Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-23116 |
N/A
|
pmdomain: imx8m-blk-ctrl: Remove separate rst and clk … |
Linux |
Linux |
2026-02-14T15:09:48.511Z | 2026-02-14T15:09:48.511Z |
| CVE-2026-23115 |
N/A
|
serial: Fix not set tty->port race condition |
Linux |
Linux |
2026-02-14T15:09:47.826Z | 2026-02-14T15:09:47.826Z |
| CVE-2026-23114 |
N/A
|
arm64/fpsimd: ptrace: Fix SVE writes on !SME systems |
Linux |
Linux |
2026-02-14T15:09:47.048Z | 2026-02-14T15:09:47.048Z |
| CVE-2025-71200 |
N/A
|
mmc: sdhci-of-dwcmshc: Prevent illegal clock reduction… |
Linux |
Linux |
2026-02-14T15:09:45.689Z | 2026-02-14T15:09:45.689Z |
| CVE-2026-1915 |
6.4 (3.1)
|
Simple Plyr <= 0.0.1 - Authenticated (Contributor+) St… |
bestony |
Simple Plyr |
2026-02-14T06:42:36.109Z | 2026-02-14T06:42:36.109Z |
| CVE-2026-1985 |
6.4 (3.1)
|
Press3D <= 1.0.2 - Authenticated (Author+) Stored Cros… |
arieslab |
Press3D |
2026-02-14T06:42:35.710Z | 2026-02-14T06:42:35.710Z |
| CVE-2026-0753 |
7.2 (3.1)
|
Super Simple Contact Form <= 1.6.2 - Reflected Cross-S… |
bitacre |
Super Simple Contact Form |
2026-02-14T06:42:35.247Z | 2026-02-14T06:42:35.247Z |
| CVE-2026-1306 |
9.8 (3.1)
|
midi-Synth <= 1.1.0 - Unauthenticated Arbitrary File U… |
adminkov |
midi-Synth |
2026-02-14T06:42:34.875Z | 2026-02-14T06:42:34.875Z |
| CVE-2026-1944 |
5.3 (3.1)
|
CallbackKiller service widget <= 1.2 - Missing Authori… |
krellbat |
CallbackKiller service widget |
2026-02-14T06:42:30.529Z | 2026-02-14T06:42:30.529Z |
| CVE-2026-0557 |
6.4 (3.1)
|
WP Data Access <= 5.5.63 - Authenticated (Contributor+… |
peterschulznl |
WP Data Access – No-Code App Builder with Tables, Forms, Charts & Maps |
2026-02-14T06:42:30.165Z | 2026-02-14T06:42:30.165Z |
| CVE-2026-2024 |
7.5 (3.1)
|
PhotoStack Gallery <= 0.4.1 - Unauthenticated SQL Inje… |
savitasoni |
PhotoStack Gallery |
2026-02-14T06:42:29.782Z | 2026-02-14T06:42:29.782Z |
| CVE-2026-1939 |
6.4 (3.1)
|
Percent to Infograph <= 1.0 - Authenticated (Contribut… |
cutesalah |
Percent to Infograph |
2026-02-14T06:42:29.416Z | 2026-02-14T06:42:29.416Z |
| CVE-2026-0751 |
6.4 (3.1)
|
Payment Page | Payment Form for Stripe <= 1.4.6 - Auth… |
brandonfire |
Payment Page | Payment Form for Stripe |
2026-02-14T06:42:26.021Z | 2026-02-14T06:42:26.021Z |
| CVE-2026-0727 |
5.4 (3.1)
|
Accordion and Accordion Slider <= 1.4.5 - Missing Auth… |
essentialplugin |
Accordion and Accordion Slider |
2026-02-14T06:42:26.388Z | 2026-02-14T06:42:26.388Z |
| CVE-2025-6792 |
5.3 (3.1)
|
One to one user Chat by WPGuppy <= 1.1.4 - Unauthentic… |
amentotechpvtltd |
One to one user Chat by WPGuppy |
2026-02-14T06:42:25.584Z | 2026-02-14T06:42:25.584Z |
| CVE-2026-1796 |
6.1 (3.1)
|
StyleBidet <= 1.0.0 - Reflected Cross-Site Scripting |
indextwo |
StyleBidet |
2026-02-14T06:42:24.992Z | 2026-02-14T06:42:24.992Z |
| CVE-2026-1731 |
9.9 (4.0)
|
Remote code execution vulnerability in BeyondTrust Rem… |
BeyondTrust |
Remote Support(RS) & Privileged Remote Access(PRA) |
2026-02-06T21:49:20.844Z | 2026-02-14T05:20:23.748Z |
| CVE-2025-69634 |
9 (3.1)
|
Cross Site Request Forgery vulnerability in Dolib… |
n/a |
n/a |
2026-02-12T00:00:00.000Z | 2026-02-14T04:30:49.309Z |
| CVE-2026-26296 |
N/A
|
Not used | N/A | N/A | 2026-02-14T03:55:09.395Z | |
| CVE-2026-26295 |
N/A
|
Not used | N/A | N/A | 2026-02-14T03:55:09.951Z | |
| CVE-2026-26298 |
N/A
|
Not used | N/A | N/A | 2026-02-14T03:55:08.453Z | |
| CVE-2026-26297 |
N/A
|
Not used | N/A | N/A | 2026-02-14T03:55:08.914Z | |
| CVE-2026-26300 |
N/A
|
Not used | N/A | N/A | 2026-02-14T03:55:07.406Z | |
| CVE-2026-26299 |
N/A
|
Not used | N/A | N/A | 2026-02-14T03:55:07.938Z | |
| CVE-2026-26302 |
N/A
|
Not used | N/A | N/A | 2026-02-14T03:55:06.462Z | |
| CVE-2026-26301 |
N/A
|
Not used | N/A | N/A | 2026-02-14T03:55:06.945Z | |
| CVE-2026-26303 |
N/A
|
Not used | N/A | N/A | 2026-02-14T03:55:05.907Z | |
| CVE-2025-55338 |
6.1 (3.1)
|
Windows BitLocker Security Feature Bypass Vulnerability |
Microsoft |
Windows 10 Version 1507 |
2025-10-14T17:00:16.093Z | 2026-02-13T23:13:12.160Z |
| CVE-2025-59213 |
8.8 (3.1)
|
Configuration Manager Elevation of Privilege Vulnerability |
Microsoft |
Microsoft Configuration Manager |
2025-10-14T17:01:35.025Z | 2026-02-13T23:13:11.649Z |
| CVE-2025-60711 |
6.3 (3.1)
|
Microsoft Edge (Chromium-based) Remote Code Execution … |
Microsoft |
Microsoft Edge (Chromium-based) |
2025-10-31T19:29:01.444Z | 2026-02-13T23:13:10.983Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-1684 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Free5GC SMF PFCP UDP Endpoint pfcp_reports.go HandleRe… |
Free5GC |
SMF |
2026-01-30T14:32:07.043Z | 2026-01-30T14:59:58.236Z |
| CVE-2026-25506 |
7.7 (3.1)
|
MUNGE has a buffer overflow in message unpacking allow… |
dun |
munge |
2026-02-10T18:55:57.708Z | 2026-02-17T18:17:47.022Z |
| CVE-2026-20676 |
4.3 (3.1)
|
This issue was addressed through improved state m… |
Apple |
Safari |
2026-02-11T22:58:25.537Z | 2026-02-17T18:30:40.166Z |
| CVE-2026-1761 |
8.6 (3.1)
|
Libsoup: stack-based buffer overflow in libsoup multip… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-02-02T14:01:03.802Z | 2026-02-17T18:23:08.912Z |
| CVE-2026-1358 |
9.8 (3.1)
|
Airleader Master Unrestricted Upload of File with Dang… |
Airleader GmbH |
Airleader Master |
2026-02-12T21:24:53.070Z | 2026-02-17T18:03:38.837Z |
| CVE-2026-0719 |
8.6 (3.1)
|
Libsoup: signed to unsigned conversion error leading t… |
Red Hat |
Red Hat Enterprise Linux 10 |
2026-01-08T12:38:30.740Z | 2026-02-17T18:23:04.114Z |
| CVE-2025-63354 |
4.8 (3.1)
|
Hitron HI3120 v7.2.4.5.2b1 allows stored XSS via … |
n/a |
n/a |
2026-02-09T00:00:00.000Z | 2026-02-17T18:13:17.385Z |
| CVE-2025-21120 |
8.3 (3.1)
|
Dell Avamar, versions prior to 19.10 SP1 with pat… |
Dell |
Avamar Server |
2025-08-04T18:33:07.220Z | 2026-02-18T15:48:05.184Z |
| CVE-2026-1332 |
6.9 (4.0)
5.3 (3.1)
|
HAMASTAR Technology|MeetingHub - Missing Authentication |
HAMASTAR Technology |
MeetingHub |
2026-01-22T09:18:27.232Z | 2026-01-22T14:18:47.073Z |
| CVE-2026-1998 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
micropython runtime.c mp_import_all memory corruption |
n/a |
micropython |
2026-02-06T06:02:08.671Z | 2026-02-12T15:09:10.411Z |
| CVE-2024-23480 |
7.5 (3.1)
|
Insecure MacOS code sign check fallback |
Zscaler |
Client Connector |
2024-05-01T16:27:35.730Z | 2024-08-01T23:06:24.712Z |
| CVE-2026-2000 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
DCN DCME-320 Web Management Backend bridge_cfg.php app… |
DCN |
DCME-320 |
2026-02-06T06:32:05.840Z | 2026-02-12T15:08:14.859Z |
| CVE-2026-2008 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
abhiphile fermat-mcp eqn_chart.py eqn_chart code injection |
abhiphile |
fermat-mcp |
2026-02-06T07:02:07.279Z | 2026-02-12T15:06:58.507Z |
| CVE-2026-2010 |
2.3 (4.0)
4.2 (3.1)
4.2 (3.0)
|
Sanluan PublicCMS Trade Payment TradePaymentService.ja… |
Sanluan |
PublicCMS |
2026-02-06T08:02:09.018Z | 2026-02-12T15:05:45.408Z |
| CVE-2026-2016 |
4.8 (4.0)
5.3 (3.1)
5.3 (3.0)
|
happyfish100 libfastcommon base64.c base64_decode stac… |
happyfish100 |
libfastcommon |
2026-02-06T11:02:08.107Z | 2026-02-06T13:08:43.137Z |
| CVE-2026-2017 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
IP-COM W30AP POST Request wx3auth R7WebsSecurityHandle… |
IP-COM |
W30AP |
2026-02-06T11:32:12.618Z | 2026-02-06T13:03:11.589Z |
| CVE-2026-2054 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
D-Link DIR-605L/DIR-619L Wifi Setting information disclosure |
D-Link |
DIR-605L |
2026-02-06T12:32:08.823Z | 2026-02-06T16:41:52.170Z |
| CVE-2026-2055 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
D-Link DIR-605L/DIR-619L DHCP Client Information infor… |
D-Link |
DIR-605L |
2026-02-06T13:02:08.052Z | 2026-02-06T16:46:35.413Z |
| CVE-2026-2056 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
D-Link DIR-605L/DIR-619L DHCP Connection Status wan_co… |
D-Link |
DIR-605L |
2026-02-06T14:02:09.758Z | 2026-02-06T16:48:10.195Z |
| CVE-2026-2058 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
mathurvishal CloudClassroom-PHP-Project Post Query Det… |
mathurvishal |
CloudClassroom-PHP-Project |
2026-02-06T16:32:08.195Z | 2026-02-06T16:54:07.152Z |
| CVE-2026-2074 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
O2OA HTTP POST Request check xml external entity reference |
n/a |
O2OA |
2026-02-07T04:02:06.652Z | 2026-02-10T15:24:44.981Z |
| CVE-2026-2146 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
guchengwuyue yshopmall co.yixiang.utils.FileUtil updat… |
guchengwuyue |
yshopmall |
2026-02-08T09:32:07.064Z | 2026-02-10T21:19:22.192Z |
| CVE-2024-23462 |
3.3 (3.1)
|
ZCC Mac validinstaller file integrity check missing |
Zscaler |
Client Connector |
2024-05-02T13:11:38.955Z | 2024-08-01T23:06:24.159Z |
| CVE-2026-2200 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
heyewei JFinalCMS API Endpoint save cross site scripting |
heyewei |
JFinalCMS |
2026-02-09T01:02:05.911Z | 2026-02-09T16:35:10.038Z |
| CVE-2026-1108 |
4.8 (4.0)
5.3 (3.1)
5.3 (3.0)
|
cijliu librtsp rtsp_rely_dumps buffer overflow |
cijliu |
librtsp |
2026-01-18T01:32:06.797Z | 2026-01-20T17:11:45.294Z |
| CVE-2026-1109 |
4.8 (4.0)
5.3 (3.1)
5.3 (3.0)
|
cijliu librtsp rtsp_parse_request buffer overflow |
cijliu |
librtsp |
2026-01-18T03:02:06.182Z | 2026-01-20T17:10:10.612Z |
| CVE-2025-15533 |
4.8 (4.0)
5.3 (3.1)
5.3 (3.0)
|
raysan5 raylib rtext.c GenImageFontAtlas heap-based overflow |
raysan5 |
raylib |
2026-01-18T05:02:08.672Z | 2026-01-21T18:53:31.970Z |
| CVE-2026-1452 |
N/A
|
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage. | N/A | N/A | 2026-02-17T17:26:12.868Z | |
| CVE-2025-15534 |
4.8 (4.0)
5.3 (3.1)
5.3 (3.0)
|
raysan5 raylib rtext.c LoadFontData integer overflow |
raysan5 |
raylib |
2026-01-18T06:32:06.449Z | 2026-01-21T18:53:17.884Z |
| CVE-2026-24002 |
9.1 (3.1)
|
pyodide sandbox option is insecure |
gristlabs |
grist-core |
2026-01-22T02:26:28.765Z | 2026-01-22T12:54:32.232Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-0719 | A flaw was identified in the NTLM authentication handling of the libsoup HTTP library, used by GNOM… | 2026-01-08T13:15:43.283 | 2026-02-17T19:21:55.890 |
| fkie_cve-2025-63354 | Hitron HI3120 v7.2.4.5.2b1 allows stored XSS via the Parental Control option when creating a new fi… | 2026-02-09T15:16:11.070 | 2026-02-17T19:21:55.063 |
| fkie_cve-2025-21120 | Dell Avamar, versions prior to 19.10 SP1 with patch 338904, contains a Trusting HTTP Permission Met… | 2025-08-04T19:15:30.210 | 2026-02-17T19:21:54.417 |
| fkie_cve-2026-1332 | MeetingHub developed by HAMASTAR Technology has a Missing Authentication vulnerability, allowing un… | 2026-01-22T10:16:07.970 | 2026-02-17T19:16:13.437 |
| fkie_cve-2026-1998 | A flaw has been found in micropython up to 1.27.0. This vulnerability affects the function mp_impor… | 2026-02-06T07:16:12.553 | 2026-02-17T19:15:46.333 |
| fkie_cve-2024-23480 | A fallback mechanism in code sign checking on macOS may allow arbitrary code execution. This issue … | 2024-05-01T17:15:29.033 | 2026-02-17T19:15:26.013 |
| fkie_cve-2026-2000 | A vulnerability was found in DCN DCME-320 up to 20260121. Impacted is the function apply_config of … | 2026-02-06T07:16:13.053 | 2026-02-17T19:15:16.183 |
| fkie_cve-2026-2008 | A vulnerability was detected in abhiphile fermat-mcp up to 47f11def1cd37e45dd060f30cdce346cbdbd6f0a… | 2026-02-06T07:16:13.447 | 2026-02-17T19:12:42.487 |
| fkie_cve-2026-2010 | A vulnerability has been found in Sanluan PublicCMS up to 4.0.202506.d/5.202506.d/6.202506.d. Impac… | 2026-02-06T08:15:54.063 | 2026-02-17T19:12:22.773 |
