Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-2562 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
JingDong JD Cloud Box AX6600 jdcweb_rpc jdcapi cast_st… |
JingDong |
JD Cloud Box AX6600 |
2026-02-16T15:02:49.628Z | 2026-02-17T17:21:03.189Z |
| CVE-2026-2526 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Wavlink WL-WN579A3 wireless.cgi multi_ssid command injection |
Wavlink |
WL-WN579A3 |
2026-02-16T01:02:08.386Z | 2026-02-17T17:16:45.552Z |
| CVE-2026-2525 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Free5GC PFCP UDP Endpoint denial of service |
n/a |
Free5GC |
2026-02-16T01:02:06.733Z | 2026-02-17T17:16:19.988Z |
| CVE-2026-2524 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Open5GS MME mme_s11_handle_create_session_response den… |
n/a |
Open5GS |
2026-02-16T00:32:07.343Z | 2026-02-17T17:15:56.357Z |
| CVE-2026-2523 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Open5GS SMF gn-handler.c smf_gn_handle_create_pdp_cont… |
n/a |
Open5GS |
2026-02-16T00:02:07.539Z | 2026-02-17T17:15:26.786Z |
| CVE-2026-2618 |
6.3 (4.0)
3.7 (3.1)
3.7 (3.0)
|
Beetel 777VR1 SSH Service risky encryption |
Beetel |
777VR1 |
2026-02-17T16:32:06.477Z | 2026-02-17T17:14:55.824Z |
| CVE-2026-2527 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Wavlink WL-WN579A3 login.cgi command injection |
Wavlink |
WL-WN579A3 |
2026-02-16T01:32:05.801Z | 2026-02-17T17:14:47.973Z |
| CVE-2026-2529 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Wavlink WL-WN579A3 wireless.cgi DeleteMac command injection |
Wavlink |
WL-WN579A3 |
2026-02-16T02:02:08.617Z | 2026-02-17T17:13:59.920Z |
| CVE-2026-2530 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Wavlink WL-WN579A3 wireless.cgi AddMac command injection |
Wavlink |
WL-WN579A3 |
2026-02-16T02:32:06.862Z | 2026-02-17T17:13:13.741Z |
| CVE-2026-2531 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
MindsDB File Upload security.py clear_filename server-… |
n/a |
MindsDB |
2026-02-16T02:32:10.743Z | 2026-02-17T17:12:35.004Z |
| CVE-2026-2535 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Comfast CF-N1 V2 mbox-config sub_44AB9C command injection |
Comfast |
CF-N1 V2 |
2026-02-16T04:32:06.965Z | 2026-02-17T17:07:16.175Z |
| CVE-2025-32063 |
6.8 (3.1)
|
Enabling SSH server on Infotainment ECU |
Bosch |
Infotainment system ECU |
2026-02-15T10:48:34.125Z | 2026-02-17T17:07:10.877Z |
| CVE-2026-2539 |
5.7 (4.0)
|
Micca KE700 Cleartext transmission of key fob ID |
Micca Auto Electronics Co., Ltd. |
Car Alarm System KE700 |
2026-02-15T10:58:38.397Z | 2026-02-17T17:07:03.354Z |
| CVE-2026-2540 |
8.4 (4.0)
|
Micca KE700 Acceptance of previously used rolling codes |
Micca Auto Electronics Co., Ltd. |
Car Alarm System KE700 |
2026-02-15T11:03:26.051Z | 2026-02-17T17:06:53.980Z |
| CVE-2026-2541 |
6.4 (4.0)
|
Micca KE700 Brute-force vulnerability due to low entropy |
Micca Auto Electronics Co., Ltd. |
Car Alarm System KE700 |
2026-02-15T11:07:40.539Z | 2026-02-17T17:06:46.968Z |
| CVE-2026-2415 |
7.5 (4.0)
|
Unsafe variable evaluation in email templates |
pretix |
pretix |
2026-02-16T10:15:09.149Z | 2026-02-17T17:06:39.418Z |
| CVE-2026-2451 |
7.5 (4.0)
|
Unsafe variable evaluation in email templates |
pretix |
pretix-doistep |
2026-02-16T10:16:05.423Z | 2026-02-17T17:06:30.536Z |
| CVE-2026-2528 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Wavlink WL-WN579A3 wireless.cgi Delete_Mac_list comman… |
Wavlink |
WL-WN579A3 |
2026-02-16T02:02:07.067Z | 2026-02-17T17:06:29.769Z |
| CVE-2026-2452 |
7.5 (4.0)
|
Unsafe variable evaluation in email templates |
pretix |
pretix-newsletter |
2026-02-16T10:16:22.027Z | 2026-02-17T17:06:21.998Z |
| CVE-2025-13821 |
5.7 (3.1)
|
User profile update exposes password hash and MFA secrets |
Mattermost |
Mattermost |
2026-02-16T11:57:25.588Z | 2026-02-17T17:06:14.279Z |
| CVE-2025-14350 |
4.3 (3.1)
|
Information disclosure via channel mentions in posts |
Mattermost |
Mattermost |
2026-02-16T12:05:33.312Z | 2026-02-17T17:06:07.112Z |
| CVE-2026-1046 |
7.6 (3.1)
|
Arbitrary application execution via unvalidated server… |
Mattermost |
Mattermost |
2026-02-16T12:10:38.668Z | 2026-02-17T17:05:58.569Z |
| CVE-2025-14573 |
3.8 (3.1)
|
Team Admin Bypass of Invite Permissions via allow_open… |
Mattermost |
Mattermost |
2026-02-16T12:25:32.672Z | 2026-02-17T17:05:49.640Z |
| CVE-2026-2536 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
opencc JFlow Workflow WF_Admin_AttrFlow.java Imp_Done … |
opencc |
JFlow |
2026-02-16T05:02:14.100Z | 2026-02-17T17:05:15.429Z |
| CVE-2026-2537 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
Comfast CF-E4 HTTP POST Request mbox-config command in… |
Comfast |
CF-E4 |
2026-02-16T05:32:05.986Z | 2026-02-17T17:04:23.381Z |
| CVE-2020-37095 |
8.4 (4.0)
9.8 (3.1)
|
Cyberoam Authentication Client 2.1.2.7 - Buffer Overfl… |
Cyberoam |
Cyberoam Authentication Client |
2026-02-06T23:14:04.889Z | 2026-02-17T17:04:03.100Z |
| CVE-2020-37106 |
5.1 (4.0)
5.3 (3.1)
|
Business Live Chat Software 1.0 - Cross-Site Request F… |
Bdtask |
Business Live Chat Software |
2026-02-06T23:14:05.412Z | 2026-02-17T17:03:46.927Z |
| CVE-2020-37107 |
6.7 (4.0)
7.5 (3.1)
|
Core FTP LE 2.2 - Denial of Service |
Core FTP |
Core FTP LE |
2026-02-06T23:14:05.841Z | 2026-02-17T17:03:30.221Z |
| CVE-2020-37109 |
6.7 (4.0)
7.5 (3.1)
|
aSc TimeTables 2020.11.4 - Denial of Service |
asc Applied Software Consultants |
aSc TimeTables |
2026-02-06T23:14:06.283Z | 2026-02-17T17:03:11.680Z |
| CVE-2020-37122 |
6.7 (4.0)
7.5 (3.1)
|
SpotFTP-FTP Password Recover 2.4.8 - Denial of Service |
Nsauditor |
FTP Password Recover |
2026-02-06T23:14:06.709Z | 2026-02-17T17:02:54.513Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-23206 |
N/A
|
dpaa2-switch: prevent ZERO_SIZE_PTR dereference when n… |
Linux |
Linux |
2026-02-14T16:27:29.095Z | 2026-02-14T16:27:29.095Z |
| CVE-2026-23205 |
N/A
|
smb/client: fix memory leak in smb2_open_file() |
Linux |
Linux |
2026-02-14T16:27:28.409Z | 2026-02-14T16:27:28.409Z |
| CVE-2026-23204 |
N/A
|
net/sched: cls_u32: use skb_header_pointer_careful() |
Linux |
Linux |
2026-02-14T16:27:27.708Z | 2026-02-14T16:27:27.708Z |
| CVE-2026-23203 |
N/A
|
net: cpsw_new: Execute ndo_set_rx_mode callback in a w… |
Linux |
Linux |
2026-02-14T16:27:27.048Z | 2026-02-14T16:27:27.048Z |
| CVE-2026-23202 |
N/A
|
spi: tegra210-quad: Protect curr_xfer in tegra_qspi_co… |
Linux |
Linux |
2026-02-14T16:27:26.365Z | 2026-02-14T16:27:26.365Z |
| CVE-2026-23201 |
N/A
|
ceph: fix oops due to invalid pointer for kfree() in p… |
Linux |
Linux |
2026-02-14T16:27:25.693Z | 2026-02-14T16:27:25.693Z |
| CVE-2026-23200 |
N/A
|
ipv6: Fix ECMP sibling count mismatch when clearing RT… |
Linux |
Linux |
2026-02-14T16:27:25.025Z | 2026-02-14T16:27:25.025Z |
| CVE-2026-23199 |
N/A
|
procfs: avoid fetching build ID while holding VMA lock |
Linux |
Linux |
2026-02-14T16:27:24.326Z | 2026-02-14T16:27:24.326Z |
| CVE-2026-23198 |
N/A
|
KVM: Don't clobber irqfd routing type when deassigning irqfd |
Linux |
Linux |
2026-02-14T16:27:23.621Z | 2026-02-14T16:27:23.621Z |
| CVE-2026-23197 |
N/A
|
i2c: imx: preserve error state in block data length handler |
Linux |
Linux |
2026-02-14T16:27:22.919Z | 2026-02-14T16:27:22.919Z |
| CVE-2026-23196 |
N/A
|
HID: Intel-thc-hid: Intel-thc: Add safety check for re… |
Linux |
Linux |
2026-02-14T16:27:22.264Z | 2026-02-16T08:58:57.510Z |
| CVE-2026-23195 |
N/A
|
cgroup/dmem: avoid pool UAF |
Linux |
Linux |
2026-02-14T16:27:21.621Z | 2026-02-14T16:27:21.621Z |
| CVE-2026-23194 |
N/A
|
rust_binder: correctly handle FDA objects of length zero |
Linux |
Linux |
2026-02-14T16:27:20.944Z | 2026-02-14T16:27:20.944Z |
| CVE-2026-23193 |
N/A
|
scsi: target: iscsi: Fix use-after-free in iscsit_dec_… |
Linux |
Linux |
2026-02-14T16:27:20.251Z | 2026-02-16T08:58:56.360Z |
| CVE-2026-23192 |
N/A
|
linkwatch: use __dev_put() in callers to prevent UAF |
Linux |
Linux |
2026-02-14T16:27:19.557Z | 2026-02-14T16:27:19.557Z |
| CVE-2026-23191 |
N/A
|
ALSA: aloop: Fix racy access at PCM trigger |
Linux |
Linux |
2026-02-14T16:27:18.882Z | 2026-02-16T08:58:55.176Z |
| CVE-2026-23190 |
N/A
|
ASoC: amd: fix memory leak in acp3x pdm dma ops |
Linux |
Linux |
2026-02-14T16:27:18.203Z | 2026-02-14T16:27:18.203Z |
| CVE-2026-23189 |
N/A
|
ceph: fix NULL pointer dereference in ceph_mds_auth_match() |
Linux |
Linux |
2026-02-14T16:27:17.549Z | 2026-02-14T16:27:17.549Z |
| CVE-2026-23188 |
N/A
|
net: usb: r8152: fix resume reset deadlock |
Linux |
Linux |
2026-02-14T16:27:16.869Z | 2026-02-14T16:27:16.869Z |
| CVE-2026-23187 |
N/A
|
pmdomain: imx8m-blk-ctrl: fix out-of-range access of b… |
Linux |
Linux |
2026-02-14T16:27:16.200Z | 2026-02-14T16:27:16.200Z |
| CVE-2026-23186 |
N/A
|
hwmon: (acpi_power_meter) Fix deadlocks related to acp… |
Linux |
Linux |
2026-02-14T16:27:15.505Z | 2026-02-14T16:27:15.505Z |
| CVE-2026-23185 |
N/A
|
wifi: iwlwifi: mld: cancel mlo_scan_start_wk |
Linux |
Linux |
2026-02-14T16:27:14.815Z | 2026-02-14T16:27:14.815Z |
| CVE-2026-23184 |
N/A
|
binder: fix UAF in binder_netlink_report() |
Linux |
Linux |
2026-02-14T16:27:14.167Z | 2026-02-14T16:27:14.167Z |
| CVE-2026-23183 |
N/A
|
cgroup/dmem: fix NULL pointer dereference when setting max |
Linux |
Linux |
2026-02-14T16:27:13.482Z | 2026-02-14T16:27:13.482Z |
| CVE-2026-23182 |
N/A
|
spi: tegra: Fix a memory leak in tegra_slink_probe() |
Linux |
Linux |
2026-02-14T16:27:12.806Z | 2026-02-14T16:27:12.806Z |
| CVE-2026-23181 |
N/A
|
btrfs: sync read disk super and set block size |
Linux |
Linux |
2026-02-14T16:27:12.137Z | 2026-02-16T08:58:53.981Z |
| CVE-2026-23180 |
N/A
|
dpaa2-switch: add bounds check for if_id in IRQ handler |
Linux |
Linux |
2026-02-14T16:27:11.463Z | 2026-02-14T16:27:11.463Z |
| CVE-2026-23179 |
N/A
|
nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready() |
Linux |
Linux |
2026-02-14T16:27:10.778Z | 2026-02-16T08:58:52.846Z |
| CVE-2026-23178 |
N/A
|
HID: i2c-hid: fix potential buffer overflow in i2c_hid… |
Linux |
Linux |
2026-02-14T16:27:10.108Z | 2026-02-16T08:58:51.701Z |
| CVE-2026-23177 |
N/A
|
mm, shmem: prevent infinite loop on truncate race |
Linux |
Linux |
