Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-3739 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
suitenumerique messages ThreadAccess serializers.py Th… |
suitenumerique |
messages |
2026-03-08T14:02:09.949Z | 2026-03-08T14:02:09.949Z |
| CVE-2026-3738 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
SourceCodester Pet Grooming Management Software Financ… |
SourceCodester |
Pet Grooming Management Software |
2026-03-08T13:32:11.189Z | 2026-03-08T13:32:11.189Z |
| CVE-2026-3737 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
SourceCodester Pet Grooming Management Software User C… |
SourceCodester |
Pet Grooming Management Software |
2026-03-08T13:32:08.172Z | 2026-03-08T13:32:08.172Z |
| CVE-2026-3736 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Simple Flight Ticket Booking System Sear… |
code-projects |
Simple Flight Ticket Booking System |
2026-03-08T13:02:13.187Z | 2026-03-08T13:02:13.187Z |
| CVE-2026-3735 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Simple Flight Ticket Booking System Sear… |
code-projects |
Simple Flight Ticket Booking System |
2026-03-08T13:02:11.006Z | 2026-03-08T13:02:11.006Z |
| CVE-2026-3734 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
SourceCodester Client Database Management System Endpo… |
SourceCodester |
Client Database Management System |
2026-03-08T13:02:08.765Z | 2026-03-08T13:02:08.765Z |
| CVE-2026-3733 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
xuxueli xxl-job JobInfoController.java server-side req… |
xuxueli |
xxl-job |
2026-03-08T11:02:14.508Z | 2026-03-08T11:02:14.508Z |
| CVE-2026-3732 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda F453 exeCommand strcpy stack-based overflow |
Tenda |
F453 |
2026-03-08T11:02:12.070Z | 2026-03-08T11:02:12.070Z |
| CVE-2026-3731 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
libssh SFTP Extension Name sftp.c sftp_extensions_get_… |
n/a |
libssh |
2026-03-08T10:32:19.482Z | 2026-03-08T10:32:19.482Z |
| CVE-2026-3730 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
itsourcecode Free Hotel Reservation System index.php s… |
itsourcecode |
Free Hotel Reservation System |
2026-03-08T10:32:15.574Z | 2026-03-08T10:32:15.574Z |
| CVE-2026-3729 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda F453 PPTPDClient fromPptpUserAdd stack-based overflow |
Tenda |
F453 |
2026-03-08T10:32:12.133Z | 2026-03-08T10:32:12.133Z |
| CVE-2026-23238 |
N/A
|
romfs: check sb_set_blocksize() return value |
Linux |
Linux |
2026-03-04T14:38:42.477Z | 2026-03-08T10:07:34.991Z |
| CVE-2026-23237 |
N/A
|
platform/x86: classmate-laptop: Add missing NULL point… |
Linux |
Linux |
2026-03-04T14:38:41.815Z | 2026-03-08T10:07:33.737Z |
| CVE-2026-23236 |
N/A
|
fbdev: smscufx: properly copy ioctl memory to kernelspace |
Linux |
Linux |
2026-03-04T14:36:40.162Z | 2026-03-08T10:07:32.631Z |
| CVE-2025-71238 |
N/A
|
scsi: qla2xxx: Fix bsg_done() causing double free |
Linux |
Linux |
2026-03-04T14:36:36.579Z | 2026-03-08T10:07:31.408Z |
| CVE-2026-3728 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda F453 setcfm fromSetCfm stack-based overflow |
Tenda |
F453 |
2026-03-08T10:02:12.254Z | 2026-03-08T10:02:12.254Z |
| CVE-2026-3727 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda F453 QuickIndex sub_3C6C0 stack-based overflow |
Tenda |
F453 |
2026-03-08T10:02:08.926Z | 2026-03-08T10:02:08.926Z |
| CVE-1999-0073 |
N/A
|
Telnet allows a remote client to specify environm… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2026-03-08T09:06:54.428Z |
| CVE-2026-3726 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda F453 webExcptypemanFilter fromwebExcptypemanFilt… |
Tenda |
F453 |
2026-03-08T09:02:13.663Z | 2026-03-08T09:02:13.663Z |
| CVE-2026-3725 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
1024-lab/lab1024 SmartAdmin FreeMarker Template MailSe… |
1024-lab |
SmartAdmin |
2026-03-08T09:02:08.086Z | 2026-03-08T09:02:08.086Z |
| CVE-2026-3724 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
SourceCodester Patients Waiting Area Queue Management … |
SourceCodester |
Patients Waiting Area Queue Management System |
2026-03-08T08:32:10.672Z | 2026-03-08T08:32:10.672Z |
| CVE-2026-3723 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Simple Flight Ticket Booking System Admi… |
code-projects |
Simple Flight Ticket Booking System |
2026-03-08T08:32:07.610Z | 2026-03-08T08:32:07.610Z |
| CVE-2026-3721 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
1024-lab/lab1024 SmartAdmin Help Documentation HelpDoc… |
1024-lab |
SmartAdmin |
2026-03-08T07:32:07.430Z | 2026-03-08T07:32:07.430Z |
| CVE-2026-3209 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
fosrl Pangolin Role verifyApiKeyRoleAccess access control |
fosrl |
Pangolin |
2026-02-25T23:02:10.115Z | 2026-03-08T07:06:50.150Z |
| CVE-2026-3720 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
1024-lab/lab1024 SmartAdmin Notice notice-form-drawer.… |
1024-lab |
SmartAdmin |
2026-03-08T07:02:13.355Z | 2026-03-08T07:02:13.355Z |
| CVE-2026-3719 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Tsinghua Unigroup Electronic Archives System downLoad … |
Tsinghua Unigroup |
Electronic Archives System |
2026-03-08T07:02:11.069Z | 2026-03-08T07:02:11.069Z |
| CVE-2026-3716 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
Wavlink WL-WN579X3-C adm.cgi sub_401AD4 cross site scripting |
Wavlink |
WL-WN579X3-C |
2026-03-08T07:02:08.804Z | 2026-03-08T07:02:08.804Z |
| CVE-2026-3695 |
6.9 (4.0)
6.5 (3.1)
6.5 (3.0)
|
SourceCodester Modern Image Gallery App delete.php pat… |
SourceCodester |
Modern Image Gallery App |
2026-03-08T00:32:10.583Z | 2026-03-08T06:57:38.107Z |
| CVE-2026-3715 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Wavlink WL-WN579X3-C firewall.cgi sub_40139C stack-bas… |
Wavlink |
WL-WN579X3-C |
2026-03-08T06:32:15.382Z | 2026-03-08T06:32:15.382Z |
| CVE-2026-3714 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
OpenCart Incomplete Fix CVE-2024-36694 template.php sa… |
n/a |
OpenCart |
2026-03-08T06:32:06.543Z | 2026-03-08T06:32:06.543Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-3731 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
libssh SFTP Extension Name sftp.c sftp_extensions_get_… |
n/a |
libssh |
2026-03-08T10:32:19.482Z | 2026-03-08T10:32:19.482Z |
| CVE-2026-3730 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
itsourcecode Free Hotel Reservation System index.php s… |
itsourcecode |
Free Hotel Reservation System |
2026-03-08T10:32:15.574Z | 2026-03-08T10:32:15.574Z |
| CVE-2026-3729 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda F453 PPTPDClient fromPptpUserAdd stack-based overflow |
Tenda |
F453 |
2026-03-08T10:32:12.133Z | 2026-03-08T10:32:12.133Z |
| CVE-2026-3728 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda F453 setcfm fromSetCfm stack-based overflow |
Tenda |
F453 |
2026-03-08T10:02:12.254Z | 2026-03-08T10:02:12.254Z |
| CVE-2026-3727 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda F453 QuickIndex sub_3C6C0 stack-based overflow |
Tenda |
F453 |
2026-03-08T10:02:08.926Z | 2026-03-08T10:02:08.926Z |
| CVE-2026-3726 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda F453 webExcptypemanFilter fromwebExcptypemanFilt… |
Tenda |
F453 |
2026-03-08T09:02:13.663Z | 2026-03-08T09:02:13.663Z |
| CVE-2026-3725 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
1024-lab/lab1024 SmartAdmin FreeMarker Template MailSe… |
1024-lab |
SmartAdmin |
2026-03-08T09:02:08.086Z | 2026-03-08T09:02:08.086Z |
| CVE-2026-3724 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
SourceCodester Patients Waiting Area Queue Management … |
SourceCodester |
Patients Waiting Area Queue Management System |
2026-03-08T08:32:10.672Z | 2026-03-08T08:32:10.672Z |
| CVE-2026-3723 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Simple Flight Ticket Booking System Admi… |
code-projects |
Simple Flight Ticket Booking System |
2026-03-08T08:32:07.610Z | 2026-03-08T08:32:07.610Z |
| CVE-1999-0073 |
N/A
|
Telnet allows a remote client to specify environm… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2026-03-08T09:06:54.428Z |
| CVE-2026-3721 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
1024-lab/lab1024 SmartAdmin Help Documentation HelpDoc… |
1024-lab |
SmartAdmin |
2026-03-08T07:32:07.430Z | 2026-03-08T07:32:07.430Z |
| CVE-2026-3720 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
1024-lab/lab1024 SmartAdmin Notice notice-form-drawer.… |
1024-lab |
SmartAdmin |
2026-03-08T07:02:13.355Z | 2026-03-08T07:02:13.355Z |
| CVE-2026-3719 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Tsinghua Unigroup Electronic Archives System downLoad … |
Tsinghua Unigroup |
Electronic Archives System |
2026-03-08T07:02:11.069Z | 2026-03-08T07:02:11.069Z |
| CVE-2026-3716 |
4.8 (4.0)
2.4 (3.1)
2.4 (3.0)
|
Wavlink WL-WN579X3-C adm.cgi sub_401AD4 cross site scripting |
Wavlink |
WL-WN579X3-C |
2026-03-08T07:02:08.804Z | 2026-03-08T07:02:08.804Z |
| CVE-2026-3209 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
fosrl Pangolin Role verifyApiKeyRoleAccess access control |
fosrl |
Pangolin |
2026-02-25T23:02:10.115Z | 2026-03-08T07:06:50.150Z |
| CVE-2026-3715 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Wavlink WL-WN579X3-C firewall.cgi sub_40139C stack-bas… |
Wavlink |
WL-WN579X3-C |
2026-03-08T06:32:15.382Z | 2026-03-08T06:32:15.382Z |
| CVE-2026-3714 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
OpenCart Incomplete Fix CVE-2024-36694 template.php sa… |
n/a |
OpenCart |
2026-03-08T06:32:06.543Z | 2026-03-08T06:32:06.543Z |
| CVE-2026-3713 |
4.8 (4.0)
5.3 (3.1)
5.3 (3.0)
|
pnggroup libpng pnm2png pnm2png.c do_pnm2png heap-base… |
pnggroup |
libpng |
2026-03-08T06:02:11.204Z | 2026-03-08T06:02:11.204Z |
| CVE-2026-3711 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
code-projects Simple Flight Ticket Booking System Admi… |
code-projects |
Simple Flight Ticket Booking System |
2026-03-08T06:02:08.116Z | 2026-03-08T06:02:08.116Z |
| CVE-2026-3710 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
code-projects Simple Flight Ticket Booking System Admi… |
code-projects |
Simple Flight Ticket Booking System |
2026-03-08T05:32:10.455Z | 2026-03-08T05:32:10.455Z |
| CVE-2026-3709 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Simple Flight Ticket Booking System regi… |
code-projects |
Simple Flight Ticket Booking System |
2026-03-08T05:32:08.238Z | 2026-03-08T05:32:08.238Z |
| CVE-2026-3708 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Simple Flight Ticket Booking System logi… |
code-projects |
Simple Flight Ticket Booking System |
2026-03-08T05:02:17.627Z | 2026-03-08T05:02:17.627Z |
| CVE-2026-3707 |
4.8 (4.0)
5.3 (3.1)
5.3 (3.0)
|
MrNanko webp4j gif_decoder.c DecodeGifFromMemory integ… |
MrNanko |
webp4j |
2026-03-08T05:02:15.404Z | 2026-03-08T05:02:15.404Z |
| CVE-2026-3706 |
6.3 (4.0)
3.7 (3.1)
3.7 (3.0)
|
mkj Dropbear S Range Check curve25519.c unpackneg sign… |
mkj |
Dropbear |
2026-03-08T05:02:11.136Z | 2026-03-08T05:02:11.136Z |
| CVE-2026-3705 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
code-projects Simple Flight Ticket Booking System Admi… |
code-projects |
Simple Flight Ticket Booking System |
2026-03-08T04:32:11.522Z | 2026-03-08T04:32:11.522Z |
| CVE-2026-3703 |
9.3 (4.0)
9.8 (3.1)
9.8 (3.0)
|
Wavlink NU516U1 login.cgi sub_401A10 out-of-bounds write |
Wavlink |
NU516U1 |
2026-03-08T04:32:09.200Z | 2026-03-08T04:32:09.200Z |
| CVE-2026-3702 |
5.3 (4.0)
4.3 (3.1)
4.3 (3.0)
|
SourceCodester Loan Management System index.php cross … |
SourceCodester |
Loan Management System |
2026-03-08T04:02:10.269Z | 2026-03-08T04:02:10.269Z |
| CVE-2026-3701 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
H3C Magic B1 aspForm Edit_BasicSSID_5G buffer overflow |
H3C |
Magic B1 |
2026-03-08T04:02:07.795Z | 2026-03-08T04:02:07.795Z |
| CVE-2026-30910 |
N/A
|
Crypt::Sodium::XS versions through 0.001000 for Perl h… |
IAMB |
Crypt::Sodium::XS |
2026-03-08T00:54:56.404Z | 2026-03-08T04:33:15.988Z |
| CVE-2026-30909 |
N/A
|
Crypt::NaCl::Sodium versions through 2.002 for Perl ha… |
TIMLEGGE |
Crypt::NaCl::Sodium |
2026-03-08T00:46:12.862Z | 2026-03-08T04:33:14.855Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-3382 | A security flaw has been discovered in ChaiScript up to 6.1.0. The impacted element is the function… | 2026-03-01T06:15:58.750 | 2026-03-01T06:15:58.750 |
| fkie_cve-2026-3380 | A vulnerability was found in Tenda F453 1.0.0.3. This issue affects the function frmL7ImForm of the… | 2026-03-01T04:16:01.890 | 2026-03-01T04:16:01.890 |
| fkie_cve-2026-3379 | A vulnerability has been found in Tenda F453 1.0.0.3. This vulnerability affects the function fromS… | 2026-03-01T03:16:16.743 | 2026-03-01T03:16:16.743 |
| fkie_cve-2026-3378 | A flaw has been found in Tenda F453 1.0.0.3. This affects the function fromqossetting of the file /… | 2026-03-01T03:16:15.103 | 2026-03-01T03:16:15.103 |
| fkie_cve-2026-3377 | A vulnerability was detected in Tenda F453 1.0.0.3. Affected by this issue is the function fromSafe… | 2026-03-01T00:16:17.487 | 2026-03-01T00:16:17.487 |
| fkie_cve-2026-3376 | A security vulnerability has been detected in Tenda F453 1.0.0.3. Affected by this vulnerability is… | 2026-02-28T23:16:01.177 | 2026-02-28T23:16:01.177 |
| fkie_cve-2026-28562 | wpForo 2.4.14 contains an unauthenticated SQL injection vulnerability in Topics::get_topics() where… | 2026-02-28T22:16:03.560 | 2026-02-28T22:16:03.560 |
| fkie_cve-2026-28561 | wpForo Forum 2.4.14 contains a stored cross-site scripting vulnerability that allows administrators… | 2026-02-28T22:16:03.347 | 2026-02-28T22:16:03.347 |
| fkie_cve-2026-28560 | wpForo Forum 2.4.14 contains a stored cross-site scripting vulnerability that allows script injecti… | 2026-02-28T22:16:03.137 | 2026-02-28T22:16:03.137 |
