Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-64657 |
9.8 (3.1)
|
Azure Application Gateway Elevation of Privilege Vulne… |
Microsoft |
Azure App Gateway |
2025-11-26T00:20:52.352Z | 2026-02-13T20:46:20.037Z |
| CVE-2025-60710 |
7.8 (3.1)
|
Host Process for Windows Tasks Elevation of Privilege … |
Microsoft |
Windows 11 Version 24H2 |
2025-11-11T17:59:25.479Z | 2026-02-13T20:46:20.562Z |
| CVE-2025-30398 |
8.1 (3.1)
|
Nuance PowerScribe 360 Information Disclosure Vulnerability |
Microsoft |
Nuance PowerScribe 360 version 4.0.1 |
2025-11-11T17:59:51.398Z | 2026-02-13T20:46:19.436Z |
| CVE-2025-64660 |
8 (3.1)
|
GitHub Copilot and Visual Studio Code Remote Code Exec… |
Microsoft |
Visual Studio Code |
2025-11-20T22:18:57.308Z | 2026-02-13T20:46:18.223Z |
| CVE-2025-62459 |
8.3 (3.1)
|
Microsoft Defender Portal Spoofing Vulnerability |
Microsoft |
Microsoft 365 Defender Portal |
2025-11-20T22:18:57.900Z | 2026-02-13T20:46:18.788Z |
| CVE-2025-62453 |
5 (3.1)
|
GitHub Copilot and Visual Studio Code Security Feature… |
Microsoft |
Visual Studio Code |
2025-11-11T17:59:50.831Z | 2026-02-13T20:46:17.573Z |
| CVE-2025-62449 |
6.8 (3.1)
|
Microsoft Visual Studio Code CoPilot Chat Extension Se… |
Microsoft |
Microsoft Visual Studio Code CoPilot Chat Extension |
2025-11-11T17:59:49.768Z | 2026-02-13T20:46:16.511Z |
| CVE-2025-60721 |
7.8 (3.1)
|
Windows Administrator Protection Elevation of Privileg… |
Microsoft |
Windows 11 Version 24H2 |
2025-11-11T17:59:50.261Z | 2026-02-13T20:46:16.991Z |
| CVE-2025-62222 |
8.8 (3.1)
|
Agentic AI and Visual Studio Code Remote Code Executio… |
Microsoft |
Microsoft Visual Studio Code CoPilot Chat Extension |
2025-11-11T17:59:49.273Z | 2026-02-13T20:46:15.947Z |
| CVE-2025-62213 |
7 (3.1)
|
Windows Ancillary Function Driver for WinSock Elevatio… |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:48.693Z | 2026-02-13T20:46:15.317Z |
| CVE-2025-62215 |
7 (3.1)
|
Windows Kernel Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2025-11-11T17:59:48.205Z | 2026-02-13T20:46:14.834Z |
| CVE-2025-62214 |
6.7 (3.1)
|
Visual Studio Remote Code Execution Vulnerability |
Microsoft |
Microsoft Visual Studio 2022 version 17.14 |
2025-11-11T17:59:47.547Z | 2026-02-13T20:46:14.336Z |
| CVE-2025-62211 |
8.7 (3.1)
|
Dynamics 365 Field Service (online) Spoofing Vulnerability |
Microsoft |
Dynamics 365 Field Service (online) |
2025-11-11T17:59:46.977Z | 2026-02-13T20:46:13.682Z |
| CVE-2025-59499 |
8.8 (3.1)
|
Microsoft SQL Server Elevation of Privilege Vulnerability |
Microsoft |
Microsoft SQL Server 2016 Service Pack 3 (GDR) |
2025-11-11T17:59:46.405Z | 2026-02-13T20:46:13.033Z |
| CVE-2025-62209 |
5.5 (3.1)
|
Windows License Manager Information Disclosure Vulnerability |
Microsoft |
Windows 10 Version 1507 |
2025-11-11T17:59:45.904Z | 2026-02-13T20:46:12.519Z |
| CVE-2025-62208 |
5.5 (3.1)
|
Windows License Manager Information Disclosure Vulnerability |
Microsoft |
Windows 10 Version 1507 |
2025-11-11T17:59:45.339Z | 2026-02-13T20:46:11.869Z |
| CVE-2025-62205 |
7.8 (3.1)
|
Microsoft Office Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-11-11T17:59:44.771Z | 2026-02-13T20:46:11.279Z |
| CVE-2025-62204 |
8 (3.1)
|
Microsoft SharePoint Remote Code Execution Vulnerability |
Microsoft |
Microsoft SharePoint Enterprise Server 2016 |
2025-11-11T17:59:44.205Z | 2026-02-13T20:46:10.790Z |
| CVE-2025-62203 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-11-11T17:59:43.546Z | 2026-02-13T20:46:10.218Z |
| CVE-2025-62202 |
7.1 (3.1)
|
Microsoft Excel Information Disclosure Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-11-11T17:59:42.941Z | 2026-02-13T20:46:09.722Z |
| CVE-2025-62201 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-11-11T17:59:42.387Z | 2026-02-13T20:46:09.180Z |
| CVE-2025-62200 |
7.8 (3.1)
|
Microsoft Excel Remote Code Execution Vulnerability |
Microsoft |
Microsoft 365 Apps for Enterprise |
2025-11-11T17:59:41.808Z | 2026-02-13T20:46:08.727Z |
| CVE-2025-60724 |
9.8 (3.1)
|
GDI+ Remote Code Execution Vulnerability |
Microsoft |
Microsoft Office for Android |
2025-11-11T17:59:41.177Z | 2026-02-13T20:46:08.096Z |
| CVE-2025-60723 |
6.3 (3.1)
|
DirectX Graphics Kernel Denial of Service Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2025-11-11T17:59:40.522Z | 2026-02-13T20:46:07.529Z |
| CVE-2025-60720 |
7.8 (3.1)
|
Windows Transport Driver Interface (TDI) Translation D… |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:39.877Z | 2026-02-13T20:46:06.973Z |
| CVE-2025-60718 |
7.8 (3.1)
|
Windows Administrator Protection Elevation of Privileg… |
Microsoft |
Windows 11 Version 24H2 |
2025-11-11T17:59:39.236Z | 2026-02-13T20:46:06.306Z |
| CVE-2025-60717 |
7 (3.1)
|
Windows Broadcast DVR User Service Elevation of Privil… |
Microsoft |
Windows 10 Version 1809 |
2025-11-11T17:59:38.592Z | 2026-02-13T20:46:05.691Z |
| CVE-2025-60716 |
7 (3.1)
|
DirectX Graphics Kernel Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1809 |
2025-11-11T17:59:37.998Z | 2026-02-13T20:46:05.077Z |
| CVE-2025-60715 |
8 (3.1)
|
Windows Routing and Remote Access Service (RRAS) Remot… |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:37.399Z | 2026-02-13T20:46:04.432Z |
| CVE-2025-60714 |
7.8 (3.1)
|
Windows OLE Remote Code Execution Vulnerability |
Microsoft |
Windows 10 Version 1607 |
2025-11-11T17:59:36.834Z | 2026-02-13T20:46:03.878Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2025-37947 |
7.8 (3.1)
|
ksmbd: prevent out-of-bounds stream writes by validati… |
Linux |
Linux |
2025-05-20T16:01:43.788Z | 2025-11-03T19:57:37.368Z |
| CVE-2025-8280 |
5.8 (3.1)
|
Contact Form 7 reCAPTCHA <= 1.2.0 - Reflected XSS via … |
Unknown |
Contact Form 7 reCAPTCHA |
2025-09-12T06:00:06.157Z | 2025-09-12T16:22:30.609Z |
| CVE-2025-37778 |
N/A
|
ksmbd: Fix dangling pointer in krb_authenticate |
Linux |
Linux |
2025-05-01T13:07:16.472Z | 2025-11-03T19:54:55.466Z |
| CVE-2025-37775 |
N/A
|
ksmbd: fix the warning from __kernel_write_iter |
Linux |
Linux |
2025-05-01T13:07:14.356Z | 2025-11-03T19:54:54.085Z |
| CVE-2025-38575 |
N/A
|
ksmbd: use aead_request_free to match aead_request_alloc |
Linux |
Linux |
2025-04-18T07:01:33.904Z | 2025-11-03T19:58:31.892Z |
| CVE-2025-46310 |
6 (3.1)
|
This issue was addressed through improved state m… |
Apple |
macOS |
2026-02-11T22:58:56.379Z | 2026-02-12T16:12:49.303Z |
| CVE-2026-20605 |
4.6 (3.1)
|
The issue was addressed with improved memory hand… |
Apple |
macOS |
2026-02-11T22:59:03.734Z | 2026-02-12T17:48:34.491Z |
| CVE-2026-20606 |
7.1 (3.1)
|
This issue was addressed by removing the vulnerab… |
Apple |
macOS |
2026-02-11T22:58:00.743Z | 2026-02-12T15:46:14.846Z |
| CVE-2026-20610 |
7.8 (3.1)
|
This issue was addressed with improved handling o… |
Apple |
macOS |
2026-02-11T22:58:02.574Z | 2026-02-13T04:56:30.797Z |
| CVE-2024-35224 |
7.6 (3.1)
|
Stored Cross-Site Scripting (XSS) in OpenProject |
opf |
openproject |
2024-05-23T12:53:04.336Z | 2024-08-02T03:07:46.774Z |
| CVE-2026-20612 |
5.5 (3.1)
|
A privacy issue was addressed with improved check… |
Apple |
macOS |
2026-02-11T22:58:52.712Z | 2026-02-12T19:13:35.179Z |
| CVE-2026-1578 |
5.1 (4.0)
|
HP App – Potential Cross-Site Scripting |
HP Inc |
HP App |
2026-02-13T14:56:42.725Z | 2026-02-13T16:14:36.813Z |
| CVE-2022-37020 |
6.8 (3.1)
|
HP PC BIOS May 2024 Security Updates for Potential Sta… |
HP Inc. |
HP PC products |
2024-06-10T22:13:26.904Z | 2024-10-28T18:34:17.212Z |
| CVE-2026-0958 |
7.5 (3.1)
|
Interpretation Conflict in GitLab |
GitLab |
GitLab |
2026-02-11T11:33:46.426Z | 2026-02-11T15:19:41.414Z |
| CVE-2025-8099 |
7.5 (3.1)
|
Allocation of Resources Without Limits or Throttling i… |
GitLab |
GitLab |
2026-02-11T11:35:11.456Z | 2026-02-11T15:14:09.487Z |
| CVE-2025-7659 |
8 (3.1)
|
Origin Validation Error in GitLab |
GitLab |
GitLab |
2026-02-11T11:35:16.441Z | 2026-02-12T04:55:14.841Z |
| CVE-2025-14594 |
3.5 (3.1)
|
Authorization Bypass Through User-Controlled Key in GitLab |
GitLab |
GitLab |
2026-02-11T11:34:06.815Z | 2026-02-11T15:17:25.802Z |
| CVE-2024-31397 |
4.9 (3.1)
|
Improper handling of extra values issue exists in… |
Cybozu, Inc. |
Cybozu Garoon |
2024-06-11T05:34:39.924Z | 2024-08-02T01:52:56.934Z |
| CVE-2026-23864 |
7.5 (3.1)
|
Multiple denial of service vulnerabilities exist … |
Meta |
react-server-dom-webpack |
2026-01-26T19:16:38.250Z | 2026-01-26T20:26:45.709Z |
| CVE-2025-57785 |
6.5 (3.1)
|
Double free in XSLT in 'show_index' |
Hiawatha |
Hiawatha Web server |
2026-01-26T17:46:09.707Z | 2026-01-26T20:54:04.714Z |
| CVE-2025-14592 |
3.7 (3.1)
|
Missing Authorization in GitLab |
GitLab |
GitLab |
2026-02-11T11:34:01.432Z | 2026-02-11T15:18:04.995Z |
| CVE-2025-14560 |
7.3 (3.1)
|
Improper Neutralization of Input During Web Page Gener… |
GitLab |
GitLab |
2026-02-11T11:34:16.431Z | 2026-02-12T04:55:14.011Z |
| CVE-2025-12575 |
5.4 (3.1)
|
Server-Side Request Forgery (SSRF) in GitLab |
GitLab |
GitLab |
2026-02-11T11:34:36.432Z | 2026-02-11T15:15:26.432Z |
| CVE-2025-68723 |
9 (3.1)
|
Axigen Mail Server before 10.5.57 contains multip… |
n/a |
n/a |
2026-02-05T00:00:00.000Z | 2026-02-13T14:18:05.943Z |
| CVE-2025-68722 |
8.8 (3.1)
|
Axigen Mail Server before 10.5.57 and 10.6.x befo… |
n/a |
n/a |
2026-02-05T00:00:00.000Z | 2026-02-13T14:27:35.213Z |
| CVE-2025-68721 |
8.1 (3.1)
|
Axigen Mail Server before 10.5.57 contains an imp… |
n/a |
n/a |
2026-02-05T00:00:00.000Z | 2026-02-13T14:26:38.750Z |
| CVE-2025-12073 |
4.3 (3.1)
|
Server-Side Request Forgery (SSRF) in GitLab |
GitLab |
GitLab |
2026-02-11T11:34:46.437Z | 2026-02-11T15:14:53.506Z |
| CVE-2025-70368 |
5.4 (3.1)
|
Worklenz version 2.1.5 contains a Stored Cross-Si… |
n/a |
n/a |
2026-01-26T00:00:00.000Z | 2026-01-27T19:56:00.363Z |
| CVE-2026-0810 |
6.8 (3.1)
|
Gix-date: gix-date: undefined behavior due to invalid … |
GitoxideLabs |
gitoxide |
2026-01-26T19:36:45.705Z | 2026-02-13T15:24:28.267Z |
| CVE-2026-26023 |
5.3 (4.0)
|
Client‑side DOM XSS in the web chat app of Dify when u… |
langgenius |
dify |
2026-02-11T21:23:09.866Z | 2026-02-12T21:16:35.748Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2025-8099 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.8 before 18.6.6, 18.7… | 2026-02-11T12:16:03.687 | 2026-02-13T15:33:05.570 |
| fkie_cve-2025-7659 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.2 before 18.6.6, 18.7… | 2026-02-11T12:16:03.533 | 2026-02-13T15:32:18.967 |
| fkie_cve-2025-14594 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.11 before 18.6.6, 18.… | 2026-02-11T12:16:03.267 | 2026-02-13T15:30:42.347 |
| fkie_cve-2024-31397 | Improper handling of extra values issue exists in Cybozu Garoon 5.0.0 to 5.15.2. If this vulnerabil… | 2024-06-11T06:15:10.057 | 2026-02-13T15:30:05.950 |
| fkie_cve-2026-23864 | Multiple denial of service vulnerabilities exist in React Server Components, affecting the followin… | 2026-01-26T20:16:16.773 | 2026-02-13T15:23:05.013 |
| fkie_cve-2025-57785 | A Double Free in XSLT `show_index` has been identified in Hiawatha webserver version 11.7 which all… | 2026-01-26T18:16:27.570 | 2026-02-13T15:21:40.900 |
| fkie_cve-2025-14592 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.6 before 18.6.6, 18.7… | 2026-02-11T12:16:03.123 | 2026-02-13T15:18:16.647 |
| fkie_cve-2025-14560 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.1 before 18.6.6, 18.7… | 2026-02-11T12:16:02.980 | 2026-02-13T15:16:54.370 |
| fkie_cve-2025-12575 | GitLab has remediated an issue in GitLab EE affecting all versions from 18.0 before 18.6.6, 18.7 be… | 2026-02-11T12:16:02.833 | 2026-02-13T15:16:07.330 |
| fkie_cve-2025-68723 | Axigen Mail Server before 10.5.57 contains multiple stored Cross-Site Scripting (XSS) vulnerabiliti… | 2026-02-05T17:16:12.700 | 2026-02-13T15:15:57.503 |
| fkie_cve-2025-68722 | Axigen Mail Server before 10.5.57 and 10.6.x before 10.6.26 contains a Cross-Site Request Forgery (… | 2026-02-05T16:15:50.733 | 2026-02-13T15:15:57.303 |
| fkie_cve-2025-68721 | Axigen Mail Server before 10.5.57 contains an improper access control vulnerability in the WebAdmin… | 2026-02-05T16:15:50.630 | 2026-02-13T15:15:57.127 |
| fkie_cve-2025-12073 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.0 before 18.6.6, 18.7… | 2026-02-11T12:16:02.653 | 2026-02-13T15:15:12.320 |
| fkie_cve-2025-70368 | Worklenz version 2.1.5 contains a Stored Cross-Site Scripting (XSS) vulnerability in the Project Up… | 2026-01-26T19:16:09.410 | 2026-02-13T15:12:40.403 |