2026-02-14T16:27:09.429Z | 2026-02-14T16:27:09.429Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-22208 | OpenS100 (the reference implementation S-100 viewer) prior to commit 753cf29 contain a remote code … | 2026-02-17T15:16:22.320 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-2101 | A Reflected Cross-site Scripting (XSS) vulnerability affecting ENOVIAvpm Web Access from ENOVIAvpm … | 2026-02-16T17:18:09.003 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-2002 | The Forminator Forms – Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vul… | 2026-02-17T05:16:17.080 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-2001 | The WowRevenue plugin for WordPress is vulnerable to unauthorized plugin installation due to a miss… | 2026-02-16T20:19:36.190 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-1793 | The Element Pack Addons for Elementor plugin for WordPress is vulnerable to arbitrary file reads in… | 2026-02-15T04:15:54.260 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-1750 | The Ecwid by Lightspeed Ecommerce Shopping Cart plugin for WordPress is vulnerable to Privilege Esc… | 2026-02-15T04:15:54.113 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-1657 | The EventPrime plugin for WordPress is vulnerable to unauthorized image file upload in all versions… | 2026-02-17T06:16:18.173 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-1490 | The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordPress is vulnerable to unautho… | 2026-02-15T04:15:53.783 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-1335 | An Out-Of-Bounds Write vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawi… | 2026-02-16T14:16:18.303 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-1334 | An Out-Of-Bounds Read vulnerability affecting the EPRT file reading procedure in SOLIDWORKS eDrawin… | 2026-02-16T14:16:18.160 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-1333 | A Use of Uninitialized Variable vulnerability affecting the EPRT file reading procedure in SOLIDWOR… | 2026-02-16T14:16:18.003 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-1216 | The RSS Aggregator plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'te… | 2026-02-17T10:15:57.757 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-1046 | Mattermost Desktop App versions <=6.0 6.2.0 5.2.13.0 fail to validate help links which allows a mal… | 2026-02-16T13:16:00.793 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-0929 | The RegistrationMagic WordPress plugin before 6.0.7.2 does not have proper capability checks, allo… | 2026-02-16T07:17:00.197 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-0829 | The Frontend File Manager Plugin WordPress plugin through 23.5 allows unauthenticated users to send… | 2026-02-17T07:16:31.883 | 2026-02-18T17:52:22.253 |
| fkie_cve-2025-8303 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-02-17T12:16:15.280 | 2026-02-18T17:52:22.253 |
| fkie_cve-2025-7706 | Missing Authentication for Critical Function vulnerability in TUBITAK BILGEM Software Technologies … | 2026-02-17T14:16:00.483 | 2026-02-18T17:52:22.253 |
| fkie_cve-2025-7631 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability … | 2026-02-17T12:16:15.090 | 2026-02-18T17:52:22.253 |
| fkie_cve-2025-71224 | In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: ocb: skip rx_n… | 2026-02-14T17:15:54.773 | 2026-02-18T17:52:22.253 |
| fkie_cve-2025-71223 | In the Linux kernel, the following vulnerability has been resolved: smb/server: fix refcount leak … | 2026-02-14T17:15:54.670 | 2026-02-18T17:52:22.253 |
| fkie_cve-2025-71222 | In the Linux kernel, the following vulnerability has been resolved: wifi: wlcore: ensure skb headr… | 2026-02-14T17:15:54.560 | 2026-02-18T17:52:22.253 |
| fkie_cve-2025-71221 | In the Linux kernel, the following vulnerability has been resolved: dmaengine: mmp_pdma: Fix race … | 2026-02-14T17:15:54.450 | 2026-02-18T17:52:22.253 |
| fkie_cve-2025-71220 | In the Linux kernel, the following vulnerability has been resolved: smb/server: call ksmbd_session… | 2026-02-14T17:15:54.343 | 2026-02-18T17:52:22.253 |
| fkie_cve-2025-71204 | In the Linux kernel, the following vulnerability has been resolved: smb/server: fix refcount leak … | 2026-02-14T17:15:54.237 | 2026-02-18T17:52:22.253 |
| fkie_cve-2025-71203 | In the Linux kernel, the following vulnerability has been resolved: riscv: Sanitize syscall table … | 2026-02-14T17:15:54.110 | 2026-02-18T17:52:22.253 |
| fkie_cve-2025-70830 | A Server-Side Template Injection (SSTI) vulnerability in the Freemarker template engine of Datart v… | 2026-02-17T16:20:25.833 | 2026-02-18T17:52:22.253 |
| fkie_cve-2025-70829 | An information exposure vulnerability in Datart v1.0.0-rc.3 allows authenticated attackers to acces… | 2026-02-17T15:16:19.047 | 2026-02-18T17:52:22.253 |
| fkie_cve-2025-67905 | Malwarebytes AdwCleaner before v.8.7.0 runs as Administrator and performs an insecure log file dele… | 2026-02-17T17:21:04.340 | 2026-02-18T17:52:22.253 |
| fkie_cve-2025-65716 | An issue in Visual Studio Code Extensions Markdown Preview Enhanced v0.8.18 allows attackers to exe… | 2026-02-16T16:19:17.403 | 2026-02-18T17:52:22.253 |
| fkie_cve-2025-65715 | An issue in the code-runner.executorMap setting of Visual Studio Code Extensions Code Runner v0.12.… | 2026-02-16T16:19:17.287 | 2026-02-18T17:52:22.253 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-hrx4-rccm-xj6c |
6.1 (3.1)
|
A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 25… | 2025-12-05T18:31:11Z | 2026-02-17T12:31:07Z |
| ghsa-cw54-4j6f-m898 |
7.2 (3.1)
|
The RSS Aggregator plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'te… | 2026-02-17T12:31:07Z | 2026-02-17T12:31:07Z |
| ghsa-3866-72wv-xq49 |
6.5 (3.1)
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnera… | 2026-02-17T12:31:07Z | 2026-02-17T12:31:07Z |
| ghsa-343j-9r8x-295r |
8.8 (3.1)
|
Missing Authorization vulnerability in SiteLock SiteLock Security sitelock allows Exploiting Incorr… | 2026-01-23T15:31:35Z | 2026-02-17T12:31:07Z |
| ghsa-pf6x-fmxv-j5g5 |
6.5 (3.1)
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Sea… | 2026-01-22T18:30:37Z | 2026-02-17T09:31:24Z |
| ghsa-vpw9-rw58-f7gh |
7.7 (3.1)
|
The Zarinpal Gateway for WooCommerce plugin for WordPress is vulnerable to Improper Access Control … | 2026-02-17T06:31:25Z | 2026-02-17T06:31:26Z |
| ghsa-4x73-7vhc-g4xh |
5.3 (3.1)
|
The EventPrime plugin for WordPress is vulnerable to unauthorized image file upload in all versions… | 2026-02-17T06:31:26Z | 2026-02-17T06:31:26Z |
| ghsa-x39p-mhp8-fvfx |
4.4 (3.1)
|
The Forminator Forms – Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vul… | 2026-02-17T06:31:25Z | 2026-02-17T06:31:25Z |
| ghsa-xxv9-73gc-96fm |
9.3 (4.0)
|
LightLLM version 1.1.0 and prior contain an unauthenticated remote code execution vulnerability in … | 2026-02-17T03:30:15Z | 2026-02-17T03:30:15Z |
| ghsa-76p7-773f-r4q5 |
5.4 (3.1)
|
Cross-site Scripting (XSS) in serialize-javascript | 2025-02-10T18:30:47Z | 2026-02-17T03:30:15Z |
| ghsa-rqh7-4vgv-648p |
8.8 (3.1)
|
The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters plugin for… | 2026-02-17T00:30:18Z | 2026-02-17T00:30:18Z |
| ghsa-76h8-9q54-37cc |
6.8 (3.1)
|
Protection mechanism failure in Windows BitLocker allows an unauthorized attacker to bypass a secur… | 2025-04-08T18:34:45Z | 2026-02-17T00:30:18Z |
| ghsa-8qf9-59wm-rx63 |
8.8 (3.1)
|
The WowRevenue plugin for WordPress is vulnerable to unauthorized plugin installation due to a miss… | 2026-02-16T21:30:14Z | 2026-02-16T21:30:14Z |
| ghsa-xxhc-j59w-qj54 |
6.1 (3.1)
5.1 (4.0)
|
Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains a reflected cross-site scripting vulnerabi… | 2026-02-16T18:31:29Z | 2026-02-16T18:31:29Z |
| ghsa-x32x-hhm5-vhhg |
6.1 (3.1)
5.1 (4.0)
|
Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains a reflected cross-site scripting vulnerabi… | 2026-02-16T18:31:29Z | 2026-02-16T18:31:29Z |
| ghsa-vxq8-hcg5-56j6 |
6.1 (3.1)
5.1 (4.0)
|
Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains a reflected cross-site scripting vulnerabi… | 2026-02-16T18:31:29Z | 2026-02-16T18:31:29Z |
| ghsa-rp4q-m72m-rqhg |
6.1 (3.1)
5.1 (4.0)
|
Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains a reflected cross-site scripting vulnerabi… | 2026-02-16T18:31:29Z | 2026-02-16T18:31:29Z |
| ghsa-qcc6-w9r3-h3c3 |
7.2 (3.1)
5.3 (4.0)
|
Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple stored cross-site scripting vulne… | 2026-02-16T18:31:29Z | 2026-02-16T18:31:29Z |
| ghsa-jxpj-x8cw-h5ph |
7.2 (3.1)
7.3 (4.0)
|
A security vulnerability has been detected in Wavlink WL-NU516U1 up to 130/260. This affects the fu… | 2026-02-16T18:31:29Z | 2026-02-16T18:31:29Z |
| ghsa-jw99-r2cw-rqwg |
6.1 (3.1)
5.1 (4.0)
|
Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains a reflected cross-site scripting vulnerabi… | 2026-02-16T18:31:29Z | 2026-02-16T18:31:29Z |
| ghsa-hqvf-34x3-wr3f |
6.1 (3.1)
5.1 (4.0)
|
Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple reflected cross-site scripting vu… | 2026-02-16T18:31:29Z | 2026-02-16T18:31:29Z |
| ghsa-hcvh-8pvq-9ppx |
6.1 (3.1)
5.1 (4.0)
|
Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple cross-site scripting vulnerabilit… | 2026-02-16T18:31:28Z | 2026-02-16T18:31:29Z |
| ghsa-gp3j-92m4-wfm7 |
6.1 (3.1)
5.1 (4.0)
|
Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains a reflected cross-site scripting vulnerabi… | 2026-02-16T18:31:29Z | 2026-02-16T18:31:29Z |
| ghsa-g4hv-3pw6-5x66 |
7.2 (3.1)
5.3 (4.0)
|
Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple stored cross-site scripting vulne… | 2026-02-16T18:31:29Z | 2026-02-16T18:31:29Z |
| ghsa-c6hp-2v43-w3w7 |
7.2 (3.1)
5.3 (4.0)
|
Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains stored and reflected cross-site scripting … | 2026-02-16T18:31:29Z | 2026-02-16T18:31:29Z |
| ghsa-8rwp-96c5-q3v5 |
6.1 (3.1)
5.1 (4.0)
|
Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple reflected cross-site scripting vu… | 2026-02-16T18:31:29Z | 2026-02-16T18:31:29Z |
| ghsa-844q-r72x-vfmv |
7.2 (3.1)
7.3 (4.0)
|
