Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-23162 |
N/A
|
drm/xe/nvm: Fix double-free on aux add failure |
Linux |
Linux |
2026-02-14T16:01:27.243Z | 2026-02-14T16:01:27.243Z |
| CVE-2026-23161 |
N/A
|
mm/shmem, swap: fix race of truncate and swap entry split |
Linux |
Linux |
2026-02-14T16:01:26.569Z | 2026-02-14T16:01:26.569Z |
| CVE-2026-23160 |
N/A
|
octeon_ep: Fix memory leak in octep_device_setup() |
Linux |
Linux |
2026-02-14T16:01:25.900Z | 2026-02-14T16:01:25.900Z |
| CVE-2026-23159 |
N/A
|
perf: sched: Fix perf crash with new is_user_task() helper |
Linux |
Linux |
2026-02-14T16:01:25.229Z | 2026-02-14T16:01:25.229Z |
| CVE-2026-23158 |
N/A
|
gpio: virtuser: fix UAF in configfs release path |
Linux |
Linux |
2026-02-14T16:01:24.568Z | 2026-02-14T16:01:24.568Z |
| CVE-2026-23157 |
N/A
|
btrfs: do not strictly require dirty metadata threshol… |
Linux |
Linux |
2026-02-14T16:01:23.874Z | 2026-02-14T16:01:23.874Z |
| CVE-2026-23156 |
N/A
|
efivarfs: fix error propagation in efivar_entry_get() |
Linux |
Linux |
2026-02-14T16:01:23.215Z | 2026-02-14T16:01:23.215Z |
| CVE-2026-23155 |
N/A
|
can: gs_usb: gs_usb_receive_bulk_callback(): fix error… |
Linux |
Linux |
2026-02-14T16:01:22.429Z | 2026-02-14T16:01:22.429Z |
| CVE-2026-23154 |
N/A
|
net: fix segmentation of forwarding fraglist GRO |
Linux |
Linux |
2026-02-14T16:01:21.758Z | 2026-02-14T16:01:21.758Z |
| CVE-2026-23153 |
N/A
|
firewire: core: fix race condition against transaction list |
Linux |
Linux |
2026-02-14T16:01:21.077Z | 2026-02-14T16:01:21.077Z |
| CVE-2026-23152 |
N/A
|
wifi: mac80211: correctly decode TTLM with default link map |
Linux |
Linux |
2026-02-14T16:01:20.379Z | 2026-02-14T16:01:20.379Z |
| CVE-2026-23151 |
N/A
|
Bluetooth: MGMT: Fix memory leak in set_ssp_complete |
Linux |
Linux |
2026-02-14T16:01:19.663Z | 2026-02-14T16:01:19.663Z |
| CVE-2026-23150 |
N/A
|
nfc: llcp: Fix memleak in nfc_llcp_send_ui_frame(). |
Linux |
Linux |
2026-02-14T16:01:18.968Z | 2026-02-14T16:01:18.968Z |
| CVE-2026-23149 |
N/A
|
drm: Do not allow userspace to trigger kernel warnings… |
Linux |
Linux |
2026-02-14T16:01:18.281Z | 2026-02-14T16:01:18.281Z |
| CVE-2026-23148 |
N/A
|
nvmet: fix race in nvmet_bio_done() leading to NULL po… |
Linux |
Linux |
2026-02-14T16:01:17.575Z | 2026-02-14T16:01:17.575Z |
| CVE-2026-23147 |
N/A
|
btrfs: zlib: fix the folio leak on S390 hardware accel… |
Linux |
Linux |
2026-02-14T16:01:16.917Z | 2026-02-14T16:01:16.917Z |
| CVE-2026-23146 |
N/A
|
Bluetooth: hci_uart: fix null-ptr-deref in hci_uart_wr… |
Linux |
Linux |
2026-02-14T16:01:16.169Z | 2026-02-14T16:01:16.169Z |
| CVE-2026-23145 |
N/A
|
ext4: fix iloc.bh leak in ext4_xattr_inode_update_ref |
Linux |
Linux |
2026-02-14T15:36:10.207Z | 2026-02-14T15:36:10.207Z |
| CVE-2026-23144 |
N/A
|
mm/damon/sysfs: cleanup attrs subdirs on context dir s… |
Linux |
Linux |
2026-02-14T15:36:09.518Z | 2026-02-14T15:36:09.518Z |
| CVE-2026-23143 |
N/A
|
virtio_net: Fix misalignment bug in struct virtnet_info |
Linux |
Linux |
2026-02-14T15:36:08.834Z | 2026-02-14T15:36:08.834Z |
| CVE-2026-23142 |
N/A
|
mm/damon/sysfs-scheme: cleanup access_pattern subdirs … |
Linux |
Linux |
2026-02-14T15:36:08.147Z | 2026-02-14T15:36:08.147Z |
| CVE-2026-23141 |
N/A
|
btrfs: send: check for inline extents in range_is_hole… |
Linux |
Linux |
2026-02-14T15:36:07.417Z | 2026-02-14T15:36:07.417Z |
| CVE-2025-71202 |
N/A
|
iommu/sva: invalidate stale IOTLB entries for kernel a… |
Linux |
Linux |
2026-02-14T15:36:06.588Z | 2026-02-14T15:36:06.588Z |
| CVE-2026-23140 |
N/A
|
bpf, test_run: Subtract size of xdp_frame from allowed… |
Linux |
Linux |
2026-02-14T15:22:24.727Z | 2026-02-14T15:22:24.727Z |
| CVE-2026-23139 |
N/A
|
netfilter: nf_conncount: update last_gc only when GC h… |
Linux |
Linux |
2026-02-14T15:22:24.059Z | 2026-02-14T15:22:24.059Z |
| CVE-2026-23138 |
N/A
|
tracing: Add recursion protection in kernel stack trac… |
Linux |
Linux |
2026-02-14T15:22:23.385Z | 2026-02-14T15:22:23.385Z |
| CVE-2026-23137 |
N/A
|
of: unittest: Fix memory leak in unittest_data_add() |
Linux |
Linux |
2026-02-14T15:22:22.690Z | 2026-02-14T15:22:22.690Z |
| CVE-2026-23136 |
N/A
|
libceph: reset sparse-read state in osd_fault() |
Linux |
Linux |
2026-02-14T15:22:21.952Z | 2026-02-14T15:22:21.952Z |
| CVE-2025-71201 |
N/A
|
netfs: Fix early read unlock of page with EOF in middle |
Linux |
Linux |
2026-02-14T15:22:21.233Z | 2026-02-14T15:22:21.233Z |
| CVE-2026-23135 |
N/A
|
wifi: ath12k: fix dma_free_coherent() pointer |
Linux |
Linux |
2026-02-14T15:14:34.473Z | 2026-02-14T15:14:34.473Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-23170 |
N/A
|
drm/imx/tve: fix probe device leak |
Linux |
Linux |
2026-02-14T16:01:32.833Z | 2026-02-14T16:01:32.833Z |
| CVE-2026-23169 |
N/A
|
mptcp: fix race in mptcp_pm_nl_flush_addrs_doit() |
Linux |
Linux |
2026-02-14T16:01:32.139Z | 2026-02-14T16:01:32.139Z |
| CVE-2026-23168 |
N/A
|
flex_proportions: make fprop_new_period() hardirq safe |
Linux |
Linux |
2026-02-14T16:01:31.465Z | 2026-02-14T16:01:31.465Z |
| CVE-2026-23167 |
N/A
|
nfc: nci: Fix race between rfkill and nci_unregister_d… |
Linux |
Linux |
2026-02-14T16:01:30.755Z | 2026-02-14T16:01:30.755Z |
| CVE-2026-23166 |
N/A
|
ice: Fix NULL pointer dereference in ice_vsi_set_napi_queues |
Linux |
Linux |
2026-02-14T16:01:30.059Z | 2026-02-14T16:01:30.059Z |
| CVE-2026-23165 |
N/A
|
sfc: fix deadlock in RSS config read |
Linux |
Linux |
2026-02-14T16:01:29.336Z | 2026-02-14T16:01:29.336Z |
| CVE-2026-23164 |
N/A
|
rocker: fix memory leak in rocker_world_port_post_fini() |
Linux |
Linux |
2026-02-14T16:01:28.624Z | 2026-02-14T16:01:28.624Z |
| CVE-2026-23163 |
N/A
|
drm/amdgpu: fix NULL pointer dereference in amdgpu_gmc… |
Linux |
Linux |
2026-02-14T16:01:27.912Z | 2026-02-14T16:01:27.912Z |
| CVE-2026-23162 |
N/A
|
drm/xe/nvm: Fix double-free on aux add failure |
Linux |
Linux |
2026-02-14T16:01:27.243Z | 2026-02-14T16:01:27.243Z |
| CVE-2026-23161 |
N/A
|
mm/shmem, swap: fix race of truncate and swap entry split |
Linux |
Linux |
2026-02-14T16:01:26.569Z | 2026-02-14T16:01:26.569Z |
| CVE-2026-23160 |
N/A
|
octeon_ep: Fix memory leak in octep_device_setup() |
Linux |
Linux |
2026-02-14T16:01:25.900Z | 2026-02-14T16:01:25.900Z |
| CVE-2026-23159 |
N/A
|
perf: sched: Fix perf crash with new is_user_task() helper |
Linux |
Linux |
2026-02-14T16:01:25.229Z | 2026-02-14T16:01:25.229Z |
| CVE-2026-23158 |
N/A
|
gpio: virtuser: fix UAF in configfs release path |
Linux |
Linux |
2026-02-14T16:01:24.568Z | 2026-02-14T16:01:24.568Z |
| CVE-2026-23157 |
N/A
|
btrfs: do not strictly require dirty metadata threshol… |
Linux |
Linux |
2026-02-14T16:01:23.874Z | 2026-02-14T16:01:23.874Z |
| CVE-2026-23156 |
N/A
|
efivarfs: fix error propagation in efivar_entry_get() |
Linux |
Linux |
2026-02-14T16:01:23.215Z | 2026-02-14T16:01:23.215Z |
| CVE-2026-23155 |
N/A
|
can: gs_usb: gs_usb_receive_bulk_callback(): fix error… |
Linux |
Linux |
2026-02-14T16:01:22.429Z | 2026-02-14T16:01:22.429Z |
| CVE-2026-23154 |
N/A
|
net: fix segmentation of forwarding fraglist GRO |
Linux |
Linux |
2026-02-14T16:01:21.758Z | 2026-02-14T16:01:21.758Z |
| CVE-2026-23153 |
N/A
|
firewire: core: fix race condition against transaction list |
Linux |
Linux |
2026-02-14T16:01:21.077Z | 2026-02-14T16:01:21.077Z |
| CVE-2026-23152 |
N/A
|
wifi: mac80211: correctly decode TTLM with default link map |
Linux |
Linux |
2026-02-14T16:01:20.379Z | 2026-02-14T16:01:20.379Z |
| CVE-2026-23151 |
N/A
|
Bluetooth: MGMT: Fix memory leak in set_ssp_complete |
Linux |
Linux |
2026-02-14T16:01:19.663Z | 2026-02-14T16:01:19.663Z |
| CVE-2026-23150 |
N/A
|
nfc: llcp: Fix memleak in nfc_llcp_send_ui_frame(). |
Linux |
Linux |
2026-02-14T16:01:18.968Z | 2026-02-14T16:01:18.968Z |
| CVE-2026-23149 |
N/A
|
drm: Do not allow userspace to trigger kernel warnings… |
Linux |
Linux |
2026-02-14T16:01:18.281Z | 2026-02-14T16:01:18.281Z |
| CVE-2026-23148 |
N/A
|
nvmet: fix race in nvmet_bio_done() leading to NULL po… |
Linux |
Linux |
2026-02-14T16:01:17.575Z | 2026-02-14T16:01:17.575Z |
| CVE-2026-23147 |
N/A
|
btrfs: zlib: fix the folio leak on S390 hardware accel… |
Linux |
Linux |
2026-02-14T16:01:16.917Z | 2026-02-14T16:01:16.917Z |
| CVE-2026-23146 |
N/A
|
Bluetooth: hci_uart: fix null-ptr-deref in hci_uart_wr… |
Linux |
Linux |
2026-02-14T16:01:16.169Z | 2026-02-14T16:01:16.169Z |
| CVE-2026-23145 |
N/A
|
ext4: fix iloc.bh leak in ext4_xattr_inode_update_ref |
Linux |
Linux |
2026-02-14T15:36:10.207Z | 2026-02-14T15:36:10.207Z |
| CVE-2026-23144 |
N/A
|
mm/damon/sysfs: cleanup attrs subdirs on context dir s… |
Linux |
Linux |
2026-02-14T15:36:09.518Z | 2026-02-14T15:36:09.518Z |
| CVE-2026-23143 |
N/A
|
virtio_net: Fix misalignment bug in struct virtnet_info |
Linux |
Linux |
2026-02-14T15:36:08.834Z | 2026-02-14T15:36:08.834Z |
| CVE-2026-23142 |
N/A
|
mm/damon/sysfs-scheme: cleanup access_pattern subdirs … |
Linux |
Linux |
2026-02-14T15:36:08.147Z | 2026-02-14T15:36:08.147Z |
| CVE-2026-23141 |
N/A
|
btrfs: send: check for inline extents in range_is_hole… |
Linux |
Linux |
2026-02-14T15:36:07.417Z | 2026-02-14T15:36:07.417Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-23161 | In the Linux kernel, the following vulnerability has been resolved: mm/shmem, swap: fix race of tr… | 2026-02-14T16:15:56.277 | 2026-02-14T16:15:56.277 |
| fkie_cve-2026-23160 | In the Linux kernel, the following vulnerability has been resolved: octeon_ep: Fix memory leak in … | 2026-02-14T16:15:56.177 | 2026-02-14T16:15:56.177 |
| fkie_cve-2026-23159 | In the Linux kernel, the following vulnerability has been resolved: perf: sched: Fix perf crash wi… | 2026-02-14T16:15:56.070 | 2026-02-14T16:15:56.070 |
| fkie_cve-2026-23158 | In the Linux kernel, the following vulnerability has been resolved: gpio: virtuser: fix UAF in con… | 2026-02-14T16:15:55.967 | 2026-02-14T16:15:55.967 |
| fkie_cve-2026-23157 | In the Linux kernel, the following vulnerability has been resolved: btrfs: do not strictly require… | 2026-02-14T16:15:55.863 | 2026-02-14T16:15:55.863 |
| fkie_cve-2026-23156 | In the Linux kernel, the following vulnerability has been resolved: efivarfs: fix error propagatio… | 2026-02-14T16:15:55.760 | 2026-02-14T16:15:55.760 |
| fkie_cve-2026-23155 | In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: gs_usb_receive_bu… | 2026-02-14T16:15:55.653 | 2026-02-14T16:15:55.653 |
| fkie_cve-2026-23154 | In the Linux kernel, the following vulnerability has been resolved: net: fix segmentation of forwa… | 2026-02-14T16:15:55.550 | 2026-02-14T16:15:55.550 |
| fkie_cve-2026-23153 | In the Linux kernel, the following vulnerability has been resolved: firewire: core: fix race condi… | 2026-02-14T16:15:55.443 | 2026-02-14T16:15:55.443 |
| fkie_cve-2026-23152 | In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: correctly deco… | 2026-02-14T16:15:55.340 | 2026-02-14T16:15:55.340 |
| fkie_cve-2026-23151 | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix memory le… | 2026-02-14T16:15:55.233 | 2026-02-14T16:15:55.233 |
| fkie_cve-2026-23150 | In the Linux kernel, the following vulnerability has been resolved: nfc: llcp: Fix memleak in nfc_… | 2026-02-14T16:15:55.123 | 2026-02-14T16:15:55.123 |
| fkie_cve-2026-23149 | In the Linux kernel, the following vulnerability has been resolved: drm: Do not allow userspace to… | 2026-02-14T16:15:55.023 | 2026-02-14T16:15:55.023 |
| fkie_cve-2026-23148 | In the Linux kernel, the following vulnerability has been resolved: nvmet: fix race in nvmet_bio_d… | 2026-02-14T16:15:54.913 | 2026-02-14T16:15:54.913 |
| fkie_cve-2026-23147 | In the Linux kernel, the following vulnerability has been resolved: btrfs: zlib: fix the folio lea… | 2026-02-14T16:15:54.813 | 2026-02-14T16:15:54.813 |