| fkie_cve-2026-2016 | A security vulnerability has been detected in happyfish100 libfastcommon up to 1.0.84. Affected by … | 2026-02-06T12:16:26.073 | 2026-02-17T19:11:30.800 |
| fkie_cve-2026-2017 | A vulnerability was detected in IP-COM W30AP up to 1.0.0.11(1340). Affected by this issue is the fu… | 2026-02-06T12:16:26.280 | 2026-02-17T19:09:53.080 |
| fkie_cve-2026-2054 | A security flaw has been discovered in D-Link DIR-605L and DIR-619L 2.06B01/2.13B01. Impacted is an… | 2026-02-06T13:15:54.580 | 2026-02-17T19:09:28.847 |
| fkie_cve-2026-2055 | A weakness has been identified in D-Link DIR-605L and DIR-619L 2.06B01/2.13B01. The affected elemen… | 2026-02-06T13:15:54.777 | 2026-02-17T19:09:14.370 |
| fkie_cve-2026-2056 | A security vulnerability has been detected in D-Link DIR-605L and DIR-619L 2.06B01/2.13B01. The imp… | 2026-02-06T14:16:38.510 | 2026-02-17T19:08:56.160 |
| fkie_cve-2026-2058 | A flaw has been found in mathurvishal CloudClassroom-PHP-Project up to 5dadec098bfbbf3300d60c3494db… | 2026-02-06T17:16:27.877 | 2026-02-17T19:08:43.083 |
| fkie_cve-2026-2074 | A vulnerability was identified in O2OA up to 9.0.0. This impacts an unknown function of the file /x… | 2026-02-07T05:16:12.800 | 2026-02-17T19:07:40.393 |
| fkie_cve-2026-2146 | A security flaw has been discovered in guchengwuyue yshopmall up to 1.9.1. This affects the functio… | 2026-02-08T10:15:49.467 | 2026-02-17T19:07:15.640 |
| fkie_cve-2024-23462 | An Improper Validation of Integrity Check Value vulnerability in Zscaler Client Connector on MacOS … | 2024-05-02T13:23:06.810 | 2026-02-17T19:06:28.077 |
| fkie_cve-2026-2200 | A weakness has been identified in heyewei JFinalCMS 5.0.0. This affects an unknown function of the … | 2026-02-09T02:16:03.557 | 2026-02-17T19:01:38.293 |
| fkie_cve-2026-1108 | A security vulnerability has been detected in cijliu librtsp up to 2ec1a81ad65280568a0c7c16420d7c10… | 2026-01-18T02:16:25.990 | 2026-02-17T18:34:36.243 |
| fkie_cve-2026-1109 | A vulnerability was detected in cijliu librtsp up to 2ec1a81ad65280568a0c7c16420d7c10fde13b04. The … | 2026-01-18T04:15:59.613 | 2026-02-17T18:34:19.773 |
| fkie_cve-2025-15533 | A vulnerability was determined in raysan5 raylib up to 909f040. Affected by this vulnerability is t… | 2026-01-18T05:16:16.360 | 2026-02-17T18:26:07.110 |
| fkie_cve-2026-1452 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued i… | 2026-02-17T18:20:34.007 | 2026-02-17T18:20:34.007 |
| fkie_cve-2025-15534 | A vulnerability was identified in raysan5 raylib up to 909f040. Affected by this issue is the funct… | 2026-01-18T07:16:01.963 | 2026-02-17T18:04:37.950 |
| fkie_cve-2026-24002 | Grist is spreadsheet software using Python as its formula language. Grist offers several methods fo… | 2026-01-22T03:15:47.777 | 2026-02-17T17:59:16.383 |
| fkie_cve-2024-23459 | An Improper Link Resolution Before File Access ('Link Following') vulnerability in Zscaler Client C… | 2024-05-02T13:23:06.363 | 2026-02-17T17:58:45.233 |
| fkie_cve-2023-28798 | An out-of-bounds write to heap in the pacparser library on Zscaler Client Connector on Mac may lead… | 2024-05-02T13:23:05.807 | 2026-02-17T17:55:18.820 |
| fkie_cve-2026-24042 | Appsmith is a platform to build admin panels, internal tools, and dashboards. In versions 1.94 and … | 2026-01-22T04:16:00.187 | 2026-02-17T17:50:44.837 |
| fkie_cve-2026-24055 | Langfuse is an open source large language model engineering platform. In versions 3.146.0 and below… | 2026-01-22T04:16:00.367 | 2026-02-17T17:46:42.970 |
| fkie_cve-2025-36058 | IBM Business Automation Workflow containers 25.0.0 through 25.0.0 Interim Fix 002, 24.0.1 through 2… | 2026-01-20T16:16:02.743 | 2026-02-17T17:29:28.760 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-q93j-qg8p-98hf |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:36Z | 2026-02-13T21:31:36Z |
| ghsa-fh86-r2mq-rq7g |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:36Z | 2026-02-13T21:31:36Z |
| ghsa-4gg4-26q8-wv28 |
10.0 (3.1)
|
A zip slip vulnerability in the /DesignTools/SkinList.aspx endpoint of MojoPortal CMS v2.9.0.1 allo… | 2026-02-13T18:31:25Z | 2026-02-13T21:31:36Z |
| ghsa-3f8j-mm92-hxrr |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:36Z | 2026-02-13T21:31:36Z |
| ghsa-224f-wm46-5p4r |
6.2 (3.1)
|
An issue in IObit Unlocker v1.3.0.11 allows attackers to cause a Denial of Service (DoS) via a craf… | 2026-02-13T18:31:25Z | 2026-02-13T21:31:36Z |
| ghsa-x3j4-874w-h7pv |
7.5 (3.1)
|
An array index out of bounds vulnerability in the AMF component of free5GC v4.0.1 allows remote att… | 2026-02-13T18:31:25Z | 2026-02-13T21:31:35Z |
| ghsa-wx45-vx6h-76cq |
6.5 (3.1)
|
The issue was addressed with improved memory handling. This issue is fixed in iOS 26.3 and iPadOS 2… | 2026-02-12T00:31:04Z | 2026-02-13T21:31:35Z |
| ghsa-j98c-62jj-x3h3 |
7.5 (3.1)
|
An improper input validation and protocol compliance vulnerability in free5GC v4.0.1 allows remote … | 2026-02-13T18:31:25Z | 2026-02-13T21:31:35Z |
| ghsa-fq6p-4h82-858f |
7.5 (3.1)
|
A heap buffer overflow vulnerability in the UPF component of free5GC v4.0.1 allows remote attackers… | 2026-02-13T18:31:25Z | 2026-02-13T21:31:35Z |
| ghsa-9677-7r6g-3qh2 |
4.6 (3.1)
|
An inconsistent user interface issue was addressed with improved state management. This issue is fi… | 2026-02-12T00:31:04Z | 2026-02-13T21:31:35Z |
| ghsa-4q59-wccf-6q9r |
7.0 (3.1)
|
A race condition was addressed with improved state handling. This issue is fixed in watchOS 26.3, t… | 2026-02-12T00:31:04Z | 2026-02-13T21:31:35Z |
| ghsa-3jj8-9qpj-6989 |
7.7 (3.1)
|
An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in ma… | 2026-02-12T00:31:04Z | 2026-02-13T21:31:35Z |
| ghsa-2vhc-whvm-6f6g |
7.1 (3.1)
|
A privacy issue was addressed with improved checks. This issue is fixed in watchOS 26.3, tvOS 26.3,… | 2026-02-12T00:31:04Z | 2026-02-13T21:31:35Z |
| ghsa-2fcc-cgw7-6rrw |
5.4 (3.1)
|
grub-btrfs through 2026-01-31 (on Arch Linux and derivative distributions) allows initramfs OS comm… | 2026-02-13T00:32:51Z | 2026-02-13T21:31:35Z |
| ghsa-r2c9-g9pr-hc37 |
3.3 (3.1)
|
A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Tahoe … | 2026-02-12T00:31:04Z | 2026-02-13T21:31:34Z |
| ghsa-hxp3-qj63-m9j9 |
5.5 (3.1)
|
The issue was addressed with improved handling of caches. This issue is fixed in macOS Sequoia 15.7… | 2026-02-12T00:31:04Z | 2026-02-13T21:31:34Z |
| ghsa-hx52-r225-3pxc |
7.8 (3.1)
|
A path handling issue was addressed with improved validation. This issue is fixed in macOS Sequoia … | 2026-02-12T00:31:04Z | 2026-02-13T21:31:34Z |
| ghsa-hr8m-gc74-4f7w |
4.4 (3.1)
|
This issue was addressed with improved redaction of sensitive information. This issue is fixed in m… | 2026-02-12T00:31:03Z | 2026-02-13T21:31:34Z |
| ghsa-ghg5-7pjg-pp65 |
6.5 (3.1)
7.2 (4.0)
|
On TP-Link Tapo C260 v1, a guest‑level authenticated user can bypass intended access restrictions b… | 2026-02-10T18:30:40Z | 2026-02-13T21:31:34Z |
| ghsa-c348-hjj9-x39v |
7.8 (3.1)
5.3 (4.0)
|
On TP-Link Tapo C260 v1, path traversal is possible due to improper handling of specific GET reques… | 2026-02-10T18:30:40Z | 2026-02-13T21:31:34Z |
| ghsa-9rvp-ph3g-jg82 |
5.5 (3.1)
|
A path handling issue was addressed with improved validation. This issue is fixed in iOS 18.7.5 and… | 2026-02-12T00:31:03Z | 2026-02-13T21:31:34Z |
| ghsa-6xrf-46c8-4wmj |
6.5 (3.1)
|
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iO… | 2026-02-12T00:31:04Z | 2026-02-13T21:31:34Z |
| ghsa-4f5q-mmm6-fj92 |
8.8 (3.1)
8.7 (4.0)
|
On TP-Link Tapo C260 v1, command injection vulnerability exists due to improper sanitization in cer… | 2026-02-10T18:30:40Z | 2026-02-13T21:31:34Z |
| ghsa-qh7q-x454-phcx |
4.9 (3.1)
6.8 (4.0)
|
An authenticated user with high privileges may trigger a denial‑of‑service condition in TP-Link Arc… | 2026-02-03T18:30:47Z | 2026-02-13T21:31:33Z |
| ghsa-gm7f-mr33-3p7w |
4.5 (3.1)
6.8 (4.0)
|
A lack of proper input validation in the HTTP processing path in TP-Link Archer BE230 v1.2 (web mod… | 2026-02-03T18:30:47Z | 2026-02-13T21:31:33Z |
| ghsa-xxj8-gh7w-f786 |
7.8 (3.1)
|
Netatalk through 3.1.13 has an afp_getappl heap-based buffer overflow resulting in code execution v… | 2022-11-12T12:00:28Z | 2026-02-13T21:31:31Z |
| ghsa-h63m-522m-f339 |
9.8 (3.1)
|
OwnTone (aka owntone-server) through 28.1 has a use-after-free in net_bind() in misc.c. | 2022-05-24T19:10:32Z | 2026-02-13T21:31:31Z |
| ghsa-7rhj-qr35-3pvg |
6.8 (3.1)
|
There is a Cross-site Scripting vulnerability in Esri Portal Sites in versions 10.8.1 – 10.9 that m… | 2023-07-21T06:30:17Z | 2026-02-13T21:31:31Z |
| ghsa-78jh-p6rf-g59w |
3.7 (3.1)
|
An information disclosure vulnerability exists in curl <v8.1.0 when doing HTTP(S) transfers, libcur… | 2023-05-26T21:30:23Z | 2026-02-13T21:31:31Z |
| ghsa-73p2-7vjh-9qx4 |
8.4 (3.1)
|
There is a Cross-site Scripting vulnerability in Esri Portal Sites in versions 10.8.1 – 11.1 that m… | 2023-07-21T00:30:23Z | 2026-02-13T21:31:31Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2023-185 |
3.7 (3.1)
|
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foun… | matrix-synapse | 2023-09-27T15:19:00+00:00 | 2023-09-30T05:24:54.158504+00:00 |
| pysec-2023-172 |
4.3 (3.1)
|
The Create Single Payment application of SAP S/4HANA - versions 100, 101, 102, 103, 104, … | hana-ml | 2023-09-12T02:15:00Z | 2023-09-29T22:26:12.812435Z |
| pysec-2023-183 |
|
opencv-python versions before v4.8.1.78 bundled libwebp binaries in wheels that are vulne… | opencv-python | 2023-09-29T21:15:28.039030+00:00 | |
| pysec-2023-184 |
|
opencv-python-headless versions before v4.8.1.78 bundled libwebp binaries in wheels that … | opencv-python-headless | 2023-09-29T21:15:27.980982+00:00 | |
| pysec-2023-182 |
|
opencv-contrib-python-headless versions before v4.8.1.78 bundled libwebp binaries in whee… | opencv-contrib-python-headless | 2023-09-29T21:15:27.863960+00:00 | |
| pysec-2023-181 |
|
opencv-contrib-python versions before v4.8.1.78 bundled libwebp binaries in wheels that a… | opencv-contrib-python | 2023-09-29T21:15:27.924031+00:00 | |
| pysec-2023-180 |
4.3 (3.1)
|
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foun… | matrix-synapse | 2023-09-27T15:19:00+00:00 | 2023-09-29T20:23:39.578838+00:00 |
| pysec-2023-179 |
|
This affects versions of the package pydash before 6.0.0. A number of pydash methods such… | pydash | 2023-09-28T05:15:00+00:00 | 2023-09-28T10:29:02.604249+00:00 |
| pysec-2023-175 |
|
Pillow versions before v10.0.1 bundled libwebp binaries in wheels that are vulnerable to … | pillow | 2023-09-25T17:25:13.946374Z | |
| pysec-2023-177 |
|
An issue in Gevent before version 23.9.0 allows a remote attacker to escalate privileges … | gevent | 2023-09-25T12:15:00+00:00 | 2023-09-25T14:28:09.019811+00:00 |
| pysec-2023-176 |
6.5 (3.1)
|
GeoNode is an open source platform that facilitates the creation, sharing, and collaborat… | geonode | 2023-09-15T21:15:00+00:00 | 2023-09-20T17:25:44.504117+00:00 |
| pysec-2023-174 |
|
imagecodecs versions before v2023.9.18 bundled libwebp binaries in wheels that are vulner… | imagecodecs | 2023-09-20T05:12:42.403706+00:00 | |
| pysec-2023-173 |
5.3 (3.1)
|
Piccolo is an ORM and query builder which supports asyncio. In versions 0.120.0 and prior… | piccolo | 2023-09-12T21:15:00+00:00 | 2023-09-19T05:26:00.954782+00:00 |
| pysec-2023-171 |
|
Apache Airflow, versions before 2.7.1, is affected by a vulnerability that allows authent… | apache-airflow | 2023-09-12T12:15:00+00:00 | 2023-09-12T14:27:23.735580+00:00 |
| pysec-2023-170 |
|
Apache Airflow, versions before 2.7.1, is affected by a vulnerability that allows authent… | apache-airflow | 2023-09-12T12:15:00+00:00 | 2023-09-12T14:27:23.660908+00:00 |
