Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-21341 |
7.8 (3.1)
|
Substance3D - Stager | Out-of-bounds Write (CWE-787) |
Adobe |
Substance3D - Stager |
2026-02-10T18:16:28.733Z | 2026-02-11T04:56:42.178Z |
| CVE-2026-21330 |
7.8 (3.1)
|
After Effects | Access of Resource Using Incompatible … |
Adobe |
After Effects |
2026-02-10T17:52:57.874Z | 2026-02-11T04:56:41.422Z |
| CVE-2026-21329 |
7.8 (3.1)
|
After Effects | Use After Free (CWE-416) |
Adobe |
After Effects |
2026-02-10T17:53:05.522Z | 2026-02-11T04:56:40.603Z |
| CVE-2026-21328 |
7.8 (3.1)
|
After Effects | Out-of-bounds Write (CWE-787) |
Adobe |
After Effects |
2026-02-10T17:53:00.426Z | 2026-02-11T04:56:39.644Z |
| CVE-2026-21327 |
7.8 (3.1)
|
After Effects | Out-of-bounds Write (CWE-787) |
Adobe |
After Effects |
2026-02-10T17:52:56.262Z | 2026-02-11T04:56:38.871Z |
| CVE-2026-21326 |
7.8 (3.1)
|
After Effects | Use After Free (CWE-416) |
Adobe |
After Effects |
2026-02-10T17:53:03.097Z | 2026-02-11T04:56:38.089Z |
| CVE-2026-21325 |
7.8 (3.1)
|
After Effects | Out-of-bounds Read (CWE-125) |
Adobe |
After Effects |
2026-02-10T17:52:57.103Z | 2026-02-11T04:56:37.260Z |
| CVE-2026-21324 |
7.8 (3.1)
|
After Effects | Out-of-bounds Read (CWE-125) |
Adobe |
After Effects |
2026-02-10T17:53:03.917Z | 2026-02-11T04:56:36.506Z |
| CVE-2026-21323 |
7.8 (3.1)
|
After Effects | Use After Free (CWE-416) |
Adobe |
After Effects |
2026-02-10T17:53:04.726Z | 2026-02-11T04:56:35.742Z |
| CVE-2026-21322 |
7.8 (3.1)
|
After Effects | Out-of-bounds Read (CWE-125) |
Adobe |
After Effects |
2026-02-10T17:53:02.265Z | 2026-02-11T04:56:34.979Z |
| CVE-2026-21321 |
7.8 (3.1)
|
After Effects | Integer Overflow or Wraparound (CWE-190) |
Adobe |
After Effects |
2026-02-10T17:52:54.489Z | 2026-02-11T04:56:34.194Z |
| CVE-2026-21320 |
7.8 (3.1)
|
After Effects | Use After Free (CWE-416) |
Adobe |
After Effects |
2026-02-10T17:52:55.296Z | 2026-02-11T04:56:33.420Z |
| CVE-2026-21318 |
7.8 (3.1)
|
After Effects | Out-of-bounds Write (CWE-787) |
Adobe |
After Effects |
2026-02-10T17:53:01.373Z | 2026-02-11T04:56:32.627Z |
| CVE-2026-21357 |
7.8 (3.1)
|
InDesign Desktop | Heap-based Buffer Overflow (CWE-122) |
Adobe |
InDesign Desktop |
2026-02-10T17:59:53.700Z | 2026-02-11T04:56:31.771Z |
| CVE-2026-21347 |
7.8 (3.1)
|
Bridge | Integer Overflow or Wraparound (CWE-190) |
Adobe |
Bridge |
2026-02-10T18:24:38.120Z | 2026-02-11T04:56:31.026Z |
| CVE-2026-21346 |
7.8 (3.1)
|
Bridge | Out-of-bounds Write (CWE-787) |
Adobe |
Bridge |
2026-02-10T18:24:38.877Z | 2026-02-11T04:56:30.224Z |
| CVE-2026-21334 |
7.8 (3.1)
|
Substance3D - Designer | Out-of-bounds Write (CWE-787) |
Adobe |
Substance3D - Designer |
2026-02-10T18:08:09.123Z | 2026-02-11T04:56:29.295Z |
| CVE-2026-21335 |
7.8 (3.1)
|
Substance3D - Designer | Out-of-bounds Write (CWE-787) |
Adobe |
Substance3D - Designer |
2026-02-10T18:08:10.712Z | 2026-02-11T04:56:28.553Z |
| CVE-2025-32453 |
6.7 (3.1)
|
Incorrect default permissions for some Intel(R) G… |
n/a |
Intel(R) Graphics Driver software |
2026-02-10T16:25:50.100Z | 2026-02-11T04:56:27.819Z |
| CVE-2025-32092 |
6.7 (3.1)
|
Insecure inherited permissions for some Intel(R) … |
n/a |
Intel(R) Graphics Software |
2026-02-10T16:25:46.732Z | 2026-02-11T04:56:27.050Z |
| CVE-2025-35999 |
6.7 (3.1)
|
Incorrect permission assignment for critical reso… |
n/a |
System Firmware Update Utility (SysFwUpdt) for Intel(R) Server Boards and Intel(R) Server Systems Based |
2026-02-10T16:26:02.912Z | 2026-02-11T04:56:26.209Z |
| CVE-2025-31648 |
3.9 (3.1)
|
Improper handling of values in the microcode flow… |
n/a |
Intel(R) Processor Family may allow an escalation of privilege. Startup code and smm adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present with special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (low), integrity (low) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (low), integrity (low) and availability (none) impacts. |
2026-02-10T16:25:36.350Z | 2026-02-11T04:56:25.392Z |
| CVE-2025-30513 |
7.9 (3.1)
|
Race condition for some TDX Module within Ring 0:… |
n/a |
TDX Module |
2026-02-10T16:25:34.696Z | 2026-02-11T04:56:24.566Z |
| CVE-2025-22885 |
4.7 (3.1)
|
Improper buffer restrictions in the firmware for … |
n/a |
TDX Module may allow an escalation of privilege. System software adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are not present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (low) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts. |
2026-02-10T16:25:15.071Z | 2026-02-11T04:56:23.773Z |
| CVE-2025-35998 |
7.9 (3.1)
|
Missing protection mechanism for alternate hardwa… |
n/a |
Intel(R) Platforms |
2026-02-10T16:26:00.829Z | 2026-02-11T04:56:22.180Z |
| CVE-2025-20106 |
6.7 (3.1)
|
Uncontrolled search path in some software install… |
n/a |
VTune(TM) Profiler software and Intel(R) oneAPI Base Toolkits |
2026-02-10T16:25:09.734Z | 2026-02-11T04:56:22.930Z |
| CVE-2026-22153 |
7.5 (3.1)
|
An Authentication Bypass by Primary Weakness vuln… |
Fortinet |
FortiOS |
2026-02-10T15:39:12.214Z | 2026-02-11T04:56:20.557Z |
| CVE-2025-64157 |
6.7 (3.1)
|
A use of externally-controlled format string vuln… |
Fortinet |
FortiOS |
2026-02-10T15:39:12.760Z | 2026-02-11T04:56:18.863Z |
| CVE-2025-11142 |
7.1 (3.1)
|
The VAPIX API mediaclip.cgi that did not have a s… |
Axis Communications AB |
AXIS OS |
2026-02-10T05:32:19.555Z | 2026-02-11T04:56:18.086Z |
| CVE-2026-0508 |
7.3 (3.1)
|
Open Redirect vulnerability in SAP BusinessObjects Bus… |
SAP_SE |
SAP BusinessObjects Business Intelligence Platform |
2026-02-10T03:01:41.487Z | 2026-02-11T04:56:17.305Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2026-24868 |
6.5 (3.1)
|
Mitigation bypass in the Privacy: Anti-Tracking component |
Mozilla |
Firefox |
2026-01-27T15:58:48.472Z | 2026-02-06T20:20:29.530Z |
| CVE-2025-13502 |
7.5 (3.1)
|
Webkit: webkitgtk / wpe webkit: out-of-bounds read and… |
The WebKitGTK Team |
webkitgtk |
2025-11-25T08:02:26.022Z | 2026-02-06T20:06:26.302Z |
| CVE-2025-10622 |
8 (3.1)
|
Foreman: os command injection via ct_location and fcct… |
The Foreman |
Foreman |
2025-11-05T07:32:14.390Z | 2026-02-06T20:07:02.486Z |
| CVE-2007-2774 |
N/A
|
Multiple PHP remote file inclusion vulnerabilitie… |
n/a |
n/a |
2007-05-22T03:00:00.000Z | 2024-08-07T13:49:57.380Z |
| CVE-2025-58381 |
4.6 (4.0)
|
Directory transversal vulnerability in Brocade Fabric … |
Brocade |
Fabric OS |
2026-02-03T05:40:14.240Z | 2026-02-04T16:24:08.695Z |
| CVE-2025-58380 |
4.6 (4.0)
|
Directory transversal vulnerability in Brocade Fabric … |
Brocade |
Fabric OS |
2026-02-03T05:05:49.111Z | 2026-02-03T20:51:28.437Z |
| CVE-2026-0383 |
8.2 (4.0)
|
Information disclosure in Brocade Fabric OS before 9.2… |
Brocade |
Fabric OS |
2026-02-03T03:55:44.788Z | 2026-02-04T04:55:51.294Z |
| CVE-2025-58383 |
8.4 (4.0)
|
Privilege escalation via bind command in Brocade Fabric OS |
Brocade |
Fabric OS |
2026-02-03T01:49:18.962Z | 2026-02-04T04:55:46.301Z |
| CVE-2025-58379 |
6 (4.0)
|
Password Exposure in Brocade Fabric OS |
Brocade |
Fabric OS |
2026-02-03T01:55:09.736Z | 2026-02-03T15:31:23.455Z |
| CVE-2025-62157 |
8.5 (4.0)
|
Argo Workflows exposes artifact repository credentials… |
argoproj |
argo-workflows |
2025-10-14T15:06:39.829Z | 2025-10-14T16:06:02.367Z |
| CVE-2025-62156 |
8.1 (3.1)