| fkie_cve-2026-23146 | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_uart: fix null-… | 2026-02-14T16:15:54.703 | 2026-02-14T16:15:54.703 |
| fkie_cve-2026-23145 | In the Linux kernel, the following vulnerability has been resolved: ext4: fix iloc.bh leak in ext4… | 2026-02-14T16:15:54.597 | 2026-02-14T16:15:54.597 |
| fkie_cve-2026-23144 | In the Linux kernel, the following vulnerability has been resolved: mm/damon/sysfs: cleanup attrs … | 2026-02-14T16:15:54.490 | 2026-02-14T16:15:54.490 |
| fkie_cve-2026-23143 | In the Linux kernel, the following vulnerability has been resolved: virtio_net: Fix misalignment b… | 2026-02-14T16:15:54.383 | 2026-02-14T16:15:54.383 |
| fkie_cve-2026-23142 | In the Linux kernel, the following vulnerability has been resolved: mm/damon/sysfs-scheme: cleanup… | 2026-02-14T16:15:54.273 | 2026-02-14T16:15:54.273 |
| fkie_cve-2026-23141 | In the Linux kernel, the following vulnerability has been resolved: btrfs: send: check for inline … | 2026-02-14T16:15:54.163 | 2026-02-14T16:15:54.163 |
| fkie_cve-2026-23140 | In the Linux kernel, the following vulnerability has been resolved: bpf, test_run: Subtract size o… | 2026-02-14T16:15:54.060 | 2026-02-14T16:15:54.060 |
| fkie_cve-2026-23139 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conncount: updat… | 2026-02-14T16:15:53.950 | 2026-02-14T16:15:53.950 |
| fkie_cve-2026-23138 | In the Linux kernel, the following vulnerability has been resolved: tracing: Add recursion protect… | 2026-02-14T16:15:53.830 | 2026-02-14T16:15:53.830 |
| fkie_cve-2026-23137 | In the Linux kernel, the following vulnerability has been resolved: of: unittest: Fix memory leak … | 2026-02-14T16:15:53.703 | 2026-02-14T16:15:53.703 |
| fkie_cve-2026-23136 | In the Linux kernel, the following vulnerability has been resolved: libceph: reset sparse-read sta… | 2026-02-14T16:15:53.590 | 2026-02-14T16:15:53.590 |
| fkie_cve-2026-23135 | In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix dma_free_coh… | 2026-02-14T16:15:53.483 | 2026-02-14T16:15:53.483 |
| fkie_cve-2026-23134 | In the Linux kernel, the following vulnerability has been resolved: slab: fix kmalloc_nolock() con… | 2026-02-14T16:15:53.377 | 2026-02-14T16:15:53.377 |
| fkie_cve-2026-23133 | In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: fix dma_free_coh… | 2026-02-14T16:15:53.270 | 2026-02-14T16:15:53.270 |
| fkie_cve-2026-23132 | In the Linux kernel, the following vulnerability has been resolved: drm/bridge: synopsys: dw-dp: f… | 2026-02-14T16:15:53.163 | 2026-02-14T16:15:53.163 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-5vr5-28pm-p634 |
|
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: TC, delete flows on… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-5r72-p4cv-h344 |
|
In the Linux kernel, the following vulnerability has been resolved: bonding: fix use-after-free du… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-5p9c-24w4-pq6q |
|
In the Linux kernel, the following vulnerability has been resolved: ice: Fix NULL pointer derefere… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-4rgv-cpg8-f3hr |
|
In the Linux kernel, the following vulnerability has been resolved: mm/shmem, swap: fix race of tr… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-4chx-f5rg-w5pp |
|
In the Linux kernel, the following vulnerability has been resolved: rocker: fix memory leak in roc… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-3x2r-29rp-vh66 |
|
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix NULL pointer d… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-398f-64gc-qxqm |
|
In the Linux kernel, the following vulnerability has been resolved: perf: sched: Fix perf crash wi… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-2j2f-9hjh-v2xm |
|
In the Linux kernel, the following vulnerability has been resolved: nfc: llcp: Fix memleak in nfc_… | 2026-02-14T18:30:15Z | 2026-02-14T18:30:15Z |
| ghsa-2chr-7vph-93pf |
|
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix memory le… | 2026-02-14T18:30:14Z | 2026-02-14T18:30:15Z |
| ghsa-v844-6465-jhqh |
|
In the Linux kernel, the following vulnerability has been resolved: libceph: reset sparse-read sta… | 2026-02-14T18:30:14Z | 2026-02-14T18:30:14Z |
| ghsa-rwc9-h9mh-xfwq |
|
In the Linux kernel, the following vulnerability has been resolved: of: unittest: Fix memory leak … | 2026-02-14T18:30:14Z | 2026-02-14T18:30:14Z |
| ghsa-pjvx-fh86-c22p |
|
In the Linux kernel, the following vulnerability has been resolved: drm/bridge: synopsys: dw-dp: f… | 2026-02-14T18:30:14Z | 2026-02-14T18:30:14Z |
| ghsa-p59g-r9hh-rmr8 |
|
In the Linux kernel, the following vulnerability has been resolved: mm/damon/sysfs-scheme: cleanup… | 2026-02-14T18:30:14Z | 2026-02-14T18:30:14Z |
| ghsa-hqxw-2v34-r7g3 |
|
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: correctly deco… | 2026-02-14T18:30:14Z | 2026-02-14T18:30:14Z |
| ghsa-hcr8-x92w-q652 |
|
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_uart: fix null-… | 2026-02-14T18:30:14Z | 2026-02-14T18:30:14Z |
| ghsa-h3fw-pc42-9f62 |
|
In the Linux kernel, the following vulnerability has been resolved: btrfs: zlib: fix the folio lea… | 2026-02-14T18:30:14Z | 2026-02-14T18:30:14Z |
| ghsa-gqpg-53jh-cpqf |
|
In the Linux kernel, the following vulnerability has been resolved: tracing: Add recursion protect… | 2026-02-14T18:30:14Z | 2026-02-14T18:30:14Z |
| ghsa-gc4v-h3f5-h83f |
|
In the Linux kernel, the following vulnerability has been resolved: slab: fix kmalloc_nolock() con… | 2026-02-14T18:30:14Z | 2026-02-14T18:30:14Z |
| ghsa-f7px-4wwg-382j |
|
In the Linux kernel, the following vulnerability has been resolved: bpf, test_run: Subtract size o… | 2026-02-14T18:30:14Z | 2026-02-14T18:30:14Z |
| ghsa-f6qx-9px5-6w93 |
|
In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: fix dma_free_coh… | 2026-02-14T18:30:14Z | 2026-02-14T18:30:14Z |
| ghsa-f36v-x2cg-pr97 |
|
In the Linux kernel, the following vulnerability has been resolved: drm: Do not allow userspace to… | 2026-02-14T18:30:14Z | 2026-02-14T18:30:14Z |
| ghsa-chwm-55mq-46m4 |
|
In the Linux kernel, the following vulnerability has been resolved: mm/damon/sysfs: cleanup attrs … | 2026-02-14T18:30:14Z | 2026-02-14T18:30:14Z |
| ghsa-cf2j-m586-269w |
|
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conncount: updat… | 2026-02-14T18:30:14Z | 2026-02-14T18:30:14Z |
| ghsa-c783-64qq-77vx |
|
In the Linux kernel, the following vulnerability has been resolved: nvmet: fix race in nvmet_bio_d… | 2026-02-14T18:30:14Z | 2026-02-14T18:30:14Z |
| ghsa-c4h6-jgrf-pj9p |
|
In the Linux kernel, the following vulnerability has been resolved: iommu/sva: invalidate stale IO… | 2026-02-14T18:30:14Z | 2026-02-14T18:30:14Z |
| ghsa-8xwj-jmfw-cfc3 |
|
In the Linux kernel, the following vulnerability has been resolved: btrfs: send: check for inline … | 2026-02-14T18:30:14Z | 2026-02-14T18:30:14Z |
| ghsa-88jw-j953-862r |
|
In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix dma_free_coh… | 2026-02-14T18:30:14Z | 2026-02-14T18:30:14Z |
| ghsa-7q43-7j7f-g59m |
|
In the Linux kernel, the following vulnerability has been resolved: firewire: core: fix race condi… | 2026-02-14T18:30:14Z | 2026-02-14T18:30:14Z |
| ghsa-58pr-f4q3-x425 |
|
In the Linux kernel, the following vulnerability has been resolved: netfs: Fix early read unlock o… | 2026-02-14T18:30:13Z | 2026-02-14T18:30:14Z |
| ghsa-4vx7-fj8p-qpj9 |
|
In the Linux kernel, the following vulnerability has been resolved: ext4: fix iloc.bh leak in ext4… | 2026-02-14T18:30:14Z | 2026-02-14T18:30:14Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-245 |
|
Apache Airflow, versions before 2.8.2, has a vulnerability that allows authenticated user… | apache-airflow | 2024-02-29T11:15:08+00:00 | 2025-05-01T21:22:38.598048+00:00 |
| pysec-2025-35 |
7.5 (3.1)
|
Weblate is a web based localization tool. Prior to version 5.11, when creating a new comp… | weblate | 2025-04-15T21:16:04+00:00 | 2025-04-30T17:22:51.467257+00:00 |
| pysec-2025-34 |
|
The unsafe globals in Picklescan before 0.0.25 do not include ssl. Consequently, ssl.get_… | picklescan | 2025-04-24T01:15:49+00:00 | 2025-04-24T03:08:15.436691+00:00 |
| pysec-2025-33 |
7.5 (3.1)
|
Vyper is a Pythonic Smart Contract Language for the EVM. When the Vyper Compiler uses the… | vyper | 2025-01-14T18:16:05+00:00 | 2025-04-23T21:23:01.322686+00:00 |
| pysec-2025-32 |
9.8 (3.1)
|
BentoML is a Python library for building online serving systems optimized for AI apps and… | bentoml | 2025-04-09T16:15:25+00:00 | 2025-04-22T19:21:34.073355+00:00 |
| pysec-2025-31 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Vyper handles AugAssign statemen… | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.116292+00:00 |
| pysec-2025-30 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Multiple evaluation of a single … | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.064106+00:00 |
| pysec-2025-29 |
|
vyper is a Pythonic Smart Contract Language for the EVM. Vyper `sqrt()` builtin uses the … | vyper | 2025-02-21T22:15:13+00:00 | 2025-04-09T17:27:28.005382+00:00 |
| pysec-2025-28 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.772920+00:00 |
| pysec-2025-27 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.711157+00:00 |
| pysec-2025-26 |
|
The Snowflake Connector for Python provides an interface for developing Python applicatio… | snowflake-connector-python | 2025-01-29T21:15:21+00:00 | 2025-04-09T17:27:27.645758+00:00 |
| pysec-2025-25 |
6.5 (3.1)
|
Rembg is a tool to remove images background. In Rembg 2.0.57 and earlier, the CORS middle… | rembg | 2025-03-03T17:15:14+00:00 | 2025-04-09T17:27:27.532849+00:00 |
| pysec-2025-24 |
7.5 (3.1)
|
Rembg is a tool to remove images background. In Rembg 2.0.57 and earlier, the /api/remove… | rembg | 2025-03-03T17:15:14+00:00 | 2025-04-09T17:27:27.486485+00:00 |
| pysec-2025-23 |
|
Versions of the package ray before 2.43.0 are vulnerable to Insertion of Sensitive Inform… | ray | 2025-03-06T05:15:16+00:00 | 2025-04-09T17:27:27.434099+00:00 |
| pysec-2025-22 |
9.8 (3.1)
|
A vulnerability, that could result in Remote Code Execution (RCE), has been found in Plot… | plotai | 2025-03-10T14:15:24+00:00 | 2025-04-09T17:27:27.203714+00:00 |
| pysec-2025-21 |
9.8 (3.1)
|
picklescan before 0.0.23 fails to detect malicious pickle files inside PyTorch model arch… | picklescan | 2025-03-10T12:15:12+00:00 | 2025-04-09T17:27:27.016747+00:00 |
| pysec-2023-311 |
5.4 (3.1)
|
plone.namedfile allows users to handle `File` and `Image` fields targeting, but not depen… | plone-namedfile | 2023-09-21T15:15:10+00:00 | 2025-04-09T17:27:27.153848+00:00 |
| pysec-2022-43179 |
7.3 (3.1)
|
Poetry is a dependency manager for Python. To handle dependencies that come from a Git re… | poetry | 2022-09-07T19:15:08+00:00 | 2025-04-09T17:27:27.255151+00:00 |
| pysec-2021-891 |
7.8 (3.1)
|
CWE - CWE-287: Improper Authentication vulnerability in SUSE Linux Enterprise Server 15 S… | salt | 2021-03-03T10:15:13+00:00 | 2025-04-09T17:27:27.582884+00:00 |
| pysec-2025-20 |
6.5 (3.1)
|
picklescan before 0.0.23 is vulnerable to a ZIP archive manipulation attack that causes i… | picklescan | 2025-03-10T12:15:10+00:00 | 2025-04-09T17:27:26.966215+00:00 |
| pysec-2025-19 |
9.8 (3.1)
|
picklescan before 0.0.22 only considers standard pickle file extensions in the scope for … | picklescan | 2025-03-03T19:15:34+00:00 | 2025-04-09T17:27:26.916350+00:00 |
| pysec-2025-18 |
|
picklescan before 0.0.21 does not treat 'pip' as an unsafe global. An attacker could craf… | picklescan | 2025-02-26T15:15:24+00:00 | 2025-04-09T17:27:26.867210+00:00 |
| pysec-2025-17 |
5.5 (3.1)
|