A vulnerability was detected in Wavlink WL-NU516U1 20251208. This vulnerability affects the functio… | 2026-02-16T18:31:29Z | 2026-02-16T18:31:29Z |
| ghsa-6mpf-wv74-p7rw |
6.1 (3.1)
5.1 (4.0)
|
Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple reflected cross-site scripting vu… | 2026-02-16T18:31:28Z | 2026-02-16T18:31:29Z |
| ghsa-6m5r-r9cx-gmq2 |
6.1 (3.1)
5.1 (4.0)
|
Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple reflected cross-site scripting vu… | 2026-02-16T18:31:29Z | 2026-02-16T18:31:29Z |
| ghsa-64x3-m8qv-57vg |
6.1 (3.1)
5.1 (4.0)
|
Smoothwall Express 3.1-SP4-polar-x86_64-update9 contains multiple reflected cross-site scripting vu… | 2026-02-16T18:31:29Z | 2026-02-16T18:31:29Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2022-43035 |
|
The d8s-urls package for Python, as distributed on PyPI, included a potential code-execut… | democritus-csv | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.835906Z |
| pysec-2022-43034 |
|
The d8s-yaml package for Python, as distributed on PyPI, included a potential code-execut… | d8s-yaml | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.718747Z |
| pysec-2022-43033 |
|
The d8s-xml package for Python, as distributed on PyPI, included a potential code-executi… | d8s-xml | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.587712Z |
| pysec-2022-43032 |
|
The d8s-utility package for Python, as distributed on PyPI, included a potential code-exe… | d8s-utility | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.473097Z |
| pysec-2022-43031 |
|
The d8s-utility package for Python, as distributed on PyPI, included a potential code-exe… | d8s-utility | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.395893Z |
| pysec-2022-43030 |
|
The d8s-urls package for Python, as distributed on PyPI, included a potential code-execut… | d8s-urls | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.291206Z |
| pysec-2022-43029 |
|
The d8s-pdfs package for Python, as distributed on PyPI, included a potential code-execut… | d8s-pdfs | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.177857Z |
| pysec-2022-43028 |
|
The d8s-networking package for Python, as distributed on PyPI, included a potential code-… | d8s-networking | 2022-10-11T22:15:00Z | 2023-06-05T01:12:49.075232Z |
| pysec-2022-43027 |
|
The d8s-lists package for Python, as distributed on PyPI, included a potential code-execu… | d8s-lists | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.913872Z |
| pysec-2022-43026 |
|
The d8s-json package for Python, as distributed on PyPI, included a potential code-execut… | d8s-json | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.769675Z |
| pysec-2022-43025 |
|
The d8s-html package for Python, as distributed on PyPI, included a potential code-execut… | d8s-html | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.578719Z |
| pysec-2022-43024 |
|
The d8s-file-system package for Python, as distributed on PyPI, included a potential code… | d8s-file-system | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.460219Z |
| pysec-2022-43023 |
|
The d8s-domains package for Python, as distributed on PyPI, included a potential code-exe… | d8s-domains | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.349619Z |
| pysec-2022-43022 |
|
The d8s-asns package for Python, as distributed on PyPI, included a potential code-execut… | d8s-asns | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.247277Z |
| pysec-2022-43021 |
|
The d8s-asns package for Python, as distributed on PyPI, included a potential code-execut… | d8s-asns | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.172299Z |
| pysec-2022-43020 |
|
The d8s-archives package for Python, as distributed on PyPI, included a potential code-ex… | d8s-archives | 2022-10-11T22:15:00Z | 2023-06-05T01:12:48.057391Z |
| pysec-2022-43019 |
|
The d8s-algorithms package for Python, as distributed on PyPI, included a potential code-… | d8s-algorithms | 2022-10-11T22:15:00Z | 2023-06-05T01:12:47.946780Z |
| pysec-2023-60 |
|
Task instance details page in the UI is vulnerable to a stored XSS.This issue affects Apa… | apache-airflow | 2023-05-08T10:15:00Z | 2023-06-05T01:12:45.763850Z |
| pysec-2023-59 |
|
Privilege Context Switching Error vulnerability in Apache Software Foundation Apache Airf… | apache-airflow | 2023-05-08T12:15:00Z | 2023-06-05T01:12:45.655810Z |
| pysec-2021-427 |
|
A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in Mpmath v1.… | mpmath | 2021-06-21T20:15:00Z | 2023-05-31T06:15:00Z |
| pysec-2022-42980 |
|
Pillow before 9.3.0 allows denial of service via SAMPLESPERPIXEL. | pillow | 2022-11-14T07:15:00Z | 2023-05-25T05:07:00Z |
| pysec-2022-234 |
|
Poetry v1.1.9 and below was discovered to contain an untrusted search path which causes t… | poetry | 2022-03-21T22:15:00Z | 2023-05-25T05:07:00Z |
| pysec-2022-233 |
|
openssh_key_parser is an open source Python package providing utilities to parse and pack… | openssh-key-parser | 2022-07-06T18:15:00Z | 2023-05-25T05:07:00Z |
| pysec-2022-230 |
|
NULL Pointer Dereference allows attackers to cause a denial of service (or application cr… | lxml | 2022-07-05T10:15:00Z | 2023-05-25T05:07:00Z |
| pysec-2022-229 |
|
`gradio` is an open source framework for building interactive machine learning models and… | gradio | 2022-03-17T21:15:00Z | 2023-05-25T05:07:00Z |
| pysec-2022-228 |
|
An Access Control vunerabiity exists in Gerapy v 0.9.7 via the spider parameter in projec… | gerapy | 2022-03-10T21:15:00Z | 2023-05-25T05:07:00Z |
| pysec-2022-227 |
|
Bottle before 0.12.20 mishandles errors during early request binding. | bottle | 2022-06-02T14:15:00Z | 2023-05-25T05:07:00Z |
| pysec-2021-874 |
|
pytorch-lightning is vulnerable to Deserialization of Untrusted Data | pytorch-lightning | 2021-12-23T18:15:00Z | 2023-05-25T05:07:00Z |
| pysec-2021-873 |
|
Gradio is an open source framework for building interactive machine learning models and d… | gradio | 2021-12-15T20:15:00Z | 2023-05-25T05:07:00Z |
| pysec-2021-872 |
|
An issue was discovered in the Dask distributed package before 2021.10.0 for Python. Sing… | distributed | 2021-10-26T11:15:00Z | 2023-05-25T05:07:00Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33163 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.691394Z |
| gsd-2024-33162 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.736744Z |
| gsd-2024-33161 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.747995Z |
| gsd-2024-33160 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.698437Z |
| gsd-2024-33159 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.732504Z |
| gsd-2024-33158 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.688050Z |
| gsd-2024-33157 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.746799Z |
| gsd-2024-33156 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.718799Z |
| gsd-2024-33155 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.707542Z |
| gsd-2024-33154 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.704633Z |
| gsd-2024-33153 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.662915Z |
| gsd-2024-33152 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.669552Z |
| gsd-2024-33151 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.706908Z |
| gsd-2024-33150 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.617332Z |
| gsd-2024-33149 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.633232Z |
| gsd-2024-33148 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.705420Z |
| gsd-2024-33147 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.758533Z |
| gsd-2024-33146 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.703789Z |
| gsd-2024-33145 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.603403Z |
| gsd-2024-33144 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.671183Z |
| gsd-2024-33143 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.755388Z |
| gsd-2024-33142 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.695922Z |
| gsd-2024-33141 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.694744Z |
| gsd-2024-33140 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.690890Z |
| gsd-2024-33139 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.720304Z |
| gsd-2024-33138 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.712826Z |
| gsd-2024-33137 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.732911Z |
| gsd-2024-33136 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.757468Z |
| gsd-2024-33135 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.734589Z |
| gsd-2024-33134 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.754805Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2026-595 | Malicious code in morty-package (PyPI) | 2026-01-28T19:48:56Z | 2026-01-28T19:48:56Z |
| mal-2026-562 | Malicious code in tabullates (PyPI) | 2026-01-28T07:42:32Z | 2026-01-28T19:13:29Z |
| mal-2026-548 | Malicious code in tabletas (PyPI) | 2026-01-27T18:26:01Z | 2026-01-28T19:13:29Z |
| mal-2026-492 | Malicious code in tableates (PyPI) | 2026-01-23T13:57:05Z | 2026-01-28T19:13:29Z |
| mal-2026-490 | Malicious code in tabletes (PyPI) | 2026-01-23T10:19:25Z | 2026-01-28T19:13:29Z |
| mal-2026-441 | Malicious code in spellcheckpy (PyPI) | 2026-01-21T08:10:26Z | 2026-01-28T19:13:29Z |
| mal-2026-375 | Malicious code in spellcheckerpy (PyPI) | 2026-01-20T19:06:25Z | 2026-01-28T19:13:29Z |
| mal-2025-191535 | Malicious code in tableate (PyPI) | 2025-11-25T11:06:37Z | 2026-01-28T19:13:29Z |
| mal-2025-191534 | Malicious code in tablates (PyPI) | 2025-11-26T10:20:42Z | 2026-01-28T19:13:29Z |
| mal-2025-191533 | Malicious code in spellcheckers (PyPI) | 2025-11-15T18:49:10Z | 2026-01-28T19:13:29Z |
| MAL-2026-562 | Malicious code in tabullates (PyPI) | 2026-01-28T07:42:32Z | 2026-01-28T19:13:29Z |
| MAL-2026-548 | Malicious code in tabletas (PyPI) | 2026-01-27T18:26:01Z | 2026-01-28T19:13:29Z |
| MAL-2026-492 | Malicious code in tableates (PyPI) | 2026-01-23T13:57:05Z | 2026-01-28T19:13:29Z |
| MAL-2026-490 | Malicious code in tabletes (PyPI) | 2026-01-23T10:19:25Z | 2026-01-28T19:13:29Z |
| MAL-2026-441 | Malicious code in spellcheckpy (PyPI) | 2026-01-21T08:10:26Z | 2026-01-28T19:13:29Z |
