Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2020-37079 |
5.1 (4.0)
4.3 (3.1)
|
Wing FTP Server < 6.2.7 - Cross-site Request Forgery |
Wing FTP Server |
Wing FTP Server |
2026-02-06T23:16:47.715Z | 2026-02-17T16:53:41.381Z |
| CVE-2019-25373 |
5.1 (4.0)
6.4 (3.1)
|
OPNsense 19.1 Stored XSS via firewall_rules_edit.php |
Opnsense |
OPNsense |
2026-02-15T13:58:55.157Z | 2026-02-17T16:53:15.736Z |
| CVE-2026-0999 |
5.4 (3.1)
|
Authentication bypass via userID login when email and … |
Mattermost |
Mattermost |
2026-02-16T09:47:45.960Z | 2026-02-17T16:53:07.181Z |
| CVE-2019-25374 |
5.1 (4.0)
6.1 (3.1)
|
OPNsense 19.1 Reflected XSS via vpn_ipsec_settings.php |
Opnsense |
OPNsense |
2026-02-15T13:58:55.932Z | 2026-02-17T16:52:55.363Z |
| CVE-2019-25375 |
5.1 (4.0)
6.1 (3.1)
|
OPNsense 19.1 Reflected XSS via monit interface |
Opnsense |
OPNsense |
2026-02-15T13:58:56.731Z | 2026-02-17T16:52:30.726Z |
| CVE-2019-25376 |
5.1 (4.0)
6.1 (3.1)
|
OPNsense 19.1 Reflected XSS via proxy endpoint |
Opnsense |
OPNsense |
2026-02-15T13:58:57.461Z | 2026-02-17T16:51:58.644Z |
| CVE-2019-25377 |
4.8 (4.0)
5.4 (3.1)
|
OPNsense 19.1 Reflected XSS via system_advanced_sysctl.php |
Opnsense |
OPNsense |
2026-02-15T13:58:58.193Z | 2026-02-17T16:51:41.154Z |
| CVE-2026-26366 |
9.3 (4.0)
9.8 (3.1)
|
JUNG eNet SMART HOME server 2.2.1/2.3.1 Use of Default… |
JUNG |
eNet SMART HOME server |
2026-02-15T15:29:53.866Z | 2026-02-17T16:51:25.025Z |
| CVE-2026-26367 |
7.1 (4.0)
6.5 (3.1)
|
JUNG eNet SMART HOME server 2.2.1/2.3.1 Arbitrary User… |
JUNG |
eNet SMART HOME server |
2026-02-15T15:29:54.646Z | 2026-02-17T16:50:52.127Z |
| CVE-2026-26368 |
8.7 (4.0)
8.8 (3.1)
|
JUNG eNet SMART HOME server 2.2.1/2.3.1 Account Takeov… |
JUNG |
eNet SMART HOME server |
2026-02-15T15:29:55.403Z | 2026-02-17T16:50:34.868Z |
| CVE-2026-26369 |
9.3 (4.0)
9.8 (3.1)
|
JUNG eNet SMART HOME server 2.2.1/2.3.1 Privilege Esca… |
JUNG |
eNet SMART HOME server |
2026-02-15T15:29:56.204Z | 2026-02-17T16:50:04.129Z |
| CVE-2019-25378 |
5.1 (4.0)
6.1 (3.1)
|
Smoothwall Express 3.1 'proxy.cgi' Cross-Site Scripting |
Smoothwall |
Smoothwall Express |
2026-02-16T17:04:53.222Z | 2026-02-17T16:49:43.661Z |
| CVE-2019-25379 |
5.3 (4.0)
7.2 (3.1)
|
Smoothwall Express 3.1 'urlfilter.cgi' Cross-Site Scripting |
Smoothwall |
Smoothwall Express |
2026-02-16T17:04:54.146Z | 2026-02-17T16:49:23.149Z |
| CVE-2019-25380 |
5.1 (4.0)
6.1 (3.1)
|
Smoothwall Express 3.1 'dhcp.cgi' Cross-Site Scripting |
Smoothwall |
Smoothwall Express |
2026-02-16T17:04:54.998Z | 2026-02-17T16:48:57.484Z |
| CVE-2019-25381 |
5.1 (4.0)
6.1 (3.1)
|
Smoothwall Express 3.1 'hosts.cgi' Cross-Site Scripting |
Smoothwall |
Smoothwall Express |
2026-02-16T17:04:55.894Z | 2026-02-17T16:48:42.411Z |
| CVE-2019-25382 |
5.1 (4.0)
6.1 (3.1)
|
Smoothwall Express 3.1 'time.cgi' Cross-Site Scripting |
Smoothwall |
Smoothwall Express |
2026-02-16T17:04:56.674Z | 2026-02-17T16:46:04.978Z |
| CVE-2019-25383 |
5.1 (4.0)
6.1 (3.1)
|
Smoothwall Express 3.1 'apcupsd.cgi' Cross-Site Scripting |
Smoothwall |
Smoothwall Express |
2026-02-16T17:04:57.460Z | 2026-02-17T16:45:38.976Z |
| CVE-2019-25384 |
5.1 (4.0)
6.1 (3.1)
|
Smoothwall Express 3.1 'portfw.cgi' Cross-Site Scripting |
Smoothwall |
Smoothwall Express |
2026-02-16T17:04:58.295Z | 2026-02-17T16:45:24.262Z |
| CVE-2019-25392 |
5.1 (4.0)
6.1 (3.1)
|
Smoothwall Express 3.1 'iptools.cgi' Cross-Site Scripting |
Smoothwall |
Smoothwall Express |
2026-02-16T17:05:05.287Z | 2026-02-17T16:45:08.369Z |
| CVE-2025-59905 |
4.8 (4.0)
|
Reflected Cross-Site Scripting (XSS) in Kubysoft |
Kubysoft |
Kubysoft |
2026-02-16T09:49:45.219Z | 2026-02-17T16:44:06.603Z |
| CVE-2026-2577 |
10 (3.1)
|
Nanobot Unauthenticated WhatsApp Session Hijack via We… |
HKUDS |
nanobot |
2026-02-16T09:51:11.375Z | 2026-02-17T16:43:29.855Z |
| CVE-2025-65924 |
4.1 (3.1)
|
ERPNext thru 15.88.1 does not sanitize or remove … |
n/a |
n/a |
2026-02-03T00:00:00.000Z | 2026-02-17T16:42:43.134Z |
| CVE-2026-2552 |
5.1 (4.0)
5.5 (3.1)
5.5 (3.0)
|
ZenTao Editor control.php delete path traversal |
n/a |
ZenTao |
2026-02-16T11:02:05.938Z | 2026-02-17T16:41:38.415Z |
| CVE-2026-2553 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
tushar-2223 Hotel-Management-System HTTP POST Request … |
tushar-2223 |
Hotel-Management-System |
2026-02-16T11:32:06.780Z | 2026-02-17T16:37:22.685Z |
| CVE-2026-2557 |
5.1 (4.0)
3.5 (3.1)
3.5 (3.0)
|
cskefu File Upload MediaController.java upload cross s… |
n/a |
cskefu |
2026-02-16T13:02:39.281Z | 2026-02-17T16:34:54.871Z |
| CVE-2026-2534 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Comfast CF-N1 V2 mbox-config sub_44AC4C command injection |
Comfast |
CF-N1 V2 |
2026-02-16T04:02:06.616Z | 2026-02-17T16:34:08.793Z |
| CVE-2026-2533 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
Tosei Self-service Washing Machine tosei_datasend.php … |
Tosei |
Self-service Washing Machine |
2026-02-16T03:32:08.901Z | 2026-02-17T16:33:25.494Z |
| CVE-2026-24858 |
9.4 (3.1)
|
An Authentication Bypass Using an Alternate Path … |
Fortinet |
FortiManager |
2026-01-27T19:18:23.591Z | 2026-02-17T16:33:19.415Z |
| CVE-2026-25922 |
8.8 (3.1)
|
authentik has a Signature Verification Bypass via SAML… |
goauthentik |
authentik |
2026-02-12T19:38:16.850Z | 2026-02-17T16:19:14.739Z |
| CVE-2025-70397 |
8.8 (3.1)
|
jizhicms 2.5.6 is vulnerable to SQL Injection in … |
n/a |
n/a |
2026-02-17T00:00:00.000Z | 2026-02-17T16:17:46.850Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-24733 |
N/A
|
Apache Tomcat: Security constraint bypass with HTTP/0.9 |
Apache Software Foundation |
Apache Tomcat |
2026-02-17T18:50:43.871Z | 2026-02-17T18:50:43.871Z |
| CVE-2026-2464 |
8.7 (4.0)
|
Directory Traversal in AMR Printer Management by AMR |
AMR |
AMR Printer Management Beta web service |
2026-02-18T13:43:08.101Z | 2026-02-18T14:47:38.856Z |
| CVE-2026-2426 |
6.5 (3.1)
|
WP-DownloadManager <= 1.69 - Authenticated (Administra… |
gamerz |
WP-DownloadManager |
2026-02-18T10:20:48.986Z | 2026-02-18T12:50:25.552Z |
| CVE-2026-2419 |
2.7 (3.1)
|
WP-DownloadManager <= 1.69 - Authenticated (Administra… |
gamerz |
WP-DownloadManager |
2026-02-18T07:25:39.503Z | 2026-02-18T12:52:40.197Z |
| CVE-2026-2386 |
4.3 (3.1)
|
The Plus Addons for Elementor – Addons for Elementor, … |
posimyththemes |
The Plus Addons for Elementor – Addons for Elementor, Page Templates, Widgets, Mega Menu, WooCommerce |
2026-02-18T12:28:34.722Z | 2026-02-18T20:22:50.157Z |
| CVE-2026-23599 |
7.8 (3.1)
|
Local Privilege Escalation Vulnerability in HPE Aruba … |
Hewlett Packard Enterprise (HPE) |
HPE Aruba Networking ClearPass Policy Manager |
2026-02-17T23:04:36.463Z | 2026-02-18T13:43:12.492Z |
| CVE-2026-23598 |
6.5 (3.1)
|
Unauthenticated Information Disclosure in application … |
Hewlett Packard Enterprise (HPE) |
HPE Aruba Networking Private 5G Core |
2026-02-17T20:47:21.374Z | 2026-02-17T21:30:43.287Z |
| CVE-2026-23597 |
6.5 (3.1)
|
Unauthenticated Information Disclosure in application … |
Hewlett Packard Enterprise (HPE) |
HPE Aruba Networking Private 5G Core |
2026-02-17T20:46:45.035Z | 2026-02-18T14:42:46.651Z |
| CVE-2026-23596 |
6.5 (3.1)
|
Unauthenticated Improper Access Control in management … |
Hewlett Packard Enterprise (HPE) |
HPE Aruba Networking Private 5G Core |
2026-02-17T20:46:12.694Z | 2026-02-18T15:15:27.361Z |
| CVE-2026-23595 |
8.8 (3.1)
|
Unauthenticated Authentication Bypass in application A… |
Hewlett Packard Enterprise (HPE) |
HPE Aruba Networking Private 5G Core |
2026-02-17T20:45:43.833Z | 2026-02-18T15:18:41.436Z |
| CVE-2026-2329 |
9.3 (4.0)
|
Grandstream GXP1600 VoIP Phones - Unauthenticated stac… |
Grandstream |
GXP1610 |
2026-02-18T14:08:09.272Z | 2026-02-18T14:50:51.252Z |
| CVE-2026-23227 |
N/A
|
drm/exynos: vidi: use ctx->lock to protect struct vidi… |
Linux |
Linux |
2026-02-18T14:53:30.784Z | 2026-02-18T14:53:30.784Z |
| CVE-2026-23226 |
N/A
|
ksmbd: add chann_lock to protect ksmbd_chann_list xarray |
Linux |
Linux |
2026-02-18T14:53:29.562Z | 2026-02-18T14:53:29.562Z |
| CVE-2026-23225 |
N/A
|
sched/mmcid: Don't assume CID is CPU owned on mode switch |
Linux |
Linux |
2026-02-18T14:53:28.387Z | 2026-02-18T14:53:28.387Z |
| CVE-2026-23224 |
N/A
|
erofs: fix UAF issue for file-backed mounts w/ directi… |
Linux |
Linux |
2026-02-18T14:53:27.462Z | 2026-02-18T14:53:27.462Z |
| CVE-2026-23223 |
N/A
|
xfs: fix UAF in xchk_btree_check_block_owner |
Linux |
Linux |
2026-02-18T14:53:26.603Z | 2026-02-18T14:53:26.603Z |
| CVE-2026-23219 |
N/A
|
mm/slab: Add alloc_tagging_slab_free_hook for memcg_al… |
Linux |
Linux |
2026-02-18T14:21:57.049Z | 2026-02-18T14:21:57.049Z |
| CVE-2026-23218 |
N/A
|
gpio: loongson-64bit: Fix incorrect NULL check after d… |
Linux |
Linux |
2026-02-18T14:21:55.906Z | 2026-02-18T14:21:55.906Z |
| CVE-2026-23217 |
N/A
|
riscv: trace: fix snapshot deadlock with sbi ecall |
Linux |
Linux |
2026-02-18T14:21:54.878Z | 2026-02-18T14:21:54.878Z |
| CVE-2026-23216 |
N/A
|
scsi: target: iscsi: Fix use-after-free in iscsit_dec_… |
Linux |
Linux |
2026-02-18T14:21:53.699Z | 2026-02-18T14:21:53.699Z |
| CVE-2026-23215 |
N/A
|
x86/vmware: Fix hypercall clobbers |
Linux |
Linux |
2026-02-18T14:21:52.515Z | 2026-02-18T14:21:52.515Z |
| CVE-2026-23214 |
N/A
|
btrfs: reject new transactions if the fs is fully read-only |
Linux |
Linux |
2026-02-18T14:21:51.507Z | 2026-02-18T14:21:51.507Z |
| CVE-2026-23213 |
N/A
|
drm/amd/pm: Disable MMIO access during SMU Mode 1 reset |
Linux |
Linux |
2026-02-18T14:21:50.637Z | 2026-02-18T14:21:50.637Z |
| CVE-2026-23212 |
N/A
|
bonding: annotate data-races around slave->last_rx |
Linux |
Linux |
2026-02-18T14:16:28.104Z | 2026-02-18T14:16:28.104Z |
| CVE-2026-23211 |
N/A
|
mm, swap: restore swap_space attr aviod kernel panic |
Linux |
Linux |
2026-02-18T14:16:27.015Z | 2026-02-18T14:16:27.015Z |
| CVE-2026-2296 |
7.2 (3.1)
|
Product Addons for Woocommerce – Product Options with … |
acowebs |
Product Addons for Woocommerce – Product Options with Custom Fields |
2026-02-18T06:42:43.286Z | 2026-02-18T14:32:00.396Z |
| CVE-2026-2281 |
4.4 (3.1)
|
Private Comment <= 0.0.4 - Authenticated (Administrato… |
edersonpeka |
Private Comment |
2026-02-18T06:42:42.517Z | 2026-02-18T14:20:34.327Z |
| CVE-2026-22762 |
6.5 (3.1)
|
Dell Avamar Server and Avamar Virtual Edition, ve… |
Dell |
Avamar Server |
2026-02-17T19:53:45.219Z | 2026-02-17T19:53:45.219Z |
| CVE-2026-2230 |
