Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-2526 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Wavlink WL-WN579A3 wireless.cgi multi_ssid command injection |
Wavlink |
WL-WN579A3 |
2026-02-16T01:02:08.386Z | 2026-02-17T17:16:45.552Z |
| CVE-2026-2525 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Free5GC PFCP UDP Endpoint denial of service |
n/a |
Free5GC |
2026-02-16T01:02:06.733Z | 2026-02-17T17:16:19.988Z |
| CVE-2026-2524 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Open5GS MME mme_s11_handle_create_session_response den… |
n/a |
Open5GS |
2026-02-16T00:32:07.343Z | 2026-02-17T17:15:56.357Z |
| CVE-2026-2523 |
6.9 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Open5GS SMF gn-handler.c smf_gn_handle_create_pdp_cont… |
n/a |
Open5GS |
2026-02-16T00:02:07.539Z | 2026-02-17T17:15:26.786Z |
| CVE-2026-2618 |
6.3 (4.0)
3.7 (3.1)
3.7 (3.0)
|
Beetel 777VR1 SSH Service risky encryption |
Beetel |
777VR1 |
2026-02-17T16:32:06.477Z | 2026-02-17T17:14:55.824Z |
| CVE-2026-2527 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Wavlink WL-WN579A3 login.cgi command injection |
Wavlink |
WL-WN579A3 |
2026-02-16T01:32:05.801Z | 2026-02-17T17:14:47.973Z |
| CVE-2026-2529 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Wavlink WL-WN579A3 wireless.cgi DeleteMac command injection |
Wavlink |
WL-WN579A3 |
2026-02-16T02:02:08.617Z | 2026-02-17T17:13:59.920Z |
| CVE-2026-2530 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Wavlink WL-WN579A3 wireless.cgi AddMac command injection |
Wavlink |
WL-WN579A3 |
2026-02-16T02:32:06.862Z | 2026-02-17T17:13:13.741Z |
| CVE-2026-2531 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
MindsDB File Upload security.py clear_filename server-… |
n/a |
MindsDB |
2026-02-16T02:32:10.743Z | 2026-02-17T17:12:35.004Z |
| CVE-2026-2535 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Comfast CF-N1 V2 mbox-config sub_44AB9C command injection |
Comfast |
CF-N1 V2 |
2026-02-16T04:32:06.965Z | 2026-02-17T17:07:16.175Z |
| CVE-2025-32063 |
6.8 (3.1)
|
Enabling SSH server on Infotainment ECU |
Bosch |
Infotainment system ECU |
2026-02-15T10:48:34.125Z | 2026-02-17T17:07:10.877Z |
| CVE-2026-2539 |
5.7 (4.0)
|
Micca KE700 Cleartext transmission of key fob ID |
Micca Auto Electronics Co., Ltd. |
Car Alarm System KE700 |
2026-02-15T10:58:38.397Z | 2026-02-17T17:07:03.354Z |
| CVE-2026-2540 |
8.4 (4.0)
|
Micca KE700 Acceptance of previously used rolling codes |
Micca Auto Electronics Co., Ltd. |
Car Alarm System KE700 |
2026-02-15T11:03:26.051Z | 2026-02-17T17:06:53.980Z |
| CVE-2026-2541 |
6.4 (4.0)
|
Micca KE700 Brute-force vulnerability due to low entropy |
Micca Auto Electronics Co., Ltd. |
Car Alarm System KE700 |
2026-02-15T11:07:40.539Z | 2026-02-17T17:06:46.968Z |
| CVE-2026-2415 |
7.5 (4.0)
|
Unsafe variable evaluation in email templates |
pretix |
pretix |
2026-02-16T10:15:09.149Z | 2026-02-17T17:06:39.418Z |
| CVE-2026-2451 |
7.5 (4.0)
|
Unsafe variable evaluation in email templates |
pretix |
pretix-doistep |
2026-02-16T10:16:05.423Z | 2026-02-17T17:06:30.536Z |
| CVE-2026-2528 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
Wavlink WL-WN579A3 wireless.cgi Delete_Mac_list comman… |
Wavlink |
WL-WN579A3 |
2026-02-16T02:02:07.067Z | 2026-02-17T17:06:29.769Z |
| CVE-2026-2452 |
7.5 (4.0)
|
Unsafe variable evaluation in email templates |
pretix |
pretix-newsletter |
2026-02-16T10:16:22.027Z | 2026-02-17T17:06:21.998Z |
| CVE-2025-13821 |
5.7 (3.1)
|
User profile update exposes password hash and MFA secrets |
Mattermost |
Mattermost |
2026-02-16T11:57:25.588Z | 2026-02-17T17:06:14.279Z |
| CVE-2025-14350 |
4.3 (3.1)
|
Information disclosure via channel mentions in posts |
Mattermost |
Mattermost |
2026-02-16T12:05:33.312Z | 2026-02-17T17:06:07.112Z |
| CVE-2026-1046 |
7.6 (3.1)
|
Arbitrary application execution via unvalidated server… |
Mattermost |
Mattermost |
2026-02-16T12:10:38.668Z | 2026-02-17T17:05:58.569Z |
| CVE-2025-14573 |
3.8 (3.1)
|
Team Admin Bypass of Invite Permissions via allow_open… |
Mattermost |
Mattermost |
2026-02-16T12:25:32.672Z | 2026-02-17T17:05:49.640Z |
| CVE-2026-2536 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
opencc JFlow Workflow WF_Admin_AttrFlow.java Imp_Done … |
opencc |
JFlow |
2026-02-16T05:02:14.100Z | 2026-02-17T17:05:15.429Z |
| CVE-2026-2537 |
5.1 (4.0)
4.7 (3.1)
4.7 (3.0)
|
Comfast CF-E4 HTTP POST Request mbox-config command in… |
Comfast |
CF-E4 |
2026-02-16T05:32:05.986Z | 2026-02-17T17:04:23.381Z |
| CVE-2020-37095 |
8.4 (4.0)
9.8 (3.1)
|
Cyberoam Authentication Client 2.1.2.7 - Buffer Overfl… |
Cyberoam |
Cyberoam Authentication Client |
2026-02-06T23:14:04.889Z | 2026-02-17T17:04:03.100Z |
| CVE-2020-37106 |
5.1 (4.0)
5.3 (3.1)
|
Business Live Chat Software 1.0 - Cross-Site Request F… |
Bdtask |
Business Live Chat Software |
2026-02-06T23:14:05.412Z | 2026-02-17T17:03:46.927Z |
| CVE-2020-37107 |
6.7 (4.0)
7.5 (3.1)
|
Core FTP LE 2.2 - Denial of Service |
Core FTP |
Core FTP LE |
2026-02-06T23:14:05.841Z | 2026-02-17T17:03:30.221Z |
| CVE-2020-37109 |
6.7 (4.0)
7.5 (3.1)
|
aSc TimeTables 2020.11.4 - Denial of Service |
asc Applied Software Consultants |
aSc TimeTables |
2026-02-06T23:14:06.283Z | 2026-02-17T17:03:11.680Z |
| CVE-2020-37122 |
6.7 (4.0)
7.5 (3.1)
|
SpotFTP-FTP Password Recover 2.4.8 - Denial of Service |
Nsauditor |
FTP Password Recover |
2026-02-06T23:14:06.709Z | 2026-02-17T17:02:54.513Z |
| CVE-2020-37135 |
9.3 (4.0)
7.5 (3.1)
|
AMSS++ 4.7 - Backdoor Admin Account |
Amssplus |
AMSS++ |
2026-02-06T23:14:07.110Z | 2026-02-17T17:02:41.308Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-23209 |
N/A
|
macvlan: fix error recovery in macvlan_common_newlink() |
Linux |
Linux |
2026-02-14T16:27:31.175Z | 2026-02-14T16:27:31.175Z |
| CVE-2026-23208 |
N/A
|
ALSA: usb-audio: Prevent excessive number of frames |
Linux |
Linux |
2026-02-14T16:27:30.441Z | 2026-02-16T08:58:58.667Z |
| CVE-2026-23207 |
N/A
|
spi: tegra210-quad: Protect curr_xfer check in IRQ handler |
Linux |
Linux |
2026-02-14T16:27:29.762Z | 2026-02-14T16:27:29.762Z |
| CVE-2026-23206 |
N/A
|
dpaa2-switch: prevent ZERO_SIZE_PTR dereference when n… |
Linux |
Linux |
2026-02-14T16:27:29.095Z | 2026-02-14T16:27:29.095Z |
| CVE-2026-23205 |
N/A
|
smb/client: fix memory leak in smb2_open_file() |
Linux |
Linux |
2026-02-14T16:27:28.409Z | 2026-02-14T16:27:28.409Z |
| CVE-2026-23204 |
N/A
|
net/sched: cls_u32: use skb_header_pointer_careful() |
Linux |
Linux |
2026-02-14T16:27:27.708Z | 2026-02-14T16:27:27.708Z |
| CVE-2026-23203 |
N/A
|
net: cpsw_new: Execute ndo_set_rx_mode callback in a w… |
Linux |
Linux |
2026-02-14T16:27:27.048Z | 2026-02-14T16:27:27.048Z |
| CVE-2026-23202 |
N/A
|
spi: tegra210-quad: Protect curr_xfer in tegra_qspi_co… |
Linux |
Linux |
2026-02-14T16:27:26.365Z | 2026-02-14T16:27:26.365Z |
| CVE-2026-23201 |
N/A
|
ceph: fix oops due to invalid pointer for kfree() in p… |
Linux |
Linux |
2026-02-14T16:27:25.693Z | 2026-02-14T16:27:25.693Z |
| CVE-2026-23200 |
N/A
|
ipv6: Fix ECMP sibling count mismatch when clearing RT… |
Linux |
Linux |
2026-02-14T16:27:25.025Z | 2026-02-14T16:27:25.025Z |
| CVE-2026-23199 |
N/A
|
procfs: avoid fetching build ID while holding VMA lock |
Linux |
Linux |
2026-02-14T16:27:24.326Z | 2026-02-14T16:27:24.326Z |
| CVE-2026-23198 |
N/A
|
KVM: Don't clobber irqfd routing type when deassigning irqfd |
Linux |
Linux |
2026-02-14T16:27:23.621Z | 2026-02-14T16:27:23.621Z |
| CVE-2026-23197 |
N/A
|
i2c: imx: preserve error state in block data length handler |
Linux |
Linux |
2026-02-14T16:27:22.919Z | 2026-02-14T16:27:22.919Z |
| CVE-2026-23196 |
N/A
|
HID: Intel-thc-hid: Intel-thc: Add safety check for re… |
Linux |
Linux |
2026-02-14T16:27:22.264Z | 2026-02-16T08:58:57.510Z |
| CVE-2026-23195 |
N/A
|
cgroup/dmem: avoid pool UAF |
Linux |
Linux |
2026-02-14T16:27:21.621Z | 2026-02-14T16:27:21.621Z |
| CVE-2026-23194 |
N/A
|
rust_binder: correctly handle FDA objects of length zero |
Linux |
Linux |
2026-02-14T16:27:20.944Z | 2026-02-14T16:27:20.944Z |
| CVE-2026-23193 |
N/A
|
scsi: target: iscsi: Fix use-after-free in iscsit_dec_… |
Linux |
Linux |
2026-02-14T16:27:20.251Z | 2026-02-16T08:58:56.360Z |
| CVE-2026-23192 |
N/A
|
linkwatch: use __dev_put() in callers to prevent UAF |
Linux |
Linux |
2026-02-14T16:27:19.557Z | 2026-02-14T16:27:19.557Z |
| CVE-2026-23191 |
N/A
|
ALSA: aloop: Fix racy access at PCM trigger |
Linux |
Linux |
2026-02-14T16:27:18.882Z | 2026-02-16T08:58:55.176Z |
| CVE-2026-23190 |
N/A
|
ASoC: amd: fix memory leak in acp3x pdm dma ops |
Linux |
Linux |
2026-02-14T16:27:18.203Z | 2026-02-14T16:27:18.203Z |
| CVE-2026-23189 |
N/A
|
ceph: fix NULL pointer dereference in ceph_mds_auth_match() |
Linux |
Linux |
2026-02-14T16:27:17.549Z | 2026-02-14T16:27:17.549Z |
| CVE-2026-23188 |
N/A
|
net: usb: r8152: fix resume reset deadlock |
Linux |
Linux |
2026-02-14T16:27:16.869Z | 2026-02-14T16:27:16.869Z |
| CVE-2026-23187 |
N/A
|
pmdomain: imx8m-blk-ctrl: fix out-of-range access of b… |
Linux |
Linux |
2026-02-14T16:27:16.200Z | 2026-02-14T16:27:16.200Z |
| CVE-2026-23186 |
N/A
|
hwmon: (acpi_power_meter) Fix deadlocks related to acp… |
Linux |
Linux |
2026-02-14T16:27:15.505Z | 2026-02-14T16:27:15.505Z |
| CVE-2026-23185 |
N/A
|
wifi: iwlwifi: mld: cancel mlo_scan_start_wk |
Linux |
Linux |
2026-02-14T16:27:14.815Z | 2026-02-14T16:27:14.815Z |
| CVE-2026-23184 |
N/A
|
binder: fix UAF in binder_netlink_report() |
Linux |
Linux |
2026-02-14T16:27:14.167Z | 2026-02-14T16:27:14.167Z |
| CVE-2026-23183 |
N/A
|
cgroup/dmem: fix NULL pointer dereference when setting max |
Linux |
Linux |
2026-02-14T16:27:13.482Z | 2026-02-14T16:27:13.482Z |
| CVE-2026-23182 |
N/A
|
spi: tegra: Fix a memory leak in tegra_slink_probe() |
Linux |
Linux |
2026-02-14T16:27:12.806Z | 2026-02-14T16:27:12.806Z |
| CVE-2026-23181 |
N/A
|
btrfs: sync read disk super and set block size |
Linux |
Linux |
2026-02-14T16:27:12.137Z | 2026-02-16T08:58:53.981Z |
| CVE-2026-23180 |
N/A
|
dpaa2-switch: add bounds check for if_id in IRQ handler |
Linux |
Linux |