| MAL-2026-375 | Malicious code in spellcheckerpy (PyPI) | 2026-01-20T19:06:25Z | 2026-01-28T19:13:29Z |
| MAL-2025-191535 | Malicious code in tableate (PyPI) | 2025-11-25T11:06:37Z | 2026-01-28T19:13:29Z |
| MAL-2025-191534 | Malicious code in tablates (PyPI) | 2025-11-26T10:20:42Z | 2026-01-28T19:13:29Z |
| MAL-2025-191533 | Malicious code in spellcheckers (PyPI) | 2025-11-15T18:49:10Z | 2026-01-28T19:13:29Z |
| mal-2026-593 | Malicious code in pypi-package-explore (PyPI) | 2026-01-28T17:56:33Z | 2026-01-28T17:56:33Z |
| MAL-2026-593 | Malicious code in pypi-package-explore (PyPI) | 2026-01-28T17:56:33Z | 2026-01-28T17:56:33Z |
| mal-2026-590 | Malicious code in pytorch-mutex (PyPI) | 2026-01-28T16:28:32Z | 2026-01-28T17:47:09Z |
| MAL-2026-590 | Malicious code in pytorch-mutex (PyPI) | 2026-01-28T16:28:32Z | 2026-01-28T17:47:09Z |
| mal-2026-493 | Malicious code in oxnoxon (npm) | 2026-01-23T17:23:01Z | 2026-01-28T17:27:46Z |
| MAL-2026-493 | Malicious code in oxnoxon (npm) | 2026-01-23T17:23:01Z | 2026-01-28T17:27:46Z |
| mal-2026-495 | Malicious code in h-jsencrypt (npm) | 2026-01-23T18:12:42Z | 2026-01-28T17:27:44Z |
| MAL-2026-495 | Malicious code in h-jsencrypt (npm) | 2026-01-23T18:12:42Z | 2026-01-28T17:27:44Z |
| mal-2026-494 | Malicious code in eits (npm) | 2026-01-23T18:12:42Z | 2026-01-28T17:27:43Z |
| MAL-2026-494 | Malicious code in eits (npm) | 2026-01-23T18:12:42Z | 2026-01-28T17:27:43Z |
| mal-2026-484 | Malicious code in translation-note (npm) | 2026-01-23T01:13:12Z | 2026-01-28T08:26:42Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1774 | Ivanti Connect Secure und Policy Secure: Mehrere Schwachstelle | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1773 | Microsoft Teams Geräte: Schwachstelle ermöglicht Codeausführung | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1772 | Siemens SICAM: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1771 | Mehrere Siemens-Produkte: Schwachstelle ermöglicht Codeausführung | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1770 | AMD Prozessoren: Mehrere Schwachstellen | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1769 | Siemens SIMATIC S7: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1768 | Siemens SIPROTEC: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1767 | AMD Radeon Graphics Products: Mehrere Schwachstellen | 2025-08-12T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1766 | Liferay Portal und DXP: Schwachstelle ermöglicht Denial of Service | 2025-08-11T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1764 | Bouncy Castle: Schwachstelle ermöglicht Denial of Service | 2025-08-11T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1667 | Google Chrome / Microsoft Edge: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-07-29T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1622 | Google Chrome / Microsoft Edge: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-07-22T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1298 | AMD Prozessoren: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-06-10T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1278 | AMD Prozessoren: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen | 2025-06-10T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1277 | Microsoft Windows: Mehrere Schwachstellen | 2025-06-10T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1215 | OWASP ModSecurity: Schwachstelle ermöglicht Denial of Service | 2025-06-02T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1076 | Wibu-Systems CodeMeter: Schwachstelle ermöglicht Privilegieneskalation | 2025-05-15T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-0573 | TianoCore EDK2: Schwachstelle ermöglicht Denial of Service und Infogewinn | 2025-03-16T23:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-0542 | Webkit/Apple : Schwachstelle ermöglicht Umgehung von Sicherheitsmechanismen | 2025-03-11T23:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-0105 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-01-15T23:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-0016 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-01-06T23:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2024-1721 | Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2024-07-28T22:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2023-3182 | OpenSSH: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2023-12-19T23:00:00.000+00:00 | 2025-08-12T22:00:00.000+00:00 |
| wid-sec-w-2025-1749 | win.rar WinRAR: Schwachstelle ermöglicht Codeausführung | 2025-08-10T22:00:00.000+00:00 | 2025-08-10T22:00:00.000+00:00 |
| wid-sec-w-2025-1731 | Eaton Power Distribution Unit: Mehrere Schwachstellen ermöglichen Manipulation von Dateien | 2025-08-05T22:00:00.000+00:00 | 2025-08-06T22:00:00.000+00:00 |
| wid-sec-w-2025-1725 | IBM Tivoli Monitoring: Mehrere Schwachstellen | 2025-08-05T22:00:00.000+00:00 | 2025-08-06T22:00:00.000+00:00 |
| wid-sec-w-2025-1466 | Red Hat Enterprise Linux (socat): Schwachstelle ermöglicht Manipulation von Dateien | 2025-07-06T22:00:00.000+00:00 | 2025-08-06T22:00:00.000+00:00 |
| wid-sec-w-2025-1450 | poppler: Schwachstelle ermöglicht Denial of Service | 2025-07-02T22:00:00.000+00:00 | 2025-08-06T22:00:00.000+00:00 |
| wid-sec-w-2025-1398 | IBM WebSphere Application Server: Schwachstelle ermöglicht Codeausführung | 2025-06-25T22:00:00.000+00:00 | 2025-08-06T22:00:00.000+00:00 |
| wid-sec-w-2025-1266 | libarchive: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-06-09T22:00:00.000+00:00 | 2025-08-06T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2025:1985 | Red Hat Security Advisory: Logging for Red Hat OpenShift - 5.9.12 | 2025-03-05T13:15:01+00:00 | 2026-02-19T14:50:12+00:00 |
| rhsa-2025:14090 | Red Hat Security Advisory: Red Hat Developer Hub 1.7.0 release. | 2025-08-19T11:33:06+00:00 | 2026-02-19T14:49:57+00:00 |
| rhsa-2024:1267 | Red Hat Security Advisory: OpenShift Container Platform 4.12.53 packages and security update | 2024-03-20T01:54:44+00:00 | 2026-02-19T14:49:39+00:00 |
| rhsa-2023:3923 | Red Hat Security Advisory: go-toolset and golang security update | 2023-06-29T09:49:22+00:00 | 2026-02-19T14:49:32+00:00 |
| rhsa-2023:3922 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2023-06-29T09:14:53+00:00 | 2026-02-19T14:49:32+00:00 |
| rhsa-2023:3920 | Red Hat Security Advisory: go-toolset-1.19 and go-toolset-1.19-golang security update | 2023-06-29T05:33:42+00:00 | 2026-02-19T14:49:29+00:00 |
| rhsa-2026:2060 | Red Hat Security Advisory: python-s3transfer security update | 2026-02-05T09:42:45+00:00 | 2026-02-19T14:37:34+00:00 |
| rhsa-2026:1795 | Red Hat Security Advisory: resource-agents security update | 2026-02-03T07:28:32+00:00 | 2026-02-19T14:37:32+00:00 |
| rhsa-2026:1600 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Container Release Update | 2026-01-29T19:41:57+00:00 | 2026-02-19T14:37:22+00:00 |
| rhsa-2025:19429 | Red Hat Security Advisory: Red Hat Enterprise Linux AI 1.5 (NVIDIA) | 2025-11-03T07:34:38+00:00 | 2026-02-19T14:37:02+00:00 |
| rhsa-2025:19427 | Red Hat Security Advisory: Red Hat Enterprise Linux AI 1.5 (AMD) | 2025-11-03T07:33:53+00:00 | 2026-02-19T14:37:00+00:00 |
| rhsa-2025:19430 | Red Hat Security Advisory: Red Hat Enterprise Linux AI 1.5 (NVIDIA) | 2025-11-03T07:35:00+00:00 | 2026-02-19T14:36:58+00:00 |
| rhsa-2025:19428 | Red Hat Security Advisory: Red Hat Enterprise Linux AI 1.5 (NVIDIA) | 2025-11-03T07:34:08+00:00 | 2026-02-19T14:36:57+00:00 |
| rhsa-2025:19426 | Red Hat Security Advisory: Red Hat Enterprise Linux AI 1.5 (NVIDIA) | 2025-11-03T07:33:45+00:00 | 2026-02-19T14:36:56+00:00 |
| rhsa-2025:19425 | Red Hat Security Advisory: Red Hat Enterprise Linux AI 1.5 (AMD) | 2025-11-03T07:33:42+00:00 | 2026-02-19T14:36:56+00:00 |
| rhsa-2025:19424 | Red Hat Security Advisory: Red Hat Enterprise Linux AI 1.5 (AMD) | 2025-11-03T07:33:10+00:00 | 2026-02-19T14:36:56+00:00 |
| rhsa-2025:19423 | Red Hat Security Advisory: Red Hat Enterprise Linux AI 1.5 (NVIDIA) | 2025-11-03T07:32:31+00:00 | 2026-02-19T14:36:56+00:00 |
| rhsa-2025:19422 | Red Hat Security Advisory: Red Hat Enterprise Linux AI 1.5 (Intel Gaudi) | 2025-11-03T07:30:56+00:00 | 2026-02-19T14:36:55+00:00 |
| rhsa-2025:19421 | Red Hat Security Advisory: Red Hat Enterprise Linux AI 1.5 (Intel Gaudi) | 2025-11-03T07:30:00+00:00 | 2026-02-19T14:36:55+00:00 |
| rhsa-2025:16524 | Red Hat Security Advisory: A Subscription Management tool for finding and reporting Red Hat product usage | 2025-09-23T19:28:34+00:00 | 2026-02-19T14:36:54+00:00 |
| rhsa-2025:16262 | Red Hat Security Advisory: python3 security update | 2025-09-22T01:17:47+00:00 | 2026-02-19T14:36:53+00:00 |
| rhsa-2025:16153 | Red Hat Security Advisory: python3 security update | 2025-09-18T07:56:44+00:00 | 2026-02-19T14:36:53+00:00 |
| rhsa-2025:16152 | Red Hat Security Advisory: python3.9 security update | 2025-09-18T07:56:08+00:00 | 2026-02-19T14:36:52+00:00 |
| rhsa-2025:16117 | Red Hat Security Advisory: python3 security update | 2025-09-17T17:59:11+00:00 | 2026-02-19T14:36:52+00:00 |
| rhsa-2025:16151 | Red Hat Security Advisory: python3 security update | 2025-09-18T07:55:09+00:00 | 2026-02-19T14:36:51+00:00 |
| rhsa-2025:16118 | Red Hat Security Advisory: python39:3.9 security update | 2025-09-17T17:59:12+00:00 | 2026-02-19T14:36:51+00:00 |
| rhsa-2025:16078 | Red Hat Security Advisory: python39:3.9 security update | 2025-09-17T14:45:21+00:00 | 2026-02-19T14:36:50+00:00 |
| rhsa-2025:16062 | Red Hat Security Advisory: python39:3.9 security update | 2025-09-17T14:27:11+00:00 | 2026-02-19T14:36:49+00:00 |
| rhsa-2025:16031 | Red Hat Security Advisory: python3.11 security update | 2025-09-17T05:27:10+00:00 | 2026-02-19T14:36:49+00:00 |
| rhsa-2025:16016 | Red Hat Security Advisory: python3.11 security update | 2025-09-16T19:30:24+00:00 | 2026-02-19T14:36:49+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-15-064-03 | Siemens SPC Controller Series Denial-of-Service Vulnerability | 2015-12-06T07:00:00.000000Z | 2025-06-05T22:05:58.585431Z |
| icsma-16-279-01 | Animas OneTouch Ping Insulin Pump Vulnerabilities | 2016-07-09T06:00:00.000000Z | 2025-06-05T22:05:39.885072Z |