| fkie_cve-2026-0810 | A flaw was found in gix-date. The `gix_date::parse::TimeBuf::as_str` function can generate strings … | 2026-01-26T20:16:09.600 | 2026-02-13T15:11:30.550 |
| fkie_cve-2026-26023 | Dify is an open-source LLM app development platform. Prior to 1.13.0, a cross site scripting vulner… | 2026-02-11T22:15:52.233 | 2026-02-13T15:04:10.663 |
| fkie_cve-2025-59471 | A denial of service vulnerability exists in self-hosted Next.js applications that have `remotePatte… | 2026-01-26T22:15:52.890 | 2026-02-13T15:03:20.290 |
| fkie_cve-2026-2320 | Inappropriate implementation in File input in Google Chrome prior to 145.0.7632.45 allowed a remote… | 2026-02-11T19:15:52.160 | 2026-02-13T14:52:29.383 |
| fkie_cve-2026-2321 | Use after free in Ozone in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convi… | 2026-02-11T19:15:52.273 | 2026-02-13T14:51:48.773 |
| fkie_cve-2026-2322 | Inappropriate implementation in File input in Google Chrome prior to 145.0.7632.45 allowed a remote… | 2026-02-11T19:15:52.400 | 2026-02-13T14:51:37.260 |
| fkie_cve-2026-2323 | Inappropriate implementation in Downloads in Google Chrome prior to 145.0.7632.45 allowed a remote … | 2026-02-11T19:15:52.497 | 2026-02-13T14:51:29.203 |
| fkie_cve-2025-43403 | An authorization issue was addressed with improved state management. This issue is fixed in macOS S… | 2026-02-11T23:16:01.597 | 2026-02-13T14:50:34.183 |
| fkie_cve-2025-43417 | A path handling issue was addressed with improved logic. This issue is fixed in macOS Sonoma 14.8.4… | 2026-02-11T23:16:02.200 | 2026-02-13T14:50:19.590 |
| fkie_cve-2025-46290 | A logic issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, macO… | 2026-02-11T23:16:02.407 | 2026-02-13T14:50:10.343 |
| fkie_cve-2026-20638 | A logic issue was addressed with improved checks. This issue is fixed in iOS 26.3 and iPadOS 26.3. … | 2026-02-11T23:16:06.923 | 2026-02-13T14:48:06.043 |
| fkie_cve-2026-20645 | An inconsistent user interface issue was addressed with improved state management. This issue is fi… | 2026-02-11T23:16:07.430 | 2026-02-13T14:47:57.417 |
| fkie_cve-2026-20647 | This issue was addressed with improved data protection. This issue is fixed in macOS Tahoe 26.3. An… | 2026-02-11T23:16:07.630 | 2026-02-13T14:47:31.107 |
| fkie_cve-2026-20648 | A privacy issue was addressed by moving sensitive data to a protected location. This issue is fixed… | 2026-02-11T23:16:07.730 | 2026-02-13T14:47:19.083 |
| fkie_cve-2026-20650 | A denial-of-service issue was addressed with improved validation. This issue is fixed in watchOS 26… | 2026-02-11T23:16:07.927 | 2026-02-13T14:46:52.993 |
| fkie_cve-2026-20652 | The issue was addressed with improved memory handling. This issue is fixed in macOS Tahoe 26.3, iOS… | 2026-02-11T23:16:08.033 | 2026-02-13T14:46:38.773 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-pc38-57g8-39gg |
|
An issue in the "My Details" user profile functionality of Ideagen Q-Pulse 7.1.0.32 allows an authe… | 2026-02-12T18:30:23Z | 2026-02-12T18:30:23Z |
| ghsa-j8xr-3xqm-72rh |
8.4 (3.1)
8.6 (4.0)
|
BrightSign players running BrightSign OS series 4 prior to v8.5.53.1 or series 5 prior to v9.0.166… | 2026-02-12T18:30:23Z | 2026-02-12T18:30:23Z |
| ghsa-hfj8-gv3c-fx7w |
9.0 (3.1)
|
Cross Site Request Forgery vulnerability in Dolibarr ERP & CRM v.22.0.9 allows a remote attacker to… | 2026-02-12T18:30:23Z | 2026-02-12T18:30:23Z |
| ghsa-fqf2-x743-9564 |
4.6 (3.1)
|
An authorization issue was addressed with improved state management. This issue is fixed in macOS S… | 2026-02-12T00:31:05Z | 2026-02-12T18:30:23Z |
| ghsa-84wm-58x3-8fvc |
5.5 (3.1)
|
An authorization issue was addressed with improved state management. This issue is fixed in macOS T… | 2026-02-12T00:31:05Z | 2026-02-12T18:30:23Z |
| ghsa-4gx8-h22x-pf65 |
5.3 (3.1)
|
The firmware update functionality does not verify the authenticity of the supplied firmware update … | 2026-02-12T12:31:00Z | 2026-02-12T18:30:23Z |
| ghsa-3qr2-wf7p-c9f8 |
3.1 (3.1)
|
A logic issue was addressed with improved checks. This issue is fixed in watchOS 26.3, tvOS 26.3, m… | 2026-02-12T00:31:05Z | 2026-02-12T18:30:23Z |
| ghsa-355c-f243-w6f5 |
5.5 (3.1)
|
A parsing issue in the handling of directory paths was addressed with improved path validation. Thi… | 2026-02-12T00:31:05Z | 2026-02-12T18:30:23Z |
| ghsa-2jp6-x3f3-3m72 |
8.8 (3.1)
|
A logic issue was addressed with improved checks. This issue is fixed in watchOS 26.3, macOS Tahoe … | 2026-02-12T00:31:05Z | 2026-02-12T18:30:23Z |
| ghsa-r28c-wjwj-4xgv |
9.8 (3.1)
|
Weak Security in the PF-50 1.2 keyfob of PGST PG107 Alarm System 1.25.05.hf allows attackers to com… | 2026-02-12T00:31:03Z | 2026-02-12T18:30:22Z |
| ghsa-qg96-wxg3-3x3h |
5.5 (3.1)
|
A parsing issue in the handling of directory paths was addressed with improved path validation. Thi… | 2026-02-12T00:31:04Z | 2026-02-12T18:30:22Z |
| ghsa-pr6p-6x97-5c59 |
6.0 (3.1)
|
This issue was addressed through improved state management. This issue is fixed in macOS Sequoia 15… | 2026-02-12T00:31:03Z | 2026-02-12T18:30:22Z |
| ghsa-mg2x-vmw2-xm7h |
5.5 (3.1)
|
The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, i… | 2026-02-12T00:31:03Z | 2026-02-12T18:30:22Z |
| ghsa-hjj6-wmh2-qhwj |
4.3 (3.1)
|
The issue was addressed with improved memory handling. This issue is fixed in watchOS 26.3, tvOS 26… | 2026-02-12T00:31:04Z | 2026-02-12T18:30:22Z |
| ghsa-frmq-2cmp-gh32 |
7.1 (3.1)
|
This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Tahoe 26.3, … | 2026-02-12T00:31:04Z | 2026-02-12T18:30:22Z |
| ghsa-c5gm-v7v7-vjx9 |
7.5 (3.1)
|
A path handling issue was addressed with improved logic. This issue is fixed in macOS Tahoe 26.3, m… | 2026-02-12T00:31:05Z | 2026-02-12T18:30:22Z |
| ghsa-8cmp-jqmx-pj7w |
4.6 (3.1)
|
The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.7.4,… | 2026-02-12T00:31:04Z | 2026-02-12T18:30:22Z |
| ghsa-649p-9q32-vwxc |
5.5 (3.1)
|
This issue was addressed with improved data protection. This issue is fixed in macOS Tahoe 26.3. An… | 2026-02-12T00:31:04Z | 2026-02-12T18:30:22Z |
| ghsa-3ww4-528c-xcv7 |
5.5 (3.1)
|
A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Tahoe … | 2026-02-12T00:31:04Z | 2026-02-12T18:30:22Z |
| ghsa-2jw9-xm3m-75jh |
5.5 (3.1)
|
The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, i… | 2026-02-12T00:31:04Z | 2026-02-12T18:30:22Z |
| ghsa-2hr4-372m-m24q |
7.8 (3.1)
|
This issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 26.… | 2026-02-12T00:31:04Z | 2026-02-12T18:30:22Z |
| ghsa-xmr6-mm5f-8mf2 |
4.9 (3.1)
1.2 (4.0)
|
A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system … | 2026-02-11T15:30:26Z | 2026-02-12T18:30:21Z |
| ghsa-vf98-8xxx-fp8w |
4.9 (3.1)
1.2 (4.0)
|
A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system … | 2026-02-11T15:30:26Z | 2026-02-12T18:30:21Z |
| ghsa-rj79-m8w5-gpw8 |
6.5 (3.1)
|
Inappropriate implementation in File input in Google Chrome prior to 145.0.7632.45 allowed a remote… | 2026-02-11T21:30:40Z | 2026-02-12T18:30:21Z |
| ghsa-mw3g-2cmq-pj57 |
7.5 (3.1)
|
An issue in Statping-ng v.0.91.0 allows an attacker to obtain sensitive information via a crafted r… | 2026-02-11T21:30:40Z | 2026-02-12T18:30:21Z |
| ghsa-m4mv-q6m2-24j4 |
5.5 (3.1)
|
The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, i… | 2026-02-12T00:31:03Z | 2026-02-12T18:30:21Z |
| ghsa-hfmq-6wjv-c7r3 |
9.8 (3.1)
|
An issue was discovered in OpenSatKit 2.2.1. The EventErrStr buffer has a fixed size of 256 bytes. … | 2026-02-11T18:31:31Z | 2026-02-12T18:30:21Z |
| ghsa-h9c8-jr46-gp7p |
8.8 (3.1)
|
Unrestricted Upload of File with Dangerous Type vulnerabilities exist in the rich text editor and d… | 2026-02-11T21:30:42Z | 2026-02-12T18:30:21Z |
| ghsa-gvjm-pmwp-75mw |
6.5 (3.1)
|
Inappropriate implementation in Animation in Google Chrome prior to 145.0.7632.45 allowed a remote … | 2026-02-11T21:30:40Z | 2026-02-12T18:30:21Z |
| ghsa-g32q-3228-m26p |
5.5 (3.1)
|
A path handling issue was addressed with improved logic. This issue is fixed in macOS Sonoma 14.8.4… | 2026-02-12T00:31:03Z | 2026-02-12T18:30:21Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-26 |
6.5 (3.1)
|
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Security-… | aiohttp | 2024-01-29T23:15:00+00:00 | 2024-02-06T20:20:18.162431+00:00 |
| pysec-2024-25 |
9.8 (3.1)
|
DuckDB <=0.9.2 and DuckDB extension-template <=0.9.2 are vulnerable to malicious extensio… | duckdb | 2024-01-30T01:16:00+00:00 | 2024-02-06T00:25:51.550516+00:00 |
| pysec-2024-24 |
7.5 (3.1)
|
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. When usin… | aiohttp | 2024-01-29T23:15:00+00:00 | 2024-02-05T20:20:47.716944+00:00 |
| pysec-2024-23 |
5.3 (3.1)
|
Whoogle Search is a self-hosted metasearch engine. Versions 0.8.3 and prior have a limite… | whoogle-search | 2024-01-23T18:15:00+00:00 | 2024-02-02T07:18:33.382718+00:00 |
| pysec-2009-11 |
|
The rst parser (parser/text_rst.py) in MoinMoin 1.6.1 does not check the ACL of an includ… | moin | 2009-03-30T01:30:00+00:00 | 2024-02-02T07:18:32.552079+00:00 |
| pysec-2024-22 |
6.1 (3.1)
|
TuiTse-TsuSin is a package for organizing the comparative corpus of Taiwanese Chinese cha… | tuitse-tsusin | 2024-01-23T18:15:00+00:00 | 2024-02-01T22:21:01.486817+00:00 |
| pysec-2024-21 |
8.8 (3.1)
|
A vulnerability classified as critical was found in van_der_Schaar LAB TemporAI 0.0.3. Af… | temporai | 2024-01-26T17:15:00+00:00 | 2024-02-01T18:22:23.971296+00:00 |
| pysec-2024-20 |
9.8 (3.1)
|
Whoogle Search is a self-hosted metasearch engine. In versions prior to 0.8.4, the `eleme… | whoogle-search | 2024-01-23T18:15:00+00:00 | 2024-01-30T18:22:32.803340+00:00 |
| pysec-2024-19 |
6.1 (3.1)
|
Whoogle Search is a self-hosted metasearch engine. In versions 0.8.3 and prior, the `elem… | whoogle-search | 2024-01-23T18:15:00+00:00 | 2024-01-29T22:21:01.226431+00:00 |
| pysec-2024-18 |
9.8 (3.1)
|
Whoogle Search is a self-hosted metasearch engine. In versions 0.8.3 and prior, the `wind… | whoogle-search | 2024-01-23T18:15:00+00:00 | 2024-01-29T22:21:01.170723+00:00 |
| pysec-2024-17 |
8.8 (3.1)
|
pyLoad is a free and open-source Download Manager written in pure Python. The `pyload` AP… | pyload-ng | 2024-01-18T00:15:00+00:00 | 2024-01-29T20:20:58.389168+00:00 |
| pysec-2024-16 |
5.4 (3.1)
|
Nautobot is a Network Source of Truth and Network Automation Platform built as a web appl… | nautobot | 2024-01-23T00:15:00+00:00 | 2024-01-29T20:20:58.065227+00:00 |
| pysec-2023-251 |
5.3 (3.1)
|
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper … | aiohttp | 2023-11-29T20:15:00+00:00 | 2024-01-29T16:22:26.513672+00:00 |
| pysec-2023-250 |
5.3 (3.1)
|
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper … | aiohttp | 2023-11-30T07:15:00+00:00 | 2024-01-29T16:22:26.409794+00:00 |
| pysec-2024-15 |
3.7 (3.1)
|
changedetection.io is an open source tool designed to monitor websites for content chang… | changedetection-io | 2024-01-19T20:15:00+00:00 | 2024-01-26T22:21:10.756741+00:00 |
| pysec-2024-5 |
2.8 (3.1)
|
cdo-local-uuid project provides a specialized UUID-generating function that can, on user … | case-utils | 2024-01-11T03:15:00Z | 2024-01-25T14:03:52.279077Z |
| pysec-2024-14 |
|
Apache Airflow, versions before 2.8.1, have a vulnerability that allows an authenticated … | apache-airflow | 2024-01-24T13:15:00+00:00 | 2024-01-24T16:22:57.416385+00:00 |
| pysec-2024-13 |
|
Apache Airflow, versions before 2.8.1, have a vulnerability that allows a potential attac… | apache-airflow | 2024-01-24T13:15:00+00:00 | 2024-01-24T16:22:57.352530+00:00 |
| pysec-2023-241 |
9.1 (3.1)
|
Piccolo is an object-relational mapping and query builder which supports asyncio. Prior t… | piccolo | 2023-11-10T18:15:00Z | 2024-01-23T23:21:13.409656Z |
| pysec-2024-11 |
9.8 (3.1)
|
Remote Code Execution vulnerability in Apache IoTDB.This issue affects Apache IoTDB: from… | apache-iotdb | 2024-01-15T11:15:00+00:00 | 2024-01-22T22:21:02.620877+00:00 |
| pysec-2024-10 |
9.8 (3.1)
|
In Gentoo Portage before 3.0.47, there is missing PGP validation of executed code: the st… | portage | 2024-01-12T03:15:00+00:00 | 2024-01-22T18:22:47.599296+00:00 |
| pysec-2024-9 |
|
MetaGPT through 0.6.4 allows the QaEngineer role to execute arbitrary code because RunCod… | metagpt | 2024-01-22T01:15:00+00:00 | 2024-01-22T07:20:28.329958+00:00 |
| pysec-2024-8 |
|