2026-02-14T16:27:11.463Z | 2026-02-14T16:27:11.463Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-23207 | In the Linux kernel, the following vulnerability has been resolved: spi: tegra210-quad: Protect cu… | 2026-02-14T17:15:58.610 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23206 | In the Linux kernel, the following vulnerability has been resolved: dpaa2-switch: prevent ZERO_SIZ… | 2026-02-14T17:15:58.507 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23205 | In the Linux kernel, the following vulnerability has been resolved: smb/client: fix memory leak in… | 2026-02-14T17:15:58.403 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23204 | In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_u32: use skb_he… | 2026-02-14T17:15:58.297 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23203 | In the Linux kernel, the following vulnerability has been resolved: net: cpsw_new: Execute ndo_set… | 2026-02-14T17:15:58.177 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23202 | In the Linux kernel, the following vulnerability has been resolved: spi: tegra210-quad: Protect cu… | 2026-02-14T17:15:58.050 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23201 | In the Linux kernel, the following vulnerability has been resolved: ceph: fix oops due to invalid … | 2026-02-14T17:15:57.950 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23200 | In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix ECMP sibling count m… | 2026-02-14T17:15:57.847 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23199 | In the Linux kernel, the following vulnerability has been resolved: procfs: avoid fetching build I… | 2026-02-14T17:15:57.743 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23198 | In the Linux kernel, the following vulnerability has been resolved: KVM: Don't clobber irqfd routi… | 2026-02-14T17:15:57.640 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23197 | In the Linux kernel, the following vulnerability has been resolved: i2c: imx: preserve error state… | 2026-02-14T17:15:57.540 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23196 | In the Linux kernel, the following vulnerability has been resolved: HID: Intel-thc-hid: Intel-thc:… | 2026-02-14T17:15:57.440 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23195 | In the Linux kernel, the following vulnerability has been resolved: cgroup/dmem: avoid pool UAF A… | 2026-02-14T17:15:57.337 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23194 | In the Linux kernel, the following vulnerability has been resolved: rust_binder: correctly handle … | 2026-02-14T17:15:57.233 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23193 | In the Linux kernel, the following vulnerability has been resolved: scsi: target: iscsi: Fix use-a… | 2026-02-14T17:15:57.123 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23192 | In the Linux kernel, the following vulnerability has been resolved: linkwatch: use __dev_put() in … | 2026-02-14T17:15:57.020 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23191 | In the Linux kernel, the following vulnerability has been resolved: ALSA: aloop: Fix racy access a… | 2026-02-14T17:15:56.917 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23190 | In the Linux kernel, the following vulnerability has been resolved: ASoC: amd: fix memory leak in … | 2026-02-14T17:15:56.810 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23189 | In the Linux kernel, the following vulnerability has been resolved: ceph: fix NULL pointer derefer… | 2026-02-14T17:15:56.703 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23188 | In the Linux kernel, the following vulnerability has been resolved: net: usb: r8152: fix resume re… | 2026-02-14T17:15:56.600 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23187 | In the Linux kernel, the following vulnerability has been resolved: pmdomain: imx8m-blk-ctrl: fix … | 2026-02-14T17:15:56.490 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23186 | In the Linux kernel, the following vulnerability has been resolved: hwmon: (acpi_power_meter) Fix … | 2026-02-14T17:15:56.373 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23185 | In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mld: cancel mlo… | 2026-02-14T17:15:56.273 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23184 | In the Linux kernel, the following vulnerability has been resolved: binder: fix UAF in binder_netl… | 2026-02-14T17:15:56.167 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23183 | In the Linux kernel, the following vulnerability has been resolved: cgroup/dmem: fix NULL pointer … | 2026-02-14T17:15:56.067 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23182 | In the Linux kernel, the following vulnerability has been resolved: spi: tegra: Fix a memory leak … | 2026-02-14T17:15:55.960 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23181 | In the Linux kernel, the following vulnerability has been resolved: btrfs: sync read disk super an… | 2026-02-14T17:15:55.853 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23180 | In the Linux kernel, the following vulnerability has been resolved: dpaa2-switch: add bounds check… | 2026-02-14T17:15:55.747 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23179 | In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: fixup hang in nvmet… | 2026-02-14T17:15:55.643 | 2026-02-18T17:52:22.253 |
| fkie_cve-2026-23178 | In the Linux kernel, the following vulnerability has been resolved: HID: i2c-hid: fix potential bu… | 2026-02-14T17:15:55.537 | 2026-02-18T17:52:22.253 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-frvg-p8g8-45cj |
4.3 (3.1)
|
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in TR7 Cyber Defense Inc. Web A… | 2026-02-16T12:30:25Z | 2026-02-16T12:30:25Z |
| ghsa-8crw-7238-r6f8 |
5.4 (3.1)
2.1 (4.0)
|
A vulnerability was determined in ZenTao up to 21.7.8. Affected by this vulnerability is the functi… | 2026-02-16T12:30:25Z | 2026-02-16T12:30:25Z |
| ghsa-7p7v-9r75-mq55 |
6.3 (3.1)
2.1 (4.0)
|
A security flaw has been discovered in tushar-2223 Hotel-Management-System up to bb1f3b3666124b888f… | 2026-02-16T12:30:25Z | 2026-02-16T12:30:25Z |
| ghsa-77hc-3xh2-m95m |
5.0 (3.1)
2.3 (4.0)
|
A weakness has been identified in JeecgBoot 3.9.1. This vulnerability affects the function importDo… | 2026-02-16T12:30:25Z | 2026-02-16T12:30:25Z |
| ghsa-75mf-97wq-jjpw |
7.5 (4.0)
|
Emails sent by pretix can utilize placeholders that will be filled with customer data. For example,… | 2026-02-16T12:30:25Z | 2026-02-16T12:30:25Z |
| ghsa-59w9-4rgj-869h |
7.3 (3.1)
5.5 (4.0)
|
A vulnerability has been found in zhanghuanhao LibrarySystem 图书馆管理系统 up to 1.1.1. This impacts an u… | 2026-02-16T12:30:24Z | 2026-02-16T12:30:25Z |
| ghsa-3g85-xpc2-p2hq |
10.0 (3.1)
|
The WhatsApp bridge component in Nanobot binds the WebSocket server to all network interfaces (0.0.… | 2026-02-16T12:30:25Z | 2026-02-16T12:30:25Z |
| ghsa-r97f-5wrg-fmv7 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: pre… | 2025-07-03T09:30:35Z | 2026-02-16T12:30:24Z |
| ghsa-qrxh-hqj2-g6xg |
5.1 (4.0)
|
Stored Cross-Site Scripting (XSS) vulnerability in Kubysoft, which is triggered through multiple pa… | 2026-02-16T12:30:24Z | 2026-02-16T12:30:24Z |
| ghsa-g4vw-3hq5-q7gr |
|
In the Linux kernel, the following vulnerability has been resolved: spi: cadence-quadspi: Implemen… | 2025-10-20T18:30:32Z | 2026-02-16T12:30:24Z |
| ghsa-fvcr-8w5m-c388 |
5.1 (4.0)
|
Stored Cross-Site Scripting (XSS) vulnerability in Kubysoft, where uploaded SVG images are not prop… | 2026-02-16T12:30:24Z | 2026-02-16T12:30:24Z |
| ghsa-37cc-q9ww-mg9w |
4.8 (4.0)
|
Cross-Site Scripting (XSS) vulnerability reflected in Kubysoft, which occurs through multiple param… | 2026-02-16T12:30:24Z | 2026-02-16T12:30:24Z |
| ghsa-vjg4-vp37-8p46 |
3.5 (3.1)
2.0 (4.0)
|
A vulnerability was detected in LigeroSmart up to 6.1.26. The impacted element is the function Agen… | 2026-02-16T09:30:30Z | 2026-02-16T09:30:30Z |
| ghsa-vfjw-j4jg-frr6 |
6.3 (3.1)
2.1 (4.0)
|
A flaw has been found in WAYOS FBM-220G 24.10.19. This affects the function sub_40F820 of the file … | 2026-02-16T09:30:30Z | 2026-02-16T09:30:30Z |
| ghsa-gmr7-w89v-rr2q |
|
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Prevent exces… | 2026-02-14T18:30:16Z | 2026-02-16T09:30:30Z |
| ghsa-fr8w-mgp5-2p5v |
7.0 (3.1)
7.3 (4.0)
|
A weakness has been identified in Total VPN 0.5.29.0 on Windows. Affected by this vulnerability is … | 2026-02-16T09:30:30Z | 2026-02-16T09:30:30Z |
| ghsa-c68v-2764-rf86 |
2.7 (3.1)
5.1 (4.0)
|
A vulnerability was identified in vichan-devel vichan up to 5.1.5. This vulnerability affects unkno… | 2026-02-16T09:30:30Z | 2026-02-16T09:30:30Z |
| ghsa-8mxg-vjpv-vxv2 |
3.5 (3.1)
2.0 (4.0)
|
A security vulnerability has been detected in LigeroSmart up to 6.1.26. The affected element is an … | 2026-02-16T09:30:30Z | 2026-02-16T09:30:30Z |
| ghsa-54wp-f6vm-v42x |
7.3 (3.1)
6.9 (4.0)
|
A security flaw has been discovered in yued-fe LuLu UI up to 3.0.0. This issue affects the function… | 2026-02-16T09:30:30Z | 2026-02-16T09:30:30Z |
| ghsa-4wc5-h6jc-fhhw |
3.5 (3.1)
2.0 (4.0)
|
A weakness has been identified in LigeroSmart up to 6.1.26. Impacted is an unknown function of the … | 2026-02-16T09:30:30Z | 2026-02-16T09:30:30Z |
| ghsa-2425-8942-cjhp |
7.0 (3.1)
7.3 (4.0)
|
A security flaw has been discovered in Flos Freeware Notepad2 4.2.22/4.2.23/4.2.24/4.2.25. Affected… | 2026-02-16T09:30:30Z | 2026-02-16T09:30:30Z |
| ghsa-gw5f-7fqh-pvm6 |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was determined in opencc JFlow up to 20260129. This affects the function Imp_Done o… | 2026-02-16T06:31:29Z | 2026-02-16T06:31:29Z |
| ghsa-cr6h-978m-qj75 |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability has been found in Comfast CF-N1 V2 2.6.0.2. The affected element is the function su… | 2026-02-16T06:31:29Z | 2026-02-16T06:31:29Z |
| ghsa-9394-fqhw-qhr3 |
4.7 (3.1)
2.0 (4.0)
|
A vulnerability was identified in Comfast CF-E4 2.6.0.1. This impacts an unknown function of the fi… | 2026-02-16T06:31:29Z | 2026-02-16T06:31:29Z |
| ghsa-86c5-9jxx-m8g7 |
6.3 (3.1)
2.1 (4.0)
|
A weakness has been identified in Wavlink WL-WN579A3 up to 20210219. This affects the function AddM… | 2026-02-16T06:31:29Z | 2026-02-16T06:31:29Z |
| ghsa-7r5x-3969-58xr |
6.3 (3.1)
5.3 (4.0)
|
A vulnerability was detected in lintsinghua DeepAudit up to 3.0.3. This issue affects some unknown … | 2026-02-16T06:31:29Z | 2026-02-16T06:31:29Z |
| ghsa-7364-56q4-9jv8 |
6.3 (3.1)
2.1 (4.0)
|
A vulnerability was found in Comfast CF-N1 V2 2.6.0.2. The impacted element is the function sub_44A… | 2026-02-16T06:31:29Z | 2026-02-16T06:31:29Z |
| ghsa-4833-xmjg-923x |
7.3 (3.1)
5.5 (4.0)
|
A flaw has been found in Tosei Self-service Washing Machine 4.02. Impacted is an unknown function o… | 2026-02-16T06:31:29Z | 2026-02-16T06:31:29Z |
| ghsa-xqpr-gx4w-53xf |
5.3 (3.1)
5.5 (4.0)
|
A vulnerability has been found in Free5GC up to 4.1.0. This affects an unknown function of the comp… | 2026-02-16T03:30:17Z | 2026-02-16T03:30:17Z |
| ghsa-xjrj-8prq-9366 |
6.3 (3.1)
5.3 (4.0)
|
A security flaw has been discovered in Wavlink WL-WN579A3 up to 20210219. Affected by this issue is… | 2026-02-16T03:30:17Z | 2026-02-16T03:30:17Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2023-31 |
|
Cross-site Scripting (XSS) - Stored in GitHub repository modoboa/modoboa prior to 2.0.4. | modoboa | 2023-01-26T23:15:00Z | 2023-05-04T03:49:46.722786Z |
| pysec-2023-30 |
|