In mlflow/mlflow version 2.18, an admin is able to create a new user account without sett… | mlflow | 2025-03-20T10:15:54+00:00 | 2025-04-09T17:27:26.322333+00:00 |
| pysec-2023-310 |
7.5 (3.1)
|
Mobile Security Framework (MobSF) <=v3.7.8 Beta is vulnerable to Insecure Permissions. NO… | mobsf | 2023-09-21T22:15:11+00:00 | 2025-04-09T17:27:26.663665+00:00 |
| pysec-2023-309 |
8.8 (3.1)
|
Path Traversal in GitHub repository mlflow/mlflow prior to 2.9.2. | mlflow | 2023-12-13T00:15:07+00:00 | 2025-04-09T17:27:26.271200+00:00 |
| pysec-2023-308 |
10.0 (3.1)
|
Absolute Path Traversal in GitHub repository mlflow/mlflow prior to 2.5.0. | mlflow | 2023-07-19T01:15:10+00:00 | 2025-04-09T17:27:26.223213+00:00 |
| pysec-2025-16 |
7.5 (3.1)
|
LNbits is a Lightning wallet and accounts system. A Server-Side Request Forgery (SSRF) vu… | lnbits | 2025-04-06T20:15:15+00:00 | 2025-04-09T17:27:25.872691+00:00 |
| pysec-2025-15 |
5.3 (3.1)
|
Flask-AppBuilder is an application development framework. Prior to 4.5.3, Flask-AppBuilde… | flask-appbuilder | 2025-03-03T16:15:41+00:00 | 2025-04-09T17:27:25.227116+00:00 |
| pysec-2025-14 |
|
An issue was discovered in Django 5.1 before 5.1.8 and 5.0 before 5.0.14. The NFKC normal… | django | 2025-04-02T13:15:44+00:00 | 2025-04-09T17:27:25.169049+00:00 |
| pysec-2025-13 |
|
An issue was discovered in Django 5.1 before 5.1.7, 5.0 before 5.0.13, and 4.2 before 4.2… | django | 2025-03-06T19:15:27+00:00 | 2025-04-09T17:27:25.095679+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33851 | phpecc, as used in paragonie/phpecc before 2.0.1, has a branch-based timing leak in Point… | 2024-04-28T05:02:07.732559Z |
| gsd-2024-33850 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.952536Z |
| gsd-2024-33849 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.924449Z |
| gsd-2024-4295 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:06.068263Z |
| gsd-2024-4294 | A vulnerability, which was classified as critical, has been found in PHPGurukul Doctor Ap… | 2024-04-28T05:02:06.079201Z |
| gsd-2024-4293 | A vulnerability classified as problematic was found in PHPGurukul Doctor Appointment Mana… | 2024-04-28T05:02:06.052534Z |
| gsd-2024-4292 | A vulnerability classified as critical has been found in Contemporary Controls BASrouter … | 2024-04-28T05:02:06.073286Z |
| gsd-2024-4291 | A vulnerability was found in Tenda A301 15.13.08.12_multi_TDE01. It has been rated as cri… | 2024-04-28T05:02:06.058388Z |
| gsd-2023-52722 | An issue was discovered in Artifex Ghostscript through 10.01.0. psi/zmisc1.c, when SAFER … | 2024-04-28T05:01:28.746814Z |
| gsd-2022-48685 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:00:27.870720Z |
| gsd-2022-48684 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:00:27.715598Z |
| gsd-2024-24777 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:24.547536Z |
| gsd-2024-28875 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:20.401696Z |
| gsd-2024-33846 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.353086Z |
| gsd-2024-33845 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.569462Z |
| gsd-2024-33844 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.384822Z |
| gsd-2024-33843 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.393431Z |
| gsd-2024-33842 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.286185Z |
| gsd-2024-33841 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.393169Z |
| gsd-2024-33840 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.586722Z |
| gsd-2024-33839 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.579161Z |
| gsd-2024-33838 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.585807Z |
| gsd-2024-33837 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.377806Z |
| gsd-2024-33836 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.309729Z |
| gsd-2024-33835 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.550838Z |
| gsd-2024-33834 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.333945Z |
| gsd-2024-33833 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.551960Z |
| gsd-2024-33832 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.298682Z |
| gsd-2024-33831 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.326184Z |
| gsd-2024-33830 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-27T05:02:18.395389Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-855 | Malicious code in config-toolkit (PyPI) | 2026-02-11T14:08:58Z | 2026-02-11T14:08:58Z |
| mal-2026-854 | Malicious code in sinon-node (npm) | 2026-02-11T10:54:37Z | 2026-02-11T10:54:42Z |
| mal-2026-853 | Malicious code in node-dotenv-cli (npm) | 2026-02-11T10:54:37Z | 2026-02-11T10:54:37Z |
| mal-2026-852 | Malicious code in chai-await (npm) | 2026-02-11T10:54:36Z | 2026-02-11T10:54:37Z |
| mal-2026-851 | Malicious code in python-files-mod (PyPI) | 2026-02-11T10:40:53Z | 2026-02-11T10:40:53Z |
| mal-2026-850 | Malicious code in ntoctfutils (PyPI) | 2026-02-11T08:58:36Z | 2026-02-11T08:58:36Z |
| mal-2026-848 | Malicious code in npm_cimetadata (npm) | 2026-02-11T03:35:51Z | 2026-02-11T08:21:22Z |
| mal-2026-849 | Malicious code in jsonconfig-utils (PyPI) | 2026-02-11T06:56:16Z | 2026-02-11T06:56:16Z |
| mal-2026-846 | Malicious code in cryptowallethash (PyPI) | 2026-02-10T23:03:29Z | 2026-02-10T23:05:44Z |
| mal-2026-847 | Malicious code in requests-auth-toolkit (PyPI) | 2026-02-10T22:45:40Z | 2026-02-10T22:45:40Z |
| mal-2026-845 | Malicious code in rzr-home (PyPI) | 2026-02-10T20:45:52Z | 2026-02-10T20:45:52Z |
| mal-2026-842 | Malicious code in amplify-python-logging (PyPI) | 2026-02-10T19:22:57Z | 2026-02-10T19:22:57Z |
| mal-2026-844 | Malicious code in vllm-plugins (PyPI) | 2026-02-10T19:19:17Z | 2026-02-10T19:19:17Z |
| mal-2026-843 | Malicious code in requests-core-plugin (PyPI) | 2026-02-10T19:14:49Z | 2026-02-10T19:14:49Z |
| mal-2026-841 | Malicious code in lyroxpy (PyPI) | 2026-02-10T19:02:39Z | 2026-02-10T19:02:39Z |
| mal-2026-839 | Malicious code in search-newfrontier-podlet (npm) | 2026-02-10T17:16:51Z | 2026-02-10T17:16:51Z |
| mal-2026-837 | Malicious code in notification-saved-search-settings-podlet (npm) | 2026-02-10T17:06:08Z | 2026-02-10T17:06:08Z |
| mal-2026-840 | Malicious code in search-savedsearch-podlet (npm) | 2026-02-10T17:06:06Z | 2026-02-10T17:06:06Z |
| mal-2026-836 | Malicious code in myads-layout (npm) | 2026-02-10T17:06:04Z | 2026-02-10T17:06:04Z |
| mal-2026-838 | Malicious code in realestate-atlas (npm) | 2026-02-10T17:06:02Z | 2026-02-10T17:06:02Z |
| mal-2026-553 | Malicious code in @snazah/davey (npm) | 2026-01-26T16:04:18Z | 2026-02-10T16:41:03Z |
| mal-2026-264 | Malicious code in @ux-foundry/palette (npm) | 2026-01-16T00:10:24Z | 2026-02-10T16:41:03Z |
| mal-2026-829 | Malicious code in @uniconvex/dotenv (npm) | 2026-02-10T16:30:16Z | 2026-02-10T16:30:17Z |
| mal-2026-828 | Malicious code in @reimorg/config (npm) | 2026-02-10T16:30:16Z | 2026-02-10T16:30:17Z |
| mal-2026-833 | Malicious code in express-configer (npm) | 2026-02-10T16:15:42Z | 2026-02-10T16:15:42Z |
| mal-2026-830 | Malicious code in aligners (npm) | 2026-02-10T16:05:06Z | 2026-02-10T16:05:06Z |
| mal-2026-835 | Malicious code in sap-code-style-guides (npm) | 2026-02-10T15:58:34Z | 2026-02-10T15:58:35Z |
| mal-2026-832 | Malicious code in chai-as-approved (npm) | 2026-02-10T15:56:44Z | 2026-02-10T15:56:44Z |
| mal-2026-831 | Malicious code in bigmathix (npm) | 2026-02-10T15:48:53Z | 2026-02-10T15:48:53Z |
| mal-2026-834 | Malicious code in graphflowx (npm) | 2026-02-10T15:46:43Z | 2026-02-10T15:46:43Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0105 | Red Hat Developer Hub: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0090 | Mozilla Firefox und Thunderbird: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0019 | Red Hat Enterprise Linux (Quarkus): Mehrere Schwachstellen | 2026-01-06T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0008 | Red Hat Enterprise Linux: Mehrere Schwachstellen | 2026-01-04T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2928 | GnuPG: Mehrere Schwachstellen | 2025-12-28T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2915 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-23T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2887 | PHP: Mehrere Schwachstellen | 2025-12-18T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2881 | Red Hat Enterprise Linux (multicluster global hub): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-12-17T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2812 | Mozilla Firefox: Mehrere Schwachstellen | 2025-12-09T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2755 | util-linux: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen | 2025-12-07T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2741 | cPython: Schwachstelle ermöglicht Denial of Service | 2025-12-03T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2724 | Golang Go: Mehrere Schwachstellen | 2025-12-02T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2706 | Python: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-01T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2672 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-24T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2658 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-11-20T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2616 | libvirt: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-11-17T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2608 | Golang Go: Schwachstelle ermöglicht Denial of Service | 2025-11-16T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2595 | Linux Kernel: Mehrere Schwachstellen | 2025-11-12T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2579 | Linux Kernel: Mehrere Schwachstellen | 2025-11-11T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2518 | Red Hat Enterprise Linux (runc): Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2025-11-09T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2450 | Linux Kernel: Mehrere Schwachstellen | 2025-10-29T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2431 | Linux Kernel: Mehrere Schwachstellen | 2025-10-28T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2407 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-26T23:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2311 | Red Hat Enterprise Linux (libsoup3): Schwachstelle ermöglicht Offenlegung von Informationen | 2025-10-15T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2298 | Linux Kernel: Mehrere Schwachstellen | 2025-10-14T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2227 | Golang Go: Mehrere Schwachstellen | 2025-10-07T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2193 | QEMU: Schwachstelle ermöglicht Denial of Service | 2025-10-05T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2144 | binutils: Mehrere Schwachstellen | 2025-09-28T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2134 | Red Hat Enterprise Linux (Developer Hub): Schwachstelle ermöglicht Denial of Service | 2025-09-25T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2107 | Linux Kernel: Mehrere Schwachstellen | 2025-09-22T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0005 | Kwetsbaarheden verholpen in Siemens producten | 2026-01-13T12:05:57.353070Z | 2026-01-13T12:05:57.353070Z |
| ncsc-2026-0004 | Kwetsbaarheden verholpen in Trend Micro Apex Central | 2026-01-09T11:14:58.910197Z | 2026-01-09T11:14:58.910197Z |
| ncsc-2026-0003 | Kwetsbaarheden verholpen in GitLab | 2026-01-09T11:11:48.308357Z | 2026-01-09T11:11:48.308357Z |
| ncsc-2026-0002 | Kwetsbaarheid verholpen in n8n | 2026-01-08T12:34:29.315681Z | 2026-01-08T12:34:29.315681Z |