|
argo-workflows Zip Slip path traversal allows arbitrar… |
argoproj |
argo-workflows |
2025-10-14T14:52:44.502Z | 2025-10-14T16:04:24.519Z |
| CVE-2024-53862 |
6.3 (4.0)
|
Argo Workflows Allows Access to Archived Workflows wit… |
argoproj |
argo-workflows |
2024-12-02T16:08:17.618Z | 2024-12-02T19:41:07.391Z |
| CVE-2024-47827 |
5.7 (3.1)
|
Argo Workflows Controller: Denial of Service via malic… |
argoproj |
argo-workflows |
2024-10-28T15:10:55.772Z | 2025-04-04T20:43:57.325Z |
| CVE-2022-29164 |
7.1 (3.1)
|
Privilege Escalation in argo-workflows |
argoproj |
argo-workflows |
2022-05-05T23:15:12.000Z | 2025-04-23T18:30:26.977Z |
| CVE-2025-15537 |
4.8 (4.0)
5.3 (3.1)
5.3 (3.0)
|
Mapnik dbfile.cpp string_value heap-based overflow |
n/a |
Mapnik |
2026-01-18T10:02:07.636Z | 2026-01-20T16:53:04.476Z |
| CVE-2025-15536 |
4.8 (4.0)
5.3 (3.1)
5.3 (3.0)
|
BYVoid OpenCC MaxMatchSegmentation.cpp MaxMatchSegment… |
BYVoid |
OpenCC |
2026-01-18T09:02:12.026Z | 2026-01-20T17:07:00.359Z |
| CVE-2026-24052 |
7.1 (4.0)
|
Claude Code has a Domain Validation Bypass which Allow… |
anthropics |
claude-code |
2026-02-03T20:49:41.997Z | 2026-02-04T20:00:11.786Z |
| CVE-2023-3708 |
6.1 (3.1)
|
Several themes for WordPress by DeoThemes are vul… |
deothemes |
Everse |
2023-07-18T02:01:06.298Z | 2025-02-05T19:39:34.773Z |
| CVE-2025-58185 |
5.3 (3.1)
|
Parsing DER payload can cause memory exhaustion in enc… |
Go standard library |
encoding/asn1 |
2025-10-29T22:10:13.682Z | 2025-11-04T21:13:34.163Z |
| CVE-2026-24053 |
7.7 (4.0)
|
Cluade Code has a Path Restriction Bypass via ZSH Clob… |
anthropics |
claude-code |
2026-02-03T20:49:59.261Z | 2026-02-03T21:22:27.265Z |
| CVE-2026-24887 |
7.7 (4.0)
|
Claude Code has a Command Injection in find Command By… |
anthropics |
claude-code |
2026-02-03T20:50:25.263Z | 2026-02-03T21:19:42.986Z |
| CVE-2026-1105 |
6.9 (4.0)
7.3 (3.1)
7.3 (3.0)
|
EasyCMS UserAction.class.php sql injection |
n/a |
EasyCMS |
2026-01-17T23:32:05.684Z | 2026-01-20T17:22:00.440Z |
| CVE-2025-58382 |
8.5 (4.0)
|
Privilege escalation in Brocade Fabric before 9.2.1c2 … |
Brocade |
Fabric OS |
2026-02-03T01:39:55.349Z | 2026-02-04T04:55:47.119Z |
| CVE-2025-68669 |
9.7 (3.1)
|
5ire vulnerable to Remote Code Execution (RCE) via mermaid |
nanbingxyz |
5ire |
2025-12-23T22:51:35.848Z | 2026-02-06T19:29:07.289Z |
| CVE-2025-68398 |
9.1 (3.1)
|
Weblate has git config file overwrite vulnerability th… |
WeblateOrg |
weblate |
2025-12-18T23:00:57.790Z | 2026-02-06T19:28:18.370Z |
| CVE-2025-64483 |
5.3 (4.0)
|
Wazuh API – Agent Configuration Has Improper Access Co… |
wazuh |
wazuh-dashboard-plugins |
2025-11-21T17:55:33.219Z | 2026-02-06T19:24:00.537Z |
| CVE-2025-56005 |
9.8 (3.1)
|
An undocumented and unsafe feature in the PLY (Py… |
n/a |
n/a |
2026-01-20T00:00:00.000Z | 2026-02-06T19:55:53.916Z |
| CVE-2025-47279 |
3.1 (3.1)
|
undici Denial of Service attack via bad certificate data |
nodejs |
undici |
2025-05-15T17:16:02.738Z | 2026-02-06T19:14:56.281Z |
| CVE-2025-47270 |
7.5 (3.1)
|
nimiq-network-libp2p Uncontrolled Resource Consumption… |
nimiq |
core-rs-albatross |
2025-05-12T10:47:44.804Z | 2026-02-06T19:15:43.017Z |
| CVE-2025-46568 |
7.7 (4.0)
|
Stirling-PDF Server-Side Request Forgery (SSRF)-Induce… |
Stirling-Tools |
Stirling-PDF |
2025-05-01T17:20:46.488Z | 2026-02-06T19:19:06.041Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2026-24868 | Mitigation bypass in the Privacy: Anti-Tracking component. This vulnerability affects Firefox < 147.0.2. | 2026-01-27T16:16:36.173 | 2026-02-06T21:16:16.923 |
| fkie_cve-2025-13502 | A flaw was found in WebKitGTK and WPE WebKit. This vulnerability allows an out-of-bounds read and i… | 2025-11-25T08:15:51.917 | 2026-02-06T21:16:15.390 |
| fkie_cve-2025-10622 | A flaw was found in Red Hat Satellite (Foreman component). This vulnerability allows an authenticat… | 2025-11-05T08:15:32.990 | 2026-02-06T21:16:14.800 |
| fkie_cve-2007-2774 | Multiple PHP remote file inclusion vulnerabilities in SunLight CMS 5.3 allow remote attackers to ex… | 2007-05-21T23:30:00.000 | 2026-02-06T20:55:16.183 |
| fkie_cve-2025-58381 | A vulnerability in Brocade Fabric OS before 9.2.1c2 could allow an authenticated attacker with ad… | 2026-02-03T06:15:52.807 | 2026-02-06T20:53:22.197 |
| fkie_cve-2025-58380 | A vulnerability in Brocade Fabric OS before 9.2.1 could allow an authenticated attacker with admin … | 2026-02-03T05:16:21.673 | 2026-02-06T20:52:59.600 |
| fkie_cve-2026-0383 | A vulnerability in Brocade Fabric OS could allow an authenticated, local attacker with privileges t… | 2026-02-03T04:15:55.840 | 2026-02-06T20:52:11.827 |
| fkie_cve-2025-58383 | A vulnerability in Brocade Fabric OS versions before 9.2.1c2 could allow an administrator-level use… | 2026-02-03T02:16:07.260 | 2026-02-06T20:51:56.227 |
| fkie_cve-2025-58379 | Brocade Fabric OS before 9.2.1 has a vulnerability that could allow a local authenticated attacker … | 2026-02-03T02:16:06.970 | 2026-02-06T20:50:29.130 |
| fkie_cve-2025-62157 | Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs o… | 2025-10-14T15:16:12.853 | 2026-02-06T20:49:29.827 |
| fkie_cve-2025-62156 | Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs o… | 2025-10-14T15:16:12.683 | 2026-02-06T20:49:29.827 |
| fkie_cve-2024-53862 | Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs o… | 2024-12-02T16:15:14.277 | 2026-02-06T20:49:29.827 |
| fkie_cve-2024-47827 | Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs o… | 2024-10-28T16:15:03.990 | 2026-02-06T20:49:29.827 |
| fkie_cve-2022-29164 | Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs o… | 2022-05-06T00:15:07.990 | 2026-02-06T20:49:29.827 |
| fkie_cve-2025-15537 | A security vulnerability has been detected in Mapnik up to 4.2.0. This issue affects the function m… | 2026-01-18T10:15:52.103 | 2026-02-06T20:31:38.243 |
| fkie_cve-2025-15536 | A weakness has been identified in BYVoid OpenCC up to 1.1.9. This vulnerability affects the functio… | 2026-01-18T09:15:46.960 | 2026-02-06T20:29:57.387 |
| fkie_cve-2026-24052 | Claude Code is an agentic coding tool. Prior to version 1.0.111, Claude Code contained insufficient… | 2026-02-03T21:16:13.073 | 2026-02-06T20:28:53.673 |
| fkie_cve-2023-3708 | Several themes for WordPress by DeoThemes are vulnerable to Reflected Cross-Site Scripting via brea… | 2023-07-18T03:15:55.897 | 2026-02-06T20:27:08.447 |
| fkie_cve-2025-58185 | Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory ex… | 2025-10-29T23:16:19.450 | 2026-02-06T20:26:41.997 |
| fkie_cve-2026-24053 | Claude Code is an agentic coding tool. Prior to version 2.0.74, due to a Bash command validation fl… | 2026-02-03T21:16:13.220 | 2026-02-06T20:24:38.630 |
| fkie_cve-2026-24887 | Claude Code is an agentic coding tool. Prior to version 2.0.72, due to an error in command parsing,… | 2026-02-03T21:16:13.433 | 2026-02-06T20:19:47.760 |
| fkie_cve-2026-1105 | A vulnerability was identified in EasyCMS up to 1.6. This vulnerability affects unknown code of the… | 2026-01-18T00:15:49.197 | 2026-02-06T20:19:46.550 |
| fkie_cve-2025-58382 | A vulnerability in the secure configuration of authentication and management services in Brocade F… | 2026-02-03T02:16:07.113 | 2026-02-06T20:17:35.887 |
| fkie_cve-2025-68669 | 5ire is a cross-platform desktop artificial intelligence assistant and model context protocol clien… | 2025-12-23T23:15:45.470 | 2026-02-06T20:16:08.757 |