| icsa-16-357-02 | WAGO Ethernet Web-based Management Authentication Bypass Vulnerability | 2016-09-25T06:00:00.000000Z | 2025-06-05T22:05:33.606250Z |
| icsa-16-357-01 | Fidelix FX-20 Series Controllers Path Traversal Vulnerability | 2016-09-25T06:00:00.000000Z | 2025-06-05T22:05:19.325133Z |
| icsa-16-355-01 | Siemens Desigo PX Web Module Insufficient Entropy Vulnerability | 2016-09-23T06:00:00.000000Z | 2025-06-05T22:05:04.729768Z |
| icsa-16-350-02 | OmniMetrix OmniView Vulnerabilities | 2016-09-18T06:00:00.000000Z | 2025-06-05T22:04:46.712389Z |
| icsa-16-350-01 | FATEK Automation PLC WinProladder Stack-Based Buffer Overflow Vulnerability | 2016-09-18T06:00:00.000000Z | 2025-06-05T22:04:36.703364Z |
| icsa-16-348-04 | Siemens SIMATIC WinCC and SIMATIC PCS 7 ActiveX Vulnerability | 2016-09-16T06:00:00.000000Z | 2025-06-05T22:04:30.476125Z |
| icsa-16-348-03 | Delta Electronics WPLSoft, ISPSoft, and PMSoft Vulnerabilities | 2016-09-16T06:00:00.000000Z | 2025-06-05T22:04:14.714722Z |
| icsa-16-348-02 | Moxa DACenter Vulnerabilities | 2016-09-16T06:00:00.000000Z | 2025-06-05T22:04:01.652622Z |
| icsa-16-348-01 | Visonic PowerLink2 Vulnerabilities | 2016-09-16T06:00:00.000000Z | 2025-06-05T22:03:49.178165Z |
| icsa-16-343-03 | Adcon Telemetry A850 Telemetry Gateway Base Station Vulnerabilities | 2016-09-11T06:00:00.000000Z | 2025-06-05T22:03:42.940815Z |
| icsa-16-343-02 | Sauter NovaWeb Web HMI Authentication Bypass Vulnerability | 2016-09-11T06:00:00.000000Z | 2025-06-05T22:03:36.733125Z |
| icsa-16-341-01 | Tesla Gateway ECU Vulnerability | 2016-09-09T06:00:00.000000Z | 2025-06-05T22:03:30.461381Z |
| icsa-16-336-03 | Mitsubishi Electric MELSEC-Q Series Ethernet Interface Module Vulnerabilities | 2016-09-04T06:00:00.000000Z | 2025-06-05T22:03:18.001347Z |
| icsa-16-334-03 | Emerson DeltaV Wireless I/O Card Open SSH Port Vulnerability | 2016-09-02T06:00:00.000000Z | 2025-06-05T22:03:11.738502Z |
| icsa-16-334-01 | Emerson Liebert SiteScan XML External Entity Vulnerability | 2016-09-02T06:00:00.000000Z | 2025-06-05T22:03:05.507055Z |
| icsa-16-322-02 | Moxa SoftCMS Vulnerabilities | 2016-08-21T06:00:00.000000Z | 2025-06-05T22:02:46.777740Z |
| icsa-16-322-01 | Vanderbilt Industries Siemens IP CCTV Cameras Vulnerability | 2016-08-21T06:00:00.000000Z | 2025-06-05T22:02:40.536934Z |
| icsa-16-320-01 | Lynxspring JENEsys BAS Bridge Vulnerabilities | 2016-08-19T06:00:00.000000Z | 2025-06-05T22:02:15.149456Z |
| icsa-16-315-01b | CA Unified Infrastructure Management Directory Traversal Vulnerability (Update B) | 2016-08-14T06:00:00.000000Z | 2025-06-05T22:02:08.926022Z |
| icsa-16-313-03 | OSIsoft PI System Incomplete Model of Endpoint Features Vulnerability | 2016-08-12T06:00:00.000000Z | 2025-06-05T22:02:02.695028Z |
| icsa-16-313-01 | Phoenix Contact ILC PLC Authentication Vulnerabilities | 2016-08-12T06:00:00.000000Z | 2025-06-05T22:01:49.839605Z |
| icsa-16-308-02b | Schneider Electric Magelis HMI Resource Consumption Vulnerabilities (Update B) | 2016-08-07T06:00:00.000000Z | 2025-06-05T22:01:37.316376Z |
| icsa-16-308-01 | Moxa OnCell Security Vulnerabilities | 2016-08-07T06:00:00.000000Z | 2025-06-05T22:01:24.817023Z |
| icsa-16-306-03 | Schneider Electric Unity PRO Control Flow Management Vulnerability | 2016-08-05T06:00:00.000000Z | 2025-06-05T22:01:18.546151Z |
| icsa-16-306-01 | Schneider Electric ConneXium Buffer Overflow Vulnerability | 2016-08-05T06:00:00.000000Z | 2025-06-05T22:01:05.732440Z |
| icsa-16-301-01 | Honeywell Experion PKS Improper Input Validation Vulnerability | 2016-07-31T06:00:00.000000Z | 2025-06-05T22:00:59.524749Z |
| icsa-16-299-01 | Siemens SICAM RTU Devices Denial-of-Service Vulnerability | 2016-07-29T06:00:00.000000Z | 2025-06-05T22:00:53.302460Z |
| icsa-16-294-01 | Moxa EDR-810 Industrial Secure Router Privilege Escalation Vulnerability | 2016-07-24T06:00:00.000000Z | 2025-06-05T22:00:47.061524Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-wifi-ffeb-22epcEWu | Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues Affecting Multiple Cisco Products | 2023-03-27T05:00:00+00:00 | 2023-03-27T05:00:00+00:00 |
| cisco-sa-iosxe-priv-esc-sabd8hcu | Cisco IOS XE Software Privilege Escalation Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-24T19:59:49+00:00 |
| cisco-sa-iosxe-priv-esc-sABD8hcU | Cisco IOS XE Software Privilege Escalation Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-24T19:59:49+00:00 |
| cisco-sa-ucsm-bkpsky-h8fcqgsa | Cisco FXOS Software and UCS Manager Software Configuration Backup Static Key Vulnerability | 2023-02-22T16:00:00+00:00 | 2023-03-24T18:16:56+00:00 |
| cisco-sa-ucsm-bkpsky-H8FCQgsA | Cisco FXOS Software and UCS Manager Software Configuration Backup Static Key Vulnerability | 2023-02-22T16:00:00+00:00 | 2023-03-24T18:16:56+00:00 |
| cisco-sa-ipv4-vfr-dos-cxxtfacb | Cisco IOS XE Software Virtual Fragmentation Reassembly Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-23T21:42:01+00:00 |
| cisco-sa-ipv4-vfr-dos-CXxtFacb | Cisco IOS XE Software Virtual Fragmentation Reassembly Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-23T21:42:01+00:00 |
| cisco-sa-webui-pthtrv-es7gsb9v | Cisco IOS XE Software Web UI Path Traversal Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-webui-pthtrv-es7GSb9V | Cisco IOS XE Software Web UI Path Traversal Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-ios-xe-sdwan-vqahejyw | Cisco IOS XE SD-WAN Software Command Injection Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-ios-xe-sdwan-VQAhEjYw | Cisco IOS XE SD-WAN Software Command Injection Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-ios-gre-crash-p6ne5sq5 | Cisco IOS XE Software Fragmented Tunnel Protocol Packet Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-ios-gre-crash-p6nE5Sq5 | Cisco IOS XE Software Fragmented Tunnel Protocol Packet Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-ios-dhcpv6-dos-44cmvddk | Cisco IOS and IOS XE Software IPv6 DHCP (DHCPv6) Relay and Server Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-ios-dhcpv6-dos-44cMvdDK | Cisco IOS and IOS XE Software IPv6 DHCP (DHCPv6) Relay and Server Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-ewlc-dos-wfujbhkw | Cisco IOS XE Software for Wireless LAN Controllers HTTP Client Profiling Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-ewlc-dos-wFujBHKw | Cisco IOS XE Software for Wireless LAN Controllers HTTP Client Profiling Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-dnac-privesc-qfxe74rs | Cisco DNA Center Privilege Escalation Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-dnac-privesc-QFXe74RS | Cisco DNA Center Privilege Escalation Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-dnac-infodisc-pe7zabdr | Cisco DNA Center Information Disclosure Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-dnac-infodisc-pe7zAbdR | Cisco DNA Center Information Disclosure Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-c9800-apjoin-dos-nxrhkt5 | Cisco IOS XE Software for Wireless LAN Controllers CAPWAP Join Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-c9800-apjoin-dos-nXRHkt5 | Cisco IOS XE Software for Wireless LAN Controllers CAPWAP Join Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-asaftdios-dhcpv6-cli-zf3ztv | Cisco Adaptive Security Appliance Software, Firepower Threat Defense Software, IOS Software, and IOS XE Software IPv6 DHCP (DHCPv6) Client Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-asaftdios-dhcpv6-cli-Zf3zTv | Cisco Adaptive Security Appliance Software, Firepower Threat Defense Software, IOS Software, and IOS XE Software IPv6 DHCP (DHCPv6) Client Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-asa5500x-entropy-6v9bhvyp | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Low-Entropy Keys Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-asa5500x-entropy-6v9bHVYP | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Low-Entropy Keys Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-ap-cli-dos-tc2ekepu | Cisco Access Point Software Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-ap-cli-dos-tc2EKEpu | Cisco Access Point Software Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| cisco-sa-ap-assoc-dos-d2sunwk2 | Cisco Access Point Software Association Request Denial of Service Vulnerability | 2023-03-22T16:00:00+00:00 | 2023-03-22T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2024-47692 | nfsd: return -EINVAL when namelen is 0 | 2024-10-01T07:00:00.000Z | 2026-02-18T02:07:26.000Z |
| msrc_cve-2025-38704 | rcu/nocb: Fix possible invalid rdp's->nocb_cb_kthread pointer access | 2025-09-02T00:00:00.000Z | 2026-02-18T02:07:25.000Z |
| msrc_cve-2021-32923 | HashiCorp Vault and Vault Enterprise allowed the renewal of nearly-expired token leases and dynamic secret leases (specifically those within 1 second of their maximum TTL) which caused them to be incorrectly treated as non-expiring during subsequent use. Fixed in 1.5.9 1.6.5 and 1.7.2. | 2021-06-02T00:00:00.000Z | 2026-02-18T02:07:25.000Z |
| msrc_cve-2025-38167 | fs/ntfs3: handle hdr_first_de() return value | 2025-07-02T00:00:00.000Z | 2026-02-18T02:07:18.000Z |
| msrc_cve-2024-49975 | uprobes: fix kernel info leak via "[uprobes]" vma | 2024-10-01T07:00:00.000Z | 2026-02-18T02:07:07.000Z |
| msrc_cve-2024-56551 | drm/amdgpu: fix usage slab after free | 2024-12-02T00:00:00.000Z | 2026-02-18T02:07:02.000Z |
| msrc_cve-2025-6199 | Gdk-pixbuf: uninitialized memory disclosure in gdkpixbuf gif lzw decoder | 2025-06-02T00:00:00.000Z | 2026-02-18T02:06:59.000Z |
| msrc_cve-2019-11835 | cJSON before 1.7.11 allows out-of-bounds access related to multiline comments. | 2019-05-02T00:00:00.000Z | 2026-02-18T02:06:52.000Z |
| msrc_cve-2024-53227 | scsi: bfa: Fix use-after-free in bfad_im_module_exit() | 2024-12-02T00:00:00.000Z | 2026-02-18T02:06:45.000Z |
| msrc_cve-2024-40965 | i2c: lpi2c: Avoid calling clk_get_rate during transfer | 2024-07-01T07:00:00.000Z | 2026-02-18T02:06:45.000Z |
| msrc_cve-2024-49569 | nvme-rdma: unquiesce admin_q before destroy it | 2025-01-02T00:00:00.000Z | 2026-02-18T02:06:43.000Z |