The JSON loader in Embedchain before 0.1.57 allows a ReDoS (regular expression denial of … | embedchain | 2024-01-21T17:15:00+00:00 | 2024-01-21T20:21:00.544327+00:00 |
| pysec-2024-7 |
|
The OpenAPI loader in Embedchain before 0.1.57 allows attackers to execute arbitrary code… | embedchain | 2024-01-21T17:15:00+00:00 | 2024-01-21T20:21:00.484037+00:00 |
| pysec-2024-6 |
2.8 (3.1)
|
cdo-local-uuid project provides a specialized UUID-generating function that can, on user … | cdo-local-uuid | 2024-01-11T03:15:00+00:00 | 2024-01-19T22:21:07.454006+00:00 |
| pysec-2024-4 |
7.8 (3.1)
|
GitPython is a python library used to interact with Git repositories. There is an incompl… | gitpython | 2024-01-11T02:15:00+00:00 | 2024-01-18T16:22:52.190857+00:00 |
| pysec-2024-3 |
5.9 (3.1)
|
PyCryptodome and pycryptodomex before 3.19.1 allow side-channel leakage for OAEP decrypti… | pycryptodomex | 2024-01-05T04:15:00+00:00 | 2024-01-17T11:19:18.629304+00:00 |
| pysec-2023-249 |
7.5 (3.1)
|
Gradio is an open-source Python package that allows you to quickly build a demo or web ap… | gradio | 2023-12-22T21:15:00+00:00 | 2024-01-17T11:19:18.252182+00:00 |
| pysec-2023-248 |
6.1 (3.1)
|
An open redirect vulnerability in the python package Flask-Security-Too <=5.3.2 allows at… | flask-security-too | 2023-12-26T22:15:00+00:00 | 2024-01-17T11:19:18.188431+00:00 |
| pysec-2024-2 |
5.5 (3.1)
|
In Appwrite CLI before 3.0.0, when using the login command, the credentials of the Appwri… | appwrite | 2024-01-09T09:15:00+00:00 | 2024-01-17T11:19:17.695321+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33433 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.607347Z |
| gsd-2024-33432 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.757872Z |
| gsd-2024-33431 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.755593Z |
| gsd-2024-33430 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.713914Z |
| gsd-2024-33429 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.703541Z |
| gsd-2024-33428 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.644983Z |
| gsd-2024-33427 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.709032Z |
| gsd-2024-33426 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.652912Z |
| gsd-2024-33425 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.710668Z |
| gsd-2024-33424 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.705230Z |
| gsd-2024-33423 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.747796Z |
| gsd-2024-33422 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.760522Z |
| gsd-2024-33421 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.753988Z |
| gsd-2024-33420 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.610252Z |
| gsd-2024-33419 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.652384Z |
| gsd-2024-33418 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.732074Z |
| gsd-2024-33417 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.613107Z |
| gsd-2024-33416 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.737967Z |
| gsd-2024-33415 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.732712Z |
| gsd-2024-33414 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.723146Z |
| gsd-2024-33413 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.721359Z |
| gsd-2024-33412 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.608951Z |
| gsd-2024-33411 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.741698Z |
| gsd-2024-33410 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.719470Z |
| gsd-2024-33409 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.731838Z |
| gsd-2024-33408 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.611278Z |
| gsd-2024-33407 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.735210Z |
| gsd-2024-33406 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.718995Z |
| gsd-2024-33405 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.718151Z |
| gsd-2024-33404 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.743316Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2026-560 | Malicious code in transform-async-to-generator (npm) | 2026-01-28T06:44:48Z | 2026-02-02T05:56:31Z |
| MAL-2026-546 | Malicious code in xhjxhjhiagent (npm) | 2026-01-27T08:09:00Z | 2026-02-02T05:56:31Z |
| MAL-2026-507 | Malicious code in tripica-library (npm) | 2026-01-26T15:31:06Z | 2026-02-02T05:56:31Z |
| MAL-2026-500 | Malicious code in zabittest11 (npm) | 2026-01-25T06:56:37Z | 2026-02-02T05:56:31Z |
| mal-2026-615 | Malicious code in teaser-nav (npm) | 2026-01-31T13:35:28Z | 2026-02-02T05:56:30Z |
| mal-2026-612 | Malicious code in sharedclasses (npm) | 2026-01-30T23:47:34Z | 2026-02-02T05:56:30Z |
| mal-2026-600 | Malicious code in researchpoc2 (npm) | 2026-01-29T04:22:59Z | 2026-02-02T05:56:30Z |
| mal-2026-582 | Malicious code in somsodamsd (npm) | 2026-01-28T13:59:24Z | 2026-02-02T05:56:30Z |
| mal-2026-581 | Malicious code in somesomesomesome (npm) | 2026-01-28T13:59:24Z | 2026-02-02T05:56:30Z |
| mal-2026-580 | Malicious code in somesomesome (npm) | 2026-01-28T13:59:24Z | 2026-02-02T05:56:30Z |
| mal-2026-579 | Malicious code in skndkjasndkjan (npm) | 2026-01-28T13:59:24Z | 2026-02-02T05:56:30Z |
| mal-2026-576 | Malicious code in teslaone (npm) | 2026-01-28T07:49:34Z | 2026-02-02T05:56:30Z |
| mal-2026-575 | Malicious code in syntax-jsx (npm) | 2026-01-28T07:43:54Z | 2026-02-02T05:56:30Z |
| mal-2026-574 | Malicious code in syntax-flow (npm) | 2026-01-28T07:43:54Z | 2026-02-02T05:56:30Z |
| mal-2026-559 | Malicious code in syntax-async-functions (npm) | 2026-01-28T06:44:48Z | 2026-02-02T05:56:30Z |
| mal-2026-545 | Malicious code in testxhjhka (npm) | 2026-01-27T08:09:00Z | 2026-02-02T05:56:30Z |
| mal-2026-544 | Malicious code in testxhjhk (npm) | 2026-01-27T08:09:00Z | 2026-02-02T05:56:30Z |
| mal-2026-543 | Malicious code in tailwind-components-cli (npm) | 2026-01-27T07:59:05Z | 2026-02-02T05:56:30Z |
| mal-2026-542 | Malicious code in stylus.js (npm) | 2026-01-27T08:11:31Z | 2026-02-02T05:56:30Z |
| mal-2026-525 | Malicious code in sandbox-hooks (npm) | 2026-01-27T02:25:01Z | 2026-02-02T05:56:30Z |
| MAL-2026-615 | Malicious code in teaser-nav (npm) | 2026-01-31T13:35:28Z | 2026-02-02T05:56:30Z |
| MAL-2026-612 | Malicious code in sharedclasses (npm) | 2026-01-30T23:47:34Z | 2026-02-02T05:56:30Z |
| MAL-2026-600 | Malicious code in researchpoc2 (npm) | 2026-01-29T04:22:59Z | 2026-02-02T05:56:30Z |
| MAL-2026-582 | Malicious code in somsodamsd (npm) | 2026-01-28T13:59:24Z | 2026-02-02T05:56:30Z |
| MAL-2026-581 | Malicious code in somesomesomesome (npm) | 2026-01-28T13:59:24Z | 2026-02-02T05:56:30Z |
| MAL-2026-580 | Malicious code in somesomesome (npm) | 2026-01-28T13:59:24Z | 2026-02-02T05:56:30Z |
| MAL-2026-579 | Malicious code in skndkjasndkjan (npm) | 2026-01-28T13:59:24Z | 2026-02-02T05:56:30Z |
| MAL-2026-576 | Malicious code in teslaone (npm) | 2026-01-28T07:49:34Z | 2026-02-02T05:56:30Z |
| MAL-2026-575 | Malicious code in syntax-jsx (npm) | 2026-01-28T07:43:54Z | 2026-02-02T05:56:30Z |
| MAL-2026-574 | Malicious code in syntax-flow (npm) | 2026-01-28T07:43:54Z | 2026-02-02T05:56:30Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2023-3022 | Apache ActiveMQ: Schwachstelle ermöglicht Codeausführung | 2023-11-28T23:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2023-2119 | Python: Mehrere Schwachstellen | 2023-08-22T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2023-0611 | Red Hat JBoss Enterprise Application Platform: Schwachstelle ermöglicht Denial of Service | 2023-03-09T23:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2023-0433 | Apache Commons und Apache Tomcat: Schwachstelle ermöglicht Denial of Service | 2023-02-20T23:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-2391 | OpenBao: Mehrere Schwachstellen | 2025-10-22T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2388 | MongoDB: Schwachstelle ermöglicht Privilegieneskalation | 2025-10-22T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2272 | Moodle: Mehrere Schwachstellen | 2025-10-13T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2224 | Keycloak: Mehrere Schwachstellen | 2025-10-07T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2202 | fetchmail: Schwachstelle ermöglicht Denial of Service | 2025-10-05T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2036 | IBM WebSphere Application Server: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-09-10T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1925 | Hashicorp Vault: Schwachstelle ermöglicht Denial of Service | 2025-08-28T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1866 | Mozilla Firefox und Thunderbird: Mehrere Schwachstellen | 2025-08-19T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1613 | Linux Kernel: Mehrere Schwachstellen | 2025-07-20T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1465 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-06T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1463 | Redis: Mehrere Schwachstellen | 2025-07-06T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-0683 | Linux Kernel: Mehrere Schwachstellen | 2025-04-01T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2024-3690 | Gitea: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-12-11T23:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2024-3368 | Linux Kernel: Mehrere Schwachstellen | 2024-11-06T23:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2024-1944 | Red Hat multicluster engine for Kubernetes: Schwachstelle ermöglicht Denial of Service | 2024-08-28T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2024-1606 | Bootstrap: Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2024-07-11T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2024-0459 | Linux Kernel: Mehrere Schwachstellen | 2024-02-21T23:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2023-2864 | Linux Kernel: Mehrere Schwachstellen | 2023-11-08T23:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2023-2434 | Linux Kernel: Schwachstelle ermöglicht Codeausführung | 2023-09-24T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2023-1666 | Linux Kernel: Mehrere Schwachstellen | 2023-07-05T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2023-1542 | Red Hat OpenShift: Mehrere Schwachstellen | 2023-06-22T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2023-0637 | Linux Kernel: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-03-13T23:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2023-0328 | Red Hat OpenShift: Mehrere Schwachstellen | 2023-02-09T23:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2022-1792 | Linux Kernel: Mehrere Schwachstellen | 2022-10-18T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2022-1374 | Linux Kernel: Mehrere Schwachstellen | 2022-09-11T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2022-1186 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2022-08-24T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0311 | Kwetsbaarheden verholpen in Cisco Secure Email Gateway | 2024-07-18T12:46:34.019785Z | 2024-07-18T12:46:34.019785Z |
| ncsc-2024-0310 | Kwetsbaarheid verholpen in SonicOS | 2024-07-18T12:25:06.813302Z | 2024-07-18T12:25:06.813302Z |
| ncsc-2024-0309 | Kwetsbaarheid gevonden in Ivanti Endpoint Manager | 2024-07-18T12:00:25.689314Z | 2024-07-18T12:00:25.689314Z |
| ncsc-2024-0308 | Kwetsbaarheden verholpen in Oracle Virtualization | 2024-07-17T13:55:57.768494Z | 2024-07-17T13:55:57.768494Z |
| ncsc-2024-0307 | Kwetsbaarheden verholpen in Oracle Systems | 2024-07-17T13:55:53.343378Z | 2024-07-17T13:55:53.343378Z |
| ncsc-2024-0306 | Kwetsbaarheden verholpen in Oracle Supply Chain | 2024-07-17T13:55:37.062720Z | 2024-07-17T13:55:37.062720Z |
| ncsc-2024-0305 | Kwetsbaarheden verholpen in Oracle Siebel CRM | 2024-07-17T13:55:31.923970Z | 2024-07-17T13:55:31.923970Z |
| ncsc-2024-0304 | Kwetsbaarheden verholpen in Oracle PeopleSoft | 2024-07-17T13:55:12.225033Z | 2024-07-17T13:55:12.225033Z |
| ncsc-2024-0303 | Kwetsbaarheden verholpen in Oracle MySQL | 2024-07-17T13:54:56.036488Z | 2024-07-17T13:54:56.036488Z |
| ncsc-2024-0302 | Kwetsbaarheden verholpen in Oracle JD Edwards | 2024-07-17T13:54:52.031796Z | 2024-07-17T13:54:52.031796Z |
| ncsc-2024-0301 | Kwetsbaarheden verholpen in Oracle Java SE | 2024-07-17T13:54:46.188033Z | 2024-07-17T13:54:46.188033Z |
| ncsc-2024-0300 | Kwetsbaarheid verholpen in Oracle Hyperion | 2024-07-17T13:54:07.536172Z | 2024-07-17T13:54:07.536172Z |