| fkie_cve-2025-68398 | Weblate is a web based localization tool. In versions prior to 5.15.1, it was possible to overwrite… | 2025-12-18T23:15:49.720 | 2026-02-06T20:16:08.620 |
| fkie_cve-2025-64483 | Wazuh is a security detection, visibility, and compliance open source project. From version 4.9.0 t… | 2025-11-21T18:15:49.157 | 2026-02-06T20:16:08.450 |
| fkie_cve-2025-56005 | An undocumented and unsafe feature in the PLY (Python Lex-Yacc) library 3.11 allows Remote Code Exe… | 2026-01-20T19:15:49.247 | 2026-02-06T20:16:08.237 |
| fkie_cve-2025-47279 | Undici is an HTTP/1.1 client for Node.js. Prior to versions 5.29.0, 6.21.2, and 7.5.0, applications… | 2025-05-15T18:15:38.027 | 2026-02-06T20:16:08.110 |
| fkie_cve-2025-47270 | nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake protocol based on the … | 2025-05-12T11:15:51.050 | 2026-02-06T20:16:07.977 |
| fkie_cve-2025-46568 | Stirling-PDF is a locally hosted web application that allows you to perform various operations on P… | 2025-05-01T18:15:58.263 | 2026-02-06T20:16:07.790 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-chp8-x4w6-9g23 |
6.4 (3.1)
|
The Menu Icons by ThemeIsle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via t… | 2026-02-04T00:30:29Z | 2026-02-04T00:30:29Z |
| ghsa-8w6w-rh48-3q53 |
6.2 (3.1)
6.9 (4.0)
|
Easy Transfer 1.7 iOS mobile application contains a directory traversal vulnerability that allows r… | 2026-02-04T00:30:29Z | 2026-02-04T00:30:29Z |
| ghsa-85r5-hmf5-6gvm |
8.2 (3.1)
7.1 (4.0)
|
School ERP Pro 1.0 contains a SQL injection vulnerability in the 'es_messagesid' parameter that all… | 2026-02-04T00:30:29Z | 2026-02-04T00:30:29Z |
| ghsa-47wv-3h55-hmc6 |
7.5 (3.1)
8.7 (4.0)
|
Netis E1+ 1.2.32533 contains an information disclosure vulnerability that allows unauthenticated at… | 2026-02-04T00:30:29Z | 2026-02-04T00:30:29Z |
| ghsa-2rv2-xrc4-x25w |
5.3 (3.1)
5.1 (4.0)
|
Maian Support Helpdesk 4.3 contains a cross-site request forgery vulnerability that allows attacker… | 2026-02-04T00:30:29Z | 2026-02-04T00:30:29Z |
| ghsa-xwhw-cvrw-c9g5 |
8.2 (3.1)
8.8 (4.0)
|
Victor CMS version 1.0 contains a SQL injection vulnerability in the 'post' parameter on post.php t… | 2026-02-04T00:30:28Z | 2026-02-04T00:30:28Z |
| ghsa-xg2w-fg24-8449 |
9.8 (3.1)
8.6 (4.0)
|
CloudMe 1.11.2 contains a buffer overflow vulnerability that allows remote attackers to execute arb… | 2026-02-04T00:30:28Z | 2026-02-04T00:30:28Z |
| ghsa-xfh7-c2jg-4484 |
9.8 (3.1)
8.4 (4.0)
|
LanSend 3.2 contains a buffer overflow vulnerability in the Add Computers Wizard file import functi… | 2026-02-04T00:30:28Z | 2026-02-04T00:30:28Z |
| ghsa-v5w7-x5c5-8hg8 |
7.2 (3.1)
5.1 (4.0)
|
Victor CMS 1.0 contains a stored cross-site scripting vulnerability in the 'comment_author' POST pa… | 2026-02-04T00:30:28Z | 2026-02-04T00:30:28Z |
| ghsa-rrwv-g6g5-vj2p |
8.8 (3.1)
7.2 (4.0)
|
i-doit Open Source CMDB 1.14.1 contains a file deletion vulnerability in the import module that all… | 2026-02-04T00:30:28Z | 2026-02-04T00:30:28Z |
| ghsa-pw32-4hxv-cxrf |
6.5 (3.1)
6.9 (4.0)
|
Booked Scheduler 2.7.7 contains a directory traversal vulnerability in the manage_email_templates.p… | 2026-02-04T00:30:28Z | 2026-02-04T00:30:28Z |
| ghsa-pgrm-rf8r-q98p |
8.8 (3.1)
8.6 (4.0)
|
Victor CMS 1.0 contains an authenticated file upload vulnerability that allows administrators to up… | 2026-02-04T00:30:28Z | 2026-02-04T00:30:28Z |
| ghsa-p3xh-76cc-cfqr |
8.2 (3.1)
8.8 (4.0)
|
PHP AddressBook 9.0.0.1 contains a time-based blind SQL injection vulnerability that allows remote … | 2026-02-04T00:30:28Z | 2026-02-04T00:30:28Z |
| ghsa-mf84-vm8m-ccvx |
9.8 (3.1)
8.4 (4.0)
|
StreamRipper32 version 2.6 contains a buffer overflow vulnerability in the Station/Song Section tha… | 2026-02-04T00:30:28Z | 2026-02-04T00:30:28Z |
| ghsa-m7vh-5428-ff4x |
9.8 (3.1)
9.3 (4.0)
|
CraftCMS 3 vCard Plugin 1.0.0 contains a deserialization vulnerability that allows unauthenticated … | 2026-02-04T00:30:28Z | 2026-02-04T00:30:28Z |
| ghsa-m6x4-wg6v-8g95 |
9.8 (3.1)
8.4 (4.0)
|
GoldWave 5.70 contains a buffer overflow vulnerability that allows attackers to execute arbitrary c… | 2026-02-04T00:30:28Z | 2026-02-04T00:30:28Z |
| ghsa-j9p8-cc5q-cg54 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: net: cdc_ncm: Deal with too lo… | 2025-10-07T18:31:10Z | 2026-02-04T00:30:28Z |
| ghsa-fx96-q4hr-fjmm |
9.8 (3.1)
8.7 (4.0)
|
Konica Minolta FTP Utility 1.0 contains a buffer overflow vulnerability in the LIST command that al… | 2026-02-04T00:30:28Z | 2026-02-04T00:30:28Z |
| ghsa-c4p8-934f-4gvh |
9.8 (3.1)
7.2 (4.0)
|
webTareas 2.0.p8 contains a file deletion vulnerability in the print_layout.php administration comp… | 2026-02-04T00:30:28Z | 2026-02-04T00:30:28Z |
| ghsa-9jqj-4cr8-rr2f |
8.8 (3.1)
|
Heap buffer overflow in libvpx in Google Chrome prior to 144.0.7559.132 allowed a remote attacker t… | 2026-02-03T21:31:52Z | 2026-02-04T00:30:28Z |
| ghsa-867q-8rpr-vpph |
9.8 (3.1)
7.1 (4.0)
|
Filetto 1.0 FTP server contains a denial of service vulnerability in the FEAT command processing th… | 2026-02-04T00:30:28Z | 2026-02-04T00:30:28Z |
| ghsa-58j8-gxpr-8cgq |
7.1 (3.1)
7.1 (4.0)
|
Fishing Reservation System 7.5 contains multiple remote SQL injection vulnerabilities in admin.php,… | 2026-02-04T00:30:28Z | 2026-02-04T00:30:28Z |
| ghsa-56m3-w67j-49gp |
8.2 (3.1)
8.8 (4.0)
|
OXID eShop versions 6.x prior to 6.3.4 contains a SQL injection vulnerability in the 'sorting' para… | 2026-02-04T00:30:28Z | 2026-02-04T00:30:28Z |
| ghsa-3f5v-f3mc-6rj8 |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: drivers/perf: hisi: Don't migr… | 2025-10-07T18:31:10Z | 2026-02-04T00:30:28Z |
| ghsa-2rv9-m7pg-rvf8 |
9.8 (3.1)
8.7 (4.0)
|
Konica Minolta FTP Utility 1.0 contains a buffer overflow vulnerability in the NLST command that al… | 2026-02-04T00:30:28Z | 2026-02-04T00:30:28Z |
| ghsa-2f92-9qpx-3m87 |
9.8 (3.1)
8.4 (4.0)
|
Remote Desktop Audit 2.3.0.157 contains a buffer overflow vulnerability that allows attackers to ex… | 2026-02-04T00:30:28Z | 2026-02-04T00:30:28Z |
| ghsa-28x7-22j7-wrcc |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: fbdev: omapfb: lcd_mipid: Fix … | 2025-10-07T18:31:10Z | 2026-02-04T00:30:28Z |
| ghsa-wvjj-gc57-3w9j |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: nvme-tcp: don't access release… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:27Z |
| ghsa-w939-vjpg-j262 |
7.8 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: clk: microchip: fix potential … | 2025-10-07T18:31:09Z | 2026-02-04T00:30:27Z |
| ghsa-v8v9-wq25-mffx |
5.5 (3.1)
|
In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: fix wron… | 2025-10-07T18:31:09Z | 2026-02-04T00:30:27Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2020-98 |
|
Red Discord Bot Dashboard is an easy-to-use interactive web dashboard to control your Red… | red-dashboard | 2020-12-09T00:15:00Z | 2020-12-10T20:15:00Z |
| pysec-2020-163 |
|
A flaw was found in all python-ecdsa versions before 0.13.3, where it did not correctly v… | ecdsa | 2020-01-02T15:15:00Z | 2020-12-08T18:32:00Z |
| pysec-2020-68 |
|
OAuthenticator is an OAuth login mechanism for JupyterHub. In oauthenticator from version… | oauthenticator | 2020-12-01T21:15:00Z | 2020-12-08T17:50:00Z |