| msrc_cve-2025-7519 | Polkit: xml policy file with a large number of nested elements may lead to out-of-bounds write | 2025-07-02T00:00:00.000Z | 2026-02-18T02:06:32.000Z |
| msrc_cve-2023-49993 | Espeak-ng 1.52-dev was discovered to contain a Buffer Overflow | 2023-12-01T08:00:00.000Z | 2026-02-18T02:06:30.000Z |
| msrc_cve-2025-61725 | Excessive CPU consumption in ParseAddress in net/mail | 2025-10-02T00:00:00.000Z | 2026-02-18T02:06:29.000Z |
| msrc_cve-2023-41913 | strongSwan before 5.9.12 has a buffer overflow and possible unauthenticated remote code execution via a DH public value that exceeds the internal buffer in charon-tkm's DH proxy. The earliest affected version is 5.3.0. An attack can occur via a crafted IKE_SA_INIT message. | 2023-12-01T08:00:00.000Z | 2026-02-18T02:06:21.000Z |
| msrc_cve-2025-21945 | ksmbd: fix use-after-free in smb2_lock | 2025-04-02T00:00:00.000Z | 2026-02-18T02:06:18.000Z |
| msrc_cve-2024-36969 | drm/amd/display: Fix division by zero in setup_dsc_config | 2024-06-02T07:00:00.000Z | 2026-02-18T02:05:59.000Z |
| msrc_cve-2024-26987 | mm/memory-failure: fix deadlock when hugetlb_optimize_vmemmap is enabled | 2024-05-02T07:00:00.000Z | 2026-02-18T02:05:57.000Z |
| msrc_cve-2024-47701 | ext4: avoid OOB when system.data xattr changes underneath the filesystem | 2024-10-01T07:00:00.000Z | 2026-02-18T02:05:56.000Z |
| msrc_cve-2024-34459 | An issue was discovered in xmllint (from libxml2) before 2.11.8 and 2.12.x before 2.12.7. Formatting error messages with xmllint --htmlout can result in a buffer over-read in xmlHTMLPrintFileContext in xmllint.c. | 2024-05-02T07:00:00.000Z | 2026-02-18T02:05:53.000Z |
| msrc_cve-2023-50711 | `serde` deserialization for `FamStructWrapper` lacks bound checks that could potentially lead to out-of-bounds memory access | 2024-01-01T08:00:00.000Z | 2026-02-18T02:05:39.000Z |
| msrc_cve-2025-38127 | ice: fix Tx scheduler error handling in XDP callback | 2025-07-02T00:00:00.000Z | 2026-02-18T02:05:27.000Z |
| msrc_cve-2023-49992 | Espeak-ng 1.52-dev was discovered to contain a Stack Buffer Overflow via the function RemoveEnding at dictionary.c. | 2023-12-01T08:00:00.000Z | 2026-02-18T02:05:24.000Z |
| msrc_cve-2025-68337 | jbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted | 2025-12-02T00:00:00.000Z | 2026-02-18T02:05:22.000Z |
| msrc_cve-2024-11235 | Reference counting in php_request_shutdown causes Use-After-Free | 2025-04-02T00:00:00.000Z | 2026-02-18T02:05:19.000Z |
| msrc_cve-2025-38717 | net: kcm: Fix race condition in kcm_unattach() | 2025-09-02T00:00:00.000Z | 2026-02-18T02:05:16.000Z |
| msrc_cve-2024-56786 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | 2025-01-02T00:00:00.000Z | 2026-02-18T02:05:09.000Z |
| msrc_cve-2025-7207 | mruby nregs codegen.c scope_new heap-based overflow | 2025-07-02T00:00:00.000Z | 2026-02-18T02:05:04.000Z |
| msrc_cve-2024-30204 | In Emacs before 29.3, LaTeX preview is enabled by default for e-mail attachments. | 2024-03-02T08:00:00.000Z | 2026-02-18T02:05:03.000Z |
| msrc_cve-2025-4748 | Absolute path traversal in zip:unzip/1,2 | 2025-06-02T00:00:00.000Z | 2026-02-18T02:04:59.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15294-1 | keylime-ima-policy-0.2.7+70-2.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15293-1 | redis-8.0.2-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15292-1 | radare2-5.9.8-3.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15291-1 | erlang-rabbitmq-client-3.13.7-4.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15290-1 | python39-3.9.23-3.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15289-1 | python314-3.14.0~b3-3.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15288-1 | python313-3.13.5-2.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15287-1 | python312-3.12.11-2.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15286-1 | python311-3.11.13-2.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15285-1 | python310-3.10.18-3.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15284-1 | python311-urllib3_1-1.26.20-3.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15283-1 | python311-urllib3-2.5.0-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15282-1 | python311-rfc3161-client-1.0.3-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15281-1 | python311-requests-2.32.4-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15280-1 | python311-pytest-html-4.1.1-6.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15279-1 | python311-pydata-sphinx-theme-0.16.1-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15278-1 | jupyter-plotly-6.1.2-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15277-1 | jupyter-panel-1.7.1-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15276-1 | jupyter-nbdime-7.0.2-20.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15275-1 | jupyter-nbclassic-1.3.1-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15274-1 | jupyter-jupyterlab-templates-0.5.2-2.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15273-1 | python311-jupyter-ydoc-3.1.0-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15272-1 | python311-jupyter-core-5.8.1-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15271-1 | jupyter-matplotlib-0.11.4-15.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15270-1 | python-furo-doc-2024.8.6-3.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15269-1 | jupyter-bqplot-jupyterlab-0.5.44-10.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15268-1 | python311-Django4-4.2.22-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15267-1 | python311-Django-5.2.2-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15266-1 | pure-ftpd-1.0.51-5.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15265-1 | libprotobuf-lite31_1_0-31.1-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2023-1014 | Security exception in org.jsoup.parser.HtmlTreeBuilder.process | 2023-10-14T13:02:26.762298Z | 2023-10-14T13:02:26.762736Z |
| osv-2023-1012 | Global-buffer-overflow in iusace_quantize_lines | 2023-10-14T13:01:02.229783Z | 2023-10-14T13:01:02.230173Z |
| osv-2023-1009 | Security exception in net.jsign.bouncycastle.asn1.ASN1StreamParser.readVector | 2023-10-13T13:00:25.417249Z | 2023-10-13T13:00:25.417557Z |
| osv-2023-1008 | Heap-use-after-free in gx_image_enum_begin | 2023-10-12T13:03:53.274905Z | 2023-10-12T13:03:53.275223Z |
| osv-2023-1004 | Heap-buffer-overflow in ndpi_snprintf | 2023-10-12T13:00:14.575456Z | 2023-10-12T13:00:14.575776Z |
| osv-2023-1002 | Heap-buffer-overflow in iasecc_parse_get_tlv | 2023-10-11T13:02:47.831617Z | 2023-10-11T13:02:47.831905Z |
| osv-2023-1000 | Heap-use-after-free in xmlParserPrintFileContextInternal | 2023-10-11T13:01:01.023722Z | 2023-10-11T13:01:01.024042Z |
| osv-2023-970 | Heap-use-after-free in gx_device_forward_finalize | 2023-10-06T13:02:56.047818Z | 2023-10-10T15:17:30.632991Z |
| osv-2023-999 | Heap-buffer-overflow in xmlParseCommentComplex | 2023-10-10T13:03:42.825694Z | 2023-10-10T13:03:42.827194Z |
| osv-2023-997 | Heap-buffer-overflow in dxf_fixup_string | 2023-10-10T13:00:49.774042Z | 2023-10-10T13:00:49.774346Z |
| osv-2022-478 | Segv on unknown address | 2022-06-14T00:01:10.335839Z | 2023-10-09T14:11:11.908246Z |
| osv-2023-993 | Stack-buffer-overflow in entersafe_reverse_buffer | 2023-10-09T13:01:24.534357Z | 2023-10-09T13:01:24.534726Z |
| osv-2023-990 | Heap-use-after-free in __xmlRaiseError | 2023-10-08T13:03:35.608592Z | 2023-10-08T13:03:35.608892Z |
| osv-2023-989 | Heap-buffer-overflow in load_sections_64 | 2023-10-08T13:03:15.702919Z | 2023-10-08T13:03:15.703238Z |
| osv-2023-988 | Heap-buffer-overflow in xmlCopyCharMultiByte | 2023-10-08T13:03:08.264286Z | 2023-10-08T13:03:08.264696Z |
| osv-2023-980 | UNKNOWN READ in skip_chunk | 2023-10-07T13:03:05.608321Z | 2023-10-07T13:03:05.608627Z |
| osv-2023-978 | UNKNOWN READ in google::ParseTemplateArg | 2023-10-07T13:00:49.277768Z | 2023-10-07T13:00:49.278063Z |
| osv-2023-977 | Heap-buffer-overflow in _dwarf_memcpy_noswap_bytes | 2023-10-07T13:00:43.405502Z | 2023-10-07T13:00:43.405825Z |
| osv-2023-976 | Heap-buffer-overflow in Flow::dissectMDNS | 2023-10-07T13:00:27.532116Z | 2023-10-07T13:00:27.532412Z |
| osv-2023-974 | UNKNOWN READ in r_str_ncpy | 2023-10-07T13:00:25.541624Z | 2023-10-07T13:00:25.541917Z |
| osv-2023-547 | UNKNOWN READ in r_str_ncpy | 2023-07-08T14:00:22.061855Z | 2023-10-06T14:21:12.777567Z |
| osv-2023-971 | Out-of-memory in IndexSearchFuzzer | 2023-10-06T13:02:59.699745Z | 2023-10-06T13:02:59.700094Z |
| osv-2023-969 | Heap-use-after-free in xmlStaticCopyNode | 2023-10-06T13:01:29.969398Z | 2023-10-06T13:01:29.969714Z |
| osv-2023-965 | Heap-buffer-overflow in bit_TV_to_utf8 | 2023-10-05T13:03:03.441557Z | 2023-10-05T13:03:03.441853Z |
| osv-2023-962 | Security exception in java.base/java.util.regex.Pattern$GroupHead.match | 2023-10-05T13:00:30.156971Z | 2023-10-05T13:00:30.157534Z |
| osv-2022-511 | UNKNOWN READ in zfp_getcell | 2022-06-26T00:00:31.850695Z | 2023-10-04T14:10:02.526571Z |
| osv-2023-961 | Security exception in java.base/java.util.Arrays.copyOf | 2023-10-04T13:03:08.034505Z | 2023-10-04T13:03:08.034845Z |
| osv-2023-959 | Heap-buffer-overflow in _dwarf_memcpy_noswap_bytes | 2023-10-04T13:01:26.999017Z | 2023-10-04T13:01:26.999380Z |
| osv-2023-953 | Heap-buffer-overflow in xmlDictLookupInternal | 2023-10-03T13:01:18.896337Z | 2023-10-03T13:01:18.896661Z |
| osv-2023-948 | Global-buffer-overflow in isvce_write_coeff4x4_cavlc | 2023-10-02T13:02:26.227614Z | 2023-10-02T13:02:26.227921Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-powershell-2022-26788 | PowerShell Elevation of Privilege Vulnerability | 2025-09-04T17:48:41.821Z | 2025-09-04T18:07:55.535Z |
| bit-powershell-2022-24512 | .NET and Visual Studio Remote Code Execution Vulnerability | 2025-09-04T17:48:40.428Z | 2025-09-04T18:07:55.535Z |
| bit-powershell-2022-23267 | .NET and Visual Studio Denial of Service Vulnerability | 2025-09-04T17:48:39.121Z | 2025-09-04T18:07:55.535Z |
| bit-powershell-2021-43896 | Microsoft PowerShell Spoofing Vulnerability | 2025-09-04T17:48:37.745Z | 2025-09-04T18:07:55.535Z |
| bit-powershell-2021-41355 | .NET Core and Visual Studio Information Disclosure Vulnerability | 2025-09-04T17:48:36.166Z | 2025-09-04T18:07:55.535Z |
