Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-3679 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda FH451 QuickIndex formQuickIndex stack-based overflow |
Tenda |
FH451 |
2026-03-07T22:32:12.264Z | 2026-03-07T22:32:12.264Z |
| CVE-2026-3678 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda FH451 AdvSetWan sub_3C434 stack-based overflow |
Tenda |
FH451 |
2026-03-07T22:32:09.041Z | 2026-03-07T22:32:09.041Z |
| CVE-2025-7195 |
6.4 (3.1)
|
Operator-sdk: privilege escalation due to incorrect pe… |
operator-framework |
operator-sdk |
2025-08-07T19:05:08.756Z | 2026-03-07T22:10:55.069Z |
| CVE-2026-3677 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda FH451 setcfm fromSetCfm stack-based overflow |
Tenda |
FH451 |
2026-03-07T22:02:11.224Z | 2026-03-07T22:02:11.224Z |
| CVE-2026-3675 |
4.8 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Freedom Factory dGEN1 org.ethosmobile.ethoslauncher Fa… |
Freedom Factory |
dGEN1 |
2026-03-07T22:02:06.960Z | 2026-03-07T22:02:06.960Z |
| CVE-2026-3674 |
4.8 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Freedom Factory dGEN1 org.ethosmobile.ethoslauncher Fa… |
Freedom Factory |
dGEN1 |
2026-03-07T21:32:15.126Z | 2026-03-07T21:32:15.126Z |
| CVE-2026-3672 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
JeecgBoot getDictItems isExistSqlInjectKeyword sql injection |
n/a |
JeecgBoot |
2026-03-07T21:32:13.177Z | 2026-03-07T21:32:13.177Z |
| CVE-2026-3671 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
Freedom Factory dGEN1 org.ethereumphone.walletmanager.… |
Freedom Factory |
dGEN1 |
2026-03-07T21:32:08.805Z | 2026-03-07T21:32:08.805Z |
| CVE-2026-3670 |
4.8 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Freedom Factory dGEN1 com.dgen.alarm improper authorization |
Freedom Factory |
dGEN1 |
2026-03-07T18:32:10.175Z | 2026-03-07T18:32:10.175Z |
| CVE-2026-3669 |
4.8 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Freedom Factory dGEN1 com.dgen.alarm AlarmService impr… |
Freedom Factory |
dGEN1 |
2026-03-07T18:32:07.982Z | 2026-03-07T18:32:07.982Z |
| CVE-2026-2671 |
2.3 (4.0)
3.1 (3.1)
3.1 (3.0)
|
Mendi Neurofeedback Headset Bluetooth Low Energy clear… |
Mendi |
Neurofeedback Headset |
2026-03-07T18:02:07.505Z | 2026-03-07T18:02:07.505Z |
| CVE-2026-28372 |
7.4 (3.1)
|
telnetd in GNU inetutils through 2.7 allows privi… |
GNU |
inetutils |
2026-02-27T05:28:17.383Z | 2026-03-07T17:05:13.869Z |
| CVE-2026-24308 |
N/A
|
Apache ZooKeeper: Sensitive information disclosure in … |
Apache Software Foundation |
Apache ZooKeeper |
2026-03-07T08:51:17.567Z | 2026-03-07T17:05:11.646Z |
| CVE-2026-24281 |
N/A
|
Apache ZooKeeper: Reverse-DNS fallback enables hostnam… |
Apache Software Foundation |
Apache ZooKeeper |
2026-03-07T08:50:32.525Z | 2026-03-07T17:05:10.486Z |
| CVE-1999-0073 |
N/A
|
Telnet allows a remote client to specify environm… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2026-03-07T17:05:09.353Z |
| CVE-2026-30861 |
10 (3.1)
|
WeKnora: Remote Code Execution (RCE) via Command Injec… |
Tencent |
WeKnora |
2026-03-07T16:38:38.063Z | 2026-03-07T16:38:38.063Z |
| CVE-2026-30860 |
10 (3.1)
|
WeKnora: Remote Code Execution via SQL Injection Bypas… |
Tencent |
WeKnora |
2026-03-07T16:36:45.552Z | 2026-03-07T16:36:45.552Z |
| CVE-2026-30859 |
5.3 (3.1)
|
WeKnora: Broken Access Control - Cross-Tenant Data Exposure |
Tencent |
WeKnora |
2026-03-07T16:35:30.415Z | 2026-03-07T16:35:30.415Z |
| CVE-2026-30858 |
6.5 (3.1)
|
WeKnora: DNS Rebinding Vulnerability in web_fetch Tool… |
Tencent |
WeKnora |
2026-03-07T16:34:28.528Z | 2026-03-07T16:34:28.528Z |
| CVE-2026-30857 |
5.3 (3.1)
|
WeKnora: Unauthorized Cross‑Tenant Knowledge Base Cloning |
Tencent |
WeKnora |
2026-03-07T16:33:45.566Z | 2026-03-07T16:33:45.566Z |
| CVE-2026-30856 |
5.9 (3.1)
|
WeKnora: Tool Execution Hijacking via Ambigous Naming … |
Tencent |
WeKnora |
2026-03-07T16:32:44.566Z | 2026-03-07T16:32:44.566Z |
| CVE-2026-30855 |
8.8 (3.1)
|
WeKnora: Broken Access Control in Tenant Management |
Tencent |
WeKnora |
2026-03-07T16:31:10.564Z | 2026-03-07T16:31:10.564Z |
| CVE-2026-30851 |
8.1 (3.1)
|
Caddy forward_auth copy_headers Does Not Strip Client-… |
caddyserver |
caddy |
2026-03-07T16:28:37.097Z | 2026-03-07T16:28:37.097Z |
| CVE-2026-30852 |
5.5 (4.0)
|
Caddy: vars_regexp double-expands user input, leaking … |
caddyserver |
caddy |
2026-03-07T16:28:26.894Z | 2026-03-07T16:28:26.894Z |
| CVE-2026-30854 |
6.9 (4.0)
|
Parse Server: GraphQL `__type` introspection bypass vi… |
parse-community |
parse-server |
2026-03-07T16:24:10.312Z | 2026-03-07T16:24:10.312Z |
| CVE-2026-30850 |
6.3 (4.0)
|
Parse Server: File metadata endpoint bypasses `beforeF… |
parse-community |
parse-server |
2026-03-07T16:21:53.897Z | 2026-03-07T16:21:53.897Z |
| CVE-2026-30848 |
6.3 (4.0)
|
Parse Server: `PagesRouter` path traversal allows read… |
parse-community |
parse-server |
2026-03-07T16:20:22.220Z | 2026-03-07T16:20:22.220Z |
| CVE-2026-30863 |
9.3 (4.0)
|
Parse Server: JWT audience validation bypass in Google… |
parse-community |
parse-server |
2026-03-07T16:18:47.786Z | 2026-03-07T16:18:47.786Z |
| CVE-2026-29196 |
8.7 (4.0)
|
Netmaker: Service User with Network Access Can Access … |
gravitl |
netmaker |
2026-03-07T16:15:08.465Z | 2026-03-07T16:15:08.465Z |
| CVE-2026-29195 |
6.9 (4.0)
|
Netmaker: Privilege Escalation from Admin to Super-Adm… |
gravitl |
netmaker |
2026-03-07T16:14:06.196Z | 2026-03-07T16:14:06.196Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-3677 |
8.7 (4.0)
8.8 (3.1)
8.8 (3.0)
|
Tenda FH451 setcfm fromSetCfm stack-based overflow |
Tenda |
FH451 |
2026-03-07T22:02:11.224Z | 2026-03-07T22:02:11.224Z |
| CVE-2026-3675 |
4.8 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Freedom Factory dGEN1 org.ethosmobile.ethoslauncher Fa… |
Freedom Factory |
dGEN1 |
2026-03-07T22:02:06.960Z | 2026-03-07T22:02:06.960Z |
| CVE-2026-3674 |
4.8 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Freedom Factory dGEN1 org.ethosmobile.ethoslauncher Fa… |
Freedom Factory |
dGEN1 |
2026-03-07T21:32:15.126Z | 2026-03-07T21:32:15.126Z |
| CVE-2026-3672 |
5.3 (4.0)
6.3 (3.1)
6.3 (3.0)
|
JeecgBoot getDictItems isExistSqlInjectKeyword sql injection |
n/a |
JeecgBoot |
2026-03-07T21:32:13.177Z | 2026-03-07T21:32:13.177Z |
| CVE-2026-3671 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
Freedom Factory dGEN1 org.ethereumphone.walletmanager.… |
Freedom Factory |
dGEN1 |
2026-03-07T21:32:08.805Z | 2026-03-07T21:32:08.805Z |
| CVE-2026-3670 |
4.8 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Freedom Factory dGEN1 com.dgen.alarm improper authorization |
Freedom Factory |
dGEN1 |
2026-03-07T18:32:10.175Z | 2026-03-07T18:32:10.175Z |
| CVE-2026-3669 |
4.8 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Freedom Factory dGEN1 com.dgen.alarm AlarmService impr… |
Freedom Factory |
dGEN1 |
2026-03-07T18:32:07.982Z | 2026-03-07T18:32:07.982Z |
| CVE-2026-2671 |
2.3 (4.0)
3.1 (3.1)
3.1 (3.0)
|
Mendi Neurofeedback Headset Bluetooth Low Energy clear… |
Mendi |
Neurofeedback Headset |
2026-03-07T18:02:07.505Z | 2026-03-07T18:02:07.505Z |
| CVE-2026-30863 |
9.3 (4.0)
|
Parse Server: JWT audience validation bypass in Google… |
parse-community |
parse-server |
2026-03-07T16:18:47.786Z | 2026-03-07T16:18:47.786Z |
| CVE-2026-30861 |
10 (3.1)
|
WeKnora: Remote Code Execution (RCE) via Command Injec… |
Tencent |
WeKnora |
2026-03-07T16:38:38.063Z | 2026-03-07T16:38:38.063Z |
| CVE-2026-30860 |
10 (3.1)
|
WeKnora: Remote Code Execution via SQL Injection Bypas… |
Tencent |
WeKnora |
2026-03-07T16:36:45.552Z | 2026-03-07T16:36:45.552Z |
| CVE-2026-30859 |
5.3 (3.1)
|
WeKnora: Broken Access Control - Cross-Tenant Data Exposure |
Tencent |
WeKnora |
2026-03-07T16:35:30.415Z | 2026-03-07T16:35:30.415Z |
| CVE-2026-30858 |
6.5 (3.1)
|
WeKnora: DNS Rebinding Vulnerability in web_fetch Tool… |
Tencent |
WeKnora |
2026-03-07T16:34:28.528Z | 2026-03-07T16:34:28.528Z |
| CVE-2026-30857 |
5.3 (3.1)
|
WeKnora: Unauthorized Cross‑Tenant Knowledge Base Cloning |
Tencent |
WeKnora |
2026-03-07T16:33:45.566Z | 2026-03-07T16:33:45.566Z |
| CVE-2026-30856 |
5.9 (3.1)
|
WeKnora: Tool Execution Hijacking via Ambigous Naming … |
Tencent |
WeKnora |
2026-03-07T16:32:44.566Z | 2026-03-07T16:32:44.566Z |
| CVE-2026-30855 |
8.8 (3.1)
|
WeKnora: Broken Access Control in Tenant Management |
Tencent |
WeKnora |
2026-03-07T16:31:10.564Z | 2026-03-07T16:31:10.564Z |
| CVE-2026-30854 |
6.9 (4.0)
|
Parse Server: GraphQL `__type` introspection bypass vi… |
parse-community |
parse-server |
2026-03-07T16:24:10.312Z | 2026-03-07T16:24:10.312Z |
| CVE-2026-30852 |
5.5 (4.0)
|
Caddy: vars_regexp double-expands user input, leaking … |
caddyserver |
caddy |
2026-03-07T16:28:26.894Z | 2026-03-07T16:28:26.894Z |
| CVE-2026-30851 |
8.1 (3.1)
|
Caddy forward_auth copy_headers Does Not Strip Client-… |
caddyserver |
caddy |
2026-03-07T16:28:37.097Z | 2026-03-07T16:28:37.097Z |
| CVE-2026-30850 |
6.3 (4.0)
|
Parse Server: File metadata endpoint bypasses `beforeF… |
parse-community |
parse-server |
2026-03-07T16:21:53.897Z | 2026-03-07T16:21:53.897Z |
| CVE-2026-30848 |
6.3 (4.0)
|
Parse Server: `PagesRouter` path traversal allows read… |
parse-community |
parse-server |
2026-03-07T16:20:22.220Z | 2026-03-07T16:20:22.220Z |
| CVE-2026-29196 |
8.7 (4.0)
|
Netmaker: Service User with Network Access Can Access … |
gravitl |
netmaker |
2026-03-07T16:15:08.465Z | 2026-03-07T16:15:08.465Z |
| CVE-2026-29195 |
6.9 (4.0)
|
Netmaker: Privilege Escalation from Admin to Super-Adm… |
gravitl |
netmaker |
2026-03-07T16:14:06.196Z | 2026-03-07T16:14:06.196Z |
| CVE-2026-28372 |
7.4 (3.1)
|
telnetd in GNU inetutils through 2.7 allows privi… |
GNU |
inetutils |
2026-02-27T05:28:17.383Z | 2026-03-07T17:05:13.869Z |
| CVE-2026-24308 |
N/A
|
Apache ZooKeeper: Sensitive information disclosure in … |
Apache Software Foundation |
Apache ZooKeeper |
2026-03-07T08:51:17.567Z | 2026-03-07T17:05:11.646Z |
| CVE-2026-24281 |
N/A
|
Apache ZooKeeper: Reverse-DNS fallback enables hostnam… |
Apache Software Foundation |
Apache ZooKeeper |
2026-03-07T08:50:32.525Z | 2026-03-07T17:05:10.486Z |
| CVE-1999-0073 |
N/A
|
Telnet allows a remote client to specify environm… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2026-03-07T17:05:09.353Z |
| CVE-2026-3668 |
2.3 (4.0)
3.1 (3.1)
3.1 (3.0)
|
Freedom Factory dGEN1 org.ethosmobile.webpwaemul Andro… |
Freedom Factory |
dGEN1 |
2026-03-07T16:02:07.691Z | 2026-03-07T16:02:07.691Z |
| CVE-2026-3667 |
4.8 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Freedom Factory dGEN1 org.ethosmobile.ethoslauncher Fa… |
Freedom Factory |
dGEN1 |
2026-03-07T15:32:11.094Z | 2026-03-07T15:32:11.094Z |
| CVE-2026-3665 |
4.8 (4.0)
3.3 (3.1)
3.3 (3.0)
|
xlnt-community xlnt XLSX File xlsx_consumer.cpp read_o… |
xlnt-community |
xlnt |
2026-03-07T15:32:08.520Z | 2026-03-07T15:32:08.520Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-2584 | A critical SQL Injection (SQLi) vulnerability has been identified in the authentication module of t… | 2026-03-02T09:16:18.150 | 2026-03-02T09:16:18.150 |
| fkie_cve-2026-20445 | In MDDP, there is a possible system crash due to a race condition. This could lead to local denial … | 2026-03-02T09:16:18.007 | 2026-03-02T09:16:18.007 |
| fkie_cve-2026-20444 | In display, there is a possible memory corruption due to a missing bounds check. This could lead to… | 2026-03-02T09:16:17.863 | 2026-03-02T09:16:17.863 |
| fkie_cve-2026-20443 | In display, there is a possible memory corruption due to use after free. This could lead to local e… | 2026-03-02T09:16:17.720 | 2026-03-02T09:16:17.720 |
| fkie_cve-2026-20442 | In display, there is a possible system crash due to use after free. This could lead to local denial… | 2026-03-02T09:16:17.583 | 2026-03-02T09:16:17.583 |
| fkie_cve-2026-20441 | In MAE, there is a possible out of bounds write due to a missing bounds check. This could lead to l… | 2026-03-02T09:16:17.447 | 2026-03-02T09:16:17.447 |
| fkie_cve-2026-20440 | In MAE, there is a possible out of bounds write due to a missing bounds check. This could lead to l… | 2026-03-02T09:16:17.307 | 2026-03-02T09:16:17.307 |
| fkie_cve-2026-20439 | In imgsys, there is a possible system crash due to use after free. This could lead to local denial … | 2026-03-02T09:16:17.170 | 2026-03-02T09:16:17.170 |
| fkie_cve-2026-20438 | In MAE, there is a possible out of bounds write due to a race condition. This could lead to local e… | 2026-03-02T09:16:17.030 | 2026-03-02T09:16:17.030 |
| fkie_cve-2026-20437 | In MAE, there is a possible system crash due to use after free. This could lead to local denial of … | 2026-03-02T09:16:16.880 | 2026-03-02T09:16:16.880 |
| fkie_cve-2026-20436 | In wlan STA driver, there is a possible escalation of privilege due to a missing bounds check. This… | 2026-03-02T09:16:16.743 | 2026-03-02T09:16:16.743 |
| fkie_cve-2026-20435 | In preloader, there is a possible read of device unique identifiers due to a logic error. This coul… | 2026-03-02T09:16:16.600 | 2026-03-02T09:16:16.600 |
| fkie_cve-2026-20434 | In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to… | 2026-03-02T09:16:16.460 | 2026-03-02T09:16:16.460 |
| fkie_cve-2026-20430 | In wlan AP FW, there is a possible out of bounds write due to an incorrect bounds check. This could… | 2026-03-02T09:16:16.323 | 2026-03-02T09:16:16.323 |
| fkie_cve-2026-20429 | In display, there is a possible out of bounds read due to a missing bounds check. This could lead t… | 2026-03-02T09:16:16.187 | 2026-03-02T09:16:16.187 |
| fkie_cve-2026-20428 | In display, there is a possible out of bounds write due to a missing bounds check. This could lead … | 2026-03-02T09:16:16.050 | 2026-03-02T09:16:16.050 |
| fkie_cve-2026-20427 | In display, there is a possible escalation of privilege due to a missing bounds check. This could l… | 2026-03-02T09:16:15.910 | 2026-03-02T09:16:15.910 |
| fkie_cve-2026-20426 | In display, there is a possible out of bounds write due to a missing bounds check. This could lead … | 2026-03-02T09:16:15.777 | 2026-03-02T09:16:15.777 |
| fkie_cve-2026-20425 | In display, there is a possible out of bounds write due to a missing bounds check. This could lead … | 2026-03-02T09:16:15.633 | 2026-03-02T09:16:15.633 |
| fkie_cve-2026-20424 | In display, there is a possible out of bounds read due to a missing bounds check. This could lead t… | 2026-03-02T09:16:15.493 | 2026-03-02T09:16:15.493 |
| fkie_cve-2026-20423 | In wlan STA driver, there is a possible out of bounds write due to a missing bounds check. This cou… | 2026-03-02T09:16:15.340 | 2026-03-02T09:16:15.340 |
| fkie_cve-2026-20416 | In pcie, there is a possible out of bounds write due to a missing bounds check. This could lead to … | 2026-03-02T09:16:15.150 | 2026-03-02T09:16:15.150 |
| fkie_cve-2026-26104 | A flaw was found in the udisks storage management daemon that allows unprivileged users to back up … | 2026-02-25T11:16:03.193 | 2026-03-02T08:15:59.120 |
| fkie_cve-2026-26103 | A flaw was found in the udisks storage management daemon that exposes a privileged D-Bus API for re… | 2026-02-25T11:16:02.983 | 2026-03-02T08:15:57.953 |
| fkie_cve-2026-3422 | U-Office Force developed by e-Excellence has a Insecure Deserialization vulnerability, allowing una… | 2026-03-02T07:16:23.477 | 2026-03-02T07:16:23.477 |
| fkie_cve-2026-3413 | A flaw has been found in itsourcecode University Management System 1.0. This vulnerability affects … | 2026-03-02T07:16:23.240 | 2026-03-02T07:16:23.240 |
| fkie_cve-2026-3000 | IDExpert Windows Logon Agent developed by Changing has a Remote Code Execution vulnerability, allow… | 2026-03-02T07:16:23.013 | 2026-03-02T07:16:23.013 |
| fkie_cve-2026-2999 | IDExpert Windows Logon Agent developed by Changing has a Remote Code Execution vulnerability, allow… | 2026-03-02T07:16:22.743 | 2026-03-02T07:16:22.743 |
| fkie_cve-2025-15597 | A vulnerability has been found in Dataease SQLBot up to 1.4.0. This affects an unknown function of … | 2026-03-02T07:16:22.330 | 2026-03-02T07:16:22.330 |
| fkie_cve-2025-14905 | A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `sch… | 2026-02-23T16:29:35.620 | 2026-03-02T07:16:21.940 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-rgpf-x2pq-6m4q |
5.3 (3.1)
1.9 (4.0)
|
A vulnerability was detected in Freedom Factory dGEN1 up to 20260221. Affected is an unknown functi… | 2026-03-07T21:33:41Z | 2026-03-07T21:33:41Z |