4.3 (3.1)
|
Booking Calendar <= 10.14.14 - Insecure Direct Object … |
wpdevelop |
Booking Calendar |
2026-02-18T16:28:14.595Z | 2026-02-18T19:25:03.914Z |
| CVE-2026-22284 |
6.6 (3.1)
|
Dell SmartFabric OS10 Software, versions prior to… |
Dell |
SmartFabric OS10 Software |
2026-02-17T19:46:48.602Z | 2026-02-18T04:56:31.432Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-1761 | A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsi… | 2026-02-02T14:16:34.650 | 2026-02-17T19:21:56.470 |
| fkie_cve-2026-1358 | Airleader Master versions 6.381 and prior allow for file uploads without restriction to multiple w… | 2026-02-12T22:16:04.213 | 2026-02-17T19:21:56.343 |
| fkie_cve-2026-0719 | A flaw was identified in the NTLM authentication handling of the libsoup HTTP library, used by GNOM… | 2026-01-08T13:15:43.283 | 2026-02-17T19:21:55.890 |
| fkie_cve-2025-63354 | Hitron HI3120 v7.2.4.5.2b1 allows stored XSS via the Parental Control option when creating a new fi… | 2026-02-09T15:16:11.070 | 2026-02-17T19:21:55.063 |
| fkie_cve-2025-21120 | Dell Avamar, versions prior to 19.10 SP1 with patch 338904, contains a Trusting HTTP Permission Met… | 2025-08-04T19:15:30.210 | 2026-02-17T19:21:54.417 |
| fkie_cve-2026-1332 | MeetingHub developed by HAMASTAR Technology has a Missing Authentication vulnerability, allowing un… | 2026-01-22T10:16:07.970 | 2026-02-17T19:16:13.437 |
| fkie_cve-2026-1998 | A flaw has been found in micropython up to 1.27.0. This vulnerability affects the function mp_impor… | 2026-02-06T07:16:12.553 | 2026-02-17T19:15:46.333 |
| fkie_cve-2024-23480 | A fallback mechanism in code sign checking on macOS may allow arbitrary code execution. This issue … | 2024-05-01T17:15:29.033 | 2026-02-17T19:15:26.013 |
| fkie_cve-2026-2000 | A vulnerability was found in DCN DCME-320 up to 20260121. Impacted is the function apply_config of … | 2026-02-06T07:16:13.053 | 2026-02-17T19:15:16.183 |
| fkie_cve-2026-2008 | A vulnerability was detected in abhiphile fermat-mcp up to 47f11def1cd37e45dd060f30cdce346cbdbd6f0a… | 2026-02-06T07:16:13.447 | 2026-02-17T19:12:42.487 |
| fkie_cve-2026-2010 | A vulnerability has been found in Sanluan PublicCMS up to 4.0.202506.d/5.202506.d/6.202506.d. Impac… | 2026-02-06T08:15:54.063 | 2026-02-17T19:12:22.773 |
| fkie_cve-2026-2016 | A security vulnerability has been detected in happyfish100 libfastcommon up to 1.0.84. Affected by … | 2026-02-06T12:16:26.073 | 2026-02-17T19:11:30.800 |
| fkie_cve-2026-2017 | A vulnerability was detected in IP-COM W30AP up to 1.0.0.11(1340). Affected by this issue is the fu… | 2026-02-06T12:16:26.280 | 2026-02-17T19:09:53.080 |
| fkie_cve-2026-2054 | A security flaw has been discovered in D-Link DIR-605L and DIR-619L 2.06B01/2.13B01. Impacted is an… | 2026-02-06T13:15:54.580 | 2026-02-17T19:09:28.847 |
| fkie_cve-2026-2055 | A weakness has been identified in D-Link DIR-605L and DIR-619L 2.06B01/2.13B01. The affected elemen… | 2026-02-06T13:15:54.777 | 2026-02-17T19:09:14.370 |
| fkie_cve-2026-2056 | A security vulnerability has been detected in D-Link DIR-605L and DIR-619L 2.06B01/2.13B01. The imp… | 2026-02-06T14:16:38.510 | 2026-02-17T19:08:56.160 |
| fkie_cve-2026-2058 | A flaw has been found in mathurvishal CloudClassroom-PHP-Project up to 5dadec098bfbbf3300d60c3494db… | 2026-02-06T17:16:27.877 | 2026-02-17T19:08:43.083 |
| fkie_cve-2026-2074 | A vulnerability was identified in O2OA up to 9.0.0. This impacts an unknown function of the file /x… | 2026-02-07T05:16:12.800 | 2026-02-17T19:07:40.393 |
| fkie_cve-2026-2146 | A security flaw has been discovered in guchengwuyue yshopmall up to 1.9.1. This affects the functio… | 2026-02-08T10:15:49.467 | 2026-02-17T19:07:15.640 |
| fkie_cve-2024-23462 | An Improper Validation of Integrity Check Value vulnerability in Zscaler Client Connector on MacOS … | 2024-05-02T13:23:06.810 | 2026-02-17T19:06:28.077 |
| fkie_cve-2026-2200 | A weakness has been identified in heyewei JFinalCMS 5.0.0. This affects an unknown function of the … | 2026-02-09T02:16:03.557 | 2026-02-17T19:01:38.293 |
| fkie_cve-2026-1108 | A security vulnerability has been detected in cijliu librtsp up to 2ec1a81ad65280568a0c7c16420d7c10… | 2026-01-18T02:16:25.990 | 2026-02-17T18:34:36.243 |
| fkie_cve-2026-1109 | A vulnerability was detected in cijliu librtsp up to 2ec1a81ad65280568a0c7c16420d7c10fde13b04. The … | 2026-01-18T04:15:59.613 | 2026-02-17T18:34:19.773 |
| fkie_cve-2025-15533 | A vulnerability was determined in raysan5 raylib up to 909f040. Affected by this vulnerability is t… | 2026-01-18T05:16:16.360 | 2026-02-17T18:26:07.110 |
| fkie_cve-2026-1452 | Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued i… | 2026-02-17T18:20:34.007 | 2026-02-17T18:20:34.007 |
| fkie_cve-2025-15534 | A vulnerability was identified in raysan5 raylib up to 909f040. Affected by this issue is the funct… | 2026-01-18T07:16:01.963 | 2026-02-17T18:04:37.950 |
| fkie_cve-2026-24002 | Grist is spreadsheet software using Python as its formula language. Grist offers several methods fo… | 2026-01-22T03:15:47.777 | 2026-02-17T17:59:16.383 |
| fkie_cve-2024-23459 | An Improper Link Resolution Before File Access ('Link Following') vulnerability in Zscaler Client C… | 2024-05-02T13:23:06.363 | 2026-02-17T17:58:45.233 |
| fkie_cve-2023-28798 | An out-of-bounds write to heap in the pacparser library on Zscaler Client Connector on Mac may lead… | 2024-05-02T13:23:05.807 | 2026-02-17T17:55:18.820 |
| fkie_cve-2026-24042 | Appsmith is a platform to build admin panels, internal tools, and dashboards. In versions 1.94 and … | 2026-01-22T04:16:00.187 | 2026-02-17T17:50:44.837 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-6mhj-x7jw-6c57 |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:39Z | 2026-02-13T21:31:39Z |
| ghsa-5g34-6m9g-844h |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:39Z | 2026-02-13T21:31:39Z |
| ghsa-3vrr-qwf4-v63q |
|
Rejected reason: reserved but not needed | 2026-02-13T21:31:39Z | 2026-02-13T21:31:39Z |
| ghsa-xmhh-hhw2-rh9j |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:38Z | 2026-02-13T21:31:38Z |
| ghsa-xj72-8cc7-64m7 |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:38Z | 2026-02-13T21:31:38Z |
| ghsa-v98v-vv3v-hfhg |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:38Z | 2026-02-13T21:31:38Z |
| ghsa-r2mp-m756-xr9v |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:38Z | 2026-02-13T21:31:38Z |
| ghsa-qfj5-5f6w-g7w2 |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:38Z | 2026-02-13T21:31:38Z |
| ghsa-p5pv-r96g-5g67 |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:38Z | 2026-02-13T21:31:38Z |
| ghsa-mmq9-4mff-64rp |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:38Z | 2026-02-13T21:31:38Z |
| ghsa-jvv7-w8wf-x5qf |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:38Z | 2026-02-13T21:31:38Z |
| ghsa-j92v-6hj3-w3px |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:38Z | 2026-02-13T21:31:38Z |
| ghsa-cv4w-3fxv-46qj |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:38Z | 2026-02-13T21:31:38Z |
| ghsa-92pw-f528-rpv6 |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:38Z | 2026-02-13T21:31:38Z |
| ghsa-8jm4-qgjh-cx27 |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:38Z | 2026-02-13T21:31:38Z |
| ghsa-8fwh-8xq3-5p9g |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:38Z | 2026-02-13T21:31:38Z |
| ghsa-84mp-8vq7-xv2j |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:38Z | 2026-02-13T21:31:38Z |
| ghsa-759c-r8q3-h34c |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:38Z | 2026-02-13T21:31:38Z |
| ghsa-62rf-3264-3g9f |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:38Z | 2026-02-13T21:31:38Z |
| ghsa-59f7-pjhm-qcjr |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:38Z | 2026-02-13T21:31:38Z |
| ghsa-37hx-vm8w-5g3h |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:38Z | 2026-02-13T21:31:38Z |
| ghsa-26mx-cf39-24h8 |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:38Z | 2026-02-13T21:31:38Z |
| ghsa-xfxj-2mg2-fwpr |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:37Z | 2026-02-13T21:31:37Z |
| ghsa-x9j2-qgwm-3hg3 |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:37Z | 2026-02-13T21:31:37Z |
| ghsa-w3r7-h5w7-jf97 |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:37Z | 2026-02-13T21:31:37Z |
| ghsa-qxhj-mrxj-g3gj |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:37Z | 2026-02-13T21:31:37Z |
| ghsa-q5w8-336h-87cx |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:37Z | 2026-02-13T21:31:37Z |
| ghsa-q242-7m47-x6fv |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:37Z | 2026-02-13T21:31:37Z |
| ghsa-ppq7-wpmg-vgf2 |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:37Z | 2026-02-13T21:31:37Z |
| ghsa-pp3p-7vvq-9rj5 |
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because … | 2026-02-13T21:31:37Z | 2026-02-13T21:31:37Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2023-45 |
|
redis-py before 4.5.3, as used in ChatGPT and other products, leaves a connection open af… | redis | 2023-03-26T19:15:00Z | 2023-06-05T01:13:00.293462Z |
| pysec-2023-72 |
|
** UNSUPPORTED WHEN ASSIGNED ** The Apache Spark UI offers the possibility to enable ACLs… | pyspark | 2023-05-02T09:15:00Z | 2023-06-05T01:12:58.679776Z |
| pysec-2023-71 |
|
Planet is software that provides satellite data. The secret file stores the user's Planet… | planet | 2023-05-12T21:15:00Z | 2023-06-05T01:12:57.755283Z |
| pysec-2022-232 |
|
NVFLARE, versions prior to 2.1.2, contains a vulnerability in its utils module, where YAM… | nvflare | 2022-07-01T18:15:00Z | 2023-06-05T01:12:56.865026Z |
| pysec-2022-231 |
|
NVFLARE, versions prior to 2.1.2, contains a vulnerability in its PKI implementation modu… | nvflare | 2022-07-01T18:15:00Z | 2023-06-05T01:12:56.789968Z |
| pysec-2023-70 |
|
A directory traversal vulnerability in the /get-artifact API method of the mlflow platfor… | mlflow | 2023-05-11T02:15:00Z | 2023-06-05T01:12:55.587142Z |
| pysec-2023-69 |
|
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.3.1. | mlflow | 2023-05-17T21:15:00Z | 2023-06-05T01:12:55.503398Z |
| pysec-2023-68 |
|
Relative Path Traversal in GitHub repository mlflow/mlflow prior to 2.3.1. | mlflow | 2023-04-28T00:15:00Z | 2023-06-05T01:12:55.421205Z |
| pysec-2023-67 |
|
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foun… | matrix-synapse | 2023-05-26T14:15:00Z | 2023-06-05T01:12:54.808327Z |