| ncsc-2024-0299 | Kwetsbaarheden verholpen in Oracle Analytics | 2024-07-17T13:54:03.545073Z | 2024-07-17T13:54:03.545073Z |
| ncsc-2024-0298 | Kwetsbaarheden verholpen in Oracle Fusion Middleware | 2024-07-17T13:54:00.411174Z | 2024-07-17T13:54:00.411174Z |
| ncsc-2024-0297 | Kwetsbaarheden verholpen in Oracle Financial Services Applications | 2024-07-17T13:53:54.655859Z | 2024-07-17T13:53:54.655859Z |
| ncsc-2024-0296 | Kwetsbaarheden verholpen in Oracle Enterprise Manager | 2024-07-17T13:53:28.440252Z | 2024-07-17T13:53:28.440252Z |
| ncsc-2024-0295 | Kwetsbaarheden verholpen in Oracle E-Business Suite | 2024-07-17T13:53:22.662201Z | 2024-07-17T13:53:22.662201Z |
| ncsc-2024-0294 | Kwetsbaarheden verholpen in Oracle Communications | 2024-07-17T13:52:53.293003Z | 2024-07-17T13:52:53.293003Z |
| ncsc-2024-0293 | Kwetsbaarheden verholpen in Oracle Communications Applications | 2024-07-17T13:52:33.045762Z | 2024-07-17T13:52:33.045762Z |
| ncsc-2024-0292 | Kwetsbaarheden verholpen in Oracle Essbase | 2024-07-17T13:52:18.885359Z | 2024-07-17T13:52:18.885359Z |
| ncsc-2024-0291 | Kwetsbaarheden verholpen in Oracle Database Server | 2024-07-17T13:51:54.185475Z | 2024-07-17T13:51:54.185475Z |
| ncsc-2024-0290 | Kwetsbaarheden verholpen in Juniper Junos OS en Junos OS Evolved | 2024-07-12T11:43:27.625950Z | 2024-07-12T11:43:27.625950Z |
| ncsc-2024-0288 | Kwetsbaarheden verholpen in Citrix Workspace, NetScaler ADC en NetScaler Gateway | 2024-07-10T13:54:21.933605Z | 2024-07-11T15:05:36.608570Z |
| ncsc-2024-0289 | Kwetsbaarheid verholpen in GitLab CE/EE | 2024-07-11T08:22:44.417794Z | 2024-07-11T08:22:44.417794Z |
| ncsc-2024-0287 | Kwetsbaarheden verholpen in Fortinet | 2024-07-10T08:27:35.622919Z | 2024-07-10T08:27:35.622919Z |
| ncsc-2024-0286 | Kwetsbaarheid verholpen in Microsoft System Center Defender for IoT | 2024-07-09T19:39:17.911628Z | 2024-07-09T19:39:17.911628Z |
| ncsc-2024-0285 | Kwetsbaarheden verholpen in Microsoft Azure | 2024-07-09T19:38:21.052004Z | 2024-07-09T19:38:21.052004Z |
| ncsc-2024-0284 | Kwetsbaarheden verholpen in Microsoft Office | 2024-07-09T19:37:26.015768Z | 2024-07-09T19:37:26.015768Z |
| ncsc-2024-0283 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2024-07-09T18:46:27.237285Z | 2024-07-09T18:46:27.237285Z |
| ncsc-2024-0282 | Kwetsbaarheden verholpen in Siemens Producten | 2024-07-09T18:40:57.534939Z | 2024-07-09T18:40:57.534939Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-400332 | SSA-400332: Insufficient Design IP Protection in IEEE 1735 Recommended Practice - Impact to Questa and ModelSim | 2021-12-14T00:00:00Z | 2022-11-08T00:00:00Z |
| ssa-371761 | SSA-371761: Arbitrary Code Execution Vulnerability in the Logback Component of SINEC NMS before V1.0.3 | 2022-11-08T00:00:00Z | 2022-11-08T00:00:00Z |
| ssa-362164 | SSA-362164: Predictable Initial Sequence Numbers in the TCP/IP Stack of Nucleus RTOS | 2021-02-09T00:00:00Z | 2022-11-08T00:00:00Z |
| ssa-640732 | SSA-640732: Authentication Bypass Vulnerability in Siveillance Video Mobile Server | 2022-10-21T00:00:00Z | 2022-10-21T00:00:00Z |
| ssa-928782 | SSA-928782: Firmware Authenticity Vulnerability in LOGO! 8 BM Devices | 2022-10-11T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-917476 | SSA-917476: Multiple Vulnerabilities in SCALANCE W1750D | 2021-11-09T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-836027 | SSA-836027: Client-side Authentication in Desigo CC and Cerberus DMS | 2022-10-11T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-685781 | SSA-685781: Multiple Vulnerabilities in Apache HTTP Server Affecting Siemens Products | 2022-06-14T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-649853 | SSA-649853: Improper Certificate Validation Vulnerability in Industrial Edge Management | 2022-10-11T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-611756 | SSA-611756: JT File Parsing Vulnerability in JTTK and Simcenter Femap | 2022-10-11T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-568427 | SSA-568427: Weak Key Protection Vulnerability in SIMATIC S7-1200 and S7-1500 CPU Families | 2022-10-11T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-384224 | SSA-384224: Denial of Service Vulnerability in SIMATIC HMI Panels | 2022-10-11T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-360783 | SSA-360783: Multiple Webserver Vulnerabilities in Desigo PXM Devices | 2022-10-11T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-280624 | SSA-280624: Multiple Vulnerabilities in SCALANCE W1750D | 2021-10-12T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-258115 | SSA-258115: DWG File Parsing Vulnerability in Solid Edge before SE2022MP9 | 2022-10-11T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-254054 | SSA-254054: Spring Framework Vulnerability (Spring4Shell or SpringShell, CVE-2022-22965) - Impact to Siemens Products | 2022-04-19T00:00:00Z | 2022-10-11T00:00:00Z |
| ssa-637483 | SSA-637483 Third-Party Component Vulnerabilities in SINEC INS before V1.0 SP2 | 2022-09-13T00:00:00Z | 2022-09-13T00:00:00Z |
| ssa-518824 | SSA-518824 Multiple File Parsing Vulnerabilities in Simcenter Femap and Parasolid | 2022-09-13T00:00:00Z | 2022-09-13T00:00:00Z |
| ssa-243317 | SSA-243317 File Parsing Vulnerability in Simcenter Femap and Parasolid | 2022-07-12T00:00:00Z | 2022-09-13T00:00:00Z |
| ssa-914168 | SSA-914168: Multiple Vulnerabilities in SIMATIC WinCC Affecting Other SIMATIC Software Products | 2022-02-08T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-789162 | SSA-789162: Vulnerabilities in Teamcenter | 2022-05-10T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-759952 | SSA-759952: Command Injection and Denial of Service Vulnerability in Teamcenter | 2022-08-09T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-732250 | SSA-732250: Libcurl Vulnerabilities in Industrial Devices | 2022-05-10T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-669737 | SSA-669737: Improper Access Control Vulnerability in SICAM TOOLBOX II | 2022-02-08T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-661034 | SSA-661034: Incorrect Permission Assignment in Multiple SIMATIC Software Products | 2021-07-13T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-629512 | SSA-629512: Local Privilege Escalation Vulnerability in TIA Portal | 2020-01-14T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-580125 | SSA-580125: Multiple Vulnerabilities in SIMATIC eaSie | 2022-07-12T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-555707 | SSA-555707: Information Disclosure Vulnerability in Simcenter STAR-CCM+ | 2022-08-09T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-492828 | SSA-492828: Denial-of-Service Vulnerability in SIMATIC S7-300 CPUs and SINUMERIK Controller | 2020-11-10T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-232418 | SSA-232418: Vulnerabilities in SIMATIC S7-1200 and SIMATIC S7-1500 CPU Families | 2019-08-13T00:00:00Z | 2022-08-09T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2023:6779 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Operator security update | 2023-11-08T00:57:26+00:00 | 2026-02-17T13:24:31+00:00 |
| rhsa-2023:6346 | Red Hat Security Advisory: toolbox security and bug fix update | 2023-11-07T09:12:30+00:00 | 2026-02-17T13:24:30+00:00 |
| rhsa-2023:6305 | Red Hat Security Advisory: Migration Toolkit for Applications security update | 2023-11-06T11:24:51+00:00 | 2026-02-17T13:24:29+00:00 |
| rhsa-2023:6298 | Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.30.2 security update | 2023-11-03T08:48:21+00:00 | 2026-02-17T13:24:28+00:00 |
| rhsa-2023:6296 | Red Hat Security Advisory: Release of OpenShift Serverless 1.30.2 | 2023-11-02T19:16:02+00:00 | 2026-02-17T13:24:28+00:00 |
| rhsa-2023:6280 | Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update | 2023-11-02T10:25:06+00:00 | 2026-02-17T13:24:28+00:00 |
| rhsa-2023:6279 | Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.11.5 | 2023-11-15T01:08:30+00:00 | 2026-02-17T13:24:26+00:00 |
| rhsa-2023:6276 | Red Hat Security Advisory: OpenShift Container Platform 4.12.42 bug fix and security update | 2023-11-08T10:40:48+00:00 | 2026-02-17T13:24:26+00:00 |
| rhsa-2023:6275 | Red Hat Security Advisory: OpenShift Container Platform 4.12.42 security and extras update | 2023-11-08T10:25:29+00:00 | 2026-02-17T13:24:23+00:00 |
| rhsa-2023:6272 | Red Hat Security Advisory: OpenShift Container Platform 4.11.53 bug fix and security update | 2023-11-08T10:41:09+00:00 | 2026-02-17T13:24:23+00:00 |
| rhsa-2023:6271 | Red Hat Security Advisory: OpenShift Container Platform 4.11.53 security and extras update | 2023-11-08T09:43:47+00:00 | 2026-02-17T13:24:23+00:00 |
| rhsa-2023:6269 | Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.12.1 | 2023-11-15T03:12:52+00:00 | 2026-02-17T13:24:22+00:00 |
| rhsa-2023:6257 | Red Hat Security Advisory: OpenShift Container Platform 4.13.21 bug fix and security update | 2023-11-08T08:43:21+00:00 | 2026-02-17T13:24:21+00:00 |
| rhsa-2023:6256 | Red Hat Security Advisory: OpenShift Container Platform 4.13.21 security and extras update | 2023-11-08T08:40:09+00:00 | 2026-02-17T13:24:20+00:00 |
| rhsa-2023:6251 | Red Hat Security Advisory: OpenShift Virtualization 4.11.7 Images security and bug fix update | 2023-11-01T16:14:42+00:00 | 2026-02-17T13:24:19+00:00 |
| rhsa-2023:6243 | Red Hat Security Advisory: openshift-gitops-kam security update | 2023-11-01T14:08:03+00:00 | 2026-02-17T13:24:18+00:00 |
| rhsa-2023:6248 | Red Hat Security Advisory: OpenShift Virtualization 4.12.8 Images security update | 2023-11-01T14:42:20+00:00 | 2026-02-17T13:24:17+00:00 |
| rhsa-2023:6240 | Red Hat Security Advisory: OpenShift Container Platform 4.13 low-latency extras security update | 2023-11-01T13:41:55+00:00 | 2026-02-17T13:24:15+00:00 |
| rhsa-2023:6235 | Red Hat Security Advisory: OpenShift Virtualization 4.13.5 Images security update | 2023-11-01T12:04:35+00:00 | 2026-02-17T13:24:14+00:00 |
| rhsa-2023:6233 | Red Hat Security Advisory: Red Hat OpenShift Enterprise security update | 2023-11-01T11:34:35+00:00 | 2026-02-17T13:24:13+00:00 |
| rhsa-2023:6220 | Red Hat Security Advisory: Errata Advisory for Red Hat OpenShift GitOps v1.10.1 security update | 2023-10-31T18:22:09+00:00 | 2026-02-17T13:24:12+00:00 |
| rhsa-2023:6217 | Red Hat Security Advisory: Red Hat OpenShift Enterprise security update | 2023-10-31T14:40:40+00:00 | 2026-02-17T13:24:08+00:00 |
| rhsa-2023:6202 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.6.8 security and bug fix updates | 2023-10-30T20:13:48+00:00 | 2026-02-17T13:24:04+00:00 |
| rhsa-2023:6200 | Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.1.9 security updates and bug fixes | 2023-10-30T18:15:21+00:00 | 2026-02-17T13:24:03+00:00 |
| rhsa-2023:6179 | Red Hat Security Advisory: Red Hat Product OCP Tools 4.13 OpenShift Jenkins security update | 2023-10-30T13:03:06+00:00 | 2026-02-17T13:24:01+00:00 |
| rhsa-2023:6171 | Red Hat Security Advisory: Red Hat Product OCP Tools 4.11 Openshift Jenkins security update | 2023-10-30T11:10:10+00:00 | 2026-02-17T13:24:01+00:00 |
| rhsa-2023:6172 | Red Hat Security Advisory: Red Hat Product OCP Tools 4.12 Openshift Jenkins security update | 2023-10-30T11:24:00+00:00 | 2026-02-17T13:23:59+00:00 |
| rhsa-2023:6165 | Red Hat Security Advisory: skupper-cli and skupper-router security update | 2023-10-30T08:22:15+00:00 | 2026-02-17T13:23:57+00:00 |
| rhsa-2023:6161 | Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.14 security and bug fix update | 2023-10-30T02:16:18+00:00 | 2026-02-17T13:23:56+00:00 |
| rhsa-2023:6156 | Red Hat Security Advisory: Red Hat OpenShift support for Windows Containers 8.1.0 security update | 2023-10-30T00:25:10+00:00 | 2026-02-17T13:23:55+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-15-309-01 | Advantech EKI Hard-coded SSH Keys Vulnerability | 2015-08-08T06:00:00.000000Z | 2025-06-09T16:27:27.090625Z |
| icsa-15-300-03a | Rockwell Automation Micrologix 1100 and 1400 PLC Systems Vulnerabilities (Update A) | 2015-07-30T06:00:00.000000Z | 2025-06-09T16:26:55.984078Z |
| icsa-15-300-02a | Infinite Automation Systems Mango Automation Vulnerabilities (Update A) | 2015-07-30T06:00:00.000000Z | 2025-06-09T16:26:12.022061Z |
| icsa-15-300-01 | Siemens RuggedCom Improper Ethernet Frame Padding Vulnerability | 2015-07-30T06:00:00.000000Z | 2025-06-09T16:26:05.782495Z |