| ghsa-7pqm-gjrm-wf96 |
5.3 (3.1)
1.9 (4.0)
|
A security vulnerability has been detected in Freedom Factory dGEN1 up to 20260221. This impacts th… | 2026-03-07T21:33:41Z | 2026-03-07T21:33:41Z |
| ghsa-r2wv-mwv6-mxwm |
3.1 (3.1)
2.3 (4.0)
|
A vulnerability was detected in Mendi Neurofeedback Headset V4. Affected by this vulnerability is a… | 2026-03-07T18:30:31Z | 2026-03-07T18:30:31Z |
| ghsa-mmqm-c3vq-cgvr |
3.1 (3.1)
1.3 (4.0)
|
A weakness has been identified in Freedom Factory dGEN1 up to 20260221. This affects the function A… | 2026-03-07T18:30:31Z | 2026-03-07T18:30:31Z |
| ghsa-hjc5-2xcc-v5q2 |
5.3 (3.1)
1.9 (4.0)
|
A security flaw has been discovered in Freedom Factory dGEN1 up to 20260221. The impacted element i… | 2026-03-07T18:30:31Z | 2026-03-07T18:30:31Z |
| ghsa-f8w4-fphr-9q3w |
3.3 (3.1)
1.9 (4.0)
|
A vulnerability was identified in xlnt-community xlnt up to 1.6.1. The affected element is the func… | 2026-03-07T18:30:30Z | 2026-03-07T18:30:31Z |
| ghsa-jvq4-fjjq-g6w7 |
9.8 (3.1)
|
Compress::Raw::Zlib versions through 2.219 for Perl use potentially insecure versions of zlib. Com… | 2026-03-05T03:31:26Z | 2026-03-07T18:30:30Z |
| ghsa-j682-47rx-fxrp |
7.4 (3.1)
|
telnetd in GNU inetutils through 2.7 allows privilege escalation that can be exploited by abusing s… | 2026-02-27T06:31:28Z | 2026-03-07T18:30:30Z |
| ghsa-g7xr-56w3-vjqh |
|
Telnet allows a remote client to specify environment variables including LD_LIBRARY_PATH, allowing … | 2022-04-30T18:09:55Z | 2026-03-07T18:30:30Z |
| ghsa-crhr-qqj8-rpxc |
|
Improper handling of configuration values in ZKConfig in Apache ZooKeeper 3.8.5 and 3.9.4 on all pl… | 2026-03-07T09:30:15Z | 2026-03-07T18:30:30Z |
| ghsa-g449-jq9r-wx9r |
4.7 (3.1)
2.0 (4.0)
|
A vulnerability has been found in Wavlink WL-NU516U1 240425. This vulnerability affects the functio… | 2026-03-07T15:30:16Z | 2026-03-07T15:30:17Z |
| ghsa-6v7x-r5hj-8xc6 |
3.3 (3.1)
1.9 (4.0)
|
A vulnerability was found in xlnt-community xlnt up to 1.6.1. This issue affects the function xlnt:… | 2026-03-07T15:30:17Z | 2026-03-07T15:30:17Z |
| ghsa-3f3c-wc35-5wjv |
3.3 (3.1)
1.9 (4.0)
|
A vulnerability was determined in xlnt-community xlnt up to 1.6.1. Impacted is the function xlnt::d… | 2026-03-07T15:30:17Z | 2026-03-07T15:30:17Z |
| ghsa-pjpj-3w53-j35f |
4.7 (3.1)
2.0 (4.0)
|
A flaw has been found in Wavlink WL-NU516U1 240425. This affects the function ota_new_upgrade of th… | 2026-03-07T15:30:16Z | 2026-03-07T15:30:16Z |
| ghsa-x8w5-j8fh-hpvp |
|
It was discovered that dpkg-deb (a component of dpkg, the Debian package management system) does no… | 2026-03-07T09:30:15Z | 2026-03-07T12:31:23Z |
| ghsa-wh23-v966-32jj |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: io_uring/kbuf: reallocate buf … | 2025-03-07T09:30:35Z | 2026-03-07T12:31:23Z |
| ghsa-v2m2-mhf5-qj74 |
6.4 (3.1)
|
The Show YouTube video plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the pl… | 2026-03-07T09:30:15Z | 2026-03-07T09:30:15Z |
| ghsa-pmxc-wcq3-pr53 |
6.4 (3.1)
|
The Infomaniak Connect for OpenID plugin for WordPress is vulnerable to Stored Cross-Site Scripting… | 2026-03-07T09:30:15Z | 2026-03-07T09:30:15Z |
| ghsa-gp7g-h2vp-5489 |
6.4 (3.1)
|
The Consensus Embed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugi… | 2026-03-07T09:30:15Z | 2026-03-07T09:30:15Z |
| ghsa-7xrh-hqfc-g7qr |
|
Hostname verification in Apache ZooKeeper ZKTrustManager falls back to reverse DNS (PTR) when IP SA… | 2026-03-07T09:30:15Z | 2026-03-07T09:30:15Z |
| ghsa-4jm6-9pwc-w558 |
4.4 (3.1)
|
The LotekMedia Popup Form plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the… | 2026-03-07T09:30:15Z | 2026-03-07T09:30:15Z |
| ghsa-4j4f-wwp5-72mp |
6.1 (3.1)
|
The RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging plugin for WordPress is… | 2026-03-07T09:30:15Z | 2026-03-07T09:30:15Z |
| ghsa-36p3-m272-rwxj |
6.4 (3.1)
|
The Media Library Alt Text Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting… | 2026-03-07T09:30:15Z | 2026-03-07T09:30:15Z |
| ghsa-wcg5-48v2-pxvv |
7.2 (3.1)
|
The WP App Bar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'app-bar-f… | 2026-03-07T09:30:14Z | 2026-03-07T09:30:14Z |
| ghsa-r98f-7xrf-92f3 |
4.3 (3.1)
|
The Guardian News Feed plugin for WordPress is vulnerable to Cross-Site Request Forgery in all vers… | 2026-03-07T09:30:14Z | 2026-03-07T09:30:14Z |
| ghsa-q3hq-vr59-65q2 |
4.3 (3.1)
|
The Purchase Button For Affiliate Link plugin for WordPress is vulnerable to Cross-Site Request For… | 2026-03-07T09:30:14Z | 2026-03-07T09:30:14Z |
| ghsa-p83v-x527-cqw7 |
4.3 (3.1)
|
The True Ranker plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up… | 2026-03-07T09:30:14Z | 2026-03-07T09:30:14Z |
| ghsa-m4q3-832v-44j6 |
7.2 (3.1)
|
The Meta Box plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file… | 2026-03-07T09:30:14Z | 2026-03-07T09:30:14Z |
| ghsa-jp8c-m725-92vr |
4.4 (3.1)
|
The Carta Online plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settin… | 2026-03-07T09:30:14Z | 2026-03-07T09:30:14Z |
| ghsa-f46p-qfxx-7fh3 |
6.4 (3.1)
|
The MyQtip – easy qTip2 plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the p… | 2026-03-07T09:30:14Z | 2026-03-07T09:30:14Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-85 |
7.5 (3.1)
|
Deserialization of untrusted data can occur in versions 23.10.2.0 and newer of the MindsD… | mindsdb | 2024-09-12T13:15:00Z | 2026-03-03T16:29:37.848846Z |
| pysec-2024-84 |
7.5 (3.1)
|
Deserialization of untrusted data can occur in versions 23.10.3.0 and newer of the MindsD… | mindsdb | 2024-09-12T13:15:00Z | 2026-03-03T16:29:37.756762Z |
| pysec-2024-83 |
7.5 (3.1)
|
Deserialization of untrusted data can occur in versions 23.10.2.0 and newer of the MindsD… | mindsdb | 2024-09-12T13:15:00Z | 2026-03-03T16:29:37.662671Z |
| pysec-2024-82 |
8.8 (3.1)
|
Deserialization of untrusted data can occur in versions 23.3.2.0 and newer of the MindsDB… | mindsdb | 2024-09-12T13:15:00Z | 2026-03-03T16:29:37.563380Z |
| pysec-2023-278 |
5.3 (3.1)
|
MindsDB connects artificial intelligence models to real time data. Versions prior to 23.1… | mindsdb | 2023-12-11T21:15:00Z | 2026-03-03T16:29:37.448520Z |
| pysec-2023-121 |
|
A vulnerability was found in zstd v1.4.10, where an attacker can supply empty string as a… | zstd | 2023-03-31T20:15:00+00:00 | 2026-02-25T19:20:58+00:00 |
| pysec-2026-1 |
|
A PyPI user account compromised by an attacker and was able to upload a malicious version… | dydx-v4-client | 2026-01-28T21:09:02+00:00 | |
| pysec-2025-52 |
|
gateway_proxy_handler in MLflow before 3.1.0 lacks gateway_path validation. | mlflow | 2025-06-23T15:15:29Z | 2025-12-05T13:25:55.146081Z |
| pysec-2020-220 |
|
A flaw was found in Ansible Base when using the aws_ssm connection plugin as garbage coll… | ansible | 2020-10-05T14:15:00Z | 2025-10-31T04:43:53.616247Z |
| pysec-2025-72 |
|
The `num2words` project was compromised via a phishing attack and two new versions were u… | num2words | 2025-07-31T14:34:47+00:00 | |
| pysec-2025-71 |
|
Cadwyn creates production-ready community-driven modern Stripe-like API versioning in Fas… | cadwyn | 2025-07-21T21:15:25+00:00 | 2025-07-23T15:24:03.825615+00:00 |
| pysec-2025-70 |
10.0 (3.1)
|
A Server-Side Request Forgery (SSRF) vulnerability exists in the RequestsToolkit componen… | langchain-community | 2025-06-23T21:15:25+00:00 | 2025-07-16T21:23:40.211079+00:00 |
| pysec-2024-259 |
9.8 (3.1)
|
In PyTorch <=2.4.1, the RemoteModule has Deserialization RCE. NOTE: this is disputed by m… | torch | 2024-10-29T21:15:04+00:00 | 2025-07-16T03:09:57.748865+00:00 |
| pysec-2024-258 |
|
In scrapy/scrapy, an issue was identified where the Authorization header is not removed d… | scrapy | 2024-05-20T08:15:08+00:00 | 2025-07-15T17:37:50.051730+00:00 |
| pysec-2025-69 |
|
In Roundup before 2.5.0, XSS can occur via interaction between URLs and issue tracker tem… | roundup | 2025-07-13T20:15:25+00:00 | 2025-07-13T21:23:01.161315+00:00 |
| pysec-2025-68 |
8.0 (3.1)
|
A vulnerability, which was classified as critical, has been found in Upsonic up to 0.55.6… | upsonic | 2025-06-19T21:15:27+00:00 | 2025-07-08T19:22:27.449399+00:00 |
| pysec-2025-67 |
9.8 (3.1)
|
A vulnerability classified as critical was found in Upsonic up to 0.55.6. This vulnerabil… | upsonic | 2025-06-19T21:15:27+00:00 | 2025-07-08T19:22:27.385619+00:00 |
| pysec-2025-66 |
|
Improper privilege management in a REST interface allowed registered users to access unau… | streampipes | 2025-03-03T11:15:11+00:00 | 2025-07-08T15:23:46.628375+00:00 |
| pysec-2025-65 |
|
A path traversal vulnerability exists in run-llama/llama_index versions 0.12.27 through 0… | llama-index | 2025-07-07T13:15:28+00:00 | 2025-07-07T15:23:42.730681+00:00 |
| pysec-2025-61 |
|
Pillow is a Python imaging library. In versions 11.2.0 to before 11.3.0, there is a heap … | pillow | 2025-07-01T19:15:27Z | 2025-07-07T14:12:46.226030Z |
| pysec-2025-64 |
9.8 (3.1)
|
A vulnerability classified as critical has been found in themanojdesai python-a2a up to 0… | python-a2a | 2025-06-17T07:15:18+00:00 | 2025-07-02T21:23:13.806273+00:00 |
| pysec-2025-63 |
|
vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Whe… | vllm | 2025-03-19T16:15:32+00:00 | 2025-07-01T23:22:49.176005+00:00 |
| pysec-2025-62 |
|
vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Mal… | vllm | 2025-02-07T20:15:34+00:00 | 2025-07-01T23:22:49.083695+00:00 |
| pysec-2025-60 |
|
Exposure of Sensitive Information to an Unauthorized Actor, Insertion of Sensitive Inform… | apache-iotdb | 2025-05-14T11:16:28+00:00 | 2025-07-01T21:22:47.232036+00:00 |
| pysec-2025-59 |
|
Remote Code Execution with untrusted URI of UDF vulnerability in Apache IoTDB. The attack… | apache-iotdb | 2025-05-14T11:15:47+00:00 | 2025-07-01T21:22:47.177405+00:00 |
| pysec-2024-257 |
7.5 (3.1)
|
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessm… | mobsf | 2024-03-22T23:15:07+00:00 | 2025-06-30T15:23:50.085549+00:00 |
| pysec-2025-58 |
8.8 (3.1)
|
vLLM is a library for LLM inference and serving. vllm/model_executor/weight_utils.py impl… | vllm | 2025-01-27T18:15:41+00:00 | 2025-06-27T21:22:36.583615+00:00 |
| pysec-2025-57 |
|
A Denial of Service (DoS) vulnerability in zenml-io/zenml version 0.66.0 allows unauthent… | zenml | 2025-03-20T10:15:48+00:00 | 2025-06-27T17:22:55.175431+00:00 |
| pysec-2025-56 |
4.3 (3.1)
|
OctoPrint provides a web interface for controlling consumer 3D printers. In versions up t… | octoprint | 2025-04-22T18:15:59+00:00 | 2025-06-27T17:22:53.513680+00:00 |
| pysec-2024-256 |
|
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessm… | mobsf | 2024-12-03T16:15:24+00:00 | 2025-06-27T17:22:53.325430+00:00 |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-33903 | In CARLA through 0.9.15.2, the collision sensor mishandles some situations involving pede… | 2024-04-29T05:02:07.295775Z |
| gsd-2024-33902 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.486429Z |
| gsd-2024-33901 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.525896Z |
| gsd-2024-33900 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.290639Z |
| gsd-2024-33899 | RARLAB WinRAR before 7.00, on Linux and UNIX platforms, allows attackers to spoof the scr… | 2024-04-29T05:02:07.400574Z |
| gsd-2024-33898 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.287632Z |
| gsd-2024-33897 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.283756Z |
| gsd-2024-33896 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.313250Z |
| gsd-2024-33895 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.493081Z |
| gsd-2024-33894 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.488420Z |
| gsd-2024-33893 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.381761Z |
| gsd-2024-33892 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.378170Z |
| gsd-2024-33891 | Delinea Secret Server before 11.7.000001 allows attackers to bypass authentication via th… | 2024-04-29T05:02:07.412035Z |
| gsd-2024-33890 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.344384Z |
| gsd-2024-33889 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.392587Z |
| gsd-2024-33888 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.468423Z |
| gsd-2024-33887 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.503613Z |
| gsd-2024-33886 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.287167Z |
| gsd-2024-33885 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.441746Z |
| gsd-2024-33884 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:07.534455Z |
| gsd-2024-33883 | The ejs (aka Embedded JavaScript templates) package before 3.1.10 for Node.js lacks certa… | 2024-04-29T05:02:07.271727Z |
| gsd-2024-4303 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:05.716348Z |
| gsd-2024-4302 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:05.603637Z |
| gsd-2024-4301 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-29T05:02:05.678292Z |
| gsd-2024-4300 | E-WEBInformationCo. FS-EZViewer(Web) exposes sensitive information in the service. A remo… | 2024-04-29T05:02:05.715239Z |
| gsd-2024-4299 | The system configuration interface of HGiga iSherlock (including MailSherlock, SpamSheroc… | 2024-04-29T05:02:05.606402Z |
| gsd-2024-4298 | The email search interface of HGiga iSherlock (including MailSherlock, SpamSherock, Audit… | 2024-04-29T05:02:05.598531Z |
| gsd-2024-4297 | The system configuration interface of HGiga iSherlock (including MailSherlock, SpamSherlo… | 2024-04-29T05:02:05.700888Z |
| gsd-2024-4296 | The account management interface of HGiga iSherlock (including MailSherlock, SpamSherlock… | 2024-04-29T05:02:05.621428Z |
| gsd-2024-33882 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-28T05:02:07.803998Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2026-1278 | Malicious code in chat-xdk (PyPI) | 2026-03-07T09:17:14Z | 2026-03-07T09:17:34Z |
| mal-2026-870 | Malicious code in b10connoisseur (PyPI) | 2026-02-12T12:10:26Z | 2026-03-06T23:43:26Z |
| mal-2026-1277 | Malicious code in prateek-yadav23 (PyPI) | 2026-03-06T23:22:42Z | 2026-03-06T23:22:42Z |
| mal-2026-1276 | Malicious code in flowfix (PyPI) | 2026-03-06T17:39:56Z | 2026-03-06T17:39:56Z |
| mal-2026-1275 | Malicious code in hostlists-plugins-default (PyPI) | 2026-03-06T17:01:42Z | 2026-03-06T17:01:59Z |
| mal-2026-1271 | Malicious code in qq-console (npm) | 2026-03-06T15:22:32Z | 2026-03-06T15:22:32Z |
| mal-2026-1270 | Malicious code in @wgu-edu/wgu-icons (npm) | 2026-03-06T15:20:59Z | 2026-03-06T15:20:59Z |
| mal-2026-1269 | Malicious code in @wgu-edu/wgu-core (npm) | 2026-03-06T15:20:59Z | 2026-03-06T15:20:59Z |
| mal-2026-1267 | Malicious code in @shenira/baileysx (npm) | 2026-03-06T14:37:02Z | 2026-03-06T14:37:09Z |
| mal-2026-1266 | Malicious code in @shenira/baileys (npm) | 2026-03-06T14:37:02Z | 2026-03-06T14:37:09Z |
| mal-2026-1268 | Malicious code in @shenira/libsignal-node (npm) | 2026-03-06T14:37:02Z | 2026-03-06T14:37:03Z |
| mal-2026-1094 | Malicious code in dc-web-app (npm) | 2026-03-01T06:45:23Z | 2026-03-06T14:29:08Z |
| mal-2026-1274 | Malicious code in test-mal-npm-pkg-not-local (npm) | 2026-03-06T14:26:46Z | 2026-03-06T14:26:47Z |
| mal-2026-1273 | Malicious code in test-mal-npm-pkg-local (npm) | 2026-03-06T14:26:46Z | 2026-03-06T14:26:47Z |
| mal-2026-1272 | Malicious code in test-mal-npm-pkg-2 (npm) | 2026-03-06T14:26:46Z | 2026-03-06T14:26:46Z |
| mal-2026-1265 | Malicious code in aaaaaxxxxx (npm) | 2026-03-06T14:18:06Z | 2026-03-06T14:18:07Z |
| mal-2026-1264 | Malicious code in python-requirements (PyPI) | 2026-03-06T13:12:14Z | 2026-03-06T13:12:15Z |
| mal-2026-1263 | Malicious code in python-module-installer (PyPI) | 2026-03-06T13:02:02Z | 2026-03-06T13:02:03Z |
| mal-2026-1261 | Malicious code in fastapi-requests (PyPI) | 2026-03-06T11:35:54Z | 2026-03-06T11:35:54Z |
| mal-2026-1262 | Malicious code in fastapis-requests (PyPI) | 2026-03-06T11:34:31Z | 2026-03-06T11:34:31Z |
| mal-2026-1260 | Malicious code in webmd-url (npm) | 2026-03-06T07:28:40Z | 2026-03-06T07:28:40Z |
| mal-2026-1259 | Malicious code in pino-sdk-v2 (npm) | 2026-03-06T07:19:17Z | 2026-03-06T07:19:17Z |
| mal-2026-1258 | Malicious code in tether-dev-docs (npm) | 2026-03-06T00:01:05Z | 2026-03-06T00:01:05Z |
| mal-2026-1257 | Malicious code in pdfjs-dist-fourth (npm) | 2026-03-05T22:15:57Z | 2026-03-05T22:15:57Z |