| bit-powershell-2020-8927 | Buffer overflow in Brotli library | 2025-09-04T17:48:34.485Z | 2025-09-04T18:07:55.535Z |
| bit-powershell-2020-1108 | 2025-09-04T17:48:33.089Z | 2025-09-04T18:07:55.535Z | |
| bit-powershell-2020-0951 | Windows Defender Application Control Security Feature Bypass Vulnerability | 2025-09-04T17:48:31.593Z | 2025-09-04T18:07:55.535Z |
| bit-kibana-2025-25010 | Kibana privilege escalation via reporting_user role | 2025-08-30T08:41:00.026Z | 2025-09-04T09:06:08.228Z |
| bit-helm-2025-53547 | Helm Chart Dependency Updating With Malicious Chart.yaml Content And Symlink Can Lead To Code Execution | 2025-07-10T05:43:09.073Z | 2025-09-04T09:06:08.228Z |
| bit-envoy-2025-46821 | Envoy vulnerable to bypass of RBAC uri_template permission | 2025-05-09T05:41:53.497Z | 2025-09-04T09:06:08.228Z |
| bit-elk-2025-25010 | Kibana privilege escalation via reporting_user role | 2025-08-30T08:38:09.297Z | 2025-09-04T09:06:08.228Z |
| bit-cilium-2024-42486 | Cilium vulnerable to information leakage via incorrect ReferenceGrant update logic in Gateway API | 2024-08-20T07:17:08.114Z | 2025-09-04T09:06:08.228Z |
| bit-prestashop-2025-25692 | 2025-08-07T08:58:52.761Z | 2025-09-03T11:06:29.028Z | |
| bit-prestashop-2025-25691 | 2025-08-07T08:58:51.176Z | 2025-09-03T11:06:29.028Z | |
| bit-prestashop-2024-41651 | 2024-10-04T07:18:17.936Z | 2025-09-03T11:06:29.028Z | |
| bit-moodle-2024-48901 | Moodle: idor when fetching report schedules | 2024-11-21T07:13:17.796Z | 2025-09-03T11:06:29.028Z |
| bit-moodle-2024-48898 | Moodle: some users can delete audiences of other reports | 2024-11-21T07:13:24.286Z | 2025-09-03T11:06:29.028Z |
| bit-moodle-2024-48897 | Moodle: idor in edit/delete rss feed | 2024-11-21T07:13:31.891Z | 2025-09-03T11:06:29.028Z |
| bit-moodle-2024-48896 | Moodle: users' names returned in messaging error message | 2024-11-21T07:13:38.787Z | 2025-09-03T11:06:29.028Z |
| bit-gitlab-2025-2867 | Improper Control of Generation of Code ('Code Injection') in GitLab | 2025-08-13T06:06:56.962Z | 2025-09-03T11:06:29.028Z |
| bit-ghost-2024-34451 | 2025-06-23T05:41:01.674Z | 2025-09-03T11:06:29.028Z | |
| bit-django-2025-32873 | 2025-06-18T14:40:22.794Z | 2025-09-03T11:06:29.028Z | |
| bit-django-2024-45231 | 2024-10-19T07:08:43.877Z | 2025-09-03T11:06:29.028Z | |
| bit-django-2024-45230 | 2024-10-19T07:08:51.488Z | 2025-09-03T11:06:29.028Z | |
| bit-jupyterhub-2024-28233 | XSS in JupyterHub via Self-XSS leveraged by Cookie Tossing | 2024-04-03T10:52:35.170Z | 2025-09-03T09:06:51.338Z |
| bit-gitlab-2025-4225 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-08-30T09:04:10.462Z | 2025-09-03T09:06:51.338Z |
| bit-gitlab-2025-2246 | Missing Authorization in GitLab | 2025-08-30T09:03:36.978Z | 2025-09-03T09:06:51.338Z |
| bit-envoy-2024-39305 | Envoy Proxy use after free when route hash policy is configured with cookie attributes | 2024-07-03T07:17:43.459Z | 2025-09-03T09:06:51.338Z |
| bit-superset-2025-27696 | Apache Superset: Incorrect authorization leading to resource ownership takeover | 2025-05-16T06:13:17.089Z | 2025-09-02T09:09:29.426Z |
| ID | Description | Updated |
|---|---|---|
| var-200505-0354 | Buffer overflow in the Foundation framework for Mac OS X 10.3.9 allows local users to exe… | 2024-07-23T20:17:16.312000Z |
| var-201206-0054 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T20:17:15.929000Z |
| var-200901-0726 | Use-after-free vulnerability in WebKit, as used in Apple Safari before 4.0, iPhone OS 1.0… | 2024-07-23T20:17:14.213000Z |
| var-200904-0800 | The JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before… | 2024-07-23T20:17:13.895000Z |
| var-201809-0686 | curl before version 7.61.1 is vulnerable to a buffer overrun in the NTLM authentication c… | 2024-07-23T20:17:09.201000Z |
| var-201705-3873 | In Open vSwitch (OvS) 2.7.0, while parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 me… | 2024-07-23T20:17:09.711000Z |
| var-201006-1234 | Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X… | 2024-07-23T20:17:09.441000Z |
| var-201903-0442 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:17:08.574000Z |
| var-200811-0321 | The plug-in interface in WebKit in Apple Safari before 3.2 does not prevent plug-ins from… | 2024-07-23T20:17:08.920000Z |
| var-202004-0345 | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between seriali… | 2024-07-23T20:17:07.679000Z |
| var-202109-1966 | There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a mal… | 2024-07-23T20:16:30.843000Z |
| var-200701-0341 | The Bonjour functionality in mDNSResponder, iChat 3.1.6, and InstantMessage framework 428… | 2024-07-23T20:16:29.180000Z |
| var-201904-1411 | A cross-origin issue existed with "iframe" elements. This was addressed with improved tra… | 2024-07-23T20:16:28.429000Z |
| var-201912-0532 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed … | 2024-07-23T20:16:27.834000Z |
| var-201805-0967 | Systems with microprocessors utilizing speculative execution and that perform speculative… | 2024-07-23T20:16:27.316000Z |
| var-201409-1147 | The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remot… | 2024-07-23T20:16:26.490000Z |
| var-201403-0275 | sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd… | 2024-07-23T20:15:55.666000Z |
| var-202112-1782 | Apache Log4j2 versions 2.0-alpha1 through 2.16.0 (excluding 2.12.3 and 2.3.1) did not pro… | 2024-07-23T20:15:54.690000Z |
| var-200505-0350 | The AppleScript Editor in Mac OS X 10.3.9 does not properly display script code for an ap… | 2024-07-23T20:15:49.782000Z |
| var-201707-0556 | Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whites… | 2024-07-23T20:15:16.169000Z |
| var-201806-1456 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. iOS befor… | 2024-07-23T20:15:15.076000Z |
| var-201011-0178 | The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and poss… | 2024-07-23T20:15:12.423000Z |
| var-200505-0351 | Bluetooth-enabled systems in Mac OS X 10.3.9 enables the Bluetooth file exchange service … | 2024-07-23T20:15:10.160000Z |
| var-200701-0518 | The CFUserNotificationSendRequest function in UserNotificationCenter.app in Apple Mac OS … | 2024-07-23T20:15:09.518000Z |
| var-202204-0432 | Subversion's mod_dav_svn is vulnerable to memory corruption. While looking up path-based … | 2024-07-23T20:15:05.279000Z |
| var-201912-0496 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:15:05.516000Z |
| var-200901-0714 | OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFi… | 2024-07-23T20:15:05.042000Z |
| var-200709-0495 | Cross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server bef… | 2024-07-23T20:15:05.431000Z |
| var-202210-1202 | Git is an open source, scalable, distributed revision control system. Versions prior to 2… | 2024-07-23T20:15:03.784000Z |
| var-201306-0256 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T20:15:01.919000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2021-000028 | Multiple vulnerabilities in multiple Aterm products | 2021-04-09T17:16+09:00 | 2021-04-09T17:16+09:00 |
| jvndb-2021-000030 | Multiple vulnerabilities in Aterm WF1200CR, Aterm WG1200CR, Aterm WG2600HS, and Aterm WX3000HP | 2021-04-09T16:42+09:00 | 2021-04-09T16:42+09:00 |
| jvndb-2021-000029 | Archive collectively operation utility vulnerable to directory traversal | 2021-04-01T14:44+09:00 | 2021-04-01T14:44+09:00 |
| jvndb-2021-000027 | Multiple vulnerabilities in baserCMS | 2021-03-26T14:25+09:00 | 2021-03-26T14:25+09:00 |
| jvndb-2021-000908 | rNote vulnerable to cross-site scripting | 2021-03-25T18:14+09:00 | 2021-03-25T18:14+09:00 |
| jvndb-2021-000907 | Yomi-Search vulnerable to cross-site scripting | 2021-03-25T18:12+09:00 | 2021-03-25T18:12+09:00 |
| jvndb-2021-000906 | Yomi-Search vulnerable to cross-site scripting | 2021-03-25T18:06+09:00 | 2021-03-25T18:06+09:00 |
| jvndb-2021-000905 | Yomi-Search vulnerable to cross-site scripting | 2021-03-25T18:01+09:00 | 2021-03-25T18:01+09:00 |
| jvndb-2021-000904 | Click Ranker vulnerable to cross-site scripting | 2021-03-25T17:52+09:00 | 2021-03-25T17:52+09:00 |
| jvndb-2021-000903 | Kagemai vulnerable to cross-site request forgery | 2021-03-25T17:50+09:00 | 2021-03-25T17:50+09:00 |
| jvndb-2021-000902 | Kagemai vulnerable to cross-site scripting | 2021-03-25T17:46+09:00 | 2021-03-25T17:46+09:00 |
| jvndb-2021-000901 | Kagemai vulnerable to cross-site scripting | 2021-03-25T17:43+09:00 | 2021-03-25T17:43+09:00 |
| jvndb-2021-000900 | MagazinegerZ vulnerable to cross-site scripting | 2021-03-25T17:32+09:00 | 2021-03-25T17:32+09:00 |
| jvndb-2021-000023 | UNIVERGE Aspire series PBX vulnerable to denial-of-service (DoS) | 2021-03-22T14:57+09:00 | 2021-03-22T14:57+09:00 |
| jvndb-2021-000025 | WordPress plugin "Paid Memberships Pro" vulnerable to SQL injection | 2021-03-17T16:24+09:00 | 2021-03-17T16:24+09:00 |
| jvndb-2021-000021 | M-System DL8 contains multiple vulnerabilities | 2021-03-12T15:59+09:00 | 2021-03-12T15:59+09:00 |
| jvndb-2021-000020 | Installer of MagicConnect Client program may insecurely load Dynamic Link Libraries | 2021-03-11T14:53+09:00 | 2021-03-11T14:53+09:00 |
| jvndb-2021-000019 | Multiple cross-site scripting vulnerabilities in GROWI | 2021-03-10T16:11+09:00 | 2021-03-10T16:11+09:00 |
| jvndb-2021-001122 | Trend Micro Security (Consumer) vulnerable to code injection | 2021-03-08T17:26+09:00 | 2021-03-08T17:26+09:00 |
| jvndb-2021-000015 | FileZen vulnerable to OS command injection | 2021-02-16T15:07+09:00 | 2021-03-05T17:31+09:00 |
| jvndb-2021-000016 | Multiple vulnerabilities in SolarView Compact | 2021-02-19T16:44+09:00 | 2021-02-25T15:31+09:00 |
| jvndb-2021-000017 | Multiple cross-site scripting vulnerabilities in Movable Type | 2021-02-24T15:20+09:00 | 2021-02-24T15:20+09:00 |
| jvndb-2021-001026 | Multiple Vulnerabilities in JP1/Automatic Operation | 2021-02-16T17:23+09:00 | 2021-02-16T17:23+09:00 |
| jvndb-2021-000014 | Calsos CSDJ fails to restrict access permissions | 2021-02-15T15:52+09:00 | 2021-02-15T15:52+09:00 |
| jvndb-2021-000013 | Wekan vulnerable to cross-site scripting | 2021-02-10T14:01+09:00 | 2021-02-10T14:01+09:00 |