| icsa-15-295-01 | Eaton's Cooper Devices Improper Ethernet Frame Padding Vulnerability | 2015-07-25T06:00:00.000000Z | 2025-06-09T16:25:59.550069Z |
| icsa-15-293-03 | 3S CODESYS Gateway Null Pointer Exception Vulnerability | 2015-07-23T06:00:00.000000Z | 2025-06-09T16:25:53.323160Z |
| icsa-15-293-02 | IniNet Solutions SCADA Web Server Vulnerabilities | 2015-07-23T06:00:00.000000Z | 2025-06-09T16:25:34.578936Z |
| icsa-15-293-01 | IniNet Solutions embeddedWebServer Cleartext Storage Vulnerability | 2015-07-23T06:00:00.000000Z | 2025-06-09T16:25:28.331705Z |
| icsa-15-288-01 | 3S CODESYS Runtime Toolkit Null Pointer Dereference Vulnerability | 2015-07-18T06:00:00.000000Z | 2025-06-09T16:25:22.103595Z |
| icsa-15-286-01 | Nordex NC2 XSS Vulnerability | 2015-07-16T06:00:00.000000Z | 2025-06-09T16:25:15.861787Z |
| icsa-15-274-02a | Unitronics VisiLogic OPLC IDE Vulnerabilities (Update A) | 2015-07-04T06:00:00.000000Z | 2025-06-09T16:24:57.129200Z |
| icsa-15-274-01 | Omron Multiple Product Vulnerabilities | 2015-07-04T06:00:00.000000Z | 2025-06-09T16:24:38.133706Z |
| icsa-15-272-01 | Honeywell Experion PKS Directory Traversal Vulnerability | 2015-07-02T06:00:00.000000Z | 2025-06-09T16:24:31.906369Z |
| icsa-15-267-01 | Endress+Hauser Fieldcare/CodeWrights HART Comm DTM XML Injection Vulnerability | 2015-06-27T06:00:00.000000Z | 2025-06-09T16:24:25.686094Z |
| icsa-15-265-03 | Janitza UMG Power Quality Measuring Products Vulnerabilities | 2015-06-25T06:00:00.000000Z | 2025-06-09T16:23:41.261527Z |
| icsa-15-265-02 | IBC Solar ServeMaster Source Code Vulnerability | 2015-06-25T06:00:00.000000Z | 2025-06-09T16:23:22.529805Z |
| icsa-15-265-01 | Resource Data Management Privilege Escalation Vulnerability | 2015-06-25T06:00:00.000000Z | 2025-06-09T16:23:10.053523Z |
| icsa-15-260-01 | Harman-Kardon Uconnect Vulnerability | 2015-06-20T06:00:00.000000Z | 2025-06-09T16:23:03.824948Z |
| icsa-15-258-04 | Advantech WebAccess Stack-Based Buffer Overflow Vulnerability | 2015-06-18T06:00:00.000000Z | 2025-06-09T16:22:57.599223Z |
| icsa-15-237-02 | EasyIO-30P-SF Hard-Coded Credential Vulnerability | 2015-05-28T06:00:00.000000Z | 2025-06-09T16:22:51.381445Z |
| icsa-15-232-01 | Everest Software PeakHMI Pointer Dereference Vulnerabilities | 2015-05-23T06:00:00.000000Z | 2025-06-09T16:22:44.799609Z |
| icsa-14-105-02a | Innominate mGuard OpenSSL HeartBleed Vulnerability | 2014-01-16T07:00:00.000000Z | 2025-06-06T22:55:58.996445Z |
| icsa-14-084-01 | Festo CECX-X-(C1/M1) Controller Vulnerabilities | 2014-12-26T07:00:00.000000Z | 2025-06-06T22:55:26.819560Z |
| icsa-13-344-01 | WellinTech Vulnerabilities | 2013-09-12T06:00:00.000000Z | 2025-06-06T22:55:13.840768Z |
| icsa-13-213-01 | Siemens Scalance W-7xx Product Family Multiple Vulnerabilities | 2013-05-04T06:00:00.000000Z | 2025-06-06T22:54:47.674263Z |
| icsa-13-142-01 | 3S CODESYS Gateway Use After Free | 2013-02-23T07:00:00.000000Z | 2025-06-06T22:54:41.230556Z |
| icsa-13-136-01 | TURCK BL20 and BL67 Programmable Gateway Hard-Coded User Accounts | 2013-02-17T07:00:00.000000Z | 2025-06-06T22:54:28.354036Z |
| icsa-13-116-01 | Galil RIO-47100 Improper Input Validation | 2013-01-28T07:00:00.000000Z | 2025-06-06T22:54:21.910443Z |
| icsa-13-084-01 | Siemens CP 1604 and CP 1616 Improper Access Control | 2013-12-27T07:00:00.000000Z | 2025-06-06T22:53:49.627883Z |
| icsa-15-008-02 | Schneider Electric Wonderware InTouch Access Anywhere Server Buffer Overflow Vulnerability | 2015-10-11T06:00:00.000000Z | 2025-06-06T22:53:43.105671Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-ise-file-upload-FceLP4xs | Cisco Identity Services Engine Vulnerabilities | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ftdsnort3sip-bypass-lmz2thkn | Cisco Firepower Threat Defense Software Snort 3 Geolocation IP Filter Bypass Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ftdsnort3sip-bypass-LMz2ThKn | Cisco Firepower Threat Defense Software Snort 3 Geolocation IP Filter Bypass Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ftd-snort3-uanuntcv | Cisco Firepower Threat Defense Software Snort 3 Detection Engine Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ftd-snort3-uAnUntcV | Cisco Firepower Threat Defense Software Snort 3 Detection Engine Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ftd-snort3-8u4hhxh8 | Cisco Firepower Threat Defense Software SSL and Snort 3 Detection Engine Bypass and Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ftd-snort3-8U4HHxH8 | Cisco Firepower Threat Defense Software SSL and Snort 3 Detection Engine Bypass and Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ftd-smbsnort3-dos-pfojoyuv | Cisco Firepower Threat Defense Software SMB Protocol Snort 3 Detection Engine Bypass and Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ftd-smbsnort3-dos-pfOjOYUV | Cisco Firepower Threat Defense Software SMB Protocol Snort 3 Detection Engine Bypass and Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ftd-intrusion-dos-dft7wygc | Cisco Firepower Threat Defense Software for Cisco Firepower 2100 Series Firewalls Inspection Rules Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-ftd-intrusion-dos-DfT7wyGC | Cisco Firepower Threat Defense Software for Cisco Firepower 2100 Series Firewalls Inspection Rules Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-fmc-xss-sk2gkfvj | Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-fmc-xss-sK2gkfvJ | Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-fmc-logview-dos-ayjdex55 | Cisco Firepower Management Center Software Log API Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-fmc-logview-dos-AYJdeX55 | Cisco Firepower Management Center Software Log API Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-fmc-file-download-7js4ug2j | Cisco Firepower Management Center Software Arbitrary File Download Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-fmc-file-download-7js4ug2J | Cisco Firepower Management Center Software Arbitrary File Download Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-fmc-cmdinj-btegufox | Cisco Firepower Management Center Software Command Injection Vulnerabilities | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-fmc-cmdinj-bTEgufOX | Cisco Firepower Management Center Software Command Injection Vulnerabilities | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-fmc-cmd-inj-29mp49hn | Cisco Firepower Management Center Software Command Injection Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-fmc-cmd-inj-29MP49hN | Cisco Firepower Management Center Software Command Injection Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-cms-segfault-g6es4ve8 | Cisco Meeting Server Web Bridge Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-cms-segfault-G6ES4Ve8 | Cisco Meeting Server Web Bridge Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-asaftd-ssl-dos-kxg8mpua | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software AnyConnect SSL/TLS VPN Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-asaftd-ssl-dos-kxG8mpUA | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software AnyConnect SSL/TLS VPN Denial of Service Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-asaftd-saml-hijack-ttuqfyz | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SAML Assertion Hijack Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-asaftd-saml-hijack-ttuQfyz | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SAML Assertion Hijack Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-asaftd-multi-cert-dza3h5pt | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Access SSL VPN Multiple Certificate Authentication Bypass Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-asaftd-multi-cert-dzA3h5PT | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Remote Access SSL VPN Multiple Certificate Authentication Bypass Vulnerability | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| cisco-sa-asaftd-ac-acl-bypass-bwd7q6gb | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software AnyConnect Access Control List Bypass Vulnerabilities | 2023-11-01T16:00:00+00:00 | 2023-11-01T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-49014 | jq heap use after free vulnerability in f_strflocaltime | 2025-06-02T00:00:00.000Z | 2025-12-31T01:01:30.000Z |
| msrc_cve-2023-54061 | x86: fix clear_user_rep_good() exception handling annotation | 2025-12-02T00:00:00.000Z | 2025-12-26T14:38:55.000Z |
| msrc_cve-2025-68733 | smack: fix bug: unprivileged task can create labels | 2025-12-02T00:00:00.000Z | 2025-12-26T14:38:50.000Z |
| msrc_cve-2025-68374 | md: fix rcu protection in md_wakeup_thread | 2025-12-02T00:00:00.000Z | 2025-12-26T14:38:46.000Z |
| msrc_cve-2025-68724 | crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id | 2025-12-02T00:00:00.000Z | 2025-12-26T14:38:41.000Z |
| msrc_cve-2025-68376 | coresight: ETR: Fix ETR buffer use-after-free issue | 2025-12-02T00:00:00.000Z | 2025-12-26T14:38:31.000Z |
| msrc_cve-2025-68378 | bpf: Fix stackmap overflow check in __bpf_get_stackid() | 2025-12-02T00:00:00.000Z | 2025-12-26T14:38:26.000Z |
| msrc_cve-2025-68727 | ntfs3: Fix uninit buffer allocated by __getname() | 2025-12-02T00:00:00.000Z | 2025-12-26T14:38:22.000Z |
| msrc_cve-2025-68364 | ocfs2: relax BUG() to ocfs2_error() in __ocfs2_move_extent() | 2025-12-02T00:00:00.000Z | 2025-12-26T14:38:17.000Z |
| msrc_cve-2025-68379 | RDMA/rxe: Fix null deref on srq->rq.queue after resize failure | 2025-12-02T00:00:00.000Z | 2025-12-26T14:38:07.000Z |
| msrc_cve-2025-68363 | bpf: Check skb->transport_header is set in bpf_skb_check_mtu | 2025-12-02T00:00:00.000Z | 2025-12-26T14:38:02.000Z |
| msrc_cve-2025-68740 | ima: Handle error code returned by ima_filter_rule_match() | 2025-12-02T00:00:00.000Z | 2025-12-26T14:37:57.000Z |
| msrc_cve-2023-54082 | af_unix: Fix null-ptr-deref in unix_stream_sendpage(). | 2025-12-02T00:00:00.000Z | 2025-12-26T14:37:53.000Z |
| msrc_cve-2025-68358 | btrfs: fix racy bitfield write in btrfs_clear_space_info_full() | 2025-12-02T00:00:00.000Z | 2025-12-26T14:37:48.000Z |
| msrc_cve-2025-68372 | nbd: defer config put in recv_work | 2025-12-02T00:00:00.000Z | 2025-12-26T14:37:43.000Z |
| msrc_cve-2025-68728 | ntfs3: fix uninit memory after failed mi_read in mi_format_new | 2025-12-02T00:00:00.000Z | 2025-12-26T14:37:38.000Z |
| msrc_cve-2025-68725 | bpf: Do not let BPF test infra emit invalid GSO types to stack | 2025-12-02T00:00:00.000Z | 2025-12-26T14:37:33.000Z |
| msrc_cve-2025-68365 | fs/ntfs3: Initialize allocated memory before use | 2025-12-02T00:00:00.000Z | 2025-12-26T14:37:29.000Z |
| msrc_cve-2025-68742 | bpf: Fix invalid prog->stats access when update_effective_progs fails | 2025-12-02T00:00:00.000Z | 2025-12-26T14:37:19.000Z |
| msrc_cve-2025-68356 | gfs2: Prevent recursive memory reclaim | 2025-12-02T00:00:00.000Z | 2025-12-26T14:37:14.000Z |
| msrc_cve-2025-68746 | spi: tegra210-quad: Fix timeout handling | 2025-12-02T00:00:00.000Z | 2025-12-26T14:37:09.000Z |
| msrc_cve-2025-68344 | ALSA: wavefront: Fix integer overflow in sample size validation | 2025-12-02T00:00:00.000Z | 2025-12-26T14:37:04.000Z |
| msrc_cve-2025-68347 | ALSA: firewire-motu: fix buffer overflow in hwdep read for DSP events | 2025-12-02T00:00:00.000Z | 2025-12-26T14:37:00.000Z |
| msrc_cve-2025-68744 | bpf: Free special fields when update [lru_,]percpu_hash maps | 2025-12-02T00:00:00.000Z | 2025-12-26T14:36:55.000Z |
| msrc_cve-2025-68745 | scsi: qla2xxx: Clear cmds after chip reset | 2025-12-02T00:00:00.000Z | 2025-12-26T14:36:45.000Z |
| msrc_cve-2025-68736 | landlock: Fix handling of disconnected directories | 2025-12-02T00:00:00.000Z | 2025-12-26T14:36:40.000Z |
| msrc_cve-2025-68366 | nbd: defer config unlock in nbd_genl_connect | 2025-12-02T00:00:00.000Z | 2025-12-26T14:36:35.000Z |
| msrc_cve-2025-68357 | iomap: allocate s_dio_done_wq for async reads as well | 2025-12-02T00:00:00.000Z | 2025-12-26T14:36:30.000Z |
| msrc_cve-2023-54161 | af_unix: Fix null-ptr-deref in unix_stream_sendpage(). | 2025-12-02T00:00:00.000Z | 2025-12-26T14:36:26.000Z |
| msrc_cve-2025-68732 | gpu: host1x: Fix race in syncpt alloc/free | 2025-12-02T00:00:00.000Z | 2025-12-26T14:36:21.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15557-1 | autogen-5.18.16-8.1 on GA media | 2025-09-17T00:00:00Z | 2025-09-17T00:00:00Z |
| opensuse-su-2025:15556-1 | tkimg-2.1.0-1.1 on GA media | 2025-09-16T00:00:00Z | 2025-09-16T00:00:00Z |
| opensuse-su-2025:15555-1 | firefox-esr-140.3.0-1.1 on GA media | 2025-09-16T00:00:00Z | 2025-09-16T00:00:00Z |