| mal-2026-1249 | Malicious code in imhuman-fw-logger (npm) | 2026-03-05T16:49:32Z | 2026-03-05T16:49:33Z |
| mal-2026-1248 | Malicious code in @imhuman/fw-logger (npm) | 2026-03-05T16:49:32Z | 2026-03-05T16:49:33Z |
| mal-2026-1247 | Malicious code in @imhuman/corp-build-utils-poc (npm) | 2026-03-05T16:49:33Z | 2026-03-05T16:49:33Z |
| mal-2026-1251 | Malicious code in pear-apps-lib-ui-react-hooks (npm) | 2026-03-05T16:18:38Z | 2026-03-05T16:18:48Z |
| mal-2026-1252 | Malicious code in pear-apps-utils-avatar-initials (npm) | 2026-03-05T16:04:20Z | 2026-03-05T16:04:26Z |
| mal-2026-1253 | Malicious code in pear-apps-utils-date (npm) | 2026-03-05T16:00:53Z | 2026-03-05T16:00:54Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2026-0441 | OpenClaw: Mehrere Schwachstellen | 2026-02-17T23:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2026-0424 | OpenClaw: Mehrere Schwachstellen | 2026-02-15T23:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2025-1898 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service und Privilegieneskalation | 2025-08-24T22:00:00.000+00:00 | 2026-03-04T23:00:00.000+00:00 |
| wid-sec-w-2026-0535 | Juniper JUNOS Evolved: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2026-02-25T23:00:00.000+00:00 | 2026-03-03T23:00:00.000+00:00 |
| wid-sec-w-2026-0554 | Red Hat Enterprise Linux (udisks): Mehrere Schwachstellen | 2026-03-01T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0546 | Red Hat Enterprise Linux (Valkey): Mehrere Schwachstellen | 2026-02-26T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0526 | IBM App Connect Enterprise: Mehrere Schwachstellen | 2026-02-25T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0497 | Mozilla Firefox, Firefox ESR und Thunderbird: Mehrere Schwachstellen | 2026-02-24T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0422 | Mattermost: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2026-02-15T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0410 | HAProxy Enterprise, Community und ALOHA (QUIC): Mehrere Schwachstellen ermöglichen Denial of Service | 2026-02-12T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0379 | Intel Prozessoren: Mehrere Schwachstellen | 2026-02-10T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0359 | GnuTLS: Mehrere Schwachstellen ermöglichen Denial of Service | 2026-02-09T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0353 | libpng: Schwachstelle ermöglicht Codeausführung | 2026-02-09T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0345 | Golang Go: Mehrere Schwachstellen | 2026-02-08T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0324 | Linux Kernel: Mehrere Schwachstellen | 2026-02-04T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0305 | Red Hat Enterprise Linux (libsoup): Mehrere Schwachstellen | 2026-02-04T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0234 | OpenSSL: Mehrere Schwachstellen | 2026-01-27T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0129 | Golang Go: Mehrere Schwachstellen | 2026-01-15T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0086 | Linux Kernel: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0080 | Microsoft Azure: Mehrere Schwachstellen | 2026-01-13T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0068 | libpng (API-Funktionen): Mehrere Schwachstellen ermöglichen DoS und Offenlegung von Informationen | 2026-01-12T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0062 | Red Hat Enterprise Linux (libsoup): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen und Datenmanipulation | 2026-01-11T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2920 | Linux Kernel: Mehrere Schwachstellen | 2025-12-23T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2914 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-22T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2904 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-18T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2887 | PHP: Mehrere Schwachstellen | 2025-12-18T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2868 | Linux Kernel: Mehrere Schwachstellen | 2025-12-16T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2765 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-08T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2756 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-07T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2747 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-12-04T23:00:00.000+00:00 | 2026-03-02T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0071 | Kwetsbaarheden verholpen in Cisco Catalyst SD-WAN Manager | 2026-02-25T17:11:09.013125Z | 2026-03-06T12:07:02.595940Z |
| ncsc-2026-0078 | Kwetsbaarheden verholpen in Kibana | 2026-03-05T09:36:49.056247Z | 2026-03-05T09:36:49.056247Z |
| ncsc-2026-0077 | Kwetsbaarheden verholpen in Cisco Secure Firewall systemen | 2026-03-05T09:05:21.646499Z | 2026-03-05T09:05:21.646499Z |
| ncsc-2026-0076 | Kwetsbaarheden verholpen in Cisco Secure Firewall Management Center | 2026-03-04T20:49:12.211658Z | 2026-03-04T20:49:12.211658Z |
| ncsc-2026-0075 | Kwetsbaarheid verholpen in n8n Automation Platform | 2026-03-04T14:03:54.207583Z | 2026-03-04T14:03:54.207583Z |
| ncsc-2026-0070 | Kwetsbaarheden verholpen in VMware Aria Operations | 2026-02-25T11:24:46.807867Z | 2026-03-04T08:54:08.940512Z |
| ncsc-2026-0074 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2026-03-03T09:07:09.279353Z | 2026-03-03T09:07:09.279353Z |
| ncsc-2026-0073 | Kwetsbaarheid verholpen in Juniper Junos OS Evolved | 2026-02-27T09:48:51.845864Z | 2026-02-27T09:48:51.845864Z |
| ncsc-2026-0072 | Kwetsbaarheden verholpen in GitLab | 2026-02-27T07:15:18.318821Z | 2026-02-27T07:15:18.318821Z |
| ncsc-2026-0069 | Kwetsbaarheden verholpen in SolarWinds Serv-U | 2026-02-25T10:39:38.154815Z | 2026-02-25T10:39:38.154815Z |
| ncsc-2026-0068 | Kwetsbaarheden verholpen in Splunk Enterprise en Splunk Cloud Platform | 2026-02-23T14:27:28.865278Z | 2026-02-23T14:27:28.865278Z |
| ncsc-2026-0043 | Zeroday-kwetsbaarheden verholpen in Ivanti Endpoint Manager Mobile | 2026-01-29T19:15:04.575371Z | 2026-02-20T14:47:02.047999Z |
| ncsc-2026-0067 | Kwetsbaarheden verholpen in GitHub Enterprise Server | 2026-02-20T10:13:39.540778Z | 2026-02-20T10:13:39.540778Z |
| ncsc-2026-0066 | Kwetsbaarheid verholpen in Google Chrome | 2026-02-19T08:29:30.712590Z | 2026-02-19T08:29:30.712590Z |
| ncsc-2026-0065 | Kwetsbaarheid verholpen in Dell RecoverPoint for Virtual Machines | 2026-02-18T13:18:23.815384Z | 2026-02-18T13:18:23.815384Z |
| ncsc-2026-0064 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2026-02-13T13:35:03.870920Z | 2026-02-13T13:35:03.870920Z |
| ncsc-2026-0063 | Kwetsbaarheden verholpen in Apple macOS | 2026-02-13T13:24:06.433550Z | 2026-02-13T13:24:06.433550Z |
| ncsc-2026-0048 | Kwetsbaarheid verholpen in BeyondTrust Remote Support | 2026-02-09T10:27:57.867529Z | 2026-02-13T12:54:32.614217Z |
| ncsc-2026-0062 | Kwetsbaarheden verholpen in GitLab CE/EE | 2026-02-11T11:45:05.986313Z | 2026-02-11T11:45:05.986313Z |
| ncsc-2026-0061 | Kwetsbaarheden verholpen in Fortinet FortiOS | 2026-02-11T11:34:50.888067Z | 2026-02-11T11:34:50.888067Z |
| ncsc-2026-0060 | Kwetsbaarheden verholpen in Fortinet FortiSandbox, FortiAuthenticator en FortiClient | 2026-02-11T11:34:36.684955Z | 2026-02-11T11:34:36.684955Z |
| ncsc-2026-0059 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2026-02-11T08:16:27.583936Z | 2026-02-11T08:16:27.583936Z |
| ncsc-2026-0058 | Kwetsbaarheden verholpen in Microsoft Office | 2026-02-10T19:11:42.825147Z | 2026-02-10T19:11:42.825147Z |
| ncsc-2026-0057 | Kwetsbaarheden verholpen in Microsoft Azure | 2026-02-10T19:08:27.878305Z | 2026-02-10T19:08:27.878305Z |
| ncsc-2026-0056 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2026-02-10T19:07:16.028511Z | 2026-02-10T19:07:16.028511Z |
| ncsc-2026-0055 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2026-02-10T19:05:45.729972Z | 2026-02-10T19:05:45.729972Z |
| ncsc-2026-0054 | Kwetsbaarheid verholpen in Microsoft Exchange | 2026-02-10T19:04:51.366294Z | 2026-02-10T19:04:51.366294Z |
| ncsc-2026-0053 | Kwetsbaarheden verholpen in Microsoft Windows | 2026-02-10T19:01:45.561771Z | 2026-02-10T19:01:45.561771Z |
| ncsc-2026-0052 | Kwetsbaarheden verholpen in SAP producten | 2026-02-10T12:28:40.531069Z | 2026-02-10T12:28:40.531069Z |
| ncsc-2026-0051 | Kwetsbaarheden verholpen in Siemens producten | 2026-02-10T12:27:40.637581Z | 2026-02-10T12:27:40.637581Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-613116 | SSA-613116: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.1 | 2025-08-12T00:00:00Z | 2026-02-24T00:00:00Z |
| ssa-355557 | SSA-355557: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.2 | 2025-08-12T00:00:00Z | 2026-02-24T00:00:00Z |
| ssa-089022 | SSA-089022: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.3 | 2026-01-28T00:00:00Z | 2026-02-24T00:00:00Z |
| ssa-965753 | SSA-965753: Multiple File Parsing Vulnerabilities in Simcenter Femap and Nastran Before V2512 | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-864900 | SSA-864900: Multiple Vulnerabilities in Fortigate NGFW on RUGGEDCOM APE1808 Devices | 2025-05-13T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-783261 | SSA-783261: Denial of Service Vulnerability in Automation License Manager (ALM) Before V5.2 | 2012-12-12T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-674753 | SSA-674753: Denial-of-Service Vulnerability in ET 200 Devices | 2026-01-13T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-625934 | SSA-625934: Improper Access Control Vulnerability in the Webhooks Implementation of Siveillance Video Management Servers | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-599451 | SSA-599451: Multiple Vulnerabilities in SiPass integrated | 2025-10-14T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-535115 | SSA-535115: Data Validation Vulnerability in NX Before V2512 | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-513708 | SSA-513708: Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices | 2025-06-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-507364 | SSA-507364: Heap Based Buffer Overflow Vulnerability in WIBU CodeMeter Runtime Affecting the Desigo CC Product Family and SENTRON Powermanager | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-445819 | SSA-445819: Out of Bounds Read in PS/IGES Parasolid Translator Component in Solid Edge | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-311973 | SSA-311973: Multiple Local Privilege Escalation Vulnerabilities in SINEC NMS and User Management Component (UMC) | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-282044 | SSA-282044: DLL Hijacking Vulnerability in Siemens Web Installer used by the Online Software Delivery | 2025-08-12T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-265688 | SSA-265688: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 TM MFP V1.1 | 2024-04-09T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-216014 | SSA-216014: Vulnerabilities in EFI variable of SIMATIC IPCs, SIMATIC Tablet PCs, and SIMATIC Field PGs | 2025-03-11T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-212953 | SSA-212953: Multiple Vulnerabilities in COMOS | 2025-12-09T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-130874 | SSA-130874: Buffer Overflow Vulnerability in SCALANCE X Switches | 2012-04-05T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-082556 | SSA-082556: Vulnerabilities in the additional GNU/Linux subsystem of the SIMATIC S7-1500 CPU 1518(F)-4 PN/DP MFP V3.1.5 | 2025-06-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-035571 | SSA-035571: Cross Site Scripting Vulnerability in Polarion Before V2506 | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-978177 | SSA-978177: Vulnerability in Nozomi Guardian/CMC Before 25.4.0 on RUGGEDCOM APE1808 Devices | 2025-08-12T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-928984 | SSA-928984: Heap-based Buffer Overflow Vulnerability in User Management Component (UMC) | 2024-12-16T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-912274 | SSA-912274: Multiple Vulnerabilities in RUGGEDCOM ROX Before V2.17 | 2025-12-09T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-858251 | SSA-858251: Authentication Bypass Vulnerabilities in OPC UA | 2025-03-11T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-832273 | SSA-832273: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.3 on RUGGEDCOM APE1808 Devices | 2024-03-12T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-827968 | SSA-827968: Vulnerability in Nozomi Guardian/CMC on RUGGEDCOM APE1808 Devices | 2026-01-13T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-698820 | SSA-698820: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.4 on RUGGEDCOM APE1808 Devices | 2024-07-09T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-693776 | SSA-693776: Multiple Vulnerabilities in Industrial Communication Devices based on SINEC OS before V3.2 | 2025-06-10T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-366067 | SSA-366067: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.1 on RUGGEDCOM APE1808 Devices | 2024-03-12T00:00:00Z | 2026-01-13T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2026:2572 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes v2.14.2 security update | 2026-02-11T16:14:44+00:00 | 2026-03-07T22:11:03+00:00 |
| rhsa-2026:0737 | Red Hat Security Advisory: OpenShift Compliance Operator bug fix and enhancement update | 2026-01-15T23:39:47+00:00 | 2026-03-07T22:11:02+00:00 |
| rhsa-2026:0722 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.8.4 security update | 2026-01-15T17:23:06+00:00 | 2026-03-07T22:11:01+00:00 |
| rhsa-2026:0718 | Red Hat Security Advisory: Moderate: Red Hat Advanced Cluster Management for Kubernetes v2.13.5 security update | 2026-01-15T15:59:28+00:00 | 2026-03-07T22:11:00+00:00 |
| rhsa-2026:0627 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes v2.13.5 security update | 2026-01-14T18:37:52+00:00 | 2026-03-07T22:10:59+00:00 |
| rhsa-2025:23542 | Red Hat Security Advisory: OpenShift File Integrity Operator bug fix and enhancement update | 2025-12-17T16:35:07+00:00 | 2026-03-07T22:10:59+00:00 |
| rhsa-2025:23529 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes 2.11.9 security update | 2025-12-17T14:58:47+00:00 | 2026-03-07T22:10:59+00:00 |
| rhsa-2025:23528 | Red Hat Security Advisory: multicluster engine for Kubernetes 2.6 security update | 2025-12-17T14:58:16+00:00 | 2026-03-07T22:10:59+00:00 |
| rhsa-2025:22684 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes 2.12.6 security update | 2025-12-03T23:53:32+00:00 | 2026-03-07T22:10:59+00:00 |
| rhsa-2025:22683 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.7.7 security update | 2025-12-03T22:50:31+00:00 | 2026-03-07T22:10:58+00:00 |
| rhsa-2025:22420 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.14 security, enhancement & bug fix update | 2025-12-01T12:14:05+00:00 | 2026-03-07T22:10:57+00:00 |
| rhsa-2025:22418 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.15 security, enhancement & bug fix update | 2025-12-01T12:10:52+00:00 | 2026-03-07T22:10:56+00:00 |
| rhsa-2025:22416 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.16 security, enhancement & bug fix update | 2025-12-01T12:00:04+00:00 | 2026-03-07T22:10:56+00:00 |
| rhsa-2025:22415 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.17 security, enhancement & bug fix update | 2025-12-01T11:59:39+00:00 | 2026-03-07T22:10:56+00:00 |
| rhsa-2025:21885 | Red Hat Security Advisory: OpenShift Compliance Operator bug fix and enhancement update | 2025-11-20T19:56:52+00:00 | 2026-03-07T22:10:56+00:00 |
| rhsa-2025:21368 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.18 security, enhancement & bug fix update | 2025-11-13T17:36:32+00:00 | 2026-03-07T22:10:55+00:00 |
| rhsa-2025:19961 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes 2.12.6 security update | 2025-11-10T01:30:28+00:00 | 2026-03-07T22:10:55+00:00 |
| rhsa-2025:19958 | Red Hat Security Advisory: multicluster engine for Kubernetes v2.7.7 security update | 2025-11-10T01:14:14+00:00 | 2026-03-07T22:10:52+00:00 |
| rhsa-2025:19335 | Red Hat Security Advisory: Red Hat Advanced Cluster Management for Kubernetes 2.14.1 security update | 2025-10-30T12:58:23+00:00 | 2026-03-07T22:10:52+00:00 |