Cross-site Scripting (XSS) - Stored in GitHub repository modoboa/modoboa prior to 2.0.4. | modoboa | 2023-01-26T22:15:00Z | 2023-05-04T03:49:46.669829Z |
| pysec-2023-29 |
|
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.2.1. | mlflow | 2023-03-24T15:15:00Z | 2023-05-04T03:49:46.618607Z |
| pysec-2023-28 |
|
Absolute Path Traversal in GitHub repository mlflow/mlflow prior to 2.2.2. | mlflow | 2023-03-24T15:15:00Z | 2023-05-04T03:49:46.565156Z |
| pysec-2023-27 |
|
mindsdb is a Machine Learning platform to help developers build AI solutions. In affected… | mindsdb | 2023-04-21T21:15:00Z | 2023-05-04T03:49:46.507545Z |
| pysec-2023-26 |
|
MindsDB is an open source machine learning platform. An unsafe extraction is being perfor… | mindsdb | 2023-03-30T19:15:00Z | 2023-05-04T03:49:46.430565Z |
| pysec-2023-25 |
|
mechanize, a library for automatically interacting with HTTP web servers, contains a regu… | mechanize | 2023-01-17T22:15:00Z | 2023-05-04T03:49:46.357040Z |
| pysec-2023-24 |
|
Denial of service could be caused to markdown-it-py, before v2.2.0, if an attacker was al… | markdown-it-py | 2023-02-23T00:15:00Z | 2023-05-04T03:49:46.302314Z |
| pysec-2023-23 |
|
Denial of service could be caused to the command line interface of markdown-it-py, before… | markdown-it-py | 2023-02-22T23:15:00Z | 2023-05-04T03:49:46.254022Z |
| pysec-2023-22 |
|
An issue was discovered in Mailman Core before 3.3.5. An attacker with access to the REST… | mailman | 2023-04-15T20:16:00Z | 2023-05-04T03:49:46.203477Z |
| pysec-2023-21 |
|
LTI Consumer XBlock implements the consumer side of the LTI specification enabling integr… | lti-consumer-xblock | 2023-01-26T21:18:00Z | 2023-05-04T03:49:46.153608Z |
| pysec-2023-20 |
|
Netflix Lemur before version 1.3.2 used insufficiently random values when generating de… | lemur | 2023-04-19T20:15:00Z | 2023-05-04T03:49:46.100234Z |
| pysec-2023-19 |
|
A vulnerability, which was classified as problematic, was found in kakwa LdapCherry up to… | ldapcherry | 2023-01-05T08:15:00Z | 2023-05-04T03:49:46.049521Z |
| pysec-2023-18 |
|
In LangChain through 0.0.131, the LLMMathChain chain allows prompt injection attacks that… | langchain | 2023-04-05T02:15:00Z | 2023-05-04T03:49:46.000016Z |
| pysec-2023-17 |
|
IPython (Interactive Python) is a command shell for interactive computing in multiple pro… | ipython | 2023-02-10T20:15:00Z | 2023-05-04T03:49:45.922825Z |
| pysec-2023-16 |
|
Gradio is an open-source Python library to build machine learning and data science demos … | gradio | 2023-02-23T22:15:00Z | 2023-05-04T03:49:45.858658Z |
| pysec-2023-15 |
|
GeoNode is an open source platform that facilitates the creation, sharing, and collaborat… | geonode | 2023-02-27T21:15:00Z | 2023-05-04T03:49:45.721412Z |
| pysec-2023-14 |
|
** UNSUPPPORTED WHEN ASSIGNED **** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classifie… | django-ucamlookup | 2023-01-05T09:15:00Z | 2023-05-04T03:49:45.271028Z |
| pysec-2023-13 |
|
An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 … | django | 2023-02-15T01:15:00Z | 2023-05-04T03:49:45.612158Z |
| pysec-2023-12 |
|
In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of… | django | 2023-02-01T19:15:00Z | 2023-05-04T03:49:45.437728Z |
| pysec-2023-11 |
|
cryptography is a package designed to expose cryptographic primitives and recipes to Pyth… | cryptography | 2023-02-07T21:15:00Z | 2023-05-04T03:49:45.221186Z |
| pysec-2023-10 |
|
Changedetection.io before v0.40.1.1 was discovered to contain a stored cross-site scripti… | changedetection-io | 2023-02-17T22:15:00Z | 2023-05-04T03:49:45.088821Z |
| pysec-2022-42992 |
|
All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to im… | gitpython | 2022-12-06T05:15:00Z | 2023-05-04T03:49:45.777062Z |
| pysec-2022-42991 |
|
An issue discovered in Python Charmers Future 0.18.2 and earlier allows remote attackers … | future | 2022-12-23T00:15:00Z | 2023-05-04T03:49:45.660760Z |
| pysec-2022-42989 |
|
A vulnerability, which was classified as problematic, has been found in collective.dms.ba… | collective-dms-basecontent | 2022-12-14T15:15:00Z | 2023-05-04T03:49:45.138352Z |
| pysec-2022-42986 |
|
Certifi is a curated collection of Root Certificates for validating the trustworthiness o… | certifi | 2022-12-07T22:15:00Z | 2023-05-04T03:49:45.039819Z |
| pysec-2023-9 |
|
CairoSVG is an SVG converter based on Cairo, a 2D graphics library. Prior to version 2.7.… | cairosvg | 2023-03-20T16:15:00Z | 2023-05-04T03:49:44.989748Z |
| pysec-2023-8 |
|
Incorrect Authorization vulnerability in Apache Software Foundation Apache IoTDB.This iss… | apache-iotdb | 2023-04-17T08:15:00Z | 2023-05-04T03:49:44.939309Z |
| pysec-2023-7 |
|
Improper Authentication vulnerability in Apache Software Foundation Apache IoTDB.This iss… | apache-iotdb | 2023-04-17T07:15:00Z | 2023-05-04T03:49:44.888533Z |
| pysec-2023-6 |
|
Improper Authentication vulnerability in Apache Software Foundation Apache IoTDB.This iss… | apache-iotdb | 2023-01-30T17:15:00Z | 2023-05-04T03:49:44.840128Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33073 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.641767Z |
| gsd-2024-33072 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.692854Z |
| gsd-2024-33071 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.625514Z |
| gsd-2024-33070 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.621129Z |
| gsd-2024-33069 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.645844Z |
| gsd-2024-33068 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.754188Z |
| gsd-2024-33067 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.725270Z |
| gsd-2024-33066 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.640877Z |
| gsd-2024-33065 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.601841Z |
| gsd-2024-33064 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.742494Z |
| gsd-2024-33063 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.606683Z |
| gsd-2024-33062 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.623763Z |
| gsd-2024-33061 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.698231Z |
| gsd-2024-33060 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.709441Z |
| gsd-2024-33059 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.758936Z |
| gsd-2024-33058 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.680057Z |
| gsd-2024-33057 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.714140Z |
| gsd-2024-33056 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.614834Z |
| gsd-2024-33055 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.636678Z |
| gsd-2024-33054 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.672967Z |
| gsd-2024-33053 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.619733Z |
| gsd-2024-33052 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.640443Z |
| gsd-2024-33051 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.658888Z |
| gsd-2024-33050 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.695724Z |
| gsd-2024-33049 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.604696Z |
| gsd-2024-33048 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.709832Z |
| gsd-2024-33047 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.624631Z |
| gsd-2024-33046 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.708183Z |
| gsd-2024-33045 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.670079Z |
| gsd-2024-33044 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-24T05:02:09.614126Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2026-503 | Malicious code in test-poc-package-for-session-2 (PyPI) | 2026-01-25T10:04:44Z | 2026-01-25T10:04:44Z |
| mal-2026-498 | Malicious code in instascan-pro (PyPI) | 2026-01-24T16:15:55Z | 2026-01-24T16:15:55Z |
| MAL-2026-498 | Malicious code in instascan-pro (PyPI) | 2026-01-24T16:15:55Z | 2026-01-24T16:15:55Z |
| mal-2026-491 | Malicious code in test-on-other-again (npm) | 2026-01-23T12:02:07Z | 2026-01-23T18:48:56Z |
| MAL-2026-491 | Malicious code in test-on-other-again (npm) | 2026-01-23T12:02:07Z | 2026-01-23T18:48:56Z |
| mal-2026-488 | Malicious code in ntwsx (npm) | 2026-01-23T06:32:37Z | 2026-01-23T18:48:55Z |
| mal-2026-487 | Malicious code in ntwsc (npm) | 2026-01-23T06:32:37Z | 2026-01-23T18:48:55Z |
| MAL-2026-488 | Malicious code in ntwsx (npm) | 2026-01-23T06:32:37Z | 2026-01-23T18:48:55Z |
| MAL-2026-487 | Malicious code in ntwsc (npm) | 2026-01-23T06:32:37Z | 2026-01-23T18:48:55Z |
| mal-2026-486 | Malicious code in a5xm (npm) | 2026-01-23T06:32:37Z | 2026-01-23T18:48:54Z |
| mal-2026-485 | Malicious code in a4wu (npm) | 2026-01-23T06:32:36Z | 2026-01-23T18:48:54Z |
| MAL-2026-486 | Malicious code in a5xm (npm) | 2026-01-23T06:32:37Z | 2026-01-23T18:48:54Z |
| MAL-2026-485 | Malicious code in a4wu (npm) | 2026-01-23T06:32:36Z | 2026-01-23T18:48:54Z |
| mal-2026-497 | Malicious code in test-on-other (npm) | 2026-01-23T18:12:42Z | 2026-01-23T18:12:42Z |
| MAL-2026-497 | Malicious code in test-on-other (npm) | 2026-01-23T18:12:42Z | 2026-01-23T18:12:42Z |
| mal-2025-192877 | Malicious code in tdm-react (npm) | 2025-12-23T08:32:44Z | 2026-01-23T15:44:07Z |
| MAL-2025-192877 | Malicious code in tdm-react (npm) | 2025-12-23T08:32:44Z | 2026-01-23T15:44:07Z |
| mal-2026-434 | Malicious code in weaviate-js (npm) | 2026-01-21T04:49:30Z | 2026-01-23T01:39:05Z |
| mal-2026-433 | Malicious code in wallet-adapter-react (npm) | 2026-01-21T04:37:07Z | 2026-01-23T01:39:05Z |
| mal-2026-404 | Malicious code in worldposition (npm) | 2026-01-21T04:21:35Z | 2026-01-23T01:39:05Z |
| mal-2026-403 | Malicious code in worldnormal (npm) | 2026-01-21T04:21:35Z | 2026-01-23T01:39:05Z |
| mal-2026-402 | Malicious code in vworldviewdir (npm) | 2026-01-21T04:21:35Z | 2026-01-23T01:39:05Z |
| mal-2026-373 | Malicious code in webmd-debug (npm) | 2026-01-20T06:13:03Z | 2026-01-23T01:39:05Z |
| mal-2026-372 | Malicious code in webmd-cookie (npm) | 2026-01-20T06:13:02Z | 2026-01-23T01:39:05Z |
| mal-2026-346 | Malicious code in zod-js (npm) | 2026-01-19T00:46:16Z | 2026-01-23T01:39:05Z |
| mal-2026-335 | Malicious code in wac-react-relay (npm) | 2026-01-19T00:45:11Z | 2026-01-23T01:39:05Z |
| MAL-2026-434 | Malicious code in weaviate-js (npm) | 2026-01-21T04:49:30Z | 2026-01-23T01:39:05Z |
| MAL-2026-433 | Malicious code in wallet-adapter-react (npm) | 2026-01-21T04:37:07Z | 2026-01-23T01:39:05Z |
| MAL-2026-404 | Malicious code in worldposition (npm) | 2026-01-21T04:21:35Z | 2026-01-23T01:39:05Z |