| fkie_cve-2026-28559 | wpForo Forum 2.4.14 contains an information disclosure vulnerability that allows unauthenticated us… | 2026-02-28T22:16:02.933 | 2026-02-28T22:16:02.933 |
| fkie_cve-2026-28558 | wpForo Forum 2.4.14 contains a stored cross-site scripting vulnerability that allows authenticated … | 2026-02-28T22:16:02.637 | 2026-02-28T22:16:02.637 |
| fkie_cve-2026-28557 | wpForo Forum 2.4.14 contains a missing capability check vulnerability that allows authenticated use… | 2026-02-28T22:16:02.427 | 2026-02-28T22:16:02.427 |
| fkie_cve-2026-28556 | wpForo Forum 2.4.14 contains a missing authorization vulnerability that allows authenticated subscr… | 2026-02-28T22:16:02.220 | 2026-02-28T22:16:02.220 |
| fkie_cve-2026-28555 | wpForo Forum 2.4.14 contains a missing authorization vulnerability that allows authenticated subscr… | 2026-02-28T22:16:02.010 | 2026-02-28T22:16:02.010 |
| fkie_cve-2026-28554 | wpForo Forum 2.4.14 contains a missing authorization vulnerability that allows authenticated subscr… | 2026-02-28T22:16:00.927 | 2026-02-28T22:16:00.927 |
| fkie_cve-2025-15581 | Orthanc versions before 1.12.10 are affected by an authorisation logic flaw in the application's HT… | 2026-02-18T23:16:18.907 | 2026-02-28T18:16:01.240 |
| fkie_cve-2026-3010 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-02-28T12:16:39.317 | 2026-02-28T12:16:39.317 |
| fkie_cve-2026-2844 | Missing Authentication for Critical Function vulnerability in Microchip TimePictra allows Configura… | 2026-02-28T12:16:37.713 | 2026-02-28T12:16:37.713 |
| fkie_cve-2025-13673 | The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to SQL Inje… | 2026-02-28T08:15:58.317 | 2026-02-28T08:15:58.317 |
| fkie_cve-2026-2471 | The WP Mail Logging plugin for WordPress is vulnerable to PHP Object Injection in all versions up t… | 2026-02-28T07:15:57.677 | 2026-02-28T07:15:57.677 |
| fkie_cve-2026-1542 | The Super Stage WP WordPress plugin through 1.0.1 unserializes user input via REQUEST, which could … | 2026-02-28T06:16:02.080 | 2026-02-28T06:16:02.080 |
| fkie_cve-2026-2791 | Mitigation bypass in the Networking: Cache component. This vulnerability affects Firefox < 148, Fir… | 2026-02-24T14:16:27.580 | 2026-02-28T04:16:19.447 |
| fkie_cve-2026-2788 | Incorrect boundary conditions in the Audio/Video: GMP component. This vulnerability affects Firefox… | 2026-02-24T14:16:27.260 | 2026-02-28T04:16:19.250 |
| fkie_cve-2026-2784 | Mitigation bypass in the DOM: Security component. This vulnerability affects Firefox < 148, Firefox… | 2026-02-24T14:16:26.847 | 2026-02-28T04:16:19.063 |
| fkie_cve-2026-2779 | Incorrect boundary conditions in the Networking: JAR component. This vulnerability affects Firefox … | 2026-02-24T14:16:26.330 | 2026-02-28T04:16:18.877 |
| fkie_cve-2026-2778 | Sandbox escape due to incorrect boundary conditions in the DOM: Core & HTML component. This vulnera… | 2026-02-24T14:16:26.230 | 2026-02-28T04:16:18.683 |
| fkie_cve-2026-2776 | Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software… | 2026-02-24T14:16:26.023 | 2026-02-28T04:16:18.490 |
| fkie_cve-2026-2775 | Mitigation bypass in the DOM: HTML Parser component. This vulnerability affects Firefox < 148, Fire… | 2026-02-24T14:16:25.917 | 2026-02-28T04:16:18.283 |
| fkie_cve-2025-69971 | FUXA v1.2.7 contains a hard-coded credential vulnerability in server/api/jwt-helper.js. The applica… | 2026-02-03T18:16:17.370 | 2026-02-28T04:16:17.690 |
| fkie_cve-2025-69421 | Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer dereference in the PK… | 2026-01-27T16:16:34.437 | 2026-02-28T04:16:17.457 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-ghxx-f98c-rf6v |
3.5 (3.1)
2.0 (4.0)
|
A security flaw has been discovered in 1024-lab/lab1024 SmartAdmin up to 3.29. Impacted is an unkno… | 2026-03-08T09:30:21Z | 2026-03-08T09:30:21Z |
| ghsa-987x-fj9w-984x |
6.3 (3.1)
2.1 (4.0)
|
A weakness has been identified in SourceCodester Patients Waiting Area Queue Management System 1.0.… | 2026-03-08T09:30:21Z | 2026-03-08T09:30:21Z |
| ghsa-3vhr-rrhf-p2mj |
6.3 (3.1)
2.1 (4.0)
|
A flaw has been found in 1024-lab/lab1024 SmartAdmin up to 3.29. Affected by this issue is the func… | 2026-03-08T09:30:21Z | 2026-03-08T09:30:21Z |
| ghsa-jv85-6mgr-3w99 |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability has been found in fosrl Pangolin up to 1.15.4-s.3. This affects the function verify… | 2026-02-26T00:31:24Z | 2026-03-08T09:30:20Z |
| ghsa-hf5c-9m3r-mqv2 |
2.4 (3.1)
1.9 (4.0)
|
A vulnerability was determined in Wavlink WL-WN579X3-C 231124. This vulnerability affects the funct… | 2026-03-08T09:30:20Z | 2026-03-08T09:30:20Z |
| ghsa-g7xr-56w3-vjqh |
|
Telnet allows a remote client to specify environment variables including LD_LIBRARY_PATH, allowing … | 2022-04-30T18:09:55Z | 2026-03-08T09:30:20Z |
| ghsa-7hf8-hqfw-77qp |
8.8 (3.1)
7.4 (4.0)
|
A vulnerability was found in Wavlink WL-WN579X3-C 231124. This affects the function sub_40139C of t… | 2026-03-08T09:30:20Z | 2026-03-08T09:30:20Z |
| ghsa-6j4x-4j9g-2875 |
4.7 (3.1)
5.1 (4.0)
|
A vulnerability has been found in OpenCart 4.0.2.3. Affected by this issue is the function Save of … | 2026-03-08T09:30:20Z | 2026-03-08T09:30:20Z |
| ghsa-vhg7-ppx8-v8hh |
5.3 (3.1)
1.9 (4.0)
|
A vulnerability was identified in MrNanko webp4j up to 1.3.x. The affected element is the function … | 2026-03-08T06:31:10Z | 2026-03-08T06:31:10Z |
| ghsa-vfcc-w7fg-428q |
7.3 (3.1)
5.5 (4.0)
|
A security flaw has been discovered in code-projects Simple Flight Ticket Booking System 1.0. The i… | 2026-03-08T06:31:10Z | 2026-03-08T06:31:10Z |
| ghsa-fjh9-gh6f-c72j |
7.3 (3.1)
5.5 (4.0)
|
A weakness has been identified in code-projects Simple Flight Ticket Booking System 1.0. This affec… | 2026-03-08T06:31:10Z | 2026-03-08T06:31:10Z |
| ghsa-fgc7-hpwc-cmc9 |
5.3 (3.1)
1.9 (4.0)
|
A flaw has been found in pnggroup libpng up to 1.6.55. Affected by this vulnerability is the functi… | 2026-03-08T06:31:10Z | 2026-03-08T06:31:10Z |
| ghsa-9p2q-g4qr-25v6 |
4.7 (3.1)
2.0 (4.0)
|
A security vulnerability has been detected in code-projects Simple Flight Ticket Booking System 1.0… | 2026-03-08T06:31:10Z | 2026-03-08T06:31:10Z |
| ghsa-87g2-jprq-4cmc |
3.7 (3.1)
2.9 (4.0)
|
A vulnerability was determined in mkj Dropbear up to 2025.89. Impacted is the function unpackneg of… | 2026-03-08T06:31:10Z | 2026-03-08T06:31:10Z |
| ghsa-6rfc-r3c7-7f5j |
9.8 (3.1)
8.9 (4.0)
|
A flaw has been found in Wavlink NU516U1 251208. This affects the function sub_401A10 of the file /… | 2026-03-08T06:31:10Z | 2026-03-08T06:31:10Z |
| ghsa-5q8f-ww77-376j |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was found in code-projects Simple Flight Ticket Booking System 1.0. This issue affe… | 2026-03-08T06:31:10Z | 2026-03-08T06:31:10Z |
| ghsa-52w5-q3hg-34x8 |
4.7 (3.1)
2.0 (4.0)
|
A vulnerability was detected in code-projects Simple Flight Ticket Booking System 1.0. Affected is … | 2026-03-08T06:31:10Z | 2026-03-08T06:31:10Z |
| ghsa-v25j-jp29-j537 |
4.7 (3.1)
2.0 (4.0)
|
A vulnerability has been found in Wavlink NU516U1 251208. This vulnerability affects the function s… | 2026-03-08T06:31:09Z | 2026-03-08T06:31:09Z |
| ghsa-qqmj-w4wh-9w2h |
|
Crypt::NaCl::Sodium versions through 2.002 for Perl has potential integer overflows. bin2hex, encr… | 2026-03-08T03:30:28Z | 2026-03-08T06:31:09Z |
| ghsa-p7fh-2w6p-fwr9 |
4.3 (3.1)
2.1 (4.0)
|
A vulnerability was detected in SourceCodester Loan Management System 1.0. Affected by this issue i… | 2026-03-08T06:31:09Z | 2026-03-08T06:31:09Z |
| ghsa-fwrh-mrwr-7c4f |
8.8 (3.1)
7.4 (4.0)
|
A security vulnerability has been detected in H3C Magic B1 up to 100R004. Affected by this vulnerab… | 2026-03-08T06:31:09Z | 2026-03-08T06:31:09Z |
| ghsa-2qjg-jrhf-99vr |
|
Crypt::Sodium::XS versions through 0.001000 for Perl has potential integer overflows. Combined aea… | 2026-03-08T03:30:28Z | 2026-03-08T06:31:09Z |
| ghsa-wc73-5vxp-xx43 |
8.8 (3.1)
7.4 (4.0)
|
A security flaw has been discovered in UTT HiPER 810G up to 1.7.7-171114. This impacts the function… | 2026-03-08T03:30:28Z | 2026-03-08T03:30:28Z |
| ghsa-mxxm-7p9v-jm2c |
8.8 (3.1)
7.4 (4.0)
|
A vulnerability was identified in UTT HiPER 810G up to 1.7.7-171114. This affects the function strc… | 2026-03-08T03:30:28Z | 2026-03-08T03:30:28Z |
| ghsa-hff3-38mc-m39m |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was determined in Planet ICG-2510 1.0_20250811. The impacted element is the functio… | 2026-03-08T03:30:28Z | 2026-03-08T03:30:28Z |
| ghsa-gf2c-cq33-9pf7 |
8.8 (3.1)
7.4 (4.0)
|
A weakness has been identified in UTT HiPER 810G up to 1.7.7-171114. Affected is the function strcp… | 2026-03-08T03:30:28Z | 2026-03-08T03:30:28Z |
| ghsa-g54x-w5rq-2789 |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability was found in Totolink N300RH 6..1c.1353_B20190305. The affected element is the func… | 2026-03-08T03:30:28Z | 2026-03-08T03:30:28Z |
| ghsa-frqp-x7gx-64vp |
7.3 (3.1)
5.5 (4.0)
|
A flaw has been found in Shy2593666979 AgentChat up to 2.3.0. This issue affects the function get_u… | 2026-03-08T03:30:28Z | 2026-03-08T03:30:28Z |
| ghsa-8hfg-9c72-535r |
6.5 (3.1)
5.5 (4.0)
|
A vulnerability has been found in SourceCodester Modern Image Gallery App 1.0. Impacted is an unkno… | 2026-03-08T03:30:28Z | 2026-03-08T03:30:28Z |
| ghsa-w5v4-r6mh-235c |
6.5 (3.1)
6.0 (4.0)
|
A vulnerability in the SSH server of TP-Link TL-WR820N v2.80 allows the use of a weak cryptographic… | 2025-12-29T21:30:25Z | 2026-03-08T03:30:27Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-111 |
9.1 (3.1)
|
A path traversal vulnerability exists in the `getFullPath` method of langchain-ai/langcha… | langchain | 2024-10-29T13:15:00Z | 2025-05-02T18:39:47.588215Z |
| pysec-2024-245 |
|
Apache Airflow, versions before 2.8.2, has a vulnerability that allows authenticated user… | apache-airflow | 2024-02-29T11:15:08+00:00 | 2025-05-01T21:22:38.598048+00:00 |
| pysec-2025-35 |
7.5 (3.1)
|
Weblate is a web based localization tool. Prior to version 5.11, when creating a new comp… | weblate | 2025-04-15T21:16:04+00:00 | 2025-04-30T17:22:51.467257+00:00 |
| pysec-2025-34 |
|
The unsafe globals in Picklescan before 0.0.25 do not include ssl. Consequently, ssl.get_… | picklescan | 2025-04-24T01:15:49+00:00 | 2025-04-24T03:08:15.436691+00:00 |
| pysec-2025-33 |
7.5 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the EVM. When the Vyper Compiler uses the… | vyper | 2025-01-14T18:16:05+00:00 | 2025-04-23T21:23:01.322686+00:00 |
| pysec-2025-32 |
9.8 (3.1)
|
BentoML is a Python library for building online serving systems optimized for AI apps and… | bentoml | 2025-04-09T16:15:25+00:00 | 2025-04-22T19:21:34.073355+00:00 |
| pysec-2025-31 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Vyper handles AugAssign statemen… | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.116292+00:00 |
| pysec-2025-30 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Multiple evaluation of a single … | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.064106+00:00 |
| pysec-2025-29 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Vyper `sqrt()` builtin uses the … | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.005382+00:00 |
| pysec-2025-28 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.772920+00:00 |
| pysec-2025-27 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.711157+00:00 |
| pysec-2025-26 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.645758+00:00 |
| pysec-2025-25 |
6.5 (3.1)
|
Rembg is a tool to remove images background. In Rembg 2.0.57 and earlier, the CORS middle… | rembg | 2025-03-03T17:15:14+00:00 | 2025-04-09T17:27:27.532849+00:00 |
| pysec-2025-24 |
7.5 (3.1)
|
Rembg is a tool to remove images background. In Rembg 2.0.57 and earlier, the /api/remove… | rembg | 2025-03-03T17:15:14+00:00 | 2025-04-09T17:27:27.486485+00:00 |
| pysec-2025-23 |
|
Versions of the package ray before 2.43.0 are vulnerable to Insertion of Sensitive Inform… | ray | 2025-03-06T05:15:16+00:00 | 2025-04-09T17:27:27.434099+00:00 |
| pysec-2025-22 |
9.8 (3.1)
|
A vulnerability, that could result in Remote Code Execution (RCE), has been found in Plot… | plotai | 2025-03-10T14:15:24+00:00 | 2025-04-09T17:27:27.203714+00:00 |
| pysec-2025-21 |
9.8 (3.1)
|
picklescan before 0.0.23 fails to detect malicious pickle files inside PyTorch model arch… | picklescan | 2025-03-10T12:15:12+00:00 | 2025-04-09T17:27:27.016747+00:00 |
| pysec-2023-311 |
5.4 (3.1)
|
plone.namedfile allows users to handle `File` and `Image` fields targeting, but not depen… | plone-namedfile | 2023-09-21T15:15:10+00:00 | 2025-04-09T17:27:27.153848+00:00 |
| pysec-2022-43179 |
7.3 (3.1)
|
Poetry is a dependency manager for Python. To handle dependencies that come from a Git re… | poetry | 2022-09-07T19:15:08+00:00 | 2025-04-09T17:27:27.255151+00:00 |
| pysec-2021-891 |
7.8 (3.1)
|
CWE - CWE-287: Improper Authentication vulnerability in SUSE Linux Enterprise Server 15 S… | salt | 2021-03-03T10:15:13+00:00 | 2025-04-09T17:27:27.582884+00:00 |
| pysec-2025-20 |
6.5 (3.1)
|
picklescan before 0.0.23 is vulnerable to a ZIP archive manipulation attack that causes i… | picklescan | 2025-03-10T12:15:10+00:00 | 2025-04-09T17:27:26.966215+00:00 |
| pysec-2025-19 |
9.8 (3.1)
|
picklescan before 0.0.22 only considers standard pickle file extensions in the scope for … | picklescan | 2025-03-03T19:15:34+00:00 | 2025-04-09T17:27:26.916350+00:00 |
| pysec-2025-18 |
|
picklescan before 0.0.21 does not treat 'pip' as an unsafe global. An attacker could craf… | picklescan | 2025-02-26T15:15:24+00:00 | 2025-04-09T17:27:26.867210+00:00 |
| pysec-2025-17 |
5.5 (3.1)
|
In mlflow/mlflow version 2.18, an admin is able to create a new user account without sett… | mlflow | 2025-03-20T10:15:54+00:00 | 2025-04-09T17:27:26.322333+00:00 |