| pysec-2020-69 |
|
Python oic is a Python OpenID Connect implementation. In Python oic before version 1.2.1,… | oic | 2020-12-02T20:15:00Z | 2020-12-08T02:37:00Z |
| pysec-2020-108 |
|
** DISPUTED ** svm_predict_values in svm.cpp in Libsvm v324, as used in scikit-learn 0.23… | scikit-learn | 2020-11-21T21:15:00Z | 2020-12-03T18:50:00Z |
| pysec-2020-75 |
|
petl before 1.68, in some configurations, allows resolution of entities in an XML document. | petl | 2020-11-26T05:15:00Z | 2020-12-03T16:48:00Z |
| pysec-2020-74 |
|
Multiple cross-site scripting (XSS) vulnerabilities in Papermerge before 1.5.2 allow remo… | papermerge | 2020-12-02T08:15:00Z | 2020-12-02T16:29:00Z |
| pysec-2020-29 |
|
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker … | brotli | 2020-09-15T10:15:00Z | 2020-12-02T12:15:00Z |
| pysec-2020-157 |
|
Open redirect vulnerability in werkzeug before 0.11.6 via a double slash in the URL. | werkzeug | 2020-11-18T15:15:00Z | 2020-12-01T16:05:00Z |
| pysec-2020-18 |
|
The previous default setting for Airflow's Experimental API was to allow all API requests… | apache-airflow | 2020-11-10T16:15:00Z | 2020-11-24T17:29:00Z |
| pysec-2020-67 |
|
The cache action in action/cache.py in MoinMoin through 1.9.10 allows directory traversal… | moin | 2020-11-10T17:15:00Z | 2020-11-24T17:20:00Z |
| pysec-2020-159 |
|
In Alerta before version 8.1.0, users may be able to bypass LDAP authentication if they p… | alerta-server | 2020-11-06T18:15:00Z | 2020-11-17T21:08:00Z |
| pysec-2020-60 |
|
A stored cross-site scripting (XSS) vulnerability affects the Web UI in Locust before 1.3… | locust | 2020-11-09T21:15:00Z | 2020-11-17T20:37:00Z |
| pysec-2020-61 |
|
In lookatme (python/pypi package) versions prior to 2.3.0, the package automatically load… | lookatme | 2020-10-26T18:15:00Z | 2020-11-13T16:40:00Z |
| pysec-2020-142 |
|
A mis-handling of invalid unicode characters in the Java implementation of Tink versions … | tink | 2020-10-19T13:15:00Z | 2020-10-29T22:16:00Z |
| pysec-2020-134 |
|
In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved models in… | tensorflow | 2020-09-25T19:15:00Z | 2020-10-29T16:15:00Z |
| pysec-2020-133 |
|
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, if a TFLite sav… | tensorflow | 2020-09-25T19:15:00Z | 2020-10-29T16:15:00Z |
| pysec-2020-132 |
|
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, a crafted TFLit… | tensorflow | 2020-09-25T19:15:00Z | 2020-10-29T16:15:00Z |
| pysec-2020-131 |
|
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, when determinin… | tensorflow | 2020-09-25T19:15:00Z | 2020-10-29T16:15:00Z |
| pysec-2020-130 |
|
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, to mimic Python… | tensorflow | 2020-09-25T19:15:00Z | 2020-10-29T16:15:00Z |
| pysec-2020-129 |
|
In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, changing the TensorF… | tensorflow | 2020-09-25T19:15:00Z | 2020-10-29T16:15:00Z |
| pysec-2020-128 |
|
In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the `data_splits` ar… | tensorflow | 2020-09-25T19:15:00Z | 2020-10-29T16:15:00Z |
| pysec-2020-127 |
|
In eager mode, TensorFlow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1 does not … | tensorflow | 2020-09-25T19:15:00Z | 2020-10-29T16:15:00Z |
| pysec-2020-126 |
|
In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, by controlling the `… | tensorflow | 2020-09-25T19:15:00Z | 2020-10-29T16:15:00Z |
| pysec-2020-125 |
|
In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the `Shard` API in T… | tensorflow | 2020-09-25T19:15:00Z | 2020-10-29T16:15:00Z |
| pysec-2020-118 |
|
In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the implementation o… | tensorflow | 2020-09-25T19:15:00Z | 2020-10-29T16:15:00Z |
| pysec-2020-113 |
|
In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the `tf.raw_ops.Swit… | tensorflow | 2020-09-25T19:15:00Z | 2020-10-29T16:15:00Z |
| pysec-2020-59 |
|
** DISPUTED ** TAXII libtaxii through 1.1.117, as used in EclecticIQ OpenTAXII through 0.… | libtaxii | 2020-10-17T20:15:00Z | 2020-10-27T19:51:00Z |
| pysec-2020-174 |
|
In postfix-mta-sts-resolver before 0.5.1, All users can receive incorrect response from d… | postfix-mta-sts-resolver | 2020-01-22T02:15:00Z | 2020-10-23T18:18:00Z |
| pysec-2020-158 |
|
In xmpp-http-upload before version 0.4.0, when the GET method is attacked, attackers can … | xmpp-http-upload | 2020-10-06T19:15:00Z | 2020-10-23T03:09:00Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2024-31879 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.613249Z |
| gsd-2024-31878 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.644165Z |
| gsd-2024-31877 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.738866Z |
| gsd-2024-31876 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.852450Z |
| gsd-2024-31875 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.631317Z |
| gsd-2024-31874 | IBM Security Verify Access Appliance 10.0.0 through 10.0.7 uses uninitialized variables w… | 2024-04-11T05:03:20.620935Z |
| gsd-2024-31873 | IBM Security Verify Access Appliance 10.0.0 through 10.0.7 contains hard-coded credential… | 2024-04-11T05:03:20.600390Z |
| gsd-2024-31872 | IBM Security Verify Access Appliance 10.0.0 through 10.0.7 could allow a malicious actor … | 2024-04-11T05:03:20.879975Z |
| gsd-2024-31871 | IBM Security Verify Access Appliance 10.0.0 through 10.0.7 could allow a malicious actor … | 2024-04-11T05:03:20.860309Z |
| gsd-2024-31870 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.836350Z |
| gsd-2024-31869 | Airflow versions 2.7.0 through 2.8.4 have a vulnerability that allows an authenticated us… | 2024-04-11T05:03:20.611210Z |
| gsd-2024-31868 | Improper Encoding or Escaping of Output vulnerability in Apache Zeppelin. The attackers … | 2024-04-11T05:03:20.618204Z |
| gsd-2024-31867 | Improper Input Validation vulnerability in Apache Zeppelin. The attackers can execute ma… | 2024-04-11T05:03:20.546342Z |
| gsd-2024-31866 | Improper Encoding or Escaping of Output vulnerability in Apache Zeppelin. The attackers … | 2024-04-11T05:03:20.849640Z |
| gsd-2024-31865 | Improper Input Validation vulnerability in Apache Zeppelin. The attackers can call updat… | 2024-04-11T05:03:20.805627Z |
| gsd-2024-31864 | Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Zeppeli… | 2024-04-11T05:03:20.703763Z |
| gsd-2024-31863 | Authentication Bypass by Spoofing vulnerability by replacing to exsiting notes in Apache … | 2024-04-11T05:03:20.591588Z |
| gsd-2024-31862 | Improper Input Validation vulnerability in Apache Zeppelin when creating a new note from … | 2024-04-11T05:03:20.755438Z |
| gsd-2024-31861 | Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Zeppeli… | 2024-04-11T05:03:20.515250Z |
| gsd-2024-31860 | Improper Input Validation vulnerability in Apache Zeppelin. By adding relative path indi… | 2024-04-11T05:03:20.630164Z |
| gsd-2024-31855 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.652733Z |
| gsd-2024-31854 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.622258Z |
| gsd-2024-31853 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.771877Z |
| gsd-2024-31852 | LLVM before 18.1.3 generates code in which the LR register can be overwritten without dat… | 2024-04-11T05:03:20.662379Z |