| MAL-2026-403 | Malicious code in worldnormal (npm) | 2026-01-21T04:21:35Z | 2026-01-23T01:39:05Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1056 | IBM Semeru Runtime: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-05-14T22:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2025-0967 | Mitel SIP Phone: Mehrere Schwachstellen | 2025-05-07T22:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2025-0790 | MediaWiki Erweiterungen und -Komponenten: Mehrere Schwachstellen | 2025-04-13T22:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2025-0788 | MediaWiki: Mehrere Schwachstellen | 2025-04-10T22:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2025-0622 | Apache Commons: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2025-03-23T23:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2025-0512 | Red Hat Advanced Cluster Security: Schwachstelle ermöglicht Denial of Service | 2025-03-10T23:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2025-0469 | libarchive: Schwachstelle ermöglicht Denial of Service und weitere nicht spezifizierte Angriffe | 2025-03-02T23:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2025-0394 | OpenSSH: Mehrere Schwachstellen | 2025-02-17T23:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2025-0316 | OpenSSL: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-02-11T23:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2024-3249 | Red Hat JBoss Enterprise Application Platform (Wildfly): Schwachstelle ermöglicht Cross-Site Scripting | 2024-10-21T22:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2024-3230 | OpenSSL: Schwachstelle ermöglicht Denial of Service und Remote-Code-Ausführung | 2024-10-16T22:00:00.000+00:00 | 2025-07-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1608 | CrushFTP: Schwachstelle ermöglicht Erlangen von Administratorrechten | 2025-07-20T22:00:00.000+00:00 | 2025-07-22T22:00:00.000+00:00 |
| wid-sec-w-2025-1491 | Microsoft Office: Mehrere Schwachstellen | 2025-07-08T22:00:00.000+00:00 | 2025-07-22T22:00:00.000+00:00 |
| wid-sec-w-2025-0981 | SysAid Technologies Ltd SysAid: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2025-05-07T22:00:00.000+00:00 | 2025-07-22T22:00:00.000+00:00 |
| wid-sec-w-2025-1598 | Microsoft SharePoint (On-premises): Mehrere Schwachstellen | 2025-07-20T22:00:00.000+00:00 | 2025-07-21T22:00:00.000+00:00 |
| wid-sec-w-2025-1508 | Irfan Skiljan IrfanView CADImage Plugin: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-07-08T22:00:00.000+00:00 | 2025-07-21T22:00:00.000+00:00 |
| wid-sec-w-2025-1489 | Fortinet FortiWeb: Schwachstelle ermöglicht SQL Injection | 2025-07-08T22:00:00.000+00:00 | 2025-07-20T22:00:00.000+00:00 |
| wid-sec-w-2025-1585 | Internet Systems Consortium BIND: Mehrere Schwachstellen | 2025-07-16T22:00:00.000+00:00 | 2025-07-17T22:00:00.000+00:00 |
| wid-sec-w-2025-1402 | Cisco Identity Services Engine (ISE): Mehrere Schwachstellen | 2025-06-25T22:00:00.000+00:00 | 2025-07-16T22:00:00.000+00:00 |
| wid-sec-w-2025-1550 | Red Hat Enterprise Linux (LZ4): Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-07-14T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1490 | Fortinet FortiOS: Schwachstelle ermöglicht Codeausführung | 2025-07-08T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1365 | IBM QRadar SIEM: Mehrere Schwachstellen | 2025-06-19T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1271 | Linux Kernel: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen | 2025-06-09T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1167 | IBM DB2: Mehrere Schwachstellen | 2025-05-29T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1150 | Redis: Schwachstelle ermöglicht Denial of Service | 2025-05-27T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2025-1132 | OpenSSL: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-05-22T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2025-0938 | IBM DB2: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-05-05T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2025-0912 | IBM DB2: Schwachstelle ermöglicht Denial of Service | 2025-05-01T22:00:00.000+00:00 | 2025-07-15T22:00:00.000+00:00 |
| wid-sec-w-2024-3063 | SugarCRM Sugar Enterprise: Mehrere Schwachstellen | 2024-10-03T22:00:00.000+00:00 | 2025-07-14T22:00:00.000+00:00 |
| wid-sec-w-2025-1492 | Microsoft Azure Service Fabric und Monitor Agent: Mehrere Schwachstellen | 2025-07-08T22:00:00.000+00:00 | 2025-07-13T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:1795 | Red Hat Security Advisory: resource-agents security update | 2026-02-03T07:28:32+00:00 | 2026-02-19T14:37:32+00:00 |
| rhsa-2026:1600 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Container Release Update | 2026-01-29T19:41:57+00:00 | 2026-02-19T14:37:22+00:00 |
| rhsa-2025:19429 | Red Hat Security Advisory: Red Hat Enterprise Linux AI 1.5 (NVIDIA) | 2025-11-03T07:34:38+00:00 | 2026-02-19T14:37:02+00:00 |
| rhsa-2025:19427 | Red Hat Security Advisory: Red Hat Enterprise Linux AI 1.5 (AMD) | 2025-11-03T07:33:53+00:00 | 2026-02-19T14:37:00+00:00 |
| rhsa-2025:19430 | Red Hat Security Advisory: Red Hat Enterprise Linux AI 1.5 (NVIDIA) | 2025-11-03T07:35:00+00:00 | 2026-02-19T14:36:58+00:00 |
| rhsa-2025:19428 | Red Hat Security Advisory: Red Hat Enterprise Linux AI 1.5 (NVIDIA) | 2025-11-03T07:34:08+00:00 | 2026-02-19T14:36:57+00:00 |
| rhsa-2025:19426 | Red Hat Security Advisory: Red Hat Enterprise Linux AI 1.5 (NVIDIA) | 2025-11-03T07:33:45+00:00 | 2026-02-19T14:36:56+00:00 |
| rhsa-2025:19425 | Red Hat Security Advisory: Red Hat Enterprise Linux AI 1.5 (AMD) | 2025-11-03T07:33:42+00:00 | 2026-02-19T14:36:56+00:00 |
| rhsa-2025:19424 | Red Hat Security Advisory: Red Hat Enterprise Linux AI 1.5 (AMD) | 2025-11-03T07:33:10+00:00 | 2026-02-19T14:36:56+00:00 |
| rhsa-2025:19423 | Red Hat Security Advisory: Red Hat Enterprise Linux AI 1.5 (NVIDIA) | 2025-11-03T07:32:31+00:00 | 2026-02-19T14:36:56+00:00 |
| rhsa-2025:19422 | Red Hat Security Advisory: Red Hat Enterprise Linux AI 1.5 (Intel Gaudi) | 2025-11-03T07:30:56+00:00 | 2026-02-19T14:36:55+00:00 |
| rhsa-2025:19421 | Red Hat Security Advisory: Red Hat Enterprise Linux AI 1.5 (Intel Gaudi) | 2025-11-03T07:30:00+00:00 | 2026-02-19T14:36:55+00:00 |
| rhsa-2025:16524 | Red Hat Security Advisory: A Subscription Management tool for finding and reporting Red Hat product usage | 2025-09-23T19:28:34+00:00 | 2026-02-19T14:36:54+00:00 |
| rhsa-2025:16262 | Red Hat Security Advisory: python3 security update | 2025-09-22T01:17:47+00:00 | 2026-02-19T14:36:53+00:00 |
| rhsa-2025:16153 | Red Hat Security Advisory: python3 security update | 2025-09-18T07:56:44+00:00 | 2026-02-19T14:36:53+00:00 |
| rhsa-2025:16152 | Red Hat Security Advisory: python3.9 security update | 2025-09-18T07:56:08+00:00 | 2026-02-19T14:36:52+00:00 |
| rhsa-2025:16117 | Red Hat Security Advisory: python3 security update | 2025-09-17T17:59:11+00:00 | 2026-02-19T14:36:52+00:00 |
| rhsa-2025:16151 | Red Hat Security Advisory: python3 security update | 2025-09-18T07:55:09+00:00 | 2026-02-19T14:36:51+00:00 |
| rhsa-2025:16118 | Red Hat Security Advisory: python39:3.9 security update | 2025-09-17T17:59:12+00:00 | 2026-02-19T14:36:51+00:00 |
| rhsa-2025:16078 | Red Hat Security Advisory: python39:3.9 security update | 2025-09-17T14:45:21+00:00 | 2026-02-19T14:36:50+00:00 |
| rhsa-2025:16062 | Red Hat Security Advisory: python39:3.9 security update | 2025-09-17T14:27:11+00:00 | 2026-02-19T14:36:49+00:00 |
| rhsa-2025:16031 | Red Hat Security Advisory: python3.11 security update | 2025-09-17T05:27:10+00:00 | 2026-02-19T14:36:49+00:00 |
| rhsa-2025:16016 | Red Hat Security Advisory: python3.11 security update | 2025-09-16T19:30:24+00:00 | 2026-02-19T14:36:49+00:00 |
| rhsa-2025:16012 | Red Hat Security Advisory: python3.11 security update | 2025-09-16T18:01:55+00:00 | 2026-02-19T14:36:48+00:00 |
| rhsa-2025:15968 | Red Hat Security Advisory: python3 security update | 2025-09-16T14:49:39+00:00 | 2026-02-19T14:36:47+00:00 |
| rhsa-2025:15800 | Red Hat Security Advisory: python3.9 security update | 2025-09-15T14:24:25+00:00 | 2026-02-19T14:36:47+00:00 |
| rhsa-2025:15724 | Red Hat Security Advisory: python3.9 security update | 2025-09-15T01:26:54+00:00 | 2026-02-19T14:36:47+00:00 |
| rhsa-2025:15348 | Red Hat Security Advisory: python3.12 security update | 2025-09-04T13:09:46+00:00 | 2026-02-19T14:36:46+00:00 |
| rhsa-2025:14900 | Red Hat Security Advisory: python39:3.9 security update | 2025-08-28T17:04:37+00:00 | 2026-02-19T14:36:46+00:00 |
| rhsa-2025:15019 | Red Hat Security Advisory: python3.9 security update | 2025-09-02T06:08:54+00:00 | 2026-02-19T14:36:45+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-16-147-03 | Black Box AlertWerks ServSensor Credential Management Vulnerability | 2016-02-27T07:00:00.000000Z | 2025-06-05T21:43:04.061979Z |
| icsa-16-147-02 | Sixnet BT Series Hard-coded Credentials Vulnerability | 2016-02-27T07:00:00.000000Z | 2025-06-05T21:42:57.849367Z |
| icsa-16-147-01b | Environmental Systems Corporation Data Controllers Vulnerabilities | 2016-02-27T07:00:00.000000Z | 2025-06-05T21:42:45.384997Z |
| icsa-16-140-02 | Siemens SIPROTEC Information Disclosure Vulnerabilities (Update B) | 2016-02-20T07:00:00.000000Z | 2025-06-05T21:42:14.185644Z |
| icsa-16-140-01a | Resource Data Management Intuitive 650 TDB Controller Vulnerabilities (Update A) | 2016-02-20T07:00:00.000000Z | 2025-06-05T21:42:01.240546Z |
| icsa-16-138-01a | IRZ RUH2 3G Firmware Overwrite Vulnerability (Update A) | 2016-02-18T07:00:00.000000Z | 2025-06-05T21:41:55.027480Z |
| icsa-16-133-01a | Meteocontrol WEB'log Vulnerabilities (Update A) | 2016-02-13T07:00:00.000000Z | 2025-06-05T21:41:29.855368Z |
| icsa-16-131-01 | Panasonic FPWIN Pro Vulnerabilities | 2016-02-11T07:00:00.000000Z | 2025-06-05T21:41:04.960389Z |
| icsa-16-126-01 | KMC Controls Conquest BACnet Router Vulnerabilities | 2016-02-06T07:00:00.000000Z | 2025-06-05T21:40:52.513486Z |
| icsa-16-105-03 | Ecava IntegraXor Vulnerabilities | 2016-01-16T07:00:00.000000Z | 2025-06-05T21:40:02.682378Z |
| icsa-16-105-02 | Accuenergy Acuvim II Series AXM-NET Module Vulnerabilities | 2016-01-16T07:00:00.000000Z | 2025-06-05T21:39:50.227619Z |
| icsa-16-105-01 | Sierra Wireless ACEmanager Information Exposure Vulnerability | 2016-01-16T07:00:00.000000Z | 2025-06-05T21:39:44.005014Z |
| icsa-16-103-03c | Siemens Industrial Products DROWN Vulnerability (Update C) | 2016-01-14T07:00:00.000000Z | 2025-06-05T21:39:37.691594Z |
| icsa-16-103-02 | Siemens SCALANCE S613 Denial-of-Service Vulnerability | 2016-01-14T07:00:00.000000Z | 2025-06-05T21:39:31.467405Z |
| icsa-16-103-01c | Siemens Industrial Products glibc Library Vulnerability (Update C) | 2016-01-14T07:00:00.000000Z | 2025-06-05T21:39:25.169040Z |
| icsa-16-096-01 | Pro-face GP-Pro EX HMI Vulnerabilities | 2016-01-07T07:00:00.000000Z | 2025-06-05T21:39:00.224867Z |
| icsa-16-091-01 | ICONICS WebHMI Directory Traversal Vulnerability | 2016-01-02T07:00:00.000000Z | 2025-06-05T21:38:53.967020Z |
| icsa-16-084-01 | Cogent DataHub Elevation of Privilege Vulnerability | 2016-12-26T07:00:00.000000Z | 2025-06-05T21:38:47.730754Z |