| pysec-2023-169 |
7.8 (3.1)
|
Git Providers can read from the wrong environment because they get the same cache directo… | salt | 2023-09-05T11:15:00+00:00 | 2023-09-08T20:23:17.288300+00:00 |
| pysec-2023-168 |
5.3 (3.1)
|
Vyper is a Pythonic Smart Contract Language. In affected versions the order of evaluation… | vyper | 2023-09-04T18:15:00+00:00 | 2023-09-08T16:30:59.497777+00:00 |
| pysec-2023-167 |
5.3 (3.1)
|
Vyper is a Pythonic Smart Contract Language. For the following (probably non-exhaustive) … | vyper | 2023-09-04T18:15:00+00:00 | 2023-09-08T15:22:00.929480+00:00 |
| pysec-2023-166 |
5.3 (3.1)
|
Salt masters prior to 3005.2 or 3006.2 contain a DOS in minion return. After receiving se… | salt | 2023-09-05T11:15:00+00:00 | 2023-09-07T20:23:20.197102+00:00 |
| pysec-2023-141 |
5.4 (3.1)
|
A stored cross-site scripting (XSS) vulnerability in Netbox v3.4.7 allows attackers to ex… | pynetbox | 2023-08-10T20:15:00Z | 2023-09-07T15:50:00.665697Z |
| pysec-2023-165 |
6.5 (3.1)
|
GitPython is a python library used to interact with Git repositories. In order to resolv… | gitpython | 2023-08-30T22:15:00+00:00 | 2023-09-07T14:33:25.683922+00:00 |
| pysec-2023-164 |
4.7 (3.1)
|
borgbackup is an opensource, deduplicating archiver with compression and authenticated en… | borgbackup | 2023-08-30T18:15:00+00:00 | 2023-09-06T16:31:20.448538+00:00 |
| pysec-2023-161 |
7.8 (3.1)
|
GitPython is a python library used to interact with Git repositories. When resolving a p… | gitpython | 2023-08-28T18:15:00+00:00 | 2023-09-05T22:26:14.587281+00:00 |
| pysec-2023-160 |
6.5 (3.1)
|
A flaw was found in the Keylime registrar that could allow a bypass of the challenge-resp… | keylime | 2023-08-25T17:15:00+00:00 | 2023-09-05T20:22:36.414406+00:00 |
| pysec-2023-159 |
7.7 (3.1)
|
RestrictedPython is a restricted execution environment for Python to run untrusted code. … | restrictedpython | 2023-08-30T18:15:00+00:00 | 2023-09-05T16:32:17.658660+00:00 |
| pysec-2023-158 |
8.0 (3.1)
|
The session fixation vulnerability allowed the authenticated user to continue accessing A… | apache-airflow | 2023-08-23T16:15:00+00:00 | 2023-09-04T08:29:37.781470+00:00 |
| pysec-2023-157 |
6.1 (3.1)
|
jupyter-server is the backend for Jupyter web applications. Improper cross-site credentia… | jupyter-server | 2023-08-28T21:15:00+00:00 | 2023-09-01T20:23:47.344401+00:00 |
| pysec-2023-156 |
8.8 (3.1)
|
Deserialization of Untrusted Data, Inclusion of Functionality from Untrusted Control Sphe… | apache-airflow-providers-apache-spark | 2023-08-28T08:15:00+00:00 | 2023-09-01T18:27:11.679668+00:00 |
| pysec-2023-155 |
6.1 (3.1)
|
jupyter-server is the backend for Jupyter web applications. Open Redirect Vulnerability. … | jupyter-server | 2023-08-28T21:15:00+00:00 | 2023-09-01T16:31:48.441782+00:00 |
| pysec-2023-101 |
|
A cross-site scripting (XSS) vulnerability in Selenium Grid v3.141.59 allows attackers to… | selenium | 2023-07-05T18:15:00Z | 2023-08-31T20:11:41.543920Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33313 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.602150Z |
| gsd-2024-33312 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.613311Z |
| gsd-2024-33311 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.685067Z |
| gsd-2024-33310 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.715276Z |
| gsd-2024-33309 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.735013Z |
| gsd-2024-33308 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.615223Z |
| gsd-2024-33307 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.602795Z |
| gsd-2024-33306 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.659851Z |
| gsd-2024-33305 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.739023Z |
| gsd-2024-33304 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.691194Z |
| gsd-2024-33303 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.649918Z |
| gsd-2024-33302 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.701883Z |
| gsd-2024-33301 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.641343Z |
| gsd-2024-33300 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.610877Z |
| gsd-2024-33299 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.637274Z |
| gsd-2024-33298 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.607025Z |
| gsd-2024-33297 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.621980Z |
| gsd-2024-33296 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.654274Z |
| gsd-2024-33295 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.611481Z |
| gsd-2024-33294 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.703136Z |
| gsd-2024-33293 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.628768Z |
| gsd-2024-33292 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.717307Z |
| gsd-2024-33291 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.706255Z |
| gsd-2024-33290 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.723985Z |
| gsd-2024-33289 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.629216Z |
| gsd-2024-33288 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.604465Z |
| gsd-2024-33287 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.751819Z |
| gsd-2024-33286 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.745545Z |
| gsd-2024-33285 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.712627Z |
| gsd-2024-33284 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.716892Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2026-605 | Malicious code in dhgshop (npm) | 2026-01-29T15:50:42Z | 2026-02-02T05:56:27Z |
| MAL-2026-589 | Malicious code in dotenv-embed (npm) | 2026-01-28T14:56:54Z | 2026-02-02T05:56:27Z |
| MAL-2026-569 | Malicious code in ern-picking2-api (npm) | 2026-01-28T07:48:24Z | 2026-02-02T05:56:27Z |
| MAL-2026-568 | Malicious code in equimper (npm) | 2026-01-28T07:43:53Z | 2026-02-02T05:56:27Z |
| MAL-2026-567 | Malicious code in debug-glitz (npm) | 2026-01-28T07:37:08Z | 2026-02-02T05:56:27Z |
| MAL-2026-566 | Malicious code in debug-fmt (npm) | 2026-01-28T07:37:08Z | 2026-02-02T05:56:27Z |
| MAL-2026-556 | Malicious code in digital-music-dynmsg-ribbon (npm) | 2026-01-28T06:52:12Z | 2026-02-02T05:56:27Z |
| MAL-2026-551 | Malicious code in express-lists-routes (npm) | 2026-01-28T03:26:59Z | 2026-02-02T05:56:27Z |
| MAL-2026-531 | Malicious code in hackerxhj (npm) | 2026-01-27T08:09:00Z | 2026-02-02T05:56:27Z |
| MAL-2026-530 | Malicious code in grepleaks (npm) | 2026-01-27T08:09:32Z | 2026-02-02T05:56:27Z |
| MAL-2026-529 | Malicious code in fileupload-core (npm) | 2026-01-27T07:56:49Z | 2026-02-02T05:56:27Z |
| MAL-2026-521 | Malicious code in hammer-jquery (npm) | 2026-01-27T02:25:01Z | 2026-02-02T05:56:27Z |
| MAL-2026-520 | Malicious code in ftm-noderpc (npm) | 2026-01-27T02:44:52Z | 2026-02-02T05:56:27Z |
| mal-2026-588 | Malicious code in chai-sub (npm) | 2026-01-28T14:53:28Z | 2026-02-02T05:56:26Z |
| mal-2026-587 | Malicious code in chai-px (npm) | 2026-01-28T14:48:04Z | 2026-02-02T05:56:26Z |
| mal-2026-586 | Malicious code in chai-chains-async (npm) | 2026-01-28T14:46:57Z | 2026-02-02T05:56:26Z |
| mal-2026-585 | Malicious code in chai-async-tests (npm) | 2026-01-28T14:56:54Z | 2026-02-02T05:56:26Z |
| mal-2026-584 | Malicious code in chai-as-extended (npm) | 2026-01-28T15:06:22Z | 2026-02-02T05:56:26Z |
| mal-2026-565 | Malicious code in converse-rn-lib (npm) | 2026-01-28T07:50:39Z | 2026-02-02T05:56:26Z |
| mal-2026-564 | Malicious code in chai-as-hashed (npm) | 2026-01-28T07:53:44Z | 2026-02-02T05:56:26Z |
| mal-2026-555 | Malicious code in acuitymobileapp (npm) | 2026-01-28T07:13:15Z | 2026-02-02T05:56:26Z |
| mal-2026-550 | Malicious code in cdnhost (npm) | 2026-01-28T03:21:37Z | 2026-02-02T05:56:26Z |
| mal-2026-549 | Malicious code in blockchain-helper-lib (npm) | 2026-01-28T03:20:46Z | 2026-02-02T05:56:26Z |
| mal-2026-508 | Malicious code in cartos-dds-ui (npm) | 2026-01-26T16:41:17Z | 2026-02-02T05:56:26Z |
| MAL-2026-588 | Malicious code in chai-sub (npm) | 2026-01-28T14:53:28Z | 2026-02-02T05:56:26Z |
| MAL-2026-587 | Malicious code in chai-px (npm) | 2026-01-28T14:48:04Z | 2026-02-02T05:56:26Z |
| MAL-2026-586 | Malicious code in chai-chains-async (npm) | 2026-01-28T14:46:57Z | 2026-02-02T05:56:26Z |
| MAL-2026-585 | Malicious code in chai-async-tests (npm) | 2026-01-28T14:56:54Z | 2026-02-02T05:56:26Z |
| MAL-2026-584 | Malicious code in chai-as-extended (npm) | 2026-01-28T15:06:22Z | 2026-02-02T05:56:26Z |
| MAL-2026-565 | Malicious code in converse-rn-lib (npm) | 2026-01-28T07:50:39Z | 2026-02-02T05:56:26Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-1047 | VPN Clients / DHCP: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-05-06T22:00:00.000+00:00 | 2025-09-22T22:00:00.000+00:00 |
| wid-sec-w-2025-1761 | Omnissa Workspace ONE UEM: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2025-08-11T22:00:00.000+00:00 | 2025-09-21T22:00:00.000+00:00 |
| wid-sec-w-2025-1906 | ImageMagick: Mehrere Schwachstellen | 2025-08-25T22:00:00.000+00:00 | 2025-09-18T22:00:00.000+00:00 |
| wid-sec-w-2025-1790 | Microsoft Windows und Windows Server: Mehrere Schwachstellen | 2025-08-12T22:00:00.000+00:00 | 2025-09-18T22:00:00.000+00:00 |
| wid-sec-w-2025-1722 | OpenJPEG: Schwachstelle ermöglicht Codeausführung | 2025-08-05T22:00:00.000+00:00 | 2025-09-18T22:00:00.000+00:00 |
| wid-sec-w-2025-0396 | Grub: Mehrere Schwachstellen | 2025-02-18T23:00:00.000+00:00 | 2025-09-18T22:00:00.000+00:00 |
| wid-sec-w-2023-3086 | bluez: Schwachstelle ermöglicht Codeausführung | 2023-12-07T23:00:00.000+00:00 | 2025-09-18T22:00:00.000+00:00 |
| wid-sec-w-2022-2058 | Grub2: Mehrere Schwachstellen | 2022-11-15T23:00:00.000+00:00 | 2025-09-18T22:00:00.000+00:00 |
| wid-sec-w-2025-2079 | JetBrains TeamCity: Mehrere Schwachstellen | 2025-09-16T22:00:00.000+00:00 | 2025-09-17T22:00:00.000+00:00 |
| wid-sec-w-2025-2076 | Liferay Portal: Mehrere Schwachstellen | 2025-09-16T22:00:00.000+00:00 | 2025-09-17T22:00:00.000+00:00 |
| wid-sec-w-2025-2071 | WatchGuard Firebox: Schwachstelle ermöglicht Codeausführung | 2025-09-16T22:00:00.000+00:00 | 2025-09-17T22:00:00.000+00:00 |
| wid-sec-w-2025-2068 | Aruba EdgeConnect: Mehrere Schwachstellen | 2025-09-16T22:00:00.000+00:00 | 2025-09-17T22:00:00.000+00:00 |
| wid-sec-w-2025-1756 | libTIFF: Schwachstelle ermöglicht Denial of Service | 2025-08-11T22:00:00.000+00:00 | 2025-09-17T22:00:00.000+00:00 |
| wid-sec-w-2025-1638 | Nvidia Treiber: Mehrere Schwachstellen | 2025-07-23T22:00:00.000+00:00 | 2025-09-17T22:00:00.000+00:00 |
| wid-sec-w-2025-1485 | Microsoft Developer Tools und git: Mehrere Schwachstellen | 2025-07-08T22:00:00.000+00:00 | 2025-09-17T22:00:00.000+00:00 |
| wid-sec-w-2025-1480 | Red Hat Enterprise Linux (jq): Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-07T22:00:00.000+00:00 | 2025-09-17T22:00:00.000+00:00 |
| wid-sec-w-2025-1158 | Google Chrome / Microsoft Edge: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2025-05-27T22:00:00.000+00:00 | 2025-09-17T22:00:00.000+00:00 |
| wid-sec-w-2025-0675 | Mozilla Firefox und Thunderbird: Mehrere Schwachstellen | 2025-04-01T22:00:00.000+00:00 | 2025-09-17T22:00:00.000+00:00 |
| wid-sec-w-2025-0511 | Apache Tomcat: Schwachstelle ermöglicht Manipulation, Codeausführung und Offenlegung von Daten | 2025-03-10T23:00:00.000+00:00 | 2025-09-17T22:00:00.000+00:00 |
| wid-sec-w-2025-0500 | Django: Schwachstelle ermöglicht Denial of Service | 2025-03-06T23:00:00.000+00:00 | 2025-09-17T22:00:00.000+00:00 |
| wid-sec-w-2025-0274 | NGINX: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-02-05T23:00:00.000+00:00 | 2025-09-17T22:00:00.000+00:00 |