| pysec-2023-310 |
7.5 (3.1)
|
Mobile Security Framework (MobSF) <=v3.7.8 Beta is vulnerable to Insecure Permissions. NO… | mobsf | 2023-09-21T22:15:11+00:00 | 2025-04-09T17:27:26.663665+00:00 |
| pysec-2023-309 |
8.8 (3.1)
|
Path Traversal in GitHub repository mlflow/mlflow prior to 2.9.2. | mlflow | 2023-12-13T00:15:07+00:00 | 2025-04-09T17:27:26.271200+00:00 |
| pysec-2023-308 |
10.0 (3.1)
|
Absolute Path Traversal in GitHub repository mlflow/mlflow prior to 2.5.0. | mlflow | 2023-07-19T01:15:10+00:00 | 2025-04-09T17:27:26.223213+00:00 |
| pysec-2025-16 |
7.5 (3.1)
|
LNbits is a Lightning wallet and accounts system. A Server-Side Request Forgery (SSRF) vu… | lnbits | 2025-04-06T20:15:15+00:00 | 2025-04-09T17:27:25.872691+00:00 |
| pysec-2025-15 |
5.3 (3.1)
|
Flask-AppBuilder is an application development framework. Prior to 4.5.3, Flask-AppBuilde… | flask-appbuilder | 2025-03-03T16:15:41+00:00 | 2025-04-09T17:27:25.227116+00:00 |
| pysec-2025-14 |
|
An issue was discovered in Django 5.1 before 5.1.8 and 5.0 before 5.0.14. The NFKC normal… | django | 2025-04-02T13:15:44+00:00 | 2025-04-09T17:27:25.169049+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33851 | phpecc, as used in paragonie/phpecc before 2.0.1, has a branch-based timing leak in Point… | 2024-04-28T05:02:07.732559Z |
| gsd-2024-33850 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.952536Z |
| gsd-2024-33849 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.924449Z |
| gsd-2024-4295 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:06.068263Z |
| gsd-2024-4294 | A vulnerability, which was classified as critical, has been found in PHPGurukul Doctor Ap… | 2024-04-28T05:02:06.079201Z |
| gsd-2024-4293 | A vulnerability classified as problematic was found in PHPGurukul Doctor Appointment Mana… | 2024-04-28T05:02:06.052534Z |
| gsd-2024-4292 | A vulnerability classified as critical has been found in Contemporary Controls BASrouter … | 2024-04-28T05:02:06.073286Z |
| gsd-2024-4291 | A vulnerability was found in Tenda A301 15.13.08.12_multi_TDE01. It has been rated as cri… | 2024-04-28T05:02:06.058388Z |
| gsd-2023-52722 | An issue was discovered in Artifex Ghostscript through 10.01.0. psi/zmisc1.c, when SAFER … | 2024-04-28T05:01:28.746814Z |
| gsd-2022-48685 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:00:27.870720Z |
| gsd-2022-48684 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:00:27.715598Z |
| gsd-2024-24777 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:24.547536Z |
| gsd-2024-28875 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:20.401696Z |
| gsd-2024-33846 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.353086Z |
| gsd-2024-33845 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.569462Z |
| gsd-2024-33844 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.384822Z |
| gsd-2024-33843 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.393431Z |
| gsd-2024-33842 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.286185Z |
| gsd-2024-33841 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.393169Z |
| gsd-2024-33840 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.586722Z |
| gsd-2024-33839 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.579161Z |
| gsd-2024-33838 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.585807Z |
| gsd-2024-33837 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.377806Z |
| gsd-2024-33836 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.309729Z |
| gsd-2024-33835 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.550838Z |
| gsd-2024-33834 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.333945Z |
| gsd-2024-33833 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.551960Z |
| gsd-2024-33832 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.298682Z |
| gsd-2024-33831 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.326184Z |
| gsd-2024-33830 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.395389Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-1252 | Malicious code in pear-apps-utils-avatar-initials (npm) | 2026-03-05T16:04:20Z | 2026-03-08T01:39:46Z |
| mal-2026-1251 | Malicious code in pear-apps-lib-ui-react-hooks (npm) | 2026-03-05T16:18:38Z | 2026-03-08T01:39:46Z |
| mal-2026-1250 | Malicious code in pear-apps-lib-feedback (npm) | 2026-03-05T15:35:15Z | 2026-03-08T01:39:46Z |
| mal-2026-1246 | Malicious code in pearpass-utils-password-check (npm) | 2026-03-05T15:32:42Z | 2026-03-08T01:39:46Z |
| mal-2026-1245 | Malicious code in nf-referral-backend-placeholder (npm) | 2026-03-05T15:26:23Z | 2026-03-08T01:39:46Z |
| mal-2026-1243 | Malicious code in nf-referral-backend (npm) | 2026-03-05T09:50:28Z | 2026-03-08T01:39:46Z |
| mal-2026-1239 | Malicious code in pearpass-lib-vault-core (npm) | 2026-03-04T14:16:24Z | 2026-03-08T01:39:46Z |
| mal-2026-1238 | Malicious code in pearpass-lib-vault (npm) | 2026-03-04T14:25:47Z | 2026-03-08T01:39:46Z |
| mal-2026-1237 | Malicious code in pearpass-lib-ui-theme-provider (npm) | 2026-03-04T14:15:03Z | 2026-03-08T01:39:46Z |
| mal-2026-1216 | Malicious code in pdfjs-dist-v5 (npm) | 2026-03-03T08:21:23Z | 2026-03-08T01:39:46Z |
| mal-2026-1206 | Malicious code in polymarket-trade-bot-api (npm) | 2026-03-03T06:54:17Z | 2026-03-08T01:39:46Z |
| mal-2026-1205 | Malicious code in polymarket-provider (npm) | 2026-03-03T06:48:52Z | 2026-03-08T01:39:46Z |
| mal-2026-1204 | Malicious code in polygon-bitquery-api (npm) | 2026-03-03T06:45:16Z | 2026-03-08T01:39:46Z |
| mal-2026-1203 | Malicious code in polmarket (npm) | 2026-03-03T06:54:17Z | 2026-03-08T01:39:46Z |
| mal-2026-1202 | Malicious code in mvn-runtime (npm) | 2026-03-03T06:48:16Z | 2026-03-08T01:39:46Z |
| mal-2026-1201 | Malicious code in mongos-api (npm) | 2026-03-03T06:45:16Z | 2026-03-08T01:39:46Z |
| mal-2026-1200 | Malicious code in mongoose-apis (npm) | 2026-03-03T06:45:16Z | 2026-03-08T01:39:46Z |
| mal-2026-1153 | Malicious code in primexuu-libsignal (npm) | 2026-03-03T04:08:41Z | 2026-03-08T01:39:46Z |
| mal-2026-1152 | Malicious code in pool-check (npm) | 2026-03-03T04:07:11Z | 2026-03-08T01:39:46Z |
| mal-2026-1151 | Malicious code in openclaw-droid (npm) | 2026-03-03T04:20:34Z | 2026-03-08T01:39:46Z |
| mal-2026-1132 | Malicious code in npm-doc-builder (npm) | 2026-03-02T15:46:42Z | 2026-03-08T01:39:46Z |
| mal-2026-1131 | Malicious code in ngaturkids (npm) | 2026-03-02T15:48:43Z | 2026-03-08T01:39:46Z |
| mal-2026-1111 | Malicious code in mqttoken (npm) | 2026-03-02T02:21:08Z | 2026-03-08T01:39:46Z |
| mal-2026-1249 | Malicious code in imhuman-fw-logger (npm) | 2026-03-05T16:49:32Z | 2026-03-08T01:39:45Z |
| mal-2026-1179 | Malicious code in magala (npm) | 2026-03-03T05:04:43Z | 2026-03-08T01:39:45Z |
| mal-2026-1178 | Malicious code in hiagentevilmcp (npm) | 2026-03-03T05:11:36Z | 2026-03-08T01:39:45Z |
| mal-2026-1150 | Malicious code in libsignal-yazxz (npm) | 2026-03-03T04:08:41Z | 2026-03-08T01:39:45Z |
| mal-2026-1130 | Malicious code in kazumarii (npm) | 2026-03-02T15:48:42Z | 2026-03-08T01:39:45Z |
| mal-2026-1116 | Malicious code in js-nodecat (npm) | 2026-03-02T14:33:45Z | 2026-03-08T01:39:45Z |
| mal-2026-1110 | Malicious code in loadash-lint (npm) | 2026-03-02T02:27:10Z | 2026-03-08T01:39:45Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0111 | FreeRDP: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-2931 | GIMP: Schwachstelle ermöglicht Codeausführung | 2025-12-29T23:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-2881 | Red Hat Enterprise Linux (multicluster global hub): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-12-17T23:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-2871 | GIMP: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-12-17T23:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-2750 | Apache HTTP Server: Mehrere Schwachstellen | 2025-12-04T23:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-2724 | Golang Go: Mehrere Schwachstellen | 2025-12-02T23:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-2608 | Golang Go: Schwachstelle ermöglicht Denial of Service | 2025-11-16T23:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-2301 | Red Hat Enterprise Linux: Mehrere Schwachstellen | 2025-10-14T22:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-2227 | Golang Go: Mehrere Schwachstellen | 2025-10-07T22:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-2166 | OpenSSL und LibreSSL: Mehrere Schwachstellen | 2025-09-30T22:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-2129 | GIMP: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-09-24T22:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-2040 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-09-11T22:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-2002 | libssh: Schwachstelle ermöglicht Denial of Service | 2025-09-09T22:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-1976 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-09-04T22:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-1653 | Linux Kernel: Mehrere Schwachstellen | 2025-07-27T22:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-1517 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-07-08T22:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2025-0734 | GIMP: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-04-07T22:00:00.000+00:00 | 2026-02-23T23:00:00.000+00:00 |
| wid-sec-w-2026-0203 | SmarterTools SmarterMail: Schwachstelle ermöglicht Umgehung | 2026-01-22T23:00:00.000+00:00 | 2026-02-22T23:00:00.000+00:00 |
| wid-sec-w-2025-2854 | Roundcube: Mehrere Schwachstellen | 2025-12-15T23:00:00.000+00:00 | 2026-02-22T23:00:00.000+00:00 |
| wid-sec-w-2025-1208 | Roundcube: Schwachstelle ermöglicht Codeausführung | 2025-06-01T22:00:00.000+00:00 | 2026-02-22T23:00:00.000+00:00 |
| wid-sec-w-2026-0427 | Mozilla Firefox, Firefox ESR und Thunderbird: Mehrere Schwachstellen | 2026-02-16T23:00:00.000+00:00 | 2026-02-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0347 | Red Hat Build of Keycloak: Mehrere Schwachstellen | 2026-02-09T23:00:00.000+00:00 | 2026-02-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0297 | Django: Mehrere Schwachstellen | 2026-02-03T23:00:00.000+00:00 | 2026-02-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0209 | Cpython: Mehrere Schwachstellen | 2026-01-25T23:00:00.000+00:00 | 2026-02-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0196 | CPython: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2026-01-21T23:00:00.000+00:00 | 2026-02-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0083 | Microsoft Windows : Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-19T23:00:00.000+00:00 |
| wid-sec-w-2025-2929 | Linux Kernel: Mehrere Schwachstellen | 2025-12-28T23:00:00.000+00:00 | 2026-02-19T23:00:00.000+00:00 |
| wid-sec-w-2026-0437 | Dell RecoverPoint for Virtual Machines: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen und potenziell Privilegieneskalation | 2026-02-17T23:00:00.000+00:00 | 2026-02-18T23:00:00.000+00:00 |
| wid-sec-w-2026-0420 | Google Chrome und Microsoft Edge: Schwachstelle ermöglicht Codeausführung | 2026-02-15T23:00:00.000+00:00 | 2026-02-17T23:00:00.000+00:00 |
| wid-sec-w-2026-0426 | Apache Traffic Server: Mehrere Schwachstellen ermöglichen Denial of Service | 2019-08-14T22:00:00.000+00:00 | 2026-02-16T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0019 | Kwetsbaarheid verholpen in Fortinet FortiSIEM | 2026-01-16T13:34:34.467426Z | 2026-01-16T13:34:34.467426Z |
| ncsc-2026-0018 | Kwetsbaarheden verholpen in TYPO3 CMS | 2026-01-16T10:11:37.524826Z | 2026-01-16T10:11:37.524826Z |
| ncsc-2026-0017 | Kwetsbaarheden verholpen in Juniper Networks JunOS | 2026-01-16T10:07:39.310560Z | 2026-01-16T10:07:39.310560Z |
| ncsc-2026-0016 | Kwetsbaarheden verholpen in Aruba Networks ArubaOS | 2026-01-16T09:44:20.575860Z | 2026-01-16T09:44:20.575860Z |
| ncsc-2026-0015 | Kwetsbaarheid verholpen in Fortinet FortiOS | 2026-01-15T12:31:57.265723Z | 2026-01-15T12:31:57.265723Z |
| ncsc-2026-0014 | Kwetsbaarheden verholpen in Adobe Illustrator | 2026-01-15T12:16:05.427141Z | 2026-01-15T12:16:05.427141Z |
| ncsc-2026-0013 | Kwetsbaarheden verholpen in Adobe InDesign Desktop | 2026-01-14T13:45:48.530782Z | 2026-01-14T13:45:48.530782Z |
| ncsc-2026-0012 | Kwetsbaarheden verholpen in Adobe Dreamweaver Desktop | 2026-01-14T13:41:56.261778Z | 2026-01-14T13:41:56.261778Z |
| ncsc-2026-0011 | Kwetsbaarheid verholpen in Microsoft Developer Tools | 2026-01-13T19:19:27.690900Z | 2026-01-13T19:19:27.690900Z |
| ncsc-2026-0010 | Kwetsbaarheden verholpen in Microsoft Office | 2026-01-13T19:18:45.984019Z | 2026-01-13T19:18:45.984019Z |
| ncsc-2026-0009 | Kwetsbaarheden verholpen in Microsoft Azure | 2026-01-13T19:17:59.629364Z | 2026-01-13T19:17:59.629364Z |
| ncsc-2026-0008 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2026-01-13T19:17:18.848673Z | 2026-01-13T19:17:18.848673Z |
| ncsc-2026-0007 | Kwetsbaarheden verholpen in Microsoft Windows | 2026-01-13T19:16:30.720079Z | 2026-01-13T19:16:30.720079Z |
| ncsc-2026-0006 | Kwetsbaarheden verholpen in SAP producten | 2026-01-13T14:42:24.621603Z | 2026-01-13T14:42:24.621603Z |
| ncsc-2026-0005 | Kwetsbaarheden verholpen in Siemens producten | 2026-01-13T12:05:57.353070Z | 2026-01-13T12:05:57.353070Z |
| ncsc-2026-0004 | Kwetsbaarheden verholpen in Trend Micro Apex Central | 2026-01-09T11:14:58.910197Z | 2026-01-09T11:14:58.910197Z |
| ncsc-2026-0003 | Kwetsbaarheden verholpen in GitLab | 2026-01-09T11:11:48.308357Z | 2026-01-09T11:11:48.308357Z |
| ncsc-2026-0002 | Kwetsbaarheid verholpen in n8n | 2026-01-08T12:34:29.315681Z | 2026-01-08T12:34:29.315681Z |