| icsa-16-082-01a | Siemens APOGEE Insight Incorrect File Permissions Vulnerability (Update A) | 2016-12-24T07:00:00.000000Z | 2025-06-05T21:38:41.495940Z |
| icsa-16-077-01a | ABB Panel Builder 800 DLL Hijacking Vulnerability (Update A) | 2016-12-19T07:00:00.000000Z | 2025-06-05T21:38:35.243611Z |
| icsa-16-075-01 | Siemens SIMATIC S7-1200 CPU Protection Mechanism Failure | 2016-12-17T07:00:00.000000Z | 2025-06-05T21:38:29.015812Z |
| icsa-16-070-02a | Honeywell Uniformance PHD Denial Of Service (Update A) | 2016-12-12T07:00:00.000000Z | 2025-06-05T21:38:22.775325Z |
| icsa-16-070-01 | Schneider Electric Telvent RTU Improper Ethernet Frame Padding Vulnerability | 2016-12-12T07:00:00.000000Z | 2025-06-05T21:38:16.518332Z |
| icsa-16-063-01 | Moxa ioLogik E2200 Series Weak Authentication Practices | 2016-12-05T07:00:00.000000Z | 2025-06-05T21:38:04.104993Z |
| icsa-16-061-03 | Eaton Lighting Systems EG2 Web Control Authentication Bypass Vulnerabilities | 2016-12-03T07:00:00.000000Z | 2025-06-05T21:37:51.714610Z |
| icsa-16-061-02 | Rockwell Automation Allen-Bradley CompactLogix Reflective Cross-Site Scripting Vulnerability (Update A) | 2016-12-03T07:00:00.000000Z | 2025-06-05T21:37:45.425599Z |
| icsa-16-061-01 | Schneider Electric Building Operation Automation Server Vulnerability | 2016-12-03T07:00:00.000000Z | 2025-06-05T21:37:39.217752Z |
| icsa-16-056-01 | Rockwell Automation Integrated Architecture Builder Access Violation Memory Error | 2016-11-28T07:00:00.000000Z | 2025-06-05T21:37:32.767943Z |
| icsa-16-049-02a | AMX Multiple Products Credential Management Vulnerabilities (Update A) | 2016-11-21T07:00:00.000000Z | 2025-06-05T21:37:20.275376Z |
| icsa-16-049-01 | B+B SmartWorx VESP211 Authentication Bypass Vulnerability | 2016-11-21T07:00:00.000000Z | 2025-06-05T21:37:14.043505Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-npe-hardening-dkel83jp | Identifying and Mitigating Security Exposures When Using No Payload Encryption Images with Existing Cryptographic Configuration | 2023-01-18T16:00:00+00:00 | 2023-01-18T16:00:00+00:00 |
| cisco-sa-npe-hardening-Dkel83jP | Identifying and Mitigating Security Exposures When Using No Payload Encryption Images with Existing Cryptographic Configuration | 2023-01-18T16:00:00+00:00 | 2023-01-18T16:00:00+00:00 |
| cisco-sa-cucm-sql-rppczr8n | Cisco Unified Communications Manager SQL Injection Vulnerability | 2023-01-18T16:00:00+00:00 | 2023-01-18T16:00:00+00:00 |
| cisco-sa-cucm-sql-rpPczR8n | Cisco Unified Communications Manager SQL Injection Vulnerability | 2023-01-18T16:00:00+00:00 | 2023-01-18T16:00:00+00:00 |
| cisco-sa-expressway-filewrite-bsfvwuev | Cisco Expressway Series and Cisco TelePresence Video Communication Server Vulnerabilities | 2022-05-18T16:00:00+00:00 | 2023-01-17T20:24:01+00:00 |
| cisco-sa-expressway-filewrite-bsFVwueV | Cisco Expressway Series and Cisco TelePresence Video Communication Server Vulnerabilities | 2022-05-18T16:00:00+00:00 | 2023-01-17T20:24:01+00:00 |
| cisco-sa-sb-rv-rcedos-7hjp74jd | Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers Remote Code Execution and Denial of Service Vulnerability | 2023-01-11T16:00:00+00:00 | 2023-01-12T16:07:37+00:00 |
| cisco-sa-sb-rv-rcedos-7HjP74jD | Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers Remote Code Execution and Denial of Service Vulnerability | 2023-01-11T16:00:00+00:00 | 2023-01-12T16:07:37+00:00 |
| cisco-sa-rv-cmd-exe-n47kjqle | Cisco Small Business RV160 and RV260 Series VPN Routers Remote Command Execution Vulnerability | 2023-01-11T16:00:00+00:00 | 2023-01-11T16:00:00+00:00 |
| cisco-sa-rv-cmd-exe-n47kJQLE | Cisco Small Business RV160 and RV260 Series VPN Routers Remote Command Execution Vulnerability | 2023-01-11T16:00:00+00:00 | 2023-01-11T16:00:00+00:00 |
| cisco-sa-lldp-memlk-mcoecpt | Cisco Webex Room Phone and Cisco Webex Share Link Layer Discovery Protocol Memory Leak Vulnerability | 2023-01-11T16:00:00+00:00 | 2023-01-11T16:00:00+00:00 |
| cisco-sa-lldp-memlk-McOecPT | Cisco Webex Room Phone and Cisco Webex Share Link Layer Discovery Protocol Memory Leak Vulnerability | 2023-01-11T16:00:00+00:00 | 2023-01-11T16:00:00+00:00 |
| cisco-sa-ip-phone-auth-bypass-psqxzrpr | Cisco IP Phone 7800 and 8800 Series Web Management Interface Authentication Bypass Vulnerability | 2023-01-11T16:00:00+00:00 | 2023-01-11T16:00:00+00:00 |
| cisco-sa-ip-phone-auth-bypass-pSqxZRPR | Cisco IP Phone 7800 and 8800 Series Web Management Interface Authentication Bypass Vulnerability | 2023-01-11T16:00:00+00:00 | 2023-01-11T16:00:00+00:00 |
| cisco-sa-ind-fzyvjjtg | Cisco Industrial Network Director Vulnerabilities | 2023-01-11T16:00:00+00:00 | 2023-01-11T16:00:00+00:00 |
| cisco-sa-ind-fZyVjJtG | Cisco Industrial Network Director Vulnerabilities | 2023-01-11T16:00:00+00:00 | 2023-01-11T16:00:00+00:00 |
| cisco-sa-cxagent-goq9qjqz | Cisco CX Cloud Agent Privilege Escalation Vulnerabilities | 2023-01-11T16:00:00+00:00 | 2023-01-11T16:00:00+00:00 |
| cisco-sa-cxagent-gOq9QjqZ | Cisco CX Cloud Agent Privilege Escalation Vulnerabilities | 2023-01-11T16:00:00+00:00 | 2023-01-11T16:00:00+00:00 |
| cisco-sa-bw-xss-ezqdxqg4 | Cisco BroadWorks Application Delivery Platform, Application Server, and Xtended Services Platform Cross-Site Scripting Vulnerability | 2023-01-11T16:00:00+00:00 | 2023-01-11T16:00:00+00:00 |
| cisco-sa-bw-xss-EzqDXqG4 | Cisco BroadWorks Application Delivery Platform, Application Server, and Xtended Services Platform Cross-Site Scripting Vulnerability | 2023-01-11T16:00:00+00:00 | 2023-01-11T16:00:00+00:00 |
| cisco-sa-20170927-profinet | Cisco IOS Software for Cisco Industrial Ethernet Switches PROFINET Denial of Service Vulnerability | 2017-09-27T16:00:00+00:00 | 2022-12-17T05:54:03+00:00 |
| cisco-sa-20170927-dhcp | Cisco IOS and IOS XE Software DHCP Remote Code Execution Vulnerability | 2017-09-27T16:00:00+00:00 | 2022-12-17T05:51:12+00:00 |
| cisco-sa-20170927-ike | Cisco IOS and IOS XE Software Internet Key Exchange Denial of Service Vulnerability | 2017-09-27T16:00:00+00:00 | 2022-12-17T05:27:48+00:00 |
| cisco-sa-20170927-rbip-dos | Cisco IOS Software for Cisco Integrated Services Routers Generation 2 Denial of Service Vulnerability | 2017-09-27T16:00:00+00:00 | 2022-12-17T04:17:58+00:00 |
| cisco-sa-20171103-bgp | Cisco IOS XE Software Ethernet Virtual Private Network Border Gateway Protocol Denial of Service Vulnerability | 2017-11-03T16:00:00+00:00 | 2022-12-16T21:17:38+00:00 |
| cisco-sa-20170927-nat | Cisco IOS Software Network Address Translation Denial of Service Vulnerability | 2017-09-27T16:00:00+00:00 | 2022-12-16T21:17:38+00:00 |
| cisco-sa-20170927-cip | Cisco IOS Software Common Industrial Protocol Request Denial of Service Vulnerabilities | 2017-09-27T16:00:00+00:00 | 2022-12-16T21:17:37+00:00 |
| cisco-sa-20180328-dhcpr3 | Cisco IOS and IOS XE Software DHCP Version 4 Relay Denial of Service Vulnerability | 2018-03-28T16:00:00+00:00 | 2022-12-15T22:19:57+00:00 |
| cisco-sa-20180328-ike-dos | Cisco IOS and IOS XE Software Internet Key Exchange Version 1 Denial of Service Vulnerability | 2018-03-28T16:00:00+00:00 | 2022-12-15T22:19:56+00:00 |
| cisco-sa-20180328-dos | Cisco IOS Software Integrated Services Module for VPN Denial of Service Vulnerability | 2018-03-28T16:00:00+00:00 | 2022-12-15T22:19:54+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-59529 | simple protocol server ignores accepts unlimited connections and logs failures without limit | 2025-12-02T00:00:00.000Z | 2026-02-18T02:00:05.000Z |
| msrc_cve-2023-51764 | Postfix through 3.8.5 allows SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking (or certain other options that exist in recent versions). Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address allowing bypass of an SPF protection mechanism. This occurs because Postfix supports <LF>.<CR><LF> but some other popular e-mail servers do not. To prevent attack variants (by always disallowing <LF> without <CR>) a different solution is required such as the smtpd_forbid_bare_newline=yes option with a Postfix minimum version of 3.5.23 3.6.13 3.7.9 3.8.4 or 3.9. | 2023-12-01T08:00:00.000Z | 2026-02-18T02:00:04.000Z |
| msrc_cve-2024-49992 | drm/stm: Avoid use-after-free issues with crtc and plane | 2024-10-01T07:00:00.000Z | 2026-02-18T02:00:01.000Z |
| msrc_cve-2025-38068 | crypto: lzo - Fix compression buffer overrun | 2025-06-02T00:00:00.000Z | 2026-02-18T01:59:57.000Z |
| msrc_cve-2024-25176 | LuaJIT through 2.1 and OpenRusty luajit2 before v2.1-20240626 have a stack-buffer-overflow in lj_strfmt_wfnum in lj_strfmt_num.c. | 2025-07-02T00:00:00.000Z | 2026-02-18T01:59:57.000Z |
| msrc_cve-2025-21867 | bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type() | 2025-03-02T00:00:00.000Z | 2026-02-18T01:59:55.000Z |
| msrc_cve-2025-38158 | hisi_acc_vfio_pci: fix XQE dma address error | 2025-07-02T00:00:00.000Z | 2026-02-18T01:59:52.000Z |
| msrc_cve-2024-47671 | USB: usbtmc: prevent kernel-usb-infoleak | 2024-10-01T07:00:00.000Z | 2026-02-18T01:59:37.000Z |
| msrc_cve-2023-50966 | erlang-jose (aka JOSE for Erlang and Elixir) through 1.11.6 allow attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value in a JOSE header. | 2024-03-02T08:00:00.000Z | 2026-02-18T01:59:29.000Z |
| msrc_cve-2024-37371 | In MIT Kerberos 5 (aka krb5) before 1.21.3 an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields. | 2024-06-02T07:00:00.000Z | 2026-02-18T01:59:17.000Z |
| msrc_cve-2025-22058 | udp: Fix memory accounting leak. | 2025-04-02T00:00:00.000Z | 2026-02-18T01:59:09.000Z |
| msrc_cve-2024-4068 | Memory Exhaustion in braces | 2024-05-02T07:00:00.000Z | 2026-02-18T01:59:05.000Z |
| msrc_cve-2025-27363 | An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild. | 2025-03-02T00:00:00.000Z | 2026-02-18T01:59:01.000Z |
| msrc_cve-2025-7339 | on-headers vulnerable to http response header manipulation | 2025-07-02T00:00:00.000Z | 2026-02-18T01:58:55.000Z |
| msrc_cve-2022-50230 | arm64: set UXN on swapper page tables | 2025-06-02T00:00:00.000Z | 2026-02-18T01:58:55.000Z |
| msrc_cve-2025-38103 | HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse() | 2025-07-02T00:00:00.000Z | 2026-02-18T01:58:54.000Z |
| msrc_cve-2024-49969 | drm/amd/display: Fix index out of bounds in DCN30 color transformation | 2024-10-01T07:00:00.000Z | 2026-02-18T01:58:31.000Z |
| msrc_cve-2023-51714 | An issue was discovered in the HTTP2 implementation in Qt before 5.15.17 6.x before 6.2.11 6.3.x through 6.5.x before 6.5.4 and 6.6.x before 6.6.2. network/access/http2/hpacktable.cpp has an incorrect HPack integer overflow check. | 2023-12-01T08:00:00.000Z | 2026-02-18T01:58:25.000Z |
| msrc_cve-2024-56596 | jfs: fix array-index-out-of-bounds in jfs_readdir | 2024-12-02T00:00:00.000Z | 2026-02-18T01:58:18.000Z |
| msrc_cve-2024-47739 | padata: use integer wrap around to prevent deadlock on seq_nr overflow | 2024-10-01T07:00:00.000Z | 2026-02-18T01:58:05.000Z |