| rhsa-2025:19332 | Red Hat Security Advisory: multicluster engine for Kubernetes 2.9.1 security update | 2025-10-30T12:27:36+00:00 | 2026-03-07T22:10:52+00:00 |
| rhea-2026:0129 | Red Hat Enhancement Advisory: OpenShift Virtualization 4.17.39 Images | 2026-01-06T11:25:38+00:00 | 2026-03-07T22:10:52+00:00 |
| rhea-2025:23478 | Red Hat Enhancement Advisory: OpenShift Virtualization 4.18.25 Images | 2025-12-17T11:33:21+00:00 | 2026-03-07T22:10:52+00:00 |
| rhea-2025:23406 | Red Hat Enhancement Advisory: OpenShift Virtualization 4.20.3 Images | 2025-12-16T21:20:03+00:00 | 2026-03-07T22:10:52+00:00 |
| rhsa-2026:3960 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Container Release Update | 2026-03-06T11:24:38+00:00 | 2026-03-07T19:56:22+00:00 |
| rhsa-2026:3959 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.5 Product Security and Bug Fix Update | 2026-03-06T16:36:31+00:00 | 2026-03-07T19:56:22+00:00 |
| rhsa-2026:3958 | Red Hat Security Advisory: Red Hat Ansible Automation Platform 2.6 Product Security and Bug Fix Update | 2026-03-06T11:00:27+00:00 | 2026-03-07T19:56:21+00:00 |
| rhsa-2026:3932 | Red Hat Security Advisory: git-lfs security update | 2026-03-05T16:08:17+00:00 | 2026-03-07T19:56:20+00:00 |
| rhsa-2026:3931 | Red Hat Security Advisory: git-lfs security update | 2026-03-05T16:12:11+00:00 | 2026-03-07T19:56:20+00:00 |
| rhsa-2026:3928 | Red Hat Security Advisory: git-lfs security update | 2026-03-05T16:42:20+00:00 | 2026-03-07T19:56:20+00:00 |
| rhsa-2026:3880 | Red Hat Security Advisory: grafana security update | 2026-03-05T12:20:43+00:00 | 2026-03-07T19:56:19+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-064-01 | Delta Electronics CNCSoft-G2 | 2026-03-05T07:00:00.000000Z | 2026-03-05T07:00:00.000000Z |
| icsa-25-343-01 | Universal Boot Loader (U-Boot) (Update A) | 2025-12-09T07:00:00.000000Z | 2026-03-05T07:00:00.000000Z |
| va-25-297-01 | IBM DOORS Next Generation multiple vulnerabilities | 2025-10-22T18:45:47Z | 2026-03-04T00:00:00Z |
| icsa-26-062-05 | Labkotec LID-3300IP | 2026-03-03T07:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-26-062-04 | Portwell Engineering Toolkits | 2026-03-03T07:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-26-062-03 | Hitachi Energy RTU500 Product | 2026-02-24T00:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-26-062-02 | Hitachi Energy Relion REB500 Product | 2026-02-24T00:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-25-023-02 | Hitachi Energy RTU500 Series Product (Update B) | 2024-04-30T00:00:00.000000Z | 2026-03-03T07:00:00.000000Z |
| icsa-26-062-08 | Everon OCPP Backends | 2026-03-03T06:00:00.000000Z | 2026-03-03T06:00:00.000000Z |
| icsa-26-062-07 | ePower epower.ie | 2026-03-03T06:00:00.000000Z | 2026-03-03T06:00:00.000000Z |
| icsa-26-062-06 | Mobiliti e-mobi.hu | 2026-03-03T06:00:00.000000Z | 2026-03-03T06:00:00.000000Z |
| icsa-26-057-10 | Copeland XWEB and XWEB Pro | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-09 | Yokogawa CENTUM VP R6, R7 | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-08 | Mobility46 mobility46.se | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-07 | EV Energy ev.energy | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-06 | SWITCH EV swtchenergy.com | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-05 | Chargemap chargemap.com | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-04 | EV2GO ev2go.io | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-03 | CloudCharge cloudcharge.se | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-02 | Pelco, Inc. Sarix Pro 3 Series IP Cameras | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-057-01 | Johnson Controls, Inc. Frick Controls Quantum HD | 2026-02-26T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-048-04 | Honeywell HIB2PI and HDZ Series CCTV Cameras (Update A) | 2026-02-17T07:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-25-133-02 | Hitachi Energy Relion 670/650/SAM600-IO Series (Update C) | 2023-11-28T00:00:00.000000Z | 2026-02-26T07:00:00.000000Z |
| icsa-26-043-06 | Siemens SINEC OS | 2026-01-28T00:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-26-027-01 | iba Systems ibaPDA | 2026-01-27T07:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-25-226-15 | Siemens SINEC OS | 2025-08-12T00:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-25-226-07 | Siemens Third-Party Components in SINEC OS | 2025-08-12T00:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-25-203-04 | Schneider Electric EcoStruxure Power Operation (Update A) | 2025-07-22T06:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-26-055-02 | Schneider Electric EcoStruxure Building Operation Workstation | 2026-02-10T08:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| icsa-26-055-01 | InSAT MasterSCADA BUK-TS | 2026-02-24T07:00:00.000000Z | 2026-02-24T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-sdwan-authbp-qwcx8d4v | Cisco Catalyst SD-WAN Vulnerabilities | 2026-02-25T16:00:00+00:00 | 2026-03-05T00:06:17+00:00 |
| cisco-sa-fmc-sql-inject-2enmtc8v | Cisco Secure Firewall Management Center Software SQL Injection Vulnerability | 2024-10-23T16:00:00+00:00 | 2026-03-04T16:11:01+00:00 |
| cisco-sa-asaftd-cmd-inj-zjv8wysm | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Command Injection Vulnerability | 2024-04-24T16:00:00+00:00 | 2026-03-04T16:10:59+00:00 |
| cisco-sa-onprem-fmc-authbypass-5jpp45v2 | Cisco Secure Firewall Management Center Software Authentication Bypass Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-ftdfmc-dir-trav-wergjhwq | Cisco Secure Firewall Management Center and Secure Firewall Threat Defense Software Path Traversal Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-ftd-tcp-dos-rhfqnwrg | Cisco Secure Firewall Threat Defense Software TLS with Snort 3 Detection Engine Denial of Service Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-ftd-snort-bypass-rlggkzvf | Cisco Secure Firewall Threat Defense Software Snort Deep Inspection Bypass Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-ftd-dnd-dos-bpecg7b7 | Cisco Secure Firewall Threat Defense Software SSL Decryption Policy Denial of Service Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-ftd-cmd-inj-mtzgzexf | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Authenticated Command Injection Vulnerabilities | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-fmc-sql-injection-2qh6ccjd | Cisco Secure Firewall Management Center Software SQL Injection Vulnerabilities | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-fmc-rce-nkhnuljh | Cisco Secure Firewall Management Center Software Remote Code Execution Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asaftd-saml-lkttrwzp | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software SAML Reflected Cross-Site Scripting Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asaftd-ospf-zh8phbsw | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software OSPF Protocol Vulnerabilities | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asaftd-luainject-vescqgms | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software Lua Code Injection Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asaftd-ikev2-dos-ebuegdeg | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software IKEv2 Denial of Service Vulnerabilities | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asaftd-desync-n5avzeqw | Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense Software VPN Web Services Client-Side Request Smuggling Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-asa-ssh-keybypass-cr5xpusf | Cisco Secure Firewall Adaptive Security Appliance Software SSH Partial Private Key Authentication Bypass Vulnerability | 2026-03-04T16:00:00+00:00 | 2026-03-04T16:00:00+00:00 |
| cisco-sa-sdwan-rpa-ehchtzk | Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-03-03T00:38:56+00:00 |
| cisco-sa-sd-wan-priv-e6e8tedf | Cisco SD-WAN Software Privilege Escalation Vulnerabilities | 2022-09-28T16:00:00+00:00 | 2026-02-25T20:29:00+00:00 |
| cisco-sa-ucsm-cmdinj-gvxlpesb | Cisco UCS Manager Software Command Injection Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-ucsm-afwae-mogufyln | Cisco UCS Manager Software Privilege Escalation Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-ucsfxosxss-7skve8zv | Cisco FXOS and UCS Manager Software Stored Cross-Site Scripting Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-ucsciv-wgytc78q | Cisco FXOS and UCS Manager Software Command Injection Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-nxos-ether-dos-kv8ynwz4 | Cisco Nexus 3600 and 9500-R Series Switching Platforms Layer 2 Loop Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-nxos-dsnmp-cnn39uh | Cisco Nexus 9000 Series Fabric Switches in ACI Mode SNMP Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-nxos-cpdos-qlsv6pfd | Cisco Nexus 9000 Series Fabric Switches in ACI Mode Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-n3kn9k_aci_lldp_dos-ndgrrra3 | Cisco NX-OS Software Link Layer Discovery Protocol Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-apic-dos-rnus8efw | Cisco Application Policy Infrastructure Controller Denial of Service Vulnerability | 2026-02-25T16:00:00+00:00 | 2026-02-25T16:00:00+00:00 |
| cisco-sa-wsa-archive-bypass-scx2e8zf | Cisco Secure Web Appliance Real-Time Scanning Archive File Bypass Vulnerability | 2026-02-04T16:00:00+00:00 | 2026-02-20T21:08:47+00:00 |
| cisco-sa-voice-rce-morhqy4b | Cisco Unified Communications Products Remote Code Execution Vulnerability | 2026-01-21T16:00:00+00:00 | 2026-02-13T15:21:01+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sca-2026-0006 | Vulnerabilities affecting SICK Lector85x and SICK Lector83x | 2026-03-06T14:00:00.000Z | 2026-03-06T14:00:00.000Z |
| sca-2026-0005 | Vulnerabilities affecting SICK LMS1000 and SICK MRS1000 | 2026-02-27T14:00:00.000Z | 2026-02-27T14:00:00.000Z |
| sca-2026-0004 | Eclipse Cyclone DDS Vulnerabilities have no impact on SICK picoScan150 & SICK picoScan120 products | 2026-02-13T14:00:00.000Z | 2026-02-13T14:00:00.000Z |
| sca-2026-0003 | Vulnerability affecting SICK nanoScan3 and microScan3 | 2026-01-26T14:00:00.000Z | 2026-01-26T14:00:00.000Z |
| sca-2026-0002 | Vulnerabilities affecting SICK Incoming Goods Suite | 2026-01-15T14:00:00.000Z | 2026-01-22T19:00:00.000Z |
| sca-2026-0001 | Vulnerabilities affecting SICK TDC-X401GL | 2026-01-15T14:00:00.000Z | 2026-01-15T14:00:00.000Z |
| sca-2025-0013 | Vulnerabilities affecting SICK TLOC100-100 | 2025-10-27T14:00:00.000Z | 2025-11-11T14:00:00.000Z |
| sca-2025-0014 | CodeMeter vulnerablity affects SICK CODE-LOC and SICK LIDAR-LOC | 2025-11-03T11:00:00.000Z | 2025-11-03T14:00:00.000Z |
| sca-2025-0012 | Sudo vulnerability affects SICK SID products | 2025-10-27T11:00:00.000Z | 2025-10-27T14:00:00.000Z |
| sca-2025-0011 | Vulnerabilities affecting Endress+Hauser SSG-E210GC | 2025-10-02T13:00:00.000Z | 2025-10-02T13:00:00.000Z |
| sca-2025-0010 | Multiple vulnerabilities in SICK Enterprise Analytics and SICK Logistic Analytics Products | 2025-10-02T13:00:00.000Z | 2025-10-02T13:00:00.000Z |
| sca-2025-0009 | Vulnerabilities affecting SICK TDC-E210GC | 2025-08-01T13:00:00.000Z | 2025-08-01T13:00:00.000Z |
| sca-2025-0008 | Multiple vulnerabilities in Endress+Hauser MEAC300-FNADE4 | 2025-07-03T13:00:00.000Z | 2025-07-03T13:00:00.000Z |
| sca-2025-0007 | Multiple vulnerabilities in SICK Field Analytics and SICK Media Server | 2025-06-12T13:00:00.000Z | 2025-06-12T13:00:00.000Z |
| sca-2025-0003 | FreeRTOS Vulnerabilities have no impact on SICK Products | 2025-02-28T00:00:00.000Z | 2025-05-20T11:00:00.000Z |
| sca-2025-0006 | Vulnerability affecting picoScan and multiScan | 2025-04-28T13:00:00.000Z | 2025-04-28T13:00:00.000Z |
| sca-2025-0005 | Vulnerabilities in SICK Flexi Compact | 2025-04-28T10:00:00.000Z | 2025-04-28T10:00:00.000Z |
| sca-2025-0004 | Critical vulnerabilities in SICK DL100-2xxxxxxx | 2025-03-14T11:00:00.000Z | 2025-03-14T11:00:00.000Z |
| sca-2025-0001 | Multiple vulnerabilities in SICK MEAC300 | 2025-02-14T14:00:00.000Z | 2025-02-21T14:00:00.000Z |
| sca-2025-0002 | Vulnerability in SICK Lector8xx and SICK InspectorP8xx | 2025-02-14T10:19:00.000Z | 2025-02-14T10:19:00.000Z |
| sca-2024-0007 | Vulnerability in SICK OLM | 2024-12-31T00:00:00.000Z | 2024-12-31T00:00:00.000Z |
| sca-2024-0006 | Critical vulnerabilities in SICK InspectorP61x, InspectorP62x and TiM3xx | 2024-12-06T00:00:00.000Z | 2024-12-06T00:00:00.000Z |
| sca-2024-0005 | Vulnerability in SICK Incoming Goods Suite | 2024-11-19T00:00:00.000Z | 2024-11-19T00:00:00.000Z |
| sca-2024-0004 | Third party vulnerabilities in SICK CDE-100 | 2024-11-07T12:00:00.000Z | 2024-11-07T12:00:00.000Z |
| sca-2024-0003 | Critical vulnerability in multiple SICK products | 2024-10-17T13:00:00.000Z | 2024-10-17T13:00:00.000Z |
| sca-2024-0002 | Vulnerability in SICK MSC800 | 2024-09-11T23:00:00.000Z | 2024-09-11T23:00:00.000Z |
| sca-2024-0001 | Vulnerability in SICK Logistics Analytics Products and SICK Field Analytics | 2024-01-29T00:00:00.000Z | 2024-01-29T00:00:00.000Z |
| sca-2023-0011 | Vulnerability in multiple SICK Flexi Soft Gateways | 2023-10-23T11:00:00.000Z | 2023-10-23T11:00:00.000Z |
| SCA-2023-0011 | Vulnerability in multiple SICK Flexi Soft Gateways | 2023-10-23T11:00:00.000Z | 2023-10-23T11:00:00.000Z |
| sca-2023-0010 | Vulnerabilities in SICK Application Processing Unit | 2023-10-09T11:00:00.000Z | 2023-10-09T11:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| nn-2025:18-01 | Lack of TLS certificate validation when connecting Arc to a Guardian or CMC, in Arc before v2.2.0 | 2026-03-04T11:00:00.000Z | 2026-03-04T11:00:00.000Z |
| nn-2025:17-01 | HTML injection in Sensor Map in CMC before 25.6.0 | 2026-03-04T11:00:00.000Z | 2026-03-04T11:00:00.000Z |
| nn-2025:16-01 | HTML injection in Alerted Nodes Dashboard in Guardian/CMC before 25.6.0 | 2026-03-04T11:00:00.000Z | 2026-03-04T11:00:00.000Z |
| nn-2025:15-01 | Path traversal in Import Arc data archive functionality in Guardian/CMC before 25.5.0 | 2025-12-18T11:00:00.000Z | 2025-12-18T11:00:00.000Z |
| nn-2025:14-01 | HTML injection in Asset List in Guardian/CMC before 25.5.0 | 2025-12-18T11:00:00.000Z | 2025-12-18T11:00:00.000Z |
| nn-2025:13-01 | Stored Cross-Site Scripting (XSS) in Reports in Guardian/CMC before 25.5.0 | 2025-12-18T11:00:00.000Z | 2025-12-18T11:00:00.000Z |
| nn-2025:12-01 | HTML injection in in Time Machine functionality in Guardian/CMC before 25.5.0 | 2025-12-18T11:00:00.000Z | 2025-12-18T11:00:00.000Z |
| nn-2025:11-01 | Stored Cross-Site Scripting (XSS) in Dashboards in Guardian/CMC before 25.4.0 | 2025-11-25T11:00:00.000Z | 2025-11-26T11:00:00.000Z |
| nn-2025:9-01 | Path traversal in Time Machine functionality in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:8-01 | Authenticated SQL Injection on Alert functionality in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:7-01 | Authenticated SQL Injection on Alert functionality in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:6-01 | Authenticated SQL Injection on Smart Polling functionality in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:5-01 | Incorrect authorization for CLI in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:4-01 | Client-side path traversal in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:10-01 | Authenticated SQL Injection on CLI functionality in Guardian/CMC before 25.3.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:3-01 | Incorrect authorization for traces request/download in CMC before 25.1.0 | 2025-08-26T11:00:00.000Z | 2025-08-26T11:00:00.000Z |
| nn-2025:2-01 | Privilege escalation in Guardian/CMC before 24.6.0 | 2025-06-10T11:00:00.000Z | 2025-06-10T11:00:00.000Z |
| nn-2025:1-01 | Authenticated RCE in update functionality in Guardian/CMC before 24.6.0 | 2025-06-10T11:00:00.000Z | 2025-06-10T11:00:00.000Z |
| nn-2023_17-01 | Information disclosure via audit records for OpenAPI requests in Guardian/CMC before 23.4.1 | 2024-04-10T11:00:00.000Z | 2024-04-11T11:00:00.000Z |
| nn-2023:17-01 | Information disclosure via audit records for OpenAPI requests in Guardian/CMC before 23.4.1 | 2024-04-10T11:00:00.000Z | 2024-04-11T11:00:00.000Z |
| nn-2024_1-01 | DoS on IDS parsing of malformed Radius packets in Guardian before 23.4.1 | 2024-04-10T11:00:00.000Z | 2024-04-10T11:00:00.000Z |