| pysec-2023-66 |
|
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foun… | matrix-synapse | 2023-05-26T14:15:00Z | 2023-06-05T01:12:54.698222Z |
| pysec-2023-65 |
|
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foun… | matrix-synapse | 2023-05-26T14:15:00Z | 2023-06-05T01:12:54.592327Z |
| pysec-2023-64 |
|
mage-ai is an open-source data pipeline tool for transforming and integrating data. Those… | mage-ai | 2023-05-09T15:15:00Z | 2023-06-05T01:12:54.165512Z |
| pysec-2023-63 |
|
in-toto is a framework to protect supply chain integrity. The in-toto configuration is re… | in-toto | 2023-05-10T18:15:00Z | 2023-06-05T01:12:53.259453Z |
| pysec-2023-62 |
|
Flask is a lightweight WSGI web application framework. When all of the following conditio… | flask | 2023-05-02T18:15:00Z | 2023-06-05T01:12:52.229549Z |
| pysec-2023-61 |
|
In Django 3.2 before 3.2.19, 4.x before 4.1.9, and 4.2 before 4.2.1, it was possible to b… | django | 2023-05-07T02:15:00Z | 2023-06-05T01:12:51.525399Z |
| pysec-2022-43050 |
|
The d8s-pdfs package for Python, as distributed on PyPI, included a potential code-execut… | democritus-urls | 2022-10-11T22:15:00Z | 2023-06-05T01:12:51.154372Z |
| pysec-2022-43049 |
|
The d8s-utility package for Python, as distributed on PyPI, included a potential code-exe… | democritus-urls | 2022-10-11T22:15:00Z | 2023-06-05T01:12:51.085049Z |
| pysec-2022-43048 |
|
The d8s-html package for Python, as distributed on PyPI, included a potential code-execut… | democritus-urls | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.996077Z |
| pysec-2022-43047 |
|
The d8s-domains package for Python, as distributed on PyPI, included a potential code-exe… | democritus-urls | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.928263Z |
| pysec-2022-43046 |
|
The d8s-asns package for Python, as distributed on PyPI, included a potential code-execut… | democritus-html | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.827897Z |
| pysec-2022-43045 |
|
The d8s-xml package for Python, as distributed on PyPI, included a potential code-executi… | democritus-html | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.748809Z |
| pysec-2022-43044 |
|
The d8s-networking package for Python, as distributed on PyPI, included a potential code-… | democritus-hashes | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.653599Z |
| pysec-2022-43043 |
|
The d8s-file-system package for Python, as distributed on PyPI, included a potential code… | democritus-hashes | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.575571Z |
| pysec-2022-43042 |
|
The d8s-archives package for Python, as distributed on PyPI, included a potential code-ex… | democritus-file-system | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.463544Z |
| pysec-2022-43041 |
|
The d8s-json package for Python, as distributed on PyPI, included a potential code-execut… | democritus-file-system | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.395602Z |
| pysec-2022-43040 |
|
The d8s-utility package for Python, as distributed on PyPI, included a potential code-exe… | democritus-file-system | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.328726Z |
| pysec-2022-43039 |
|
The d8s-yaml package for Python, as distributed on PyPI, included a potential code-execut… | democritus-file-system | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.196757Z |
| pysec-2022-43038 |
|
The d8s-algorithms package for Python, as distributed on PyPI, included a potential code-… | democritus-dicts | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.098821Z |
| pysec-2022-43037 |
|
The d8s-lists package for Python, as distributed on PyPI, included a potential code-execu… | democritus-dicts | 2022-10-11T22:15:00Z | 2023-06-05T01:12:50.022993Z |
| pysec-2022-43036 |
|
The d8s-asns package for Python, as distributed on PyPI, included a potential code-execut… | democritus-csv | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.913597Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33193 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.674012Z |
| gsd-2024-33192 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.748196Z |
| gsd-2024-33191 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.647629Z |
| gsd-2024-33190 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.755195Z |
| gsd-2024-33189 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.693720Z |
| gsd-2024-33188 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.749121Z |
| gsd-2024-33187 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.702289Z |
| gsd-2024-33186 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.689798Z |
| gsd-2024-33185 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.609172Z |
| gsd-2024-33184 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.674560Z |
| gsd-2024-33183 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.694317Z |
| gsd-2024-33182 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.610657Z |
| gsd-2024-33181 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.720504Z |
| gsd-2024-33180 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.717105Z |
| gsd-2024-33179 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.682083Z |
| gsd-2024-33178 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.734806Z |
| gsd-2024-33177 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.759333Z |
| gsd-2024-33176 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.691588Z |
| gsd-2024-33175 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.721785Z |
| gsd-2024-33174 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.724871Z |
| gsd-2024-33173 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.740036Z |
| gsd-2024-33172 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.737358Z |
| gsd-2024-33171 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.687655Z |
| gsd-2024-33170 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.740641Z |
| gsd-2024-33169 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.745339Z |
| gsd-2024-33168 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.756074Z |
| gsd-2024-33167 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.716224Z |
| gsd-2024-33166 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.689082Z |
| gsd-2024-33165 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.617137Z |
| gsd-2024-33164 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.602462Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2025-191677 | Malicious code in alicloud-client-sdk (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| mal-2025-191676 | Malicious code in alicloud-client (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| mal-2025-191673 | Malicious code in acloud-clients (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| mal-2025-191672 | Malicious code in acloud-client-uses (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| mal-2025-191671 | Malicious code in aclient-sdk (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| MAL-2025-2950 | Malicious code in credential-python-sdk (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| MAL-2025-2929 | Malicious code in acloud-client (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| MAL-2025-191721 | Malicious code in enumer-iam (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| MAL-2025-191687 | Malicious code in awscloud-clients-core (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| MAL-2025-191679 | Malicious code in amzclients-sdk (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| MAL-2025-191677 | Malicious code in alicloud-client-sdk (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| MAL-2025-191676 | Malicious code in alicloud-client (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| MAL-2025-191673 | Malicious code in acloud-clients (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| MAL-2025-191672 | Malicious code in acloud-client-uses (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| MAL-2025-191671 | Malicious code in aclient-sdk (PyPI) | 2025-02-25T18:18:21Z | 2026-01-30T19:45:45Z |
| mal-2026-610 | Malicious code in snapshot-date (PyPI) | 2026-01-30T19:09:41Z | 2026-01-30T19:09:41Z |
| MAL-2026-610 | Malicious code in snapshot-date (PyPI) | 2026-01-30T19:09:41Z | 2026-01-30T19:09:41Z |
| mal-2026-606 | Malicious code in userver-requires-at-least-python-3-10 (PyPI) | 2026-01-30T10:14:10Z | 2026-01-30T10:14:10Z |
| MAL-2026-606 | Malicious code in userver-requires-at-least-python-3-10 (PyPI) | 2026-01-30T10:14:10Z | 2026-01-30T10:14:10Z |
| mal-2024-12348 | Malicious code in spiderai (PyPI) | 2024-10-02T09:16:00Z | 2026-01-30T00:34:33Z |
| MAL-2024-12348 | Malicious code in spiderai (PyPI) | 2024-10-02T09:16:00Z | 2026-01-30T00:34:33Z |
| mal-2026-604 | Malicious code in securedrop-workstation-dom0-config (PyPI) | 2026-01-29T13:50:57Z | 2026-01-29T13:50:57Z |
| MAL-2026-604 | Malicious code in securedrop-workstation-dom0-config (PyPI) | 2026-01-29T13:50:57Z | 2026-01-29T13:50:57Z |
| mal-2026-603 | Malicious code in mcp-pdftool-plus (PyPI) | 2026-01-29T13:25:53Z | 2026-01-29T13:25:53Z |
| MAL-2026-603 | Malicious code in mcp-pdftool-plus (PyPI) | 2026-01-29T13:25:53Z | 2026-01-29T13:25:53Z |
| mal-2026-602 | Malicious code in tableasets (PyPI) | 2026-01-29T11:22:50Z | 2026-01-29T11:22:50Z |
| MAL-2026-602 | Malicious code in tableasets (PyPI) | 2026-01-29T11:22:50Z | 2026-01-29T11:22:50Z |
| mal-2026-601 | Malicious code in tableautes (PyPI) | 2026-01-29T10:08:47Z | 2026-01-29T11:16:21Z |
| MAL-2026-601 | Malicious code in tableautes (PyPI) | 2026-01-29T10:08:47Z | 2026-01-29T11:16:21Z |
| mal-2026-595 | Malicious code in morty-package (PyPI) | 2026-01-28T19:48:56Z | 2026-01-28T19:48:56Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1871 | Cisco IOS: Mehrere Schwachstellen | 2018-03-28T22:00:00.000+00:00 | 2025-08-20T22:00:00.000+00:00 |
| wid-sec-w-2025-1860 | Nvidia Treiber: Mehrere Schwachstellen | 2020-06-24T22:00:00.000+00:00 | 2025-08-18T22:00:00.000+00:00 |
| wid-sec-w-2025-1859 | Intel Prozessoren: Schwachstelle ermöglicht Privilegieneskalation und Offenlegung von Informationen | 2019-12-10T23:00:00.000+00:00 | 2025-08-18T22:00:00.000+00:00 |
| wid-sec-w-2025-1846 | IBM WebSphere Application Server: Schwachstelle ermöglicht Umgehung von Sicherheitsmechanismen | 2025-08-14T22:00:00.000+00:00 | 2025-08-18T22:00:00.000+00:00 |
