans les produits Symfony | 2025-11-13T00:00:00.000000 | 2025-11-13T00:00:00.000000 |
| certfr-2025-avi-0998 | Multiples vulnérabilités dans les produits Microsoft | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0997 | Multiples vulnérabilités dans Microsoft Azure | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0996 | Multiples vulnérabilités dans Microsoft Windows | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0995 | Multiples vulnérabilités dans Microsoft Office | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0994 | Multiples vulnérabilités dans Microsoft Edge | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0993 | Multiples vulnérabilités dans les produits Intel | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0992 | Multiples vulnérabilités dans Apache OpenOffice | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0991 | Multiples vulnérabilités dans les produits Mozilla | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0990 | Vulnérabilité dans Google Chrome | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0989 | Vulnérabilité dans Nagios XI | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0988 | Vulnérabilité dans Ivanti Endpoint Manager (EPM) | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0987 | Vulnérabilité dans les produits Citrix | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2005-ale-014 | Vulnérabilité d'un grand nombre d'antivirus | 2005-10-11T00:00:00.000000 | 2005-10-11T00:00:00.000000 |
| CERTA-2005-ALE-014 | Vulnérabilité d'un grand nombre d'antivirus | 2005-10-11T00:00:00.000000 | 2005-10-11T00:00:00.000000 |
| certa-2005-ale-011 | Vulnérabilité de HelixPlayer et RealPlayer | 2005-09-27T00:00:00.000000 | 2005-10-10T00:00:00.000000 |
| CERTA-2005-ALE-011 | Vulnérabilité de HelixPlayer et RealPlayer | 2005-09-27T00:00:00.000000 | 2005-10-10T00:00:00.000000 |
| certa-2005-ale-010 | Vulnérabilité dans Qpopper | 2005-09-27T00:00:00.000000 | 2005-09-27T00:00:00.000000 |
| CERTA-2005-ALE-010 | Vulnérabilité dans Qpopper | 2005-09-27T00:00:00.000000 | 2005-09-27T00:00:00.000000 |
| certa-2005-ale-009 | Vulnérabilité dans Mozilla Thunderbird | 2005-09-23T00:00:00.000000 | 2005-09-23T00:00:00.000000 |
| CERTA-2005-ALE-009 | Vulnérabilité dans Mozilla Thunderbird | 2005-09-23T00:00:00.000000 | 2005-09-23T00:00:00.000000 |
| certa-2005-ale-007 | Exploitation de la faille MS05-039 | 2005-08-16T00:00:00.000000 | 2005-08-16T00:00:00.000000 |
| CERTA-2005-ALE-007 | Exploitation de la faille MS05-039 | 2005-08-16T00:00:00.000000 | 2005-08-16T00:00:00.000000 |
| certa-2005-ale-006 | Vulnérabilité du protocole RDP de Microsoft | 2005-07-18T00:00:00.000000 | 2005-08-10T00:00:00.000000 |
| CERTA-2005-ALE-006 | Vulnérabilité du protocole RDP de Microsoft | 2005-07-18T00:00:00.000000 | 2005-08-10T00:00:00.000000 |
| certa-2005-ale-005 | Vulnérabilité d'Internet Explorer | 2005-07-02T00:00:00.000000 | 2005-07-13T00:00:00.000000 |
| CERTA-2005-ALE-005 | Vulnérabilité d'Internet Explorer | 2005-07-02T00:00:00.000000 | 2005-07-13T00:00:00.000000 |
| certa-2005-ale-004 | Propagation du ver MYTOB | 2005-06-03T00:00:00.000000 | 2005-06-03T00:00:00.000000 |
| CERTA-2005-ALE-004 | Propagation du ver MYTOB | 2005-06-03T00:00:00.000000 | 2005-06-03T00:00:00.000000 |
| certa-2005-ale-003 | Multiples vulnérabilités de Firefox | 2005-05-09T00:00:00.000000 | 2005-05-12T00:00:00.000000 |
| CERTA-2005-ALE-003 | Multiples vulnérabilités de Firefox | 2005-05-09T00:00:00.000000 | 2005-05-12T00:00:00.000000 |
| certa-2005-ale-002 | Exploitation d'une vulnérabilité dans Oracle Database Server | 2005-04-28T00:00:00.000000 | 2005-04-28T00:00:00.000000 |
| CERTA-2005-ALE-002 | Exploitation d'une vulnérabilité dans Oracle Database Server | 2005-04-28T00:00:00.000000 | 2005-04-28T00:00:00.000000 |
| certa-2005-ale-001 | Vulnérabilité d'Internet Explorer | 2005-01-03T00:00:00.000000 | 2005-01-11T00:00:00.000000 |
| CERTA-2005-ALE-001 | Vulnérabilité d'Internet Explorer | 2005-01-03T00:00:00.000000 | 2005-01-11T00:00:00.000000 |
| certa-2004-ale-014 | Exploitation massive d'une faille du forum phpBB | 2004-12-22T00:00:00.000000 | 2004-12-22T00:00:00.000000 |
| CERTA-2004-ALE-014 | Exploitation massive d'une faille du forum phpBB | 2004-12-22T00:00:00.000000 | 2004-12-22T00:00:00.000000 |
| certa-2004-ale-013 | Vulnérabilité dans le composant ActiveX DHTML Edit d'Internet Explorer | 2004-12-20T00:00:00.000000 | 2004-12-20T00:00:00.000000 |
| CERTA-2004-ALE-013 | Vulnérabilité dans le composant ActiveX DHTML Edit d'Internet Explorer | 2004-12-20T00:00:00.000000 | 2004-12-20T00:00:00.000000 |
| certa-2004-ale-012 | Vulnérabilité d'Internet Explorer | 2004-11-09T00:00:00.000000 | 2004-12-02T00:00:00.000000 |
| CERTA-2004-ALE-012 | Vulnérabilité d'Internet Explorer | 2004-11-09T00:00:00.000000 | 2004-12-02T00:00:00.000000 |
| certa-2004-ale-011 | Diffusion de programmes exploitant la faille GDI+ | 2004-09-23T00:00:00.000000 | 2004-09-23T00:00:00.000000 |
| CERTA-2004-ALE-011 | Diffusion de programmes exploitant la faille GDI+ | 2004-09-23T00:00:00.000000 | 2004-09-23T00:00:00.000000 |