| nn-2024:1-01 | DoS on IDS parsing of malformed Radius packets in Guardian before 23.4.1 | 2024-04-10T11:00:00.000Z | 2024-04-10T11:00:00.000Z |
| nn-2023_12-01 | Check Point IoT integration: WebSocket returns assets data without authentication in Guardian/CMC before 23.3.0 | 2024-01-15T11:00:00.000Z | 2024-01-16T11:00:00.000Z |
| nn-2023:12-01 | Check Point IoT integration: WebSocket returns assets data without authentication in Guardian/CMC before 23.3.0 | 2024-01-15T11:00:00.000Z | 2024-01-16T11:00:00.000Z |
| nn-2023_9-01 | Authenticated SQL Injection on Query functionality in Guardian/CMC before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_8-01 | Session Fixation in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_7-01 | DoS via SAML configuration in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_6-01 | Partial DoS on Reports section due to null report name in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_5-01 | Information disclosure via the debug function in assertions in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| nn-2023_4-01 | Stored Cross-Site Scripting (XSS) in Threat Intelligence rules in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2023-11-16T11:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| oxdc-adv-2025-0001 | OX Dovecot Pro Security Advisory OXDC-ADV-2025-0001 | 2025-10-31T00:00:00+00:00 | 2025-11-27T00:00:00+00:00 |
| oxas-adv-2025-0003 | OX App Suite Security Advisory OXAS-ADV-2025-0003 | 2025-09-24T00:00:00+02:00 | 2025-11-27T00:00:00+00:00 |
| oxas-adv-2025-0002 | OX App Suite Security Advisory OXAS-ADV-2025-0002 | 2025-08-12T00:00:00+02:00 | 2025-10-31T00:00:00+00:00 |
| oxas-adv-2025-0001 | OX App Suite Security Advisory OXAS-ADV-2025-0001 | 2025-01-27T00:00:00+01:00 | 2025-04-07T00:00:00+00:00 |
| oxdc-adv-2024-0003 | OX Dovecot Pro Security Advisory OXDC-ADV-2024-0003 | 2024-09-10T00:00:00+02:00 | 2024-09-10T00:00:00+00:00 |
| oxdc-adv-2024-0002 | OX Dovecot Pro Security Advisory OXDC-ADV-2024-0002 | 2024-09-10T00:00:00+02:00 | 2024-09-10T00:00:00+00:00 |
| oxas-adv-2024-0005 | OX App Suite Security Advisory OXAS-ADV-2024-0005 | 2024-07-08T00:00:00+02:00 | 2024-09-09T00:00:00+00:00 |
| oxdc-adv-2024-0001 | OX Dovecot Pro Security Advisory OXDC-ADV-2024-0001 | 2024-09-02T00:00:00+02:00 | 2024-09-06T00:00:00+00:00 |
| oxas-adv-2024-0004 | OX App Suite Security Advisory OXAS-ADV-2024-0004 | 2024-06-13T00:00:00+02:00 | 2024-08-19T00:00:00+00:00 |
| oxas-adv-2024-0003 | OX App Suite Security Advisory OXAS-ADV-2024-0003 | 2024-04-24T00:00:00+02:00 | 2024-08-19T00:00:00+00:00 |
| oxas-adv-2024-0002 | OX App Suite Security Advisory OXAS-ADV-2024-0002 | 2024-03-06T00:00:00+01:00 | 2024-05-06T00:00:00+00:00 |
| oxas-adv-2024-0001 | OX App Suite Security Advisory OXAS-ADV-2024-0001 | 2024-02-08T00:00:00+01:00 | 2024-04-25T00:00:00+00:00 |
| oxas-adv-2023-0007 | OX App Suite Security Advisory OXAS-ADV-2023-0007 | 2023-12-11T00:00:00+01:00 | 2024-02-16T00:00:00+00:00 |
| oxas-adv-2023-0006 | OX App Suite Security Advisory OXAS-ADV-2023-0006 | 2023-09-25T00:00:00+02:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2023-0005 | OX App Suite Security Advisory OXAS-ADV-2023-0005 | 2023-09-19T00:00:00+02:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2023-0004 | OX App Suite Security Advisory OXAS-ADV-2023-0004 | 2023-08-01T00:00:00+02:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2023-0003 | OX App Suite Security Advisory OXAS-ADV-2023-0003 | 2023-05-02T00:00:00+02:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2023-0002 | OX App Suite Security Advisory OXAS-ADV-2023-0002 | 2023-03-20T00:00:00+01:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2023-0001 | OX App Suite Security Advisory OXAS-ADV-2023-0001 | 2023-02-06T00:00:00+01:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2022-0002 | OX App Suite Security Advisory OXAS-ADV-2022-0002 | 2022-11-02T00:00:00+01:00 | 2024-01-22T00:00:00+00:00 |
| oxas-adv-2022-0001 | OX App Suite Security Advisory OXAS-ADV-2022-0001 | 2022-08-10T00:00:00+02:00 | 2024-01-22T00:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2026-22701 | filelock Time-of-Check-Time-of-Use (TOCTOU) Symlink Vulnerability in SoftFileLock | 2026-01-02T00:00:00.000Z | 2026-03-07T01:01:21.000Z |
| msrc_cve-2025-68146 | filelock has TOCTOU race condition that allows symlink attacks during lock file creation | 2025-12-02T00:00:00.000Z | 2026-03-07T01:01:15.000Z |
| msrc_cve-2026-26124 | Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability | 2026-03-05T08:00:00.000Z | 2026-03-06T08:00:00.000Z |
| msrc_cve-2026-26122 | Microsoft ACI Confidential Containers Information Disclosure Vulnerability | 2026-03-05T08:00:00.000Z | 2026-03-06T08:00:00.000Z |
| msrc_cve-2026-23651 | Microsoft ACI Confidential Containers Elevation of Privilege Vulnerability | 2026-03-05T08:00:00.000Z | 2026-03-06T08:00:00.000Z |
| msrc_cve-2026-23865 | An integer overflow in the tt_var_load_item_variation_store function of the Freetype library in versions 2.13.2 and 2.13.3 may allow for an out of bounds read operation when parsing HVAR/VVAR/MVAR tables in OpenType variable fonts. This issue is fixed in version 2.14.2. | 2026-03-02T00:00:00.000Z | 2026-03-06T01:38:26.000Z |
| msrc_cve-2026-3336 | PKCS7_verify Certificate Chain Validation Bypass in AWS-LC | 2026-03-02T00:00:00.000Z | 2026-03-06T01:38:19.000Z |
| msrc_cve-2026-3338 | PKCS7_verify Signature Validation Bypass in AWS-LC | 2026-03-02T00:00:00.000Z | 2026-03-06T01:38:11.000Z |
| msrc_cve-2026-24821 | A heap-based buffer over-read that might affect a system that compiles untrusted Lua code in turanszkij/WickedEngine. | 2026-01-02T00:00:00.000Z | 2026-03-06T01:38:03.000Z |
| msrc_cve-2026-23238 | romfs: check sb_set_blocksize() return value | 2026-03-02T00:00:00.000Z | 2026-03-06T01:37:52.000Z |
| msrc_cve-2026-23237 | platform/x86: classmate-laptop: Add missing NULL pointer checks | 2026-03-02T00:00:00.000Z | 2026-03-06T01:37:47.000Z |
| msrc_cve-2026-23235 | f2fs: fix out-of-bounds access in sysfs attribute read/write | 2026-03-02T00:00:00.000Z | 2026-03-06T01:37:42.000Z |
| msrc_cve-2026-23234 | f2fs: fix to avoid UAF in f2fs_write_end_io() | 2026-03-02T00:00:00.000Z | 2026-03-06T01:37:37.000Z |
| msrc_cve-2026-26125 | Payment Orchestrator Service Elevation of Privilege Vulnerability | 2026-03-05T08:00:00.000Z | 2026-03-05T08:00:00.000Z |
| msrc_cve-2026-21536 | Microsoft Devices Pricing Program Remote Code Execution Vulnerability | 2026-03-05T08:00:00.000Z | 2026-03-05T08:00:00.000Z |
| msrc_cve-2024-42317 | mm/huge_memory: avoid PMD-size page cache if needed | 2024-08-02T00:00:00.000Z | 2026-03-05T01:42:00.000Z |
| msrc_cve-2024-24856 | NULL pointer deference in acpi_db_convert_to_package of Linux acpi module | 2024-04-02T07:00:00.000Z | 2026-03-05T01:41:50.000Z |
| msrc_cve-2025-37745 | PM: hibernate: Avoid deadlock in hibernate_compressor_param_set() | 2025-05-02T00:00:00.000Z | 2026-03-05T01:41:34.000Z |
| msrc_cve-2025-21985 | drm/amd/display: Fix out-of-bound accesses | 2025-04-02T00:00:00.000Z | 2026-03-05T01:41:14.000Z |
| msrc_cve-2024-57875 | block: RCU protect disk->conv_zones_bitmap | 2025-01-02T00:00:00.000Z | 2026-03-05T01:41:01.000Z |
| msrc_cve-2024-46754 | bpf: Remove tst_run from lwt_seg6local_prog_ops. | 2024-09-01T07:00:00.000Z | 2026-03-05T01:40:37.000Z |
| msrc_cve-2024-53219 | virtiofs: use pages instead of pointer for kernel direct IO | 2024-12-02T00:00:00.000Z | 2026-03-05T01:40:05.000Z |
| msrc_cve-2025-38656 | wifi: iwlwifi: Fix error code in iwl_op_mode_dvm_start() | 2025-08-02T00:00:00.000Z | 2026-03-05T01:36:24.000Z |
| msrc_cve-2022-4543 | A flaw named "EntryBleed" was found in the Linux Kernel Page Table Isolation (KPTI). This issue could allow a local attacker to leak KASLR base via prefetch side-channels based on TLB timing for Intel systems. | 2023-01-04T00:00:00.000Z | 2026-03-05T01:35:59.000Z |
| msrc_cve-2025-68121 | Unexpected session resumption in crypto/tls | 2026-02-02T00:00:00.000Z | 2026-03-05T01:09:17.000Z |
| msrc_cve-2026-0038 | In multiple functions of mem_protect.c, there is a possible way to execute arbitrary code due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | 2026-03-02T00:00:00.000Z | 2026-03-05T01:09:10.000Z |
| msrc_cve-2026-27141 | Sending certain HTTP/2 frames can cause a server to panic in golang.org/x/net | 2026-02-02T00:00:00.000Z | 2026-03-05T01:08:22.000Z |
| msrc_cve-2026-23231 | netfilter: nf_tables: fix use-after-free in nf_tables_addchain() | 2026-03-02T00:00:00.000Z | 2026-03-05T01:04:52.000Z |
| msrc_cve-2025-71238 | scsi: qla2xxx: Fix bsg_done() causing double free | 2026-03-02T00:00:00.000Z | 2026-03-05T01:04:46.000Z |
| msrc_cve-2026-23236 | fbdev: smscufx: properly copy ioctl memory to kernelspace | 2026-03-02T00:00:00.000Z | 2026-03-05T01:04:17.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| 3adr011525 | ABB Automation Builder Gateway for Windows with insecure defaults | 2026-02-24T00:30:00.000Z | 2026-02-24T00:30:00.000Z |
| 3adr011524 | AC500 V3 Multiple vulnerabilities | 2026-02-24T00:30:00.000Z | 2026-02-24T00:30:00.000Z |
| sa25p007 | B&R Automation Studio Update of SQLite version | 2026-02-18T00:30:00.000Z | 2026-02-18T00:30:00.000Z |
| sa26p001 | PVI Insertion of Sensitive Information into Logfile | 2026-01-29T00:30:00.000Z | 2026-01-29T00:30:00.000Z |
| sa24p003 | B&R PCs vulnerable to PixieFail attack | 2026-01-29T00:30:00.000Z | 2026-01-29T00:30:00.000Z |
| 7paa013309 | System 800xA SECURITY Advisory - ABB 800xA Base 6.0.x, 6.1.x CSLib communication DoS vulnerability | 2024-06-05T00:30:00.000Z | 2026-01-23T00:30:00.000Z |
| sa25p005 | B&R Automation Runtime Improper Handling of Flooding conditions on ANSL Server | 2026-01-19T00:30:00.000Z | 2026-01-19T00:30:00.000Z |
| sa25p004 | Automation Studio Insufficient Server Certificate Validation | 2026-01-19T00:30:00.000Z | 2026-01-19T00:30:00.000Z |
| 9akk108472a1331 | ABB Ability™ OPTIMAX® Authentication Bypass in Single-Sign On with Azure Active Directory | 2026-01-16T00:30:00.000Z | 2026-01-16T00:30:00.000Z |
| 2crt000009 | WebPro SNMP Card PowerValue Multiple Vulnerabilities | 2026-01-07T00:30:00.000Z | 2026-01-07T00:30:00.000Z |
| 9akk108471a8107 | Terra AC wallbox Heap Memory Corruption Vulnerability | 2025-09-16T00:30:00.000Z | 2025-11-28T08:00:00.000Z |
| 4hzm000603 | ABB Ability Camera Connect Vulnerabilities in outdated 3rd party component (VLC) | 2025-11-27T00:30:00.000Z | 2025-11-28T00:30:00.000Z |
| 7paa022088 | Edgenius Management Portal Authentication Bypass | 2025-11-20T00:30:00.000Z | 2025-11-20T00:30:00.000Z |
| 2nga002813 | PCM600 SharpZip library vulnerability | 2025-11-03T00:30:00.000Z | 2025-11-03T00:30:00.000Z |
| 4tz00000006007 | ALS-mini-S4/S8 IP Missing Authentication Vulnerability and its Mitigations | 2025-10-20T00:30:00.000Z | 2025-10-23T00:30:00.000Z |
| 9akk108471a8948 | Terra AC wallbox Heap Memory Corruption Vulnerability | 2025-10-20T00:30:00.000Z | 2025-10-21T00:30:00.000Z |
| 3kxg200000r4801 | CoreSense™ HM and CoreSense™ M10 File Path Traversal Vulnerability | 2025-04-16T00:30:00.000Z | 2025-10-20T00:30:00.000Z |
| sa25p003 | B&R Automation Runtime Vulnerabilities in System Diagnostic Manager (SDM) | 2025-10-07T00:30:00.000Z | 2025-10-14T00:30:00.000Z |
| 4tz00000006008 | LVS MConfig Insecure memory handling | 2025-10-08T00:30:00.000Z | 2025-10-08T00:30:00.000Z |
| sa25p002 | B&R Automation Runtime DoS Vulnerability in System Diagnostics Manager (SDM) | 2025-10-07T00:30:00.000Z | 2025-10-07T00:30:00.000Z |
| 9akk108471a7808 | EIBPORT Reflected XSS | 2025-10-07T00:30:00.000Z | 2025-10-07T00:30:00.000Z |
| 9akk108471a7121 | FLXeon Controllers Multiple vulnerabilities | 2025-09-09T00:30:00.000Z | 2025-09-18T00:30:00.000Z |
| 9akk108471a4462 | ELSB/BLBA ASPECT advisory several CVEs | 2025-08-11T00:30:00.000Z | 2025-09-04T00:30:00.000Z |
| 9akk108471a3623 | RMC - 100 Vulnerabilities in web UI (REST Interface) | 2025-07-03T00:30:00.000Z | 2025-08-18T00:30:00.000Z |
| 2nga002743 | ABB AbilityTM zenon Remote Transport Vulnerability | 2025-08-12T00:30:00.000Z | 2025-08-12T00:30:00.000Z |
| 3adr011407 | ABB Automation Builder Vulnerabilities in user management and access control | 2025-04-30T00:00:00.000Z | 2025-07-25T00:00:00.000Z |
| 3adr011432 | AC500 V2 Buffer overread on Modbus protocol | 2025-07-23T00:30:00.000Z | 2025-07-23T00:30:00.000Z |
| 9akk108471a4556 | Busch-Welcome® 2 wire Door opener actuator by default in compatibility mode. | 2025-07-21T00:30:00.000Z | 2025-07-21T00:30:00.000Z |
| 2crt000008 | Lite Panel Pro Vulnerability in Session Management | 2025-06-26T00:30:00.000Z | 2025-06-26T00:30:00.000Z |
| 9akk108470a8948 | ELSB/Home Solutions Outdated SW Components in ABB Welcome IP-Gateway. | 2025-05-29T00:30:00.000Z | 2025-06-05T00:30:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2026:10288-1 | libblkid-devel-2.41.3-4.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10287-1 | sdbootutil-1+git20260303.90d816d-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10286-1 | ruby4.0-rubygem-rack-2.2-2.2.22-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10285-1 | python311-pillow-heif-1.3.0-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10284-1 | python311-PyPDF2-2.11.1-5.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10283-1 | python313-Django6-6.0.3-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10282-1 | python311-Django4-4.2.29-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10281-1 | mchange-commons-0.4.0-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10280-1 | incus-6.22-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10279-1 | c3p0-0.12.0-1.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10278-1 | ImageMagick-7.1.2.15-2.1 on GA media | 2026-03-04T00:00:00Z | 2026-03-04T00:00:00Z |
| opensuse-su-2026:10276-1 | libsoup-3_0-0-3.6.6-2.1 on GA media | 2026-03-01T00:00:00Z | 2026-03-01T00:00:00Z |
| opensuse-su-2026:10275-1 | gvfs-1.58.2-1.1 on GA media | 2026-03-01T00:00:00Z | 2026-03-01T00:00:00Z |
| opensuse-su-2026:20273-1 | Security update for 7zip | 2026-02-26T11:53:30Z | 2026-02-26T11:53:30Z |
| opensuse-su-2026:20277-1 | Security update for chromium | 2026-02-26T11:50:46Z | 2026-02-26T11:50:46Z |
| opensuse-su-2026:20271-1 | Security update for python-urllib3_1 | 2026-02-26T09:45:23Z | 2026-02-26T09:45:23Z |
| opensuse-su-2026:20270-1 | Security update for autogen | 2026-02-26T09:10:10Z | 2026-02-26T09:10:10Z |
| opensuse-su-2026:10266-1 | valkey-9.0.3-1.1 on GA media | 2026-02-26T00:00:00Z | 2026-02-26T00:00:00Z |
| opensuse-su-2026:10265-1 | qemu-10.2.1-1.1 on GA media | 2026-02-26T00:00:00Z | 2026-02-26T00:00:00Z |
| opensuse-su-2026:10264-1 | python311-Flask-3.1.3-1.1 on GA media | 2026-02-26T00:00:00Z | 2026-02-26T00:00:00Z |
| opensuse-su-2026:10263-1 | heroic-games-launcher-2.20.0-2.1 on GA media | 2026-02-26T00:00:00Z | 2026-02-26T00:00:00Z |
| opensuse-su-2026:10262-1 | evolution-data-server-3.58.3-2.1 on GA media | 2026-02-26T00:00:00Z | 2026-02-26T00:00:00Z |
| opensuse-su-2026:10261-1 | docker-29.2.1_ce-37.1 on GA media | 2026-02-26T00:00:00Z | 2026-02-26T00:00:00Z |
| opensuse-su-2026:10260-1 | digger-cli-0.6.143-1.1 on GA media | 2026-02-26T00:00:00Z | 2026-02-26T00:00:00Z |
| opensuse-su-2026:10259-1 | chromedriver-145.0.7632.116-1.1 on GA media | 2026-02-26T00:00:00Z | 2026-02-26T00:00:00Z |
| opensuse-su-2026:10258-1 | busybox-1.37.0-10.1 on GA media | 2026-02-26T00:00:00Z | 2026-02-26T00:00:00Z |
| opensuse-su-2026:10257-1 | MozillaFirefox-148.0-1.1 on GA media | 2026-02-26T00:00:00Z | 2026-02-26T00:00:00Z |
| opensuse-su-2026:10247-1 | python311-Django4-4.2.28-1.1 on GA media | 2026-02-24T00:00:00Z | 2026-02-24T00:00:00Z |
| opensuse-su-2026:10246-1 | libsoup-2_4-1-2.74.3-17.1 on GA media | 2026-02-24T00:00:00Z | 2026-02-24T00:00:00Z |
| opensuse-su-2026:10245-1 | libsoup-3_0-0-3.6.6-1.1 on GA media | 2026-02-24T00:00:00Z | 2026-02-24T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2026-041-02 | Multiple Vulnerabilities on EcoStruxure™ Building Operation Workstation and EcoStruxure™ Building Operation Webstation | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| sevd-2026-041-01 | Improper Check for Unusual or Exceptional Conditions on Multiple Products | 2026-02-10T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| sevd-2025-343-01 | EcoStruxure™ Foxboro DCS | 2025-12-09T08:00:00.000Z | 2026-02-10T08:00:00.000Z |