| ncsc-2026-0001 | Kwetsbaarheden verholpen in Hanwha camera systemen | 2026-01-08T12:28:21.446188Z | 2026-01-08T12:28:21.446188Z |
| ncsc-2025-0405 | Kwetsbaarheid verholpen in Roundcube Webmail | 2025-12-31T14:29:26.821576Z | 2025-12-31T14:29:26.821576Z |
| ncsc-2025-0404 | Kwetsbaarheid verholpen in SmarterMail | 2025-12-31T14:19:01.847364Z | 2025-12-31T14:19:01.847364Z |
| ncsc-2025-0403 | Kwetsbaarheden verholpen in QNAP besturingssystemen | 2025-12-29T09:17:28.385450Z | 2025-12-29T09:17:28.385450Z |
| ncsc-2025-0402 | Kwetsbaarheid verholpen in MongoDB | 2025-12-27T11:38:11.514349Z | 2025-12-27T11:38:11.514349Z |
| ncsc-2025-0399 | Kwetsbaarheid verholpen in HPE OneView Software | 2025-12-18T18:38:20.794784Z | 2025-12-24T11:29:46.123674Z |
| ncsc-2025-0401 | Kwetsbaarheden verholpen in Foxit PDF Reader | 2025-12-24T09:14:56.590353Z | 2025-12-24T09:14:56.590353Z |
| ncsc-2025-0400 | Kwetsbaarheid verholpen in WatchGuard Firebox | 2025-12-19T11:16:01.438518Z | 2025-12-19T11:16:01.438518Z |
| ncsc-2025-0398 | Kwetsbaarheid in Cisco AsyncOS | 2025-12-17T19:47:00.346651Z | 2025-12-17T19:47:00.346651Z |
| ncsc-2025-0397 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2025-12-15T09:08:39.804149Z | 2025-12-15T09:08:39.804149Z |
| ncsc-2025-0396 | Kwetsbaarheden verholpen in Apple macOS | 2025-12-15T09:06:36.450655Z | 2025-12-15T09:06:36.450655Z |
| ncsc-2025-0394 | Kwetsbaarheden verholpen in React Server Components | 2025-12-12T09:04:19.324080Z | 2025-12-12T10:46:34.688189Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-750499 | SSA-750499: Weak Encryption Vulnerability in SIPROTEC 5 Devices | 2024-07-09T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-726617 | SSA-726617: Incorrect Privilege Assignment Vulnerability in Mendix OIDC SSO Module | 2025-05-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-711309 | SSA-711309: Denial of Service Vulnerability in the OPC UA Implementations of SIMATIC Products | 2023-09-12T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-687955 | SSA-687955: Accessible Development Shell via Physical Interface in SIPROTEC 5 | 2025-02-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-682326 | SSA-682326: Multiple Vulnerabilities in COMOS before V10.4.5 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-631336 | SSA-631336: Multiple Web Server Vulnerabilities in SICAM GridEdge Before V2.6.6 | 2022-06-14T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-552874 | SSA-552874: Denial of Service Vulnerability in SIPROTEC 5 Devices | 2022-12-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-522291 | SSA-522291: Improper Certificate Validation Vulnerability in Solid Edge | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-514895 | SSA-514895: Multiple Vulnerabilities in Altair Grid Engine V2025.1.0 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-365596 | SSA-365596: DLL Hijacking Vulnerability in Siemens Software Center and Solid Edge | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-339694 | SSA-339694: Multiple Vulnerabilities in Spectrum Power 4 Before v4.70 SP12 Security Patch 2 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-322980 | SSA-322980: Denial of Service Vulnerability in SIPROTEC 5 Devices | 2023-04-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-301229 | SSA-301229: Client-Side Enforcement of Server-Side Security Vulnerabilities in RUGGEDCOM ROX II | 2025-05-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-267056 | SSA-267056: Multiple Vulnerabilities in LOGO! 8 BM Devices | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-225578 | SSA-225578: Improper Access Control Vulnerability in SICAM GridEdge Before V2.7.3 | 2022-07-12T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-201498 | SSA-201498: Multiple Vulnerabilities in the Web Server of SICAM P850 and SICAM P855 Devices Before V3.11 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-194557 | SSA-194557: Improper Limitation of Filesystem Access through Web Server Vulnerability in SIPROTEC 5 | 2025-01-14T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-876787 | SSA-876787: Open Redirect Vulnerability in SIMATIC S7-1500 and S7-1200 CPUs | 2024-10-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-722410 | SSA-722410: Multiple Vulnerabilities in User Management Component (UMC) | 2025-09-09T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-625789 | SSA-625789: Multiple Vulnerabilities in SIMATIC S7-1200 CPU V1/V2 Devices | 2011-06-10T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-614723 | SSA-614723: Denial of Service Vulnerabilities in User Management Component (UMC) | 2025-05-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-541582 | SSA-541582: Multiple File Parsing Vulnerabilities in Solid Edge | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-486936 | SSA-486936: Authentication Vulnerability in SIMATIC ET 200SP Communication Processors | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-373591 | SSA-373591: Buffer Overflow Vulnerability in RUGGEDCOM ROS Devices | 2021-07-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-367714 | SSA-367714: Improper Integrity Check of Firmware Updates in SiPass integrated AC5102 / ACC-G2 and ACC-AP | 2025-05-23T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-318832 | SSA-318832: SQL Injection Vulnerability in SINEC NMS | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-279823 | SSA-279823: Cross-Site Scripting Vulnerability in SIMATIC S7-1200 CPU V2/V3 Before V3.0.2 | 2012-10-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-240718 | SSA-240718: Insecure Storage of HTTPS CA Certificate in SIMATIC S7-1200 CPU V2 | 2012-09-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-186293 | SSA-186293: XML External Entity (XXE) Injection Vulnerability in SIMOTION SCOUT, SIMOTION SCOUT TIA and SINAMICS STARTER | 2025-08-12T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-083019 | SSA-083019: Multiple Vulnerabilities in RUGGEDCOM ROS Devices | 2025-07-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:3812 | Red Hat Security Advisory: grafana-pcp security update | 2026-03-05T04:13:33+00:00 | 2026-03-09T02:17:57+00:00 |
| rhsa-2026:3782 | Red Hat Security Advisory: RHOAI 2.25.3 - Red Hat OpenShift AI | 2026-03-04T18:23:40+00:00 | 2026-03-09T02:17:57+00:00 |
| rhsa-2026:3753 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-04T15:52:29+00:00 | 2026-03-09T02:17:57+00:00 |
| rhsa-2026:3699 | Red Hat Security Advisory: yggdrasil-worker-package-manager security update | 2026-03-04T05:15:19+00:00 | 2026-03-09T02:17:55+00:00 |
| rhsa-2026:3506 | Red Hat Security Advisory: yggdrasil security update | 2026-03-02T06:45:32+00:00 | 2026-03-09T02:17:55+00:00 |
| rhsa-2026:3752 | Red Hat Security Advisory: osbuild-composer security update | 2026-03-04T15:29:36+00:00 | 2026-03-09T02:17:54+00:00 |
| rhsa-2026:3713 | Red Hat Security Advisory: RHOAI 3.3 - Red Hat OpenShift AI | 2026-03-04T07:18:30+00:00 | 2026-03-09T02:17:54+00:00 |
| rhsa-2026:3669 | Red Hat Security Advisory: go-rpm-macros security update | 2026-03-03T15:33:23+00:00 | 2026-03-09T02:17:54+00:00 |
| rhsa-2026:3668 | Red Hat Security Advisory: go-rpm-macros security update | 2026-03-03T16:17:02+00:00 | 2026-03-09T02:17:52+00:00 |
| rhsa-2026:3559 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.6.14 | 2026-03-02T17:03:40+00:00 | 2026-03-09T02:17:51+00:00 |
| rhsa-2026:3556 | Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.6.14 | 2026-03-02T16:52:33+00:00 | 2026-03-09T02:17:51+00:00 |
| rhsa-2026:3489 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-03-02T02:56:16+00:00 | 2026-03-09T02:17:50+00:00 |
| rhsa-2026:3473 | Red Hat Security Advisory: golang security update | 2026-03-02T01:23:25+00:00 | 2026-03-09T02:17:49+00:00 |
| rhsa-2026:3472 | Red Hat Security Advisory: golang security update | 2026-03-02T01:26:30+00:00 | 2026-03-09T02:17:48+00:00 |
| rhsa-2026:3471 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-03-02T01:35:05+00:00 | 2026-03-09T02:17:47+00:00 |
| rhsa-2026:3470 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-03-02T01:22:15+00:00 | 2026-03-09T02:17:46+00:00 |
| rhsa-2026:3469 | Red Hat Security Advisory: golang security update | 2026-03-02T01:34:30+00:00 | 2026-03-09T02:17:46+00:00 |
| rhsa-2026:3468 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2026-03-02T01:25:20+00:00 | 2026-03-09T02:17:45+00:00 |
| rhsa-2026:3459 | Red Hat Security Advisory: Red Hat OpenShift distributed tracing platform (Tempo) 3.9.0 release | 2026-02-26T19:58:40+00:00 | 2026-03-09T02:17:44+00:00 |
| rhsa-2026:3427 | Red Hat Security Advisory: Red Hat build of OpenTelemetry 3.9.0 release | 2026-02-26T11:02:21+00:00 | 2026-03-09T02:17:44+00:00 |
| rhsa-2026:3416 | Red Hat Security Advisory: OpenShift Container Platform 4.17.50 packages and security update | 2026-03-04T09:07:15+00:00 | 2026-03-09T02:17:44+00:00 |
| rhsa-2026:3391 | Red Hat Security Advisory: OpenShift Container Platform 4.19.25 packages and security update | 2026-03-04T15:54:04+00:00 | 2026-03-09T02:17:43+00:00 |
| rhsa-2026:3343 | Red Hat Security Advisory: skopeo security update | 2026-02-25T11:50:40+00:00 | 2026-03-09T02:17:43+00:00 |
| rhsa-2026:3341 | Red Hat Security Advisory: containernetworking-plugins security update | 2026-02-25T12:14:45+00:00 | 2026-03-09T02:17:42+00:00 |
| rhsa-2026:3340 | Red Hat Security Advisory: skopeo security update | 2026-02-25T12:16:20+00:00 | 2026-03-09T02:17:41+00:00 |
| rhsa-2026:3337 | Red Hat Security Advisory: podman security update | 2026-02-25T11:48:26+00:00 | 2026-03-09T02:17:41+00:00 |
| rhsa-2026:3336 | Red Hat Security Advisory: podman security update | 2026-02-25T11:30:01+00:00 | 2026-03-09T02:17:41+00:00 |
| rhsa-2026:3298 | Red Hat Security Advisory: buildah security update | 2026-02-25T09:32:15+00:00 | 2026-03-09T02:17:40+00:00 |
| rhsa-2026:3297 | Red Hat Security Advisory: buildah security update | 2026-02-25T09:09:30+00:00 | 2026-03-09T02:17:40+00:00 |
| rhsa-2026:3296 | Red Hat Security Advisory: RHTAS - Tech Preview Release Of the Policy Controller Operator | 2026-02-25T08:49:49+00:00 | 2026-03-09T02:17:39+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-24-102-01 | Siemens SIMATIC S7-1500 | 2024-04-09T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-12-349-01 | Siemens Automation License Manager Uncontrolled Resource Consumption | 2012-12-12T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-25-140-04 | Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric Products (Update E) | 2025-05-20T04:00:00.000000Z | 2026-02-12T05:00:00.000000Z |
| icsa-26-036-01 | TP-Link Systems Inc. VIGI Series IP Camera | 2026-02-05T06:00:00.000000Z | 2026-02-11T06:00:00.000000Z |
| icsma-26-041-01 | ZOLL ePCR IOS Mobile Application | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-04 | AVEVA PI to CONNECT Agent | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-03 | AVEVA PI Data Archive | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-02 | ZLAN Information Technology Co. ZLAN5143D | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-041-01 | Yokogawa FAST/TOOLS | 2026-02-10T07:00:00.000000Z | 2026-02-10T07:00:00.000000Z |
| icsa-26-036-06 | Hitachi Energy FOX61x | 2026-01-27T00:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-05 | Hitachi Energy XMC20 | 2026-01-27T00:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-04 | Ilevia EVE X1 Server | 2026-02-05T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-03 | o6 Automation GmbH Open62541 | 2026-02-05T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-02 | Mitsubishi Electric MELSEC iQ-R Series | 2026-02-05T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-029-01 | KiloView Encoder Series (Update A) | 2026-01-29T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-25-184-03 | Mitsubishi Electric MELSOFT Update Manager (Update B) | 2025-07-03T06:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-25-184-01 | Hitachi Energy Relion 670/650 and SAM600-IO Series | 2025-06-24T00:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-25-343-03 | Multiple India-based CCTV Cameras (Update A)** | 2025-12-09T06:00:00.000000Z | 2026-02-05T06:00:00.000000Z |
| icsa-26-034-04 | Synectix LAN 232 TRIO | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-03 | RISS SRL MOMA Seismic Station | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-02 | *Avation Light Engine Pro * | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-01 | Mitsubishi Electric FREQSHIP-mini for Windows | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-25-310-02 | Ubia Ubox (Update A) | 2025-11-06T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-25-128-03 | Mitsubishi Electric Multiple FA Products (Update B) | 2025-05-08T06:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-24-345-06 | Rockwell Automation Arena (Update B) | 2024-12-10T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-23-089-01 | Hitachi Energy IEC 61850 MMS-Server (Update B) | 2023-02-14T13:30:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-23-068-05 | Hitachi Energy Relion 670, 650 and SAM600-IO Series | 2023-02-28T13:30:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-25-112-03 | Schneider Electric Wiser Home Controller WHC-5918A | 2024-07-09T00:00:00.000000Z | 2026-01-30T07:00:00.000000Z |
| icsa-26-029-03 | Rockwell Automation ControlLogix | 2026-01-29T07:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-26-029-02 | Rockwell Automation ArmorStart LT | 2026-01-29T07:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-secboot-uqfd8avc | Cisco IOS XE Software Secure Boot Bypass Vulnerabilities | 2025-09-24T16:00:00+00:00 | 2025-10-15T15:57:29+00:00 |
| cisco-sa-snmp-x4lphte | Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-10-06T18:27:02+00:00 |