| msrc_cve-2025-21941 | drm/amd/display: Fix null check for pipe_ctx->plane_state in resource_build_scaling_params | 2025-04-02T00:00:00.000Z | 2026-02-18T01:58:00.000Z |
| msrc_cve-2024-58083 | KVM: Explicitly verify target vCPU is online in kvm_get_vcpu() | 2025-03-02T00:00:00.000Z | 2026-02-18T01:57:57.000Z |
| msrc_cve-2024-31852 | LLVM before 18.1.3 generates code in which the LR register can be overwritten without data being saved to the stack and thus there can sometimes be an exploitable error in the flow of control. This affects the ARM backend and can be demonstrated with Clang. NOTE: the vendor perspective is "we don't have strong objections for a CVE to be created ... It does seem that the likelihood of this miscompile enabling an exploit remains very low because the miscompile resulting in this JOP gadget is such that the function is most likely to crash on most valid inputs to the function. So if this function is covered by any testing the miscompile is most likely to be discovered before the binary is shipped to production." | 2024-04-02T07:00:00.000Z | 2026-02-18T01:57:57.000Z |
| msrc_cve-2025-38145 | soc: aspeed: Add NULL check in aspeed_lpc_enable_snoop() | 2025-07-02T00:00:00.000Z | 2026-02-18T01:57:55.000Z |
| msrc_cve-2025-37878 | perf/core: Fix WARN_ON(!ctx) in __free_event() for partial init | 2025-05-02T00:00:00.000Z | 2026-02-18T01:57:50.000Z |
| msrc_cve-2025-58754 | Axios is vulnerable to DoS attack through lack of data size check | 2025-09-02T00:00:00.000Z | 2026-02-18T01:57:35.000Z |
| msrc_cve-2024-37370 | In MIT Kerberos 5 (aka krb5) before 1.21.3 an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token causing the unwrapped token to appear truncated to the application. | 2024-06-02T07:00:00.000Z | 2026-02-18T01:57:29.000Z |
| msrc_cve-2025-38039 | net/mlx5e: Avoid WARN_ON when configuring MQPRIO with HTB offload enabled | 2025-06-02T00:00:00.000Z | 2026-02-18T01:57:16.000Z |
| msrc_cve-2023-30589 | The llhttp parser in the http module in Node v20.2.0 does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS). The CR character (without LF) is sufficient to delimit HTTP header fields in the llhttp parser. According to RFC7230 section 3 only the CRLF sequence should delimit each header-field. This impacts all Node.js active versions: v16 v18 and v20 | 2023-06-01T07:00:00.000Z | 2026-02-18T01:57:15.000Z |
| msrc_cve-2024-36013 | Bluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect() | 2024-05-02T07:00:00.000Z | 2026-02-18T01:56:59.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2025:15204-1 | MozillaThunderbird-128.11.1-2.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15203-1 | MozillaFirefox-139.0.4-1.1 on GA media | 2025-07-03T00:00:00Z | 2025-07-03T00:00:00Z |
| opensuse-su-2025:15202-1 | python311-selenium-4.25.0-5.1 on GA media | 2025-06-04T00:00:00Z | 2025-06-04T00:00:00Z |
| opensuse-su-2025:15201-1 | python311-nh3-0.2.17-2.1 on GA media | 2025-06-04T00:00:00Z | 2025-06-04T00:00:00Z |
| opensuse-su-2025:15200-1 | haproxy-3.2.0+git0.e134140d2-2.1 on GA media | 2025-06-04T00:00:00Z | 2025-06-04T00:00:00Z |
| opensuse-su-2025:15199-1 | perl-Crypt-OpenSSL-RSA-0.350.0-1.1 on GA media | 2025-06-03T00:00:00Z | 2025-06-03T00:00:00Z |
| opensuse-su-2025:15198-1 | assimp-devel-6.0.1-1.1 on GA media | 2025-06-03T00:00:00Z | 2025-06-03T00:00:00Z |
| opensuse-su-2025:15197-1 | apache2-mod_security2-2.9.10-1.1 on GA media | 2025-06-03T00:00:00Z | 2025-06-03T00:00:00Z |
| opensuse-su-2025:15196-1 | MozillaFirefox-139.0.1-1.1 on GA media | 2025-06-03T00:00:00Z | 2025-06-03T00:00:00Z |
| opensuse-su-2025:15195-1 | golang-github-v2fly-v2ray-core-5.33.0-1.1 on GA media | 2025-06-02T00:00:00Z | 2025-06-02T00:00:00Z |
| opensuse-su-2025:15194-1 | sslh-2.2.4-1.1 on GA media | 2025-06-02T00:00:00Z | 2025-06-02T00:00:00Z |
| opensuse-su-2025:15193-1 | golang-github-teddysun-v2ray-plugin-5.25.0-1.1 on GA media | 2025-06-02T00:00:00Z | 2025-06-02T00:00:00Z |
| opensuse-su-2025:15192-1 | python39-3.9.22-3.1 on GA media | 2025-06-02T00:00:00Z | 2025-06-02T00:00:00Z |
| opensuse-su-2025:15191-1 | python311-3.11.12-4.1 on GA media | 2025-06-02T00:00:00Z | 2025-06-02T00:00:00Z |
| opensuse-su-2025:15190-1 | python310-3.10.17-4.1 on GA media | 2025-06-02T00:00:00Z | 2025-06-02T00:00:00Z |
| opensuse-su-2025:15189-1 | libsoup-2_4-1-2.74.3-11.1 on GA media | 2025-06-01T00:00:00Z | 2025-06-01T00:00:00Z |
| opensuse-su-2025:15188-1 | govulncheck-vulndb-0.0.20250529T205903-1.1 on GA media | 2025-06-01T00:00:00Z | 2025-06-01T00:00:00Z |
| opensuse-su-2025:15187-1 | perl-Net-Dropbox-API-1.900.0-2.1 on GA media | 2025-05-31T00:00:00Z | 2025-05-31T00:00:00Z |
| opensuse-su-2025:15186-1 | openbao-2.2.2-1.1 on GA media | 2025-05-31T00:00:00Z | 2025-05-31T00:00:00Z |
| opensuse-su-2025:15185-1 | libsoup-3_0-0-3.6.5-5.1 on GA media | 2025-05-31T00:00:00Z | 2025-05-31T00:00:00Z |
| opensuse-su-2025:15184-1 | pluto-5.21.7-1.1 on GA media | 2025-05-30T00:00:00Z | 2025-05-30T00:00:00Z |
| opensuse-su-2025:15183-1 | libopenssl-3-devel-3.5.0-3.1 on GA media | 2025-05-30T00:00:00Z | 2025-05-30T00:00:00Z |
| opensuse-su-2025:15182-1 | nodejs-electron-35.5.0-1.1 on GA media | 2025-05-30T00:00:00Z | 2025-05-30T00:00:00Z |
| opensuse-su-2025:15181-1 | kea-2.6.3-1.1 on GA media | 2025-05-30T00:00:00Z | 2025-05-30T00:00:00Z |
| opensuse-su-2025:15180-1 | icinga2-2.14.6-1.1 on GA media | 2025-05-30T00:00:00Z | 2025-05-30T00:00:00Z |
| opensuse-su-2025:15179-1 | govulncheck-vulndb-0.0.20250527T204717-1.1 on GA media | 2025-05-30T00:00:00Z | 2025-05-30T00:00:00Z |
| opensuse-su-2025:15178-1 | golang-github-prometheus-alertmanager-0.28.1-2.1 on GA media | 2025-05-30T00:00:00Z | 2025-05-30T00:00:00Z |
| opensuse-su-2025:15177-1 | ffmpeg-7-7.1.1-4.1 on GA media | 2025-05-30T00:00:00Z | 2025-05-30T00:00:00Z |
| opensuse-su-2025:15176-1 | curl-8.14.0-1.1 on GA media | 2025-05-30T00:00:00Z | 2025-05-30T00:00:00Z |
| opensuse-su-2025:15175-1 | apache-commons-beanutils-1.11.0-1.1 on GA media | 2025-05-30T00:00:00Z | 2025-05-30T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2023-726 | Heap-buffer-overflow in Flow::dissectNetBIOS | 2023-08-23T14:02:47.143481Z | 2023-08-23T14:02:47.143744Z |
| osv-2023-723 | Heap-buffer-overflow in H5MM_memcpy | 2023-08-22T14:03:07.334340Z | 2023-08-22T14:03:07.334606Z |
| osv-2023-721 | Stack-buffer-overflow in crc24q_check | 2023-08-21T14:02:51.271773Z | 2023-08-21T14:02:51.272060Z |
| osv-2023-719 | Security exception in org.apache.commons.jxpath.ri.compiler.CoreFunction.toString | 2023-08-21T14:02:38.497581Z | 2023-08-21T14:02:38.497866Z |
| osv-2023-709 | Heap-buffer-overflow in QOIHandler::read | 2023-08-18T14:02:53.146275Z | 2023-08-20T14:15:45.069773Z |
| osv-2023-705 | Security exception in org.apache.lucene.util.automaton.RegExp.toAutomaton | 2023-08-17T14:00:59.717535Z | 2023-08-19T14:26:28.816770Z |
| osv-2021-367 | Heap-buffer-overflow in H5MM_memcpy | 2021-02-11T00:00:57.089990Z | 2023-08-19T14:11:01.241936Z |
| osv-2021-218 | Heap-buffer-overflow in H5F_addr_decode_len | 2021-01-22T00:00:16.221512Z | 2023-08-19T14:10:58.688694Z |
| osv-2023-714 | Security exception in org.apache.poi.ddf.EscherContainerRecord.fillFields | 2023-08-19T14:02:15.130219Z | 2023-08-19T14:02:15.130475Z |
| osv-2023-710 | Heap-buffer-overflow in Flow::dissectMDNS | 2023-08-19T14:00:12.746394Z | 2023-08-19T14:00:12.746652Z |
| osv-2023-640 | Stack-buffer-overflow in initialize_encryption_key | 2023-08-04T14:00:55.352181Z | 2023-08-17T14:21:56.675468Z |
| osv-2023-697 | Heap-buffer-overflow in IEC104Stats::processPacket | 2023-08-15T14:01:02.977387Z | 2023-08-15T14:01:02.977646Z |
| osv-2023-696 | Security exception in org.apache.lucene.analysis.tokenattributes.CharTermAttributeImpl.clone | 2023-08-14T14:00:47.094365Z | 2023-08-14T14:00:47.094611Z |
| osv-2023-693 | Security exception in org.json.JSONArray.writeTo | 2023-08-13T14:00:24.146135Z | 2023-08-13T14:00:24.146368Z |
| osv-2023-356 | Heap-buffer-overflow in pdf_nextobject | 2023-04-30T14:03:00.823786Z | 2023-08-12T14:21:32.402904Z |
| osv-2023-689 | Use-of-uninitialized-value | 2023-08-12T14:02:14.530750Z | 2023-08-12T14:02:14.531027Z |
| osv-2023-688 | Invalid-free in Flow::~Flow | 2023-08-12T14:00:58.558753Z | 2023-08-12T14:00:58.559035Z |
| osv-2023-684 | Heap-use-after-free in __xmlRaiseError | 2023-08-11T14:02:03.986718Z | 2023-08-11T14:02:03.986997Z |
| osv-2023-680 | Security exception in org.apache.poi.hdgf.streams.PointerContainingStream.findChildren | 2023-08-11T14:00:29.963332Z | 2023-08-11T14:00:29.963569Z |
| osv-2023-674 | Heap-buffer-overflow in get_grouplength | 2023-08-09T14:02:09.770996Z | 2023-08-09T14:02:09.771217Z |
| osv-2023-673 | Heap-buffer-overflow in match | 2023-08-09T14:01:09.834447Z | 2023-08-09T14:01:09.834676Z |
| osv-2023-665 | Security exception in org.apache.poi.hdgf.streams.PointerContainingStream.findChildren | 2023-08-08T14:02:01.481029Z | 2023-08-08T14:02:01.481263Z |
| osv-2023-663 | Segv on unknown address in decUnitCompare | 2023-08-08T14:00:59.624933Z | 2023-08-08T14:00:59.625154Z |
| osv-2023-662 | Security exception in org.apache.commons.io.IOUtils.byteArray | 2023-08-08T14:00:57.801101Z | 2023-08-08T14:00:57.801377Z |
| osv-2023-660 | Security exception in org.apache.poi.hwpf.model.StyleSheet.createPap | 2023-08-08T14:00:31.168112Z | 2023-08-08T14:00:31.168352Z |
| osv-2022-134 | Heap-use-after-free in RDKit::Chirality::cleanupStereoGroups | 2022-02-10T00:00:40.784389Z | 2023-08-07T14:12:28.790532Z |
| osv-2023-455 | Heap-buffer-overflow in bit_TV_to_utf8 | 2023-06-05T14:00:16.339269Z | 2023-08-05T14:19:01.096560Z |
| osv-2023-617 | Security exception in com.puppycrawl.tools.checkstyle.grammar.java.JavaLanguageParser.expr | 2023-07-27T14:00:51.420632Z | 2023-08-04T14:17:57.934642Z |
| osv-2023-645 | Segv on unknown address in decUnitCompare | 2023-08-04T14:02:38.270949Z | 2023-08-04T14:02:38.271192Z |
| osv-2022-1280 | Heap-buffer-overflow in Canvas5Structure::NIBDecoder::decode | 2023-08-04T14:00:41.927304Z | 2023-08-04T14:00:41.927544Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2025-2937 | Inefficient Regular Expression Complexity in GitLab | 2025-08-18T08:33:51.319Z | 2025-08-18T08:35:59.174Z |
| bit-gitlab-2025-2614 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-08-18T08:33:45.566Z | 2025-08-18T08:35:59.174Z |
| bit-gitlab-2025-2498 | Insufficient Granularity of Access Control in GitLab | 2025-08-18T08:33:37.870Z | 2025-08-18T08:35:59.174Z |
| bit-gitlab-2025-1477 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-08-18T08:33:11.173Z | 2025-08-18T08:35:59.174Z |
| bit-gitlab-2024-12303 | Incorrect Privilege Assignment in GitLab | 2025-08-18T08:28:02.622Z | 2025-08-18T08:35:59.174Z |