| sevd-2025-189-03 | EcoStruxure™ Power Operation | 2025-07-08T04:00:00.000Z | 2026-02-10T08:00:00.000Z |
| sevd-2025-042-02 | Improper Input Validation Vulnerability in Uni-Telway Driver | 2025-02-11T05:00:00.000Z | 2026-02-10T08:00:00.000Z |
| sevd-2026-013-04 | Multiple Vulnerabilities on EcoStruxure Power Build Rapsody | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| sevd-2026-013-03 | Multiple Vulnerabilities on Zigbee Products | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| sevd-2026-013-02 | Incorrect Default Permissions Vulnerability on EcoStruxure™ Process Expert | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| sevd-2026-013-01 | Multiple Third-Party Vulnerabilities on ProLeiT Plant iT/Brewmaxx | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| sevd-2025-014-06 | RemoteConnect and SCADAPack™ x70 Utilities | 2025-01-14T00:00:00.000Z | 2026-01-13T08:00:00.000Z |
| sevd-2024-317-03 | Modicon Controllers M340 / Momentum / MC80 | 2024-11-12T05:00:00.000Z | 2026-01-13T08:00:00.000Z |
| sevd-2025-343-02 | EcoStruxure™ Foxboro DCS Advisor | 2025-12-09T08:00:00.000Z | 2025-12-09T08:00:00.000Z |
| sevd-2025-252-01 | Multiple Altivar Process Drives and Communication Modules | 2025-09-09T04:00:00.000Z | 2025-12-09T08:00:00.000Z |
| sevd-2023-192-04 | CODESYS Runtime Vulnerabilities | 2023-07-11T07:15:18.000Z | 2025-12-09T08:00:00.000Z |
| sevd-2021-159-04 | ISaGRAF Vulnerabilities in IEC 61131-3 Programming and Engineering Tools | 2021-06-08T04:36:25.000Z | 2025-11-15T00:00:00.000Z |
| sevd-2022-284-03 | ISaGRAF Workbench for SAGE RTU | 2022-10-10T22:13:16.000Z | 2025-11-14T06:30:00.000Z |
| sevd-2025-315-02 | EcoStruxure™ Machine SCADA Expert & Pro-face BLUE Open Studio | 2025-11-11T08:00:00.000Z | 2025-11-11T08:00:00.000Z |
| sevd-2025-315-01 | PowerChute™ Serial Shutdown | 2025-11-11T08:00:00.000Z | 2025-11-11T08:00:00.000Z |
| sevd-2025-224-02 | EcoStruxure™ Power Monitoring Expert Software & EcoStruxure™ Power Operation (EPO) and EcoStruxure™ Power SCADA Operation (PSO) | 2025-08-12T04:00:00.000Z | 2025-11-11T08:00:00.000Z |
| sevd-2025-224-01 | Saitel DR & Saitel DP Remote Terminal Unit | 2025-08-12T04:00:00.000Z | 2025-11-11T08:00:00.000Z |
| sevd-2025-014-07 | FlexNet Publisher Vulnerability | 2025-01-14T07:00:00.000Z | 2025-11-11T08:00:00.000Z |
| sevd-2025-287-01 | EcoStruxure™ OPC UA Server Expert and EcoStruxure™ Modicon Communication Server | 2025-10-14T07:00:00.000Z | 2025-10-14T07:00:00.000Z |
| sevd-2025-133-01 | Modicon Controllers M241/M251/M258/LMC058 | 2025-05-13T04:00:00.000Z | 2025-10-14T07:00:00.000Z |
| sevd-2024-345-03 | Modicon M241 / M251 / M258 / LMC058 | 2024-12-10T05:00:00.000Z | 2025-10-14T07:00:00.000Z |
| sevd-2024-191-04 | Modicon Controllers M241/ M251, M258 / LMC058 and M262 | 2024-07-09T00:00:00.000Z | 2025-10-14T07:00:00.000Z |
| sevd-2025-133-05 | Galaxy VS, Galaxy VL, Galaxy VXL | 2025-05-13T04:00:00.000Z | 2025-09-24T04:00:00.000Z |
| sevd-2025-252-02 | Saitel DR & Saitel DP Remote Terminal Unit | 2025-09-09T04:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2025-224-04 | EcoStruxure™ Building Operation Enterprise Server, EcoStruxure™ Building Operation Enterprise Central, and EcoStruxure™ Workstation | 2025-08-12T04:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2025-224-03 | Schneider Electric Software Update | 2025-08-12T04:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2025-014-02 | Pro-face GP-Pro EX and Remote HMI | 2025-01-14T00:00:00.000Z | 2025-09-09T04:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2024-838 | Bad-cast to RDKit::AtomRDKit::ROMol::initFromOther | 2024-08-16T00:03:32.029853Z | 2026-03-07T14:34:10.603763Z |
| osv-2025-62 | UNKNOWN READ in RDKit::Dict::reset | 2025-01-27T00:01:51.692636Z | 2026-03-06T14:31:24.229549Z |
| osv-2023-133 | Heap-buffer-overflow in H5L__extern_traverse | 2023-03-02T13:02:08.499899Z | 2026-03-05T15:50:03.549911Z |
| osv-2023-359 | Heap-buffer-overflow in H5MM_memcpy | 2023-05-01T14:02:33.841821Z | 2026-03-05T15:30:27.737619Z |
| osv-2023-76 | Heap-buffer-overflow in H5SM_delete | 2023-02-18T13:00:50.471845Z | 2026-03-05T15:16:28.198333Z |
| osv-2023-89 | Heap-buffer-overflow in H5O__mtime_new_encode | 2023-02-21T13:00:30.347876Z | 2026-03-05T14:51:38.032364Z |
| osv-2023-430 | Heap-buffer-overflow in H5MM_xstrdup | 2023-05-26T14:00:26.078002Z | 2026-03-05T14:50:31.048848Z |
| osv-2023-392 | Negative-size-param in H5MM_memcpy | 2023-05-13T14:00:26.093088Z | 2026-03-05T14:50:14.844074Z |
| osv-2023-370 | Heap-buffer-overflow in H5FS__sect_link | 2023-05-06T14:01:04.165113Z | 2026-03-05T14:50:11.421136Z |
| osv-2023-381 | UNKNOWN READ in H5FL__blk_gc_list | 2023-05-08T14:02:04.934252Z | 2026-03-05T14:49:56.592245Z |
| osv-2023-216 | Heap-buffer-overflow in H5G__node_cmp3 | 2023-03-23T13:00:48.081705Z | 2026-03-05T14:49:35.416808Z |
| osv-2024-387 | Heap-buffer-overflow in H5F_addr_encode | 2024-04-30T00:13:39.184262Z | 2026-03-05T14:41:50.404940Z |
| osv-2024-728 | Negative-size-param in pdf_resize_resource_arrays | 2024-08-08T00:09:33.935595Z | 2026-03-05T14:38:34.171834Z |
| osv-2025-266 | Heap-buffer-overflow in lj_buf_ruleb128 | 2025-04-08T00:17:06.279554Z | 2026-03-05T14:36:27.176471Z |
| osv-2024-719 | Heap-buffer-overflow in hevc_ref_pic_lists_modification | 2024-08-07T00:05:22.699506Z | 2026-03-05T14:35:24.195250Z |
| osv-2023-34 | Heap-use-after-free in gc_trace | 2023-01-29T13:00:17.773387Z | 2026-03-05T14:33:25.047298Z |
| osv-2022-73 | Heap-use-after-free in pdfi_cspace_free_callback | 2022-01-22T00:00:41.413569Z | 2026-03-05T14:32:30.429302Z |
| osv-2024-677 | Segv on unknown address in gs_gc_reclaim | 2024-07-25T00:06:43.762625Z | 2026-03-05T14:30:40.209744Z |
| osv-2022-524 | Heap-buffer-overflow in Ins_JROF | 2022-07-01T00:01:43.353257Z | 2026-03-05T14:30:32.759280Z |
| osv-2022-94 | Heap-buffer-overflow in cli_strlcat | 2022-01-27T00:02:12.465969Z | 2026-03-05T14:29:46.831320Z |
| osv-2022-636 | UNKNOWN READ in fp_cmp_mag | 2022-07-27T00:00:35.300337Z | 2026-03-05T14:28:12.890689Z |
| osv-2022-1068 | UNKNOWN READ in fp_cmp_mag | 2022-10-21T00:00:11.246872Z | 2026-03-05T14:25:24.236211Z |
| osv-2022-679 | Heap-buffer-overflow in udiv | 2022-08-07T00:01:59.645310Z | 2026-03-05T14:24:38.333724Z |
| osv-2022-652 | Use-of-uninitialized-value in udiv | 2022-07-29T00:02:04.321859Z | 2026-03-05T14:24:30.691213Z |
| osv-2022-599 | Use-of-uninitialized-value in mrb_bint_as_int | 2022-07-20T00:00:11.865502Z | 2026-03-05T14:24:14.565093Z |
| osv-2024-664 | Heap-buffer-overflow in gf_dash_group_get_template | 2024-07-18T00:13:55.576218Z | 2026-03-04T14:23:21.913306Z |
| osv-2024-659 | Index-out-of-bounds in gf_vvc_parse_nalu_bs | 2024-07-18T00:01:18.765548Z | 2026-03-04T14:23:09.585855Z |
| osv-2024-695 | Stack-buffer-overflow in gf_vvc_parse_nalu_bs | 2024-07-31T00:02:35.217594Z | 2026-03-04T14:22:49.364730Z |
| osv-2024-698 | Heap-use-after-free in xmlCharEncCloseFunc | 2024-07-31T00:12:19.254629Z | 2026-03-04T14:22:14.763970Z |
| osv-2023-1350 | Heap-buffer-overflow in inflate | 2023-12-23T00:12:38.562149Z | 2026-03-04T14:13:52.120050Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2026-0036 | `time-sync` was removed from crates.io due to malicious code | 2026-03-04T12:00:00Z | 2026-03-06T06:03:13Z |
| rustsec-2026-0035 | Cache poisoning via insecure-by-default cache key | 2026-03-04T12:00:00Z | 2026-03-06T06:03:13Z |
| rustsec-2026-0034 | HTTP Request Smuggling via HTTP/1.0 and Transfer-Encoding Misparsing | 2026-03-04T12:00:00Z | 2026-03-06T06:03:13Z |
| rustsec-2026-0033 | HTTP Request Smuggling via Premature Upgrade | 2026-03-04T12:00:00Z | 2026-03-06T06:03:13Z |
| rustsec-2026-0032 | `dnp3times` was removed from crates.io due to malicious code | 2026-03-04T12:00:00Z | 2026-03-05T05:53:11Z |
| rustsec-2026-0031 | `time_calibrators` was removed from crates.io due to malicious code | 2026-03-03T12:00:00Z | 2026-03-05T05:53:11Z |
| rustsec-2026-0030 | `time_calibrator` was removed from crates.io due to malicious code | 2026-03-03T12:00:00Z | 2026-03-05T05:53:11Z |
| rustsec-2026-0019 | `tracing-check` was removed from crates.io for malicious code | 2026-02-24T12:00:00Z | 2026-03-05T05:53:11Z |
| rustsec-2025-0140 | Non-utf8 String can be created with `TimeBuf::as_str` | 2025-12-29T12:00:00Z | 2026-03-04T07:42:48Z |
| rustsec-2026-0029 | Double-free and use-after-free for Hive | 2026-02-26T12:00:00Z | 2026-03-01T06:01:36Z |
| rustsec-2026-0028 | `tracing_checks` was removed from crates.io for transitively including malicious code | 2026-02-26T12:00:00Z | 2026-02-26T21:11:05Z |
| rustsec-2026-0027 | `tracings` was removed from crates.io for malicious code | 2026-02-26T12:00:00Z | 2026-02-26T21:11:05Z |
| rustsec-2025-0153 | hexchat crate is unsound and unmaintained | 2025-11-17T12:00:00Z | 2026-02-26T06:11:28Z |
| rustsec-2026-0026 | Unnecessary clamping of seed reduces seed entropy to 251 bits | 2026-02-05T12:00:00Z | 2026-02-25T17:22:43Z |
| rustsec-2026-0025 | Panic in `libcrux-psq` on decryption of malformed AES-GCM ciphertext | 2026-02-08T12:00:00Z | 2026-02-25T17:22:43Z |
| rustsec-2026-0024 | Incorrect X25519 clamping check rejects all secrets on import | 2026-01-26T12:00:00Z | 2026-02-25T17:22:43Z |
| rustsec-2026-0023 | X25519 secret validation did not check buffer length or clamping | 2026-01-26T12:00:00Z | 2026-02-25T17:22:43Z |
| rustsec-2026-0022 | Panic when dropping a `[Typed]Func::call_async` future | 2026-02-24T12:00:00Z | 2026-02-24T19:42:18Z |
| rustsec-2026-0021 | Panic adding excessive fields to a `wasi:http/types.fields` instance | 2026-02-24T12:00:00Z | 2026-02-24T19:42:18Z |
| rustsec-2026-0020 | Guest-controlled resource exhaustion in WASI implementations | 2026-02-24T12:00:00Z | 2026-02-24T19:42:18Z |
| rustsec-2026-0018 | `rpc-check` was removed from crates.io for malicious code | 2026-02-24T12:00:00Z | 2026-02-24T16:32:13Z |
| rustsec-2026-0013 | Type confusion when accessing data from sublasses of subclasses of native types with `abi3` feature targeting Python 3.12 and up | 2026-02-18T12:00:00Z | 2026-02-23T07:15:28Z |
| rustsec-2026-0010 | `polymarket-clients-sdk` was removed from crates.io for malicious code | 2026-02-06T12:00:00Z | 2026-02-23T07:15:28Z |
| rustsec-2025-0148 | `finch-rust` was removed from crates.io for malicious code | 2025-12-05T12:00:00Z | 2026-02-23T07:15:28Z |
| rustsec-2025-0147 | `evm-units` was removed from crates.io for malicious code | 2025-12-03T12:00:00Z | 2026-02-23T07:15:28Z |
| rustsec-2025-0146 | `sha-rust` was removed from crates.io for malicious code | 2025-12-05T12:00:00Z | 2026-02-23T07:15:28Z |
| rustsec-2025-0145 | `uniswap-utils` was removed from crates.io for malicious code | 2025-12-03T12:00:00Z | 2026-02-23T07:15:28Z |
| rustsec-2026-0017 | `clob-sdk` was removed from crates.io for malicious code | 2026-02-20T12:00:00Z | 2026-02-21T01:48:10Z |
| rustsec-2026-0016 | `polymarkets-rs-clob-client` was removed from crates.io for malicious code | 2026-02-20T12:00:00Z | 2026-02-20T18:09:09Z |
| rustsec-2026-0012 | Unsoundness in opt-in ARMv8 assembly backend for `keccak` | 2026-02-12T12:00:00Z | 2026-02-20T04:00:15Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-ghost-2026-29053 | Ghost Vulnerable to Remote Code Execution via Malicious Themes | 2026-03-07T08:42:59.400Z | 2026-03-07T09:16:14.697Z |
| bit-python-2026-2297 | SourcelessFileLoader does not use io.open_code() | 2026-03-06T08:50:18.397Z | 2026-03-06T09:10:26.160Z |
| bit-moodle-2025-67847 | Moodle: moodle: remote code execution via insufficient restore input validation | 2026-03-06T08:50:20.446Z | 2026-03-06T09:10:26.160Z |
| bit-moodle-2021-47857 | Moodle 3.10.3 - 'label' Persistent Cross Site Scripting | 2026-03-06T08:46:28.845Z | 2026-03-06T09:10:26.160Z |
| bit-libpython-2026-2297 | SourcelessFileLoader does not use io.open_code() | 2026-03-06T08:43:26.501Z | 2026-03-06T09:10:26.160Z |
| bit-django-2026-25674 | Potential incorrect permissions on newly created file system objects | 2026-03-06T08:38:51.644Z | 2026-03-06T09:10:26.160Z |
| bit-django-2026-25673 | Potential denial-of-service vulnerability in URLField via Unicode normalization on Windows | 2026-03-06T08:38:49.880Z | 2026-03-06T09:10:26.160Z |
| bit-activemq-2025-66168 | Apache ActiveMQ, Apache ActiveMQ All Module, Apache ActiveMQ MQTT Module: MQTT control packet remaining length field is not properly validated | 2026-03-06T08:36:37.326Z | 2026-03-06T09:10:26.160Z |
| bit-python-2026-0865 | wsgiref.headers.Headers allows header newline injection | 2026-01-26T14:50:04.789Z | 2026-03-04T14:21:20.421Z |
| bit-python-2025-13837 | Out-of-memory when loading Plist | 2025-12-05T11:13:08.742Z | 2026-03-04T14:21:20.421Z |
| bit-python-2025-11468 | Folding email comments of unfoldable characters doesn't preserve parenthesis | 2026-01-26T14:49:32.088Z | 2026-03-04T14:21:20.421Z |
| bit-libpython-2026-0865 | wsgiref.headers.Headers allows header newline injection | 2026-01-26T14:43:33.890Z | 2026-03-04T14:21:20.421Z |
| bit-libpython-2025-13837 | Out-of-memory when loading Plist | 2025-12-05T11:07:43.325Z | 2026-03-04T14:21:20.421Z |
| bit-libpython-2025-11468 | Folding email comments of unfoldable characters doesn't preserve parenthesis | 2026-01-26T14:42:59.991Z | 2026-03-04T14:21:20.421Z |
| bit-moodle-2024-48901 | Moodle: idor when fetching report schedules | 2024-11-21T07:13:17.796Z | 2026-03-03T21:13:17.555Z |
| bit-moodle-2024-48898 | Moodle: some users can delete audiences of other reports | 2024-11-21T07:13:24.286Z | 2026-03-03T21:13:17.555Z |
| bit-moodle-2024-48897 | Moodle: idor in edit/delete rss feed | 2024-11-21T07:13:31.891Z | 2026-03-03T21:13:17.555Z |
| bit-moodle-2024-48896 | Moodle: users' names returned in messaging error message | 2024-11-21T07:13:38.787Z | 2026-03-03T21:13:17.555Z |
| bit-discourse-2026-28227 | Discourse Vulnerable to Unauthorized Topic Creation in Staff-Only Categories via Topic Timer publish_to_category | 2026-03-03T13:29:32.408Z | 2026-03-03T13:59:21.562Z |
| bit-discourse-2026-28219 | Privilege Escalation via Mass Assignment Allows Regular Users to Set Topics as Global Banners | 2026-03-03T13:29:30.555Z | 2026-03-03T13:59:21.562Z |
| bit-discourse-2026-28218 | Discourse's Fail-Open Access Control in Data Explorer Plugin Allows Unauthorized SQL Query Execution | 2026-03-03T13:29:28.795Z | 2026-03-03T13:59:21.562Z |
| bit-discourse-2026-27162 | DIscourse doesn't prevent whispers to leak in excerpts | 2026-03-03T13:29:27.139Z | 2026-03-03T13:59:21.562Z |
| bit-discourse-2026-27154 | Discourse has XSS when editing a malicious post | 2026-03-03T13:29:25.328Z | 2026-03-03T13:59:21.562Z |
| bit-discourse-2026-27153 | Discourse doesn't prevent moderators from exporting user Chat DMs | 2026-03-03T13:29:23.447Z | 2026-03-03T13:59:21.562Z |
| bit-discourse-2026-27152 | DIscourse has DM communication-preference bypass when adding members | 2026-03-03T13:29:21.569Z | 2026-03-03T13:59:21.562Z |
| bit-discourse-2026-27151 | Discourse doesn't validate destination topic when moving posts | 2026-03-03T13:29:19.608Z | 2026-03-03T13:59:21.562Z |
| bit-discourse-2026-27150 | Discourse doesn't ensure guardian check when creating QueryGroupBookmark | 2026-03-03T13:29:17.871Z | 2026-03-03T13:59:21.562Z |
| bit-discourse-2026-27149 | Discourse has SQL injection in PM tag filtering | 2026-03-03T13:29:16.239Z | 2026-03-03T13:59:21.562Z |
| bit-discourse-2026-27021 | Discourse: Poll voters endpoint lacked post visibility checks | 2026-03-03T13:29:14.621Z | 2026-03-03T13:59:21.562Z |
| bit-discourse-2026-26979 | Discourse: TL4 users are able to change status of restricted topics | 2026-03-03T13:29:12.870Z | 2026-03-03T13:59:21.562Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-vc01496 | Security fixes for GHSA-F6X5-JH6R-WRFV, GHSA-J5W8-Q4QC-RX2X applied in versions: 0.8.4-r0 | 2026-03-04T00:39:30.734261Z | 2026-03-03T12:59:01Z |
| cleanstart-2026-vu62737 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-26T00:41:56.473097Z | 2026-02-25T07:34:17Z |