| gsd-2024-31851 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.587536Z |
| gsd-2024-31850 | A path traversal vulnerability exists in the Java version of CData Arc < 23.4.8839 when r… | 2024-04-11T05:03:20.743412Z |
| gsd-2024-31849 | A path traversal vulnerability exists in the Java version of CData Connect < 23.4.8846 wh… | 2024-04-11T05:03:20.874114Z |
| gsd-2024-31848 | A path traversal vulnerability exists in the Java version of CData API Server < 23.4.8844… | 2024-04-11T05:03:20.859421Z |
| gsd-2024-31847 | The format of the source doesn't require a description, click on the link for more details. | 2024-04-11T05:03:20.650306Z |
| gsd-2024-31846 | An issue was discovered in Italtel Embrace 1.6.4. The web application does not restrict o… | 2024-04-11T05:03:20.765091Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2025-191675 | Malicious code in aiostreams (PyPI) | 2025-11-24T21:58:24Z | 2025-12-24T10:09:32Z |
| MAL-2024-6103 | Malicious code in termcolour (PyPI) | 2024-06-25T13:43:19Z | 2025-12-24T10:09:32Z |
| MAL-2024-5325 | Malicious code in libsock (PyPI) | 2024-06-25T13:36:56Z | 2025-12-24T10:09:32Z |
| MAL-2024-5323 | Malicious code in libproxy (PyPI) | 2024-06-25T13:36:55Z | 2025-12-24T10:09:32Z |
| MAL-2024-5221 | Malicious code in httprequesthub (PyPI) | 2024-06-25T13:36:05Z | 2025-12-24T10:09:32Z |
| MAL-2024-5101 | Malicious code in easyhttprequest (PyPI) | 2024-06-25T13:35:06Z | 2025-12-24T10:09:32Z |
| MAL-2024-11518 | Malicious code in aiocpa (PyPI) | 2024-12-09T06:49:42Z | 2025-12-24T10:09:32Z |
| mal-2025-66552 | Malicious code in vite-plugin-postcss-tools (npm) | 2025-11-11T00:04:35Z | 2025-12-24T10:09:31Z |
| mal-2025-66551 | Malicious code in tensor-fi-utils-lib (npm) | 2025-11-11T00:09:38Z | 2025-12-24T10:09:31Z |
| mal-2025-49372 | Malicious code in vite-smart-chunk (npm) | 2025-11-05T23:17:31Z | 2025-12-24T10:09:31Z |
| mal-2025-48951 | Malicious code in xdater (npm) | 2025-10-29T01:46:43Z | 2025-12-24T10:09:31Z |
| mal-2025-48915 | Malicious code in vite-plugin-es6-compat (npm) | 2025-10-28T01:39:47Z | 2025-12-24T10:09:31Z |
| mal-2025-48914 | Malicious code in vite-manual-chunker (npm) | 2025-10-28T01:44:03Z | 2025-12-24T10:09:31Z |
| mal-2025-48784 | Malicious code in vite-plugin-parsify (npm) | 2025-10-27T07:09:08Z | 2025-12-24T10:09:31Z |
| mal-2025-48599 | Malicious code in vite-compiler-tools (npm) | 2025-10-24T02:49:26Z | 2025-12-24T10:09:31Z |
| mal-2025-48426 | Malicious code in vite-plugin-parseflow (npm) | 2025-10-15T13:05:55Z | 2025-12-24T10:09:31Z |
| mal-2025-192656 | Malicious code in xvxx (npm) | 2025-12-19T08:41:06Z | 2025-12-24T10:09:31Z |
| mal-2025-192645 | Malicious code in vdous (npm) | 2025-12-19T08:41:06Z | 2025-12-24T10:09:31Z |
| mal-2025-192402 | Malicious code in wartsila-text-csv (npm) | 2025-12-10T01:44:48Z | 2025-12-24T10:09:31Z |
| mal-2025-192375 | Malicious code in tensor-fi-utils-core (npm) | 2025-12-08T03:36:17Z | 2025-12-24T10:09:31Z |
| mal-2025-191669 | Malicious code in wfui-dsm-react-ui (npm) | 2025-12-02T17:30:50Z | 2025-12-24T10:09:31Z |
| mal-2025-191668 | Malicious code in wfui-dbd-react-ui (npm) | 2025-12-02T17:36:00Z | 2025-12-24T10:09:31Z |
| mal-2025-191600 | Malicious code in vite-dynamic-chunks (npm) | 2025-12-01T13:29:03Z | 2025-12-24T10:09:31Z |
| mal-2025-191504 | Malicious code in testhaus (npm) | 2025-12-01T16:00:47Z | 2025-12-24T10:09:31Z |
| mal-2025-191474 | Malicious code in vite-dynachunk (npm) | 2025-11-26T04:53:42Z | 2025-12-24T10:09:31Z |
| mal-2025-191447 | Malicious code in vf-oss-template (npm) | 2025-11-25T00:16:49Z | 2025-12-24T10:09:31Z |
| mal-2025-190498 | Malicious code in validator-node (npm) | 2025-11-14T03:35:19Z | 2025-12-24T10:09:31Z |
| MAL-2025-66552 | Malicious code in vite-plugin-postcss-tools (npm) | 2025-11-11T00:04:35Z | 2025-12-24T10:09:31Z |
| MAL-2025-66551 | Malicious code in tensor-fi-utils-lib (npm) | 2025-11-11T00:09:38Z | 2025-12-24T10:09:31Z |
| MAL-2025-49372 | Malicious code in vite-smart-chunk (npm) | 2025-11-05T23:17:31Z | 2025-12-24T10:09:31Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-0095 | Fortinet Produkte: Mehrere Schwachstellen | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0094 | Microsoft Azure: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0092 | Microsoft Office: Mehrere Schwachstellen | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0089 | xwiki: Schwachstelle ermöglicht Privilegieneskalation | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0088 | Fortinet FortiOS: Mehrere Schwachstellen | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0087 | Fortinet FortiManager: Mehrere Schwachstellen | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0086 | Adobe Photoshop: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0085 | Adobe Creative Cloud Applikationen: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0083 | Fortinet FortiSIEM: Schwachstelle ermöglicht Denial of Service | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0082 | Fortinet FortiWeb: Mehrere Schwachstellen | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0081 | Fortinet FortiPortal: Mehrere Schwachstellen | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0080 | Fortinet FortiSandbox: Schwachstelle ermöglicht Codeausführung | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0079 | Fortinet FortiRecorder: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0078 | Linksys Router E5600: Mehrere Schwachstellen ermöglicht Cross-Site Scripting | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0077 | Node.js: Mehrere Schwachstellen ermöglichen nicht spezifizierte Angriffe | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0076 | Aruba ArubaOS: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0075 | Rancher: Schwachstelle ermöglicht Cross-Site Scripting | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0074 | Arista EOS: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0073 | Ivanti Avalanche: Mehrere Schwachstellen | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0071 | Fortinet FortiClient: Mehrere Schwachstellen | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0069 | Fortinet FortiSwitch: Mehrere Schwachstellen ermöglichen Codeausführung | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0068 | Fortinet FortiRecorder: Schwachstelle ermöglicht Manipulation von Dateien | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0067 | Fortinet FortiSIEM: Schwachstelle ermöglicht Offenlegung von Informationen | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0066 | Fortinet FortiMail: Schwachstelle ermöglicht Codeausführung | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0065 | Fortinet FortiVoice: Mehrere Schwachstellen | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0062 | Phoenix Technologies BIOS: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-01-14T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0060 | PowerDNS: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes | 2018-05-10T22:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0059 | PowerDNS: Mehrere Schwachstellen ermöglichen Denial of Service | 2018-11-06T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0058 | PowerDNS: Mehrere Schwachstellen | 2020-09-22T22:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0050 | Mozilla Firefox: Mehrere Schwachstellen ermöglichen das Darstellen falscher Informationen | 2025-01-12T23:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2020:5198 | Red Hat Security Advisory: Red Hat OpenShift Jaeger security update | 2020-11-24T09:02:25+00:00 | 2026-02-18T16:24:24+00:00 |