| wid-sec-w-2025-1788 | IBM Storage Virtualize-Produkte: Schwachstelle ermöglicht Privilegieneskalation | 2025-08-12T22:00:00.000+00:00 | 2025-08-18T22:00:00.000+00:00 |
| wid-sec-w-2025-1706 | poppler: Mehrere Schwachstellen | 2025-08-04T22:00:00.000+00:00 | 2025-08-18T22:00:00.000+00:00 |
| wid-sec-w-2025-1618 | Kubernetes Image Builder: Schwachstelle ermöglicht Erlangen von Administratorrechten | 2025-07-21T22:00:00.000+00:00 | 2025-08-18T22:00:00.000+00:00 |
| wid-sec-w-2025-1042 | Adobe ColdFusion: Mehrere Schwachstellen | 2025-05-13T22:00:00.000+00:00 | 2025-08-18T22:00:00.000+00:00 |
| wid-sec-w-2025-0574 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-03-16T23:00:00.000+00:00 | 2025-08-18T22:00:00.000+00:00 |
| wid-sec-w-2024-2148 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2024-09-15T22:00:00.000+00:00 | 2025-08-18T22:00:00.000+00:00 |
| wid-sec-w-2024-1837 | AMD Prozessoren: Mehrere Schwachstellen | 2024-08-13T22:00:00.000+00:00 | 2025-08-18T22:00:00.000+00:00 |
| wid-sec-w-2024-0694 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2024-03-21T23:00:00.000+00:00 | 2025-08-18T22:00:00.000+00:00 |
| wid-sec-w-2024-0508 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-02-28T23:00:00.000+00:00 | 2025-08-18T22:00:00.000+00:00 |
| wid-sec-w-2024-0111 | GPUs verschiedener Hersteller: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-01-16T23:00:00.000+00:00 | 2025-08-18T22:00:00.000+00:00 |
| wid-sec-w-2023-1127 | OpenLDAP: Mehrere Schwachstellen ermöglichen Denial of Service | 2021-01-26T23:00:00.000+00:00 | 2025-08-18T22:00:00.000+00:00 |
| wid-sec-w-2023-1059 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2023-04-20T22:00:00.000+00:00 | 2025-08-18T22:00:00.000+00:00 |
| wid-sec-w-2023-1025 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2023-04-18T22:00:00.000+00:00 | 2025-08-18T22:00:00.000+00:00 |
| wid-sec-w-2022-2186 | Linux Kernel: Schwachstellen ermöglicht Denial of Service | 2022-11-28T23:00:00.000+00:00 | 2025-08-18T22:00:00.000+00:00 |
| wid-sec-w-2025-1812 | Google Chrome und Microsoft Edge: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-08-12T22:00:00.000+00:00 | 2025-08-17T22:00:00.000+00:00 |
| wid-sec-w-2025-1837 | Gitea: Mehrere Schwachstellen | 2025-08-14T22:00:00.000+00:00 | 2025-08-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1836 | Flowise: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-08-13T22:00:00.000+00:00 | 2025-08-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1827 | Dell PowerEdge BIOS: Mehrere Schwachstellen | 2025-08-13T22:00:00.000+00:00 | 2025-08-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1799 | Intel Rapid Storage Technology: Schwachstelle ermöglicht Privilegieneskalation | 2025-08-12T22:00:00.000+00:00 | 2025-08-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1723 | Google Chrome / Microsoft Edge: Mehrere Schwachstellen | 2025-08-05T22:00:00.000+00:00 | 2025-08-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1537 | ImageMagick: Mehrere Schwachstellen | 2025-07-13T22:00:00.000+00:00 | 2025-08-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1118 | OWASP ModSecurity: Schwachstelle ermöglicht Denial of Service | 2025-05-21T22:00:00.000+00:00 | 2025-08-14T22:00:00.000+00:00 |
| wid-sec-w-2024-3463 | Python: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-11-13T23:00:00.000+00:00 | 2025-08-14T22:00:00.000+00:00 |
| wid-sec-w-2023-0965 | pgAdmin: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2023-04-13T22:00:00.000+00:00 | 2025-08-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1818 | Palo Alto Networks Cortex XDR: Schwachstelle ermöglicht Umgehen von Sicherheitsmechanismen | 2025-08-13T22:00:00.000+00:00 | 2025-08-13T22:00:00.000+00:00 |
| wid-sec-w-2025-1775 | Ivanti Avalanche: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2023:5530 | Red Hat Security Advisory: Logging Subsystem 5.7.7 - Red Hat OpenShift security update | 2023-10-20T05:04:43+00:00 | 2026-02-19T13:24:49+00:00 |
| rhsa-2023:5009 | Red Hat Security Advisory: OpenShift Container Platform 4.14.0 security update | 2023-10-31T14:06:15+00:00 | 2026-02-19T13:24:48+00:00 |
| rhsa-2023:5008 | Red Hat Security Advisory: Red Hat build of MicroShift 4.14.0 security update | 2023-10-31T14:23:30+00:00 | 2026-02-19T13:24:47+00:00 |
| rhsa-2023:5007 | Red Hat Security Advisory: OpenShift Container Platform 4.14.0 security update | 2023-10-31T13:31:47+00:00 | 2026-02-19T13:24:47+00:00 |
| rhsa-2023:5005 | Red Hat Security Advisory: OpenShift Container Platform 4.14.0 security and extras update | 2023-10-31T10:41:03+00:00 | 2026-02-19T13:24:47+00:00 |
| rhea-2024:1870 | Red Hat Enhancement Advisory: Advisory for publishing Helm 3.13.2 GA release | 2024-04-18T00:11:23+00:00 | 2026-02-19T13:24:47+00:00 |
| rhea-2024:1366 | Red Hat Enhancement Advisory: Red Hat Developer Hub 1.1 release | 2024-03-18T18:49:30+00:00 | 2026-02-19T13:24:46+00:00 |
| rhea-2023:7327 | Red Hat Enhancement Advisory: Red Hat 3scale API Management 2.13.7 Release - Container Images | 2023-11-16T12:15:55+00:00 | 2026-02-19T13:24:45+00:00 |
| rhea-2023:7235 | Red Hat Enhancement Advisory: ACS 4.3 enhancement update | 2023-11-15T09:45:23+00:00 | 2026-02-19T13:24:45+00:00 |
| rhba-2023:6928 | Red Hat Bug Fix Advisory: go-toolset:rhel8 bug fix and enhancement update | 2023-11-14T16:04:55+00:00 | 2026-02-19T13:24:45+00:00 |
| rhba-2024:0599 | Red Hat Bug Fix Advisory: Migration Toolkit for Applications bug fix and enhancement update | 2024-01-30T13:46:48+00:00 | 2026-02-19T13:24:43+00:00 |
| rhba-2023:7648 | Red Hat Bug Fix Advisory: MTV 2.5.3 Images | 2023-12-05T06:56:16+00:00 | 2026-02-19T13:24:41+00:00 |
| rhba-2023:6863 | Red Hat Bug Fix Advisory: LVMS 4.14.z Bug Fix and Enhancement update | 2023-11-09T18:33:40+00:00 | 2026-02-19T13:24:41+00:00 |
| rhba-2023:6364 | Red Hat Bug Fix Advisory: golang and delve bug fix and enhancement update | 2023-11-07T08:50:26+00:00 | 2026-02-19T13:24:39+00:00 |
| rhba-2023:6254 | Red Hat Bug Fix Advisory: OpenShift Container Platform Assisted Installer version 2.26.1 release | 2023-11-02T00:10:43+00:00 | 2026-02-19T13:24:37+00:00 |
| rhba-2023:6109 | Red Hat Bug Fix Advisory: MTV 2.4.3 Images | 2023-10-25T12:32:35+00:00 | 2026-02-19T13:24:37+00:00 |
| rhba-2023:6078 | Red Hat Bug Fix Advisory: MTV 2.5.2 Images | 2023-10-24T12:12:11+00:00 | 2026-02-19T13:24:35+00:00 |
| rhba-2023:5806 | Red Hat Bug Fix Advisory: Red Hat Ansible Automation Platform 2.4 Container Release Update | 2023-10-17T19:03:49+00:00 | 2026-02-19T13:24:35+00:00 |
| rhsa-2024:0563 | Red Hat Security Advisory: kernel-rt security update | 2024-01-30T12:29:53+00:00 | 2026-02-19T13:24:28+00:00 |
| rhsa-2024:0448 | Red Hat Security Advisory: kernel security and bug fix update | 2024-01-25T09:45:40+00:00 | 2026-02-19T13:24:27+00:00 |
| rhsa-2024:0431 | Red Hat Security Advisory: kernel-rt security and bug fix update | 2024-01-25T11:13:29+00:00 | 2026-02-19T13:24:27+00:00 |
| rhsa-2024:0432 | Red Hat Security Advisory: kernel security and bug fix update | 2024-01-25T11:15:32+00:00 | 2026-02-19T13:24:26+00:00 |
| rhsa-2023:4627 | Red Hat Security Advisory: Migration Toolkit for Applications security and bug fix update | 2023-08-14T01:02:25+00:00 | 2026-02-19T13:24:25+00:00 |
| rhsa-2024:0562 | Red Hat Security Advisory: kernel security and bug fix update | 2024-01-30T12:31:51+00:00 | 2026-02-19T13:24:24+00:00 |
| rhsa-2024:0439 | Red Hat Security Advisory: kernel-rt security update | 2024-01-25T09:43:34+00:00 | 2026-02-19T13:24:23+00:00 |
| rhsa-2023:7749 | Red Hat Security Advisory: kernel security update | 2023-12-12T17:33:06+00:00 | 2026-02-19T13:24:22+00:00 |
| rhsa-2023:7678 | Red Hat Security Advisory: Red Hat AMQ Streams 2.6.0 release and security update | 2023-12-06T23:30:39+00:00 | 2026-02-19T13:24:22+00:00 |
| rhsa-2023:7247 | Red Hat Security Advisory: Red Hat Fuse 7.12.1 release and security update | 2023-11-15T17:07:49+00:00 | 2026-02-19T13:24:22+00:00 |
| rhsa-2023:5780 | Red Hat Security Advisory: Red Hat Integration Camel Extensions for Quarkus 2.13.3 security update | 2023-10-17T11:42:54+00:00 | 2026-02-19T13:24:21+00:00 |
| rhsa-2023:5946 | Red Hat Security Advisory: Red Hat AMQ Broker 7.11.3 release and security update | 2023-10-19T19:09:23+00:00 | 2026-02-19T13:24:20+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-13-022-01 | GE Proficy Real-Time Information Portal Information Disclosure Vulnerabilities | 2013-10-26T06:00:00.000000Z | 2025-06-06T16:03:36.702045Z |
| icsa-13-184-02 | Monroe Electronics DASDEC Compromised Root SSH Key | 2013-04-05T06:00:00.000000Z | 2025-06-06T16:03:30.265909Z |
| icsa-13-053-02a | Honeywell EBI, SymmetrE, and ComfortPoint Open Manager Station | 2013-11-26T07:00:00.000000Z | 2025-06-06T16:03:23.822206Z |
| icsa-12-354-02 | Carlo Gavazzi EOS Box Multiple Vulnerabilities | 2012-09-22T06:00:00.000000Z | 2025-06-06T16:03:17.342676Z |
| icsa-13-011-02 | SpecView Directory Traversal | 2013-10-15T06:00:00.000000Z | 2025-06-06T16:03:10.814208Z |
| icsa-12-325-01 | Sinapsi Devices Vulnerabilities | 2012-08-24T06:00:00.000000Z | 2025-06-06T16:02:45.000511Z |
| icsa-12-305-01 | Siemens SiPass Server Buffer Overflow | 2012-08-04T06:00:00.000000Z | 2025-06-06T16:02:38.548497Z |
| icsa-12-297-01 | Tropos Wireless Mesh Routers | 2012-07-27T06:00:00.000000Z | 2025-06-06T16:02:32.102905Z |
| icsa-13-043-02a | WellinTech KingView KingMess Buffer Overflow | 2013-11-16T07:00:00.000000Z | 2025-06-06T16:02:25.604024Z |
| icsa-13-067-02 | Invensys Wonderware Win-XML Exporter Improper Input Validation Vulnerability | 2013-12-10T07:00:00.000000Z | 2025-06-06T16:02:19.118517Z |
| icsa-13-050-01a | 3S CODESYS Gateway-Server Vulnerabilities | 2013-11-23T07:00:00.000000Z | 2025-06-06T16:01:46.621212Z |
| icsa-13-053-01 | Emerson DeltaV Uncontroller Resource Consumption Vulnerability | 2013-11-26T07:00:00.000000Z | 2025-06-06T16:01:40.169351Z |
| icsa-13-038-01a | 360 Systems Image Server 2000 Series Remote Root Access | 2013-11-11T07:00:00.000000Z | 2025-06-06T16:01:33.673371Z |
| icsa-13-045-01 | Tridium NiagaraAX Directory Traversal Vulnerability | 2013-11-18T07:00:00.000000Z | 2025-06-06T16:01:27.241267Z |
| icsa-13-036-02 | Ecava IntegraXor ActiveX Buffer Overflow | 2013-11-09T07:00:00.000000Z | 2025-06-06T16:01:20.774008Z |