| cleanstart-2026-zs11519 | Security fixes for GHSA-vc5p-v9hr-52mj applied in versions: 4.1.1-r0 | 2026-02-25T00:49:13.663387Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-xk29348 | Security fixes for GHSA-f6x5-jh6r-wrfv, GHSA-j5w8-q4qc-rx2x applied in versions: 8.4.0-r0 | 2026-02-25T00:39:11.477214Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-wk32717 | During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succ... | 2026-02-25T00:52:13.178542Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-uk11127 | During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succ... | 2026-02-25T00:52:43.391940Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-rd09851 | net/url package does not set a limit on the number of query parameters in a query | 2026-02-25T00:53:44.039015Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-pm90259 | Cancelling a query (e | 2026-02-25T00:50:43.010672Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-oo47906 | Security fixes for GHSA-vc5p-v9hr-52mj applied in versions: 4.1.1-r0 | 2026-02-25T00:49:14.177631Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-ds30740 | go-git is a highly extensible git implementation library written in pure Go | 2026-02-25T00:46:12.495329Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-dn18334 | During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succ... | 2026-02-25T00:39:41.622120Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-dc27717 | OpenVPN version 2 | 2026-02-25T00:39:42.192253Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-yq79300 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-02-24T00:45:20.890998Z | 2026-02-23T12:58:32Z |
| cleanstart-2026-sp64433 | Security fixes for GHSA-6rw7-vpxm-498p, GHSA-73rr-hh4g-fpgx, GHSA-8qq5-rm4j-mr97 applied in versions: 4.2.1.1-r1 | 2026-02-24T00:44:51.180009Z | 2026-02-23T12:58:32Z |
| cleanstart-2026-lm41397 | node-tar is a full-featured Tar for Node | 2026-02-24T00:40:50.950958Z | 2026-02-23T12:58:32Z |
| cleanstart-2026-yn08405 | Security fixes for GHSA-f6x5-jh6r-wrfv, GHSA-j5w8-q4qc-rx2x applied in versions: 7.1.1-r7 | 2026-02-19T00:39:05.944714Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-oj16660 | Security fixes for GHSA-2gh3-rmm4-6rq5, GHSA-434x-w66g-qw3r, GHSA-r6v5-fh4h-64xc, GHSA-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.28.4-r0 | 2026-02-19T00:39:07.225007Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-nn87556 | Security fixes for GHSA-2gh3-rmm4-6rq5, GHSA-434x-w66g-qw3r, GHSA-r6v5-fh4h-64xc, GHSA-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.29.0-r0 | 2026-02-19T00:39:07.788394Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-ln12820 | vulnerability has been identified in Node | 2026-02-19T00:58:49.154512Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-kn34553 | vulnerability has been identified in Node | 2026-02-19T00:58:48.926519Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-kn30288 | Security fixes for GHSA-2gh3-rmm4-6rq5, GHSA-434x-w66g-qw3r, GHSA-r6v5-fh4h-64xc, GHSA-rhfx-m35p-ff5j, GHSA-xwfj-jgwm-7wp5 applied in versions: 1.27.5-r1, 1.27.6-r0 | 2026-02-19T00:39:07.163109Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-zt77083 | When multiple server blocks are configured to share the same IP address and port, an attacker can use session resumption to bypass client certificate authentication requirements on these servers | 2026-02-18T00:40:43.959662Z | 2026-02-17T14:16:07Z |
| cleanstart-2026-rs39538 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-18T00:37:41.553514Z | 2026-02-17T14:16:07Z |
| cleanstart-2026-lr19699 | Within HostnameError | 2026-02-18T00:37:41.636616Z | 2026-02-17T14:16:07Z |
| cleanstart-2026-dt95939 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-18T00:37:41.674179Z | 2026-02-17T14:16:07Z |
| cleanstart-2026-at88149 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-18T00:37:41.548996Z | 2026-02-17T14:16:07Z |
| cleanstart-2026-xv54160 | Within HostnameError | 2026-02-17T00:41:15.330012Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-vg57433 | Within HostnameError | 2026-02-17T00:39:45.599344Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-uh39784 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-02-17T00:40:45.017480Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-jr03360 | Within HostnameError | 2026-02-17T00:39:45.300172Z | 2026-02-16T09:23:22Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2026-008 | 2026-02-04T17:23:40.000Z | 2026-02-04T17:23:40.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202407-2188 | Siemens (China) Co., Ltd. is a company focusing on electrification, automation and digita… | 2024-07-23T22:46:32.699000Z |
| var-202406-3119 | Beijing StarNet Ruijie Network Technology Co., Ltd. EG3220 is a new generation of multi-s… | 2024-07-23T22:46:22.685000Z |
| var-202407-1740 | NBR6135-E is a router. Beijing Xingwang Ruijie Network Technology Co., Ltd. NBR6135-E ha… | 2024-07-23T22:46:18.378000Z |
| var-202407-1417 | Siemens (China) Co., Ltd. is a company focusing on electrification, automation and digita… | 2024-07-23T22:46:07.784000Z |
| var-202407-1103 | Siemens (China) Co., Ltd. is a company focusing on electrification, automation and digita… | 2024-07-23T22:46:01.992000Z |
| var-202407-0957 | WinCC is a SCADA system suitable for all walks of life. It can access devices from mobile… | 2024-07-23T22:45:59.391000Z |
| var-202407-0819 | SIMATIC S7-1500 is a modular control system suitable for various automation applications … | 2024-07-23T22:45:56.958000Z |
| var-202407-0818 | NBR6210-E is a router product. Beijing Xingwang Ruijie Network Technology Co., Ltd. NBR6… | 2024-07-23T22:45:56.946000Z |
| var-202407-0779 | Tenda i29V1.0 V1.0.0.5 was discovered to contain a hardcoded password for root. Tenda of … | 2024-07-23T22:45:56.150000Z |
| var-202407-0778 | Tenda AC18 V15.03.3.10_EN was discovered to contain a stack-based buffer overflow vulnera… | 2024-07-23T22:45:56.131000Z |
| var-202407-0745 | Tenda AC18 V15.03.3.10_EN was discovered to contain a stack-based buffer overflow vulnera… | 2024-07-23T22:45:55.498000Z |
| var-202305-1479 | D-Link DIR-2150 SetTriggerPPPoEValidate Username Command Injection Remote Code Execution … | 2024-07-23T22:45:09.335000Z |
| var-202108-1158 | A race condition was addressed with improved locking. This issue is fixed in macOS Monter… | 2024-07-23T22:44:06.976000Z |
| var-201109-0089 | Multiple unspecified vulnerabilities in Cisco Unified Service Monitor before 8.6, as used… | 2024-07-23T22:43:49.590000Z |
| var-200702-0378 | Stack-based buffer overflow in the DCE/RPC preprocessor in Snort before 2.6.1.3, and 2.7 … | 2024-07-23T22:43:25.614000Z |
| var-201011-0225 | Multiple stack-based buffer overflows in agent.exe in Setup Manager in Cisco Intelligent … | 2024-07-23T22:41:43.584000Z |
| var-201112-0297 | Multiple cross-site scripting (XSS) vulnerabilities in the Virus Scan Interface in SAP Ne… | 2024-07-23T22:41:20.004000Z |
| var-201507-0645 | D-Link is an internationally renowned provider of network equipment and solutions, includ… | 2024-07-23T22:41:18.832000Z |
| var-201803-1810 | A Stack-based Buffer Overflow issue was discovered in Delta Electronics Delta Industrial … | 2024-07-23T22:41:17.171000Z |
| var-201809-0087 | WECON LeviStudio Versions 1.8.29 and 1.8.44 have multiple stack-based buffer overflow vul… | 2024-07-23T22:41:16.554000Z |
| var-200607-0396 | Multiple stack-based buffer overflows in eIQnetworks Enterprise Security Analyzer (ESA) b… | 2024-07-23T22:41:04.279000Z |
| var-201702-0423 | An issue was discovered in Delta Electronics WPLSoft, Versions prior to V2.42.11, ISPSoft… | 2024-07-23T22:40:53.160000Z |
| var-202305-1588 | D-Link DIR-2150 SetNTPServerSettings Command Injection Remote Code Execution Vulnerabilit… | 2024-07-23T22:40:05.297000Z |
| var-201112-0173 | The default configuration of the HP CM8060 Color MFP with Edgeline; Color LaserJet 3xxx, … | 2024-07-23T22:39:32.535000Z |
| var-201103-0371 | SAP Crystal Reports Server is a complete reporting solution for creating, managing, and d… | 2024-07-23T22:39:32.874000Z |
| var-201706-0017 | In FortiClientWindows 5.4.1 and 5.4.2, an attacker may escalate privilege via a FortiClie… | 2024-07-23T22:38:34.494000Z |
| var-202305-1520 | D-Link DIR-2150 SetSysEmailSettings EmailFrom Command Injection Remote Code Execution Vul… | 2024-07-23T22:38:26.576000Z |
| var-202407-0490 | A vulnerability has been identified in SIMATIC PCS neo V4.0 (All versions), SIMATIC STEP … | 2024-07-23T22:38:24.768000Z |
| var-201810-0396 | Advantech WebAccess 8.3.1 and earlier has several stack-based buffer overflow vulnerabili… | 2024-07-23T22:37:44.850000Z |
| var-202001-0833 | A Denial of Service vulnerability exists in the WRITE_C function in the msg_server.exe mo… | 2024-07-23T22:37:43.471000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2026-006102 | Security issues in ESC/POS | 2026-03-06T10:31+09:00 | 2026-03-06T10:31+09:00 |
| jvndb-2026-000034 | django-allauth vulnerable to open redirect | 2026-03-05T12:36+09:00 | 2026-03-05T12:36+09:00 |
| jvndb-2026-000033 | EC-CUBE vulnerable to multi-factor authentication bypass | 2026-03-05T12:36+09:00 | 2026-03-05T12:36+09:00 |
| jvndb-2026-000032 | Multiple vulnerabilities in Dell UPS Multi-UPS Management Console (MUMC) | 2026-03-04T12:20+09:00 | 2026-03-04T12:20+09:00 |
| jvndb-2026-005746 | Multiple vulnerabilities in Trend Micro Endpoint security products for enterprises (February 2026) | 2026-03-04T10:40+09:00 | 2026-03-04T10:40+09:00 |
| jvndb-2026-005744 | Canon IJ Scan Utility registers Windows services with unquoted file paths | 2026-03-04T10:40+09:00 | 2026-03-04T10:40+09:00 |
| jvndb-2026-000030 | IM-LogicDesigner module of intra-mart Accel Platform vulnerable to untrusted data deserialization | 2026-02-27T15:41+09:00 | 2026-03-03T10:06+09:00 |
| jvndb-2026-005259 | Out-of-bounds write vulnerability in Fujitsu BIOS Driver (fbiosdrv.sys) | 2026-03-02T11:46+09:00 | 2026-03-02T11:46+09:00 |
| jvndb-2026-000031 | Improper file access permission settings in the installers for multiple Soliton Systems products | 2026-02-27T15:41+09:00 | 2026-02-27T15:41+09:00 |
| jvndb-2026-000029 | Multiple vulnerabilities in the installer of FinalCode Client | 2026-02-26T14:24+09:00 | 2026-02-26T14:24+09:00 |
| jvndb-2026-004811 | Vulnerability in Hitachi Configuration Manager and Hitachi Ops Center API Configuration Manager | 2026-02-26T11:02+09:00 | 2026-02-26T11:02+09:00 |
| jvndb-2026-004810 | Vulnerability in Hitachi Configuration Manager and Hitachi Ops Center API Configuration Manager | 2026-02-26T11:02+09:00 | 2026-02-26T11:02+09:00 |
| jvndb-2026-000026 | Lanscope Endpoint Manager (On-Premises) vulnerable to path traversal | 2026-02-25T15:14+09:00 | 2026-02-25T15:14+09:00 |
| jvndb-2026-004359 | Security information for Hitachi Disk Array Systems | 2026-02-20T18:35+09:00 | 2026-02-20T18:35+09:00 |
| jvndb-2026-000027 | WordPress Plugin "Survey Maker" vulnerable to cross-site scripting | 2026-02-20T12:32+09:00 | 2026-02-20T12:32+09:00 |
| jvndb-2026-000028 | Installer for Job log aggregation/analysis software RICOH Job Log Aggregation Tool may insecurely load Dynamic Link Libraries | 2026-02-20T12:31+09:00 | 2026-02-20T12:31+09:00 |
| jvndb-2026-003912 | Vulnerability in Cosminexus HTTP Server and Hitachi Web Server | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003911 | Vulnerability in Cosminexus HTTP Server | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003910 | Multiple Vulnerabilities in Cosminexus HTTP Server | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003909 | Multiple Vulnerabilities in Hitachi Command Suite products | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003908 | Multiple Vulnerabilities in Hitachi Command Suite, Hitachi Automation Director, Hitachi Configuration Manager, Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003907 | Multiple Vulnerabilities in JP1 | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003906 | Multiple Vulnerabilities in Cosminexus | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-003905 | Multiple Vulnerabilities in Cosminexus HTTP Server and Hitachi Web Server | 2026-02-17T20:46+09:00 | 2026-02-17T20:46+09:00 |
| jvndb-2026-000025 | Joomla! CMS vulnerable to cross-site scripting | 2026-02-17T12:46+09:00 | 2026-02-17T12:46+09:00 |
| jvndb-2026-000023 | FileZen vulnerable to OS command injection | 2026-02-13T16:51+09:00 | 2026-02-13T17:08+09:00 |
| jvndb-2026-000024 | Installer of M-Audio M-Track Duo HD may insecurely load Dynamic Link Libraries | 2026-02-12T13:32+09:00 | 2026-02-12T13:32+09:00 |
| jvndb-2026-000022 | Oki Electric Industry products and OEM products register Windows services with unquoted file paths | 2026-02-09T15:21+09:00 | 2026-02-09T15:21+09:00 |
| jvndb-2026-000021 | web2py vulnerable to open redirect | 2026-02-05T15:01+09:00 | 2026-02-05T15:01+09:00 |
| jvndb-2026-000017 | Improper file access permission settings in Mitsubishi Small-Capacity UPS Shutdown Software FREQSHIP-mini for Windows | 2026-02-03T14:57+09:00 | 2026-02-05T14:41+09:00 |
| ID | Description | Updated |
|---|---|---|
| ts-2026-001 | TS-2026-001 | 2026-01-15T00:00 |
| ts-2025-008 | TS-2025-008 | 2025-11-19T00:00 |
| ts-2025-007 | TS-2025-007 | 2025-11-07T00:00 |
| ts-2025-006 | TS-2025-006 | 2025-10-28T00:00 |
| ts-2025-005 | TS-2025-005 | 2025-08-07T00:00 |
| ts-2025-004 | TS-2025-004 | 2025-05-27T00:00 |
| ts-2025-003 | TS-2025-003 | 2025-05-21T00:00 |
| ts-2025-002 | TS-2025-002 | 2025-05-15T00:00 |
| ts-2025-001 | TS-2025-001 | 2025-03-07T00:00 |
| ts-2024-013 | TS-2024-013 | 2024-12-04T00:00 |
| ts-2024-012 | TS-2024-012 | 2024-10-02T00:00 |
| ts-2024-011 | TS-2024-011 | 2024-07-22T00:00 |
| ts-2024-010 | TS-2024-010 | 2024-07-19T00:00 |
| ts-2024-009 | TS-2024-009 | 2024-06-27T00:00 |
| ts-2024-008 | TS-2024-008 | 2024-06-14T00:00 |
| ts-2024-007 | TS-2024-007 | 2024-06-12T00:00 |
| ts-2024-006 | TS-2024-006 | 2024-05-22T00:00 |
| ts-2024-005 | TS-2024-005 | 2024-05-08T00:00 |
| ts-2024-004 | TS-2024-004 | 2024-05-06T00:00 |
| ts-2024-003 | TS-2024-003 | 2024-04-23T00:00 |
| ts-2024-002 | TS-2024-002 | 2024-01-30T00:00 |
| ts-2024-001 | TS-2024-001 | 2024-01-08T00:00 |
| ts-2023-009 | TS-2023-009 | 2023-12-22T00:00 |
| ts-2023-008 | TS-2023-008 | 2023-11-01T00:00 |
| ts-2023-007 | TS-2023-007 | 2023-10-26T00:00 |
| ts-2023-006 | TS-2023-006 | 2023-08-22T00:00 |
| ts-2023-005 | TS-2023-005 | 2023-04-28T00:00 |
| ts-2023-004 | TS-2023-004 | 2023-04-04T00:00 |
| ts-2023-003 | TS-2023-003 | 2023-03-22T00:00 |
| ts-2023-002 | TS-2023-002 | 2023-01-24T00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2026:0831-1 | Security update for openvpn | 2026-03-05T15:18:06Z | 2026-03-05T15:18:06Z |
| suse-su-2026:0830-1 | Security update for ocaml | 2026-03-05T15:17:30Z | 2026-03-05T15:17:30Z |
| suse-su-2026:0829-1 | Security update for gnutls | 2026-03-05T15:17:09Z | 2026-03-05T15:17:09Z |
| suse-su-2026:0828-1 | Security update for python-Authlib | 2026-03-05T15:16:58Z | 2026-03-05T15:16:58Z |
| suse-su-2026:0827-1 | Security update for glibc-livepatches | 2026-03-05T15:16:49Z | 2026-03-05T15:16:49Z |
| suse-su-2026:0826-1 | Security update for expat | 2026-03-05T15:16:40Z | 2026-03-05T15:16:40Z |
| suse-su-2026:0825-1 | Security update for php-composer2 | 2026-03-05T15:16:16Z | 2026-03-05T15:16:16Z |
| suse-su-2026:0824-1 | Security update for openCryptoki | 2026-03-05T15:16:07Z | 2026-03-05T15:16:07Z |
| suse-su-2026:0821-1 | Security update for python-Django | 2026-03-05T11:43:12Z | 2026-03-05T11:43:12Z |
| suse-su-2026:0819-1 | Security update for virtiofsd | 2026-03-05T10:49:51Z | 2026-03-05T10:49:51Z |
| suse-su-2026:0817-1 | Security update for wireshark | 2026-03-05T09:51:15Z | 2026-03-05T09:51:15Z |
| suse-su-2026:0816-1 | Security update for virtiofsd | 2026-03-05T09:50:59Z | 2026-03-05T09:50:59Z |
| suse-su-2026:0814-1 | Security update for mozilla-nss | 2026-03-05T09:06:46Z | 2026-03-05T09:06:46Z |
| suse-su-2026:0813-1 | Security update for mozilla-nss | 2026-03-05T08:34:14Z | 2026-03-05T08:34:14Z |
| suse-su-2026:0812-1 | Security update for MozillaFirefox | 2026-03-05T08:31:43Z | 2026-03-05T08:31:43Z |
| suse-su-2026:0811-1 | Security update for libsoup2 | 2026-03-05T03:05:23Z | 2026-03-05T03:05:23Z |
| suse-su-2026:0790-1 | Security update for go1.25-openssl | 2026-03-03T15:52:22Z | 2026-03-03T15:52:22Z |
| suse-su-2026:0789-1 | Security update for go1.24-openssl | 2026-03-03T15:51:34Z | 2026-03-03T15:51:34Z |
| suse-su-2026:0788-1 | Security update for libsoup | 2026-03-03T15:15:16Z | 2026-03-03T15:15:16Z |
| suse-su-2026:0787-1 | Security update for postgresql17 | 2026-03-03T14:48:34Z | 2026-03-03T14:48:34Z |
| suse-su-2026:0786-1 | Security update for postgresql14 | 2026-03-03T14:47:10Z | 2026-03-03T14:47:10Z |