| wid-sec-w-2025-0263 | Golang Go: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-02-04T23:00:00.000+00:00 | 2025-09-17T22:00:00.000+00:00 |
| wid-sec-w-2025-0262 | Mozilla Firefox und Thunderbird: Mehrere Schwachstellen | 2025-02-04T23:00:00.000+00:00 | 2025-09-17T22:00:00.000+00:00 |
| wid-sec-w-2025-0155 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-01-21T23:00:00.000+00:00 | 2025-09-17T22:00:00.000+00:00 |
| wid-sec-w-2025-0063 | Django: Schwachstelle ermöglicht Denial of Service | 2025-01-14T23:00:00.000+00:00 | 2025-09-17T22:00:00.000+00:00 |
| wid-sec-w-2025-0026 | Mozilla Firefox, Firefox ESR und Thunderbird: Mehrere Schwachstellen | 2025-01-07T23:00:00.000+00:00 | 2025-09-17T22:00:00.000+00:00 |
| wid-sec-w-2024-3609 | Django: Mehrere Schwachstellen | 2024-12-04T23:00:00.000+00:00 | 2025-09-17T22:00:00.000+00:00 |
| wid-sec-w-2024-3586 | GStreamer: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-12-03T23:00:00.000+00:00 | 2025-09-17T22:00:00.000+00:00 |
| wid-sec-w-2024-3549 | Mozilla Firefox und Thunderbird: Mehrere Schwachstellen | 2024-11-26T23:00:00.000+00:00 | 2025-09-17T22:00:00.000+00:00 |
| wid-sec-w-2024-3182 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2024-10-14T22:00:00.000+00:00 | 2025-09-17T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-501673 | SSA-501673: Apache Log4j Denial of Service Vulnerability (CVE-2021-45105) - Impact to Siemens Products | 2021-12-19T00:00:00Z | 2021-12-19T00:00:00Z |
| ssa-802578 | SSA-802578: Multiple File Parsing Vulnerabilities in JTTK before V11.1.1.0 and JT Utilities before V13.1.1.0 | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-595101 | SSA-595101: Multiple File Parsing Vulnerabilities in JT2Go and Teamcenter Visualization before V13.2.0.5 | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-523250 | SSA-523250: Improper Certificate Validation Vulnerability in SINUMERIK Edge | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-496292 | SSA-496292: Remote Code Execution Vulnerability in POWER METER SICAM Q100 | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-463116 | SSA-463116: Multiple Access Control Vulnerabilities in Siveillance Identity before V1.6.284.0 | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-396621 | SSA-396621: Multiple File Parsing Vulnerabilities in JTTK before V10.8.1.1 and JT Utilities before V12.8.1.1 | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-390195 | SSA-390195: LibVNC Vulnerabilities in SIMATIC ITC Products | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-352143 | SSA-352143: Multiple File Parsing Vulnerabilities in JTTK before V11.0.3.0 and JT Utilities before V13.0.3.0 | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-199605 | SSA-199605: Arbitrary File Download Vulnerability in SIMATIC eaSie PCS 7 Skill Package | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-161331 | SSA-161331: Scene File Parsing Vulnerability in Simcenter STAR-CCM+ Viewer before V2021.3.1 | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-160202 | SSA-160202: Multiple Access Control Vulnerabilities in SiPass Integrated | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-133772 | SSA-133772: Zip Path Traversal Vulnerability in Teamcenter Active Workspace | 2021-12-14T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-044112 | SSA-044112: Multiple Vulnerabilities (NUCLEUS:13) in the TCP/IP Stack of Nucleus RTOS | 2021-11-09T00:00:00Z | 2021-12-14T00:00:00Z |
| ssa-779699 | SSA-779699: Two Incorrect Authorization Vulnerabilities in Mendix | 2021-11-09T00:00:00Z | 2021-11-09T00:00:00Z |
| ssa-755517 | SSA-755517: Path Traversal Vulnerability in Siveillance Video DLNA Server | 2021-11-09T00:00:00Z | 2021-11-09T00:00:00Z |
| ssa-740908 | SSA-740908: File Parsing Vulnerabilities in JT Translator in NX | 2021-11-09T00:00:00Z | 2021-11-09T00:00:00Z |
| ssa-537983 | SSA-537983: Local Code Execution Vulnerability in SENTRON powermanager V3 | 2021-11-09T00:00:00Z | 2021-11-09T00:00:00Z |
| ssa-338732 | SSA-338732: Information Disclosure Vulnerability in Mendix | 2021-11-09T00:00:00Z | 2021-11-09T00:00:00Z |
| ssa-328042 | SSA-328042: File Parsing Vulnerabilities in OBJ Translator in NX | 2021-11-09T00:00:00Z | 2021-11-09T00:00:00Z |
| ssa-145157 | SSA-145157: Multiple Vulnerabilities in SIMATIC RTLS Locating Manager before V2.12 | 2021-11-09T00:00:00Z | 2021-11-09T00:00:00Z |
| ssa-847986 | SSA-847986: Denial-of-Service Vulnerabilities in SIPROTEC 5 relays | 2021-09-14T00:00:00Z | 2021-10-12T00:00:00Z |
| ssa-723417 | SSA-723417: Multiple Vulnerabilities in SCALANCE W1750D | 2021-05-11T00:00:00Z | 2021-10-12T00:00:00Z |
| ssa-538778 | SSA-538778: SmartVNC Vulnerabilities in SIMATIC HMI/WinCC Products | 2021-05-11T00:00:00Z | 2021-10-12T00:00:00Z |
| ssa-500748 | SSA-500748: Denial-of-Service Vulnerabilities in SIPROTEC 5 Devices | 2021-09-14T00:00:00Z | 2021-10-12T00:00:00Z |
| ssa-178380 | SSA-178380: Denial-of-Service Vulnerability in SINUMERIK Controllers | 2021-10-12T00:00:00Z | 2021-10-12T00:00:00Z |
| ssa-173565 | SSA-173565: Denial-of-Service Vulnerability in RUGGEDCOM ROX Devices | 2021-10-12T00:00:00Z | 2021-10-12T00:00:00Z |
| ssa-163251 | SSA-163251: Multiple Vulnerabilities in SINEC NMS | 2021-10-12T00:00:00Z | 2021-10-12T00:00:00Z |
| ssa-150692 | SSA-150692: Multiple Vulnerabilities in RUGGEDCOM ROX | 2021-09-14T00:00:00Z | 2021-10-12T00:00:00Z |
| ssa-728618 | SSA-728618: Multiple Vulnerabilities in Solid Edge before SE2021MP8 | 2021-09-28T00:00:00Z | 2021-09-28T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2024:0664 | Red Hat Security Advisory: OpenShift Container Platform 4.12.49 bug fix update and security update | 2024-02-08T19:31:18+00:00 | 2026-02-18T16:57:04+00:00 |
| rhsa-2024:0660 | Red Hat Security Advisory: OpenShift Container Platform 4.13.32 bug fix and security update | 2024-02-07T15:07:37+00:00 | 2026-02-18T16:57:03+00:00 |
| rhsa-2024:0484 | Red Hat Security Advisory: OpenShift Container Platform 4.13.31 bug fix and security update | 2024-02-01T19:01:48+00:00 | 2026-02-18T16:57:02+00:00 |
| rhsa-2024:0306 | Red Hat Security Advisory: OpenShift Container Platform 4.11.57 bug fix and security update | 2024-01-24T20:54:46+00:00 | 2026-02-18T16:57:01+00:00 |
| rhsa-2024:0302 | Red Hat Security Advisory: Kube Descheduler Operator for Red Hat OpenShift 5.0.0 for RHEL 9:security update | 2024-03-06T13:33:21+00:00 | 2026-02-18T16:57:01+00:00 |
| rhsa-2023:7741 | Red Hat Security Advisory: Red Hat Ceph Storage 6.1 security, enhancements, and bug fix update | 2023-12-12T13:55:37+00:00 | 2026-02-18T16:57:01+00:00 |
| rhsa-2024:0290 | Red Hat Security Advisory: OpenShift Container Platform 4.14.10 bug fix and security update | 2024-01-23T20:26:08+00:00 | 2026-02-18T16:57:00+00:00 |
| rhsa-2024:0273 | Red Hat Security Advisory: OpenShift Virtualization 4.12.9 Images security and bug fix update | 2024-01-17T08:29:36+00:00 | 2026-02-18T16:57:00+00:00 |
| rhsa-2024:0269 | Red Hat Security Advisory: Run Once Duration Override Operator for Red Hat OpenShift 1.1.0 for RHEL 9 | 2024-02-28T00:20:04+00:00 | 2026-02-18T16:57:00+00:00 |
| rhsa-2024:0198 | Red Hat Security Advisory: OpenShift Container Platform 4.12.47 security update | 2024-01-17T18:20:55+00:00 | 2026-02-18T16:57:00+00:00 |
| rhsa-2024:0193 | Red Hat Security Advisory: OpenShift Container Platform 4.13.29 bug fix and security update | 2024-01-17T09:48:09+00:00 | 2026-02-18T16:56:58+00:00 |
| rhsa-2024:0059 | Red Hat Security Advisory: OpenShift Container Platform 4.11.56 bug fix and security update | 2024-01-10T00:23:49+00:00 | 2026-02-18T16:56:58+00:00 |
| rhsa-2024:0050 | Red Hat Security Advisory: OpenShift Container Platform 4.14.8 bug fix and security update | 2024-01-09T16:55:38+00:00 | 2026-02-18T16:56:58+00:00 |
| rhsa-2023:7827 | Red Hat Security Advisory: OpenShift Container Platform 4.13.z security update | 2024-01-04T14:22:05+00:00 | 2026-02-18T16:56:58+00:00 |
| rhsa-2023:7823 | Red Hat Security Advisory: OpenShift Container Platform 4.12.46 bug fix and security update | 2024-01-04T14:41:38+00:00 | 2026-02-18T16:56:57+00:00 |
| rhsa-2023:7710 | Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 7.2.0 security update | 2023-12-11T00:20:04+00:00 | 2026-02-18T16:56:57+00:00 |
| rhsa-2023:7704 | Red Hat Security Advisory: OpenShift Virtualization 4.14.1 security and bug fix update | 2023-12-07T15:00:28+00:00 | 2026-02-18T16:56:56+00:00 |
| rhsa-2023:7703 | Red Hat Security Advisory: Red Hat OpenShift Pipelines 1.10.6 release and security update | 2023-12-07T14:57:07+00:00 | 2026-02-18T16:56:56+00:00 |
| rhsa-2023:7699 | Red Hat Security Advisory: Red Hat OpenShift Pipelines Client tkn for 1.10.6 release and security update | 2023-12-07T14:26:32+00:00 | 2026-02-18T16:56:56+00:00 |
| rhsa-2023:7691 | Red Hat Security Advisory: OpenShift Container Platform 4.11.55 bug fix and security update | 2023-12-13T21:44:50+00:00 | 2026-02-18T16:56:55+00:00 |
| rhsa-2023:7690 | Red Hat Security Advisory: OpenShift Container Platform 4.11.55 security update | 2023-12-13T21:03:30+00:00 | 2026-02-18T16:56:55+00:00 |
| rhsa-2023:7687 | Red Hat Security Advisory: OpenShift Container Platform 4.13.26 bug fix and security update | 2023-12-13T00:13:20+00:00 | 2026-02-18T16:56:55+00:00 |
| rhsa-2023:7682 | Red Hat Security Advisory: OpenShift Container Platform 4.14.6 bug fix and security update | 2023-12-12T09:48:40+00:00 | 2026-02-18T16:56:55+00:00 |
| rhsa-2023:7662 | Red Hat Security Advisory: Red Hat OpenShift for Windows Containers 6.0.3 security update | 2023-12-06T00:20:48+00:00 | 2026-02-18T16:56:54+00:00 |
| rhsa-2023:7608 | Red Hat Security Advisory: OpenShift Container Platform 4.12.45 bug fix and security update | 2023-12-06T17:55:11+00:00 | 2026-02-18T16:56:54+00:00 |
| rhsa-2023:7607 | Red Hat Security Advisory: OpenShift Container Platform 4.12.45 security and extras update | 2023-12-06T16:54:41+00:00 | 2026-02-18T16:56:54+00:00 |
| rhsa-2023:7604 | Red Hat Security Advisory: OpenShift Container Platform 4.13.25 bug fix and security update | 2023-12-06T00:34:23+00:00 | 2026-02-18T16:56:54+00:00 |
| rhsa-2023:7602 | Red Hat Security Advisory: OpenShift Container Platform 4.13.25 security and extras update | 2023-12-06T00:16:04+00:00 | 2026-02-18T16:56:53+00:00 |
| rhsa-2023:7599 | Red Hat Security Advisory: OpenShift Container Platform 4.14.5 bug fix and security update | 2023-12-05T09:57:03+00:00 | 2026-02-18T16:56:52+00:00 |
| rhsa-2023:7555 | Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.3.0 security update | 2023-11-28T18:50:01+00:00 | 2026-02-18T16:56:52+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-12-102-03 | MICROSYS PROMOTIC Use After Free Vulnerability | 2012-01-13T07:00:00.000000Z | 2025-06-06T21:45:00.844061Z |
| icsa-12-102-02 | Koyo Ecom Modules Vulnerabilities | 2012-01-13T07:00:00.000000Z | 2025-06-06T21:44:54.405200Z |
| icsa-12-102-01 | Certec atvise webMI2ADS Vulnerabilities | 2012-01-13T07:00:00.000000Z | 2025-06-06T21:44:47.952815Z |
| icsa-12-095-01a | ABB Multiple Components Buffer Overflow | 2012-01-06T07:00:00.000000Z | 2025-06-06T21:44:41.492952Z |
| icsa-12-088-01a | Rockwell Automation FactoryTalk RNADiagReceiver | 2012-12-30T07:00:00.000000Z | 2025-06-06T21:44:35.026913Z |
| icsa-12-083-01 | Ecava IntegraXor ActiveX Directory Traversal | 2012-12-25T07:00:00.000000Z | 2025-06-06T21:44:28.588784Z |
| icsa-12-032-02 | GE Intelligent Platforms Proficy Plant Applications Memory Corruption Vulnerabilities | 2012-11-04T06:00:00.000000Z | 2025-06-06T21:44:08.900302Z |
| icsa-12-032-01 | GE Proficy Historian ihDataArchiver | 2012-11-04T06:00:00.000000Z | 2025-06-06T21:44:02.422128Z |