| opensuse-su-2025:15554-1 | watchexec-2.3.2-2.1 on GA media | 2025-09-15T00:00:00Z | 2025-09-15T00:00:00Z |
| opensuse-su-2025:15553-1 | kernel-devel-6.16.7-1.1 on GA media | 2025-09-14T00:00:00Z | 2025-09-14T00:00:00Z |
| opensuse-su-2025:15552-1 | cargo-packaging-1.3.0+0-2.1 on GA media | 2025-09-14T00:00:00Z | 2025-09-14T00:00:00Z |
| opensuse-su-2025:15551-1 | cargo-c-0.10.3~git0.ee7d7ef-4.1 on GA media | 2025-09-14T00:00:00Z | 2025-09-14T00:00:00Z |
| opensuse-su-2025:15550-1 | cargo-audit-0.21.2~git0.18e58c2-2.1 on GA media | 2025-09-14T00:00:00Z | 2025-09-14T00:00:00Z |
| opensuse-su-2025:15549-1 | liblog4cxx-devel-1.5.0-1.1 on GA media | 2025-09-12T00:00:00Z | 2025-09-12T00:00:00Z |
| opensuse-su-2025:15548-1 | chromedriver-140.0.7339.127-1.1 on GA media | 2025-09-12T00:00:00Z | 2025-09-12T00:00:00Z |
| opensuse-su-2025:15547-1 | xen-4.20.1_04-1.1 on GA media | 2025-09-11T00:00:00Z | 2025-09-11T00:00:00Z |
| opensuse-su-2025:15546-1 | orthanc-gdcm-1.7-1.1 on GA media | 2025-09-11T00:00:00Z | 2025-09-11T00:00:00Z |
| opensuse-su-2025:15545-1 | libssh-config-0.11.3-1.1 on GA media | 2025-09-11T00:00:00Z | 2025-09-11T00:00:00Z |
| opensuse-su-2025:15544-1 | kernel-devel-6.16.6-1.1 on GA media | 2025-09-11T00:00:00Z | 2025-09-11T00:00:00Z |
| opensuse-su-2025:15543-1 | ImageMagick-7.1.2.3-1.1 on GA media | 2025-09-11T00:00:00Z | 2025-09-11T00:00:00Z |
| opensuse-su-2025:15542-1 | trivy-0.66.0-1.1 on GA media | 2025-09-10T00:00:00Z | 2025-09-10T00:00:00Z |
| opensuse-su-2025:15541-1 | libtiff-devel-32bit-4.7.0-9.1 on GA media | 2025-09-10T00:00:00Z | 2025-09-10T00:00:00Z |
| opensuse-su-2025:15540-1 | rustup-1.28.2~0-2.1 on GA media | 2025-09-10T00:00:00Z | 2025-09-10T00:00:00Z |
| opensuse-su-2025:15539-1 | python311-xmltodict-0.15.1-1.1 on GA media | 2025-09-10T00:00:00Z | 2025-09-10T00:00:00Z |
| opensuse-su-2025:15538-1 | govulncheck-vulndb-0.0.20250908T141310-1.1 on GA media | 2025-09-10T00:00:00Z | 2025-09-10T00:00:00Z |
| opensuse-su-2025:15537-1 | warewulf4-4.6.4-1.1 on GA media | 2025-09-09T00:00:00Z | 2025-09-09T00:00:00Z |
| opensuse-su-2025:15536-1 | python311-deepdiff-8.6.1-1.1 on GA media | 2025-09-09T00:00:00Z | 2025-09-09T00:00:00Z |
| opensuse-su-2025:15535-1 | perl-JSON-XS-4.40.0-1.1 on GA media | 2025-09-09T00:00:00Z | 2025-09-09T00:00:00Z |
| opensuse-su-2025:15534-1 | perl-Cpanel-JSON-XS-4.400.0-1.1 on GA media | 2025-09-09T00:00:00Z | 2025-09-09T00:00:00Z |
| opensuse-su-2025:15533-1 | kernel-devel-6.16.5-1.1 on GA media | 2025-09-08T00:00:00Z | 2025-09-08T00:00:00Z |
| opensuse-su-2025:15532-1 | java-1_8_0-openjdk-1.8.0.462-1.1 on GA media | 2025-09-08T00:00:00Z | 2025-09-08T00:00:00Z |
| opensuse-su-2025:15531-1 | libQt5Pdf5-5.15.19-1.1 on GA media | 2025-09-06T00:00:00Z | 2025-09-06T00:00:00Z |
| opensuse-su-2025:15530-1 | trivy-0.65.0-2.1 on GA media | 2025-09-05T00:00:00Z | 2025-09-05T00:00:00Z |
| opensuse-su-2025:15529-1 | traefik-3.5.1-1.1 on GA media | 2025-09-05T00:00:00Z | 2025-09-05T00:00:00Z |
| opensuse-su-2025:15528-1 | python311-Django4-4.2.24-1.1 on GA media | 2025-09-05T00:00:00Z | 2025-09-05T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2024-330 | UNKNOWN READ in std::__1::__POW10_SPLIT_2 | 2024-04-30T00:00:31.577722Z | 2024-05-27T14:01:02.168724Z |
| osv-2024-504 | Heap-buffer-overflow in ultrahdr::getYuv420Pixel | 2024-05-25T00:01:08.542552Z | 2024-05-25T00:01:08.543179Z |
| osv-2024-503 | Heap-buffer-overflow in pdf_save_viewer_state | 2024-05-24T00:02:37.047119Z | 2024-05-24T00:02:37.047771Z |
| osv-2024-496 | UNKNOWN READ in chunk_free_object | 2024-05-22T00:06:41.510071Z | 2024-05-22T00:06:41.510555Z |
| osv-2024-495 | UNKNOWN READ in chunk_free_object | 2024-05-22T00:04:27.058012Z | 2024-05-22T00:04:27.058432Z |
| osv-2024-493 | UNKNOWN READ in chunk_free_object | 2024-05-22T00:00:49.459478Z | 2024-05-22T00:00:49.459808Z |
| osv-2024-490 | Security exception in com.github.javaparser.CommentsInserter.insertComments | 2024-05-20T00:07:13.417197Z | 2024-05-20T00:07:13.417898Z |
| osv-2024-477 | Heap-buffer-overflow in ultrahdr::gain_map_metadata::decodeGainmapMetadata | 2024-05-16T00:07:25.350135Z | 2024-05-16T00:07:25.350518Z |
| osv-2024-476 | Heap-buffer-overflow in ultrahdr::getYuv420Pixel | 2024-05-16T00:01:52.617825Z | 2024-05-16T00:01:52.618175Z |
| osv-2024-471 | Use-of-uninitialized-value in vpx_codec_peek_stream_info | 2024-05-15T00:02:46.464995Z | 2024-05-15T00:02:46.465573Z |
| osv-2024-469 | Heap-buffer-overflow in check_content_type_and_change_protocol | 2024-05-13T00:06:08.552810Z | 2024-05-13T00:06:08.553286Z |
| osv-2024-402 | Stack-buffer-overflow in SwiftProtobuf.TextFormatScanner. | 2024-05-03T00:00:37.545228Z | 2024-05-10T00:00:37.545806Z |
| osv-2024-432 | Use-of-uninitialized-value in ssl_ctx_make_profiles | 2024-05-05T00:15:04.589857Z | 2024-05-08T03:26:30Z |
| osv-2024-430 | Use-of-uninitialized-value in ssl_str_to_group_ids | 2024-05-05T00:14:35.047133Z | 2024-05-08T03:26:30Z |
| osv-2024-417 | Use-of-uninitialized-value in bssl::ssl_cipher_process_rulestr | 2024-05-05T00:05:37.413119Z | 2024-05-08T03:26:30Z |
| osv-2023-41 | Heap-use-after-free in sk_num | 2023-02-02T13:00:19.898084Z | 2024-05-08T03:26:30.000000Z |
| osv-2018-206 | Heap-buffer-overflow in parse_sigalgs_list | 2021-01-13T00:01:24.412685Z | 2024-05-08T03:26:30.000000Z |
| osv-2018-13 | Use-of-uninitialized-value in bn_sub_words | 2021-01-13T00:00:05.629092Z | 2024-05-08T03:26:30.000000Z |
| osv-2024-453 | Use-of-uninitialized-value in encode_base64_differential | 2024-05-08T00:15:55.868630Z | 2024-05-08T00:15:55.868890Z |
| osv-2024-450 | Use-of-uninitialized-value in ink_filepath_merge | 2024-05-08T00:13:15.436703Z | 2024-05-08T00:13:15.437003Z |
| osv-2024-449 | Use-of-uninitialized-value in YAML::Stream::Stream | 2024-05-08T00:10:19.320498Z | 2024-05-08T00:10:19.320806Z |
| osv-2024-434 | Use-of-uninitialized-value in validate_bluetooth_device_address | 2024-05-05T00:16:24.885047Z | 2024-05-05T00:16:24.885336Z |
| osv-2024-431 | Use-of-uninitialized-value in Lexer::ReadToken | 2024-05-05T00:14:47.078358Z | 2024-05-05T00:14:47.078742Z |
| osv-2024-423 | Use-of-uninitialized-value in Lexer::Error | 2024-05-05T00:12:07.769152Z | 2024-05-05T00:12:07.769622Z |
| osv-2024-422 | Use-of-uninitialized-value in cdc_task | 2024-05-05T00:07:53.114978Z | 2024-05-05T00:07:53.115405Z |
| osv-2024-420 | Use-of-uninitialized-value in Lexer::Error | 2024-05-05T00:06:56.111677Z | 2024-05-05T00:06:56.112011Z |
| osv-2024-409 | Use-of-uninitialized-value in Lexer::ReadToken | 2024-05-05T00:02:40.009382Z | 2024-05-05T00:02:40.009837Z |
| osv-2024-404 | Use-of-uninitialized-value in avifSequenceHeaderParse | 2024-05-04T00:03:34.449449Z | 2024-05-04T00:03:34.449922Z |
| osv-2024-403 | UNKNOWN READ in mem_planar_put_image_slow | 2024-05-04T00:02:34.636950Z | 2024-05-04T00:02:34.637538Z |
| osv-2024-294 | Segv on unknown address in gx_device_forward_finalize | 2024-04-24T00:03:38.661938Z | 2024-05-02T14:25:23.611452Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2020-0050 | VecCopy allows misaligned access to elements | 2020-09-27T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0049 | Use-after-free in Framed due to lack of pinning | 2020-01-30T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0048 | Use-after-free in BodyStream due to lack of pinning | 2020-01-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0047 | array_queue pop_back() may cause a use-after-free | 2020-09-26T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0046 | bespoke Cell implementation allows obtaining several mutable references to the same data | 2020-01-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0045 | bespoke Cell implementation allows obtaining several mutable references to the same data | 2020-01-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0044 | Unsafe Send implementation in Atom allows data races | 2020-09-21T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0043 | Insufficient size checks in outgoing buffer in ws allows remote attacker to run the process out of memory | 2020-09-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0042 | Missing check in ArrayVec leads to out-of-bounds write. | 2020-09-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0041 | Multiple soundness issues in Chunk and InlineArray | 2020-09-06T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0040 | Obstack generates unaligned references | 2020-09-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0039 | `index()` allows out-of-bound read and `remove()` has off-by-one error | 2020-09-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0038 | Memory safety issues in `compact::Vec` | 2020-09-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0037 | Misbehaving `HandleLike` implementation can lead to memory safety violation | 2020-08-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0035 | Chunk API does not respect align requirement | 2020-08-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0034 | Multiple security issues including data race, buffer overflow, and uninitialized memory drop | 2020-08-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0033 | Matrix::new() drops uninitialized memory | 2020-08-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0032 | StrcCtx deallocates a memory region that it doesn't own | 2020-08-20T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0031 | HTTP Request smuggling through malformed Transfer Encoding headers | 2020-06-16T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0030 | Missing sanitization in mozwire allows local file overwrite of files ending in .conf | 2020-08-18T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0029 | Allows viewing and modifying arbitrary structs as bytes | 2020-06-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0028 | `LocalRequest::clone` creates multiple mutable references to the same object | 2020-05-27T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0027 | traitobject assumes the layout of fat pointers | 2020-06-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0026 | linked-hash-map creates uninitialized NonNull pointer | 2020-06-23T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0025 | bigint is unmaintained, use uint instead | 2020-05-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0023 | Lifetime boundary for `raw_slice` and `raw_slice_mut` are incorrect | 2020-02-11T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0022 | Ozone contains several memory safety issues | 2020-07-04T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0021 | rio allows a use-after-free buffer access when a future is leaked | 2020-05-11T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0019 | tokio-rustls reads may cause excessive memory usage | 2020-05-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0017 | Use after free in ArcIntern::drop | 2020-05-28T12:00:00Z | 2023-06-13T13:10:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-golang-2023-45288 | HTTP/2 CONTINUATION flood in net/http | 2024-04-06T18:19:39.789Z | 2025-11-06T13:25:46.476Z |
| bit-gitlab-2025-6601 | Business Logic Errors in GitLab | 2025-10-28T12:05:34.442Z | 2025-11-06T13:25:46.476Z |
| bit-gitlab-2025-25293 | ruby-saml vulnerable to Remote Denial of Service (DoS) with compressed SAML responses | 2025-04-14T11:55:21.293Z | 2025-11-06T13:25:46.476Z |
| bit-gitlab-2025-25292 | Ruby SAML vulnerable to SAML authentication bypass due to namespace handling (parser differential) | 2025-04-14T11:55:19.936Z | 2025-11-06T13:25:46.476Z |
| bit-gitlab-2025-25291 | ruby-saml vulnerable to SAML authentication bypass due to DOCTYPE handling (parser differential) | 2025-04-14T11:55:18.579Z | 2025-11-06T13:25:46.476Z |
| bit-gitlab-2025-11989 | Missing Authorization in GitLab | 2025-10-28T12:03:56.032Z | 2025-11-06T13:25:46.476Z |
| bit-gitlab-2025-11971 | Incorrect Authorization in GitLab | 2025-10-28T12:03:50.762Z | 2025-11-06T13:25:46.476Z |
| bit-gitlab-2025-11702 | Missing Authorization in GitLab | 2025-11-06T13:22:05.051Z | 2025-11-06T13:25:46.476Z |
| bit-git-2025-48386 | Git allows a buffer overflow in 'wincred' credential helper | 2025-07-10T05:40:43.979Z | 2025-11-06T13:25:46.476Z |
| bit-git-2025-48385 | Git alllows arbitrary file writes via bundle-uri parameter injection | 2025-07-10T05:40:40.066Z | 2025-11-06T13:25:46.476Z |