| rhsa-2020:5149 | Red Hat Security Advisory: Release of OpenShift Serverless 1.11.0 | 2020-11-18T15:05:44+00:00 | 2026-02-18T16:24:24+00:00 |
| rhsa-2020:5056 | Red Hat Security Advisory: podman security and bug fix update | 2020-11-10T13:54:40+00:00 | 2026-02-18T16:24:24+00:00 |
| rhsa-2020:5055 | Red Hat Security Advisory: buildah security update | 2020-11-10T13:55:01+00:00 | 2026-02-18T16:24:24+00:00 |
| rhsa-2020:5054 | Red Hat Security Advisory: skopeo security update | 2020-11-10T13:54:32+00:00 | 2026-02-18T16:24:22+00:00 |
| rhsa-2020:3783 | Red Hat Security Advisory: OpenShift Container Platform 4.4.23 cluster-network-operator-container security update | 2020-09-22T07:15:37+00:00 | 2026-02-18T16:24:22+00:00 |
| rhsa-2020:4297 | Red Hat Security Advisory: OpenShift Container Platform 4.6.1 package security update | 2020-10-27T14:53:57+00:00 | 2026-02-18T16:24:21+00:00 |
| rhsa-2020:4694 | Red Hat Security Advisory: container-tools:rhel8 security, bug fix, and enhancement update | 2020-11-04T01:34:32+00:00 | 2026-02-18T16:24:19+00:00 |
| rhsa-2020:4214 | Red Hat Security Advisory: go-toolset-1.13-golang security and bug fix update | 2020-10-08T10:52:13+00:00 | 2026-02-18T16:24:17+00:00 |
| rhsa-2020:3780 | Red Hat Security Advisory: OpenShift Container Platform 4.5.11 ose-cluster-svcat-apiserver-operator-container security update | 2020-09-21T19:50:11+00:00 | 2026-02-18T16:24:16+00:00 |
| rhsa-2020:3727 | Red Hat Security Advisory: OpenShift Container Platform 3.11.286 security update | 2020-09-16T07:55:58+00:00 | 2026-02-18T16:24:16+00:00 |
| rhsa-2020:3665 | Red Hat Security Advisory: go-toolset:rhel8 security update | 2020-09-08T10:05:46+00:00 | 2026-02-18T16:24:16+00:00 |
| rhsa-2020:3578 | Red Hat Security Advisory: OpenShift Container Platform 4.5.8 security update | 2020-09-08T10:09:31+00:00 | 2026-02-18T16:24:14+00:00 |
| rhsa-2020:3087 | Red Hat Security Advisory: Red Hat OpenShift Jaeger 1.17.5 container images security update | 2020-07-22T07:33:26+00:00 | 2026-02-18T16:24:12+00:00 |
| rhsa-2021:4765 | Red Hat Security Advisory: Release of OpenShift Serverless Client kn 1.19.0 | 2021-11-23T08:45:19+00:00 | 2026-02-18T16:24:09+00:00 |
| rhsa-2023:1334 | Red Hat Security Advisory: Red Hat Process Automation Manager 7.13.2 security update | 2023-03-20T09:15:52+00:00 | 2026-02-18T16:24:06+00:00 |
| rhsa-2022:0687 | Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.0.1 security and bug fix update | 2022-02-28T21:18:28+00:00 | 2026-02-18T16:24:03+00:00 |
| rhsa-2022:0230 | Red Hat Security Advisory: Red Hat OpenShift Enterprise Logging bug fix and security update (5.2.6) | 2022-01-21T19:04:46+00:00 | 2026-02-18T16:24:02+00:00 |
| rhsa-2022:0227 | Red Hat Security Advisory: Red Hat OpenShift Enterprise Logging bug fix and security update (5.3.3) | 2022-01-20T21:40:25+00:00 | 2026-02-18T16:24:02+00:00 |
| rhsa-2022:0226 | Red Hat Security Advisory: Red Hat OpenShift Enterprise Logging bug fix and security update (5.1.7) | 2022-01-20T21:39:00+00:00 | 2026-02-18T16:24:01+00:00 |
| rhsa-2021:4424 | Red Hat Security Advisory: openssl security and bug fix update | 2021-11-09T18:08:40+00:00 | 2026-02-18T16:24:00+00:00 |
| rhsa-2021:4628 | Red Hat Security Advisory: Openshift Logging 5.1.4 bug fix and security update | 2021-11-17T02:22:53+00:00 | 2026-02-18T16:23:59+00:00 |
| rhsa-2021:4226 | Red Hat Security Advisory: grafana security, bug fix, and enhancement update | 2021-11-09T18:42:22+00:00 | 2026-02-18T16:23:56+00:00 |
| rhsa-2021:4198 | Red Hat Security Advisory: edk2 security, bug fix, and enhancement update | 2021-11-09T18:33:45+00:00 | 2026-02-18T16:23:55+00:00 |
| rhsa-2021:4032 | Red Hat Security Advisory: Openshift Logging 5.2.3 bug fix and security update | 2021-11-17T03:31:35+00:00 | 2026-02-18T16:23:55+00:00 |
| rhsa-2021:3798 | Red Hat Security Advisory: openssl security update | 2021-10-12T16:13:14+00:00 | 2026-02-18T16:23:55+00:00 |
| rhsa-2021:3024 | Red Hat Security Advisory: Red Hat OpenShift Jaeger 1.24.0 Operator/Operand Containers security update | 2021-08-09T07:28:44+00:00 | 2026-02-18T16:23:49+00:00 |
| rhsa-2021:2034 | Red Hat Security Advisory: redis:6 security update | 2021-05-19T10:23:08+00:00 | 2026-02-18T16:23:47+00:00 |
| rhsa-2021:2500 | Red Hat Security Advisory: Red Hat OpenShift Enterprise security and bug fix update | 2021-06-29T06:30:05+00:00 | 2026-02-18T16:23:46+00:00 |
| rhsa-2021:2461 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.2.4 security and bug fix update | 2021-06-16T19:26:01+00:00 | 2026-02-18T16:23:45+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-20-063-03 | Omron PLC CJ Series | 2020-03-03T00:00:00.000000Z | 2020-03-03T00:00:00.000000Z |
| icsa-20-063-02 | ICSA-20-063-02_PHOENIX CONTACT Emalytics Controller ILC | 2020-03-03T00:00:00.000000Z | 2020-03-03T00:00:00.000000Z |
| icsa-20-063-01 | Emerson ValveLink | 2020-03-03T00:00:00.000000Z | 2020-03-03T00:00:00.000000Z |
| icsa-20-056-05 | Honeywell WIN-PAK | 2020-02-25T00:00:00.000000Z | 2020-02-25T00:00:00.000000Z |
| icsa-20-056-04 | Moxa EDS-G516E and EDS-510E Series Ethernet Switches | 2020-02-25T00:00:00.000000Z | 2020-02-25T00:00:00.000000Z |
| icsa-20-056-03 | Moxa PT-7528 and PT-7828 Series Ethernet Switches | 2020-02-25T00:00:00.000000Z | 2020-02-25T00:00:00.000000Z |
| icsa-20-056-02 | Moxa ioLogik 2542-HSPA Series Controllers and IOs, and IOxpress Configuration Utility | 2020-02-25T00:00:00.000000Z | 2020-02-25T00:00:00.000000Z |
| icsa-20-056-01 | Moxa MB3xxx Series Protocol Gateways | 2020-02-25T00:00:00.000000Z | 2020-02-25T00:00:00.000000Z |
| icsa-20-051-04 | Auto-Maskin RP210E, DCU210E, and Marine Observer Pro (Android App) | 2020-02-20T00:00:00.000000Z | 2020-02-20T00:00:00.000000Z |
| icsa-20-051-03 | Honeywell NOTI-FIRE-NET Web Server (NWS-3) | 2020-02-20T00:00:00.000000Z | 2020-02-20T00:00:00.000000Z |
| icsa-20-051-02 | Rockwell Automation FactoryTalk Diagnostics | 2020-02-20T00:00:00.000000Z | 2020-02-20T00:00:00.000000Z |
| icsa-20-051-01 | ICSA-20-051-01_B&R Automation Studio and Automation Runtime | 2020-02-20T00:00:00.000000Z | 2020-02-20T00:00:00.000000Z |
| icsma-20-049-01 | Spacelabs Xhibit Telemetry Receiver (XTR) | 2020-02-18T00:00:00.000000Z | 2020-02-18T00:00:00.000000Z |
| icsa-20-049-02 | Emerson OpenEnterprise | 2020-02-18T00:00:00.000000Z | 2020-02-18T00:00:00.000000Z |
| icsa-20-049-01 | Honeywell INNCOM INNControl 3 | 2020-02-18T00:00:00.000000Z | 2020-02-18T00:00:00.000000Z |
| icsa-20-044-02 | Schneider Electric Magelis HMI Panels | 2020-02-13T00:00:00.000000Z | 2020-02-13T00:00:00.000000Z |
| icsa-20-044-01 | Schneider Electric Modicon Ethernet Serial RTU | 2020-02-13T00:00:00.000000Z | 2020-02-13T00:00:00.000000Z |
| icsa-20-042-13 | Digi ConnectPort LTS 32 MEI | 2020-02-11T00:00:00.000000Z | 2020-02-11T00:00:00.000000Z |
| icsa-20-042-12 | Siemens SIPROTEC 4 and SIPROTEC Compact | 2020-02-11T00:00:00.000000Z | 2020-02-11T00:00:00.000000Z |
| icsa-20-042-09 | Siemens OZW Web Server | 2020-02-11T00:00:00.000000Z | 2020-02-11T00:00:00.000000Z |