| icsa-15-223-01 | Schneider Electric IMT25 DTM Vulnerability | 2015-05-14T06:00:00.000000Z | 2025-06-06T21:43:55.748554Z |
| icsa-15-211-01 | Schneider Electric InduSoft Web Studio and InTouch Machine Edition 2014 Password Storage Vulnerability | 2015-05-02T06:00:00.000000Z | 2025-06-06T21:43:48.989760Z |
| icsa-15-202-03b | Siemens RUGGEDCOM ROS and ROX-based Devices TLS POODLE Vulnerability (Update B) | 2015-04-23T06:00:00.000000Z | 2025-06-06T21:43:42.534859Z |
| icsa-15-195-01 | Siemens SICAM MIC Authentication Bypass Vulnerability | 2015-04-16T06:00:00.000000Z | 2025-06-06T21:43:23.165608Z |
| icsa-15-181-01 | Baxter SIGMA Spectrum Infusion System Vulnerabilities | 2015-04-02T06:00:00.000000Z | 2025-06-06T21:43:16.616537Z |
| icsa-15-176-02 | PACTware Exceptional Conditions Vulnerability | 2015-03-28T06:00:00.000000Z | 2025-06-06T21:43:10.139031Z |
| icsa-15-176-01 | Siemens Climatix BACnet/IP Communication Module Cross-site Scripting Vulnerability | 2015-03-28T06:00:00.000000Z | 2025-06-06T21:43:03.687724Z |
| icsa-15-174-01 | Hospira Symbiq Infusion System Vulnerability | 2015-03-26T06:00:00.000000Z | 2025-06-06T21:42:57.240178Z |
| icsa-15-167-01 | Schneider Electric StruxureWare Building Expert Plaintext Credentials Vulnerability | 2015-03-19T06:00:00.000000Z | 2025-06-06T21:42:37.652958Z |
| icsa-15-162-01a | RLE Nova-Wind Turbine HMI Unsecure Credentials Vulnerability (Update A) | 2015-03-14T06:00:00.000000Z | 2025-06-06T21:42:31.195189Z |
| icsa-15-160-02 | Sinapsi eSolar Light Plaintext Passwords Vulnerability | 2015-03-12T06:00:00.000000Z | 2025-06-06T21:42:24.744905Z |
| icsa-15-160-01a | N-Tron 702W Hard-Coded SSH and HTTPS Encryption Keys (Update A) | 2015-03-12T06:00:00.000000Z | 2025-06-06T21:42:18.275644Z |
| icsa-15-155-01 | XZERES 442SR Wind Turbine CSRF Vulnerability | 2015-03-07T07:00:00.000000Z | 2025-06-06T21:42:11.814604Z |
| icsa-15-153-02 | Moxa SoftCMS Buffer Overflow Vulnerability | 2015-03-05T07:00:00.000000Z | 2025-06-06T21:42:05.109005Z |
| icsa-15-148-01 | IDS RTU 850 Directory Traversal Vulnerability | 2015-02-28T07:00:00.000000Z | 2025-06-06T21:41:52.181609Z |
| icsa-15-141-01a | Schneider Electric OFS Server Vulnerability (Update A) | 2015-02-21T07:00:00.000000Z | 2025-06-06T21:41:39.275086Z |
| icsa-15-132-02 | Rockwell Automation RSView32 Weak Encryption Algorithm on Passwords | 2015-02-12T07:00:00.000000Z | 2025-06-06T21:41:32.834568Z |
| icsa-15-132-01 | Hospira LifeCare PCA Infusion System Vulnerabilities | 2015-02-12T07:00:00.000000Z | 2025-06-06T21:41:26.200883Z |
| icsa-15-125-01 | Hospira LifeCare PCA Infusion System Vulnerabilities | 2015-02-05T07:00:00.000000Z | 2025-06-06T21:41:19.746904Z |
| icsa-15-120-01 | Opto 22 Multiple Product Vulnerabilities | 2015-01-31T07:00:00.000000Z | 2025-06-06T21:41:13.287112Z |
| icsa-15-111-02 | Rockwell Automation RSLinx Classic Vulnerability | 2015-01-22T07:00:00.000000Z | 2025-06-06T21:41:06.693068Z |
| icsa-15-111-01 | Emerson AMS Device Manager SQL Injection Vulnerability | 2015-01-22T07:00:00.000000Z | 2025-06-06T21:41:00.174231Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-pi-epnm-bfjsrjp5 | Cisco Prime Infrastructure and Evolved Programmable Network Manager Cross-Site Scripting Vulnerabilities | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-pi-epnm-BFjSRJP5 | Cisco Prime Infrastructure and Evolved Programmable Network Manager Cross-Site Scripting Vulnerabilities | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-ivpa-cmdinj-c5xrbboy | Cisco Intersight Private Virtual Appliance Command Injection Vulnerabilities | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-ivpa-cmdinj-C5XRbbOy | Cisco Intersight Private Virtual Appliance Command Injection Vulnerabilities | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-ise-credentials-tkto3h3 | Cisco Identity Services Engine Device Credential Information Disclosure Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-ise-credentials-tkTO3h3 | Cisco Identity Services Engine Device Credential Information Disclosure Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-ipphone-csrf-hocmxw2c | Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Cross-Site Request Forgery Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-ipphone-csrf-HOCmXW2c | Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Cross-Site Request Forgery Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-intersight-forward-c45ncgqb | Cisco Intersight Virtual Appliance Unauthenticated Port Forwarding Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-intersight-forward-C45ncgqb | Cisco Intersight Virtual Appliance Unauthenticated Port Forwarding Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-expressway-injection-x475ebtq | Cisco Expressway Series and Cisco TelePresence Video Communication Server Command Injection Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-expressway-injection-X475EbTQ | Cisco Expressway Series and Cisco TelePresence Video Communication Server Command Injection Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-duo-dha-filewrite-xpmbmzak | Cisco Duo Device Health Application for Windows Arbitrary File Write Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-duo-dha-filewrite-xPMBMZAK | Cisco Duo Device Health Application for Windows Arbitrary File Write Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-cucm-injection-g6mbwh2 | Cisco Unified Communications Manager SQL Injection Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-cucm-injection-g6MbwH2 | Cisco Unified Communications Manager SQL Injection Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-cucm-imp-xss-qtt4vdsk | Cisco Unified Communications Products Cross-Site Scripting Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-cucm-imp-xss-QtT4VdsK | Cisco Unified Communications Products Cross-Site Scripting Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-clamav-dos-ftkhqmwz | ClamAV AutoIt Module Denial of Service Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-clamav-dos-FTkhqMWZ | ClamAV AutoIt Module Denial of Service Vulnerability | 2023-08-16T16:00:00+00:00 | 2023-08-16T16:00:00+00:00 |
| cisco-sa-ac-leak-sew6g2kd | Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables Affecting Cisco AnyConnect Secure Mobility Client and Cisco Secure Client | 2023-08-08T15:00:00+00:00 | 2023-08-08T15:00:00+00:00 |
| cisco-sa-ac-leak-Sew6g2kd | Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables Affecting Cisco AnyConnect Secure Mobility Client and Cisco Secure Client | 2023-08-08T15:00:00+00:00 | 2023-08-08T15:00:00+00:00 |
| cisco-sa-ucm-file-read-h8h4hej3 | Cisco Unified Communications Products Arbitrary File Read Vulnerability | 2022-04-20T16:00:00+00:00 | 2023-08-02T20:18:45+00:00 |
| cisco-sa-ucm-file-read-h8h4HEJ3 | Cisco Unified Communications Products Arbitrary File Read Vulnerability | 2022-04-20T16:00:00+00:00 | 2023-08-02T20:18:45+00:00 |
| cisco-sa-asaftd-aclconfig-wvk52f3z | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software ACLs Not Installed upon Reload | 2023-07-27T16:00:00+00:00 | 2023-07-27T16:38:54+00:00 |
| cisco-sa-asaftd-aclconfig-wVK52f3z | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software ACLs Not Installed upon Reload | 2023-07-27T16:00:00+00:00 | 2023-07-27T16:38:54+00:00 |
| cisco-sa-bw-priv-esc-qtguzosq | Cisco BroadWorks Privilege Escalation Vulnerability | 2023-07-19T16:00:00+00:00 | 2023-07-20T17:42:21+00:00 |
| cisco-sa-bw-priv-esc-qTgUZOsQ | Cisco BroadWorks Privilege Escalation Vulnerability | 2023-07-19T16:00:00+00:00 | 2023-07-20T17:42:21+00:00 |
| cisco-sa-spa-web-multi-7kvpmu2f | Cisco Small Business SPA500 Series IP Phones Web UI Vulnerabilities | 2023-07-19T16:00:00+00:00 | 2023-07-19T16:00:00+00:00 |
| cisco-sa-spa-web-multi-7kvPmu2F | Cisco Small Business SPA500 Series IP Phones Web UI Vulnerabilities | 2023-07-19T16:00:00+00:00 | 2023-07-19T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-37772 | RDMA/cma: Fix workqueue crash in cma_netevent_work_handler | 2025-05-02T00:00:00.000Z | 2026-02-18T02:20:52.000Z |
| msrc_cve-2024-35869 | smb: client: guarantee refcounted children from parent session | 2024-05-02T07:00:00.000Z | 2026-02-18T02:20:28.000Z |
| msrc_cve-2025-68362 | wifi: rtl818x: rtl8187: Fix potential buffer underflow in rtl8187_rx_cb() | 2025-12-02T00:00:00.000Z | 2026-02-18T02:20:04.000Z |
| msrc_cve-2022-49108 | clk: mediatek: Fix memory leaks on probe | 2025-02-02T00:00:00.000Z | 2026-02-18T02:20:04.000Z |
| msrc_cve-2025-38225 | media: imx-jpeg: Cleanup after an allocation error | 2025-07-02T00:00:00.000Z | 2026-02-18T02:20:03.000Z |
| msrc_cve-2025-37792 | Bluetooth: btrtl: Prevent potential NULL dereference | 2025-05-02T00:00:00.000Z | 2026-02-18T02:20:02.000Z |
| msrc_cve-2025-6021 | Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2 | 2025-06-02T00:00:00.000Z | 2026-02-18T02:19:57.000Z |
| msrc_cve-2024-57892 | ocfs2: fix slab-use-after-free due to dangling pointer dqi_priv | 2025-01-02T00:00:00.000Z | 2026-02-18T02:19:54.000Z |
| msrc_cve-2024-49890 | drm/amd/pm: ensure the fw_info is not null before using it | 2024-10-01T07:00:00.000Z | 2026-02-18T02:19:52.000Z |
| msrc_cve-2024-26986 | drm/amdkfd: Fix memory leak in create_process failure | 2024-05-02T07:00:00.000Z | 2026-02-18T02:19:49.000Z |
| msrc_cve-2025-7394 | In the OpenSSL compatibility layer implementation, the function RAND_poll() was not behaving as expected and leading to the potential for predictable values returned from RAND_bytes() after fork() is called. This can lead to weak or predictable random numbers generated in applications that are both using RAND_bytes() and doing fork() operations. This only affects applications explicitly calling RAND_bytes() after fork() and does not affect any internal TLS operations. Although RAND_bytes() documentation in OpenSSL calls out not being safe for use with fork() without first calling RAND_poll(), an additional code change was also made in wolfSSL to make RAND_bytes() behave similar to OpenSSL after a fork() call without calling RAND_poll(). Now the Hash-DRBG used gets reseeded after detecting running in a new process. If making use of RAND_bytes() and calling fork() we recommend updating to the latest version of wolfSSL. Thanks to Per Allansson from Appgate for the report. | 2025-07-02T00:00:00.000Z | 2026-02-18T02:19:45.000Z |
| msrc_cve-2024-35843 | iommu/vt-d: Use device rbtree in iopf reporting path | 2024-05-02T07:00:00.000Z | 2026-02-18T02:19:45.000Z |
| msrc_cve-2024-2511 | Unbounded memory growth with session handling in TLSv1.3 | 2024-04-02T07:00:00.000Z | 2026-02-18T02:19:38.000Z |
| msrc_cve-2023-47100 | In Perl before 5.38.2, S_parse_uniprop_string in regcomp.c can write to unallocated space because a property name associated with a \p{...} regular expression construct is mishandled. The earliest affected version is 5.30.0. | 2023-12-01T08:00:00.000Z | 2026-02-18T02:19:21.000Z |
| msrc_cve-2025-21791 | vrf: use RCU protection in l3mdev_l3_out() | 2025-02-02T00:00:00.000Z | 2026-02-18T02:19:19.000Z |
| msrc_cve-2024-4603 | Excessive time spent checking DSA keys and parameters | 2024-05-02T07:00:00.000Z | 2026-02-18T02:19:15.000Z |
| msrc_cve-2025-37781 | i2c: cros-ec-tunnel: defer probe if parent EC is not present | 2025-05-02T00:00:00.000Z | 2026-02-18T02:19:07.000Z |
| msrc_cve-2025-68354 | regulator: core: Protect regulator_supply_alias_list with regulator_list_mutex | 2025-12-02T00:00:00.000Z | 2026-02-18T02:19:05.000Z |
| msrc_cve-2025-38218 | f2fs: fix to do sanity check on sit_bitmap_size | 2025-07-02T00:00:00.000Z | 2026-02-18T02:18:53.000Z |