| ncsc-2026-0001 | Kwetsbaarheden verholpen in Hanwha camera systemen | 2026-01-08T12:28:21.446188Z | 2026-01-08T12:28:21.446188Z |
| ncsc-2025-0405 | Kwetsbaarheid verholpen in Roundcube Webmail | 2025-12-31T14:29:26.821576Z | 2025-12-31T14:29:26.821576Z |
| ncsc-2025-0404 | Kwetsbaarheid verholpen in SmarterMail | 2025-12-31T14:19:01.847364Z | 2025-12-31T14:19:01.847364Z |
| ncsc-2025-0403 | Kwetsbaarheden verholpen in QNAP besturingssystemen | 2025-12-29T09:17:28.385450Z | 2025-12-29T09:17:28.385450Z |
| ncsc-2025-0402 | Kwetsbaarheid verholpen in MongoDB | 2025-12-27T11:38:11.514349Z | 2025-12-27T11:38:11.514349Z |
| ncsc-2025-0399 | Kwetsbaarheid verholpen in HPE OneView Software | 2025-12-18T18:38:20.794784Z | 2025-12-24T11:29:46.123674Z |
| ncsc-2025-0401 | Kwetsbaarheden verholpen in Foxit PDF Reader | 2025-12-24T09:14:56.590353Z | 2025-12-24T09:14:56.590353Z |
| ncsc-2025-0400 | Kwetsbaarheid verholpen in WatchGuard Firebox | 2025-12-19T11:16:01.438518Z | 2025-12-19T11:16:01.438518Z |
| ncsc-2025-0398 | Kwetsbaarheid in Cisco AsyncOS | 2025-12-17T19:47:00.346651Z | 2025-12-17T19:47:00.346651Z |
| ncsc-2025-0397 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2025-12-15T09:08:39.804149Z | 2025-12-15T09:08:39.804149Z |
| ncsc-2025-0396 | Kwetsbaarheden verholpen in Apple macOS | 2025-12-15T09:06:36.450655Z | 2025-12-15T09:06:36.450655Z |
| ncsc-2025-0394 | Kwetsbaarheden verholpen in React Server Components | 2025-12-12T09:04:19.324080Z | 2025-12-12T10:46:34.688189Z |
| ncsc-2025-0395 | Kwetsbaarheden verholpen in SAP Software | 2025-12-12T09:29:08.429888Z | 2025-12-12T09:29:08.429888Z |
| ncsc-2025-0393 | Kwetsbaarheid verholpen in GeoServer | 2025-12-12T08:12:18.831044Z | 2025-12-12T09:02:27.681292Z |
| ncsc-2025-0392 | Kwetsbaarheid verholpen in Barracuda Service Center | 2025-12-11T13:53:23.819008Z | 2025-12-11T13:53:23.819008Z |
| ncsc-2025-0391 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2025-12-11T13:51:55.178462Z | 2025-12-11T13:51:55.178462Z |
| ncsc-2025-0390 | Kwetsbaarheden verholpen in GitLab CE/EE | 2025-12-11T09:22:54.841848Z | 2025-12-11T09:22:54.841848Z |
| ncsc-2025-0389 | Kwetsbaarheden verholpen in Adobe Experience Manager | 2025-12-10T14:59:57.911864Z | 2025-12-10T14:59:57.911864Z |
| ncsc-2025-0388 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2025-12-10T13:35:58.314547Z | 2025-12-10T13:35:58.314547Z |
| ncsc-2025-0387 | Kwetsbaarheden verholpen in Adobe ColdFusion | 2025-12-10T13:34:08.908897Z | 2025-12-10T13:34:08.908897Z |
| ncsc-2025-0385 | Kwetsbaarheden verholpen in Microsoft Exchange | 2025-12-09T18:42:32.332749Z | 2025-12-09T18:42:32.332749Z |
| ncsc-2025-0384 | Kwetsbaarheden verholpen in Microsoft Office | 2025-12-09T18:40:33.839342Z | 2025-12-09T18:40:33.839342Z |
| ncsc-2025-0383 | Kwetsbaarheden verholpen in Microsoft Windows | 2025-12-09T18:39:18.152251Z | 2025-12-09T18:39:18.152251Z |
| ncsc-2025-0382 | Kwetsbaarheden verholpen in Siemens producten | 2025-12-09T13:15:05.391966Z | 2025-12-09T13:15:05.391966Z |
| ncsc-2025-0381 | Kwetsbaarheden verholpen in Splunk Enterprise en Splunk Cloud Platform | 2025-12-08T08:23:21.965599Z | 2025-12-08T08:23:21.965599Z |
| ncsc-2025-0380 | Kwetsbaarheden verholpen in React Server Components | 2025-12-03T20:11:57.728117Z | 2025-12-05T12:13:36.590522Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-750499 | SSA-750499: Weak Encryption Vulnerability in SIPROTEC 5 Devices | 2024-07-09T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-726617 | SSA-726617: Incorrect Privilege Assignment Vulnerability in Mendix OIDC SSO Module | 2025-05-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-711309 | SSA-711309: Denial of Service Vulnerability in the OPC UA Implementations of SIMATIC Products | 2023-09-12T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-687955 | SSA-687955: Accessible Development Shell via Physical Interface in SIPROTEC 5 | 2025-02-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-682326 | SSA-682326: Multiple Vulnerabilities in COMOS before V10.4.5 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-631336 | SSA-631336: Multiple Web Server Vulnerabilities in SICAM GridEdge Before V2.6.6 | 2022-06-14T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-552874 | SSA-552874: Denial of Service Vulnerability in SIPROTEC 5 Devices | 2022-12-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-522291 | SSA-522291: Improper Certificate Validation Vulnerability in Solid Edge | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-514895 | SSA-514895: Multiple Vulnerabilities in Altair Grid Engine V2025.1.0 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-365596 | SSA-365596: DLL Hijacking Vulnerability in Siemens Software Center and Solid Edge | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-339694 | SSA-339694: Multiple Vulnerabilities in Spectrum Power 4 Before v4.70 SP12 Security Patch 2 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-322980 | SSA-322980: Denial of Service Vulnerability in SIPROTEC 5 Devices | 2023-04-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-301229 | SSA-301229: Client-Side Enforcement of Server-Side Security Vulnerabilities in RUGGEDCOM ROX II | 2025-05-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-267056 | SSA-267056: Multiple Vulnerabilities in LOGO! 8 BM Devices | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-225578 | SSA-225578: Improper Access Control Vulnerability in SICAM GridEdge Before V2.7.3 | 2022-07-12T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-201498 | SSA-201498: Multiple Vulnerabilities in the Web Server of SICAM P850 and SICAM P855 Devices Before V3.11 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-194557 | SSA-194557: Improper Limitation of Filesystem Access through Web Server Vulnerability in SIPROTEC 5 | 2025-01-14T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-876787 | SSA-876787: Open Redirect Vulnerability in SIMATIC S7-1500 and S7-1200 CPUs | 2024-10-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-722410 | SSA-722410: Multiple Vulnerabilities in User Management Component (UMC) | 2025-09-09T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-625789 | SSA-625789: Multiple Vulnerabilities in SIMATIC S7-1200 CPU V1/V2 Devices | 2011-06-10T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-614723 | SSA-614723: Denial of Service Vulnerabilities in User Management Component (UMC) | 2025-05-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-541582 | SSA-541582: Multiple File Parsing Vulnerabilities in Solid Edge | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-486936 | SSA-486936: Authentication Vulnerability in SIMATIC ET 200SP Communication Processors | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-373591 | SSA-373591: Buffer Overflow Vulnerability in RUGGEDCOM ROS Devices | 2021-07-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-367714 | SSA-367714: Improper Integrity Check of Firmware Updates in SiPass integrated AC5102 / ACC-G2 and ACC-AP | 2025-05-23T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-318832 | SSA-318832: SQL Injection Vulnerability in SINEC NMS | 2025-10-14T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-279823 | SSA-279823: Cross-Site Scripting Vulnerability in SIMATIC S7-1200 CPU V2/V3 Before V3.0.2 | 2012-10-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-240718 | SSA-240718: Insecure Storage of HTTPS CA Certificate in SIMATIC S7-1200 CPU V2 | 2012-09-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-186293 | SSA-186293: XML External Entity (XXE) Injection Vulnerability in SIMOTION SCOUT, SIMOTION SCOUT TIA and SINAMICS STARTER | 2025-08-12T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-083019 | SSA-083019: Multiple Vulnerabilities in RUGGEDCOM ROS Devices | 2025-07-08T00:00:00Z | 2025-10-14T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:1331 | Red Hat Security Advisory: fence-agents security update | 2026-01-27T09:04:37+00:00 | 2026-02-15T10:11:15+00:00 |
| rhsa-2026:1330 | Red Hat Security Advisory: fence-agents security update | 2026-01-27T08:38:11+00:00 | 2026-02-15T10:11:15+00:00 |
| rhsa-2026:1329 | Red Hat Security Advisory: fence-agents security update | 2026-01-27T08:39:01+00:00 | 2026-02-15T10:11:15+00:00 |
| rhsa-2026:1254 | Red Hat Security Advisory: python-urllib3 security update | 2026-01-26T20:52:30+00:00 | 2026-02-15T10:11:15+00:00 |
| rhsa-2026:1241 | Red Hat Security Advisory: resource-agents security update | 2026-01-26T18:01:29+00:00 | 2026-02-15T10:11:15+00:00 |
| rhsa-2026:1240 | Red Hat Security Advisory: fence-agents security update | 2026-01-26T18:30:35+00:00 | 2026-02-15T10:11:14+00:00 |
| rhsa-2026:1239 | Red Hat Security Advisory: fence-agents security update | 2026-01-26T18:09:09+00:00 | 2026-02-15T10:11:14+00:00 |
| rhsa-2026:1226 | Red Hat Security Advisory: python3.12-urllib3 security update | 2026-01-26T15:35:09+00:00 | 2026-02-15T10:11:14+00:00 |
| rhsa-2026:1026 | Red Hat Security Advisory: RHOAI 3.2 - Red Hat OpenShift AI | 2026-01-22T16:34:21+00:00 | 2026-02-15T10:11:14+00:00 |
| rhsa-2026:1224 | Red Hat Security Advisory: python3.11-urllib3 security update | 2026-01-26T15:03:40+00:00 | 2026-02-15T10:11:13+00:00 |
| rhsa-2026:1176 | Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.18.1 | 2026-01-26T10:17:05+00:00 | 2026-02-15T10:11:13+00:00 |
| rhsa-2026:1168 | Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.18.1 | 2026-01-26T09:54:57+00:00 | 2026-02-15T10:11:13+00:00 |
| rhsa-2026:1087 | Red Hat Security Advisory: python-urllib3 security update | 2026-01-26T13:09:48+00:00 | 2026-02-15T10:11:13+00:00 |
| rhsa-2026:1042 | Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.18.1 | 2026-01-22T18:14:00+00:00 | 2026-02-15T10:11:13+00:00 |
| rhsa-2026:1089 | Red Hat Security Advisory: python3.11-urllib3 security update | 2026-01-26T14:11:43+00:00 | 2026-02-15T10:11:12+00:00 |
| rhsa-2026:1088 | Red Hat Security Advisory: python3.12-urllib3 security update | 2026-01-26T14:19:44+00:00 | 2026-02-15T10:11:12+00:00 |
| rhsa-2026:1086 | Red Hat Security Advisory: python-urllib3 security update | 2026-01-26T12:44:33+00:00 | 2026-02-15T10:11:11+00:00 |
| rhsa-2026:1041 | Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.18.1 | 2026-01-22T18:11:01+00:00 | 2026-02-15T10:11:11+00:00 |
| rhsa-2026:1027 | Red Hat Security Advisory: RHOAI 3.2 - Red Hat OpenShift AI | 2026-01-22T16:34:27+00:00 | 2026-02-15T10:11:11+00:00 |
| rhsa-2026:0990 | Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.18.1 | 2026-01-22T11:34:41+00:00 | 2026-02-15T10:11:11+00:00 |
| rhsa-2026:0414 | Red Hat Security Advisory: A Subscription Management tool for finding and reporting Red Hat product usage | 2026-01-08T22:34:17+00:00 | 2026-02-15T10:11:09+00:00 |
| rhsa-2026:0050 | Red Hat Security Advisory: Red Hat OpenShift Builds 1.6.2 | 2026-01-05T08:04:03+00:00 | 2026-02-15T10:11:08+00:00 |
| rhsa-2026:2568 | Red Hat Security Advisory: RHACS 4.9.3 security and bug fix update | 2026-02-11T15:09:41+00:00 | 2026-02-15T07:25:13+00:00 |
| rhsa-2026:2350 | Red Hat Security Advisory: RHACS 4.9.3 security and bug fix update | 2026-02-09T15:50:42+00:00 | 2026-02-15T07:25:13+00:00 |
| rhsa-2026:2343 | Red Hat Security Advisory: Red Hat OpenShift API for Data Protection | 2026-02-09T14:20:06+00:00 | 2026-02-15T07:25:10+00:00 |
| rhsa-2026:2172 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.15 security, enhancement & bug fix update | 2026-02-05T18:06:29+00:00 | 2026-02-15T07:25:05+00:00 |
| rhsa-2026:2164 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.16 security, enhancement & bug fix update | 2026-02-05T17:49:21+00:00 | 2026-02-15T07:25:04+00:00 |