| icsa-13-095-02a | Rockwell Automation FactoryTalk and RSLinx Vulnerabilities | 2013-01-07T07:00:00.000000Z | 2025-06-06T16:00:35.472533Z |
| icsa-13-042-01 | MOXA EDR-G903 Series Multiple Vulnerabilities | 2013-11-15T07:00:00.000000Z | 2025-06-06T16:00:22.532306Z |
| icsa-12-348-01 | Siemens ProcessSuite and Invensys Intouch Poorly Encrypted Password File | 2012-09-16T06:00:00.000000Z | 2025-06-06T16:00:15.589980Z |
| icsa-12-341-01 | GE Proficy HMI/SCADA Cimplicity Integer Overflow | 2012-09-09T06:00:00.000000Z | 2025-06-06T16:00:08.620714Z |
| icsa-12-362-01 | I-GEN opLYNX Central Authentication Bypass | 2012-09-30T06:00:00.000000Z | 2025-06-06T16:00:02.057238Z |
| icsa-12-335-01 | Post Oak Bluetooth Traffic Systems Insufficient Entropy Vulnerability | 2012-09-03T06:00:00.000000Z | 2025-06-06T15:59:55.615986Z |
| icsa-12-297-02 | Korenix Jetport 5600 Series Hard-coded Credentials | 2012-07-27T06:00:00.000000Z | 2025-06-06T15:59:49.132209Z |
| icsa-13-098-01 | Canary Labs Inc Trend Link Insecure ActiveX Control Method | 2013-01-10T07:00:00.000000Z | 2025-06-06T15:59:42.692019Z |
| icsa-12-320-01 | ABB AC500 PLC Webserver CoDeSys Vulnerability | 2012-08-19T06:00:00.000000Z | 2025-06-06T15:59:36.140401Z |
| icsa-13-079-03 | Siemens WinCC TIA Portal Vulnerabilities | 2013-12-22T07:00:00.000000Z | 2025-06-06T15:58:50.552597Z |
| icsa-10-337-01 | Advantech Studio Test Web Server Buffer Overflow | 2010-09-05T06:00:00.000000Z | 2025-06-05T22:08:57.337024Z |
| icsa-10-322-01 | Ecava IntegraXor Buffer Overflow | 2010-08-21T06:00:00.000000Z | 2025-06-05T22:08:38.193155Z |
| icsa-10-316-01a | Intellicom NetBiter WebSCADA Vulnerabilities | 2010-08-15T06:00:00.000000Z | 2025-06-05T22:08:03.683549Z |
| icsa-10-147-01 | Cisco Network Building Mediator | 2010-02-27T07:00:00.000000Z | 2025-06-05T22:07:03.531375Z |
| icsa-15-085-01 | Schneider Electric InduSoft Web Studio and InTouch Machine Edition 2014 Vulnerabilities | 2015-12-27T07:00:00.000000Z | 2025-06-05T22:06:04.803381Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-stealthsmc-rce-sfNBPjcS | Cisco Secure Network Analytics Remote Code Execution Vulnerability | 2023-04-05T16:00:00+00:00 | 2023-04-05T16:00:00+00:00 |
| cisco-sa-stealth-rce-bdwxfk9c | Cisco Secure Network Analytics Remote Code Execution Vulnerability | 2023-04-05T16:00:00+00:00 | 2023-04-05T16:00:00+00:00 |
| cisco-sa-stealth-rce-BDwXFK9C | Cisco Secure Network Analytics Remote Code Execution Vulnerability | 2023-04-05T16:00:00+00:00 | 2023-04-05T16:00:00+00:00 |
| cisco-sa-sb-rv32x-cmdinject-ckqszpxl | Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers Command Injection Vulnerabilities | 2023-04-05T16:00:00+00:00 | 2023-04-05T16:00:00+00:00 |
| cisco-sa-sb-rv32x-cmdinject-cKQsZpxL | Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers Command Injection Vulnerabilities | 2023-04-05T16:00:00+00:00 | 2023-04-05T16:00:00+00:00 |
| cisco-sa-rv-stored-xss-vqz7gc8w | Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities | 2023-04-05T16:00:00+00:00 | 2023-04-05T16:00:00+00:00 |
| cisco-sa-rv-stored-xss-vqz7gC8W | Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities | 2023-04-05T16:00:00+00:00 | 2023-04-05T16:00:00+00:00 |
| cisco-sa-meraki-lsp-7xysn6pj | Cisco Meraki Local Status Page Configuration Hardening | 2023-04-05T16:00:00+00:00 | 2023-04-05T16:00:00+00:00 |
| cisco-sa-meraki-lsp-7xySn6pj | Cisco Meraki Local Status Page Configuration Hardening | 2023-04-05T16:00:00+00:00 | 2023-04-05T16:00:00+00:00 |
| cisco-sa-ise-injection-2xbog9dg | Cisco Identity Services Engine Command Injection Vulnerabilities | 2023-04-05T16:00:00+00:00 | 2023-04-05T16:00:00+00:00 |
| cisco-sa-ise-injection-2XbOg9Dg | Cisco Identity Services Engine Command Injection Vulnerabilities | 2023-04-05T16:00:00+00:00 | 2023-04-05T16:00:00+00:00 |
| cisco-sa-adeos-mlayecvk | Cisco Evolved Programmable Network Manager, Cisco Identity Services Engine, and Cisco Prime Infrastructure Command Injection Vulnerabilities | 2023-04-05T16:00:00+00:00 | 2023-04-05T16:00:00+00:00 |
| cisco-sa-adeos-MLAyEcvk | Cisco Evolved Programmable Network Manager, Cisco Identity Services Engine, and Cisco Prime Infrastructure Command Injection Vulnerabilities | 2023-04-05T16:00:00+00:00 | 2023-04-05T16:00:00+00:00 |
| cisco-sa-expressway-overwrite-3buqw8lh | Cisco Expressway Series and Cisco TelePresence Video Communication Server Vulnerabilities | 2022-07-06T16:00:00+00:00 | 2023-04-04T20:50:42+00:00 |
| cisco-sa-expressway-overwrite-3buqW8LH | Cisco Expressway Series and Cisco TelePresence Video Communication Server Vulnerabilities | 2022-07-06T16:00:00+00:00 | 2023-04-04T20:50:42+00:00 |
| cisco-sa-stealth-rce-2hyb9kfk | Cisco Secure Network Analytics Remote Code Execution Vulnerability | 2022-05-18T16:00:00+00:00 | 2023-04-03T18:50:18+00:00 |
| cisco-sa-stealth-rce-2hYb9KFK | Cisco Secure Network Analytics Remote Code Execution Vulnerability | 2022-05-18T16:00:00+00:00 | 2023-04-03T18:50:18+00:00 |
| cisco-sa-wsa-bypass-bwbfugek | Cisco Secure Web Appliance Content Encoding Filter Bypass Vulnerabilities | 2022-10-05T16:00:00+00:00 | 2023-04-03T13:46:35+00:00 |
| cisco-sa-wsa-bypass-bwBfugek | Cisco Secure Web Appliance Content Encoding Filter Bypass Vulnerabilities | 2022-10-05T16:00:00+00:00 | 2023-04-03T13:46:35+00:00 |
| cisco-sa-ise-access-contol-eeufsucx | Cisco Identity Services Engine Insufficient Access Control Vulnerability | 2022-11-02T16:00:00+00:00 | 2023-03-31T21:21:42+00:00 |
| cisco-sa-ise-access-contol-EeufSUCx | Cisco Identity Services Engine Insufficient Access Control Vulnerability | 2022-11-02T16:00:00+00:00 | 2023-03-31T21:21:42+00:00 |
| cisco-sa-ise-xss-twlnpy3m | Cisco Identity Services Engine Cross-Site Scripting Vulnerability | 2022-10-19T16:00:00+00:00 | 2023-03-31T21:09:40+00:00 |
| cisco-sa-ise-xss-twLnpy3M | Cisco Identity Services Engine Cross-Site Scripting Vulnerability | 2022-10-19T16:00:00+00:00 | 2023-03-31T21:09:40+00:00 |
| cisco-sa-ise-7q4tnyux | Cisco Identity Services Engine Vulnerabilities | 2022-11-16T16:00:00+00:00 | 2023-03-31T20:41:42+00:00 |
| cisco-sa-ise-7Q4TNYUx | Cisco Identity Services Engine Vulnerabilities | 2022-11-16T16:00:00+00:00 | 2023-03-31T20:41:42+00:00 |
| cisco-sa-capic-csrfv-dmx6kswv | Cisco Application Policy Infrastructure Controller and Cisco Cloud Network Controller Cross-Site Request Forgery Vulnerability | 2023-02-22T16:00:00+00:00 | 2023-03-29T21:04:31+00:00 |
| cisco-sa-capic-csrfv-DMx6KSwV | Cisco Application Policy Infrastructure Controller and Cisco Cloud Network Controller Cross-Site Request Forgery Vulnerability | 2023-02-22T16:00:00+00:00 | 2023-03-29T21:04:31+00:00 |
| cisco-sa-vman-csrf-76rdbleh | Cisco SD-WAN vManage Software Cluster Mode Cross-Site Request Forgery Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-27T21:11:52+00:00 |
| cisco-sa-vman-csrf-76RDbLEh | Cisco SD-WAN vManage Software Cluster Mode Cross-Site Request Forgery Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-27T21:11:52+00:00 |
| cisco-sa-wifi-ffeb-22epcewu | Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues Affecting Multiple Cisco Products | 2023-03-27T05:00:00+00:00 | 2023-03-27T05:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-38713 | hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() | 2025-09-02T00:00:00.000Z | 2026-02-18T02:09:36.000Z |
| msrc_cve-2025-38174 | thunderbolt: Do not double dequeue a configuration request | 2025-07-02T00:00:00.000Z | 2026-02-18T02:09:35.000Z |
| msrc_cve-2025-50081 | Vulnerability in the MySQL Server product of Oracle MySQL | 2025-07-02T00:00:00.000Z | 2026-02-18T02:09:32.000Z |
| msrc_cve-2021-45707 | An issue was discovered in the nix crate 0.16.0 and later before 0.20.2 0.21.x before 0.21.2 and 0.22.x before 0.22.2 for Rust. unistd::getgrouplist has an out-of-bounds write if a user is in more than 16 /etc/groups groups. | 2021-12-02T00:00:00.000Z | 2026-02-18T02:09:27.000Z |
| msrc_cve-2024-56615 | bpf: fix OOB devmap writes when deleting elements | 2024-12-02T00:00:00.000Z | 2026-02-18T02:09:12.000Z |
| msrc_cve-2025-23016 | FastCGI fcgi2 (aka fcgi) 2.x through 2.4.4 has an integer overflow (and resultant heap-based buffer overflow) via crafted nameLen or valueLen values in data to the IPC socket. This occurs in ReadParams in fcgiapp.c. | 2025-01-02T00:00:00.000Z | 2026-02-18T02:09:08.000Z |
| msrc_cve-2024-23722 | In Fluent Bit 2.1.8 through 2.2.1 a NULL pointer dereference can be caused via an invalid HTTP payload with the content type of x-www-form-urlencoded. It crashes and does not restart. This could result in logs not being delivered properly. | 2024-03-02T08:00:00.000Z | 2026-02-18T02:09:08.000Z |
| msrc_cve-2024-49854 | block bfq: fix uaf for accessing waker_bfqq after splitting | 2024-10-01T07:00:00.000Z | 2026-02-18T02:09:01.000Z |
| msrc_cve-2024-26785 | iommufd: Fix protection fault in iommufd_test_syz_conv_iova | 2024-04-02T07:00:00.000Z | 2026-02-18T02:08:54.000Z |
| msrc_cve-2024-42287 | scsi: qla2xxx: Complete command early within lock | 2024-08-02T00:00:00.000Z | 2026-02-18T02:08:53.000Z |
| msrc_cve-2019-11834 | cJSON before 1.7.11 allows out-of-bounds access related to \x00 in a string literal. | 2019-05-02T00:00:00.000Z | 2026-02-18T02:08:48.000Z |
| msrc_cve-2022-23523 | rust-vmm linux-loader vulnerable to Out-of-bounds Read | 2022-12-02T00:00:00.000Z | 2026-02-18T02:08:47.000Z |
| msrc_cve-2024-27018 | netfilter: br_netfilter: skip conntrack input hook for promisc packets | 2024-05-02T07:00:00.000Z | 2026-02-18T02:08:45.000Z |
| msrc_cve-2023-7192 | Kernel: refcount leak in ctnetlink_create_conntrack() | 2024-01-01T08:00:00.000Z | 2026-02-18T02:08:41.000Z |
| msrc_cve-2025-37844 | cifs: avoid NULL pointer dereference in dbg call | 2025-05-02T00:00:00.000Z | 2026-02-18T02:08:39.000Z |
| msrc_cve-2024-50024 | net: Fix an unsafe loop on the list | 2024-10-01T07:00:00.000Z | 2026-02-18T02:08:38.000Z |
| msrc_cve-2022-34038 | Etcd v3.5.4 allows remote attackers to cause a denial of service via function PageWriter.write in pagewriter.go. NOTE: the vendor's position is that this is not a vulnerability. | 2023-08-01T00:00:00.000Z | 2026-02-18T02:08:35.000Z |
| msrc_cve-2025-38166 | bpf: fix ktls panic with sockmap | 2025-07-02T00:00:00.000Z | 2026-02-18T02:08:33.000Z |