| msrc_cve-2024-57801 | net/mlx5e: Skip restore TC rules for vport rep without loaded flag | 2025-01-02T00:00:00.000Z | 2026-02-18T02:18:39.000Z |
| msrc_cve-2024-49892 | drm/amd/display: Initialize get_bytes_per_element's default to 1 | 2024-10-01T07:00:00.000Z | 2026-02-18T02:18:39.000Z |
| msrc_cve-2023-31486 | HTTP::Tiny before 0.083 a Perl core module since 5.13.9 and available standalone on CPAN has an insecure default TLS configuration where users must opt in to verify certificates. | 2023-04-01T00:00:00.000Z | 2026-02-18T02:18:31.000Z |
| msrc_cve-2025-38352 | posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() | 2025-07-02T00:00:00.000Z | 2026-02-18T02:18:24.000Z |
| msrc_cve-2025-37930 | drm/nouveau: Fix WARN_ON in nouveau_fence_context_kill() | 2025-05-02T00:00:00.000Z | 2026-02-18T02:18:20.000Z |
| msrc_cve-2023-51780 | An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition. | 2023-12-01T08:00:00.000Z | 2026-02-18T02:18:20.000Z |
| msrc_cve-2025-68349 | NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid | 2025-12-02T00:00:00.000Z | 2026-02-18T02:18:05.000Z |
| msrc_cve-2025-38735 | gve: prevent ethtool ops after shutdown | 2025-09-02T00:00:00.000Z | 2026-02-18T02:18:00.000Z |
| msrc_cve-2025-58186 | Lack of limit when parsing cookies can cause memory exhaustion in net/http | 2025-10-02T00:00:00.000Z | 2026-02-18T02:17:59.000Z |
| msrc_cve-2025-21490 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2025-01-02T00:00:00.000Z | 2026-02-18T02:17:59.000Z |
| msrc_cve-2024-35870 | smb: client: fix UAF in smb2_reconnect_server() | 2024-05-02T07:00:00.000Z | 2026-02-18T02:17:59.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15437-1 | qemu-10.0.3-1.1 on GA media | 2025-08-13T00:00:00Z | 2025-08-13T00:00:00Z |
| opensuse-su-2025:15436-1 | matrix-synapse-1.136.0-1.1 on GA media | 2025-08-13T00:00:00Z | 2025-08-13T00:00:00Z |
| opensuse-su-2025:15435-1 | libunbound8-1.23.1-1.1 on GA media | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| opensuse-su-2025:15434-1 | govulncheck-vulndb-0.0.20250811T192933-1.1 on GA media | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| opensuse-su-2025:15433-1 | framework-inputmodule-control-0.2.0-3.1 on GA media | 2025-08-12T00:00:00Z | 2025-08-12T00:00:00Z |
| opensuse-su-2025:15432-1 | gio-branding-upstream-2.84.4-1.1 on GA media | 2025-08-11T00:00:00Z | 2025-08-11T00:00:00Z |
| opensuse-su-2025:15431-1 | nvidia-open-driver-G06-signed-default-devel-570.172.08-2.1 on GA media | 2025-08-10T00:00:00Z | 2025-08-10T00:00:00Z |
| opensuse-su-2025:15430-1 | texmaker-6.0.1-2.1 on GA media | 2025-08-09T00:00:00Z | 2025-08-09T00:00:00Z |
| opensuse-su-2025:15429-1 | python311-uv-0.8.8-1.1 on GA media | 2025-08-09T00:00:00Z | 2025-08-09T00:00:00Z |
| opensuse-su-2025:15428-1 | net-tools-2.10-4.1 on GA media | 2025-08-09T00:00:00Z | 2025-08-09T00:00:00Z |
| opensuse-su-2025:15427-1 | ffmpeg-4-4.4.6-5.1 on GA media | 2025-08-09T00:00:00Z | 2025-08-09T00:00:00Z |
| opensuse-su-2025:15426-1 | keylime-ima-policy-0.2.7+141-1.1 on GA media | 2025-08-08T00:00:00Z | 2025-08-08T00:00:00Z |
| opensuse-su-2025:15425-1 | himmelblau-1.2.0+git.0.6befefc-1.1 on GA media | 2025-08-08T00:00:00Z | 2025-08-08T00:00:00Z |
| opensuse-su-2025:15424-1 | govulncheck-vulndb-0.0.20250807T150727-1.1 on GA media | 2025-08-08T00:00:00Z | 2025-08-08T00:00:00Z |
| opensuse-su-2025:15423-1 | go1.24-1.24.6-1.1 on GA media | 2025-08-08T00:00:00Z | 2025-08-08T00:00:00Z |
| opensuse-su-2025:15422-1 | go1.23-1.23.12-1.1 on GA media | 2025-08-08T00:00:00Z | 2025-08-08T00:00:00Z |
| opensuse-su-2025:15421-1 | chromedriver-139.0.7258.66-1.1 on GA media | 2025-08-08T00:00:00Z | 2025-08-08T00:00:00Z |
| opensuse-su-2025:15420-1 | go1.25-1.25rc3-1.1 on GA media | 2025-08-07T00:00:00Z | 2025-08-07T00:00:00Z |
| opensuse-su-2025:15419-1 | traefik2-2.11.28-1.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
| opensuse-su-2025:15418-1 | traefik-3.5.0-1.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
| opensuse-su-2025:15417-1 | libtiff-devel-32bit-4.7.0-7.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
| opensuse-su-2025:15416-1 | libpoppler-cpp2-25.08.0-1.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
| opensuse-su-2025:15415-1 | libIex-3_3-32-3.3.5-1.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
| opensuse-su-2025:15414-1 | iperf-3.19.1-1.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
| opensuse-su-2025:15413-1 | ghostscript-10.05.1-1.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
| opensuse-su-2025:15412-1 | agama-17+60.68fdb92ec-26.1 on GA media | 2025-08-06T00:00:00Z | 2025-08-06T00:00:00Z |
| opensuse-su-2025:15411-1 | gnutls-3.8.10-1.1 on GA media | 2025-08-05T00:00:00Z | 2025-08-05T00:00:00Z |
| opensuse-su-2025:15410-1 | erlang-rabbitmq-client-3.13.7-5.1 on GA media | 2025-08-04T00:00:00Z | 2025-08-04T00:00:00Z |
| opensuse-su-2025:15409-1 | python313-3.13.5-4.1 on GA media | 2025-08-04T00:00:00Z | 2025-08-04T00:00:00Z |
| opensuse-su-2025:15408-1 | python312-3.12.11-4.1 on GA media | 2025-08-04T00:00:00Z | 2025-08-04T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2024-120 | Security exception in com.spotify.docker.client.shaded.com.fasterxml.jackson.databind.util.TokenBuffer | 2024-02-21T00:00:31.892843Z | 2024-02-21T00:00:31.893273Z |
| osv-2024-117 | Security exception in com.spotify.docker.client.shaded.com.fasterxml.jackson.databind.util.TokenBuffer | 2024-02-19T00:05:05.793082Z | 2024-02-19T00:05:05.793781Z |
| osv-2024-104 | Heap-buffer-overflow in mrb_memsearch | 2024-02-15T00:00:54.473735Z | 2024-02-15T00:00:54.474295Z |
| osv-2024-103 | Heap-use-after-free in xmlRemoveID | 2024-02-15T00:00:51.271367Z | 2024-02-15T00:00:51.271973Z |
| osv-2024-102 | Heap-buffer-overflow in mrb_memsearch | 2024-02-15T00:00:47.674187Z | 2024-02-15T00:00:47.674761Z |
| osv-2024-66 | Heap-buffer-overflow in mrb_memsearch | 2024-02-01T00:13:20.152510Z | 2024-02-14T14:19:50.489803Z |
| osv-2024-65 | Heap-buffer-overflow in mrb_memsearch | 2024-02-01T00:12:19.091201Z | 2024-02-14T14:19:46.707491Z |
| osv-2024-30 | Heap-buffer-overflow in mrb_memsearch | 2024-01-22T00:05:20.803259Z | 2024-02-14T14:19:17.217387Z |
| osv-2024-29 | Heap-buffer-overflow in mrb_memsearch | 2024-01-22T00:01:33.424797Z | 2024-02-14T14:18:57.560129Z |
| osv-2024-96 | Heap-buffer-overflow in mrb_memsearch | 2024-02-11T00:00:45.699847Z | 2024-02-14T14:17:20.000446Z |
| osv-2024-88 | Heap-use-after-free in fuzzer_execute_ex | 2024-02-09T00:02:29.396272Z | 2024-02-09T00:02:29.396615Z |
| osv-2024-82 | Heap-use-after-free in xmlValidatePopElement | 2024-02-08T00:02:35.342535Z | 2024-02-08T00:02:35.343044Z |
| osv-2024-81 | Heap-use-after-free in xmlRemoveID | 2024-02-08T00:02:18.078478Z | 2024-02-08T00:02:18.079086Z |
| osv-2024-79 | Heap-double-free in supported_features | 2024-02-07T00:03:00.459996Z | 2024-02-07T00:03:00.460359Z |
| osv-2024-64 | Global-buffer-overflow in ReadVariantArrayBuiltInType | 2024-02-01T00:03:55.790847Z | 2024-02-06T14:18:25.113400Z |
| osv-2024-77 | Heap-use-after-free in xmlRemoveID | 2024-02-06T00:06:09.284671Z | 2024-02-06T00:06:09.285249Z |
| osv-2024-72 | UNKNOWN READ in LLVMFuzzerRunDriver | 2024-02-03T00:04:56.169161Z | 2024-02-03T00:04:56.169853Z |
| osv-2022-126 | Heap-buffer-overflow in md_analyze_inlines | 2022-02-07T00:00:05.720107Z | 2024-01-30T14:00:58.446611Z |
| osv-2024-36 | Heap-use-after-free in LLVMFuzzerRunDriver | 2024-01-24T00:12:37.499127Z | 2024-01-24T00:12:37.499641Z |
| osv-2020-828 | Heap-use-after-free in draco::Metadata::AddSubMetadata | 2020-07-14T05:37:49.784283Z | 2024-01-18T14:11:45.334998Z |
| osv-2020-778 | Heap-use-after-free in void draco::Metadata::AddEntry<std::__1::vector<unsigned char, std::__1::allocat | 2020-07-14T05:37:30.449855Z | 2024-01-18T14:11:43.087585Z |
| osv-2020-824 | UNKNOWN READ in std::__1::_MetaBase<__can_be_converted_to_string_view<char, std::__1::char_trait | 2020-07-14T05:37:49.054851Z | 2024-01-18T14:11:41.842226Z |
| osv-2020-800 | UNKNOWN READ in std::__1::__tree<std::__1::__value_type<std::__1::basic_string<char, std::__1::c | 2020-07-14T05:37:39.527741Z | 2024-01-18T14:11:40.439013Z |
| osv-2021-1082 | UNKNOWN READ in std::__1::__tree<std::__1::__value_type<std::__1::basic_string<char, std::__1::c | 2021-08-01T00:00:48.182181Z | 2024-01-18T14:06:40.887686Z |
| osv-2024-7 | Heap-buffer-overflow in icu_75::Locale::Locale | 2024-01-07T00:11:45.064745Z | 2024-01-07T00:11:45.065397Z |
| osv-2023-1382 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2024-01-01T00:12:36.633204Z | 2024-01-01T00:12:36.633589Z |
| osv-2023-1381 | Heap-buffer-overflow in NetworkInterface::processPacket | 2024-01-01T00:03:49.670656Z | 2024-01-01T00:03:49.671160Z |
| osv-2023-1375 | Heap-buffer-overflow in IEC104Stats::processPacket | 2023-12-31T00:10:56.069235Z | 2023-12-31T00:10:56.069852Z |
| osv-2023-1373 | Heap-use-after-free in xmlRemoveID | 2023-12-31T00:01:26.816109Z | 2023-12-31T00:01:26.816606Z |
| osv-2023-1372 | Heap-use-after-free in JS_NewObjectFromShape | 2023-12-30T00:04:10.276049Z | 2023-12-30T00:04:10.276482Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2021-0150 | ncollide3d is unmaintained | 2021-01-29T12:00:00Z | 2023-03-12T06:47:41Z |
| rustsec-2021-0149 | nphysics2d is unmaintained | 2021-01-29T12:00:00Z | 2023-03-11T22:34:14Z |
| rustsec-2021-0148 | nphysics3d is unmaintained | 2021-01-29T12:00:00Z | 2023-03-11T22:34:14Z |
| rustsec-2023-0018 | Race Condition Enabling Link Following and Time-of-check Time-of-use (TOCTOU) | 2023-02-24T12:00:00Z | 2023-03-04T21:50:30Z |
| rustsec-2022-0091 | `tauri` filesystem scope partial bypass | 2022-09-19T12:00:00Z | 2023-02-25T15:16:50Z |
| rustsec-2023-0002 | git2 Rust package suppresses ssh host key checking | 2023-01-12T12:00:00Z | 2023-02-09T03:11:29Z |
| rustsec-2023-0001 | reject_remote_clients Configuration corruption | 2023-01-04T12:00:00Z | 2023-02-09T03:11:29Z |
| rustsec-2022-0057 | badge is Unmaintained | 2022-08-31T12:00:00Z | 2023-02-09T03:11:29Z |
| rustsec-2022-0053 | mapr is Unmaintained | 2022-08-24T12:00:00Z | 2023-02-09T03:11:29Z |
| rustsec-2021-0146 | Crate `twoway` deprecated by the author | 2021-05-20T12:00:00Z | 2023-02-09T03:11:29Z |
| rustsec-2021-0140 | rusttype is Unmaintained | 2021-04-01T12:00:00Z | 2023-02-09T03:11:29Z |
| rustsec-2021-0136 | `sass-rs` has been deprecated | 2021-04-07T12:00:00Z | 2023-02-09T03:11:29Z |
| rustsec-2022-0089 | `aliyun-oss-client` secret exposure | 2022-11-19T12:00:00Z | 2023-02-07T22:07:40Z |
| rustsec-2022-0088 | `tauri`'s `readDir` endpoint allows possible enumeration outside of filesystem scope | 2022-08-07T12:00:00Z | 2023-02-05T18:48:17Z |
| rustsec-2023-0004 | bzip2 Denial of Service (DoS) | 2023-01-09T12:00:00Z | 2023-02-04T13:29:07Z |
| rustsec-2022-0077 | `claim` is Unmaintained | 2022-12-04T12:00:00Z | 2023-02-04T10:58:43Z |
| rustsec-2022-0087 | Slack Webhooks secrets leak in debug logs | 2022-10-10T12:00:00Z | 2023-02-02T11:45:24Z |
| rustsec-2022-0086 | Slack OAuth Secrets leak in debug logs | 2022-07-22T12:00:00Z | 2023-02-02T11:43:48Z |
| rustsec-2022-0085 | matrix-sdk Impersonation of room keys | 2022-09-29T12:00:00Z | 2023-02-02T11:35:31Z |
| rustsec-2022-0084 | libp2p Lack of resource management DoS | 2022-07-12T12:00:00Z | 2023-02-02T11:22:51Z |
| rustsec-2022-0083 | evm incorrect state transition | 2022-10-25T12:00:00Z | 2023-02-02T11:20:42Z |
| rustsec-2020-0166 | personnummer Input validation error | 2020-09-04T12:00:00Z | 2023-02-02T10:57:52Z |
| rustsec-2023-0003 | git2 does not verify SSH keys by default | 2023-01-20T12:00:00Z | 2023-01-20T23:06:55Z |
| rustsec-2022-0080 | parity-util-mem Unmaintained | 2022-11-30T12:00:00Z | 2023-01-16T09:26:23Z |