| bit-gitlab-2024-10383 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab VSCode Fork | 2025-02-11T07:26:57.802Z | 2025-08-18T08:35:59.174Z |
| bit-gitlab-2024-10219 | Incorrect Authorization in GitLab | 2025-08-18T08:27:32.914Z | 2025-08-18T08:35:59.174Z |
| bit-vault-2025-4166 | Vault May Include Sensitive Data in Error Logs When Using the KV v2 Plugin | 2025-05-07T05:56:55.608Z | 2025-08-13T06:08:53.695Z |
| bit-vault-2025-3879 | Vault’s Azure Authentication Method bound_location Restriction Could be Bypassed on Login | 2025-05-07T05:56:52.014Z | 2025-08-13T06:08:53.695Z |
| bit-gitlab-2025-5982 | Insufficient Granularity of Access Control in GitLab | 2025-06-14T06:15:34.466Z | 2025-08-13T06:08:53.695Z |
| bit-gitlab-2025-5846 | Missing Authorization in GitLab | 2025-06-30T15:16:31.446Z | 2025-08-13T06:08:53.695Z |
| bit-gitlab-2025-5121 | Missing Authorization in GitLab | 2025-06-24T15:15:54.671Z | 2025-08-13T06:08:53.695Z |
| bit-gitlab-2025-2938 | Business Logic Errors in GitLab | 2025-06-30T15:16:20.004Z | 2025-08-13T06:08:53.695Z |
| bit-gitlab-2025-2443 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2025-06-24T15:15:42.090Z | 2025-08-13T06:08:53.695Z |
| bit-gitlab-2025-2255 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2025-03-29T07:10:19.692Z | 2025-08-13T06:08:53.695Z |
| bit-gitlab-2025-2242 | Incorrect Authorization in GitLab | 2025-03-29T07:10:26.493Z | 2025-08-13T06:08:53.695Z |
| bit-gitlab-2025-0811 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2025-03-29T07:11:18.091Z | 2025-08-13T06:08:53.695Z |
| bit-gitlab-2024-9773 | Improper Neutralization of Special Elements used in a Command ('Command Injection') in GitLab | 2025-03-29T07:12:34.592Z | 2025-08-13T06:08:53.695Z |
| bit-gitlab-2024-7586 | Insertion of Sensitive Information into Log File in GitLab | 2025-06-24T15:13:54.274Z | 2025-08-13T06:08:53.695Z |
| bit-gitlab-2024-4025 | Inefficient Regular Expression Complexity in GitLab | 2025-06-24T15:12:39.853Z | 2025-08-13T06:08:53.695Z |
| bit-gitlab-2024-12619 | Insufficient Granularity of Access Control in GitLab | 2025-04-01T08:16:40.753Z | 2025-08-13T06:08:53.695Z |
| bit-gitlab-2024-10307 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-04-01T08:18:31.847Z | 2025-08-13T06:08:53.695Z |
| bit-moodle-2025-26530 | Reflected XSS via question bank filter | 2025-08-12T05:51:56.886Z | 2025-08-12T06:09:16.254Z |
| bit-libpython-2025-4517 | Arbitrary writes via tarfile realpath overflow | 2025-08-11T13:53:16.345Z | 2025-08-11T14:19:40.295Z |
| bit-libpython-2025-4516 | Use-after-free in "unicode_escape" decoder with error handler | 2025-08-11T13:53:13.759Z | 2025-08-11T14:19:40.295Z |
| bit-libpython-2025-4435 | Tarfile extracts filtered members when errorlevel=0 | 2025-08-11T13:53:11.552Z | 2025-08-11T14:19:40.295Z |
| bit-libpython-2025-4330 | Extraction filter bypass for linking outside extraction directory | 2025-08-11T13:53:09.546Z | 2025-08-11T14:19:40.295Z |
| bit-libpython-2025-4138 | Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory | 2025-08-11T13:53:07.492Z | 2025-08-11T14:19:40.295Z |
| bit-libpython-2024-12718 | Bypass extraction filter to modify file metadata outside extraction directory | 2025-08-11T13:52:42.384Z | 2025-08-11T14:19:40.295Z |
| bit-libpython-2024-12254 | Unbounded memory buffering in SelectorSocketTransport.writelines() | 2025-08-11T13:52:40.569Z | 2025-08-11T14:19:40.295Z |
| ID | Description | Updated |
|---|---|---|
| var-200807-0659 | ipnat in IP Filter in Sun Solaris 10 and OpenSolaris before snv_96, when running on a DNS… | 2024-07-23T20:10:45.133000Z |
| var-200704-0225 | Buffer overflow in the AirPortDriver module for AirPort in Apple Mac OS X 10.3.9 through … | 2024-07-23T20:10:45.084000Z |
| var-201006-1188 | Buffer overflow in pngpread.c in libpng before 1.2.44 and 1.4.x before 1.4.3, as used in … | 2024-07-23T20:10:35.248000Z |
| var-201711-0445 | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari be… | 2024-07-23T20:10:30.264000Z |
| var-201511-0037 | The xmlParseConditionalSections function in parser.c in libxml2 does not properly skip in… | 2024-07-23T20:10:29.538000Z |
| var-200901-0719 | Use-after-free vulnerability in the garbage-collection implementation in WebCore in WebKi… | 2024-07-23T20:10:28.318000Z |
| var-200609-1080 | WebKit in Apple Mac OS X 10.3.x through 10.3.9 and 10.4 through 10.4.8 allows remote atta… | 2024-07-23T20:10:27.537000Z |
| var-200703-0020 | Stack-based buffer overflow in Apple Mac OS X 10.3.9 and 10.4 through 10.4.8 allows remot… | 2024-07-23T20:10:24.518000Z |
| var-201411-0450 | parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when ent… | 2024-07-23T20:10:22.216000Z |
| var-201806-1469 | An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS bef… | 2024-07-23T20:09:50.388000Z |
| var-201211-0168 | Use-after-free vulnerability in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0… | 2024-07-23T20:09:49.294000Z |
| var-201812-0273 | Perl before 5.26.3 has a buffer over-read via a crafted regular expression that triggers … | 2024-07-23T20:09:48.925000Z |
| var-201912-0508 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:09:18.614000Z |
| var-201001-0654 | The Linux kernel before 2.6.32.4 allows local users to gain privileges or cause a denial … | 2024-07-23T20:08:47.142000Z |
| var-202203-0034 | A carefully crafted request body can cause a read to a random memory area which could cau… | 2024-07-23T20:08:45.595000Z |
| var-201508-0365 | The xmlreader in libxml allows remote attackers to cause a denial of service (memory cons… | 2024-07-23T20:08:45.504000Z |
| var-202109-0747 | A vulnerability in the TrustSec CLI parser of Cisco IOS and Cisco IOS XE Software could a… | 2024-07-23T20:08:29.365000Z |
| var-201912-0593 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:08:16.158000Z |
| var-200407-0196 | Floating point information leak in the context switch code for Linux 2.4.x only checks th… | 2024-07-23T20:08:16.659000Z |
| var-200704-0224 | Heap-based buffer overflow in the VideoConference framework in Apple Mac OS X 10.3.9 thro… | 2024-07-23T20:08:14.670000Z |
| var-202203-0072 | Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are e… | 2024-07-23T20:08:13.500000Z |
| var-200706-0660 | cache_util.c in the mod_cache module in Apache HTTP Server (httpd), when caching is enabl… | 2024-07-23T20:08:13.677000Z |
| var-200512-0212 | Perl in Apple Mac OS X Server 10.3.9 does not properly drop privileges when using the "$<… | 2024-07-23T20:08:00.279000Z |
| var-200704-0216 | Integer overflow in the RPC library in Libinfo in Apple Mac OS X 10.3.9 through 10.4.9 al… | 2024-07-23T20:07:26.135000Z |
| var-201107-0097 | Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGra… | 2024-07-23T20:07:25.589000Z |
| var-201912-1863 | Multiple memory corruption issues were addressed with improved memory handling. This issu… | 2024-07-23T20:07:23.498000Z |
| var-201302-0303 | Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on … | 2024-07-23T20:07:23.926000Z |
| var-201302-0232 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T20:07:23.855000Z |
| var-201210-0144 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java … | 2024-07-23T20:07:23.613000Z |
| var-200809-0194 | VideoConference in Apple Mac OS X 10.4.11 and 10.5 through 10.5.4 allows remote attackers… | 2024-07-23T20:07:23.438000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2020-006586 | Server Side Request Forgery Vulnerability in Hitachi Ops Center Analyzer viewpoint | 2020-07-13T14:25+09:00 | 2020-07-13T14:25+09:00 |
| jvndb-2020-006469 | Multiple vulnerabilities in TCP/IP function on Mitsubishi Electric GOT2000 series | 2020-07-09T15:46+09:00 | 2020-07-09T15:46+09:00 |
| jvndb-2020-000045 | SHIRASAGI vulnerable to open redirect | 2020-07-09T15:08+09:00 | 2020-07-09T15:08+09:00 |
| jvndb-2020-000043 | Android App "Mercari" (Japan version) vulnerable to arbitrary method execution of the Java object | 2020-07-08T16:04+09:00 | 2020-07-08T16:04+09:00 |
| jvndb-2020-000042 | Multiple vulnerabilities in Cybozu Garoon | 2020-06-29T16:17+09:00 | 2020-06-29T16:17+09:00 |
| jvndb-2020-006031 | DoS Vulnerability in Hitachi Device Manager | 2020-06-29T12:25+09:00 | 2020-06-29T12:25+09:00 |
| jvndb-2019-000056 | Panasonic Video Insight VMS vulnerable to SQL injection | 2019-09-02T13:57+09:00 | 2020-06-26T12:27+09:00 |
| jvndb-2020-000032 | Panasonic Video Insight VMS vulnerable to arbitrary code execution | 2020-05-19T16:04+09:00 | 2020-06-26T12:19+09:00 |
| jvndb-2020-000040 | Chrome Extension for e-Tax Reception System vulnerable to arbitrary command execution | 2020-06-24T14:25+09:00 | 2020-06-24T14:25+09:00 |
| jvndb-2020-005854 | Mitsubishi Electric MELSEC iQ-R, iQ-F, Q, L, and FX series vulnerable to cleartext transmission of sensitive information | 2020-06-24T10:32+09:00 | 2020-06-24T10:32+09:00 |
| jvndb-2020-005743 | Vulnerability in Cosminexus HTTP Server | 2020-06-22T15:40+09:00 | 2020-06-22T15:40+09:00 |
| jvndb-2020-000039 | EC-CUBE vulnerable to directory traversal | 2020-06-18T13:48+09:00 | 2020-06-18T13:48+09:00 |
| jvndb-2020-005443 | Path Traversal Vulnerability in Hitachi Automation Director and Hitachi Ops Center Automator | 2020-06-15T16:29+09:00 | 2020-06-15T16:29+09:00 |
| jvndb-2020-000038 | Multiple vulnerabilities in Zenphoto | 2020-06-11T17:17+09:00 | 2020-06-11T17:17+09:00 |
| jvndb-2020-000037 | Multiple SONY Wireless Headphones allow improper Bluetooth pairing | 2020-06-09T15:49+09:00 | 2020-06-09T15:49+09:00 |
| jvndb-2020-000036 | XACK DNS vulnerable to denial-of-service (DoS) | 2020-06-05T15:16+09:00 | 2020-06-05T15:16+09:00 |
| jvndb-2020-000035 | Multiples security updates for multiple Cybozu products | 2020-05-29T15:40+09:00 | 2020-05-29T15:40+09:00 |
| jvndb-2020-004667 | Privilege escalation vulnerability in Hitachi Ops Center Common Services | 2020-05-25T16:17+09:00 | 2020-05-25T16:17+09:00 |
| jvndb-2020-000034 | Cybozu Desktop for Windows vulenerable to arbitrary code execution | 2020-05-25T15:09+09:00 | 2020-05-25T15:09+09:00 |
| jvndb-2020-000033 | WordPress Plugin "Paid Memberships Pro" vulnerable to SQL injection | 2020-05-19T16:07+09:00 | 2020-05-19T16:07+09:00 |
| jvndb-2020-004476 | DoS Vulnerability in JP1/Automatic Job Management System 3 and JP1/Automatic Job Management System 2 | 2020-05-19T10:38+09:00 | 2020-05-19T10:38+09:00 |
| jvndb-2020-004477 | Multiple Vulnerabilities in Hitachi Compute Systems Manager | 2020-05-19T10:33+09:00 | 2020-05-19T10:33+09:00 |
| jvndb-2020-000031 | BookStack vulnerable to cross-site scripting | 2020-05-13T18:06+09:00 | 2020-05-13T18:06+09:00 |
| jvndb-2020-000030 | Multiple vulnerabilities in Movable Type | 2020-05-13T17:59+09:00 | 2020-05-13T17:59+09:00 |
| jvndb-2020-000029 | PALLET CONTROL vulnerable to arbitrary code execution | 2020-05-11T15:16+09:00 | 2020-05-11T15:16+09:00 |