| rhsa-2026:2155 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.17 security, enhancement & bug fix update | 2026-02-05T17:17:50+00:00 | 2026-02-15T07:25:03+00:00 |
| rhsa-2026:2136 | Red Hat Security Advisory: RHTAS 1.3.2 - Red Hat Trusted Artifact Signer Release | 2026-02-05T15:17:09+00:00 | 2026-02-15T07:25:00+00:00 |
| rhsa-2026:2034 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.20 security, enhancement & bug fix update | 2026-02-05T06:37:04+00:00 | 2026-02-15T07:24:59+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-022-04 | Johnson Controls Inc. iSTAR Configuration Utility (ICU) tool | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-03 | Rockwell Automation CompactLogix 5370 | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-02 | AutomationDirect CLICK Programmable Logic Controller | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-25-352-08 | Axis Communications Camera Station Pro, Camera Station, and Device Manager (Update B) | 2025-12-18T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-24-326-04 | Schneider Electric Modicon M340, MC80, and Momentum Unity M1E (Update B) | 2024-11-12T05:00:00.000000Z | 2026-01-20T15:49:53.166459Z |
| icsa-26-020-01 | Schneider Electric EcoStruxure Foxboro DCS | 2025-12-09T08:00:00.000000Z | 2026-01-20T15:49:52.728135Z |
| icsa-25-070-01 | Schneider Electric Uni-Telway Driver (Update B) | 2025-02-11T05:00:00.000000Z | 2026-01-20T15:49:52.295431Z |
| icsa-26-020-02 | Schneider Electric devices using CODESYS Runtime | 2023-07-11T07:15:18.000000Z | 2026-01-20T15:49:51.778731Z |
| icsa-26-020-03 | Rockwell Automation Verve Asset Manager | 2026-01-20T07:00:00.000000Z | 2026-01-20T07:00:00.000000Z |
| va-26-015-01 | NOAA PMEL Live Access Server (LAS) command injection | 2026-01-15T19:59:37Z | 2026-01-15T19:59:37Z |
| icsa-26-015-01 | AVEVA Process Optimization | 2026-01-15T07:00:00.000000Z | 2026-01-15T07:00:00.000000Z |
| icsa-24-135-04 | Mitsubishi Electric Multiple FA Engineering Software Products (Update E) | 2024-05-14T06:00:00.000000Z | 2026-01-15T07:00:00.000000Z |
| icsa-22-202-04 | ICONICS Suite and Mitsubishi Electric MC Works64 Products (Update B) | 2022-07-26T06:00:00.000000Z | 2026-01-15T07:00:00.000000Z |
| icsa-26-015-08 | Siemens Industrial Edge Devices | 2026-01-13T00:00:00.000000Z | 2026-01-14T23:03:52.355094Z |
| icsa-26-015-02 | Festo Firmware | 2022-11-29T11:49:00.000000Z | 2026-01-14T22:46:49.184310Z |
| icsa-26-015-07 | Siemens RUGGEDCOM APE1808 Devices | 2026-01-13T00:00:00.000000Z | 2026-01-14T22:35:44.478578Z |
| icsa-26-015-06 | Siemens SINEC Security Monitor | 2025-12-09T00:00:00.000000Z | 2026-01-14T22:35:44.907344Z |
| icsa-26-015-05 | Siemens RUGGEDCOM ROS | 2025-12-09T00:00:00.000000Z | 2026-01-14T22:35:44.058931Z |
| icsa-26-015-10 | Schneider Electric EcoStruxure Power Build Rapsody | 2026-01-13T08:00:00.000000Z | 2026-01-14T22:35:43.622072Z |
| icsa-26-015-03 | Siemens TeleControl Server Basic | 2026-01-13T00:00:00.000000Z | 2026-01-14T22:32:36.777247Z |
| icsa-25-226-09 | Siemens RUGGEDCOM APE1808 | 2025-08-12T00:00:00.000000Z | 2026-01-14T22:05:42.880807Z |
| icsa-25-072-09 | Siemens OPC UA | 2025-03-11T00:00:00.000000Z | 2026-01-14T22:05:42.018496Z |
| icsa-24-354-04 | Siemens User Management Component | 2024-12-16T00:00:00.000000Z | 2026-01-14T22:05:42.437898Z |
| icsa-25-289-10 | Siemens HyperLynx and Industrial Edge App Publisher | 2025-10-14T00:00:00.000000Z | 2026-01-14T22:05:41.165529Z |
| icsa-25-162-04 | Siemens SCALANCE and RUGGEDCOM | 2025-06-10T00:00:00.000000Z | 2026-01-14T22:05:41.593078Z |
| icsa-25-231-02 | Siemens Mendix SAML Module | 2025-08-14T00:00:00.000000Z | 2026-01-14T22:05:40.193680Z |
| icsa-24-074-05 | Siemens RUGGEDCOM APE1808 | 2024-03-12T00:00:00.000000Z | 2026-01-14T22:00:12.208787Z |
| icsa-24-193-02 | Siemens RUGGEDCOM APE 1808 | 2024-07-09T00:00:00.000000Z | 2026-01-14T22:00:11.677616Z |
| icsa-24-074-11 | Siemens RUGGEDCOM APE1808 with Fortigate NGFW Devices | 2024-03-12T00:00:00.000000Z | 2026-01-14T22:00:10.660779Z |
| icsa-24-193-11 | Siemens RUGGEDCOM APE 1808 | 2024-07-09T00:00:00.000000Z | 2026-01-14T22:00:09.701376Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-epnm-info-dis-zhppmfgz | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Information Disclosure Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-epni-arb-file-upload-jjdm2p83 | Cisco Evolved Programmable Network Manager Arbitrary File Upload Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-cucm-csrf-w762pryd | Cisco Unified Communications Manager Cross-Site Request Forgery Vulnerability | 2025-09-03T16:00:00+00:00 | 2025-09-03T16:00:00+00:00 |
| cisco-sa-3100_4200_tlsdos-2ynscd54 | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software for Firepower 3100 and 4200 Series TLS 1.3 Cipher Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-09-03T13:37:50+00:00 |
| cisco-sa-ucs-xss-ey6xhyps | Cisco UCS Manager Software Stored Cross-Site Scripting Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ucs-vkvmorv-cnkrv7hk | Cisco Integrated Management Controller Virtual Keyboard Video Monitor Open Redirect Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ucs-multi-cmdinj-e4ukjyrz | Cisco UCS Manager Software Command Injection Vulnerabilities | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ucs-kvmsxss-6h7anuyk | Cisco Integrated Management Controller Virtual Keyboard Video Monitor Stored Cross-Site Scripting Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nxospc-pim6-vg4jfph | Cisco Nexus 3000 and 9000 Series Switches Protocol Independent Multicast Version 6 Denial of Service Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nxos-infodis-tectysfg | Cisco NX-OS Software Sensitive Log Information Disclosure Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nxos-cmdinj-qhnze5ss | Cisco NX-OS Software Command Injection Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nshs-urapi-gjubvfpu | Cisco Nexus Dashboard and Nexus Dashboard Fabric Controller Unauthorized REST API Vulnerabilities | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-nd-ptrs-xu2fm2wb | Cisco Nexus Dashboard Path Traversal Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-n39k-isis-dos-jhja8rfx | Cisco Nexus 3000 and 9000 Series Switches Intermediate System-to-Intermediate System Denial of Service Vulnerability | 2025-08-27T16:00:00+00:00 | 2025-08-27T16:00:00+00:00 |
| cisco-sa-ise-file-upload-qksx6c8g | Cisco Identity Services Engine Arbitrary File Upload Vulnerability | 2025-08-20T16:00:00+00:00 | 2025-08-20T16:43:01+00:00 |
| cisco-sa-pi-epnm-tet4gxbx | Cisco Evolved Programmable Network Manager and Cisco Prime Infrastructure Sensitive Information Disclosure Vulnerability | 2025-08-20T16:00:00+00:00 | 2025-08-20T16:00:00+00:00 |
| cisco-sa-authproxlog-sxczxq63 | Cisco Duo Authentication Proxy Information Disclosure Vulnerability | 2025-08-20T16:00:00+00:00 | 2025-08-20T16:00:00+00:00 |
| cisco-sa-20180328-smi2 | Cisco IOS and IOS XE Software Smart Install Remote Code Execution Vulnerability | 2018-03-28T16:00:00+00:00 | 2025-08-20T14:26:26+00:00 |
| cisco-sa-asaftd-ssltls-dos-ehw76vze | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software SSL/TLS Certificate Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-19T16:32:05+00:00 |
| cisco-sa-ftd-ravpn-geobypass-9h38m37z | Cisco Secure Firewall Threat Defense Software Geolocation Remote Access VPN Bypass Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-ftd-dos-svkhtjgt | Cisco Secure Firewall Threat Defense Software Snort 3 Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-xss-jtnmcusp | Cisco Secure Firewall Management Center Software Cross-Site Scripting Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-xpathinj-corthdmb | Cisco Secure Firewall Management Center Software XPATH Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-radius-rce-tnbkf79 | Cisco Secure Firewall Management Center Software RADIUS Remote Code Execution Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-html-inj-mqjrzrny | Cisco Secure Firewall Management Center Software HTML Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-ftd-cmdinj-phe7kmt | Cisco Secure Firewall Management Center and Secure Firewall Threat Defense Software Command Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-cmd-inj-hcrlpfyn | Cisco Secure Firewall Management Center Software Command Injection Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-fmc-authz-bypass-m7xhnau | Cisco Secure Firewall Management Center Software Authorization Bypass Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-vpnwebs-dos-hjbhmbsx | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Remote Access VPN Web Server Denial of Service Vulnerability | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| cisco-sa-asaftd-vpn-dos-mfpeka6e | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Remote Access SSL VPN Denial of Service Vulnerabilities | 2025-08-14T16:00:00+00:00 | 2025-08-14T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sca-2021-0003 | SICK Security Advisory for Apache Log4j (CVE-2021-44228) | 2021-12-14T17:00:00.000Z | 2021-12-17T12:00:00.000Z |
| sca-2021-0004 | Vulnerabilities in SICK SOPAS ET | 2021-12-16T08:00:00.000Z | 2021-12-17T08:00:00.000Z |
| sca-2021-0002 | MEAC affected by Windows SMBv1 vulnerability | 2021-08-04T10:00:00.000Z | 2021-08-04T10:00:00.000Z |
| sca-2021-0001 | Inadequate SSH configuration in SICK Visionary-S CX | 2021-06-25T10:00:00.000Z | 2021-06-25T10:00:00.000Z |
| sca-2020-0005 | Package Analytics affected by Windows TCP/IP vulnerability | 2020-10-29T11:00:00.000Z | 2020-10-29T11:00:00.000Z |
| sca-2020-0004 | Vulnerability in Platform Mechanism AutoIP | 2020-08-31T10:00:00.000Z | 2020-08-31T10:00:00.000Z |
| sca-2020-0003 | MEAC affected by Windows SMBv3 vulnerability | 2020-08-07T10:00:00.000Z | 2020-08-07T10:00:00.000Z |
| sca-2020-0002 | Vulnerabilities in SICK Package Analytics | 2020-08-07T10:00:00.000Z | 2020-07-28T10:00:00.000Z |
| sca-2020-0001 | Security Information Regarding "Profile Programming" | 2020-05-31T10:00:00.000Z | 2020-05-31T10:00:00.000Z |
| sca-2019-0002 | Vulnerability in SICK FX0-GENT00000 and SICK FX0-GPNT00000 | 2019-09-20T10:00:00.000Z | 2019-09-20T10:00:00.000Z |
| sca-2019-0001 | MSC800 affected by hard-coded credentials vulnerability | 2019-06-21T10:00:00.000Z | 2019-06-21T10:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-0391 | Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability | 2026-02-10T00:00:00.000Z | 2026-02-05T00:00:00.000Z |
| msrc_cve-2025-6965 | Integer Truncation on SQLite | 2025-07-02T00:00:00.000Z | 2026-02-04T08:00:00.000Z |
| msrc_cve-2026-21509 | Microsoft Office Security Feature Bypass Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-29T08:00:00.000Z |
| msrc_cve-2026-20960 | PowerApps Desktop Client Remote Code Execution Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-29T08:00:00.000Z |
| msrc_cve-2026-20805 | Desktop Window Manager Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-27T08:00:00.000Z |
| msrc_cve-2026-24307 | M365 Copilot Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-22T08:00:00.000Z |
| msrc_cve-2026-24306 | Azure Front Door Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-22T08:00:00.000Z |
| msrc_cve-2026-24305 | Azure Entra ID Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-22T08:00:00.000Z |
| msrc_cve-2026-24304 | Azure Resource Manager Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-22T08:00:00.000Z |
| msrc_cve-2026-21524 | Azure Data Explorer Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-22T08:00:00.000Z |
| msrc_cve-2026-21521 | Word Copilot Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-22T08:00:00.000Z |
| msrc_cve-2026-21520 | Copilot Studio Information Disclosure Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-22T08:00:00.000Z |