| bit-git-2025-48384 | Git allows arbitrary code execution through broken config quoting | 2025-07-10T05:40:36.268Z | 2025-11-06T13:25:46.476Z |
| bit-git-2024-52006 | Newline confusion in credential helpers can lead to credential exfiltration in git | 2025-04-14T11:03:27.651Z | 2025-11-06T13:25:46.476Z |
| bit-git-2024-50349 | Git does not sanitize URLs when asking for credentials interactively | 2025-04-14T11:03:09.254Z | 2025-11-06T13:25:46.476Z |
| bit-git-2024-32002 | Git's recursive clones on case-insensitive filesystems that support symlinks are susceptible to Remote Code Execution | 2024-05-24T07:19:17.151Z | 2025-11-06T13:25:46.476Z |
| bit-ghost-2022-47197 | 2024-03-06T10:52:52.881Z | 2025-11-06T13:25:46.476Z | |
| bit-ghost-2022-47196 | 2024-03-06T10:53:02.275Z | 2025-11-06T13:25:46.476Z | |
| bit-ghost-2022-47195 | 2024-03-06T10:53:13.671Z | 2025-11-06T13:25:46.476Z | |
| bit-ghost-2022-47194 | 2024-03-06T10:53:22.782Z | 2025-11-06T13:25:46.476Z | |
| bit-envoy-2025-62504 | Envoy Lua filter use-after-free when oversized rewritten response body causes crash | 2025-10-21T08:41:18.087Z | 2025-11-06T13:25:46.476Z |
| bit-envoy-2024-30255 | HTTP/2: CPU exhaustion due to CONTINUATION frame flood | 2024-04-06T18:17:53.965Z | 2025-11-06T13:25:46.476Z |
| bit-envoy-2024-27919 | HTTP/2: memory exhaustion due to CONTINUATION frame flood | 2024-04-06T18:18:06.284Z | 2025-11-06T13:25:46.476Z |
| bit-elk-2025-25018 | Kibana Stored Cross-Site Scripting (XSS) | 2025-10-14T08:39:59.187Z | 2025-11-06T13:25:46.476Z |
| bit-elk-2025-25017 | Kibana Stored Cross-Site Scripting (XSS) | 2025-10-14T08:39:57.577Z | 2025-11-06T13:25:46.476Z |
| bit-elk-2025-25009 | Kibana Cross-Site Scripting (XSS) | 2025-10-09T08:39:52.493Z | 2025-11-06T13:25:46.476Z |
| bit-drupal-2021-41184 | XSS in the `of` option of the `.position()` util | 2024-03-06T10:54:31.396Z | 2025-11-06T13:25:46.476Z |
| bit-django-2025-59682 | 2025-10-23T08:40:14.229Z | 2025-11-06T13:25:46.476Z | |
| bit-django-2025-59681 | 2025-10-08T08:40:24.312Z | 2025-11-06T13:25:46.476Z | |
| bit-django-2025-57833 | 2025-09-25T08:40:38.586Z | 2025-11-06T13:25:46.476Z | |
| bit-django-2024-42005 | 2024-08-08T07:17:01.495Z | 2025-11-06T13:25:46.476Z | |
| bit-django-2024-41991 | 2024-08-08T07:17:15.604Z | 2025-11-06T13:25:46.476Z |
| ID | Description | Updated |
|---|---|---|
| var-201912-0637 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:58:55.141000Z |
| var-201504-0247 | The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combin… | 2024-07-23T20:58:53.769000Z |
| var-201302-0142 | Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.… | 2024-07-23T20:58:53.947000Z |
| var-202205-1291 | A use after free issue was addressed with improved memory management. This issue is fixed… | 2024-07-23T20:58:14.944000Z |
| var-202201-0498 | nextScaffoldPart in xmlparse.c in Expat (aka libexpat) before 2.4.3 has an integer overfl… | 2024-07-23T20:58:14.690000Z |
| var-201412-0612 | The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 continues to execute afte… | 2024-07-23T20:58:12.108000Z |
| var-201904-1398 | A use after free issue was addressed with improved memory management. This issue affected… | 2024-07-23T20:58:11.954000Z |
| var-201908-0422 | Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denia… | 2024-07-23T20:58:10.670000Z |
| var-201405-0243 | The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does n… | 2024-07-23T20:58:10.245000Z |
| var-200512-0293 | Heap-based buffer overflow in LibSystem in Mac OS X 10.4 through 10.4.5 allows context-de… | 2024-07-23T20:58:10.141000Z |
| var-201108-0080 | Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and … | 2024-07-23T20:57:37.509000Z |
| var-202206-1900 | curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverrespon… | 2024-07-23T20:57:34.431000Z |
| var-201904-1406 | A use after free issue was addressed with improved memory management. This issue affected… | 2024-07-23T20:57:19.701000Z |
| var-202010-1523 | An out-of-bounds write issue was addressed with improved bounds checking. This issue is f… | 2024-07-23T20:57:18.265000Z |
| var-200901-0756 | The JavaScript garbage collector in WebKit in Apple Safari before 4.0, iPhone OS 1.0 thro… | 2024-07-23T20:57:17.769000Z |
| var-201806-1467 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS bef… | 2024-07-23T20:57:06.890000Z |
| var-201908-0261 | Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leadin… | 2024-07-23T20:56:58.444000Z |
| var-201912-1844 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:56:57.656000Z |
| var-202205-1990 | Buffer Over-read in GitHub repository vim/vim prior to 8.2. Vim is a cross-platform text … | 2024-07-23T20:56:27.098000Z |
| var-201103-0294 | Integer overflow in WebKit, as used on the Research In Motion (RIM) BlackBerry Torch 9800… | 2024-07-23T20:56:26.520000Z |
| var-202206-1106 | Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an… | 2024-07-23T20:56:25.918000Z |
| var-201001-0692 | The print_fatal_signal function in kernel/signal.c in the Linux kernel before 2.6.32.4 on… | 2024-07-23T20:55:47.319000Z |
| var-200602-0446 | The "Open 'safe' files after downloading" option in Safari on Apple Mac OS X allows remot… | 2024-07-23T20:55:47.190000Z |
| var-202105-1325 | In ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16, ISC DHCP 4.4.0 -> 4.4.2 (Other branches of ISC DHC… | 2024-07-23T20:55:14.082000Z |
| var-201903-0420 | A logic issue was addressed with improved validation. This issue is fixed in iOS 12.1.3, … | 2024-07-23T20:55:14.940000Z |
| var-202002-1182 | A logic issue was addressed with improved state management. This issue is fixed in iOS 13… | 2024-07-23T20:55:13.517000Z |
| var-201711-0479 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T20:55:13.287000Z |
| var-201303-0172 | sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physical… | 2024-07-23T20:55:11.903000Z |
| var-201912-0510 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:55:07.586000Z |
| var-201705-3788 | In Open vSwitch (OvS) 2.7.0, while parsing an OpenFlow role status message, there is a ca… | 2024-07-23T20:54:28.045000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2024-001002 | Multiple TP-Link products vulnerable to OS command injection | 2024-01-10T13:57+09:00 | 2024-03-14T13:52+09:00 |
| jvndb-2024-000001 | Improper input validation vulnerability in WordPress Plugin "WordPress Quiz Maker Plugin" | 2024-01-12T13:51+09:00 | 2024-03-14T12:28+09:00 |
| jvndb-2023-003757 | Trend Micro Mobile Security vulnerable to cross-site scripting | 2023-09-26T11:30+09:00 | 2024-03-13T18:07+09:00 |
| jvndb-2023-002796 | Multiple server-side request forgery vulnerabilities in Trend Micro Apex Central (July 2023) | 2023-08-10T16:04+09:00 | 2024-03-13T17:58+09:00 |
| jvndb-2024-000011 | Multiple vulnerabilities in a-blog cms | 2024-01-22T15:08+09:00 | 2024-03-13T17:50+09:00 |
| jvndb-2024-000009 | Improper restriction of XML external entity references (XXE) in Electronic Deliverables Creation Support Tool provided by Ministry of Defense | 2024-01-23T15:13+09:00 | 2024-03-13T17:46+09:00 |
| jvndb-2024-000008 | Improper restriction of XML external entity references (XXE) in MLIT "Electronic Delivery Check System" and "Electronic delivery item Inspection Support System" | 2024-01-23T16:57+09:00 | 2024-03-13T17:40+09:00 |
| jvndb-2024-000012 | Access analysis CGI An-Analyzer vulnerable to open redirect | 2024-01-22T15:57+09:00 | 2024-03-13T17:34+09:00 |
| jvndb-2023-006199 | Multiple security updates for Trend Micro Apex One and Apex One as a Service (November 2023) | 2023-11-13T17:28+09:00 | 2024-03-13T17:28+09:00 |
| jvndb-2024-001062 | Yamaha wireless LAN access point devices vulnerable to active debug code | 2024-01-24T17:16+09:00 | 2024-03-13T17:24+09:00 |
| jvndb-2024-002961 | Information Exposure Vulnerability in Cosminexus Component Container | 2024-03-13T12:10+09:00 | 2024-03-13T12:10+09:00 |
| jvndb-2024-000004 | Drupal vulnerable to improper handling of structural elements | 2024-01-16T13:41+09:00 | 2024-03-12T17:33+09:00 |
| jvndb-2024-000006 | FusionPBX vulnerable to cross-site scripting | 2024-01-19T12:30+09:00 | 2024-03-12T17:31+09:00 |
| jvndb-2024-000002 | Thermal camera TMC series vulnerable to insufficient technical documentation | 2024-01-15T15:19+09:00 | 2024-03-11T18:17+09:00 |
| jvndb-2024-000016 | Group Office vulnerable to cross-site scripting | 2024-02-01T13:48+09:00 | 2024-03-11T18:04+09:00 |
| jvndb-2024-001785 | Incorrect permission assignment vulnerability in Trend Micro uiAirSupport | 2024-02-06T14:46+09:00 | 2024-03-11T17:42+09:00 |
| jvndb-2024-000015 | Payment EX vulnerable to information disclosure | 2024-02-01T13:41+09:00 | 2024-03-11T17:42+09:00 |
| jvndb-2024-001160 | File and Directory Permissions Vulnerability in Hitachi Storage Plug-in for VMware vCenter | 2024-01-31T15:25+09:00 | 2024-03-11T17:41+09:00 |
| jvndb-2024-001804 | Multiple buffer overflow vulnerabilities in HOME SPOT CUBE2 | 2024-02-06T15:02+09:00 | 2024-03-11T17:32+09:00 |
| jvndb-2024-002050 | Multiple out-of-bounds write vulnerabilities in Canon Office/Small Office Multifunction Printers and Laser Printers | 2024-02-07T15:39+09:00 | 2024-03-08T18:05+09:00 |
| jvndb-2024-000030 | a-blog cms vulnerable to directory traversal | 2024-03-08T15:27+09:00 | 2024-03-08T15:27+09:00 |
| jvndb-2024-002942 | OMRON NJ/NX series vulnerable to path traversal | 2024-03-08T14:16+09:00 | 2024-03-08T14:16+09:00 |
| jvndb-2024-000027 | FUJIFILM Business Innovation Corp. printers vulnerable to cross-site request forgery | 2024-03-06T18:24+09:00 | 2024-03-06T18:24+09:00 |
| jvndb-2024-000026 | Multiple vulnerabilities in printers and scanners which implement BROTHER Web Based Management | 2024-03-06T18:12+09:00 | 2024-03-06T18:12+09:00 |
| jvndb-2024-000029 | Toyoko Inn official App vulnerable to improper server certificate verification | 2024-03-06T13:53+09:00 | 2024-03-06T13:53+09:00 |
| jvndb-2024-000005 | "Mercari" App for Android fails to restrict custom URL schemes properly | 2024-01-24T13:46+09:00 | 2024-03-04T18:01+09:00 |
| jvndb-2024-000025 | Protection mechanism failure in RevoWorks | 2024-02-29T15:40+09:00 | 2024-02-29T15:40+09:00 |
| jvndb-2024-000024 | OET-213H-BTS1 missing authorization check in the initial configuration | 2024-02-29T14:59+09:00 | 2024-02-29T14:59+09:00 |
| jvndb-2024-000023 | OpenPNE plugin "opTimelinePlugin" vulnerable to cross-site scripting | 2024-02-29T13:12+09:00 | 2024-02-29T13:12+09:00 |
| jvndb-2024-000022 | Multiple vulnerabilities in baserCMS | 2024-02-27T14:25+09:00 | 2024-02-27T14:25+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:4233-1 | Security update for the Linux Kernel (Live Patch 41 for SUSE Linux Enterprise 15 SP4) | 2025-11-25T14:33:49Z | 2025-11-25T14:33:49Z |
| suse-su-2025:4232-1 | Security update for sssd | 2025-11-25T14:12:20Z | 2025-11-25T14:12:20Z |
| suse-su-2025:4231-1 | Security update for sssd | 2025-11-25T14:12:12Z | 2025-11-25T14:12:12Z |
| suse-su-2025:4230-1 | Security update for the Linux Kernel (Live Patch 37 for SUSE Linux Enterprise 15 SP4) | 2025-11-25T13:34:27Z | 2025-11-25T13:34:27Z |
| suse-su-2025:21140-1 | Security update for lasso | 2025-11-25T13:27:30Z | 2025-11-25T13:27:30Z |
| suse-su-2025:4229-1 | Security update for buildah | 2025-11-25T12:46:16Z | 2025-11-25T12:46:16Z |
| suse-su-2025:4227-1 | Security update for the Linux Kernel (Live Patch 36 for SUSE Linux Enterprise 15 SP4) | 2025-11-25T11:33:58Z | 2025-11-25T11:33:58Z |
| suse-su-2025:4224-1 | Security update for grub2 | 2025-11-25T09:53:55Z | 2025-11-25T09:53:55Z |
| suse-su-2025:4222-1 | Security update for bind | 2025-11-25T08:53:57Z | 2025-11-25T08:53:57Z |
| suse-su-2025:4221-1 | Security update for python39 | 2025-11-25T08:02:49Z | 2025-11-25T08:02:49Z |
| suse-su-2025:21139-1 | Security update for the Linux Kernel | 2025-11-25T07:34:57Z | 2025-11-25T07:34:57Z |
| suse-su-2025:21074-1 | Security update for the Linux Kernel | 2025-11-25T07:34:57Z | 2025-11-25T07:34:57Z |
| suse-su-2025:21179-1 | Security update for the Linux Kernel | 2025-11-25T07:34:55Z | 2025-11-25T07:34:55Z |
| suse-su-2025:4215-1 | Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP4) | 2025-11-24T17:43:06Z | 2025-11-24T17:43:06Z |
| suse-su-2025:4213-1 | Security update for the Linux Kernel (Live Patch 59 for SUSE Linux Enterprise 15 SP3) | 2025-11-24T17:42:25Z | 2025-11-24T17:42:25Z |