| jvndb-2020-000028 | Sales Force Assistant vulnerable to cross-site scripting | 2020-04-28T15:49+09:00 | 2020-04-28T15:49+09:00 |
| jvndb-2020-000027 | Cybozu Garoon contains multiple vulnerabilities | 2020-04-28T14:48+09:00 | 2020-04-28T14:48+09:00 |
| jvndb-2020-003896 | Directory Permission Vulnerability in Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer | 2020-04-28T12:21+09:00 | 2020-04-28T12:21+09:00 |
| jvndb-2020-000026 | Multiple SHARP Android devices vulnerable to information disclosure | 2020-04-24T15:32+09:00 | 2020-04-24T15:32+09:00 |
| jvndb-2020-000022 | Multiple vulnerabilities in EasyBlocks IPv6 | 2020-04-08T16:12+09:00 | 2020-04-08T16:12+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:20874-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 | 2025-10-24T10:10:53Z | 2025-10-24T10:10:53Z |
| suse-su-2025:20912-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 | 2025-10-24T09:55:54Z | 2025-10-24T09:55:54Z |
| suse-su-2025:20873-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 | 2025-10-24T09:55:54Z | 2025-10-24T09:55:54Z |
| suse-su-2025:3772-1 | Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP7) | 2025-10-24T06:06:43Z | 2025-10-24T06:06:43Z |
| suse-su-2025:3771-1 | Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP7) | 2025-10-24T06:06:36Z | 2025-10-24T06:06:36Z |
| suse-su-2025:3768-1 | Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6) | 2025-10-24T05:37:07Z | 2025-10-24T05:37:07Z |
| suse-su-2025:3769-1 | Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP7) | 2025-10-23T20:47:55Z | 2025-10-23T20:47:55Z |
| suse-su-2025:3770-1 | Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP7) | 2025-10-23T20:47:48Z | 2025-10-23T20:47:48Z |
| suse-su-2025:3765-1 | Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP7) | 2025-10-23T18:33:53Z | 2025-10-23T18:33:53Z |
| suse-su-2025:3764-1 | Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP6) | 2025-10-23T18:33:44Z | 2025-10-23T18:33:44Z |
| suse-su-2025:3762-1 | Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP6) | 2025-10-23T18:04:24Z | 2025-10-23T18:04:24Z |
| suse-su-2025:20870-1 | Security update for the Linux Kernel | 2025-10-23T16:01:09Z | 2025-10-23T16:01:09Z |
| suse-su-2025:20872-1 | Security update for haproxy | 2025-10-23T15:27:42Z | 2025-10-23T15:27:42Z |
| suse-su-2025:20911-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_13 | 2025-10-23T15:08:57Z | 2025-10-23T15:08:57Z |
| suse-su-2025:20871-1 | Security update for kernel-livepatch-MICRO-6-0-RT_Update_13 | 2025-10-23T15:08:57Z | 2025-10-23T15:08:57Z |
| suse-su-2025:3761-1 | Security update for the Linux Kernel | 2025-10-23T15:04:37Z | 2025-10-23T15:04:37Z |
| suse-su-2025:3760-1 | Security update for mozilla-nss | 2025-10-23T14:01:15Z | 2025-10-23T14:01:15Z |
| suse-su-2025:3759-1 | Security update for mozilla-nss | 2025-10-23T14:00:31Z | 2025-10-23T14:00:31Z |
| suse-su-2025:20898-1 | Security update for the Linux Kernel | 2025-10-23T13:59:20Z | 2025-10-23T13:59:20Z |
| suse-su-2025:3758-1 | Security update for openssl-1_1-livepatches | 2025-10-23T13:45:12Z | 2025-10-23T13:45:12Z |
| suse-su-2025:20910-1 | Security update for openssl-3-livepatches | 2025-10-23T13:08:17Z | 2025-10-23T13:08:17Z |
| suse-su-2025:20897-1 | Security update for libxslt | 2025-10-23T12:41:24Z | 2025-10-23T12:41:24Z |
| suse-su-2025:3755-1 | Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP6) | 2025-10-23T11:05:11Z | 2025-10-23T11:05:11Z |
| suse-su-2025:3754-1 | Security update for python-Authlib | 2025-10-23T10:27:00Z | 2025-10-23T10:27:00Z |
| suse-su-2025:3753-1 | Security update for libsoup | 2025-10-23T10:26:39Z | 2025-10-23T10:26:39Z |
| suse-su-2025:3752-1 | Security update for libsoup | 2025-10-23T10:26:29Z | 2025-10-23T10:26:29Z |
| suse-su-2025:3751-1 | Security update for the Linux Kernel | 2025-10-23T10:25:37Z | 2025-10-23T10:25:37Z |
| suse-su-2025:3748-1 | Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP6) | 2025-10-23T09:08:16Z | 2025-10-23T09:08:16Z |
| suse-su-2025:3744-1 | Security update for aws-cli, local-npm-registry, python-boto3, python-botocore, python-coverage, python-flaky, python-pluggy, python-pytest, python-pytest-cov, python-pytest-html, python-pytest-metadata, python-pytest-mock | 2025-10-23T06:22:53Z | 2025-10-23T06:22:53Z |
| suse-su-2025:3743-1 | Security update for libxslt | 2025-10-23T06:19:50Z | 2025-10-23T06:19:50Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-00675 | WordPress插件Restaurant Menu by MotoPress信息泄露漏洞 | 2025-12-25 | 2026-01-07 |
| cnvd-2026-00674 | Tenda AC20堆栈缓冲区溢出漏洞(CNVD-2026-00674) | 2025-08-15 | 2026-01-07 |
| cnvd-2026-00665 | D-Link DCS-930L命令注入漏洞 | 2025-12-10 | 2026-01-07 |
| cnvd-2026-00656 | D-Link DIR-803信息泄露漏洞 | 2025-12-18 | 2026-01-07 |
| cnvd-2026-00632 | Huawei HarmonyOS竞争条件漏洞(CNVD-2026-00632) | 2025-12-10 | 2026-01-07 |
| cnvd-2026-00621 | Huawei HarmonyOS camera framework模块多线程条件竞争漏洞(CNVD-2026-00621) | 2025-12-10 | 2026-01-07 |
| cnvd-2026-00615 | Huawei HarmonyOS camera framework模块多线程条件竞争漏洞 | 2025-12-10 | 2026-01-07 |
| cnvd-2026-04795 | 贵州黔狐科技股份有限公司Foxcms存在XSS漏洞 | 2025-11-22 | 2026-01-06 |
| cnvd-2026-02658 | CMSimple跨站脚本漏洞(CNVD-2026-02658) | 2024-04-22 | 2026-01-06 |
| cnvd-2026-02657 | CMSimple跨站脚本漏洞(CNVD-2026-02657) | 2024-04-22 | 2026-01-06 |
| cnvd-2026-02656 | CMSimple跨站脚本漏洞(CNVD-2026-02656) | 2024-04-23 | 2026-01-06 |
| cnvd-2026-02647 | CMSimple存在未明漏洞(CNVD-2026-02647) | 2025-02-10 | 2026-01-06 |
| cnvd-2026-02640 | Employee Profile Management System edit_personnel.php文件SQL注入漏洞 | 2025-12-15 | 2026-01-06 |
| cnvd-2026-00837 | Online Appointment Booking System clinic参数SQL注入漏洞 | 2025-12-25 | 2026-01-06 |
| cnvd-2026-00836 | ChurchCRM特权提升漏洞 | 2025-12-25 | 2026-01-06 |
| cnvd-2026-00827 | Prison Management System search1.php文件SQL注入漏洞 | 2025-12-25 | 2026-01-06 |
| cnvd-2026-00826 | Prison Management System search.php文件SQL注入漏洞 | 2025-12-25 | 2026-01-06 |
| cnvd-2026-00825 | Online Appointment Booking System deletemanager.php文件SQL注入漏洞 | 2025-12-25 | 2026-01-06 |
| cnvd-2026-00824 | CMSimple跨站脚本漏洞(CNVD-2026-0082457) | 2025-12-29 | 2026-01-06 |
| cnvd-2026-00823 | CMSimple跨站脚本漏洞 | 2025-12-29 | 2026-01-06 |
| cnvd-2026-00822 | CMSimple文件包含漏洞 | 2025-12-29 | 2026-01-06 |
| cnvd-2026-00557 | CMSimple代码执行漏洞 | 2025-12-29 | 2026-01-06 |
| cnvd-2026-00541 | College Notes Uploading System代码问题漏洞 | 2025-12-31 | 2026-01-06 |
| cnvd-2026-00539 | College Notes Uploading System /login.php文件SQL注入漏洞 | 2025-12-31 | 2026-01-06 |
| cnvd-2026-00537 | CMSimple存在未明漏洞(CNVD-2026-00537) | 2025-02-18 | 2026-01-06 |
| cnvd-2026-00536 | CMSimple存在未明漏洞 | 2025-02-18 | 2026-01-06 |
| cnvd-2026-00535 | CMSimple跨站脚本漏洞(CNVD-2026-00535) | 2025-02-27 | 2026-01-06 |
| cnvd-2026-00534 | CMSimple跨站脚本漏洞(CNVD-2026-00534) | 2025-02-28 | 2026-01-06 |
| cnvd-2026-00533 | Prison Management System栈缓冲区溢出漏洞 | 2025-05-07 | 2026-01-06 |
| cnvd-2026-00532 | Simple Shopping Cart save_order.php文件SQL注入漏洞 | 2025-07-21 | 2026-01-06 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2025-avi-0817 | Vulnérabilité dans Microsoft OmniParser | 2025-09-25T00:00:00.000000 | 2025-09-25T00:00:00.000000 |
| certfr-2025-avi-0816 | Vulnérabilité dans StormShield Network Security | 2025-09-25T00:00:00.000000 | 2025-09-25T00:00:00.000000 |
| CERTFR-2025-AVI-0819 | Multiples vulnérabilités dans les produits Cisco | 2025-09-25T00:00:00.000000 | 2025-09-25T00:00:00.000000 |
| CERTFR-2025-AVI-0818 | Multiples vulnérabilités dans Cisco IOS et IOS XE | 2025-09-25T00:00:00.000000 | 2025-09-25T00:00:00.000000 |
| CERTFR-2025-AVI-0817 | Vulnérabilité dans Microsoft OmniParser | 2025-09-25T00:00:00.000000 | 2025-09-25T00:00:00.000000 |
| CERTFR-2025-AVI-0816 | Vulnérabilité dans StormShield Network Security | 2025-09-25T00:00:00.000000 | 2025-09-25T00:00:00.000000 |
| certfr-2025-avi-0815 | Vulnérabilité dans Liferay | 2025-09-24T00:00:00.000000 | 2025-09-24T00:00:00.000000 |
| certfr-2025-avi-0814 | Multiples vulnérabilités dans Google Chrome | 2025-09-24T00:00:00.000000 | 2025-09-24T00:00:00.000000 |
| CERTFR-2025-AVI-0815 | Vulnérabilité dans Liferay | 2025-09-24T00:00:00.000000 | 2025-09-24T00:00:00.000000 |
| CERTFR-2025-AVI-0814 | Multiples vulnérabilités dans Google Chrome | 2025-09-24T00:00:00.000000 | 2025-09-24T00:00:00.000000 |
| certfr-2025-avi-0813 | Vulnérabilité dans SolarWinds Web Help Desk | 2025-09-23T00:00:00.000000 | 2025-09-23T00:00:00.000000 |
| certfr-2025-avi-0812 | Vulnérabilité dans Synology Safe Access pour SRM | 2025-09-23T00:00:00.000000 | 2025-09-23T00:00:00.000000 |
| certfr-2025-avi-0811 | Multiples vulnérabilités dans Liferay | 2025-09-23T00:00:00.000000 | 2025-09-23T00:00:00.000000 |
| CERTFR-2025-AVI-0813 | Vulnérabilité dans SolarWinds Web Help Desk | 2025-09-23T00:00:00.000000 | 2025-09-23T00:00:00.000000 |
| CERTFR-2025-AVI-0812 | Vulnérabilité dans Synology Safe Access pour SRM | 2025-09-23T00:00:00.000000 | 2025-09-23T00:00:00.000000 |
| CERTFR-2025-AVI-0811 | Multiples vulnérabilités dans Liferay | 2025-09-23T00:00:00.000000 | 2025-09-23T00:00:00.000000 |
| certfr-2025-avi-0810 | Vulnérabilité dans Liferay | 2025-09-22T00:00:00.000000 | 2025-09-22T00:00:00.000000 |
| certfr-2025-avi-0809 | Multiples vulnérabilités dans Microsoft Edge | 2025-09-22T00:00:00.000000 | 2025-09-22T00:00:00.000000 |
| CERTFR-2025-AVI-0810 | Vulnérabilité dans Liferay | 2025-09-22T00:00:00.000000 | 2025-09-22T00:00:00.000000 |
| CERTFR-2025-AVI-0809 | Multiples vulnérabilités dans Microsoft Edge | 2025-09-22T00:00:00.000000 | 2025-09-22T00:00:00.000000 |
| certfr-2025-avi-0808 | Multiples vulnérabilités dans les produits IBM | 2025-09-19T00:00:00.000000 | 2025-09-19T00:00:00.000000 |
| certfr-2025-avi-0807 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-09-19T00:00:00.000000 | 2025-09-19T00:00:00.000000 |
| certfr-2025-avi-0806 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-09-19T00:00:00.000000 | 2025-09-19T00:00:00.000000 |
| certfr-2025-avi-0805 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-09-19T00:00:00.000000 | 2025-09-19T00:00:00.000000 |
| certfr-2025-avi-0804 | Multiples vulnérabilités dans Microsoft Windows | 2025-09-19T00:00:00.000000 | 2025-09-19T00:00:00.000000 |
| certfr-2025-avi-0766 | Multiples vulnérabilités dans les produits Liferay | 2025-09-09T00:00:00.000000 | 2025-09-19T00:00:00.000000 |
| CERTFR-2025-AVI-0808 | Multiples vulnérabilités dans les produits IBM | 2025-09-19T00:00:00.000000 | 2025-09-19T00:00:00.000000 |
| CERTFR-2025-AVI-0807 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2025-09-19T00:00:00.000000 | 2025-09-19T00:00:00.000000 |
| CERTFR-2025-AVI-0806 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2025-09-19T00:00:00.000000 | 2025-09-19T00:00:00.000000 |
| CERTFR-2025-AVI-0805 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2025-09-19T00:00:00.000000 | 2025-09-19T00:00:00.000000 |