| msrc_cve-2026-21264 | Microsoft Account Spoofing Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-22T08:00:00.000Z |
| msrc_cve-2026-21227 | Azure Logic Apps Elevation of Privilege Vulnerability | 2026-01-13T08:00:00.000Z | 2026-01-22T08:00:00.000Z |
| msrc_cve-2025-39828 | atm: atmtcp: Prevent arbitrary write in atmtcp_recv_control(). | 2025-09-02T00:00:00.000Z | 2026-01-21T01:42:47.000Z |
| msrc_cve-2025-39826 | net: rose: convert 'use' field to refcount_t | 2025-09-02T00:00:00.000Z | 2026-01-21T01:42:37.000Z |
| msrc_cve-2025-39790 | bus: mhi: host: Detect events pointing to unexpected TREs | 2025-09-02T00:00:00.000Z | 2026-01-21T01:42:25.000Z |
| msrc_cve-2025-39788 | scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE | 2025-09-02T00:00:00.000Z | 2026-01-21T01:42:15.000Z |
| msrc_cve-2025-9230 | Out-of-bounds read & write in RFC 3211 KEK Unwrap | 2025-09-02T00:00:00.000Z | 2026-01-21T01:06:47.000Z |
| msrc_cve-2025-9232 | Out-of-bounds read in HTTP client no_proxy handling | 2025-09-02T00:00:00.000Z | 2026-01-21T01:06:20.000Z |
| msrc_cve-2025-4575 | The x509 application adds trusted use instead of rejected use | 2025-05-02T00:00:00.000Z | 2026-01-21T01:06:08.000Z |
| msrc_cve-2025-4207 | PostgreSQL GB18030 encoding validation can read one byte past end of allocation for text that fails validation | 2025-05-02T00:00:00.000Z | 2026-01-21T01:05:40.000Z |
| msrc_cve-2025-39853 | i40e: Fix potential invalid access when MAC list is empty | 2025-09-02T00:00:00.000Z | 2026-01-21T01:04:23.000Z |
| msrc_cve-2025-39848 | ax25: properly unshare skbs in ax25_kiss_rcv() | 2025-09-02T00:00:00.000Z | 2026-01-21T01:04:15.000Z |
| msrc_cve-2025-39847 | ppp: fix memory leak in pad_compress_skb | 2025-09-02T00:00:00.000Z | 2026-01-21T01:04:06.000Z |
| msrc_cve-2025-39846 | pcmcia: Fix a NULL pointer dereference in __iodyn_find_io_region() | 2025-09-02T00:00:00.000Z | 2026-01-21T01:03:58.000Z |
| msrc_cve-2025-39845 | x86/mm/64: define ARCH_PAGE_TABLE_SYNC_MASK and arch_sync_kernel_mappings() | 2025-09-02T00:00:00.000Z | 2026-01-21T01:03:49.000Z |
| msrc_cve-2025-39844 | mm: move page table sync declarations to linux/pgtable.h | 2025-09-02T00:00:00.000Z | 2026-01-21T01:03:40.000Z |
| msrc_cve-2025-39841 | scsi: lpfc: Fix buffer free/clear order in deferred receive path | 2025-09-02T00:00:00.000Z | 2026-01-21T01:03:31.000Z |
| msrc_cve-2025-39839 | batman-adv: fix OOB read/write in network-coding decode | 2025-09-02T00:00:00.000Z | 2026-01-21T01:03:23.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10114-1 | logback-1.2.13-2.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10113-1 | icinga2-2.15.2-1.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10112-1 | dirmngr-2.5.17-1.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10111-1 | gio-branding-upstream-2.86.3-3.1 on GA media | 2026-01-29T00:00:00Z | 2026-01-29T00:00:00Z |
| opensuse-su-2026:10110-1 | python311-salt-3006.0-55.1 on GA media | 2026-01-28T00:00:00Z | 2026-01-28T00:00:00Z |
| opensuse-su-2026:10109-1 | python311-sse-starlette-3.2.0-1.1 on GA media | 2026-01-28T00:00:00Z | 2026-01-28T00:00:00Z |
| opensuse-su-2026:10108-1 | java-25-openjdk-25.0.2.0-1.1 on GA media | 2026-01-28T00:00:00Z | 2026-01-28T00:00:00Z |
| opensuse-su-2026:10107-1 | freerdp-3.21.0-1.1 on GA media | 2026-01-28T00:00:00Z | 2026-01-28T00:00:00Z |
| opensuse-su-2026:10106-1 | assertj-core-3.27.7-1.1 on GA media | 2026-01-28T00:00:00Z | 2026-01-28T00:00:00Z |
| opensuse-su-2026:10105-1 | teleport-17.7.14-1.1 on GA media | 2026-01-27T00:00:00Z | 2026-01-27T00:00:00Z |
| opensuse-su-2026:10104-1 | python311-sigstore-4.2.0-1.1 on GA media | 2026-01-27T00:00:00Z | 2026-01-27T00:00:00Z |
| opensuse-su-2026:10103-1 | python311-orjson-3.11.5-1.1 on GA media | 2026-01-27T00:00:00Z | 2026-01-27T00:00:00Z |
| opensuse-su-2026:10102-1 | libopencc1_2-1.2.0-1.1 on GA media | 2026-01-27T00:00:00Z | 2026-01-27T00:00:00Z |
| opensuse-su-2026:10101-1 | coredns-1.14.1-1.1 on GA media | 2026-01-27T00:00:00Z | 2026-01-27T00:00:00Z |
| opensuse-su-2026:20113-1 | Security update for php8 | 2026-01-26T12:37:41Z | 2026-01-26T12:37:41Z |
| opensuse-su-2026:20112-1 | Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-01-26T11:03:44Z | 2026-01-26T11:03:44Z |
| opensuse-su-2026:20110-1 | Security update for avahi | 2026-01-26T10:20:39Z | 2026-01-26T10:20:39Z |
| opensuse-su-2026:20108-1 | Security update for the Linux Kernel RT (Live Patch 2 for SUSE Linux Enterprise 16) | 2026-01-26T09:12:02Z | 2026-01-26T09:12:02Z |
| opensuse-su-2026:10100-1 | zot-registry-2.1.14-1.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10099-1 | zli-2.1.14-1.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10098-1 | tlp-1.8.0-1.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10097-1 | qemu-10.2.0-2.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10096-1 | python311-urllib3_1-1.26.20-5.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10095-1 | libopenjp2-7-2.5.4-2.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10094-1 | libmatio-devel-1.5.30-1.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10093-1 | java-21-openjdk-21.0.10.0-1.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10092-1 | java-17-openjdk-17.0.18.0-1.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10091-1 | java-11-openjdk-11.0.30.0-1.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10090-1 | google-osconfig-agent-20260119.00-1.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| opensuse-su-2026:10089-1 | gio-branding-upstream-2.86.3-2.1 on GA media | 2026-01-26T00:00:00Z | 2026-01-26T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2024-345-02 | Harmony HMI and Pro-face HMI products | 2024-12-10T00:00:00.000Z | 2024-12-10T00:00:00.000Z |
| sevd-2024-345-01 | PowerChute Serial Shutdown | 2024-12-10T00:00:00.000Z | 2024-12-10T00:00:00.000Z |
| sevd-2024-317-04 | EcoStruxure™ IT Gateway | 2024-11-12T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2024-317-02 | Modicon Controllers M340 / Momentum / MC80 | 2024-11-12T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2024-317-01 | PowerLogic PM5300 Series | 2024-11-12T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2021-159-02 | PowerLogic PM5500 and PowerLogic PM8ECC | 2021-06-08T00:00:00.000Z | 2024-11-12T00:00:00.000Z |
| sevd-2024-282-08 | EcoStruxure EV Charging Expert | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-07 | System Monitor Application in Harmony and Pro-face PS5000 Legacy Industrial PCs | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-06 | Zelio Soft 2 | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-04 | EVlink Home Smart and Schneider Charge | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-03 | Easergy Studio | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-02 | Harmony iPC – HMIBSC IIoT Edge Box Core | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-282-01 | Data Center Expert | 2024-10-08T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2022-102-02 | Modicon M340 Controller and Communication Modules | 2022-04-12T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2024-254-02 | EcoStruxure™ Power Monitoring Expert and EcoStruxure™ Power Operation or EcoStruxure™ Power SCADA Operation with Advanced Reporting and Dashboards | 2024-09-10T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| sevd-2024-163-02 | PowerLogic P5 | 2024-06-11T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| sevd-2023-073-01 | EcoStruxure™ Power Monitoring Expert | 2023-03-14T00:00:00.000Z | 2024-09-10T00:00:00.000Z |
| sevd-2023-192-02 | EcoStruxure™ OPC UA Server Expert | 2023-07-11T07:01:56.000Z | 2024-08-13T07:00:00.000Z |
| sevd-2024-226-02 | EcoStruxure™ Machine SCADA Expert / BLUE Open Studio | 2024-08-13T00:00:00.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2024-226-01 | Accutech Manager | 2024-08-13T00:00:00.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2023-101-05 | Modicon PLCs (Programmable Logic Controllers) and PACs (Programmable Automation Controllers) | 2023-04-11T09:46:26.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2023-010-06 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon M340, M580 and M580 CPU Safety | 2023-01-10T15:17:09.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2023-010-05 | EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon PLCs (Programmable Logic Controllers) and PACs (Programmable Automation Controllers) | 2023-01-10T15:41:57.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-221-04 | Modicon PAC Controllers | 2022-08-09T08:15:40.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-221-02 | Modicon PAC Controllers | 2022-08-09T08:15:40.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2022-221-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, and Modicon Controllers M580 and M340 | 2022-08-09T10:58:35.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2021-222-04 | Modicon PAC Controllers and PLC Simulator for EcoStruxure™ Control Expert and EcoStruxure™ Process Expert | 2021-08-10T02:27:39.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2021-194-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, SCADAPack RemoteConnect™ x70, and Modicon Controllers M580 and M340 | 2021-07-13T08:22:02.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2019-281-02 | Modicon Controllers | 2019-09-26T12:53:28.000Z | 2024-08-13T00:00:00.000Z |
| sevd-2018-081-01 | Embedded FTP Servers for Modicon PAC Controllers | 2018-03-22T03:39:21.000Z | 2024-08-13T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-golang-2025-68121 | Unexpected session resumption in crypto/tls | 2026-02-10T10:05:16.474Z | 2026-02-11T09:09:18.507Z |
| bit-golang-2023-44487 | 2024-03-06T10:53:14.274Z | 2026-02-11T09:09:18.507Z | |
| bit-envoy-2023-44487 | 2024-03-06T10:52:27.702Z | 2026-02-11T09:09:18.507Z | |
| bit-dotnet-2023-44487 | 2024-03-06T10:52:07.879Z | 2026-02-11T09:09:18.507Z | |
| bit-django-2024-27351 | 2024-07-02T07:16:49.319Z | 2026-02-11T09:09:18.507Z | |
| bit-contour-2023-44487 | 2024-03-06T10:50:58.800Z | 2026-02-11T09:09:18.507Z | |
| bit-apisix-2023-44487 | 2024-03-06T10:50:34.863Z | 2026-02-11T09:09:18.507Z | |
| bit-apache-2023-27522 | Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting | 2024-03-06T10:51:05.888Z | 2026-02-11T09:09:18.507Z |
| bit-nginx-2026-1642 | 2026-02-10T18:00:00.000Z | 2026-02-10T18:00:00.000Z | |
| bit-prestashop-2026-25597 | PrestaShop has a time based enumeration in FO login form | 2026-02-10T10:02:58.336Z | 2026-02-10T10:34:11.934Z |
| bit-golang-2025-61732 | Potential code smuggling via doc comments in cmd/cgo | 2026-02-10T08:48:31.170Z | 2026-02-10T09:16:50.296Z |
| bit-discourse-2025-67723 | Discourse vulnerable to stored Cross-site Scripting via Katex in discourse-math plugin | 2026-02-02T08:42:10.509Z | 2026-02-10T09:16:50.296Z |
| bit-checkov-2021-3040 | Bridgecrew Checkov: Unsafe deserialization of Terraform files allows code execution | 2026-02-09T11:36:28.864Z | 2026-02-09T12:10:11.303Z |
| bit-checkov-2021-3035 | Bridgecrew Checkov: Unsafe deserialization of Terraform files allows code execution | 2026-02-09T11:36:27.254Z | 2026-02-09T12:10:11.303Z |
| bit-mastodon-2026-25540 | Mastodon's signature-dependent ActivityPub collection responses cached under signature-independent keys (Web Cache Poisoning via `Rails.cache`) | 2026-02-06T08:46:33.665Z | 2026-02-06T09:20:48.186Z |
| bit-golang-2025-22873 | Improper access to parent directory of root in os | 2026-02-06T08:45:38.334Z | 2026-02-06T09:20:48.186Z |
| bit-valkey-2025-32023 | Redis allows out of bounds writes in hyperloglog commands leading to RCE | 2025-10-16T12:07:58.321Z | 2026-02-05T09:10:30.960Z |