| rustsec-2022-0075 | Bug in pooling instance allocator | 2022-11-10T12:00:00Z | 2023-01-14T00:56:30Z |
| rustsec-2022-0073 | crate has been renamed to `embedded-alloc` | 2022-12-21T12:00:00Z | 2022-12-23T16:46:57Z |
| rustsec-2022-0071 | Rusoto is unmaintained | 2022-04-24T12:00:00Z | 2022-12-18T12:08:00Z |
| rustsec-2022-0068 | out-of-bounds read possible when setting list-of-pointers | 2022-11-30T12:00:00Z | 2022-11-30T22:16:39Z |
| rustsec-2019-0024 | Test advisory with associated example crate | 2019-10-08T12:00:00Z | 2022-11-05T17:45:24Z |
| rustsec-2022-0066 | Denial of Service from unchecked request length | 2022-10-30T12:00:00Z | 2022-11-02T22:38:38Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-airflow-2020-11978 | 2024-03-06T11:01:37.264Z | 2025-10-22T09:08:25.162Z | |
| bit-powershell-2025-25004 | PowerShell Elevation of Privilege Vulnerability | 2025-10-21T08:49:11.753Z | 2025-10-21T09:07:40.239Z |
| bit-gitlab-2025-2934 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-10-11T09:05:29.864Z | 2025-10-21T09:07:40.239Z |
| bit-envoy-2025-62409 | Envoy allows large requests and responses to cause TCP connection pool crash | 2025-10-21T08:41:16.273Z | 2025-10-21T09:07:40.239Z |
| bit-pillow-2025-48379 | Pillow Vulnerable to Write Buffer Overflow on BCn encoding | 2025-07-03T05:57:27.923Z | 2025-10-16T18:08:44.835Z |
| bit-django-2025-48432 | 2025-09-25T08:40:36.630Z | 2025-10-16T18:08:44.835Z | |
| bit-redis-2025-48367 | Redis DoS Vulnerability due to bad connection error handling | 2025-10-16T12:07:00.720Z | 2025-10-16T12:31:38.153Z |
| bit-keydb-2025-48367 | Redis DoS Vulnerability due to bad connection error handling | 2025-10-16T12:00:55.638Z | 2025-10-16T12:31:38.153Z |
| bit-grafana-2025-3580 | 2025-05-28T11:44:30.552Z | 2025-10-16T11:24:40.537Z | |
| bit-pytorch-2025-55554 | 2025-10-05T23:47:56.493Z | 2025-10-16T00:08:58.048Z | |
| bit-pytorch-2025-55552 | 2025-10-05T23:47:53.725Z | 2025-10-16T00:08:58.048Z | |
| bit-pytorch-2025-55551 | 2025-10-05T23:47:52.236Z | 2025-10-16T00:08:58.048Z | |
| bit-pytorch-2025-55560 | 2025-10-15T08:50:02.845Z | 2025-10-15T09:08:35.035Z | |
| bit-python-2024-5642 | Buffer overread when using an empty list with SSLContext.set_npn_protocols() | 2025-10-14T09:29:29.557Z | 2025-10-14T09:53:39.450Z |
| bit-libpython-2024-5642 | Buffer overread when using an empty list with SSLContext.set_npn_protocols() | 2025-10-14T09:24:35.254Z | 2025-10-14T09:53:39.450Z |
| bit-elasticsearch-2025-37727 | Elasticsearch Insertion of sensitive information in log file | 2025-10-14T08:39:50.514Z | 2025-10-14T09:09:11.030Z |
| bit-redis-2025-46818 | Redis: Authenticated users can execute LUA scripts as a different user | 2025-10-08T08:51:27.125Z | 2025-10-11T09:07:57.990Z |
| bit-keydb-2025-46818 | Redis: Authenticated users can execute LUA scripts as a different user | 2025-10-08T08:43:21.875Z | 2025-10-11T09:07:57.990Z |
| bit-gitlab-2025-11340 | Incorrect Authorization in GitLab | 2025-10-11T09:04:34.616Z | 2025-10-11T09:07:57.990Z |
| bit-gitlab-2025-10004 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-10-11T09:04:16.301Z | 2025-10-11T09:07:57.990Z |
| bit-powershell-2024-0057 | NET, .NET Framework, and Visual Studio Security Feature Bypass Vulnerability | 2025-09-04T17:48:50.396Z | 2025-10-10T12:11:18.225Z |
| bit-python-2025-6069 | HTMLParser quadratic complexity when processing malformed inputs | 2025-08-11T13:59:58.625Z | 2025-10-10T09:07:15.482Z |
| bit-libpython-2025-6069 | HTMLParser quadratic complexity when processing malformed inputs | 2025-08-11T15:33:31.541Z | 2025-10-10T09:07:15.482Z |
| bit-ejbca-2025-3027 | Open Redirect vulnerability in EJBCA | 2025-10-10T08:38:43.953Z | 2025-10-10T09:07:15.482Z |
| bit-ejbca-2025-3026 | Improper Neutralization of Special Elements vulnerability in EJBCA | 2025-10-10T08:38:42.126Z | 2025-10-10T09:07:15.482Z |
| bit-kibana-2025-37728 | Kibana Insufficiently Protected Credentials in the CrowdStrike Connector | 2025-10-09T08:43:25.053Z | 2025-10-09T09:08:03.236Z |
| bit-elk-2025-37728 | Kibana Insufficiently Protected Credentials in the CrowdStrike Connector | 2025-10-09T08:40:04.041Z | 2025-10-09T09:08:03.236Z |
| bit-rails-2024-54133 | Possible Content Security Policy bypass in Action Dispatch | 2025-04-14T11:27:29.848Z | 2025-10-06T09:29:51.512Z |
| bit-rails-2024-28103 | Action Pack is missing security headers on non-HTML responses | 2024-12-20T09:49:58.439Z | 2025-10-06T09:29:51.512Z |
| bit-tensorflow-2025-55559 | 2025-10-05T23:59:43.523Z | 2025-10-06T00:06:00.502Z |
| ID | Description | Updated |
|---|---|---|
| var-201601-0030 | The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in… | 2024-07-23T20:39:22.908000Z |
| var-202203-0083 | Non-transparent sharing of branch predictor within a context in some Intel(R) Processors … | 2024-07-23T20:38:45.721000Z |
| var-202109-1315 | A memory corruption issue was addressed with improved state management. This issue is fix… | 2024-07-23T20:38:26.600000Z |
| var-201511-0101 | The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows … | 2024-07-23T20:38:26.767000Z |
| var-200609-0313 | Integer overflow in Apple QuickTime before 7.1.3 allows user-assisted remote attackers to… | 2024-07-23T20:38:25.677000Z |
| var-201710-1408 | An issue was discovered in certain Apple products. iOS before 11 is affected. Safari befo… | 2024-07-23T20:38:20.584000Z |
| var-201812-0271 | Perl before 5.26.3 and 5.28.x before 5.28.1 has a buffer overflow via a crafted regular e… | 2024-07-23T20:38:14.990000Z |
| var-200804-0038 | Cross-site scripting (XSS) vulnerability in Apple WebKit, as used in Safari before 3.1.1,… | 2024-07-23T20:37:41.672000Z |
| var-200703-0030 | Unspecified vulnerability in ImageIO in Apple Mac OS X 10.3.9 and 10.4 through 10.4.8 all… | 2024-07-23T20:37:19.915000Z |
| var-200411-0172 | The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, all… | 2024-07-23T20:37:18.156000Z |
| var-202207-1358 | When setting font with malicous data by ioctl cmd PIO_FONT,kernel will write memory out o… | 2024-07-23T20:37:02.433000Z |
| var-202106-0344 | Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user… | 2024-07-23T20:37:01.572000Z |
| var-201205-0195 | Off-by-one error in libxml2, as used in Google Chrome before 19.0.1084.46 and other produ… | 2024-07-23T20:37:00.626000Z |
| var-201912-0535 | A logic issue was addressed with improved state management. This issue is fixed in iOS 12… | 2024-07-23T20:36:29.815000Z |
| var-201310-0355 | Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, a… | 2024-07-23T20:36:28.203000Z |
| var-201605-0037 | The X509_NAME_oneline function in crypto/x509/x509_obj.c in OpenSSL before 1.0.1t and 1.0… | 2024-07-23T20:35:57.230000Z |
| var-201203-0200 | Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers … | 2024-07-23T20:35:40.622000Z |
| var-201203-0174 | Use-after-free vulnerability in Google Chrome before 17.0.963.83 allows remote attackers … | 2024-07-23T20:35:40.553000Z |
| var-201902-0192 | If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (… | 2024-07-23T20:34:36.580000Z |
| var-201712-1100 | An issue was discovered in certain Apple products. iOS before 11.2 is affected. Safari be… | 2024-07-23T20:33:34.770000Z |
| var-202110-1685 | This issue was addressed with improved checks. This issue is fixed in Security Update 202… | 2024-07-23T20:33:31.079000Z |
| var-202210-0997 | An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML docum… | 2024-07-23T20:33:29.996000Z |
| var-201410-1217 | Use-after-free vulnerability in the ProcessingInstruction::setXSLStyleSheet function in c… | 2024-07-23T20:33:29.145000Z |
| var-201203-0180 | Google Chrome before 18.0.1025.142 does not properly handle SVG text elements, which allo… | 2024-07-23T20:33:25.333000Z |
| var-202004-1972 | A race condition was addressed with additional validation. This issue is fixed in iOS 13.… | 2024-07-23T20:33:16.245000Z |
| var-201006-1139 | WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4… | 2024-07-23T20:33:08.459000Z |
| var-201912-0606 | An input validation issue was addressed with improved input validation. This issue is fix… | 2024-07-23T20:33:06.757000Z |
| var-201912-0576 | An out-of-bounds read was addressed with improved input validation. This issue is fixed i… | 2024-07-23T20:33:05.700000Z |
| var-201409-1148 | Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash4… | 2024-07-23T20:33:04.791000Z |
| var-202209-0761 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed … | 2024-07-23T20:32:59.056000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2020-000084 | Apache Struts 2 vulnerable to remote code execution (S2-061) | 2020-12-11T15:09+09:00 | 2022-08-09T13:55+09:00 |
| jvndb-2022-000062 | Kaitai Struct: compiler vulnerable to denial-of-service (DoS) | 2022-08-04T15:14+09:00 | 2022-08-04T15:14+09:00 |
| jvndb-2022-002143 | Information Disclosure Vulnerability in Hitachi Automation Director and Hitachi Ops Center Automator | 2022-08-01T17:10+09:00 | 2022-08-01T17:10+09:00 |
| jvndb-2022-000061 | "JustSystems JUST Online Update for J-License" starts a program with an unquoted file path | 2022-07-28T13:40+09:00 | 2022-07-28T13:40+09:00 |
| jvndb-2021-000007 | OS command injection vulnerability in multiple Infoscience Corporation log management tools | 2021-01-27T18:31+09:00 | 2022-07-26T15:53+09:00 |
| jvndb-2022-001953 | Growi vulnerable to weak password requirements | 2022-06-15T17:47+09:00 | 2022-06-15T17:47+09:00 |
| jvndb-2021-000073 | Multiple vulnerabilities in Cybozu Garoon | 2021-08-02T16:42+09:00 | 2022-05-24T15:16+09:00 |
| jvndb-2022-001800 | Installer of Trend Micro HouseCall for Home Networks may insecurely load Dynamic Link Libraries | 2022-05-13T16:24+09:00 | 2022-05-13T16:24+09:00 |
| jvndb-2021-000097 | Multiple vulnerabilities in CLUSTERPRO X and EXPRESSCLUSTER X | 2021-10-29T15:22+09:00 | 2022-04-20T14:03+09:00 |
| jvndb-2022-001526 | Trend Micro Antivirus for Mac vulnerable to privilege escalation | 2022-04-07T16:58+09:00 | 2022-04-07T16:58+09:00 |
| jvndb-2017-000174 | Self-Extracting Encrypted Files created by AttacheCase may insecurely load Dynamic Link Libraries | 2017-07-14T13:38+09:00 | 2022-03-31T17:43+09:00 |
| jvndb-2022-001494 | Trend Micro Apex Central and Trend Micro Apex Central as a Service vulnerable to improper check for file contents | 2022-03-31T17:25+09:00 | 2022-03-31T17:25+09:00 |
| jvndb-2021-004912 | Multiple vulnerabilities in multiple ELECOM routers | 2021-12-02T17:16+09:00 | 2022-03-30T16:11+09:00 |
| jvndb-2021-000108 | Multiple vulnerabilities in multiple ELECOM LAN routers | 2021-11-30T16:23+09:00 | 2022-03-29T16:18+09:00 |
| jvndb-2022-001477 | Netcommunity OG410X and OG810X VoIP gateway/Hikari VoIP adapter for business offices vulnerable to OS command injection | 2022-03-23T12:08+09:00 | 2022-03-23T12:08+09:00 |
| jvndb-2022-000021 | Multiple vulnerabilities in KINGSOFT "WPS Office" and "KINGSOFT Internet Security" | 2022-03-16T14:46+09:00 | 2022-03-16T14:46+09:00 |
| jvndb-2021-008345 | Installer of Trend Micro Portable Security may insecurely load Dynamic Link Libraries | 2022-03-14T16:43+09:00 | 2022-03-14T16:43+09:00 |
| jvndb-2022-001404 | Installer of Trend Micro Password Manager may insecurely load Dynamic Link Libraries | 2022-03-11T15:55+09:00 | 2022-03-11T15:55+09:00 |
| jvndb-2022-000016 | UNIVERGE WA Series vulnerable to OS command injection | 2022-03-10T14:31+09:00 | 2022-03-10T14:31+09:00 |
| jvndb-2022-001383 | Directory Permission Vulnerability in Hitachi Ops Center Viewpoint | 2022-03-07T15:45+09:00 | 2022-03-07T15:45+09:00 |