| icsa-20-042-08 | Siemens SIPORT MP | 2020-02-11T00:00:00.000000Z | 2020-02-11T00:00:00.000000Z |
| icsa-20-042-03 | Siemens SIMATIC CP 1543-1 | 2020-02-11T00:00:00.000000Z | 2020-02-11T00:00:00.000000Z |
| icsa-19-162-03 | Siemens LOGO!8 Devices | 2019-06-11T00:00:00.000000Z | 2020-02-10T00:00:00.000000Z |
| icsa-19-099-01 | Siemens SIMOCODE pro V EIP | 2019-04-09T00:00:00.000000Z | 2020-02-10T00:00:00.000000Z |
| icsa-19-043-05 | Siemens Intel Active Management Technology of SIMATIC IPCs | 2019-02-12T00:00:00.000000Z | 2020-02-10T00:00:00.000000Z |
| icsa-19-043-04 | Siemens SIMATIC S7-300 CPU | 2019-01-08T00:00:00.000000Z | 2020-02-10T00:00:00.000000Z |
| icsa-19-036-04 | Siemens SIMATIC S7-1500 CPU | 2019-01-08T00:00:00.000000Z | 2020-02-10T00:00:00.000000Z |
| icsa-18-352-05 | Siemens TIM 1531 IRC Modules | 2018-12-11T00:00:00.000000Z | 2020-02-10T00:00:00.000000Z |
| icsa-18-317-08 | Siemens SIMATIC Panels | 2018-11-13T00:00:00.000000Z | 2020-02-10T00:00:00.000000Z |
| icsa-18-317-05 | Siemens SIMATIC S7 (Update A) | 2018-11-13T00:00:00.000000Z | 2020-02-10T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-sdwclici-cvrqph9v | Cisco SD-WAN Solution Command Injection Vulnerability | 2020-03-18T16:00:00+00:00 | 2020-03-18T16:00:00+00:00 |
| cisco-sa-sdwclici-cvrQpH9v | Cisco SD-WAN Solution Command Injection Vulnerability | 2020-03-18T16:00:00+00:00 | 2020-03-18T16:00:00+00:00 |
| cisco-sa-20200318-vmanage-cypher-inject | Cisco SD-WAN Solution vManage SQL Injection Vulnerability | 2020-03-18T16:00:00+00:00 | 2020-03-18T16:00:00+00:00 |
| cisco-sa-20200226-fxos-cli-file | Cisco FXOS Software CLI Arbitrary File Read and Write Vulnerability | 2020-02-26T16:00:00+00:00 | 2020-03-10T18:18:14+00:00 |
| cisco-sa-20200226-fxos-nxos-cdp | Cisco FXOS and NX-OS Software Cisco Discovery Protocol Arbitrary Code Execution and Denial of Service Vulnerability | 2020-02-26T16:00:00+00:00 | 2020-03-06T16:42:38+00:00 |
| cisco-sa-20200226-fxos-ucs-cli-cmdinj | Cisco FXOS and UCS Manager Software Local Management CLI Command Injection Vulnerability | 2020-02-26T16:00:00+00:00 | 2020-03-06T16:42:36+00:00 |
| cisco-sa-20200226-fxos-ucs-cmdinj | Cisco FXOS and UCS Manager Software CLI Command Injection Vulnerability | 2020-02-26T16:00:00+00:00 | 2020-03-06T16:42:35+00:00 |
| cisco-sa-esa-resource-exhaust-d7rqahnd | Cisco Email Security Appliance Uncontrolled Resource Exhaustion Vulnerability | 2020-03-04T16:00:00+00:00 | 2020-03-05T15:50:15+00:00 |
| cisco-sa-esa-resource-exhaust-D7RQAhnD | Cisco Email Security Appliance Uncontrolled Resource Exhaustion Vulnerability | 2020-03-04T16:00:00+00:00 | 2020-03-05T15:50:15+00:00 |
| cisco-sa-webex-info-disc-ohqg982 | Cisco Webex Meetings Client for MacOS Information Disclosure Vulnerability | 2020-03-04T16:00:00+00:00 | 2020-03-04T16:00:00+00:00 |
| cisco-sa-webex-info-disc-OHqg982 | Cisco Webex Meetings Client for MacOS Information Disclosure Vulnerability | 2020-03-04T16:00:00+00:00 | 2020-03-04T16:00:00+00:00 |
| cisco-sa-tms-xss-4vxkdlo | Cisco TelePresence Management Suite Stored Cross-Site Scripting Vulnerability | 2020-03-04T16:00:00+00:00 | 2020-03-04T16:00:00+00:00 |
| cisco-sa-tms-xss-4VXKdLO | Cisco TelePresence Management Suite Stored Cross-Site Scripting Vulnerability | 2020-03-04T16:00:00+00:00 | 2020-03-04T16:00:00+00:00 |
| cisco-sa-rphy-cmdinject-dpejetgf | Cisco Remote PHY Device Software Command Injection Vulnerability | 2020-03-04T16:00:00+00:00 | 2020-03-04T16:00:00+00:00 |
| cisco-sa-rphy-cmdinject-DpEjeTgF | Cisco Remote PHY Device Software Command Injection Vulnerability | 2020-03-04T16:00:00+00:00 | 2020-03-04T16:00:00+00:00 |
| cisco-sa-prime-collab-xss-rjrce9n7 | Cisco Prime Collaboration Provisioning Cross-Site Scripting Vulnerability | 2020-03-04T16:00:00+00:00 | 2020-03-04T16:00:00+00:00 |
| cisco-sa-prime-collab-xss-RjRCe9n7 | Cisco Prime Collaboration Provisioning Cross-Site Scripting Vulnerability | 2020-03-04T16:00:00+00:00 | 2020-03-04T16:00:00+00:00 |
| cisco-sa-prim-collab-disclo-fanx4dkb | Cisco Prime Collaboration Provisioning Information Disclosure Vulnerability | 2020-03-04T16:00:00+00:00 | 2020-03-04T16:00:00+00:00 |
| cisco-sa-prim-collab-disclo-FAnX4DKB | Cisco Prime Collaboration Provisioning Information Disclosure Vulnerability | 2020-03-04T16:00:00+00:00 | 2020-03-04T16:00:00+00:00 |
| cisco-sa-ise-xss-br7nedjg | Cisco Identity Services Engine Cross-Site Scripting Vulnerability | 2020-03-04T16:00:00+00:00 | 2020-03-04T16:00:00+00:00 |
| cisco-sa-ise-xss-BR7nEDjG | Cisco Identity Services Engine Cross-Site Scripting Vulnerability | 2020-03-04T16:00:00+00:00 | 2020-03-04T16:00:00+00:00 |
| cisco-sa-iosxr-ipsec-dos-q8upx6m | Cisco IOS XR Software IPsec Packet Processor Denial of Service Vulnerability | 2020-03-04T16:00:00+00:00 | 2020-03-04T16:00:00+00:00 |
| cisco-sa-iosxr-ipsec-dos-q8UPX6m | Cisco IOS XR Software IPsec Packet Processor Denial of Service Vulnerability | 2020-03-04T16:00:00+00:00 | 2020-03-04T16:00:00+00:00 |
| cisco-sa-cpnr-csrf-wwtrdkyl | Cisco Prime Network Registrar Cross-Site Request Forgery Vulnerability | 2020-03-04T16:00:00+00:00 | 2020-03-04T16:00:00+00:00 |
| cisco-sa-cpnr-csrf-WWTrDkyL | Cisco Prime Network Registrar Cross-Site Request Forgery Vulnerability | 2020-03-04T16:00:00+00:00 | 2020-03-04T16:00:00+00:00 |
| cisco-sa-cont-sec-gui-dos-nj625dxb | Cisco ESA, Cisco WSA, and Cisco SMA GUI Denial of Service Vulnerability | 2020-03-04T16:00:00+00:00 | 2020-03-04T16:00:00+00:00 |
| cisco-sa-cont-sec-gui-dos-nJ625dXb | Cisco ESA, Cisco WSA, and Cisco SMA GUI Denial of Service Vulnerability | 2020-03-04T16:00:00+00:00 | 2020-03-04T16:00:00+00:00 |
| cisco-sa-20200304-webex-player | Cisco Webex Network Recording Player and Cisco Webex Player Arbitrary Code Execution Vulnerabilities | 2020-03-04T16:00:00+00:00 | 2020-03-04T16:00:00+00:00 |
| cisco-sa-20200226-ucs-cli-cmdinj | Cisco UCS Manager Software Local Management CLI Command Injection Vulnerability | 2020-02-26T16:00:00+00:00 | 2020-02-26T16:00:00+00:00 |
| cisco-sa-20200226-nxos-bgpmd5 | Cisco NX-OS Software Border Gateway Protocol MD5 Authentication Bypass Vulnerability | 2020-02-26T16:00:00+00:00 | 2020-02-26T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2025-40095 | usb: gadget: f_rndis: Refactor bind path to use __free() | 2025-10-02T00:00:00.000Z | 2025-10-31T01:09:26.000Z |
| msrc_cve-2025-58189 | ALPN negotiation error contains attacker controlled information in crypto/tls | 2025-10-02T00:00:00.000Z | 2025-10-31T01:09:20.000Z |
| msrc_cve-2025-21838 | usb: gadget: core: flush gadget workqueue after device removal | 2025-03-02T00:00:00.000Z | 2025-10-31T01:03:01.000Z |
| msrc_cve-2025-21831 | PCI: Avoid putting some root ports into D3 on TUXEDO Sirius Gen1 | 2025-03-02T00:00:00.000Z | 2025-10-31T01:02:56.000Z |
| msrc_cve-2025-60711 | Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | 2025-10-14T00:00:00.000Z | 2025-10-31T00:00:00.000Z |
| msrc_cve-2025-53783 | Microsoft Teams Remote Code Execution Vulnerability | 2025-08-12T07:00:00.000Z | 2025-10-30T07:00:00.000Z |
| msrc_cve-2025-21750 | wifi: brcmfmac: Check the return value of of_property_read_string_index() | 2025-02-02T00:00:00.000Z | 2025-10-30T01:01:57.000Z |
| msrc_cve-2025-21738 | ata: libata-sff: Ensure that we cannot write outside the allocated buffer | 2025-02-02T00:00:00.000Z | 2025-10-30T01:01:51.000Z |