| cisco-sa-ios-tacacs-hdb7thjw | Cisco IOS and IOS XE Software TACACS+ Authentication Bypass Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-10-01T16:39:50+00:00 |
| cisco-sa-cv-xss-rwrakaj9 | Cisco Cyber Vision Center Stored Cross-Site Scripting Vulnerabilities | 2025-10-01T16:00:00+00:00 | 2025-10-01T16:00:00+00:00 |
| cisco-sa-cucm-stored-xss-fnj66yly | Cisco Unified Communications Manager Stored Cross-Site Scripting Vulnerability | 2025-10-01T16:00:00+00:00 | 2025-10-01T16:00:00+00:00 |
| cisco-sa-cat9k-ptmd7bgy | Cisco IOS XE Software for Catalyst 9000 Series Switches Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-30T14:26:46+00:00 |
| cisco-sa-ap-ipv6-gw-tuazpn9o | Cisco Access Point Software Intermittent IPv6 Gateway Change Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-26T16:35:51+00:00 |
| cisco-sa-webui-xss-vwydgjou | Cisco IOS XE Software Web Authentication Reflected Cross-Site Scripting Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-26T16:35:50+00:00 |
| cisco-sa-snmpwred-x3mjyf5m | Cisco IOS XE Software Simple Network Management Protocol Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-nbar-dos-lavwtmet | Cisco IOS XE Software Network-Based Application Recognition Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-iosxe-arg-inject-eyddbh4e | Cisco IOS XE Software CLI Argument Injection Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ios-xe-cmd-inject-rpjm8bgl | Cisco IOS XE Software HTTP API Command Injection Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ios-invalid-url-dos-nvxszf6u | Cisco IOS Software Industrial Ethernet Switch Device Manager Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-ios-cli-eb7cz6yo | Cisco IOS and IOS XE Software CLI Denial of Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-defaultacl-psjk9nvf | Cisco SD-WAN vEdge Software Access Control List Bypass Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-cat9k-acl-l4k7vxgd | Cisco IOS XE Software on Cisco Catalyst 9500X and 9600X Series Switches Virtual Interface Access Control List Bypass Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-action-frame-inj-qqcncz8h | Cisco Wireless Access Point Software Device Analytics Action Frame Injection Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-9800cl-openscep-sb4xtxzp | Cisco IOS XE Software for Catalyst 9800 Series Wireless Controller for Cloud Unauthenticated Access to Certificate Enrollment Service Vulnerability | 2025-09-24T16:00:00+00:00 | 2025-09-24T16:00:00+00:00 |
| cisco-sa-snmp-bypass-hhuvujdn | Cisco IOS XE SD-WAN Software Packet Filtering Bypass Vulnerability | 2025-05-07T16:00:00+00:00 | 2025-09-22T14:12:28+00:00 |
| cisco-sa-xrsig-uy4zrucg | Cisco IOS XR Software Image Verification Bypass Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-iosxr-arp-storm-ejuu55ym | Cisco IOS XR ARP Broadcast Storm Denial of Service Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-acl-packetio-swjhhbtz | Cisco IOS XR Software Management Interface ACL Bypass Vulnerability | 2025-09-10T16:00:00+00:00 | 2025-09-10T16:00:00+00:00 |
| cisco-sa-fp2k-ipsec-dos-tjwgdzco | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software for Firepower 2100 Series IPv6 over IPsec Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-09-09T21:22:34+00:00 |
| cisco-sa-webex-xss-55bv8hhm | Cisco Webex Meetings Cross-Site Scripting Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-webex-urlredirect-uk8ddjsz | Cisco Webex Meetings URL Redirection Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-phone-write-g3kcc5df | Cisco Desk Phone 9800 Series, IP Phone 7800 and 8800 Series, and Video Phone 8875 with SIP Software Vulnerabilities | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-imp-xss-xqgu4hsg | Cisco Unified Communications Manager IM & Presence Service Cross-Site Scripting Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-epnm-pi-stored-xss-xjqzsycp | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Stored Cross-Site Scripting Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-epnm-info-dis-zhppmfgz | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Information Disclosure Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-epni-arb-file-upload-jjdm2p83 | Cisco Evolved Programmable Network Manager Arbitrary File Upload Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sca-2022-0002 | PwnKit vulnerability affects multiple SICK IPCs | 2022-02-23T16:00:00.000Z | 2022-02-23T16:00:00.000Z |
| sca-2022-0001 | Vulnerability in SICK FieldEcho | 2022-02-17T16:00:00.000Z | 2022-02-17T16:00:00.000Z |
| sca-2021-0003 | SICK Security Advisory for Apache Log4j (CVE-2021-44228) | 2021-12-14T17:00:00.000Z | 2021-12-17T12:00:00.000Z |
| sca-2021-0004 | Vulnerabilities in SICK SOPAS ET | 2021-12-16T08:00:00.000Z | 2021-12-17T08:00:00.000Z |
| sca-2021-0002 | MEAC affected by Windows SMBv1 vulnerability | 2021-08-04T10:00:00.000Z | 2021-08-04T10:00:00.000Z |
| sca-2021-0001 | Inadequate SSH configuration in SICK Visionary-S CX | 2021-06-25T10:00:00.000Z | 2021-06-25T10:00:00.000Z |
| sca-2020-0005 | Package Analytics affected by Windows TCP/IP vulnerability | 2020-10-29T11:00:00.000Z | 2020-10-29T11:00:00.000Z |
| sca-2020-0004 | Vulnerability in Platform Mechanism AutoIP | 2020-08-31T10:00:00.000Z | 2020-08-31T10:00:00.000Z |
| sca-2020-0003 | MEAC affected by Windows SMBv3 vulnerability | 2020-08-07T10:00:00.000Z | 2020-08-07T10:00:00.000Z |
| sca-2020-0002 | Vulnerabilities in SICK Package Analytics | 2020-08-07T10:00:00.000Z | 2020-07-28T10:00:00.000Z |
| sca-2020-0001 | Security Information Regarding "Profile Programming" | 2020-05-31T10:00:00.000Z | 2020-05-31T10:00:00.000Z |
| sca-2019-0002 | Vulnerability in SICK FX0-GENT00000 and SICK FX0-GPNT00000 | 2019-09-20T10:00:00.000Z | 2019-09-20T10:00:00.000Z |
| sca-2019-0001 | MSC800 affected by hard-coded credentials vulnerability | 2019-06-21T10:00:00.000Z | 2019-06-21T10:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| nn-2019:2-01 | CSV Injection on node label | 2019-11-11T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2019:1-01 | Stored XSS in field name data model | 2019-11-11T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-38096 | wifi: iwlwifi: don't warn when if there is a FW error | 2025-07-02T00:00:00.000Z | 2026-03-04T14:46:11.000Z |
| msrc_cve-2024-56712 | udmabuf: fix memory leak on last export_udmabuf() error path | 2024-12-02T00:00:00.000Z | 2026-03-04T14:46:08.000Z |
| msrc_cve-2025-68338 | net: dsa: microchip: Don't free uninitialized ksz_irq | 2025-12-02T00:00:00.000Z | 2026-03-04T14:46:05.000Z |
| msrc_cve-2025-38140 | dm: limit swapping tables for devices with zone write plugs | 2025-07-02T00:00:00.000Z | 2026-03-04T14:46:04.000Z |
| msrc_cve-2024-56647 | net: Fix icmp host relookup triggering ip_rt_bug | 2024-12-02T00:00:00.000Z | 2026-03-04T14:46:01.000Z |
| msrc_cve-2025-68334 | platform/x86/amd/pmc: Add support for Van Gogh SoC | 2025-12-02T00:00:00.000Z | 2026-03-04T14:45:59.000Z |
| msrc_cve-2025-4748 | Absolute path traversal in zip:unzip/1,2 | 2025-06-02T00:00:00.000Z | 2026-03-04T14:45:57.000Z |
| msrc_cve-2024-53089 | LoongArch: KVM: Mark hrtimer to expire in hard interrupt context | 2024-11-02T00:00:00.000Z | 2026-03-04T14:45:54.000Z |
| msrc_cve-2025-68324 | scsi: imm: Fix use-after-free bug caused by unfinished delayed work | 2025-12-02T00:00:00.000Z | 2026-03-04T14:45:52.000Z |
| msrc_cve-2025-38029 | kasan: avoid sleepable page allocation from atomic context | 2025-06-02T00:00:00.000Z | 2026-03-04T14:45:48.000Z |
| msrc_cve-2024-53090 | afs: Fix lock recursion | 2024-11-02T00:00:00.000Z | 2026-03-04T14:45:47.000Z |
| msrc_cve-2025-68296 | drm, fbcon, vga_switcheroo: Avoid race condition in fbcon setup | 2025-12-02T00:00:00.000Z | 2026-03-04T14:45:45.000Z |
| msrc_cve-2025-38064 | virtio: break and reset virtio devices on device_shutdown() | 2025-06-02T00:00:00.000Z | 2026-03-04T14:45:41.000Z |
| msrc_cve-2025-68304 | Bluetooth: hci_core: lookup hci_conn on RX path on protocol side | 2025-12-02T00:00:00.000Z | 2026-03-04T14:45:39.000Z |
| msrc_cve-2025-38041 | clk: sunxi-ng: h616: Reparent GPU clock during frequency changes | 2025-06-02T00:00:00.000Z | 2026-03-04T14:45:34.000Z |
| msrc_cve-2025-68188 | tcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check() | 2025-12-02T00:00:00.000Z | 2026-03-04T14:45:32.000Z |
| msrc_cve-2025-5791 | Users: `root` appended to group listings | 2025-06-02T00:00:00.000Z | 2026-03-04T14:45:28.000Z |
| msrc_cve-2024-53114 | x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 client | 2024-12-02T00:00:00.000Z | 2026-03-04T14:45:27.000Z |
| msrc_cve-2025-68209 | mlx5: Fix default values in create CQ | 2025-12-02T00:00:00.000Z | 2026-03-04T14:45:25.000Z |
| msrc_cve-2024-41008 | drm/amdgpu: change vm->task_info handling | 2024-07-01T07:00:00.000Z | 2026-03-04T14:45:21.000Z |
| msrc_cve-2025-68206 | netfilter: nft_ct: add seqadj extension for natted connections | 2025-12-02T00:00:00.000Z | 2026-03-04T14:45:19.000Z |
| msrc_cve-2025-21870 | ASoC: SOF: ipc4-topology: Harden loops for looking up ALH copiers | 2025-03-02T00:00:00.000Z | 2026-03-04T14:45:14.000Z |
| msrc_cve-2024-42134 | virtio-pci: Check if is_avq is NULL | 2024-07-01T07:00:00.000Z | 2026-03-04T14:45:13.000Z |
| msrc_cve-2025-68239 | binfmt_misc: restore write access before closing files opened by open_exec() | 2025-12-02T00:00:00.000Z | 2026-03-04T14:45:12.000Z |
| msrc_cve-2025-21888 | RDMA/mlx5: Fix a WARN during dereg_mr for DM type | 2025-03-02T00:00:00.000Z | 2026-03-04T14:45:07.000Z |
| msrc_cve-2024-53133 | drm/amd/display: Handle dml allocation failure to avoid crash | 2024-12-02T00:00:00.000Z | 2026-03-04T14:45:06.000Z |
| msrc_cve-2025-40355 | sysfs: check visibility before changing group attribute ownership | 2025-12-02T00:00:00.000Z | 2026-03-04T14:45:05.000Z |
| msrc_cve-2024-35808 | md/dm-raid: don't call md_reap_sync_thread() directly | 2024-05-02T07:00:00.000Z | 2026-03-04T14:45:01.000Z |
| msrc_cve-2025-68174 | amd/amdkfd: enhance kfd process check in switch partition | 2025-12-02T00:00:00.000Z | 2026-03-04T14:44:59.000Z |
| msrc_cve-2024-42151 | bpf: mark bpf_dummy_struct_ops.test_1 parameter as nullable | 2024-07-01T07:00:00.000Z | 2026-03-04T14:44:59.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10224-1 | rclone-1.73.1-1.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:10223-1 | python313-3.13.12-1.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:10222-1 | python312-3.12.12-5.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:10221-1 | python311-3.11.14-4.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:10220-1 | istioctl-1.28.4-1.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:10219-1 | dnsdist-2.0.2-1.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:10218-1 | MozillaThunderbird-140.7.2-1.1 on GA media | 2026-02-18T00:00:00Z | 2026-02-18T00:00:00Z |
| opensuse-su-2026:20244-1 | Security update for cockpit-machines, cockpit | 2026-02-17T14:20:44Z | 2026-02-17T14:20:44Z |
| opensuse-su-2026:20245-1 | Security update for wicked2nm | 2026-02-17T14:08:05Z | 2026-02-17T14:08:05Z |
| opensuse-su-2026:20239-1 | Security update for golang-github-prometheus-prometheus | 2026-02-17T09:54:15Z | 2026-02-17T09:54:15Z |
| opensuse-su-2026:10217-1 | traefik-3.6.8-1.1 on GA media | 2026-02-17T00:00:00Z | 2026-02-17T00:00:00Z |
| opensuse-su-2026:10216-1 | python311-asgiref-3.11.1-1.1 on GA media | 2026-02-17T00:00:00Z | 2026-02-17T00:00:00Z |
| opensuse-su-2026:10215-1 | owntone-29.0-2.1 on GA media | 2026-02-17T00:00:00Z | 2026-02-17T00:00:00Z |
| opensuse-su-2026:10214-1 | mupdf-1.27.1-1.1 on GA media | 2026-02-17T00:00:00Z | 2026-02-17T00:00:00Z |
| opensuse-su-2026:10213-1 | libxml2-16-2.14.5-4.1 on GA media | 2026-02-17T00:00:00Z | 2026-02-17T00:00:00Z |
| opensuse-su-2026:10212-1 | firefox-esr-140.7.1-1.1 on GA media | 2026-02-17T00:00:00Z | 2026-02-17T00:00:00Z |
| opensuse-su-2026:10211-1 | azure-cli-core-2.83.0-2.1 on GA media | 2026-02-17T00:00:00Z | 2026-02-17T00:00:00Z |
| opensuse-su-2026:10210-1 | python311-pip-26.0.1-1.1 on GA media | 2026-02-16T00:00:00Z | 2026-02-16T00:00:00Z |
| opensuse-su-2026:10209-1 | libsoup-2_4-1-2.74.3-16.1 on GA media | 2026-02-16T00:00:00Z | 2026-02-16T00:00:00Z |
| opensuse-su-2026:10208-1 | libsoup-3_0-0-3.6.5-13.1 on GA media | 2026-02-16T00:00:00Z | 2026-02-16T00:00:00Z |
| opensuse-su-2026:10207-1 | frr-10.2.1-4.1 on GA media | 2026-02-16T00:00:00Z | 2026-02-16T00:00:00Z |
| opensuse-su-2026:20236-1 | Security update for nodejs22 | 2026-02-15T09:26:17Z | 2026-02-15T09:26:17Z |
| opensuse-su-2026:20235-1 | Security update for fontforge | 2026-02-14T21:30:01Z | 2026-02-14T21:30:01Z |
| opensuse-su-2026:10206-1 | python314-3.14.3-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:10205-1 | python311-cryptography-46.0.5-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:10204-1 | openjfx-17.0.18.0-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:10203-1 | libssh-config-0.11.4-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:10202-1 | himmelblau-2.3.5+git0.9dd526c-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:10201-1 | chromedriver-145.0.7632.45-1.1 on GA media | 2026-02-14T00:00:00Z | 2026-02-14T00:00:00Z |
| opensuse-su-2026:20233-1 | Security update for openCryptoki | 2026-02-13T17:42:04Z | 2026-02-13T17:42:04Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2024-345-02 | Harmony HMI and Pro-face HMI products | 2024-12-10T00:00:00.000Z | 2024-12-10T00:00:00.000Z |
| sevd-2024-345-01 | PowerChute Serial Shutdown | 2024-12-10T00:00:00.000Z | 2024-12-10T00:00:00.000Z |