| jvndb-2021-001022 | Cross-site Scripting Vulnerability in Hitachi Application Server Help | 2021-02-09T15:08+09:00 | 2021-02-09T15:08+09:00 |
| jvndb-2021-001021 | Improper access control vulnerability in JP1/IT Desktop Management 2 - Manager and JP1/NETM/Asset Information Manager | 2021-02-09T15:08+09:00 | 2021-02-09T15:08+09:00 |
| jvndb-2021-000012 | WordPress Plugin "Name Directory" vulnerable to cross-site request forgery | 2021-02-05T16:24+09:00 | 2021-02-05T16:24+09:00 |
| jvndb-2021-001017 | Trend Micro HouseCall for Home Networks (Windows Edition) may insecurely load Dynamic Link Libraries | 2021-02-04T15:42+09:00 | 2021-02-04T15:42+09:00 |
| jvndb-2021-000011 | Panasonic Video Insight VMS vulnerable to arbitrary code execution | 2021-02-04T15:39+09:00 | 2021-02-04T15:39+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:3873-1 | Security update for strongswan | 2025-10-30T15:10:54Z | 2025-10-30T15:10:54Z |
| suse-su-2025:3872-1 | Security update for xorg-x11-server | 2025-10-30T15:09:46Z | 2025-10-30T15:09:46Z |
| suse-su-2025:3869-1 | Security update for himmelblau | 2025-10-30T13:45:10Z | 2025-10-30T13:45:10Z |
| suse-su-2025:3868-1 | Security update for chrony | 2025-10-30T13:44:59Z | 2025-10-30T13:44:59Z |
| suse-su-2025:3867-1 | Security update for ImageMagick | 2025-10-30T13:41:13Z | 2025-10-30T13:41:13Z |
| suse-su-2025:3866-1 | Security update for xorg-x11-server | 2025-10-30T13:40:40Z | 2025-10-30T13:40:40Z |
| suse-su-2025:3865-1 | Security update for xorg-x11-server | 2025-10-30T13:40:16Z | 2025-10-30T13:40:16Z |
| suse-su-2025:3864-1 | Security update for xorg-x11-server | 2025-10-30T13:40:00Z | 2025-10-30T13:40:00Z |
| suse-su-2025:3863-1 | Security update for xwayland | 2025-10-30T13:39:29Z | 2025-10-30T13:39:29Z |
| suse-su-2025:20965-1 | Security update for libsoup | 2025-10-30T13:31:46Z | 2025-10-30T13:31:46Z |
| suse-su-2025:20964-1 | Security update for colord | 2025-10-30T12:29:30Z | 2025-10-30T12:29:30Z |
| suse-su-2025:3859-1 | Security update for java-21-openjdk | 2025-10-29T15:10:24Z | 2025-10-29T15:10:24Z |
| suse-su-2025:3858-1 | Security update for xorg-x11-server | 2025-10-29T15:09:00Z | 2025-10-29T15:09:00Z |
| suse-su-2025:3857-1 | Security update for strongswan | 2025-10-29T14:16:52Z | 2025-10-29T14:16:52Z |
| suse-su-2025:3856-1 | Security update for strongswan | 2025-10-29T14:16:31Z | 2025-10-29T14:16:31Z |
| suse-su-2025:3855-1 | Security update for strongswan | 2025-10-29T14:15:40Z | 2025-10-29T14:15:40Z |
| suse-su-2025:3845-1 | Security update for fetchmail | 2025-10-28T16:42:49Z | 2025-10-28T16:42:49Z |
| suse-su-2025:3844-1 | Security update for ImageMagick | 2025-10-28T16:41:56Z | 2025-10-28T16:41:56Z |
| suse-su-2025:3843-1 | Security update for xen | 2025-10-28T16:40:49Z | 2025-10-28T16:40:49Z |
| suse-su-2025:3842-1 | Security update for python-Authlib | 2025-10-28T16:39:39Z | 2025-10-28T16:39:39Z |
| suse-su-2025:3839-1 | Security update 5.1.1 for Multi-Linux Manager Server | 2025-10-28T14:41:29Z | 2025-10-28T14:41:29Z |
| suse-su-2025:3835-1 | Security update for java-11-openjdk | 2025-10-28T10:31:12Z | 2025-10-28T10:31:12Z |
| suse-su-2025:3834-1 | Security update for strongswan | 2025-10-28T10:30:15Z | 2025-10-28T10:30:15Z |
| suse-su-2025:3827-1 | Security update 4.3.16.1 for SUSE Manager Server Release Notes | 2025-10-28T07:26:58Z | 2025-10-28T07:26:58Z |
| suse-su-2025:3826-1 | Security update 4.3.16.1 for SUSE Manager Server 4.3 LTS | 2025-10-28T07:26:47Z | 2025-10-28T07:26:47Z |
| suse-su-2025:3825-1 | Recommended update 5.0.5.1 for Multi-Linux Manager Server | 2025-10-28T07:26:09Z | 2025-10-28T07:26:09Z |
| suse-su-2025:3819-1 | Security update 5.1.1 for Multi-Linux Manager Client Tools | 2025-10-28T07:20:07Z | 2025-10-28T07:20:07Z |
| suse-su-2025:3817-1 | Security update 5.1.1 for Multi-Linux Manager Client Tools | 2025-10-28T07:19:09Z | 2025-10-28T07:19:09Z |
| suse-su-2025:3812-1 | Security update for cmake | 2025-10-27T16:13:22Z | 2025-10-27T16:13:22Z |
| suse-su-2025:3811-1 | Security update for wireshark | 2025-10-27T16:12:20Z | 2025-10-27T16:12:20Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-02682 | Orangescrum跨站脚本漏洞(CNVD-2026-02682) | 2023-02-13 | 2026-01-09 |
| cnvd-2026-02681 | Orangescrum跨站脚本漏洞(CNVD-2026-02681) | 2023-04-07 | 2026-01-09 |
| cnvd-2026-02680 | Orangescrum跨站脚本漏洞(CNVD-2026-02680) | 2023-06-30 | 2026-01-09 |
| cnvd-2026-02679 | Orangescrum跨站脚本漏洞(CNVD-2026-02679) | 2025-02-08 | 2026-01-09 |
| cnvd-2026-00691 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-00691) | 2025-12-15 | 2026-01-09 |
| cnvd-2026-00690 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-00690) | 2025-12-15 | 2026-01-09 |
| cnvd-2026-00689 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-00689) | 2025-12-15 | 2026-01-09 |
| cnvd-2026-00688 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-00688) | 2025-12-15 | 2026-01-09 |
| cnvd-2026-00687 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-00687) | 2025-12-15 | 2026-01-09 |
| cnvd-2026-00686 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-00686) | 2025-12-15 | 2026-01-09 |
| cnvd-2026-00685 | Adobe Experience Manager跨站脚本洞(CNVD-2026-00685) | 2025-12-15 | 2026-01-09 |
| cnvd-2026-00684 | Adobe Experience Manager跨站脚本漏洞(CNVD-2026-00684) | 2025-12-15 | 2026-01-09 |
| cnvd-2026-02660 | CMSimple目录遍历漏洞 | 2022-04-15 | 2026-01-08 |
| cnvd-2026-02659 | CMSimple_XH代码执行漏洞 | 2022-05-11 | 2026-01-08 |
| cnvd-2026-02655 | CMSimple_XH跨站脚本漏洞(CNVD-2026-02655) | 2024-06-28 | 2026-01-08 |
| cnvd-2026-02646 | CMSimple不安全权限漏洞 | 2025-02-18 | 2026-01-08 |
| cnvd-2026-02645 | UTT 进取 750W未经验证的密码更改漏洞 | 2025-07-08 | 2026-01-08 |
| cnvd-2026-02644 | UTT 进取 750W缓冲区溢出漏洞(CNVD-2026-02644) | 2025-07-08 | 2026-01-08 |
| cnvd-2026-02643 | UTT 进取 750W缓冲区溢出漏洞(CNVD-2026-02643) | 2025-07-15 | 2026-01-08 |
| cnvd-2026-02642 | CMSimple_XH跨站脚本漏洞(CNVD-2026-02642) | 2025-11-11 | 2026-01-08 |
| cnvd-2026-02641 | CMSimple_XH跨站脚本漏洞 | 2025-11-11 | 2026-01-08 |
| cnvd-2026-02639 | CMSimple_XH代码执行漏洞 | 2025-12-29 | 2026-01-08 |
| cnvd-2026-00820 | UTT HiPER 840G缓冲区溢出漏洞(CNVD-2026-00820) | 2025-07-01 | 2026-01-08 |
| cnvd-2026-00819 | UTT HiPER 840G缓冲区溢出漏洞(CNVD-2026-00819) | 2025-07-01 | 2026-01-08 |
| cnvd-2026-00818 | UTT HiPER 840G缓冲区溢出漏洞(CNVD-2026-00818) | 2025-07-01 | 2026-01-08 |
| cnvd-2026-00817 | UTT HiPER 840G缓冲区溢出漏洞(CNVD-2026-00817) | 2025-07-11 | 2026-01-08 |
| cnvd-2026-00816 | UTT HiPER 840G缓冲区溢出漏洞(CNVD-2026-00816) | 2025-07-11 | 2026-01-08 |
| cnvd-2026-00815 | UTT HiPER 840G aspRemoteApConfTempSend文件缓冲区溢出漏洞 | 2025-07-21 | 2026-01-08 |
| cnvd-2026-00814 | UTT HiPER 840G aspApBasicConfigUrcp文件缓冲区溢出漏洞 | 2025-07-21 | 2026-01-08 |
| cnvd-2026-00813 | UTT 1200GW缓冲区溢出漏洞 | 2025-09-11 | 2026-01-08 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTFR-2025-AVI-0864 | Multiples vulnérabilités dans VMware Tanzu | 2025-10-13T00:00:00.000000 | 2025-10-13T00:00:00.000000 |
| CERTFR-2025-AVI-0863 | Vulnérabilité dans Belden HiOS Switch Platform | 2025-10-13T00:00:00.000000 | 2025-10-13T00:00:00.000000 |
| certfr-2025-avi-0862 | Multiples vulnérabilités dans Microsoft Edge | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| certfr-2025-avi-0861 | Multiples vulnérabilités dans les produits IBM | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| certfr-2025-avi-0860 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| certfr-2025-avi-0859 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| certfr-2025-avi-0858 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| CERTFR-2025-AVI-0862 | Multiples vulnérabilités dans Microsoft Edge | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| CERTFR-2025-AVI-0861 | Multiples vulnérabilités dans les produits IBM | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| CERTFR-2025-AVI-0860 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| CERTFR-2025-AVI-0859 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| CERTFR-2025-AVI-0858 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-10-10T00:00:00.000000 | 2025-10-10T00:00:00.000000 |
| certfr-2025-avi-0857 | Vulnérabilité dans Wireshark | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0856 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0855 | Multiples vulnérabilités dans les produits Juniper Networks | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0854 | Vulnérabilité dans les produits Moxa | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0853 | Multiples vulnérabilités dans GitLab | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0852 | Vulnérabilité dans Tenable Security Center | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| CERTFR-2025-AVI-0857 | Vulnérabilité dans Wireshark | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| CERTFR-2025-AVI-0856 | Multiples vulnérabilités dans les produits Palo Alto Networks | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| CERTFR-2025-AVI-0855 | Multiples vulnérabilités dans les produits Juniper Networks | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| CERTFR-2025-AVI-0854 | Vulnérabilité dans les produits Moxa | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| CERTFR-2025-AVI-0853 | Multiples vulnérabilités dans GitLab | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| CERTFR-2025-AVI-0852 | Vulnérabilité dans Tenable Security Center | 2025-10-09T00:00:00.000000 | 2025-10-09T00:00:00.000000 |
| certfr-2025-avi-0851 | Vulnérabilité dans Python | 2025-10-08T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| certfr-2025-avi-0850 | Multiples vulnérabilités dans Google Chrome | 2025-10-08T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| certfr-2025-avi-0847 | Vulnérabilité dans les produits Liferay | 2025-10-06T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| CERTFR-2025-AVI-0851 | Vulnérabilité dans Python | 2025-10-08T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| CERTFR-2025-AVI-0850 | Multiples vulnérabilités dans Google Chrome | 2025-10-08T00:00:00.000000 | 2025-10-08T00:00:00.000000 |
| CERTFR-2025-AVI-0847 | Vulnérabilité dans les produits Liferay | 2025-10-06T00:00:00.000000 | 2025-10-08T00:00:00.000000 |