| msrc_cve-2025-29087 | In SQLite 3.44.0 through 3.49.0 before 3.49.1, the concat_ws() SQL function can cause memory to be written beyond the end of a malloc-allocated buffer. If the separator argument is attacker-controlled and has a large string (e.g., 2MB or more), an integer overflow occurs in calculating the size of the result buffer, and thus malloc may not allocate enough memory. | 2025-04-02T00:00:00.000Z | 2026-02-18T02:08:33.000Z |
| msrc_cve-2024-27053 | wifi: wilc1000: fix RCU usage in connect path | 2024-05-02T07:00:00.000Z | 2026-02-18T02:08:27.000Z |
| msrc_cve-2025-68336 | locking/spinlock/debug: Fix data-race in do_raw_write_lock | 2025-12-02T00:00:00.000Z | 2026-02-18T02:08:21.000Z |
| msrc_cve-2022-4415 | A vulnerability was found in systemd. This security flaw can cause a local information leak due to systemd-coredump not respecting the fs.suid_dumpable kernel setting. | 2023-01-04T00:00:00.000Z | 2026-02-18T02:08:13.000Z |
| msrc_cve-2025-5994 | Cache poisoning via the ECS-enabled Rebirthday Attack | 2025-07-02T00:00:00.000Z | 2026-02-18T02:07:53.000Z |
| msrc_cve-2024-26789 | crypto: arm64/neonbs - fix out-of-bounds access on short input | 2024-04-02T07:00:00.000Z | 2026-02-18T02:07:52.000Z |
| msrc_cve-2024-42286 | scsi: qla2xxx: validate nvme_local_port correctly | 2024-08-02T00:00:00.000Z | 2026-02-18T02:07:49.000Z |
| msrc_cve-2025-37905 | firmware: arm_scmi: Balance device refcount when destroying devices | 2025-05-02T00:00:00.000Z | 2026-02-18T02:07:40.000Z |
| msrc_cve-2022-23772 | Rat.SetString in math/big in Go before 1.16.14 and 1.17.x before 1.17.7 has an overflow that can lead to Uncontrolled Memory Consumption. | 2022-02-02T00:00:00.000Z | 2026-02-18T02:07:40.000Z |
| msrc_cve-2023-26159 | Versions of the package follow-redirects before 1.15.4 are vulnerable to Improper Input Validation due to the improper handling of URLs by the url.parse() function. When new URL() throws an error it can be manipulated to misinterpret the hostname. An attacker could exploit this weakness to redirect traffic to a malicious site potentially leading to information disclosure phishing attacks or other security breaches. | 2024-01-01T08:00:00.000Z | 2026-02-18T02:07:37.000Z |
| msrc_cve-2024-47692 | nfsd: return -EINVAL when namelen is 0 | 2024-10-01T07:00:00.000Z | 2026-02-18T02:07:26.000Z |
| msrc_cve-2025-38704 | rcu/nocb: Fix possible invalid rdp's->nocb_cb_kthread pointer access | 2025-09-02T00:00:00.000Z | 2026-02-18T02:07:25.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15324-1 | python311-pycares-4.9.0-1.1 on GA media | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| opensuse-su-2025:15323-1 | libpoppler-cpp2-25.06.0-1.1 on GA media | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| opensuse-su-2025:15322-1 | libPocoActiveRecord112-1.14.2-1.1 on GA media | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| opensuse-su-2025:15321-1 | libxml2-2-2.13.8-2.1 on GA media | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| opensuse-su-2025:15320-1 | avif-tools-1.3.0-2.1 on GA media | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| opensuse-su-2025:15319-1 | djvulibre-3.5.29-1.1 on GA media | 2025-07-08T00:00:00Z | 2025-07-08T00:00:00Z |
| opensuse-su-2025:15318-1 | redis-8.0.3-1.1 on GA media | 2025-07-07T00:00:00Z | 2025-07-07T00:00:00Z |
| opensuse-su-2025:15317-1 | incus-6.14-1.1 on GA media | 2025-07-07T00:00:00Z | 2025-07-07T00:00:00Z |
| opensuse-su-2025:15316-1 | python311-Pillow-11.3.0-1.1 on GA media | 2025-07-06T00:00:00Z | 2025-07-06T00:00:00Z |
| opensuse-su-2025:15315-1 | libmozjs-128-0-128.12.0-1.1 on GA media | 2025-07-06T00:00:00Z | 2025-07-06T00:00:00Z |
| opensuse-su-2025:15314-1 | dpkg-1.22.21-1.1 on GA media | 2025-07-06T00:00:00Z | 2025-07-06T00:00:00Z |
| opensuse-su-2025:15313-1 | apache2-mod_security2-2.9.11-1.1 on GA media | 2025-07-06T00:00:00Z | 2025-07-06T00:00:00Z |
| opensuse-su-2025:15312-1 | MozillaThunderbird-128.12.0-1.1 on GA media | 2025-07-06T00:00:00Z | 2025-07-06T00:00:00Z |
| opensuse-su-2025:15311-1 | xwayland-24.1.8-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15310-1 | xorg-x11-server-21.1.15-6.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15309-1 | libwx_gtk2u_adv-suse16_0_0-3.2.8-4.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15308-1 | libwireshark18-4.4.7-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15307-1 | velociraptor-0.7.0.4.git163.87ee3570-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15306-1 | valkey-8.1.2-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15305-1 | traefik2-2.11.26-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15304-1 | traefik-3.4.3-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15303-1 | tomcat11-11.0.8-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15302-1 | tomcat10-10.1.42-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15301-1 | tomcat-9.0.106-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15300-1 | teleport-17.5.3-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15299-1 | libsystemd0-257.7-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15298-1 | sudo-1.9.17p1-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15297-1 | libspdlog1_15-1.15.3-2.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15296-1 | ctdb-4.22.2+git.396.c752843dcf4-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15295-1 | python311-salt-3006.0-41.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2023-397 | Heap-buffer-overflow in json_write_TF | 2023-05-14T14:02:14.802227Z | 2023-11-02T14:21:15.660519Z |
| osv-2023-1101 | Heap-buffer-overflow in decode_preR13_entities | 2023-11-02T13:00:18.006273Z | 2023-11-02T13:00:18.006480Z |
| osv-2023-1095 | Heap-use-after-free in zend_jit_trace_execute | 2023-10-31T13:03:18.357724Z | 2023-11-01T17:42:22.538231Z |
| osv-2023-634 | Heap-buffer-overflow in bit_read_BB | 2023-08-02T14:02:44.231233Z | 2023-11-01T14:21:43.594840Z |
| osv-2022-1251 | Heap-buffer-overflow in bit_read_B | 2022-12-10T13:00:16.385102Z | 2023-11-01T14:13:21.808323Z |
| osv-2022-1252 | Heap-buffer-overflow in bit_read_BB | 2022-12-10T13:00:18.486240Z | 2023-11-01T14:12:25.791807Z |
| osv-2023-1099 | Heap-buffer-overflow in dwg_geojson_object | 2023-11-01T13:01:34.665175Z | 2023-11-01T13:01:34.665590Z |
| osv-2023-1098 | Segv on unknown address in ZEND_HANDLE_EXCEPTION_SPEC_HANDLER | 2023-11-01T13:01:21.266355Z | 2023-11-01T13:01:21.266677Z |
| osv-2023-1097 | Security exception in com.puppycrawl.tools.checkstyle.JavaAstVisitor.getInnerBopAst | 2023-11-01T13:00:52.071904Z | 2023-11-01T13:00:52.072463Z |
| osv-2023-452 | Heap-buffer-overflow in json_write_TF | 2023-06-03T14:02:13.459131Z | 2023-10-31T14:21:55.530747Z |
| osv-2023-1093 | Stack-buffer-overflow in ndpi_handle_rule | 2023-10-31T13:02:51.707592Z | 2023-10-31T13:02:51.707857Z |
| osv-2023-1072 | UNKNOWN READ in igraph_strvector_set_len | 2023-10-27T13:00:37.573999Z | 2023-10-27T13:00:37.574322Z |
| osv-2023-1071 | Heap-use-after-free in igraph_pajek_yyparse | 2023-10-27T13:00:18.491498Z | 2023-10-27T13:00:18.492768Z |
| osv-2023-1070 | Segv on unknown address in igraph_strvector_set_len | 2023-10-26T13:02:51.638597Z | 2023-10-26T13:02:51.638896Z |
| osv-2023-1069 | Heap-use-after-free in igraph_pajek_yyparse | 2023-10-26T13:02:48.628038Z | 2023-10-26T13:02:48.628308Z |
| osv-2023-1068 | Heap-buffer-overflow in iasecc_parse_size | 2023-10-26T13:02:23.112449Z | 2023-10-26T13:02:23.112686Z |
| osv-2023-1063 | Heap-double-free in dwg_free_object | 2023-10-25T13:02:24.836979Z | 2023-10-25T13:02:24.837236Z |
| osv-2023-504 | Heap-buffer-overflow in ndpi_search_line | 2023-06-22T14:02:08.576791Z | 2023-10-23T14:16:27.982449Z |
| osv-2023-1051 | Heap-buffer-overflow in dwg_json_VPORT_private | 2023-10-23T13:00:32.282560Z | 2023-10-23T13:00:32.282807Z |
| osv-2023-1050 | Heap-buffer-overflow in H5D__scatter_mem | 2023-10-23T13:00:17.701572Z | 2023-10-23T13:00:17.701814Z |
| osv-2021-1580 | Heap-buffer-overflow in H5G__node_found | 2021-11-15T00:00:41.528810Z | 2023-10-22T14:05:32.861272Z |
| osv-2020-2301 | Heap-buffer-overflow in H5MM_xstrdup | 2021-01-15T00:00:42.910636Z | 2023-10-22T14:05:27.685860Z |
| osv-2023-1048 | Heap-buffer-overflow in decode_preR13_entities | 2023-10-22T13:01:31.381359Z | 2023-10-22T13:01:31.381601Z |
| osv-2023-1033 | Heap-buffer-overflow in Gfx::InputStreamer::read_u32 | 2023-10-20T13:00:25.024359Z | 2023-10-20T13:00:25.024683Z |
| osv-2022-852 | Security exception in java.base/java.nio.Bits.reserveMemory | 2022-09-07T00:00:21.638154Z | 2023-10-19T14:17:42.036432Z |
| osv-2023-257 | Global-buffer-overflow in read_coding_unit | 2023-04-01T13:01:00.280793Z | 2023-10-19T14:11:53.280269Z |
| osv-2022-1174 | Heap-buffer-overflow in crc64_clmul | 2022-11-16T13:02:12.420492Z | 2023-10-19T14:04:15.204368Z |
| osv-2023-1024 | Security exception in org.apache.poi.util.IOUtils.safelyAllocate | 2023-10-17T13:03:34.273057Z | 2023-10-17T13:03:34.273365Z |
| osv-2023-1001 | Security exception in java.base/java.lang.String.repeat | 2023-10-11T13:02:38.205441Z | 2023-10-14T14:20:59.452689Z |
| osv-2023-1016 | Use-of-uninitialized-value in Render_Single_Pass | 2023-10-14T13:02:55.073559Z | 2023-10-14T13:02:55.074040Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2017-0007 | lz4-compress is unmaintained | 2017-04-17T12:00:00Z | 2020-10-02T01:29:11Z |
| rustsec-2016-0006 | `cassandra` crate is unmaintained; use `cassandra-cpp` instead | 2016-12-15T12:00:00Z | 2020-10-02T01:29:11Z |
| rustsec-2016-0004 | libusb is unmaintained; use rusb instead | 2016-09-10T12:00:00Z | 2020-10-02T01:29:11Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-nifi-2020-9491 | 2025-09-12T11:46:46.000Z | 2025-09-12T12:08:23.743Z | |
| bit-nifi-2020-9487 | 2025-09-12T11:46:44.344Z | 2025-09-12T12:08:23.743Z | |
| bit-nifi-2020-9486 | 2025-09-12T11:46:42.745Z | 2025-09-12T12:08:23.743Z | |
| bit-nifi-2020-27223 | 2025-09-12T11:46:41.115Z | 2025-09-12T12:08:23.743Z | |
| bit-nifi-2020-1942 | 2025-09-12T11:46:39.379Z | 2025-09-12T12:08:23.743Z | |
| bit-nifi-2020-1933 | 2025-09-12T11:46:37.920Z | 2025-09-12T12:08:23.743Z | |
| bit-nifi-2020-1928 | 2025-09-12T11:46:36.422Z | 2025-09-12T12:08:23.743Z | |
| bit-nifi-2020-13940 | 2025-09-12T11:46:34.845Z | 2025-09-12T12:08:23.743Z | |
| bit-kyverno-2025-47281 | Kyverno's Improper JMESPath Variable Evaluation Leads to Denial of Service | 2025-09-12T11:43:05.940Z | 2025-09-12T12:08:23.743Z |
| bit-kyverno-2024-48921 | Kyverno's PolicyException objects can be created in any namespace by default | 2025-09-12T11:43:01.195Z | 2025-09-12T12:08:23.743Z |