| sevd-2024-317-04 | EcoStruxure™ IT Gateway | 2024-11-12T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2024-317-02 | Modicon Controllers M340 / Momentum / MC80 | 2024-11-12T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2024-317-01 | PowerLogic PM5300 Series | 2024-11-12T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2021-159-02 | PowerLogic PM5500 and PowerLogic PM8ECC | 2021-06-08T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2024-282-08 | EcoStruxure EV Charging Expert | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-07 | System Monitor Application in Harmony and Pro-face PS5000 Legacy Industrial PCs | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-06 | Zelio Soft 2 | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-04 | EVlink Home Smart and Schneider Charge | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-03 | Easergy Studio | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-02 | Harmony iPC – HMIBSC IIoT Edge Box Core | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-01 | Data Center Expert | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2022-102-02 | Modicon M340 Controller and Communication Modules | 2022-04-12T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-254-02 | EcoStruxure™ Power Monitoring Expert and EcoStruxure™ Power Operation or EcoStruxure™ Power SCADA Operation with Advanced Reporting and Dashboards | 2024-09-10T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| sevd-2024-163-02 | PowerLogic P5 | 2024-06-11T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| sevd-2023-073-01 | EcoStruxure™ Power Monitoring Expert | 2023-03-14T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| sevd-2023-192-02 | EcoStruxure™ OPC UA Server Expert | 2023-07-11T07:01:56.000Z | 2024-08-13T07:00:00.000Z |
| sevd-2024-226-02 | EcoStruxure™ Machine SCADA Expert / BLUE Open Studio | 2024-08-13T00:00:00.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2024-226-01 | Accutech Manager | 2024-08-13T00:00:00.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2023-101-05 | Modicon PLCs (Programmable Logic Controllers) and PACs (Programmable Automation Controllers) | 2023-04-11T09:46:26.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2023-010-06 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon M340, M580 and M580 CPU Safety | 2023-01-10T15:17:09.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2023-010-05 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon PLCs (Programmable Logic Controllers) and PACs (Programmable Automation Controllers) | 2023-01-10T15:41:57.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-221-04 | Modicon PAC Controllers | 2022-08-09T08:15:40.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-221-02 | Modicon PAC Controllers | 2022-08-09T08:15:40.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-221-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, and Modicon Controllers M580 and M340 | 2022-08-09T10:58:35.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2021-222-04 | Modicon PAC Controllers and PLC Simulator for EcoStruxure™ Control Expert and EcoStruxure™ Process Expert | 2021-08-10T02:27:39.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2021-194-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, SCADAPack RemoteConnect™ x70, and Modicon Controllers M580 and M340 | 2021-07-13T08:22:02.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2019-281-02 | Modicon Controllers | 2019-09-26T12:53:28.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2018-081-01 | Embedded FTP Servers for Modicon PAC Controllers | 2018-03-22T03:39:21.000Z | 2024-08-13T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2022-1277 | Heap-use-after-free in mk_event_timeout_destroy | 2023-06-26T14:01:01.876870Z | 2026-02-28T14:08:00.377917Z |
| osv-2022-675 | Heap-buffer-overflow in void RDKit::ParseV3000AtomProps<std::__1::vector<std::__1::basic_string_view<cha | 2022-08-06T00:00:51.363676Z | 2026-02-27T14:21:58.571249Z |
| osv-2022-1288 | Stack-buffer-overflow in bool SmilesParseOps::parser::parse_atom_props<std::__1::__wrap_iter<char const*> | 2024-11-04T00:16:22.516312Z | 2026-02-27T14:20:35.360845Z |
| osv-2025-253 | Security exception in org.apache.lucene.analysis.ckb.SoraniNormalizer.normalize | 2025-04-03T00:17:24.000398Z | 2026-02-26T15:05:21.477837Z |
| osv-2022-867 | Heap-buffer-overflow in get_utf_8_string | 2022-09-09T00:01:54.157712Z | 2026-02-26T15:03:06.284832Z |
| osv-2024-1254 | Security exception in org.apache.lucene.util.ArrayUtil.growExact | 2024-11-01T00:07:39.301298Z | 2026-02-26T14:30:06.734190Z |
| osv-2022-763 | Heap-buffer-overflow in sqlite3VdbeExec | 2022-08-21T00:00:23.656015Z | 2026-02-26T14:12:24.701998Z |
| osv-2026-311 | UNKNOWN READ in strncasecmp | 2026-02-26T00:16:50.091819Z | 2026-02-26T00:16:50.092121Z |
| osv-2026-308 | Heap-buffer-overflow in vcardstructured_new_from_string | 2026-02-25T00:19:49.963815Z | 2026-02-25T00:19:49.964188Z |
| osv-2026-307 | Global-buffer-overflow in navcom_parse | 2026-02-25T00:16:23.864362Z | 2026-02-25T00:16:23.864694Z |
| osv-2026-304 | Heap-use-after-free in tf::Executor::_invoke | 2026-02-25T00:09:10.290694Z | 2026-02-25T00:09:10.291030Z |
| osv-2024-245 | Security exception in com.github.javaparser.ast.validator.TreeVisitorValidator.accept | 2024-04-08T00:11:03.595756Z | 2026-02-24T14:25:14.639761Z |
| osv-2026-292 | UNKNOWN WRITE in <wasmtime::runtime::func::Func>::call_unchecked_raw::< | 2026-02-23T00:19:15.717984Z | 2026-02-23T00:19:15.718280Z |
| osv-2022-1235 | Heap-buffer-overflow in _rrparse | 2022-12-04T13:00:30.303410Z | 2026-02-21T14:09:00.932849Z |
| osv-2026-272 | Heap-use-after-free in vcardproperty_get_value | 2026-02-21T00:20:10.455944Z | 2026-02-21T00:20:10.456357Z |
| osv-2022-1165 | Heap-buffer-overflow in parse_content_length | 2022-11-12T13:00:05.964113Z | 2026-02-19T14:11:05.455361Z |
| osv-2026-261 | Segv on unknown address in ___interceptor_strtol | 2026-02-19T00:09:21.893775Z | 2026-02-19T00:09:21.894076Z |
| osv-2026-259 | Use-of-uninitialized-value in tsip_parse_input | 2026-02-18T00:14:29.378028Z | 2026-02-18T00:14:29.378341Z |
| osv-2023-96 | Heap-buffer-overflow in load_buffer | 2023-02-23T13:00:28.515290Z | 2026-02-17T14:26:31.096424Z |
| osv-2023-35 | Heap-buffer-overflow in parse_classes_64 | 2023-01-29T13:01:45.762871Z | 2026-02-17T14:24:57.461377Z |
| osv-2022-993 | Stack-use-after-return in check_buffer | 2022-09-29T00:02:10.256639Z | 2026-02-17T14:24:32.097178Z |
| osv-2023-819 | Heap-buffer-overflow in ucl_object_dtor_unref_single | 2023-09-09T14:01:07.368928Z | 2026-02-17T14:21:16.973749Z |
| osv-2023-78 | Heap-buffer-overflow in ucl_object_dtor_unref_single | 2023-02-18T13:01:01.445224Z | 2026-02-17T14:21:11.808505Z |
| osv-2022-1137 | Heap-buffer-overflow in io_memory_read | 2022-11-05T00:00:44.243862Z | 2026-02-17T14:20:32.701723Z |
| osv-2021-1261 | UNKNOWN READ in kh_get_ucl_hash_node | 2021-09-15T00:00:41.384284Z | 2026-02-17T14:15:50.348749Z |
| osv-2026-255 | UNKNOWN WRITE in nmeaid_to_prn | 2026-02-17T00:17:19.574579Z | 2026-02-17T00:17:19.574905Z |
| osv-2026-244 | Use-of-uninitialized-value in ihevcd_fmt_conv | 2026-02-15T00:03:36.246033Z | 2026-02-15T00:03:36.246568Z |
| osv-2026-242 | Use-of-uninitialized-value in ntrip_parse_url | 2026-02-14T00:17:42.945923Z | 2026-02-14T00:17:42.946299Z |
| osv-2026-240 | Use-of-uninitialized-value in packet_get1 | 2026-02-14T00:09:50.559032Z | 2026-02-14T00:09:50.559326Z |
| osv-2023-390 | Heap-buffer-overflow in sdhci_write | 2023-05-12T14:00:08.854823Z | 2026-02-13T14:56:42.122885Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2022-0103 | Incorrect signature verification on gzip-compressed install images | 2022-03-04T12:00:00Z | 2025-12-21T13:45:28Z |
| rustsec-2024-0445 | cap-primitives doesn't fully sandbox all the Windows device filenames | 2024-11-05T12:00:00Z | 2025-12-19T21:01:24Z |
| rustsec-2024-0444 | Uncaught exception when transitioning the state of `AsyncGenerator` objects from within a property getter of `then` | 2024-08-14T12:00:00Z | 2025-12-19T06:15:15Z |
| rustsec-2022-0042 | malicious crate `rustdecimal` | 2022-05-10T12:00:00Z | 2025-12-17T17:06:41Z |
| rustsec-2021-0082 | vec-const attempts to construct a Vec from a pointer to a const slice | 2021-08-14T12:00:00Z | 2025-12-17T17:06:41Z |
| rustsec-2025-0136 | Underflow in aes_key_unwrap function | 2025-11-07T12:00:00Z | 2025-12-17T06:01:32Z |
| rustsec-2025-0135 | matrix-sdk-base: Denial of service due to custom `m.room.join_rules` events | 2025-12-08T12:00:00Z | 2025-12-08T12:23:54Z |
| rustsec-2025-0133 | Incorrect calculation on aarch64 | 2025-12-04T12:00:00Z | 2025-12-06T07:36:56Z |
| rustsec-2025-0134 | rustls-pemfile is unmaintained | 2025-11-28T12:00:00Z | 2025-12-05T19:07:24Z |
| rustsec-2025-0132 | `Reader::open_mmap` unsoundly marks unsafe memmap operation as safe | 2025-11-28T12:00:00Z | 2025-12-02T06:03:09Z |
| rustsec-2025-0131 | Lack of sufficient checks in public API | 2025-10-31T12:00:00Z | 2025-12-02T06:03:09Z |
| rustsec-2025-0120 | json5 crate is unmaintained | 2025-11-16T12:00:00Z | 2025-11-30T00:15:16Z |
| rustsec-2025-0126 | Heap-buffer-overflow in nftnl::Batch::with_page_size (nftnl-rs) | 2025-10-18T12:00:00Z | 2025-11-27T21:53:33Z |
| rustsec-2025-0130 | Missing check in ZK proof in CGGMP21 Threshold Signing Protocol | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0129 | Missing check in ZK proof in CGGMP21 Threshold Signing Protocol | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0128 | CGGMP21 presignatures can be used in the way that significantly reduces security | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0127 | CGGMP21 presignatures can be used in the way that significantly reduces security | 2025-11-24T12:00:00Z | 2025-11-26T06:00:45Z |
| rustsec-2025-0125 | Resource Exhaustion (Memory and Handle Leaks) on Windows and macOS | 2025-11-22T12:00:00Z | 2025-11-22T12:29:36Z |
| rustsec-2025-0124 | rand_os crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-19T20:48:42Z |
| rustsec-2025-0123 | opentelemetry-jaeger crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T12:07:07Z |
| rustsec-2025-0122 | cargo-asm crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T09:02:31Z |
| rustsec-2025-0121 | gcc crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T08:52:10Z |
| rustsec-2025-0119 | number_prefix crate is unmaintained | 2025-11-17T12:00:00Z | 2025-11-18T08:13:56Z |
| rustsec-2025-0118 | Unsound API access to a WebAssembly shared linear memory | 2025-11-11T12:00:00Z | 2025-11-13T16:55:40Z |
| rustsec-2025-0117 | tandem is unmaintained | 2025-11-10T12:00:00Z | 2025-11-10T11:31:14Z |
| rustsec-2025-0116 | tandem_garble_interop is unmaintained | 2025-11-10T12:00:00Z | 2025-11-10T11:31:14Z |
| rustsec-2025-0115 | tandem_http_server is unmaintained | 2025-11-10T12:00:00Z | 2025-11-10T11:31:14Z |
| rustsec-2025-0114 | tandem_http_client is unmaintained | 2025-11-10T12:00:00Z | 2025-11-10T11:31:14Z |
| rustsec-2025-0113 | soundness issue and unmaintained | 2025-05-06T12:00:00Z | 2025-11-04T06:10:22Z |
| rustsec-2025-0109 | Out-of-bounds memory access in binary_read_to_ref and binary_write_from_ref | 2025-10-21T12:00:00Z | 2025-10-28T06:02:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2026-1725 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-03-02T09:08:42.293Z | 2026-03-02T09:10:16.414Z |
| bit-gitlab-2026-1662 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-03-02T09:08:40.525Z | 2026-03-02T09:10:16.414Z |
| bit-gitlab-2026-1388 | Inefficient Regular Expression Complexity in GitLab | 2026-03-02T09:08:35.227Z | 2026-03-02T09:10:16.414Z |
| bit-gitlab-2026-0752 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2026-03-02T09:08:25.612Z | 2026-03-02T09:10:16.414Z |
| bit-gitlab-2025-3525 | Allocation of Resources Without Limits or Throttling in GitLab | 2026-03-02T09:06:54.236Z | 2026-03-02T09:10:16.414Z |
| bit-gitlab-2025-14511 | Improper Validation of Specified Quantity in Input in GitLab | 2026-03-02T09:05:49.359Z | 2026-03-02T09:10:16.414Z |
| bit-gitlab-2025-14103 | Missing Authorization in GitLab | 2026-03-02T09:05:45.582Z | 2026-03-02T09:10:16.414Z |
| bit-pytorch-2025-2149 | PyTorch Quantized Sigmoid Module nnq_Sigmoid initialization | 2026-02-26T15:23:05.500Z | 2026-02-26T15:46:51.306Z |
| bit-pytorch-2025-2148 | PyTorch Tuple torch.ops.profiler._call_end_callbacks_on_jit_fut memory corruption | 2026-02-26T15:23:02.496Z | 2026-02-26T15:46:51.306Z |
| bit-neo4j-2026-1337 | Insufficient escaping of unicode characters in query log | 2026-02-26T15:16:17.899Z | 2026-02-26T15:46:51.306Z |
| bit-valkey-2026-27623 | Valkey has Pre-Authentication DOS from malformed RESP request | 2026-02-26T08:53:22.415Z | 2026-02-26T09:13:58.886Z |
| bit-valkey-2026-21863 | Malformed Valkey Cluster bus message can lead to Remote DoS | 2026-02-26T08:53:20.799Z | 2026-02-26T09:13:58.886Z |
| bit-valkey-2025-67733 | Valkey Affected by RESP Protocol Injection via Lua error_reply | 2026-02-26T08:53:18.978Z | 2026-02-26T09:13:58.886Z |
| bit-superset-2026-23983 | Apache Superset: Sensitive Data Exposure via REST API (disabled by default) | 2026-02-26T08:54:03.107Z | 2026-02-26T09:13:58.886Z |
| bit-superset-2026-23982 | Apache Superset: Improper Authorization in Dataset Creation Allows Access Control Bypass | 2026-02-26T08:54:01.397Z | 2026-02-26T09:13:58.886Z |
| bit-superset-2026-23980 | Apache Superset: Improper Neutralization of Special Elements used in a SQL Command | 2026-02-26T08:53:59.760Z | 2026-02-26T09:13:58.886Z |
| bit-mongodb-2026-25613 | An unsafe cast in the MongoDB query planner can result in a segmentation fault. | 2026-02-26T08:47:48.322Z | 2026-02-26T09:13:58.886Z |
| bit-mongodb-2026-25610 | Invalid $geoNear index hint may cause server crash | 2026-02-26T08:47:46.620Z | 2026-02-26T09:13:58.886Z |
| bit-mongodb-2026-25609 | profile command may permit unauthorized configuration | 2026-02-26T08:47:44.983Z | 2026-02-26T09:13:58.886Z |