| suse-su-2025:4208-1 | Security update for the Linux Kernel RT (Live Patch 2 for SUSE Linux Enterprise 15 SP7) | 2025-11-24T17:42:02Z | 2025-11-24T17:42:02Z |
| suse-su-2025:4203-1 | Security update for the Linux Kernel (Live Patch 50 for SUSE Linux Enterprise 15 SP3) | 2025-11-24T17:39:50Z | 2025-11-24T17:39:50Z |
| suse-su-2025:4201-1 | Security update for the Linux Kernel RT (Live Patch 13 for SUSE Linux Enterprise 15 SP6) | 2025-11-24T14:04:15Z | 2025-11-24T14:04:15Z |
| suse-su-2025:4200-1 | Security update for the Linux Kernel RT (Live Patch 10 for SUSE Linux Enterprise 15 SP6) | 2025-11-24T14:04:08Z | 2025-11-24T14:04:08Z |
| suse-su-2025:4199-1 | Security update for the Linux Kernel (Live Patch 33 for SUSE Linux Enterprise 15 SP4) | 2025-11-24T12:33:54Z | 2025-11-24T12:33:54Z |
| suse-su-2025:4198-1 | Security update for cups-filters | 2025-11-24T11:59:54Z | 2025-11-24T11:59:54Z |
| suse-su-2025:4197-1 | Security update for grub2 | 2025-11-24T11:04:06Z | 2025-11-24T11:04:06Z |
| suse-su-2025:4196-1 | Security update for grub2 | 2025-11-24T10:54:24Z | 2025-11-24T10:54:24Z |
| suse-su-2025:4195-1 | Security update for MozillaThunderbird | 2025-11-24T10:53:51Z | 2025-11-24T10:53:51Z |
| suse-su-2025:4194-1 | Security update for the Linux Kernel (Live Patch 62 for SUSE Linux Enterprise 12 SP5) | 2025-11-24T10:04:23Z | 2025-11-24T10:04:23Z |
| suse-su-2025:4191-1 | Security update for amazon-ssm-agent | 2025-11-24T09:22:22Z | 2025-11-24T09:22:22Z |
| suse-su-2025:4190-1 | Security update for helm | 2025-11-24T09:19:46Z | 2025-11-24T09:19:46Z |
| suse-su-2025:4189-1 | Security update for the Linux Kernel | 2025-11-24T09:18:05Z | 2025-11-24T09:18:05Z |
| suse-su-2025:4188-1 | Security update for the Linux Kernel | 2025-11-24T09:17:05Z | 2025-11-24T09:17:05Z |
| suse-su-2025:4092-1 | Security update for elfutils | 2025-11-24T09:08:35Z | 2025-11-24T09:08:35Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-02654 | Online Class and Exam Scheduling System class_update.php文件SQL注入漏洞 | 2024-12-13 | 2026-01-07 |
| cnvd-2026-02653 | Online Class and Exam Scheduling System teacher_save.php文件SQL注入漏洞 | 2024-12-18 | 2026-01-07 |
| cnvd-2026-02652 | Online Class and Exam Scheduling System room_update.php文件SQL注入漏洞 | 2024-12-18 | 2026-01-07 |
| cnvd-2026-02651 | Online Class and Exam Scheduling System term.php文件SQL注入漏洞 | 2024-12-20 | 2026-01-07 |
| cnvd-2026-02650 | Online Class and Exam Scheduling System subject_update.php文件SQL注入漏洞 | 2024-12-20 | 2026-01-07 |
| cnvd-2026-02649 | Online Class and Exam Scheduling System rank_update.php文件SQL注入漏洞 | 2024-12-20 | 2026-01-07 |
| cnvd-2026-02648 | Online Class and Exam Scheduling System department.php文件SQL注入漏洞 | 2024-12-20 | 2026-01-07 |
| cnvd-2026-00821 | UTT 进取 512W缓冲区溢出漏洞 | 2025-12-29 | 2026-01-07 |
| cnvd-2026-00715 | Online Class and Exam Scheduling System profile.php文件跨站脚本漏洞 | 2025-03-13 | 2026-01-07 |
| cnvd-2026-00714 | Online Class and Exam Scheduling System salut_del.php文件SQL注入漏洞 | 2025-03-19 | 2026-01-07 |
| cnvd-2026-00713 | Online Class and Exam Scheduling System room.php文件跨站脚本漏洞 | 2025-03-19 | 2026-01-07 |
| cnvd-2026-00712 | Online Class and Exam Scheduling System program.php文件跨站脚本漏洞 | 2025-03-19 | 2026-01-07 |
| cnvd-2026-00711 | Online Class and Exam Scheduling System profile.php文件跨站脚本漏洞 | 2025-03-19 | 2026-01-07 |
| cnvd-2026-00710 | Online Class and Exam Scheduling System exam_save.php文件SQL注入漏洞 | 2025-03-19 | 2026-01-07 |
| cnvd-2026-00709 | Online Class and Exam Scheduling System department.php文件跨站脚本漏洞 | 2025-03-19 | 2026-01-07 |
| cnvd-2026-00708 | Online Class and Exam Scheduling System class.php文件跨站脚本漏洞 | 2025-03-19 | 2026-01-07 |
| cnvd-2026-00707 | Online Class and Exam Scheduling System activate.php文件SQL注入漏洞 | 2025-03-19 | 2026-01-07 |
| cnvd-2026-00706 | Online Class and Exam Scheduling System class_sched.php文件跨站脚本漏洞 | 2025-05-07 | 2026-01-07 |
| cnvd-2026-00705 | Online Class and Exam Scheduling System profile_update.php文件SQL注入漏洞 | 2025-05-07 | 2026-01-07 |
| cnvd-2026-00704 | Online Class and Exam Scheduling System class_save.php文件SQL注入漏洞 | 2025-05-07 | 2026-01-07 |
| cnvd-2026-00703 | Employee Record System getData.php文件SQL注入漏洞 | 2025-05-22 | 2026-01-07 |
| cnvd-2026-00702 | Employee Record System dashboardedit_employee.php文件跨站脚本漏洞 | 2025-05-22 | 2026-01-07 |
| cnvd-2026-00701 | Employee Record System current_employees.php文件跨站脚本漏洞 | 2025-05-22 | 2026-01-07 |
| cnvd-2026-00700 | Online Hotel Reservation System order.php文件SQL注入漏洞 | 2025-06-27 | 2026-01-07 |
| cnvd-2026-00699 | Online Hotel Reservation System messageexec.php文件SQL注入漏洞 | 2025-06-27 | 2026-01-07 |
| cnvd-2026-00698 | Online Hotel Reservation System execedituser.php文件SQL注入漏洞 | 2025-06-27 | 2026-01-07 |
| cnvd-2026-00697 | Online Hotel Reservation System demo.php文件SQL注入漏洞 | 2025-06-27 | 2026-01-07 |
| cnvd-2026-00696 | Simple Attendance Record System check.php文件SQL注入漏洞 | 2025-12-18 | 2026-01-07 |
| cnvd-2026-00695 | Computer Laboratory System admin_pic.php文件文件上传漏洞 | 2025-12-18 | 2026-01-07 |
| cnvd-2026-00694 | Computer Laboratory System文件上传漏洞 | 2025-12-25 | 2026-01-07 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0991 | Multiples vulnérabilités dans les produits Mozilla | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0990 | Vulnérabilité dans Google Chrome | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0989 | Vulnérabilité dans Nagios XI | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0988 | Vulnérabilité dans Ivanti Endpoint Manager (EPM) | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0987 | Vulnérabilité dans les produits Citrix | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0986 | Vulnérabilité dans Schneider Electric EcoStruxure | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0985 | Multiples vulnérabilités dans les produits Axis | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0984 | Vulnérabilité dans Bitdefender Endpoint Security Tools pour Mac | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0983 | Vulnérabilité dans Synology BeeStation | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0982 | Multiples vulnérabilités dans les produits SAP | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| CERTFR-2025-AVI-0998 | Multiples vulnérabilités dans les produits Microsoft | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| CERTFR-2025-AVI-0997 | Multiples vulnérabilités dans Microsoft Azure | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| CERTFR-2025-AVI-0996 | Multiples vulnérabilités dans Microsoft Windows | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| CERTFR-2025-AVI-0995 | Multiples vulnérabilités dans Microsoft Office | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| CERTFR-2025-AVI-0994 | Multiples vulnérabilités dans Microsoft Edge | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| CERTFR-2025-AVI-0993 | Multiples vulnérabilités dans les produits Intel | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| CERTFR-2025-AVI-0992 | Multiples vulnérabilités dans Apache OpenOffice | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| CERTFR-2025-AVI-0991 | Multiples vulnérabilités dans les produits Mozilla | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| CERTFR-2025-AVI-0990 | Vulnérabilité dans Google Chrome | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| CERTFR-2025-AVI-0989 | Vulnérabilité dans Nagios XI | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| CERTFR-2025-AVI-0988 | Vulnérabilité dans Ivanti Endpoint Manager (EPM) | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| CERTFR-2025-AVI-0987 | Vulnérabilité dans les produits Citrix | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| CERTFR-2025-AVI-0986 | Vulnérabilité dans Schneider Electric EcoStruxure | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| CERTFR-2025-AVI-0985 | Multiples vulnérabilités dans les produits Axis | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| CERTFR-2025-AVI-0984 | Vulnérabilité dans Bitdefender Endpoint Security Tools pour Mac | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| CERTFR-2025-AVI-0983 | Vulnérabilité dans Synology BeeStation | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| CERTFR-2025-AVI-0982 | Multiples vulnérabilités dans les produits SAP | 2025-11-12T00:00:00.000000 | 2025-11-12T00:00:00.000000 |
| certfr-2025-avi-0981 | Multiples vulnérabilités dans les produits Qnap | 2025-11-10T00:00:00.000000 | 2025-11-10T00:00:00.000000 |
| CERTFR-2025-AVI-0981 | Multiples vulnérabilités dans les produits Qnap | 2025-11-10T00:00:00.000000 | 2025-11-10T00:00:00.000000 |
| certfr-2025-avi-0980 | Multiples vulnérabilités dans les produits IBM | 2025-11-07T00:00:00.000000 | 2025-11-07T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2004-ale-010 | Vulnérabilité du service Telnet de Cisco IOS | 2004-08-30T00:00:00.000000 | 2004-08-30T00:00:00.000000 |
| CERTA-2004-ALE-010 | Vulnérabilité du service Telnet de Cisco IOS | 2004-08-30T00:00:00.000000 | 2004-08-30T00:00:00.000000 |
| certa-2004-ale-004 | Vulnérabilité du composant dtlogin de CDE | 2004-03-26T00:00:00.000000 | 2004-08-05T00:00:00.000000 |
| CERTA-2004-ALE-004 | Vulnérabilité du composant dtlogin de CDE | 2004-03-26T00:00:00.000000 | 2004-08-05T00:00:00.000000 |
| certa-2004-ale-009 | Vulnérabilités d'Internet Explorer | 2004-06-09T00:00:00.000000 | 2004-08-03T00:00:00.000000 |
| CERTA-2004-ALE-009 | Vulnérabilités d'Internet Explorer | 2004-06-09T00:00:00.000000 | 2004-08-03T00:00:00.000000 |
| certa-2004-ale-008 | Vulnérabilité de Safari | 2004-05-19T00:00:00.000000 | 2004-05-24T00:00:00.000000 |
| CERTA-2004-ALE-008 | Vulnérabilité de Safari | 2004-05-19T00:00:00.000000 | 2004-05-24T00:00:00.000000 |
| certa-2004-ale-007 | Exploitation de la vulnérabilité LSASS sous Windows : appration du ver Sasser | 2004-05-02T00:00:00.000000 | 2004-05-02T00:00:00.000000 |
| CERTA-2004-ALE-007 | Exploitation de la vulnérabilité LSASS sous Windows : appration du ver Sasser | 2004-05-02T00:00:00.000000 | 2004-05-02T00:00:00.000000 |
| certa-2004-ale-006 | Vulnérabilité SMB sous Windows | 2004-04-28T00:00:00.000000 | 2004-04-28T00:00:00.000000 |
| CERTA-2004-ALE-006 | Vulnérabilité SMB sous Windows | 2004-04-28T00:00:00.000000 | 2004-04-28T00:00:00.000000 |
| certa-2004-ale-005 | Vulnérabilité d'Internet Explorer | 2004-04-09T00:00:00.000000 | 2004-04-15T00:00:00.000000 |
| CERTA-2004-ALE-005 | Vulnérabilité d'Internet Explorer | 2004-04-09T00:00:00.000000 | 2004-04-15T00:00:00.000000 |
| certa-2004-ale-003 | Propagation du ver Phatbot | 2004-03-19T00:00:00.000000 | 2004-03-19T00:00:00.000000 |
| CERTA-2004-ALE-003 | Propagation du ver Phatbot | 2004-03-19T00:00:00.000000 | 2004-03-19T00:00:00.000000 |
| certa-2004-ale-002 | Propagation du virux Bizex | 2004-02-26T00:00:00.000000 | 2004-02-26T00:00:00.000000 |
| CERTA-2004-ALE-002 | Propagation du virux Bizex | 2004-02-26T00:00:00.000000 | 2004-02-26T00:00:00.000000 |
| certa-2003-ale-006 | Vulnérabilité dans l'affichage des adresses réticulaires | 2003-12-19T00:00:00.000000 | 2004-02-03T00:00:00.000000 |
| CERTA-2003-ALE-006 | Vulnérabilité dans l'affichage des adresses réticulaires | 2003-12-19T00:00:00.000000 | 2004-02-03T00:00:00.000000 |
| certa-2004-ale-001 | Obstacles à la résolution d'incidents | 2004-01-30T00:00:00.000000 | 2004-01-30T00:00:00.000000 |
| CERTA-2004-ALE-001 | Obstacles à la résolution d'incidents | 2004-01-30T00:00:00.000000 | 2004-01-30T00:00:00.000000 |
| certa-2003-ale-004 | Vulnérabilité d'Internet Explorer | 2003-09-10T00:00:00.000000 | 2003-10-06T00:00:00.000000 |
| CERTA-2003-ALE-004 | Vulnérabilité d'Internet Explorer | 2003-09-10T00:00:00.000000 | 2003-10-06T00:00:00.000000 |
| certa-2003-ale-005 | Vulnérabilité de sadmind sur Solaris | 2003-09-19T00:00:00.000000 | 2003-09-19T00:00:00.000000 |
| CERTA-2003-ALE-005 | Vulnérabilité de sadmind sur Solaris | 2003-09-19T00:00:00.000000 | 2003-09-19T00:00:00.000000 |
| certa-2003-ale-003 | Exploitation massive de la vulnérabilité « include PHP » | 2003-09-09T00:00:00.000000 | 2003-09-09T00:00:00.000000 |
| CERTA-2003-ALE-003 | Exploitation massive de la vulnérabilité « include PHP » | 2003-09-09T00:00:00.000000 | 2003-09-09T00:00:00.000000 |
| certa-2003-ale-002 | Exploitation d'une faille de Windows RPC | 2003-08-01T00:00:00.000000 | 2003-08-19T00:00:00.000000 |
| CERTA-2003-ALE-002 | Exploitation d'une faille de Windows RPC | 2003-08-01T00:00:00.000000 | 2003-08-19T00:00:00.000000 |