| bit-redis-2025-32023 | Redis allows out of bounds writes in hyperloglog commands leading to RCE | 2025-10-16T12:06:41.782Z | 2026-02-05T09:10:30.960Z |
| bit-keydb-2025-32023 | Redis allows out of bounds writes in hyperloglog commands leading to RCE | 2025-10-16T12:00:41.031Z | 2026-02-05T09:10:30.960Z |
| bit-gitlab-2026-1751 | Missing Authorization in GitLab | 2026-02-05T09:09:05.467Z | 2026-02-05T09:10:30.960Z |
| bit-django-2026-1312 | Potential SQL injection via QuerySet.order_by and FilteredRelation | 2026-02-05T08:38:43.002Z | 2026-02-05T09:10:30.960Z |
| bit-django-2026-1287 | Potential SQL injection in column aliases via control characters | 2026-02-05T08:38:41.246Z | 2026-02-05T09:10:30.960Z |
| bit-django-2026-1285 | Potential denial-of-service vulnerability in django.utils.text.Truncator HTML methods | 2026-02-05T08:38:39.228Z | 2026-02-05T09:10:30.960Z |
| bit-django-2026-1207 | Potential SQL injection via raster lookups on PostGIS | 2026-02-05T08:38:37.158Z | 2026-02-05T09:10:30.960Z |
| bit-django-2025-14550 | Potential denial-of-service vulnerability via repeated headers when using ASGI | 2026-02-05T08:38:18.195Z | 2026-02-05T09:10:30.960Z |
| bit-django-2025-13473 | Username enumeration through timing difference in mod_wsgi authentication handler | 2026-02-05T08:38:16.508Z | 2026-02-05T09:10:30.960Z |
| bit-node-2025-55132 | 2026-01-26T14:47:53.358Z | 2026-02-04T10:19:33.233Z | |
| bit-node-2025-55130 | 2026-01-26T14:47:49.864Z | 2026-02-04T10:19:33.233Z | |
| bit-gitlab-2021-39935 | 2024-03-06T11:17:28.508Z | 2026-02-04T10:19:33.233Z | |
| bit-airflow-2025-68675 | Apache Airflow: proxy credentials for various providers might leak in task logs | 2026-01-21T08:39:24.383Z | 2026-02-04T10:19:33.233Z |
| ID | Description | Updated |
|---|---|---|
| var-201402-0026 | Buffer overflow in the process_ra function in the router advertisement daemon (radvd) bef… | 2024-07-23T22:25:48.682000Z |
| var-201805-1144 | In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and pr… | 2024-07-23T22:25:33.529000Z |
| var-201805-1143 | In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and pr… | 2024-07-23T22:25:33.635000Z |
| var-202005-0008 | Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple heap-based buf… | 2024-07-23T22:25:28.455000Z |
| var-202407-0704 | A vulnerability has been identified in CPCI85 Central Processing/Communication (All versi… | 2024-07-23T22:25:01.735000Z |
| var-200107-0035 | slapd in OpenLDAP 1.x before 1.2.12, and 2.x before 2.0.8, allows remote attackers to cau… | 2024-07-23T22:24:58.858000Z |
| var-200512-0643 | Heap-based buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to exe… | 2024-07-23T22:24:53.371000Z |
| var-200512-0611 | Multiple heap-based buffer overflows in QuickTime.qts in Apple QuickTime Player 7.0.3 and… | 2024-07-23T22:24:53.455000Z |
| var-200512-0300 | Heap-based buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to exe… | 2024-07-23T22:24:53.297000Z |
| var-200512-0297 | Integer overflow in Apple Quicktime before 7.0.4 allows remote attackers to execute arbit… | 2024-07-23T22:24:53.525000Z |
| var-200512-0294 | Buffer overflow in Apple Quicktime before 7.0.4 allows remote attackers to execute arbitr… | 2024-07-23T22:24:53.234000Z |
| var-201407-0233 | Multiple stack-based buffer overflows in Advantech WebAccess before 7.2 allow remote atta… | 2024-07-23T22:22:21.013000Z |
| var-201601-0038 | Multiple stack-based buffer overflows in Advantech WebAccess before 8.1 allow remote atta… | 2024-07-23T22:22:04.421000Z |
| var-201801-0394 | TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbi… | 2024-07-23T22:21:46.499000Z |
| var-201904-0181 | Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple stack-based buffer overflow… | 2024-07-23T22:21:36.530000Z |
| var-202108-1160 | Description: A permissions issue was addressed with improved validation. This issue is fi… | 2024-07-23T22:20:46.081000Z |
| var-202305-0218 | D-Link DAP-1360 webproc WEB_DisplayPage Stack-based Buffer Overflow Remote Code Execution… | 2024-07-23T22:20:18.349000Z |
| var-202305-0217 | D-Link DAP-1360 Hardcoded Credentials Authentication Bypass Vulnerability. This vulnerabi… | 2024-07-23T22:20:18.369000Z |
| var-202305-0216 | D-Link DAP-1360 Multiple Parameters Stack-Based Buffer Overflow Remote Code Execution Vul… | 2024-07-23T22:20:18.413000Z |
| var-202305-0177 | D-Link DAP-1360 webproc Stack-based Buffer Overflow Remote Code Execution Vulnerability. … | 2024-07-23T22:20:18.434000Z |
| var-202305-0176 | D-Link DAP-1360 webproc var:sys_Token Heap-based Buffer Overflow Remote Code Execution Vu… | 2024-07-23T22:20:18.458000Z |
| var-202305-0166 | D-Link DAP-1360 webproc var:menu Stack-based Buffer Overflow Remote Code Execution Vulner… | 2024-07-23T22:20:18.326000Z |
| var-202305-0154 | D-Link DAP-1360 webproc var:page Stack-based Buffer Overflow Remote Code Execution Vulner… | 2024-07-23T22:20:18.503000Z |
| var-202305-0153 | D-Link DAP-1360 webupg UPGCGI_CheckAuth Numeric Truncation Remote Code Execution Vulnerab… | 2024-07-23T22:20:18.392000Z |
| var-202305-0071 | D-Link DAP-1360 webproc Heap-based Buffer Overflow Remote Code Execution Vulnerability. T… | 2024-07-23T22:20:18.481000Z |
| var-202305-0070 | D-Link DAP-1360 webproc COMM_MakeCustomMsg Stack-based Buffer Overflow Remote Code Execut… | 2024-07-23T22:20:18.303000Z |
| var-202308-3323 | D-Link DAP-2622 DDP Change ID Password Auth Username Stack-based Buffer Overflow Remote C… | 2024-07-23T22:20:12.387000Z |
| var-202308-3185 | D-Link DAP-2622 DDP Configuration Backup Filename Stack-based Buffer Overflow Remote Code… | 2024-07-23T22:20:12.455000Z |
| var-202308-3131 | D-Link DAP-2622 DDP Reset Factory Auth Password Stack-based Buffer Overflow Remote Code E… | 2024-07-23T22:20:12.487000Z |
| var-202308-3130 | D-Link DAP-2622 DDP Configuration Restore Auth Username Stack-based Buffer Overflow Remot… | 2024-07-23T22:20:12.431000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2025-000105 | NCP-HG100 vulnerable to OS command injection | 2025-11-14T15:26+09:00 | 2025-11-14T15:26+09:00 |
| jvndb-2025-000104 | Multiple vulnerabilities in GNU Libmicrohttpd | 2025-11-10T15:07+09:00 | 2025-11-10T15:07+09:00 |
| jvndb-2025-000103 | Use of password hash with insufficient computational effort vulnerability in BUFFALO Wi-Fi router "WSR-1800AX4 series" | 2025-11-07T15:39+09:00 | 2025-11-07T15:39+09:00 |
| jvndb-2025-000102 | CLUSTERPRO X and EXPRESSCLUSTER X vulnerable to OS command injection | 2025-11-07T14:55+09:00 | 2025-11-07T14:55+09:00 |
| jvndb-2025-000101 | GROWI vulnerable to stored cross-site scripting | 2025-11-06T13:45+09:00 | 2025-11-06T13:45+09:00 |
| jvndb-2024-013260 | Multiple vulnerabilities in Edgecross Basic Software for Windows | 2024-11-22T10:59+09:00 | 2025-11-04T16:41+09:00 |
| jvndb-2025-017972 | Multiple vulnerabilities in Century Systems FutureNet MA and IP-K series | 2025-11-04T16:37+09:00 | 2025-11-04T16:37+09:00 |
| jvndb-2025-000100 | Multiple Roboticsware products register Windows services with unquoted file paths | 2025-11-04T14:17+09:00 | 2025-11-04T14:17+09:00 |
| jvndb-2025-000098 | Optical Disc Archive Software (for Windows) registers a Windows service with an unquoted file path | 2025-11-04T13:51+09:00 | 2025-11-04T13:51+09:00 |
| jvndb-2025-000099 | Progress Flowmon vulnerable to authenticated OS command injection | 2025-11-04T12:47+09:00 | 2025-11-04T12:47+09:00 |
| jvndb-2025-000096 | Installer of WTW EAGLE (for Windows) may insecurely load Dynamic Link Libraries | 2025-10-29T14:17+09:00 | 2025-10-29T14:17+09:00 |
| jvndb-2025-000095 | MZK-DP300N uses hard-coded credentials | 2025-10-28T14:04+09:00 | 2025-10-28T14:04+09:00 |
| jvndb-2025-014793 | NIHON KOHDEN Central Monitor CNS-6201 vulnerable to NULL pointer dereference | 2025-10-01T11:35+09:00 | 2025-10-27T12:28+09:00 |
| jvndb-2025-000093 | Multiple stored cross-site scripting vulnerabilities in Pleasanter | 2025-10-24T15:11+09:00 | 2025-10-24T15:11+09:00 |
| jvndb-2025-000084 | GROWI vulnerable to cross-site scripting | 2025-10-22T15:44+09:00 | 2025-10-22T15:44+09:00 |
| jvndb-2025-000090 | Multiple stored cross-site scripting vulnerabilities in Movable Type | 2025-10-22T13:54+09:00 | 2025-10-22T13:54+09:00 |
| jvndb-2025-000088 | Lanscope Endpoint Manager (On-Premises) vulnerable to improper verification of source of a communication channel | 2025-10-20T16:17+09:00 | 2025-10-22T10:06+09:00 |
| jvndb-2025-000092 | ETERNUS SF vulnerable to incorrect default permissions | 2025-10-20T14:20+09:00 | 2025-10-20T14:20+09:00 |
| jvndb-2025-000089 | Installer of AutoDownloader may insecurely load Dynamic Link Libraries | 2025-10-17T13:38+09:00 | 2025-10-17T13:38+09:00 |
| jvndb-2025-000074 | Multiple vulnerabilities in desknet's NEO | 2025-10-16T17:30+09:00 | 2025-10-16T17:30+09:00 |
| jvndb-2025-000076 | Multiple vulnerabilities in ChatLuck | 2025-10-16T17:17+09:00 | 2025-10-16T17:17+09:00 |
| jvndb-2025-000087 | Ruijie Networks RG-EST300 undocumented SSH functionality | 2025-10-16T14:19+09:00 | 2025-10-16T14:19+09:00 |
| jvndb-2025-016124 | Buffalo Wi-Fi router WXR9300BE6P series vulnerable to path traversal | 2025-10-16T11:16+09:00 | 2025-10-16T11:16+09:00 |
| jvndb-2025-000085 | Multiple RSUPPORT products may insecurely load Dynamic Link Libraries | 2025-10-15T15:55+09:00 | 2025-10-15T15:55+09:00 |
| jvndb-2025-000086 | Phoenix Contact CHARX SEC-3xxx vulnerable to code injection | 2025-10-15T15:54+09:00 | 2025-10-15T15:54+09:00 |
| jvndb-2025-000083 | BUFFALO NAS Navigator2 registers a Windows service with an unquoted file path | 2025-10-10T13:56+09:00 | 2025-10-10T13:56+09:00 |
| jvndb-2025-015451 | Multiple vulnerabilities in FUJI Electric V-SFT | 2025-10-09T13:39+09:00 | 2025-10-09T13:39+09:00 |
| jvndb-2025-000081 | DataSpider Servista improper restriction of XML external entity references | 2025-09-29T14:44+09:00 | 2025-10-07T16:54+09:00 |
| jvndb-2025-000082 | The installers of DENSO TEN drive recorder viewer may insecurely load Dynamic Link Libraries | 2025-10-06T15:38+09:00 | 2025-10-06T15:38+09:00 |
| jvndb-2025-015061 | Trend Micro Antivirus for Mac vulnerable to Local Privilege Escalation | 2025-10-06T13:52+09:00 | 2025-10-06T13:52+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0334-1 | Security update for libxml2 | 2026-01-29T10:01:36Z | 2026-01-29T10:01:36Z |
| suse-su-2026:0333-1 | Security update for openssl-1_0_0 | 2026-01-29T08:16:22Z | 2026-01-29T08:16:22Z |
| suse-su-2026:0332-1 | Security update for openssl-1_0_0 | 2026-01-29T06:04:36Z | 2026-01-29T06:04:36Z |
| suse-su-2026:0331-1 | Security update for openssl-1_1 | 2026-01-28T17:13:03Z | 2026-01-28T17:13:03Z |
| suse-su-2026:0330-1 | Security update for openjpeg2 | 2026-01-28T16:27:12Z | 2026-01-28T16:27:12Z |
| suse-su-2026:20175-1 | Security update for python-urllib3 | 2026-01-28T16:03:29Z | 2026-01-28T16:03:29Z |
| suse-su-2026:20173-1 | Security update for ucode-amd | 2026-01-28T16:01:59Z | 2026-01-28T16:01:59Z |
| suse-su-2026:0329-1 | Security update for xen | 2026-01-28T15:39:40Z | 2026-01-28T15:39:40Z |
| suse-su-2026:0328-1 | Security update for xen | 2026-01-28T15:39:28Z | 2026-01-28T15:39:28Z |
| suse-su-2026:0327-1 | Security update for alloy | 2026-01-28T15:38:58Z | 2026-01-28T15:38:58Z |
| suse-su-2026:0326-1 | Security update for helm | 2026-01-28T14:55:01Z | 2026-01-28T14:55:01Z |
| suse-su-2026:0325-1 | Security update for kubernetes | 2026-01-28T14:54:08Z | 2026-01-28T14:54:08Z |
| suse-su-2026:0320-1 | Security update for openjpeg2 | 2026-01-28T14:40:09Z | 2026-01-28T14:40:09Z |
| suse-su-2026:0319-1 | Security update for container-suseconnect | 2026-01-28T14:40:01Z | 2026-01-28T14:40:01Z |