| bit-mongodb-2026-1850 | An authorized user may disable the MongoDB server by issuing a certain type of complex query due to boolean expression simplification | 2026-02-26T08:47:43.390Z | 2026-02-26T09:13:58.886Z |
| bit-mongodb-2026-1849 | Mongod can run out of stack memory when expressions create deeply nested documents | 2026-02-26T08:47:41.788Z | 2026-02-26T09:13:58.886Z |
| bit-mongodb-2026-1848 | Connections received from the proxy port may not count towards total accepted connections | 2026-02-26T08:47:40.094Z | 2026-02-26T09:13:58.886Z |
| bit-mongodb-2026-1847 | MongoDB Server may crash when inserting large documents | 2026-02-26T08:47:38.190Z | 2026-02-26T09:13:58.886Z |
| bit-bpftool-2025-29481 | 2025-04-16T07:06:29.453Z | 2026-02-26T09:13:58.886Z | |
| bit-appsmith-2026-24042 | Appsmith public apps can execute unpublished actions (viewMode confusion) | 2026-01-29T08:36:35.250Z | 2026-02-26T09:13:58.886Z |
| bit-apache-2021-41773 | Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49 | 2024-03-06T10:54:39.310Z | 2026-02-26T09:13:58.886Z |
| bit-airflow-2025-68675 | Apache Airflow: proxy credentials for various providers might leak in task logs | 2026-01-21T08:39:24.383Z | 2026-02-26T09:13:58.886Z |
| bit-airflow-2025-27555 | Apache Airflow: Connection Secrets not masked in UI when Connection are added via Airflow cli | 2026-02-26T08:39:17.851Z | 2026-02-26T09:13:58.886Z |
| bit-airflow-2024-56373 | Apache Airflow: SSTI to Code Execution in Airflow through Shared DB Information | 2026-02-26T08:39:15.266Z | 2026-02-26T09:13:58.886Z |
| bit-apache-2022-28614 | read beyond bounds via ap_rwrite() | 2024-03-06T10:52:51.677Z | 2026-02-25T15:48:08.458Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-xr99875 | Security fixes for GHSA-389x-839f-4rhx, GHSA-3p8m-j85q-pgmj, GHSA-5jpm-x58v-624v, GHSA-84h7-rjj3-6jx4, GHSA-fghv-69vj-qj49, GHSA-jq43-27x9-3v86, GHSA-qqpg-mvqg-649v applied in versions: 0.1.109-r0, 0.1.113-r1 | 2026-02-03T16:02:30.597873Z | 2026-02-03T11:13:56Z |
| cleanstart-2026-qn16013 | Cancelling a query (e | 2026-02-03T16:02:29.512503Z | 2026-02-03T11:13:56Z |
| cleanstart-2026-nb26505 | Security fixes for GHSA-f6x5-jh6r-wrfv, GHSA-j5w8-q4qc-rx2x applied in versions: 4.5.1-r0 | 2026-02-03T16:02:27.744077Z | 2026-02-03T11:13:56Z |
| cleanstart-2026-my73913 | Security fixes for GHSA-r6j8-c6r2-37rr applied in versions: 4.12.1-r0 | 2026-02-03T16:02:28.659120Z | 2026-02-03T11:13:56Z |
| cleanstart-2026-fc21713 | Cancelling a query (e | 2026-02-03T16:02:29.570272Z | 2026-02-03T11:13:56Z |
| cleanstart-2026-cc08655 | Security fixes for GHSA-f6x5-jh6r-wrfv, GHSA-j5w8-q4qc-rx2x applied in versions: 0.8.4-r0 | 2026-02-03T00:36:29.405423Z | 2026-02-02T12:32:10Z |
| cleanstart-2026-am95501 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-02-03T00:37:00.849369Z | 2026-02-02T12:32:10Z |
| cleanstart-2026-zz61324 | Hunspell 1 | 2026-01-30T17:14:26.562334Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zr62045 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-01-30T16:56:56.696859Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zp68963 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:47:54.288582Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zo91195 | go-redis is the official Redis client library for the Go programming language | 2026-01-30T15:30:24.594235Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zc18474 | PostgreSQL optimizer statistics allow a user to read sampled data within a view that the user cannot access | 2026-01-30T17:04:56.559720Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yt18139 | issue was discovered in libexpat before 2 | 2026-01-30T17:26:57.202658Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ys66739 | Authorization Bypass Through User-Controlled Key in GitHub repository emicklei/go-restful prior to v3 | 2026-01-30T15:00:53.250874Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ym75307 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T14:34:22.430652Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ym28538 | Prometheus Blackbox Exporter through 0 | 2026-01-30T14:06:20.601766Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yl27116 | tar | 2026-01-30T14:08:51.064236Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yk82785 | Within HostnameError | 2026-01-30T14:01:20.108833Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yk54840 | Within HostnameError | 2026-01-30T16:30:55.324232Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yj61997 | Cancelling a query (e | 2026-01-30T14:59:52.788649Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yd87381 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:22:55.178631Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yd51202 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:09:23.124967Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yc48827 | Within HostnameError | 2026-01-30T15:56:24.532632Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yb44027 | Moby is an open-source project created by Docker for software containerization | 2026-01-30T17:04:26.396860Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xz45798 | Within HostnameError | 2026-01-30T14:05:20.961893Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xs24366 | Cancelling a query (e | 2026-01-30T15:00:52.862887Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xr85161 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:02:54.934169Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xr17407 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:11:25.270681Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xo49545 | Within HostnameError | 2026-01-30T16:21:25.500719Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xi02879 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-01-30T16:18:55.578686Z | 2026-01-29T18:58:54Z |
| ID | Description | Updated |
|---|---|---|
| var-201402-0026 | Buffer overflow in the process_ra function in the router advertisement daemon (radvd) bef… | 2024-07-23T22:25:48.682000Z |
| var-201805-1144 | In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and pr… | 2024-07-23T22:25:33.529000Z |
| var-201805-1143 | In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and pr… | 2024-07-23T22:25:33.635000Z |
| var-202005-0008 | Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple heap-based buf… | 2024-07-23T22:25:28.455000Z |
| var-202407-0704 | A vulnerability has been identified in CPCI85 Central Processing/Communication (All versi… | 2024-07-23T22:25:01.735000Z |
| var-200107-0035 | slapd in OpenLDAP 1.x before 1.2.12, and 2.x before 2.0.8, allows remote attackers to cau… | 2024-07-23T22:24:58.858000Z |
| var-200512-0643 | Heap-based buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to exe… | 2024-07-23T22:24:53.371000Z |
| var-200512-0611 | Multiple heap-based buffer overflows in QuickTime.qts in Apple QuickTime Player 7.0.3 and… | 2024-07-23T22:24:53.455000Z |
| var-200512-0300 | Heap-based buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to exe… | 2024-07-23T22:24:53.297000Z |
| var-200512-0297 | Integer overflow in Apple Quicktime before 7.0.4 allows remote attackers to execute arbit… | 2024-07-23T22:24:53.525000Z |
| var-200512-0294 | Buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to execute arbitr… | 2024-07-23T22:24:53.234000Z |
| var-201407-0233 | Multiple stack-based buffer overflows in Advantech WebAccess before 7.2 allow remote atta… | 2024-07-23T22:22:21.013000Z |
| var-201601-0038 | Multiple stack-based buffer overflows in Advantech WebAccess before 8.1 allow remote atta… | 2024-07-23T22:22:04.421000Z |
| var-201801-0394 | TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbi… | 2024-07-23T22:21:46.499000Z |
| var-201904-0181 | Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple stack-based buffer overflow… | 2024-07-23T22:21:36.530000Z |
| var-202108-1160 | Description: A permissions issue was addressed with improved validation. This issue is fi… | 2024-07-23T22:20:46.081000Z |
| var-202305-0218 | D-Link DAP-1360 webproc WEB_DisplayPage Stack-based Buffer Overflow Remote Code Execution… | 2024-07-23T22:20:18.349000Z |
| var-202305-0217 | D-Link DAP-1360 Hardcoded Credentials Authentication Bypass Vulnerability. This vulnerabi… | 2024-07-23T22:20:18.369000Z |
| var-202305-0216 | D-Link DAP-1360 Multiple Parameters Stack-Based Buffer Overflow Remote Code Execution Vul… | 2024-07-23T22:20:18.413000Z |
| var-202305-0177 | D-Link DAP-1360 webproc Stack-based Buffer Overflow Remote Code Execution Vulnerability. … | 2024-07-23T22:20:18.434000Z |
| var-202305-0176 | D-Link DAP-1360 webproc var:sys_Token Heap-based Buffer Overflow Remote Code Execution Vu… | 2024-07-23T22:20:18.458000Z |
| var-202305-0166 | D-Link DAP-1360 webproc var:menu Stack-based Buffer Overflow Remote Code Execution Vulner… | 2024-07-23T22:20:18.326000Z |
| var-202305-0154 | D-Link DAP-1360 webproc var:page Stack-based Buffer Overflow Remote Code Execution Vulner… | 2024-07-23T22:20:18.503000Z |
| var-202305-0153 | D-Link DAP-1360 webupg UPGCGI_CheckAuth Numeric Truncation Remote Code Execution Vulnerab… | 2024-07-23T22:20:18.392000Z |
| var-202305-0071 | D-Link DAP-1360 webproc Heap-based Buffer Overflow Remote Code Execution Vulnerability. T… | 2024-07-23T22:20:18.481000Z |
| var-202305-0070 | D-Link DAP-1360 webproc COMM_MakeCustomMsg Stack-based Buffer Overflow Remote Code Execut… | 2024-07-23T22:20:18.303000Z |
| var-202308-3323 | D-Link DAP-2622 DDP Change ID Password Auth Username Stack-based Buffer Overflow Remote C… | 2024-07-23T22:20:12.387000Z |
| var-202308-3185 | D-Link DAP-2622 DDP Configuration Backup Filename Stack-based Buffer Overflow Remote Code… | 2024-07-23T22:20:12.455000Z |
| var-202308-3131 | D-Link DAP-2622 DDP Reset Factory Auth Password Stack-based Buffer Overflow Remote Code E… | 2024-07-23T22:20:12.487000Z |
| var-202308-3130 | D-Link DAP-2622 DDP Configuration Restore Auth Username Stack-based Buffer Overflow Remot… | 2024-07-23T22:20:12.431000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2026-000004 | The installers for multiple PIONEER products may insecurely load Dynamic Link Libraries | 2026-01-08T13:47+09:00 | 2026-01-08T13:47+09:00 |
| jvndb-2026-000001 | Origin validation error vulnerability in Fujitsu Security Solution AuthConductor Client Basic V2 | 2026-01-07T14:19+09:00 | 2026-01-07T14:19+09:00 |
| jvndb-2026-001001 | Authentication bypass vulnerability in OpenBlocks series | 2026-01-07T10:46+09:00 | 2026-01-07T10:46+09:00 |
| jvndb-2025-019621 | EPSON WebConfig / Epson Web Control for SEIKO EPSON Projector Products do not restrict excessive authentication attempts | 2025-11-21T15:31+09:00 | 2025-12-24T10:54+09:00 |
| jvndb-2025-014967 | Multiple vulnerabilities in multiple Keyence products | 2025-10-03T11:19+09:00 | 2025-12-23T14:36+09:00 |
| jvndb-2025-000117 | SEIKO EPSON printer Web Config vulnerable to stack-based buffer overflow | 2025-12-16T15:31+09:00 | 2025-12-23T11:57+09:00 |
| jvndb-2025-022400 | Ruijie Networks AP180 Series vulnerable to OS command injection | 2025-12-19T12:33+09:00 | 2025-12-19T12:33+09:00 |
| jvndb-2025-000118 | GROWI vulnerable to cross-site request forgery | 2025-12-17T13:04+09:00 | 2025-12-17T13:04+09:00 |
| jvndb-2025-022062 | Multiple vulnerabilities in CHOCO TEI WATCHER mini | 2025-12-17T11:28+09:00 | 2025-12-17T11:28+09:00 |
| jvndb-2025-000115 | QND vulnerable to privilege escalation | 2025-12-11T14:33+09:00 | 2025-12-11T14:33+09:00 |
| jvndb-2025-000113 | Multiple vulnerabilities in GroupSession | 2025-12-08T17:48+09:00 | 2025-12-11T11:30+09:00 |
| jvndb-2025-000091 | Multiple I-O DATA NAS management applications register Windows services with unquoted file paths | 2025-10-22T15:04+09:00 | 2025-12-10T16:20+09:00 |
| jvndb-2021-000081 | Multiple vulnerabilities in Sharp NEC Display Solutions' public displays | 2021-09-17T15:13+09:00 | 2025-12-10T10:24+09:00 |
| jvndb-2025-021305 | Android App "Brother iPrint&Scan" improper use of an external cache directory | 2025-12-09T17:25+09:00 | 2025-12-09T17:25+09:00 |
| jvndb-2025-000114 | ELECOM Clone for Windows registers a Windows service with an unquoted file path | 2025-12-09T17:16+09:00 | 2025-12-09T17:16+09:00 |
| jvndb-2025-000116 | GS Yuasa FULLBACK Manager Pro registers Windows services with unquoted file paths | 2025-12-08T14:06+09:00 | 2025-12-08T14:06+09:00 |
| jvndb-2025-000094 | Multiple vulnerabilities in ABB Terra AC Wallbox | 2025-12-05T14:12+09:00 | 2025-12-05T14:12+09:00 |
| jvndb-2025-000112 | Installer of INZONE Hub may insecurely load Dynamic Link Libraries | 2025-11-28T13:36+09:00 | 2025-11-28T13:36+09:00 |
| jvndb-2025-000111 | SwitchBot Smart Video Doorbell vulnerable to active debug code | 2025-11-26T14:35+09:00 | 2025-11-26T14:35+09:00 |
| jvndb-2025-000110 | Multiple vulnerabilities in Security Point (Windows) of MaLion | 2025-11-25T17:17+09:00 | 2025-11-25T17:17+09:00 |
| jvndb-2025-000109 | Multiple vulnerabilities in SNC-CX600W | 2025-11-25T14:59+09:00 | 2025-11-25T14:59+09:00 |
| jvndb-2025-000108 | "FOD" App uses hard-coded cryptographic keys | 2025-11-25T14:15+09:00 | 2025-11-25T14:15+09:00 |
| jvndb-2025-000106 | Multiple vulnerabilities in LogStare Collector | 2025-11-21T16:27+09:00 | 2025-11-21T16:27+09:00 |
| jvndb-2025-000107 | Installer of RakurakuMusen Start EX for Windows may insecurely load Dynamic Link Libraries | 2025-11-19T16:22+09:00 | 2025-11-19T16:22+09:00 |
| jvndb-2025-000097 | "Dejira" App for iOS vulnerable to improper server certificate verification | 2025-11-17T14:09+09:00 | 2025-11-17T14:09+09:00 |
| jvndb-2025-000105 | NCP-HG100 vulnerable to OS command injection | 2025-11-14T15:26+09:00 | 2025-11-14T15:26+09:00 |