| suse-su-2026:0785-1 | Security update for postgresql18 | 2026-03-03T14:01:35Z | 2026-03-03T14:01:35Z |
| suse-su-2026:0784-1 | Security update for postgresql16 | 2026-03-03T13:42:32Z | 2026-03-03T13:42:32Z |
| suse-su-2026:0783-1 | Security update for zlib | 2026-03-03T13:36:20Z | 2026-03-03T13:36:20Z |
| suse-su-2026:0782-1 | Security update for libxml2 | 2026-03-03T13:35:15Z | 2026-03-03T13:35:15Z |
| suse-su-2026:0781-1 | Security update for patch | 2026-03-03T13:28:08Z | 2026-03-03T13:28:08Z |
| suse-su-2026:0780-1 | Security update for tracker-miners | 2026-03-03T13:25:57Z | 2026-03-03T13:25:57Z |
| suse-su-2026:0779-1 | Security update for libssh | 2026-03-03T13:25:08Z | 2026-03-03T13:25:08Z |
| suse-su-2026:0778-1 | Security update for libssh | 2026-03-03T13:24:29Z | 2026-03-03T13:24:29Z |
| suse-su-2026:0777-1 | Security update for cosign | 2026-03-03T13:22:27Z | 2026-03-03T13:22:27Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2026-12205 | 用友网络科技股份有限公司U8 Cloud存在远程代码执行漏洞 | 2025-11-04 | 2026-02-28 |
| cnvd-2026-12149 | 用友网络科技股份有限公司U8 Cloud存在SQL注入漏洞(CNVD-2026-12149) | 2025-11-26 | 2026-02-28 |
| cnvd-2026-12146 | 深圳极速创想科技有限公司FastAdmin任意文件读取漏洞 | 2025-11-27 | 2026-02-28 |
| cnvd-2026-11810 | Microsoft Windows Routing and Remote Access Service远程代码执行漏洞(CNVD-2026-11810) | 2025-08-15 | 2026-02-28 |
| cnvd-2026-11809 | Microsoft Windows Routing and Remote Access Service远程代码执行漏洞 | 2025-12-12 | 2026-02-28 |
| cnvd-2026-11808 | Apache Kyuubi目录遍历漏洞 | 2026-01-19 | 2026-02-28 |
| cnvd-2026-11807 | 多款Mozilla产品整数溢出漏洞 | 2026-01-19 | 2026-02-28 |
| cnvd-2026-11806 | 多款Mozilla产品代码执行漏洞(CNVD-2026-11806) | 2026-01-19 | 2026-02-28 |
| cnvd-2026-11805 | 多款Mozilla产品安全绕过漏洞(CNVD-2026-11805) | 2026-01-19 | 2026-02-28 |
| cnvd-2026-11804 | 多款Mozilla产品缓冲区溢出漏洞(CNVD-2026-11804) | 2026-01-19 | 2026-02-28 |
| cnvd-2026-11803 | 多款Mozilla产品代码执行漏洞(CNVD-2026-11803) | 2026-01-19 | 2026-02-28 |
| cnvd-2026-11802 | 多款Mozilla产品代码执行漏洞(CNVD-2026-11802) | 2026-01-19 | 2026-02-28 |
| cnvd-2026-11801 | 多款Mozilla产品存在未明漏洞(CNVD-2026-11801) | 2026-01-19 | 2026-02-28 |
| cnvd-2026-11800 | Mozilla Firefox和Mozilla Firefox ESR缓冲区溢出漏洞(CNVD-2026-11800) | 2026-01-19 | 2026-02-28 |
| cnvd-2026-11799 | Mozilla Firefox和Mozilla Firefox ESR代码执行漏洞(CNVD-2026-11799) | 2026-01-19 | 2026-02-28 |
| cnvd-2026-11798 | IBM Licensing Operator权限提升漏洞 | 2026-01-30 | 2026-02-28 |
| cnvd-2026-11797 | Mozilla Firefox代码执行漏洞(CNVD-2026-11797) | 2026-02-02 | 2026-02-28 |
| cnvd-2026-11796 | Apache Continuum命令注入漏洞 | 2026-02-05 | 2026-02-28 |
| cnvd-2026-11795 | Mozilla Firefox安全绕过漏洞(CNVD-2026-11795) | 2026-02-05 | 2026-02-28 |
| cnvd-2026-11794 | Mozilla Thunderbird信息泄露漏洞(CNVD-2026-11794) | 2026-02-05 | 2026-02-28 |
| cnvd-2026-11793 | Advantech ADAM-5630跨站请求伪造漏洞 | 2024-09-29 | 2026-02-27 |
| cnvd-2026-11792 | Advantech ADAM-5630信息泄露漏洞 | 2024-09-29 | 2026-02-27 |
| cnvd-2026-11791 | Advantech ADAM-5630访问控制错误漏洞 | 2024-09-29 | 2026-02-27 |
| cnvd-2026-11790 | Advantech DeviceOn/iEdge跨站脚本漏洞 | 2025-11-10 | 2026-02-27 |
| cnvd-2026-11789 | Advantech DeviceOn/iEdge路径遍历漏洞(CNVD-2026-11789) | 2025-11-10 | 2026-02-27 |
| cnvd-2026-11788 | Advantech DeviceOn/iEdge路径遍历漏洞(CNVD-2026-11788) | 2025-11-10 | 2026-02-27 |
| cnvd-2026-11787 | Advantech DeviceOn/iEdge路径遍历漏洞 | 2025-11-11 | 2026-02-27 |
| cnvd-2026-11786 | Advantech TP-3250拒绝服务漏洞 | 2025-11-18 | 2026-02-27 |
| cnvd-2026-11785 | Advantech WebAccess/SCADA目录遍历漏洞 | 2025-12-24 | 2026-02-27 |
| cnvd-2026-11784 | Advantech WebAccess/SCADA SQL注入漏洞 | 2025-12-24 | 2026-02-27 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-avi-0249 | Multiples vulnérabilités dans les produits IBM | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| certfr-2026-avi-0248 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| certfr-2026-avi-0247 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| certfr-2026-avi-0246 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| certfr-2026-avi-0245 | Vulnérabilité dans Zabbix | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| certfr-2026-avi-0244 | Vulnérabilité dans Nextcloud Flow | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| certfr-2026-avi-0243 | Vulnérabilité dans SPIP | 2026-03-06T00:00:00.000000 | 2026-03-06T00:00:00.000000 |
| certfr-2026-avi-0242 | Multiples vulnérabilités dans les produits Cisco | 2026-03-05T00:00:00.000000 | 2026-03-05T00:00:00.000000 |
| certfr-2026-avi-0241 | Vulnérabilité dans ClamAV | 2026-03-05T00:00:00.000000 | 2026-03-05T00:00:00.000000 |
| certfr-2026-avi-0240 | Vulnérabilité dans CPython | 2026-03-05T00:00:00.000000 | 2026-03-05T00:00:00.000000 |
| certfr-2026-avi-0239 | Multiples vulnérabilités dans Google Chrome | 2026-03-05T00:00:00.000000 | 2026-03-05T00:00:00.000000 |
| certfr-2026-avi-0238 | Vulnérabilité dans NetApp ONTAP 9 | 2026-03-05T00:00:00.000000 | 2026-03-05T00:00:00.000000 |
| certfr-2026-avi-0237 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-05T00:00:00.000000 | 2026-03-05T00:00:00.000000 |
| certfr-2026-avi-0236 | Multiples vulnérabilités dans Traefik | 2026-03-05T00:00:00.000000 | 2026-03-05T00:00:00.000000 |
| certfr-2026-avi-0235 | Multiples vulnérabilités dans HPE Aruba Networking AOS | 2026-03-04T00:00:00.000000 | 2026-03-04T00:00:00.000000 |
| certfr-2026-avi-0234 | Vulnérabilité dans Tenable Nessus Manager | 2026-03-04T00:00:00.000000 | 2026-03-04T00:00:00.000000 |
| certfr-2026-avi-0233 | Multiples vulnérabilités dans Google Pixel | 2026-03-04T00:00:00.000000 | 2026-03-04T00:00:00.000000 |
| certfr-2026-avi-0232 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-03T00:00:00.000000 | 2026-03-03T00:00:00.000000 |
| certfr-2026-avi-0231 | Multiples vulnérabilités dans Google Android | 2026-03-03T00:00:00.000000 | 2026-03-03T00:00:00.000000 |
| certfr-2026-avi-0230 | Multiples vulnérabilités dans Docker Desktop | 2026-03-03T00:00:00.000000 | 2026-03-03T00:00:00.000000 |
| certfr-2026-avi-0217 | Multiples vulnérabilités dans SPIP | 2026-02-26T00:00:00.000000 | 2026-03-03T00:00:00.000000 |
| certfr-2026-avi-0229 | Multiples vulnérabilités dans MISP | 2026-03-02T00:00:00.000000 | 2026-03-02T00:00:00.000000 |
| certfr-2026-avi-0228 | Multiples vulnérabilités dans les produits Microsoft | 2026-03-02T00:00:00.000000 | 2026-03-02T00:00:00.000000 |
| certfr-2026-avi-0227 | Multiples vulnérabilités dans le noyau Linux d'Ubuntu | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0226 | Multiples vulnérabilités dans le noyau Linux de Red Hat | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0225 | Multiples vulnérabilités dans le noyau Linux de SUSE | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0224 | Multiples vulnérabilités dans les produits IBM | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0223 | Multiples vulnérabilités dans les produits Microsoft | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0222 | Multiples vulnérabilités dans Microsoft Edge | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| certfr-2026-avi-0221 | Multiples vulnérabilités dans les produits Centreon | 2026-02-27T00:00:00.000000 | 2026-02-27T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2026-ale-002 | [MàJ] Vulnérabilité dans Cisco Catalyst SD-WAN | 2026-02-25T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| certfr-2025-ale-014 | [MàJ] Vulnérabilité dans React Server Components | 2025-12-05T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| CERTFR-2025-ALE-014 | [MàJ] Vulnérabilité dans React Server Components | 2025-12-05T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-ale-001 | [MàJ] Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile | 2026-01-30T00:00:00.000000 | 2026-02-03T00:00:00.000000 |
| CERTFR-2026-ALE-001 | [MàJ] Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile | 2026-01-30T00:00:00.000000 | 2026-02-03T00:00:00.000000 |
| certfr-2025-ale-013 | [MàJ] Multiples vulnérabilités dans Cisco ASA et FTD | 2025-09-25T00:00:00.000000 | 2025-10-06T00:00:00.000000 |
| CERTFR-2025-ALE-013 | [MàJ] Multiples vulnérabilités dans Cisco ASA et FTD | 2025-09-25T00:00:00.000000 | 2025-10-06T00:00:00.000000 |
| certfr-2025-ale-012 | Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2025-08-26T00:00:00.000000 | 2025-09-26T00:00:00.000000 |
| CERTFR-2025-ALE-012 | Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2025-08-26T00:00:00.000000 | 2025-09-26T00:00:00.000000 |
| certfr-2025-ale-010 | [MàJ] Multiples vulnérabilités dans Microsoft SharePoint | 2025-07-21T00:00:00.000000 | 2025-08-26T00:00:00.000000 |
| CERTFR-2025-ALE-010 | [MàJ] Multiples vulnérabilités dans Microsoft SharePoint | 2025-07-21T00:00:00.000000 | 2025-08-26T00:00:00.000000 |
| certfr-2025-ale-011 | Incidents de sécurité dans les pare-feux SonicWall | 2025-08-05T00:00:00.000000 | 2025-08-18T00:00:00.000000 |
| certfr-2025-ale-009 | Multiples vulnérabilités dans Citrix NetScaler ADC et NetScaler Gateway | 2025-07-01T00:00:00.000000 | 2025-07-17T00:00:00.000000 |
| CERTFR-2025-ALE-011 | Incidents de sécurité dans les pare-feux SonicWall | 2025-08-05T00:00:00.000000 | 2025-08-18T00:00:00.000000 |
| CERTFR-2025-ALE-009 | Multiples vulnérabilités dans Citrix NetScaler ADC et NetScaler Gateway | 2025-07-01T00:00:00.000000 | 2025-07-17T00:00:00.000000 |
| certfr-2025-ale-004 | Activités de post-exploitation dans Fortinet FortiGate | 2025-04-11T00:00:00.000000 | 2025-08-07T00:00:00.000000 |
| CERTFR-2025-ALE-004 | Activités de post-exploitation dans Fortinet FortiGate | 2025-04-11T00:00:00.000000 | 2025-08-07T00:00:00.000000 |
| certfr-2025-ale-008 | [MàJ] Vulnérabilité dans Roundcube | 2025-06-05T00:00:00.000000 | 2025-07-21T00:00:00.000000 |
| CERTFR-2025-ALE-008 | [MàJ] Vulnérabilité dans Roundcube | 2025-06-05T00:00:00.000000 | 2025-07-21T00:00:00.000000 |
| certfr-2025-ale-007 | Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile (EPMM) | 2025-05-14T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| certfr-2025-ale-006 | Vulnérabilité dans les produits Fortinet | 2025-05-13T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| certfr-2025-ale-005 | Vulnérabilité dans SAP NetWeaver | 2025-04-28T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| certfr-2025-ale-003 | [MàJ] Vulnérabilité dans les produits Ivanti | 2025-04-04T00:00:00.000000 | 2025-04-11T00:00:00.000000 |
| CERTFR-2025-ALE-007 | Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile (EPMM) | 2025-05-14T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| CERTFR-2025-ALE-006 | Vulnérabilité dans les produits Fortinet | 2025-05-13T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| CERTFR-2025-ALE-005 | Vulnérabilité dans SAP NetWeaver | 2025-04-28T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| CERTFR-2025-ALE-003 | [MàJ] Vulnérabilité dans les produits Ivanti | 2025-04-04T00:00:00.000000 | 2025-04-11T00:00:00.000000 |
| certfr-2025-ale-002 | [MàJ] Vulnérabilité dans les produits Fortinet | 2025-05-07T00:00:00.000000 | 2025-01-14T00:00:00.000000 |
| certfr-2025-ale-001 | [MàJ] Vulnérabilité dans les produits Ivanti | 2025-01-09T00:00:00.000000 | 2025-04-01T00:00:00.000000 |
| CERTFR-2025-ALE-002 | [MàJ] Vulnérabilité dans les produits Fortinet | 2025-05-07T00:00:00.000000 | 2025-01-14T00:00:00.000000 |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| GCVE-1-2026-0019 |
6.4 (4.0)
|
Improper URL validation in MISP dashboard button widge… |
misp |
misp |
2026-02-27T14:55:00.000Z | 2026-02-27T15:44:29.998063Z |
| GCVE-1-2026-0018 |
6.5 (4.0)
|
Improper access control in MISP user contact form allo… |
misp |
misp |
2026-02-27T13:25:32.632362Z | 2026-02-27T13:25:32.632362Z |
| GCVE-1-2026-0017 |
7.2 (4.0)
|
Improper Neutralization of Raw HTML in MISP modules Ma… |
misp |
misp-modules |
2026-02-27T13:10:24.641948Z | 2026-02-27T13:10:24.641948Z |
| GCVE-1-2026-0016 |
7 (4.0)
|
Server-Side Request Forgery via Event Report Import Fr… |
misp |
misp |
2026-02-27T10:56:32.745676Z | 2026-02-27T10:56:32.745676Z |
| GCVE-1-2026-0015 |
7.2 (4.0)
|
Threat actors use FortiCloud SSO bypass to collect LDA… |
fortinet |
fortios |
2026-02-09T09:09:00.000Z | 2026-02-09T09:14:59.004089Z |
| GCVE-1-2026-0014 |
7.4 (4.0)
|
Missing Authorization Check Allows Unauthorized Modifi… |
vulnerability-lookup |
vulnerability-lookup |
2026-02-04T19:32:14.341383Z | 2026-02-04T19:32:14.341383Z |
| GCVE-1-2026-0013 |
2.1 (4.0)
|
Flask Application Username Route Collision Allows Rese… |
vulnerability-lookup |
vulnerability-lookup |
2026-02-04T19:27:00.000Z | 2026-02-04T19:32:49.787763Z |
| GCVE-1-2026-0012 |
2.1 (4.0)
|
Authentication Error Message Allows Email Address Enum… |
vulnerability-lookup |
vulnerability-lookup |
2026-02-04T19:21:34.411344Z | 2026-02-04T19:21:34.411344Z |
| GCVE-1-2026-0011 |
8.7 (4.0)
|
Out-of-bounds memory write in the network packet … |
EA Games |
Command & Conquer: Generals |
2026-01-29T14:37:00.000Z | 2026-01-29T14:39:17.728822Z |
| GCVE-1-2026-0010 |
9.3 (4.0)
|
Improper input validation in the file transfer ha… |
EA Games |
Command & Conquer: Generals |
2026-01-29T14:33:18.822829Z | 2026-01-29T14:33:18.822829Z |
| GCVE-1-2026-0009 |
9.3 (4.0)
|
Stack-based buffer overflow in the multiplayer ne… |
EA Games |
Command & Conquer: Generals |
2026-01-29T14:30:38.596928Z | 2026-01-29T14:30:38.596928Z |
| GCVE-1-2026-0008 |
10 (4.0)
|
gpg-agent stack buffer overflow in pkdecrypt using KEM |
gnupg |
gpg-agent |
2026-01-28T13:48:12.350509Z | 2026-01-28T13:48:12.350509Z |
| GCVE-1-2026-0007 |
10 (4.0)
|
GNU InetUtils Security Advisory: remote authentication… |
gnu |
InetUtils |
2026-01-20T20:57:00.000Z | 2026-01-26T16:32:40.831364Z |
| GCVE-1-2026-0006 |
8.5 (4.0)
|
Improper Access Control in Cerebrate AuthKey and Encry… |
cerebrate |
cerebrate |
2026-01-13T15:37:17.337254Z | 2026-01-13T15:37:17.337254Z |
| GCVE-1-2026-0005 |
8.5 (4.0)
|
Improper Access Control in Cerebrate Alignment Model A… |
cerebrate |
cerebrate |
2026-01-13T15:31:00.000Z | 2026-01-13T15:38:02.888546Z |
| GCVE-1-2026-0004 |
8.5 (4.0)
|
Authorization Bypass in Cerebrate IndividualsControlle… |
cerebrate |
cerebrate |
2026-01-13T15:28:00.000Z | 2026-01-13T15:38:37.744618Z |
| GCVE-1-2026-0003 |
6.3 (4.0)
|
Stored/Reflected XSS via Unsanitized Parameters in URL… |
misp |
misp |
2026-01-13T10:50:00.000Z | 2026-01-13T10:54:13.659223Z |
| GCVE-1-2026-0002 |
10 (4.0)
|
Heap-buffer-overflow in EXIF writer for extra IFD tags |
ffmpeg |
ffmpeg |
2026-01-02T19:50:00.000Z | 2026-01-02T20:05:27.269877Z |
| GCVE-1-2026-0001 |
N/A
|
Bundle reference to gpg.fail |
gnupg |
gnupg |
2026-01-02T10:20:00.000Z | 2026-01-02T13:31:14.359346Z |
| GCVE-1-2025-0041 |
6.4 (4.0)
|
[online services] Reflected Cross-Site Scripting (XSS)… |
typo3 |
typo3 |
2025-12-19T14:25:00.000Z | 2025-12-19T14:54:51.594645Z |
| GCVE-1-2025-0031 |
7.1 (4.0)
|
A cross-site scripting (XSS) vulnerability was identif… |
misp |
misp |
2025-12-03T10:58:00.000Z | 2025-12-16T09:36:09.594750Z |
| GCVE-1-2025-0040 |
7.2 (4.0)
|
A cross-site scripting (XSS) vulnerability was id… |
misp |
misp |
2025-12-13T08:44:32.378924Z | 2025-12-13T08:44:32.378924Z |
| GCVE-1-2025-0039 |
8.5 (4.0)
|
XSS Reintroduced in MISP Dashboard World Map Widget Du… |
misp |
misp |
2025-12-10T14:33:52.856734Z | 2025-12-10T14:33:52.856734Z |
| GCVE-1-2025-0038 |
5 (4.0)
|
Reflected XSS in MISP Template Tag Removal and MISP Ad… |
misp |
misp |
2025-12-10T14:10:00.000Z | 2025-12-10T14:16:55.918270Z |
| GCVE-1-2025-0037 |
7 (4.0)
|
Reflected XSS in MISP Dashboard Widgets via Unescaped … |
misp |
misp |
2025-12-10T14:01:03.200804Z | 2025-12-10T14:01:03.200804Z |
| GCVE-1-2025-0036 |
8.3 (4.0)
|
A reflected cross-site scripting (XSS) vulnerability w… |
misp |
misp |
2025-12-10T13:46:07.170083Z | 2025-12-10T13:46:07.170083Z |
| GCVE-1-2025-0035 |
8.3 (4.0)
|
Insufficient sanitization of bundle metadata (availabl… |
CIRCL |
vulnerability-lookup |
2025-12-08T10:25:00.000Z | 2025-12-08T12:14:06.307298Z |
| GCVE-1-2025-0034 |
7 (4.0)
|
Missing CSRF protection on state-changing endpoints in… |
CIRCL |
vulnerability-lookup |
2025-12-08T10:19:00.000Z | 2025-12-08T12:13:24.197294Z |
| GCVE-1-2025-0033 |
8.1 (4.0)
|
Vulnerability-lookup did not track or limit failed One… |
CIRCL |
vulnerability-lookup |
2025-12-08T10:11:00.000Z | 2025-12-08T12:12:53.235996Z |
| GCVE-1-2025-0032 |
10 (4.0)
|
The default configuration of WatchGuard Firebox device… |
watchguard |
firebox |
2025-12-03T16:25:00.000Z | 2025-12-19T13:48:34.570799Z |