| suse-su-2026:0317-1 | Security update for the Linux Kernel | 2026-01-28T14:37:02Z | 2026-01-28T14:37:02Z |
| suse-su-2026:0316-1 | Security update for the Linux Kernel | 2026-01-28T14:35:14Z | 2026-01-28T14:35:14Z |
| suse-su-2026:0315-1 | Security update for the Linux Kernel | 2026-01-28T14:34:30Z | 2026-01-28T14:34:30Z |
| suse-su-2026:0314-1 | Security update for python311 | 2026-01-28T13:28:48Z | 2026-01-28T13:28:48Z |
| suse-su-2026:20171-1 | Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) | 2026-01-28T10:27:58Z | 2026-01-28T10:27:58Z |
| suse-su-2026:0313-1 | Security update for gimp | 2026-01-28T10:13:29Z | 2026-01-28T10:13:29Z |
| suse-su-2026:0312-1 | Security update for openssl-3 | 2026-01-28T09:37:56Z | 2026-01-28T09:37:56Z |
| suse-su-2026:0311-1 | Security update for openssl-3 | 2026-01-28T09:37:48Z | 2026-01-28T09:37:48Z |
| suse-su-2026:0310-1 | Security update for openssl-3 | 2026-01-28T09:37:26Z | 2026-01-28T09:37:26Z |
| suse-su-2026:0309-1 | Security update for openssl-3 | 2026-01-28T09:36:37Z | 2026-01-28T09:36:37Z |
| suse-su-2026:0308-1 | Security update for go1.24-openssl | 2026-01-28T08:38:40Z | 2026-01-28T08:38:40Z |
| suse-su-2026:20170-1 | Security update for cockpit-subscriptions | 2026-01-27T20:40:44Z | 2026-01-27T20:40:44Z |
| suse-su-2026:0307-1 | Security update for python-python-multipart | 2026-01-27T16:36:58Z | 2026-01-27T16:36:58Z |
| suse-su-2026:0306-1 | Security update for xen | 2026-01-27T16:15:19Z | 2026-01-27T16:15:19Z |
| suse-su-2026:0305-1 | Recommended update for kernel-firmware | 2026-01-27T16:15:14Z | 2026-01-27T16:15:14Z |
| suse-su-2026:0304-1 | Security update for xen | 2026-01-27T16:14:51Z | 2026-01-27T16:14:51Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-06824 | D-Link DIR-823G信息泄露漏洞 | 2024-09-11 | 2026-01-23 |
| cnvd-2026-06823 | D-Link DIR-823G命令注入漏洞 | 2025-11-18 | 2026-01-23 |
| cnvd-2026-06813 | D-Link DWR-M920 sub_41C7FC函数缓冲区溢出漏洞 | 2025-11-24 | 2026-01-23 |
| cnvd-2026-06812 | D-Link DWR-M920 sub_423848函数缓冲区溢出漏洞 | 2026-01-14 | 2026-01-23 |
| cnvd-2026-06811 | D-Link DWR-M920 sub_464794函数缓冲区溢出漏洞 | 2026-01-14 | 2026-01-23 |
| cnvd-2026-06810 | D-Link DWR-M920命令注入漏洞 | 2026-01-14 | 2026-01-23 |
| cnvd-2026-06809 | D-Link DWR-M920 sub_42261C函数堆栈缓冲区溢出漏洞 | 2026-01-14 | 2026-01-23 |
| cnvd-2026-06604 | 上海锐昉科技有限公司RB企业管理系统存在SQL注入漏洞 | 2025-11-25 | 2026-01-23 |
| cnvd-2026-06362 | 瑞斯康达科技发展股份有限公司RAISECOM DR5374存在命令注入漏洞 | 2025-09-10 | 2026-01-23 |
| cnvd-2026-06289 | 用友网络科技股份有限公司用友U9多组织企业互联网应用平台存在任意文件下载漏洞 | 2025-11-24 | 2026-01-23 |
| cnvd-2026-06274 | 用友网络科技股份有限公司用友BIP数据应用服务存在SQL注入漏洞(CNVD-C-2025-879635) | 2025-11-18 | 2026-01-23 |
| cnvd-2026-06271 | 用友网络科技股份有限公司用友BIP数据应用服务存在目录遍历漏洞 | 2025-11-18 | 2026-01-23 |
| cnvd-2026-05793 | 深圳市绿联科技股份有限公司DH2100+ NAS存在命令执行漏洞 | 2025-11-21 | 2026-01-23 |
| cnvd-2026-05792 | 深圳市绿联科技股份有限公司DH2100+存在二进制漏洞 | 2025-11-20 | 2026-01-23 |
| cnvd-2026-08750 | Microsoft Graphics Kernel竞争条件问题漏洞 | 2026-01-19 | 2026-01-22 |
| cnvd-2026-08749 | Microsoft Graphics Component资源管理错误漏洞 | 2026-01-19 | 2026-01-22 |
| cnvd-2026-08748 | Microsoft Excel访问控制错误漏洞 | 2026-01-19 | 2026-01-22 |
| cnvd-2026-08747 | Microsoft Excel代码执行漏洞(CNVD-2026-08747) | 2026-01-19 | 2026-01-22 |
| cnvd-2026-08746 | Microsoft Excel代码执行漏洞(CNVD-2026-08746) | 2026-01-19 | 2026-01-22 |
| cnvd-2026-07247 | Google Chrome堆缓冲区溢出漏洞 | 2025-10-30 | 2026-01-22 |
| cnvd-2026-07246 | Google Chrome实现不当漏洞(CNVD-2026-07246) | 2025-11-11 | 2026-01-22 |
| cnvd-2026-07245 | Google Chrome释放后使用漏洞(CNVD-2026-07245) | 2025-12-05 | 2026-01-22 |
| cnvd-2026-07244 | Google Chrome实现不当漏洞 | 2025-12-08 | 2026-01-22 |
| cnvd-2026-07243 | Google Chrome类型混淆漏洞 | 2025-12-08 | 2026-01-22 |
| cnvd-2026-07242 | Google Chrome释放后重用漏洞 | 2025-12-15 | 2026-01-22 |
| cnvd-2026-07241 | Google Chrome策略执行不足漏洞 | 2026-01-09 | 2026-01-22 |
| cnvd-2026-07159 | Intern Membership Management System /add_admin.php文件SQL注入漏洞 | 2026-01-19 | 2026-01-22 |
| cnvd-2026-07158 | Intern Membership Management System /add_activity.php文件SQL注入漏洞 | 2026-01-19 | 2026-01-22 |
| cnvd-2026-07151 | Tenda M3 R7WebsSecurityHandler方法栈缓冲区溢出漏洞 | 2023-12-28 | 2026-01-22 |
| cnvd-2026-07150 | Tenda M3 fromSetLocalVlanInfo函数栈缓冲区溢出漏洞 | 2023-12-28 | 2026-01-22 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0111 | Vulnérabilité dans ESET Inspect Connector | 2026-02-02T00:00:00.000000 | 2026-02-02T00:00:00.000000 |
| certfr-2026-avi-0110 | Multiples vulnérabilités Ivanti Endpoint Manager Mobile (EPMM) | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0109 | Multiples vulnérabilités dans les produits IBM | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0108 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0107 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0106 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0105 | Vulnérabilité dans Microsoft Edge | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0104 | Vulnérabilité dans Qnap QTS | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0103 | Multiples vulnérabilités dans Node.js | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0102 | Vulnérabilité dans Splunk Enterprise | 2026-01-30T00:00:00.000000 | 2026-01-30T00:00:00.000000 |
| certfr-2026-avi-0101 | Multiples vulnérabilités dans les produits Siemens | 2026-01-29T00:00:00.000000 | 2026-01-29T00:00:00.000000 |
| certfr-2026-avi-0100 | Multiples vulnérabilités dans les produits WithSecure | 2026-01-29T00:00:00.000000 | 2026-01-29T00:00:00.000000 |
| certfr-2026-avi-0099 | Multiples vulnérabilités dans SolarWinds Web Help Desk | 2026-01-28T00:00:00.000000 | 2026-01-29T00:00:00.000000 |
| certfr-2026-avi-0098 | Vulnérabilité dans les produits Symfony | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| certfr-2026-avi-0097 | Vulnérabilité dans les produits Fortinet | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| certfr-2026-avi-0096 | Multiples vulnérabilités dans OpenSSL | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| certfr-2026-avi-0095 | Multiples vulnérabilités dans les produits Mozilla | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| certfr-2026-avi-0094 | Multiples vulnérabilités dans HPE Aruba Networking Fabric Composer | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| certfr-2026-avi-0093 | Multiples vulnérabilités dans Tenable Network Monitor | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| certfr-2026-avi-0092 | Vulnérabilité dans Google Chrome | 2026-01-28T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| certfr-2025-avi-0618 | Multiples vulnérabilités dans les produits Mitel | 2025-07-24T00:00:00.000000 | 2026-01-28T00:00:00.000000 |
| certfr-2026-avi-0091 | Multiples vulnérabilités dans Xen | 2026-01-27T00:00:00.000000 | 2026-01-27T00:00:00.000000 |
| certfr-2026-avi-0090 | Multiples vulnérabilités dans Citrix XenServer | 2026-01-27T00:00:00.000000 | 2026-01-27T00:00:00.000000 |
| certfr-2026-avi-0089 | Vulnérabilité dans Microsoft Office | 2026-01-27T00:00:00.000000 | 2026-01-27T00:00:00.000000 |
| certfr-2026-avi-0088 | Vulnérabilité dans MariaDB | 2026-01-27T00:00:00.000000 | 2026-01-27T00:00:00.000000 |
| certfr-2026-avi-0087 | Vulnérabilité dans les produits Belden | 2026-01-26T00:00:00.000000 | 2026-01-26T00:00:00.000000 |
| certfr-2026-avi-0086 | Vulnérabilité dans CPython | 2026-01-26T00:00:00.000000 | 2026-01-26T00:00:00.000000 |
| certfr-2026-avi-0085 | Multiples vulnérabilités dans NetApp Brocade SAN Navigator | 2026-01-26T00:00:00.000000 | 2026-01-26T00:00:00.000000 |
| certfr-2026-avi-0084 | Vulnérabilité dans Microsoft Edge | 2026-01-26T00:00:00.000000 | 2026-01-26T00:00:00.000000 |
| certfr-2026-avi-0083 | Multiples vulnérabilités dans les produits IBM | 2026-01-23T00:00:00.000000 | 2026-01-23T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2023-ale-012 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-10-23T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-011 | [MàJ] Multiples vulnérabilités dans Cisco IOS XE | 2023-10-17T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-010 | Multiples vulnérabilités dans Exim | 2023-10-02T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| CERTFR-2023-ALE-013 | Vulnérabilité dans Apache Struts 2 | 2023-12-13T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| CERTFR-2023-ALE-012 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-10-23T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| CERTFR-2023-ALE-011 | [MàJ] Multiples vulnérabilités dans Cisco IOS XE | 2023-10-17T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| CERTFR-2023-ALE-010 | Multiples vulnérabilités dans Exim | 2023-10-02T00:00:00.000000 | 2024-02-16T00:00:00.000000 |
| certfr-2023-ale-008 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-07-19T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| certfr-2023-ale-007 | [MàJ] Vulnérabilité dans Zimbra Collaboration Suite | 2023-07-17T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| CERTFR-2023-ALE-008 | [MàJ] Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2023-07-19T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| CERTFR-2023-ALE-007 | [MàJ] Vulnérabilité dans Zimbra Collaboration Suite | 2023-07-17T00:00:00.000000 | 2024-01-02T00:00:00.000000 |
| certfr-2023-ale-006 | Vulnérabilité dans les produits Microsoft | 2023-12-12T00:00:00.000000 | 2023-07-12T00:00:00.000000 |
| CERTFR-2023-ALE-006 | Vulnérabilité dans les produits Microsoft | 2023-12-12T00:00:00.000000 | 2023-07-12T00:00:00.000000 |
| certfr-2023-ale-009 | [MàJ] Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile | 2023-07-26T00:00:00.000000 | 2023-09-15T00:00:00.000000 |
| CERTFR-2023-ALE-009 | [MàJ] Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile | 2023-07-26T00:00:00.000000 | 2023-09-15T00:00:00.000000 |
| certfr-2023-ale-005 | Synthèse sur l'exploitation d'une vulnérabilité dans MOVEit Transfer | 2023-07-05T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| certfr-2023-ale-004 | Vulnérabilité dans les produits Fortinet | 2023-06-13T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| certfr-2022-ale-014 | Multiples vulnérabilités dans AMI MegaRAC | 2022-12-16T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| CERTFR-2023-ALE-005 | Synthèse sur l'exploitation d'une vulnérabilité dans MOVEit Transfer | 2023-07-05T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| CERTFR-2023-ALE-004 | Vulnérabilité dans les produits Fortinet | 2023-06-13T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| CERTFR-2022-ALE-014 | Multiples vulnérabilités dans AMI MegaRAC | 2022-12-16T00:00:00.000000 | 2023-09-11T00:00:00.000000 |
| certfr-2023-ale-002 | [MàJ] Vulnérabilité dans Microsoft Outlook | 2023-03-15T00:00:00.000000 | 2023-05-11T00:00:00.000000 |
| CERTFR-2023-ALE-002 | [MàJ] Vulnérabilité dans Microsoft Outlook | 2023-03-15T00:00:00.000000 | 2023-05-11T00:00:00.000000 |
| certfr-2023-ale-003 | [MàJ] Compromission de l'application 3CX Desktop App | 2023-03-31T00:00:00.000000 | 2023-04-12T00:00:00.000000 |
| CERTFR-2023-ALE-003 | [MàJ] Compromission de l'application 3CX Desktop App | 2023-03-31T00:00:00.000000 | 2023-04-12T00:00:00.000000 |
| certfr-2023-ale-015 | [MàJ] Campagne d'exploitation d'une vulnérabilité affectant VMware ESXi | 2023-02-03T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2023-ale-001 | Vulnérabilité dans Fortinet FortiOS | 2023-03-14T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-013 | [MàJ] Vulnérabilité dans Citrix ADC et Gateway | 2022-12-13T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-010 | Multiples vulnérabilités dans GLPI | 2022-10-07T00:00:00.000000 | 2023-03-14T00:00:00.000000 |
| certfr-2022-ale-009 | [MaJ] Vulnérabilité dans Zimbra Collaboration | 2022-10-07T00:00:00.000000 | 2023-03-14T00:00:00.000000 |