| bit-kyverno-2023-47630 | Attacker can cause Kyverno user to unintentionally consume insecure image | 2025-09-12T11:42:59.488Z | 2025-09-12T12:08:23.743Z |
| bit-kyverno-2022-47633 | 2025-09-12T11:42:57.537Z | 2025-09-12T12:08:23.743Z | |
| bit-haproxy-2024-45506 | 2025-09-11T08:41:13.898Z | 2025-09-11T09:08:08.769Z | |
| bit-envoy-2025-55162 | Envoy: oAuth2 Filter Signout route will not clear cookies because of missing "secure;" flag | 2025-09-09T05:40:18.734Z | 2025-09-09T12:13:15.198Z |
| bit-redis-2024-31449 | Lua library commands may lead to stack overflow and RCE in Redis | 2024-10-09T16:41:01.123Z | 2025-09-09T06:08:46.021Z |
| bit-keydb-2024-31449 | Lua library commands may lead to stack overflow and RCE in Redis | 2024-10-09T16:30:25.529Z | 2025-09-09T06:08:46.021Z |
| bit-jupyterlab-2024-39700 | Remote Code Execution (RCE) vulnerability in jupyterlab extension template `update-integration-tests` GitHub Action | 2025-09-09T05:40:58.016Z | 2025-09-09T06:08:46.021Z |
| bit-cilium-2025-30163 | Node based network policies may incorrectly allow workload traffic | 2025-03-26T07:07:58.967Z | 2025-09-09T06:08:46.021Z |
| bit-cilium-2025-30162 | East-west traffic not subject to egress policy enforcement for requests via Gateway API load balancers | 2025-03-26T07:08:03.178Z | 2025-09-09T06:08:46.021Z |
| bit-powershell-2025-30399 | .NET and Visual Studio Remote Code Execution Vulnerability | 2025-09-04T17:48:59.298Z | 2025-09-04T18:07:55.535Z |
| bit-powershell-2025-21171 | .NET Remote Code Execution Vulnerability | 2025-09-04T17:48:57.882Z | 2025-09-04T18:07:55.535Z |
| bit-powershell-2024-30045 | .NET and Visual Studio Remote Code Execution Vulnerability | 2025-09-04T17:48:56.455Z | 2025-09-04T18:07:55.535Z |
| bit-powershell-2024-26190 | Microsoft QUIC Denial of Service Vulnerability | 2025-09-04T17:48:54.862Z | 2025-09-04T18:07:55.535Z |
| bit-powershell-2024-21409 | .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability | 2025-09-04T17:48:53.456Z | 2025-09-04T18:07:55.535Z |
| bit-powershell-2024-21392 | .NET and Visual Studio Denial of Service Vulnerability | 2025-09-04T17:48:52.052Z | 2025-09-04T18:07:55.535Z |
| bit-powershell-2023-36013 | PowerShell Information Disclosure Vulnerability | 2025-09-04T17:48:49.020Z | 2025-09-04T18:07:55.535Z |
| bit-powershell-2023-21538 | .NET Denial of Service Vulnerability | 2025-09-04T17:48:47.524Z | 2025-09-04T18:07:55.535Z |
| bit-powershell-2022-41121 | Windows Graphics Component Elevation of Privilege Vulnerability | 2025-09-04T17:48:45.951Z | 2025-09-04T18:07:55.535Z |
| bit-powershell-2022-41076 | PowerShell Remote Code Execution Vulnerability | 2025-09-04T17:48:44.658Z | 2025-09-04T18:07:55.535Z |
| bit-powershell-2022-34716 | .NET Spoofing Vulnerability | 2025-09-04T17:48:43.155Z | 2025-09-04T18:07:55.535Z |
| ID | Description | Updated |
|---|---|---|
| var-201006-1245 | WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4… | 2024-07-23T20:20:13.577000Z |
| var-200906-0618 | Multiple integer overflows in Xpdf 2.x and 3.x and Poppler 0.x, as used in the pdftops fi… | 2024-07-23T20:20:09.578000Z |
| var-200603-0283 | Unspecified vulnerability in Safari, LaunchServices, and/or CoreTypes in Apple Mac OS X 1… | 2024-07-23T20:19:38.862000Z |
| var-202110-1513 | This issue was addressed with improved checks. This issue is fixed in iOS 14.8 and iPadOS… | 2024-07-23T20:19:37.537000Z |
| var-202201-0369 | Heap-based Buffer Overflow in GitHub repository vim prior to 8.2. vim Exists in an out-of… | 2024-07-23T20:19:36.004000Z |
| var-201512-0325 | The xmlSAX2TextNode function in SAX2.c in the push interface in the HTML parser in libxml… | 2024-07-23T20:19:32.648000Z |
| var-202205-1313 | A memory corruption issue was addressed with improved state management. This issue is fix… | 2024-07-23T20:19:31.445000Z |
| var-201512-0531 | The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not prop… | 2024-07-23T20:19:31.632000Z |
| var-201902-0242 | In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishand… | 2024-07-23T20:19:24.838000Z |
| var-201011-0043 | The WebCore::HTMLLinkElement::process function in WebCore/html/HTMLLinkElement.cpp in Web… | 2024-07-23T20:19:23.854000Z |
| var-201302-0144 | Integer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on… | 2024-07-23T20:19:19.837000Z |
| var-200603-0272 | IPSec when used with VPN networks in Mac OS X 10.4 through 10.4.5 allows remote attackers… | 2024-07-23T20:19:19.547000Z |
| var-201912-0458 | A memory corruption issue was addressed with improved memory handling. This issue is fixe… | 2024-07-23T20:19:18.056000Z |
| var-201908-1840 | When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_dat… | 2024-07-23T20:18:47.623000Z |
| var-201111-0190 | Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.… | 2024-07-23T20:18:23.378000Z |
| var-201211-0319 | Race condition in WebKit in Apple iOS before 6.0.1 and Safari before 6.0.2 allows remote … | 2024-07-23T20:18:22.202000Z |
| var-200611-0488 | Unspecified vulnerability in Apple Mac OS X 10.4.8, and possibly other versions, allows r… | 2024-07-23T20:18:22.657000Z |
| var-201912-0633 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:18:16.634000Z |
| var-200009-0023 | VMware Tools in VMware Workstation 6.5.x before 6.5.4 build 246459; VMware Player 2.5.x b… | 2024-07-23T20:18:16.537000Z |
| var-200904-0809 | The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.1… | 2024-07-23T20:18:12.278000Z |
| var-200808-0470 | Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Ap… | 2024-07-23T20:18:12.672000Z |
| var-202110-1620 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:18:10.248000Z |
| var-201704-1397 | The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lack certa… | 2024-07-23T20:18:09.167000Z |
| var-200609-1220 | The get_server_hello function in the SSLv2 client code in OpenSSL 0.9.7 before 0.9.7l, 0.… | 2024-07-23T20:18:09.590000Z |
| var-202112-1654 | A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a … | 2024-07-23T20:18:07.199000Z |
| var-201504-0362 | The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4… | 2024-07-23T20:18:07.348000Z |
| var-200703-0026 | The SSH key generation process in OpenSSH in Apple Mac OS X 10.3.9 and 10.4 through 10.4.… | 2024-07-23T20:17:59.571000Z |
| var-201912-0536 | A cross-origin issue existed with the fetch API. This was addressed with improved input v… | 2024-07-23T20:17:22.170000Z |
| var-201806-0859 | Bouncy Castle BC 1.54 - 1.59, BC-FJA 1.0.0, BC-FJA 1.0.1 and earlier have a flaw in the L… | 2024-07-23T20:17:17.373000Z |
| var-201912-0497 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:17:16.698000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2021-000050 | Multiple vulnerabilities in GROWI | 2021-06-14T15:10+09:00 | 2021-06-14T15:10+09:00 |
| jvndb-2021-000048 | Asken App for Android fails to restrict custom URL schemes properly | 2021-06-14T15:10+09:00 | 2021-06-14T15:10+09:00 |
| jvndb-2021-000047 | WordPress plugin "Welcart e-Commerce" vulnerable to cross-site scripting | 2021-06-11T15:24+09:00 | 2021-06-11T15:24+09:00 |
| jvndb-2021-001756 | urllib3 vulnerable to Regular expression Denial-of-Service (ReDoS) | 2021-06-08T12:21+09:00 | 2021-06-08T12:21+09:00 |
| jvndb-2021-000044 | Zettlr vulnerable to cross-site scripting | 2021-05-26T14:50+09:00 | 2021-06-03T16:21+09:00 |
| jvndb-2021-000046 | ATOM - Smart life App vulnerable to improper server certificate verification | 2021-06-03T14:05+09:00 | 2021-06-03T14:05+09:00 |
| jvndb-2021-000045 | goo blog App fails to restrict custom URL schemes properly | 2021-06-02T15:46+09:00 | 2021-06-02T15:46+09:00 |
| jvndb-2021-001575 | Multiple vulnerabilities in Buffalo WSR-1166DHP3 and WSR-1166DHP4 routers | 2021-06-01T15:18+09:00 | 2021-06-01T15:18+09:00 |
| jvndb-2021-001506 | Hitachi Ops Center Analyzer vulnerability of communication using a certificate not intended by the user | 2021-05-25T14:11+09:00 | 2021-05-25T14:11+09:00 |
| jvndb-2021-000041 | The installers of ScanSnap Manager may insecurely load Dynamic Link Libraries | 2021-05-21T16:34+09:00 | 2021-05-21T16:34+09:00 |
| jvndb-2021-000043 | Installer of Overwolf may insecurely load Dynamic Link Libraries | 2021-05-21T16:07+09:00 | 2021-05-21T16:07+09:00 |
| jvndb-2021-000042 | Multiple cross-site scripting vulnerabilities in multiple PHP Factory products | 2021-05-21T15:38+09:00 | 2021-05-21T15:38+09:00 |
| jvndb-2021-000040 | QND vulnerable to privilege escalation | 2021-05-21T14:21+09:00 | 2021-05-21T14:21+09:00 |
| jvndb-2021-000037 | mod_auth_openidc vulnerable to denial-of-service (DoS) | 2021-05-14T15:35+09:00 | 2021-05-14T15:35+09:00 |
| jvndb-2021-000038 | Multiple vulnerabilities in Cisco Small Business Series Wireless Access Points | 2021-05-14T15:26+09:00 | 2021-05-14T15:26+09:00 |
| jvndb-2021-000039 | RFNTPS vulnerable to OS command injection | 2021-05-13T16:05+09:00 | 2021-05-13T16:05+09:00 |
| jvndb-2021-000036 | Multiple vulnerabilities in KonaWiki2 | 2021-05-13T16:05+09:00 | 2021-05-13T16:05+09:00 |
| jvndb-2021-000035 | EC-CUBE vulnerable to cross-site scripting | 2021-05-10T18:08+09:00 | 2021-05-10T18:08+09:00 |
| jvndb-2021-001381 | Multiple vulnerabilities in Buffalo broadband routers | 2021-04-28T16:14+09:00 | 2021-05-07T16:28+09:00 |
| jvndb-2021-001380 | Multiple Buffalo network devices contain hidden functionality | 2021-04-28T16:15+09:00 | 2021-05-07T16:16+09:00 |
| jvndb-2021-000034 | WordPress plugin "WP Fastest Cache" vulnerable to directory traversal | 2021-04-27T17:12+09:00 | 2021-04-27T17:12+09:00 |
| jvndb-2021-000909 | yappa-ng vulnerable to cross-site scripting | 2021-04-22T16:33+09:00 | 2021-04-22T16:33+09:00 |
| jvndb-2021-001374 | Trend Micro Password Manager may insecurely load Dynamic Link Libraries | 2021-04-20T12:25+09:00 | 2021-04-20T12:25+09:00 |
| jvndb-2021-001345 | Information Disclosure Vulnerability in Cosminexus | 2021-04-13T16:46+09:00 | 2021-04-13T16:46+09:00 |
| jvndb-2021-001344 | Vulnerability in JP1/VERITAS | 2021-04-13T16:42+09:00 | 2021-04-13T16:42+09:00 |
| jvndb-2021-001343 | D-Link DAP-1880AC contains multiple vulnerabilities | 2021-04-12T15:32+09:00 | 2021-04-12T15:32+09:00 |
| jvndb-2021-000026 | Fuji Xerox multifunction devices and printers vulnerable to denial-of-service (DoS) | 2021-03-19T15:32+09:00 | 2021-04-12T13:30+09:00 |