| jvndb-2025-000104 | Multiple vulnerabilities in GNU Libmicrohttpd | 2025-11-10T15:07+09:00 | 2025-11-10T15:07+09:00 |
| jvndb-2025-000103 | Use of password hash with insufficient computational effort vulnerability in BUFFALO Wi-Fi router "WSR-1800AX4 series" | 2025-11-07T15:39+09:00 | 2025-11-07T15:39+09:00 |
| jvndb-2025-000102 | CLUSTERPRO X and EXPRESSCLUSTER X vulnerable to OS command injection | 2025-11-07T14:55+09:00 | 2025-11-07T14:55+09:00 |
| jvndb-2025-000101 | GROWI vulnerable to stored cross-site scripting | 2025-11-06T13:45+09:00 | 2025-11-06T13:45+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0666-1 | Security update for docker | 2026-02-26T15:17:25Z | 2026-02-26T15:17:25Z |
| suse-su-2026:0665-1 | Security update for frr | 2026-02-26T15:16:24Z | 2026-02-26T15:16:24Z |
| suse-su-2026:0664-1 | Security update for python3 | 2026-02-26T15:15:20Z | 2026-02-26T15:15:20Z |
| suse-su-2026:0663-1 | Security update for python | 2026-02-26T15:13:11Z | 2026-02-26T15:13:11Z |
| suse-su-2026:0662-1 | Security update for qemu | 2026-02-26T15:12:26Z | 2026-02-26T15:12:26Z |
| suse-su-2026:0661-1 | Security update for erlang | 2026-02-26T15:10:09Z | 2026-02-26T15:10:09Z |
| suse-su-2026:0659-1 | Security update for docker-stable | 2026-02-26T15:08:37Z | 2026-02-26T15:08:37Z |
| suse-su-2026:0658-1 | Security update for libsoup | 2026-02-26T15:07:42Z | 2026-02-26T15:07:42Z |
| suse-su-2026:0657-1 | Security update for libsoup2 | 2026-02-26T15:07:11Z | 2026-02-26T15:07:11Z |
| suse-su-2026:0656-1 | Security update for freerdp | 2026-02-26T15:06:36Z | 2026-02-26T15:06:36Z |
| suse-su-2026:0642-1 | Security update for python313 | 2026-02-26T11:53:34Z | 2026-02-26T11:53:34Z |
| suse-su-2026:0650-1 | Security update for redis | 2026-02-25T16:33:31Z | 2026-02-25T16:33:31Z |
| suse-su-2026:0649-1 | Security update for freerdp | 2026-02-25T16:31:37Z | 2026-02-25T16:31:37Z |
| suse-su-2026:0648-1 | Security update for libjxl | 2026-02-25T16:30:57Z | 2026-02-25T16:30:57Z |
| suse-su-2026:0647-1 | Security update for expat | 2026-02-25T16:30:09Z | 2026-02-25T16:30:09Z |
| suse-su-2026:0646-1 | Security update for expat | 2026-02-25T16:29:24Z | 2026-02-25T16:29:24Z |
| suse-su-2026:0645-1 | Security update for python3 | 2026-02-25T16:29:02Z | 2026-02-25T16:29:02Z |
| suse-su-2026:0644-1 | Security update for python312 | 2026-02-25T16:28:23Z | 2026-02-25T16:28:23Z |
| suse-su-2026:0643-1 | Security update for python39 | 2026-02-25T16:27:51Z | 2026-02-25T16:27:51Z |
| suse-su-2026:0641-1 | Security update for docker-stable | 2026-02-25T16:25:10Z | 2026-02-25T16:25:10Z |
| suse-su-2026:0619-1 | Security update for openvswitch | 2026-02-24T15:36:20Z | 2026-02-24T15:36:20Z |
| suse-su-2026:0618-1 | Security update for protobuf | 2026-02-24T15:35:39Z | 2026-02-24T15:35:39Z |
| suse-su-2026:0617-1 | Security update for the Linux Kernel | 2026-02-24T15:19:04Z | 2026-02-24T15:19:04Z |
| suse-su-2026:0616-1 | Security update for postgresql14 | 2026-02-24T15:16:11Z | 2026-02-24T15:16:11Z |
| suse-su-2026:0615-1 | Security update for postgresql15 | 2026-02-24T15:15:59Z | 2026-02-24T15:15:59Z |
| suse-su-2026:0614-1 | Security update for postgresql16 | 2026-02-24T15:15:47Z | 2026-02-24T15:15:47Z |
| suse-su-2026:0613-1 | Security update for python310 | 2026-02-24T15:14:45Z | 2026-02-24T15:14:45Z |
| suse-su-2026:0612-1 | Security update for python36 | 2026-02-24T15:14:18Z | 2026-02-24T15:14:18Z |
| suse-su-2026:0606-1 | Security update for libxml2 | 2026-02-24T11:19:39Z | 2026-02-24T11:19:39Z |
| suse-su-2026:0605-1 | Security update for libxml2 | 2026-02-24T11:19:20Z | 2026-02-24T11:19:20Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-11753 | Google Chrome安全绕过漏洞(CNVD-2026-11753) | 2026-01-30 | 2026-02-25 |
| cnvd-2026-11752 | Google Chrome安全绕过漏洞(CNVD-2026-11752) | 2026-01-30 | 2026-02-25 |
| cnvd-2026-11751 | Google Chrome代码执行漏洞(CNVD-2026-11751) | 2026-01-30 | 2026-02-25 |
| cnvd-2026-11750 | Google Chrome安全绕过漏洞(CNVD-2026-11750) | 2026-01-30 | 2026-02-25 |
| cnvd-2026-11749 | Tenda TX9 goform/SetStaticRouteCfg文件缓冲区溢出漏洞 | 2026-02-11 | 2026-02-25 |
| cnvd-2026-11748 | WeKan存在未明漏洞(CNVD-2026-11748) | 2026-02-11 | 2026-02-25 |
| cnvd-2026-11747 | WeKan存在未明漏洞 | 2026-02-11 | 2026-02-25 |
| cnvd-2026-11746 | Google Android存在未明漏洞(CNVD-2026-11746) | 2024-11-15 | 2026-02-24 |
| cnvd-2026-11745 | Google Android代码注入漏洞(CNVD-2026-11745) | 2024-11-15 | 2026-02-24 |
| cnvd-2026-11744 | Google Android代码注入漏洞 | 2024-11-15 | 2026-02-24 |
| cnvd-2026-11743 | MedDream PACS Premium cecho.php功能服务器端请求伪造漏洞 | 2025-07-30 | 2026-02-24 |
| cnvd-2026-11742 | MedDream PACS Premium安全绕过漏洞 | 2025-07-30 | 2026-02-24 |
| cnvd-2026-11741 | MedDream PACS Premium访问控制错误漏洞 | 2025-07-30 | 2026-02-24 |
| cnvd-2026-11740 | Google Android权限提升漏洞(CNVD-2026-11740) | 2025-09-04 | 2026-02-24 |
| cnvd-2026-11739 | Google Android权限提升漏洞(CNVD-2026-11739) | 2025-09-04 | 2026-02-24 |
| cnvd-2026-11738 | MedDream PACS Premium跨站脚本漏洞(CNVD-2026-11738) | 2026-01-26 | 2026-02-24 |
| cnvd-2026-11737 | MedDream PACS Premium跨站脚本漏洞(CNVD-2026-11737) | 2026-01-26 | 2026-02-24 |
| cnvd-2026-11736 | TOTOLINK NR1800X命令注入漏洞(CNVD-2026-11736) | 2026-01-30 | 2026-02-24 |
| cnvd-2026-11735 | Tenda W30E信息泄露漏洞 | 2026-01-30 | 2026-02-24 |
| cnvd-2026-11734 | Tenda AX1806 sub_4C408函数堆栈溢出漏洞 | 2026-01-30 | 2026-02-24 |
| cnvd-2026-11733 | Tenda D301和Tenda D151访问控制错误漏洞 | 2026-02-05 | 2026-02-24 |
| cnvd-2026-02809 | ComfyUI-Manager CRLF注入漏洞 | 2026-01-09 | 2026-02-23 |
| cnvd-2026-10895 | WordPress插件Pixel Manager for WooCommerce信息泄露漏洞 | 2025-11-20 | 2026-02-14 |
| cnvd-2026-10894 | WordPress插件Quiz Maker信息泄露漏洞 | 2025-11-21 | 2026-02-14 |
| cnvd-2026-10893 | WordPress插件WP FullCalendar信息泄露漏洞 | 2026-01-30 | 2026-02-14 |
| cnvd-2026-10892 | WordPress插件WP Directory Kit信息泄露漏洞 | 2026-01-30 | 2026-02-14 |
| cnvd-2026-10891 | WordPress插件CubeWP – All-in-One Dynamic Content Framework信息泄露漏洞 | 2026-01-30 | 2026-02-14 |
| cnvd-2026-10890 | WordPress插件Contact Form 7 GetResponse Extension信息泄露漏洞 | 2026-01-30 | 2026-02-14 |
| cnvd-2026-10889 | WordPress插件Cargus信息泄露漏洞 | 2026-01-30 | 2026-02-14 |
| cnvd-2026-10888 | WordPress插件Booking Ultra Pro信息泄露漏洞 | 2026-01-30 | 2026-02-14 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0193 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0192 | Multiples vulnérabilités dans le noyau Linux de Debian | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0191 | Vulnérabilité dans Traefik | 2026-02-20T00:00:00.000000 | 2026-02-20T00:00:00.000000 |
| certfr-2026-avi-0190 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0189 | Vulnérabilité dans F5 BIG-IP | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0188 | Multiples vulnérabilités dans les produits Splunk | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0186 | Multiples vulnérabilités dans Google Chrome | 2026-02-19T00:00:00.000000 | 2026-02-19T00:00:00.000000 |
| certfr-2026-avi-0185 | Vulnérabilité dans Microsoft Windows | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0184 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0183 | Vulnérabilité dans HPE Aruba Networking ClearPass Policy Manager | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0182 | Multiples vulnérabilités dans Atlassian Confluence | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0181 | Vulnérabilité dans Apache Tomcat | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0180 | Vulnérabilité dans NetApp StorageGRID | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0178 | Multiples vulnérabilités dans Tenable Security Center | 2026-02-18T00:00:00.000000 | 2026-02-18T00:00:00.000000 |
| certfr-2026-avi-0177 | Multiples vulnérabilités dans Moodle | 2026-02-17T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2026-avi-0176 | Vulnérabilité dans Mattermost Server | 2026-02-17T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2026-avi-0175 | Multiples vulnérabilités dans les produits Mozilla | 2026-02-17T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2026-avi-0174 | Multiples vulnérabilités dans LibreNMS | 2026-02-17T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2024-avi-0858 | Multiples vulnérabilités dans Mitel Micollab | 2024-10-10T00:00:00.000000 | 2026-02-17T00:00:00.000000 |
| certfr-2026-avi-0173 | Multiples vulnérabilités dans les produits Mattermost | 2026-02-16T00:00:00.000000 | 2026-02-16T00:00:00.000000 |
| certfr-2026-avi-0172 | Vulnérabilité dans Google Chrome | 2026-02-16T00:00:00.000000 | 2026-02-16T00:00:00.000000 |
| certfr-2026-avi-0052 | Multiples vulnérabilités dans Mattermost Server | 2026-01-16T00:00:00.000000 | 2026-02-16T00:00:00.000000 |
| CERTFR-2026-AVI-0173 | Multiples vulnérabilités dans les produits Mattermost | 2026-02-16T00:00:00.000000 | 2026-02-16T00:00:00.000000 |
| CERTFR-2026-AVI-0172 | Vulnérabilité dans Google Chrome | 2026-02-16T00:00:00.000000 | 2026-02-16T00:00:00.000000 |
| CERTFR-2026-AVI-0052 | Multiples vulnérabilités dans Mattermost Server | 2026-01-16T00:00:00.000000 | 2026-02-16T00:00:00.000000 |
| certfr-2026-avi-0171 | Multiples vulnérabilités dans les produits IBM | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0170 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0169 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0168 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| certfr-2026-avi-0167 | Multiples vulnérabilités dans le noyau Linux de Debian LTS | 2026-02-13T00:00:00.000000 | 2026-02-13T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2024-ALE-002 | [MàJ] Multiples Vulnérabilités dans GitLab | 2024-01-12T00:00:00.000000 | 2024-02-22T00:00:00.000000 |
| certfr-2023-ale-013 | Vulnérabilité dans Apache Struts 2 | 2023-12-13T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-012 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-10-23T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-011 | [MàJ] Multiples vulnérabilités dans Cisco IOS XE | 2023-10-17T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-010 | Multiples vulnérabilités dans Exim | 2023-10-02T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| CERTFR-2023-ALE-013 | Vulnérabilité dans Apache Struts 2 | 2023-12-13T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| CERTFR-2023-ALE-012 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-10-23T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| CERTFR-2023-ALE-011 | [MàJ] Multiples vulnérabilités dans Cisco IOS XE | 2023-10-17T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| CERTFR-2023-ALE-010 | Multiples vulnérabilités dans Exim | 2023-10-02T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-008 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-07-19T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| certfr-2023-ale-007 | [MàJ] Vulnérabilité dans Zimbra Collaboration Suite | 2023-07-17T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| CERTFR-2023-ALE-008 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-07-19T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| CERTFR-2023-ALE-007 | [MàJ] Vulnérabilité dans Zimbra Collaboration Suite | 2023-07-17T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| certfr-2023-ale-006 | Vulnérabilité dans les produits Microsoft | 2023-12-12T00:00:00.000000 | 2023-07-12T00:00:00.000000 |
| CERTFR-2023-ALE-006 | Vulnérabilité dans les produits Microsoft | 2023-12-12T00:00:00.000000 | 2023-07-12T00:00:00.000000 |
| certfr-2023-ale-009 | [MàJ] Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile | 2023-07-26T00:00:00.000000 | 2023-09-15T00:00:00.000000 |
| CERTFR-2023-ALE-009 | [MàJ] Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile | 2023-07-26T00:00:00.000000 | 2023-09-15T00:00:00.000000 |
| certfr-2023-ale-005 | Synthèse sur l'exploitation d'une vulnérabilité dans MOVEit Transfer | 2023-07-05T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| certfr-2023-ale-004 | Vulnérabilité dans les produits Fortinet | 2023-06-13T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| certfr-2022-ale-014 | Multiples vulnérabilités dans AMI MegaRAC | 2022-12-16T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| CERTFR-2023-ALE-005 | Synthèse sur l'exploitation d'une vulnérabilité dans MOVEit Transfer | 2023-07-05T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| CERTFR-2023-ALE-004 | Vulnérabilité dans les produits Fortinet | 2023-06-13T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| CERTFR-2022-ALE-014 | Multiples vulnérabilités dans AMI MegaRAC | 2022-12-16T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| certfr-2023-ale-002 | [MàJ] Vulnérabilité dans Microsoft Outlook | 2023-03-15T00:00:00.000000 | 2023-05-11T00:00:00.000000 |
| CERTFR-2023-ALE-002 | [MàJ] Vulnérabilité dans Microsoft Outlook | 2023-03-15T00:00:00.000000 | 2023-05-11T00:00:00.000000 |
| certfr-2023-ale-003 | [MàJ] Compromission de l'application 3CX Desktop App | 2023-03-31T00:00:00.000000 | 2023-04-12T00:00:00.000000 |
| CERTFR-2023-ALE-003 | [MàJ] Compromission de l'application 3CX Desktop App | 2023-03-31T00:00:00.000000 | 2023-04-12T00:00:00.000000 |
| certfr-2023-ale-015 | [MàJ] Campagne d'exploitation d'une vulnérabilité affectant VMware ESXi | 2023-02-03T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2023-ale-001 | Vulnérabilité dans Fortinet FortiOS | 2023-03-14T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-013 | [MàJ] Vulnérabilité dans Citrix ADC et Gateway | 2022-12-13T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| GCVE-1-2025-0002 |
8.9 (4.0)
|
Command Injection in Cl0p Exfiltration Python Script |
Cl0p ransomware |
exfiltration |
2025-07-01T08:19:00.000Z | 2025-07-01T10:58:58.443468Z |
| GCVE-1-2025-0001 |
5.3 (4.0)
|
The absence of a password confirmation step when deact… |
CIRCL |
Vulnerability-Lookup |
2025-05-27T08:58:00.000Z | 2025-05-30T14:27:56.273945Z |