| jvndb-2022-001382 | File Permission Vulnerability in Hitachi Command Suite | 2022-03-07T15:35+09:00 | 2022-03-07T15:35+09:00 |
| jvndb-2022-000008 | i-FILTER vulnerable to improper check for certificate revocation | 2022-03-04T14:12+09:00 | 2022-03-04T14:12+09:00 |
| jvndb-2022-000017 | Norton Security for Mac improperly processes ICMP packets | 2022-03-03T14:32+09:00 | 2022-03-03T14:32+09:00 |
| jvndb-2022-001380 | Multiples security updates for Trend Micro Endpoint security products for enterprises (March 2022) | 2022-03-02T17:07+09:00 | 2022-03-02T17:07+09:00 |
| jvndb-2021-000109 | Multiple missing authorization vulnerabilities in WordPress Plugin "Advanced Custom Fields" | 2021-12-02T15:02+09:00 | 2022-02-18T16:18+09:00 |
| jvndb-2022-000014 | Multiple vulnerabilities in a-blog cms | 2022-02-18T15:55+09:00 | 2022-02-18T15:55+09:00 |
| jvndb-2022-000012 | Multiple vulnerabilities in phpUploader | 2022-02-17T15:20+09:00 | 2022-02-17T15:20+09:00 |
| jvndb-2022-000011 | HPE Agentless Management registers unquoted service paths | 2022-02-09T15:49+09:00 | 2022-02-09T15:49+09:00 |
| jvndb-2022-001299 | Cross-site Scripting Vulnerability in JP1/IT Desktop Management 2 | 2022-02-08T17:15+09:00 | 2022-02-08T17:15+09:00 |
| jvndb-2022-000009 | CSV+ vulnerable to cross-site scripting | 2022-02-08T16:33+09:00 | 2022-02-08T16:33+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:4081-1 | Security update for podman | 2025-11-12T12:49:35Z | 2025-11-12T12:49:35Z |
| suse-su-2025:4080-1 | Security update for podman | 2025-11-12T12:49:06Z | 2025-11-12T12:49:06Z |
| suse-su-2025:4079-1 | Security update for podman | 2025-11-12T12:48:51Z | 2025-11-12T12:48:51Z |
| suse-su-2025:4078-1 | Security update for the Linux Kernel (Live Patch 22 for SUSE Linux Enterprise 15 SP5) | 2025-11-12T11:09:52Z | 2025-11-12T11:09:52Z |
| suse-su-2025:4077-1 | Security update for runc | 2025-11-12T10:36:08Z | 2025-11-12T10:36:08Z |
| suse-su-2025:4076-1 | Security update for buildah | 2025-11-12T10:35:40Z | 2025-11-12T10:35:40Z |
| suse-su-2025:4075-1 | Security update for buildah | 2025-11-12T10:35:24Z | 2025-11-12T10:35:24Z |
| suse-su-2025:4074-1 | Security update for buildah | 2025-11-12T10:35:09Z | 2025-11-12T10:35:09Z |
| suse-su-2025:4073-1 | Security update for runc | 2025-11-12T10:34:42Z | 2025-11-12T10:34:42Z |
| suse-su-2025:4072-1 | Security update for containerd | 2025-11-12T10:33:38Z | 2025-11-12T10:33:38Z |
| suse-su-2025:4068-1 | Security update for lasso | 2025-11-12T08:04:16Z | 2025-11-12T08:04:16Z |
| suse-su-2025:4067-1 | Security update for openssh | 2025-11-12T08:03:27Z | 2025-11-12T08:03:27Z |
| suse-su-2025:4064-1 | Security update for the Linux Kernel (Live Patch 60 for SUSE Linux Enterprise 15 SP3) | 2025-11-12T02:35:06Z | 2025-11-12T02:35:06Z |
| suse-su-2025:4063-1 | Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP6) | 2025-11-12T02:34:57Z | 2025-11-12T02:34:57Z |
| suse-su-2025:4062-1 | Security update for the Linux Kernel (Live Patch 29 for SUSE Linux Enterprise 15 SP5) | 2025-11-11T18:36:41Z | 2025-11-11T18:36:41Z |
| suse-su-2025:4059-1 | Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5) | 2025-11-11T18:36:30Z | 2025-11-11T18:36:30Z |
| suse-su-2025:4058-1 | Security update for the Linux Kernel (Live Patch 71 for SUSE Linux Enterprise 12 SP5) | 2025-11-11T18:36:17Z | 2025-11-11T18:36:17Z |
| suse-su-2025:4057-1 | Security update for the Linux Kernel | 2025-11-11T18:36:09Z | 2025-11-11T18:36:09Z |
| suse-su-2025:4056-1 | Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP7) | 2025-11-11T18:35:25Z | 2025-11-11T18:35:25Z |
| suse-su-2025:3681-1 | Security update for go1.25 | 2025-11-11T18:34:57Z | 2025-11-11T18:34:57Z |
| suse-su-2025:4054-1 | Security update for ongres-scram | 2025-11-11T14:04:30Z | 2025-11-11T14:04:30Z |
| suse-su-2025:4053-1 | Security update for qatengine, qatlib | 2025-11-11T13:46:58Z | 2025-11-11T13:46:58Z |
| suse-su-2025:4050-1 | Security update for the Linux Kernel (Live Patch 25 for SUSE Linux Enterprise 15 SP5) | 2025-11-11T09:33:48Z | 2025-11-11T09:33:48Z |
| suse-su-2025:4043-1 | Security update for the Linux Kernel (Live Patch 20 for SUSE Linux Enterprise 15 SP5) | 2025-11-11T07:03:50Z | 2025-11-11T07:03:50Z |
| suse-su-2025:4046-1 | Security update for the Linux Kernel (Live Patch 43 for SUSE Linux Enterprise 15 SP4) | 2025-11-11T02:33:47Z | 2025-11-11T02:33:47Z |
| suse-su-2025:4040-1 | Security update for the Linux Kernel (Live Patch 42 for SUSE Linux Enterprise 15 SP4) | 2025-11-10T19:03:48Z | 2025-11-10T19:03:48Z |
| suse-su-2025:4039-1 | Security update for java-1_8_0-openjdk | 2025-11-10T15:05:07Z | 2025-11-10T15:05:07Z |
| suse-su-2025:21038-1 | Security update for podman | 2025-11-10T14:47:12Z | 2025-11-10T14:47:12Z |
| suse-su-2025:21037-1 | Security update for tiff | 2025-11-10T14:45:27Z | 2025-11-10T14:45:27Z |
| suse-su-2025:21036-1 | Security update for runc | 2025-11-10T14:45:27Z | 2025-11-10T14:45:27Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-03481 | Google Android逻辑错误漏洞(CNVD-2026-0348103) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03480 | Google Android逻辑错误漏洞(CNVD-2026-0348004) | 2025-12-10 | 2026-01-15 |
| cnvd-2026-03479 | Google Android逻辑错误漏洞 | 2025-12-10 | 2026-01-15 |
| cnvd-2026-05019 | TOTOLINK T10缓冲区溢出漏洞 | 2025-12-25 | 2026-01-14 |
| cnvd-2026-05014 | Tenda WH450 goform/PPTPUserSetting文件缓冲区溢出漏洞 | 2026-01-09 | 2026-01-14 |
| cnvd-2026-04916 | Land Record System /aboutus.php文件SQL注入漏洞 | 2025-05-14 | 2026-01-14 |
| cnvd-2026-04133 | Online Security Guards Hiring System search-request.php文件跨站点脚本漏洞 | 2023-02-09 | 2026-01-14 |
| cnvd-2026-04132 | Men Salon Management System index.php组件SQL注入漏洞 | 2024-04-10 | 2026-01-14 |
| cnvd-2026-04131 | Men Salon Management System index.php文件SQL注入漏洞 | 2024-05-30 | 2026-01-14 |
| cnvd-2026-03478 | Land Record System admin-profile.php文件跨站脚本漏洞 | 2025-01-06 | 2026-01-14 |
| cnvd-2026-03477 | Land Record System aboutus.php文件跨站脚本漏洞 | 2025-01-07 | 2026-01-14 |
| cnvd-2026-03476 | Land Record System property-details.php文件SQL注入漏洞 | 2025-01-07 | 2026-01-14 |
| cnvd-2026-03475 | Land Record System contactus.php文件跨站脚本漏洞 | 2025-01-07 | 2026-01-14 |
| cnvd-2026-03474 | Land Record System login.php文件SQL注入漏洞 | 2025-01-07 | 2026-01-14 |
| cnvd-2026-03473 | Land Record System /index.php文件SQL注入漏洞 | 2025-01-07 | 2026-01-14 |
| cnvd-2026-03472 | Land Record System edit-propertytype.php文件跨站脚本漏洞 | 2025-01-07 | 2026-01-14 |
| cnvd-2026-03471 | Land Record System search-property.php文件SQL注入漏洞 | 2025-01-07 | 2026-01-14 |
| cnvd-2026-03470 | Land Record System search-property.php文件跨站脚本漏洞 | 2025-01-07 | 2026-01-14 |
| cnvd-2026-03469 | Land Record System add-property.php文件跨站脚本漏洞 | 2025-01-07 | 2026-01-14 |
| cnvd-2026-03468 | Land Record System /index.php文件跨站脚本漏洞 | 2025-01-10 | 2026-01-14 |
| cnvd-2026-03467 | Land Record System contactus.php文件跨站脚本漏洞 | 2025-01-21 | 2026-01-14 |
| cnvd-2026-03466 | Land Record System manage-propertytype.php文件SQL注入漏洞 | 2025-02-18 | 2026-01-14 |
| cnvd-2026-03188 | Land Record System forgot-password.php文件SQL注入漏洞 | 2025-02-18 | 2026-01-14 |
| cnvd-2026-03187 | Land Record System edit-propertytype.php文件SQL注入漏洞 | 2025-02-18 | 2026-01-14 |
| cnvd-2026-03186 | Land Record System /contactus.php文件SQL注入漏洞 | 2025-02-18 | 2026-01-14 |
| cnvd-2026-03185 | Land Record System todate参数SQL注入漏洞 | 2025-02-18 | 2026-01-14 |
| cnvd-2026-03184 | Land Record System bwdates-reports-details.php文件SQL注入漏洞 | 2025-02-18 | 2026-01-14 |
| cnvd-2026-03183 | Land Record System admin-profile.php文件SQL注入漏洞 | 2025-02-18 | 2026-01-14 |
| cnvd-2026-03165 | Online Security Guards Hiring System search-request.php文件SQL注入漏洞 | 2025-03-27 | 2026-01-14 |
| cnvd-2026-03164 | Online Security Guards Hiring System bwdates-reports-details.php文件SQL注入漏洞 | 2025-03-27 | 2026-01-14 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2025-AVI-0937 | Multiples vulnérabilités dans Google Chrome | 2025-10-30T00:00:00.000000 | 2025-10-30T00:00:00.000000 |
| certfr-2025-avi-0935 | Multiples vulnérabilités dans les produits VMware | 2025-10-29T00:00:00.000000 | 2025-10-29T00:00:00.000000 |
| certfr-2025-avi-0934 | Vulnérabilité dans les produits Mozilla | 2025-10-29T00:00:00.000000 | 2025-10-29T00:00:00.000000 |
| CERTFR-2025-AVI-0935 | Multiples vulnérabilités dans les produits VMware | 2025-10-29T00:00:00.000000 | 2025-10-29T00:00:00.000000 |
| CERTFR-2025-AVI-0934 | Vulnérabilité dans les produits Mozilla | 2025-10-29T00:00:00.000000 | 2025-10-29T00:00:00.000000 |
| certfr-2025-avi-0933 | Multiples vulnérabilités dans Apache Tomcat | 2025-10-28T00:00:00.000000 | 2025-10-28T00:00:00.000000 |
| certfr-2025-avi-0932 | Multiples vulnérabilités dans Liferay | 2025-10-28T00:00:00.000000 | 2025-10-28T00:00:00.000000 |
| certfr-2025-avi-0931 | Vulnérabilité dans StrongSwan | 2025-10-28T00:00:00.000000 | 2025-10-28T00:00:00.000000 |
| CERTFR-2025-AVI-0933 | Multiples vulnérabilités dans Apache Tomcat | 2025-10-28T00:00:00.000000 | 2025-10-28T00:00:00.000000 |
| CERTFR-2025-AVI-0932 | Multiples vulnérabilités dans Liferay | 2025-10-28T00:00:00.000000 | 2025-10-28T00:00:00.000000 |
| CERTFR-2025-AVI-0931 | Vulnérabilité dans StrongSwan | 2025-10-28T00:00:00.000000 | 2025-10-28T00:00:00.000000 |
| certfr-2025-avi-0930 | Vulnérabilité dans Microsoft Windows Server Update Service | 2025-10-27T00:00:00.000000 | 2025-10-27T00:00:00.000000 |
| certfr-2025-avi-0929 | Vulnérabilité dans le client VPN de TheGreenBow | 2025-10-27T00:00:00.000000 | 2025-10-27T00:00:00.000000 |
| certfr-2025-avi-0928 | Vulnérabilité dans Microsoft Configuration Manager | 2025-10-27T00:00:00.000000 | 2025-10-27T00:00:00.000000 |
| certfr-2025-avi-0927 | Vulnérabilité dans Xen | 2025-10-27T00:00:00.000000 | 2025-10-27T00:00:00.000000 |
| certfr-2025-avi-0926 | Vulnérabilité dans le pilote ODBC de MongoDB | 2025-10-27T00:00:00.000000 | 2025-10-27T00:00:00.000000 |
| certfr-2025-avi-0925 | Vulnérabilité dans les produits Belden | 2025-10-27T00:00:00.000000 | 2025-10-27T00:00:00.000000 |
| CERTFR-2025-AVI-0930 | Vulnérabilité dans Microsoft Windows Server Update Service | 2025-10-27T00:00:00.000000 | 2025-10-27T00:00:00.000000 |
| CERTFR-2025-AVI-0929 | Vulnérabilité dans le client VPN de TheGreenBow | 2025-10-27T00:00:00.000000 | 2025-10-27T00:00:00.000000 |
| CERTFR-2025-AVI-0928 | Vulnérabilité dans Microsoft Configuration Manager | 2025-10-27T00:00:00.000000 | 2025-10-27T00:00:00.000000 |
| CERTFR-2025-AVI-0927 | Vulnérabilité dans Xen | 2025-10-27T00:00:00.000000 | 2025-10-27T00:00:00.000000 |
| CERTFR-2025-AVI-0926 | Vulnérabilité dans le pilote ODBC de MongoDB | 2025-10-27T00:00:00.000000 | 2025-10-27T00:00:00.000000 |
| CERTFR-2025-AVI-0925 | Vulnérabilité dans les produits Belden | 2025-10-27T00:00:00.000000 | 2025-10-27T00:00:00.000000 |
| certfr-2025-avi-0924 | Multiples vulnérabilités dans les produits IBM | 2025-10-24T00:00:00.000000 | 2025-10-24T00:00:00.000000 |
| certfr-2025-avi-0923 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-10-24T00:00:00.000000 | 2025-10-24T00:00:00.000000 |
| certfr-2025-avi-0922 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-10-24T00:00:00.000000 | 2025-10-24T00:00:00.000000 |
| certfr-2025-avi-0921 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-10-24T00:00:00.000000 | 2025-10-24T00:00:00.000000 |
| certfr-2025-avi-0920 | Multiples vulnérabilités dans les produits Microsoft | 2025-10-24T00:00:00.000000 | 2025-10-24T00:00:00.000000 |
| certfr-2025-avi-0919 | Multiples vulnérabilités dans Microsoft Azure | 2025-10-24T00:00:00.000000 | 2025-10-24T00:00:00.000000 |
| certfr-2025-avi-0918 | Multiples vulnérabilités dans Liferay | 2025-10-24T00:00:00.000000 | 2025-10-24T00:00:00.000000 |