| jvndb-2020-000008 | AWMS Mobile App vulnerable to improper server certificate verification | 2020-01-31T12:30+09:00 | 2021-04-12T13:30+09:00 |
| jvndb-2019-000052 | ApeosWare Management Suite and ApeosWare Management Suite 2 contain open redirect vulnerability | 2019-08-15T14:29+09:00 | 2021-04-12T13:30+09:00 |
| jvndb-2017-000219 | Multiple Fuji Xerox products may insecurely load Dynamic Link Libraries | 2017-08-31T16:35+09:00 | 2021-04-12T13:30+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:3942-1 | Security update for qatengine, qatlib | 2025-11-05T08:16:02Z | 2025-11-05T08:16:02Z |
| suse-su-2025:3941-1 | Security update for tiff | 2025-11-05T07:15:41Z | 2025-11-05T07:15:41Z |
| suse-su-2025:20937-1 | Security update for libsoup | 2025-11-04T12:45:59Z | 2025-11-04T12:45:59Z |
| suse-su-2025:3936-1 | Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6) | 2025-11-04T12:04:17Z | 2025-11-04T12:04:17Z |
| suse-su-2025:3935-1 | Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP6) | 2025-11-04T11:34:00Z | 2025-11-04T11:34:00Z |
| suse-su-2025:3932-1 | Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP6) | 2025-11-04T08:04:15Z | 2025-11-04T08:04:15Z |
| suse-su-2025:3927-1 | Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP6) | 2025-11-04T07:04:21Z | 2025-11-04T07:04:21Z |
| suse-su-2025:3926-1 | Security update for the Linux Kernel (Live Patch 72 for SLE 12 SP5) | 2025-11-03T18:03:58Z | 2025-11-03T18:03:58Z |
| suse-su-2025:3919-1 | Security update for nodejs18 | 2025-11-03T10:32:00Z | 2025-11-03T10:32:00Z |
| suse-su-2025:3918-1 | Security update for ImageMagick | 2025-11-03T10:31:34Z | 2025-11-03T10:31:34Z |
| suse-su-2025:3917-1 | Security update for openssl-3-livepatches | 2025-11-03T09:58:08Z | 2025-11-03T09:58:08Z |
| suse-su-2025:3910-1 | Security update for poppler | 2025-11-02T12:18:06Z | 2025-11-02T12:18:06Z |
| suse-su-2025:3909-1 | Security update for xorg-x11-server | 2025-11-02T12:16:51Z | 2025-11-02T12:16:51Z |
| suse-su-2025:3905-1 | Security update for webkit2gtk3 | 2025-11-01T06:27:17Z | 2025-11-01T06:27:17Z |
| suse-su-2025:3904-1 | Security update for strongswan | 2025-11-01T06:27:07Z | 2025-11-01T06:27:07Z |
| suse-su-2025:3903-1 | Security update for bind | 2025-10-31T17:08:27Z | 2025-10-31T17:08:27Z |
| suse-su-2025:3902-1 | Security update for squid | 2025-10-31T17:08:04Z | 2025-10-31T17:08:04Z |
| suse-su-2025:20935-1 | Security update for colord | 2025-10-31T16:29:21Z | 2025-10-31T16:29:21Z |
| suse-su-2025:3900-1 | Security update for poppler | 2025-10-31T14:56:40Z | 2025-10-31T14:56:40Z |
| suse-su-2025:3899-1 | Security update for colord | 2025-10-31T14:56:12Z | 2025-10-31T14:56:12Z |
| suse-su-2025:3897-1 | Security update for libssh | 2025-10-31T14:55:41Z | 2025-10-31T14:55:41Z |
| suse-su-2025:1771-1 | Security update for iputils | 2025-10-31T09:58:20Z | 2025-10-31T09:58:20Z |
| suse-su-2025:3892-1 | Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP6) | 2025-10-31T08:56:44Z | 2025-10-31T08:56:44Z |
| suse-su-2025:3888-1 | Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP7) | 2025-10-31T07:04:06Z | 2025-10-31T07:04:06Z |
| suse-su-2025:3889-1 | Security update for the Linux Kernel RT (Live Patch 4 for SLE 15 SP7) | 2025-10-31T06:34:00Z | 2025-10-31T06:34:00Z |
| suse-su-2025:3886-1 | Security update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP7) | 2025-10-31T06:05:31Z | 2025-10-31T06:05:31Z |
| suse-su-2025:3880-1 | Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP6) | 2025-10-31T05:35:32Z | 2025-10-31T05:35:32Z |
| suse-su-2025:3878-1 | Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP6) | 2025-10-31T05:11:42Z | 2025-10-31T05:11:42Z |
| suse-su-2025:3875-1 | Security update for libxslt | 2025-10-30T15:27:08Z | 2025-10-30T15:27:08Z |
| suse-su-2025:3874-1 | Security update for xwayland | 2025-10-30T15:25:37Z | 2025-10-30T15:25:37Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-03087 | Tenda WH450 goform/Natlimit文件缓冲区溢出漏洞 | 2026-01-09 | 2026-01-09 |
| cnvd-2026-03086 | FluentCMS输入验证错误漏洞 | 2026-01-09 | 2026-01-09 |
| cnvd-2026-02896 | Tenda AC7 GetParentControlInfo方法堆栈缓冲区溢出漏洞 | 2024-03-27 | 2026-01-09 |
| cnvd-2026-02895 | Tenda AC7 formWifiWpsStart方法栈缓冲区溢出漏洞 | 2024-03-27 | 2026-01-09 |
| cnvd-2026-02894 | Tenda AC7 formWifiWpsOOB方法堆栈缓冲区溢出漏洞 | 2024-03-27 | 2026-01-09 |
| cnvd-2026-02893 | Tenda AC7 formSetDeviceName方法堆栈缓冲区溢出漏洞 | 2024-03-27 | 2026-01-09 |
| cnvd-2026-02892 | Tenda FH1205 GetParentControlInfo方法堆栈缓冲区溢出漏洞 | 2024-03-29 | 2026-01-09 |
| cnvd-2026-02891 | Tenda FH1205 fromSetRouteStatic方法堆栈缓冲区溢出漏洞 | 2024-03-29 | 2026-01-09 |
| cnvd-2026-02890 | Tenda FH1205 fromNatStaticSetting方法堆栈缓冲区溢出漏洞 | 2024-03-29 | 2026-01-09 |
| cnvd-2026-02889 | Tenda FH1205 formSetCfm方法堆栈缓冲区溢出漏洞 | 2024-03-29 | 2026-01-09 |
| cnvd-2026-02888 | Tenda FH1205 formQuickIndex方法堆栈缓冲区溢出漏洞 | 2024-03-29 | 2026-01-09 |
| cnvd-2026-02887 | WordPress ilGhera Support System for WooCommerce plugin未经授权的数据修改漏洞 | 2026-01-09 | 2026-01-09 |
| cnvd-2026-02886 | WordPress Geo Controller plugin跨站脚本漏洞 | 2026-01-09 | 2026-01-09 |
| cnvd-2026-02885 | WordPress FS Registration Password plugin权限提升漏洞 | 2026-01-09 | 2026-01-09 |
| cnvd-2026-02884 | WordPress FlexTable plugin跨站脚本漏洞 | 2026-01-09 | 2026-01-09 |
| cnvd-2026-02883 | WordPress FastDup plugin路径遍历漏洞 | 2026-01-09 | 2026-01-09 |
| cnvd-2026-02882 | WordPress Car Rental Manager plugin缺少授权漏洞 | 2026-01-09 | 2026-01-09 |
| cnvd-2026-02881 | WordPress Calafate plugin文件包含漏洞 | 2026-01-09 | 2026-01-09 |
| cnvd-2026-02880 | WordPress Better Business Reviews plugin缺少授权漏洞 | 2026-01-09 | 2026-01-09 |
| cnvd-2026-02879 | WordPress AffiliateX plugin缺少授权漏洞 | 2026-01-09 | 2026-01-09 |
| cnvd-2026-02878 | WordPress Accordion plugin跨站脚本漏洞 | 2026-01-09 | 2026-01-09 |
| cnvd-2026-02778 | Orangescrum SQL注入漏洞 | 2025-12-29 | 2026-01-09 |
| cnvd-2026-02777 | Orangescrum跨站脚本漏洞 | 2025-12-29 | 2026-01-09 |
| cnvd-2026-02776 | Orangescrum权限提升漏洞 | 2025-12-29 | 2026-01-09 |
| cnvd-2026-02696 | Google Pixel权限提升漏洞(CNVD-2026-0269620) | 2025-12-18 | 2026-01-09 |
| cnvd-2026-02695 | Google Pixel权限提升漏洞(CNVD-2026-0269521) | 2025-12-18 | 2026-01-09 |
| cnvd-2026-02694 | Google Pixel权限提升漏洞(CNVD-2026-0269422) | 2025-12-18 | 2026-01-09 |
| cnvd-2026-02693 | Google Pixel权限提升漏洞(CNVD-2026-0269323) | 2025-12-18 | 2026-01-09 |
| cnvd-2026-02684 | Orangescrum操作系统命令注入漏洞 | 2023-01-30 | 2026-01-09 |
| cnvd-2026-02683 | Orangescrum路径遍历漏洞 | 2023-02-09 | 2026-01-09 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0874 | Vulnérabilité dans Schneider Electric EcoStruxure | 2025-10-15T00:00:00.000000 | 2025-10-15T00:00:00.000000 |
| certfr-2025-avi-0873 | Multiples vulnérabilités dans les produits Mozilla | 2025-10-15T00:00:00.000000 | 2025-10-15T00:00:00.000000 |
| certfr-2025-avi-0872 | Multiples vulnérabilités dans les produits HPE Aruba Networking | 2025-10-15T00:00:00.000000 | 2025-10-15T00:00:00.000000 |
| certfr-2025-avi-0871 | Multiples vulnérabilités dans les produits Fortinet | 2025-10-15T00:00:00.000000 | 2025-10-15T00:00:00.000000 |
| CERTFR-2025-AVI-0882 | Multiples vulnérabilités dans les produits Microsoft | 2025-10-15T00:00:00.000000 | 2025-10-15T00:00:00.000000 |
| CERTFR-2025-AVI-0881 | Multiples vulnérabilités dans Microsoft Azure | 2025-10-15T00:00:00.000000 | 2025-10-15T00:00:00.000000 |
| CERTFR-2025-AVI-0880 | Multiples vulnérabilités dans Microsoft .Net | 2025-10-15T00:00:00.000000 | 2025-10-15T00:00:00.000000 |
| CERTFR-2025-AVI-0879 | Multiples vulnérabilités dans Microsoft Windows | 2025-10-15T00:00:00.000000 | 2025-10-15T00:00:00.000000 |
| CERTFR-2025-AVI-0878 | Multiples vulnérabilités dans Microsoft Office | 2025-10-15T00:00:00.000000 | 2025-10-15T00:00:00.000000 |
| CERTFR-2025-AVI-0877 | Multiples vulnérabilités dans les produits Ivanti | 2025-10-15T00:00:00.000000 | 2025-10-15T00:00:00.000000 |
| CERTFR-2025-AVI-0876 | Multiples vulnérabilités dans les produits Adobe | 2025-10-15T00:00:00.000000 | 2025-10-15T00:00:00.000000 |
| CERTFR-2025-AVI-0875 | Vulnérabilité dans Google Chrome | 2025-10-15T00:00:00.000000 | 2025-10-15T00:00:00.000000 |
| CERTFR-2025-AVI-0874 | Vulnérabilité dans Schneider Electric EcoStruxure | 2025-10-15T00:00:00.000000 | 2025-10-15T00:00:00.000000 |
| CERTFR-2025-AVI-0873 | Multiples vulnérabilités dans les produits Mozilla | 2025-10-15T00:00:00.000000 | 2025-10-15T00:00:00.000000 |
| CERTFR-2025-AVI-0872 | Multiples vulnérabilités dans les produits HPE Aruba Networking | 2025-10-15T00:00:00.000000 | 2025-10-15T00:00:00.000000 |
| CERTFR-2025-AVI-0871 | Multiples vulnérabilités dans les produits Fortinet | 2025-10-15T00:00:00.000000 | 2025-10-15T00:00:00.000000 |
| certfr-2025-avi-0870 | Vulnérabilité dans Microsoft Azure | 2025-10-14T00:00:00.000000 | 2025-10-14T00:00:00.000000 |
| certfr-2025-avi-0869 | Multiples vulnérabilités dans les produits Veeam | 2025-10-14T00:00:00.000000 | 2025-10-14T00:00:00.000000 |
| certfr-2025-avi-0868 | Vulnérabilité dans Siemens SIMATIC | 2025-10-14T00:00:00.000000 | 2025-10-14T00:00:00.000000 |
| certfr-2025-avi-0867 | Multiples vulnérabilités dans les produits SAP | 2025-10-14T00:00:00.000000 | 2025-10-14T00:00:00.000000 |
| certfr-2025-avi-0866 | Vulnérabilité dans Elastic Cloud Enterprise | 2025-10-14T00:00:00.000000 | 2025-10-14T00:00:00.000000 |
| CERTFR-2025-AVI-0870 | Vulnérabilité dans Microsoft Azure | 2025-10-14T00:00:00.000000 | 2025-10-14T00:00:00.000000 |
| CERTFR-2025-AVI-0869 | Multiples vulnérabilités dans les produits Veeam | 2025-10-14T00:00:00.000000 | 2025-10-14T00:00:00.000000 |
| CERTFR-2025-AVI-0868 | Vulnérabilité dans Siemens SIMATIC | 2025-10-14T00:00:00.000000 | 2025-10-14T00:00:00.000000 |
| CERTFR-2025-AVI-0867 | Multiples vulnérabilités dans les produits SAP | 2025-10-14T00:00:00.000000 | 2025-10-14T00:00:00.000000 |
| CERTFR-2025-AVI-0866 | Vulnérabilité dans Elastic Cloud Enterprise | 2025-10-14T00:00:00.000000 | 2025-10-14T00:00:00.000000 |
| certfr-2025-avi-0865 | Vulnérabilité dans Oracle E-Business Suite | 2025-10-13T00:00:00.000000 | 2025-10-13T00:00:00.000000 |
| certfr-2025-avi-0864 | Multiples vulnérabilités dans VMware Tanzu | 2025-10-13T00:00:00.000000 | 2025-10-13T00:00:00.000000 |
| certfr-2025-avi-0863 | Vulnérabilité dans Belden HiOS Switch Platform | 2025-10-13T00:00:00.000000 | 2025-10-13T00:00:00.000000 |
| CERTFR-2025-AVI-0865 | Vulnérabilité dans Oracle E-Business Suite | 2025-10-13T00:00:00.000000 | 2025-10-13T00:00:00.000000 |