| msrc_cve-2025-21734 | misc: fastrpc: Fix copy buffer page size | 2025-02-02T00:00:00.000Z | 2025-10-30T01:01:46.000Z |
| msrc_cve-2023-52981 | drm/i915: Fix request ref counting during error capture & debugfs dump | 2025-03-02T00:00:00.000Z | 2025-10-30T01:01:26.000Z |
| msrc_cve-2024-58094 | jfs: add check read-only before truncation in jfs_truncate_nolock() | 2025-04-02T00:00:00.000Z | 2025-10-30T01:01:20.000Z |
| msrc_cve-2025-40071 | tty: n_gsm: Don't block input queue by waiting MSC | 2025-10-02T00:00:00.000Z | 2025-10-29T01:05:06.000Z |
| msrc_cve-2025-40079 | riscv, bpf: Sign extend struct ops return values properly | 2025-10-02T00:00:00.000Z | 2025-10-29T01:05:01.000Z |
| msrc_cve-2025-40068 | fs: ntfs3: Fix integer overflow in run_unpack() | 2025-10-02T00:00:00.000Z | 2025-10-29T01:04:55.000Z |
| msrc_cve-2025-40027 | net/9p: fix double req put in p9_fd_cancelled | 2025-10-02T00:00:00.000Z | 2025-10-29T01:04:34.000Z |
| msrc_cve-2025-11840 | GNU Binutils ldmisc.c vfinfo out-of-bounds | 2025-10-02T00:00:00.000Z | 2025-10-29T01:04:28.000Z |
| msrc_cve-2025-40049 | Squashfs: fix uninit-value in squashfs_get_parent | 2025-10-02T00:00:00.000Z | 2025-10-29T01:04:20.000Z |
| msrc_cve-2025-40081 | perf: arm_spe: Prevent overflow in PERF_IDX2OFF() | 2025-10-02T00:00:00.000Z | 2025-10-29T01:04:15.000Z |
| msrc_cve-2025-40048 | uio_hv_generic: Let userspace take care of interrupt mask | 2025-10-02T00:00:00.000Z | 2025-10-29T01:04:10.000Z |
| msrc_cve-2025-40036 | misc: fastrpc: fix possible map leak in fastrpc_put_args | 2025-10-02T00:00:00.000Z | 2025-10-29T01:04:04.000Z |
| msrc_cve-2025-40039 | ksmbd: Fix race condition in RPC handle list access | 2025-10-02T00:00:00.000Z | 2025-10-29T01:03:59.000Z |
| msrc_cve-2025-40043 | net: nfc: nci: Add parameter validation for packet data | 2025-10-02T00:00:00.000Z | 2025-10-29T01:03:54.000Z |
| msrc_cve-2025-40033 | remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable() | 2025-10-02T00:00:00.000Z | 2025-10-29T01:03:37.000Z |
| msrc_cve-2025-40077 | f2fs: fix to avoid overflow while left shift operation | 2025-10-02T00:00:00.000Z | 2025-10-29T01:03:32.000Z |
| msrc_cve-2025-40032 | PCI: endpoint: pci-epf-test: Add NULL check for DMA channels before release | 2025-10-02T00:00:00.000Z | 2025-10-29T01:03:26.000Z |
| msrc_cve-2025-40080 | nbd: restrict sockets to TCP and UDP | 2025-10-02T00:00:00.000Z | 2025-10-29T01:03:21.000Z |
| msrc_cve-2025-40060 | coresight: trbe: Return NULL pointer for allocation failures | 2025-10-02T00:00:00.000Z | 2025-10-29T01:03:16.000Z |
| msrc_cve-2025-40026 | KVM: x86: Don't (re)check L1 intercepts when completing userspace I/O | 2025-10-02T00:00:00.000Z | 2025-10-29T01:03:10.000Z |
| msrc_cve-2025-40056 | vhost: vringh: Fix copy_to_iter return value check | 2025-10-02T00:00:00.000Z | 2025-10-29T01:02:59.000Z |
| msrc_cve-2025-40051 | vhost: vringh: Modify the return value check | 2025-10-02T00:00:00.000Z | 2025-10-29T01:02:54.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:13330-1 | libnss_slurm2-23.02.6-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13329-1 | jetty-annotations-9.4.53-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13328-1 | grub2-2.12~rc1-5.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13327-1 | go1.21-1.21.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13326-1 | go1.20-1.20.10-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13325-1 | curl-8.4.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13324-1 | tuxguitar-1.6.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13323-1 | rxvt-unicode-9.31-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13322-1 | libopenconnect5-9.12-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13321-1 | libeverest-3.5.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13320-1 | matrix-synapse-1.94.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13319-1 | libcue-devel-2.3.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13318-1 | erofs-utils-1.7-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13317-1 | chromedriver-118.0.5993.70-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13316-1 | borgbackup-1.2.6-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13315-1 | shadowsocks-rust-1.16.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13314-1 | opensc-0.23.0-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13313-1 | gpp-2.28-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13312-1 | eclipse-jgit-5.11.0-9.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13311-1 | ansible-core-2.15.5-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13310-1 | libwireshark16-4.0.10-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13309-1 | plexus-archiver-4.8.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13308-1 | libQt5Bootstrap-devel-static-32bit-5.15.11+kde134-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13307-1 | go1.21-1.21.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13306-1 | go1.20-1.20.9-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13305-1 | kernel-devel-6.5.6-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13304-1 | cargo-audit-advisory-db-20231007-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13303-1 | ungoogled-chromium-117.0.5938.149-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13302-1 | python310-urllib3_1-1.26.17-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:13301-1 | python310-urllib3-2.0.6-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2021-1105 | Heap-buffer-overflow in read_config | 2021-08-07T00:03:09.706987Z | 2022-04-13T03:04:35.827176Z |
| osv-2021-1104 | Heap-buffer-overflow in ap_escape_path_segment_buffer | 2021-08-07T00:00:39.489954Z | 2022-04-13T03:04:35.789780Z |
| osv-2021-1048 | Stack-buffer-overflow in INDEX_ORDERLY_RAM_Marshal | 2021-07-24T00:01:22.492962Z | 2022-04-13T03:04:35.878745Z |
| osv-2021-10 | Heap-buffer-overflow in sp_tohex | 2021-01-04T00:01:27.624698Z | 2022-04-13T03:04:35.662208Z |
| osv-2020-972 | Heap-buffer-overflow in ndpi_search_irc_tcp | 2020-07-22T21:49:36.913972Z | 2022-04-13T03:04:35.929330Z |
| osv-2020-956 | Heap-buffer-overflow in ndpi_workflow_process_packet | 2020-07-22T00:00:25.708813Z | 2022-04-13T03:04:35.902440Z |
| osv-2020-92 | Heap-buffer-overflow in ndpi_parse_packet_line_info | 2020-06-24T01:51:13.707971Z | 2022-04-13T03:04:35.945273Z |
| osv-2020-833 | Heap-buffer-overflow in Hacl_Chacha20PolyNUMBER_256_aead_decrypt | 2020-07-14T22:13:39.041123Z | 2022-04-13T03:04:35.071517Z |
| osv-2020-830 | Heap-buffer-overflow in CRYPTO_128_wrap | 2020-07-14T22:13:37.469370Z | 2022-04-13T03:04:35.004553Z |
| osv-2020-806 | Segv on unknown address in process_ndpi_collected_info | 2020-07-14T05:37:42.995133Z | 2022-04-13T03:04:35.988021Z |
| osv-2020-774 | Heap-buffer-overflow in ndpi_search_kerberos | 2020-07-14T05:37:28.736261Z | 2022-04-13T03:04:35.961132Z |
| osv-2020-762 | Heap-buffer-overflow in blosclz_compress | 2020-07-09T00:00:22.344814Z | 2022-04-13T03:04:35.757590Z |
| osv-2020-72 | Use-of-uninitialized-value in print_crl | 2020-06-24T01:51:12.820554Z | 2022-04-13T03:04:35.593904Z |
| osv-2020-71 | Heap-buffer-overflow in ndpi_parse_packet_line_info | 2020-06-24T01:51:12.776008Z | 2022-04-13T03:04:35.913056Z |
| osv-2020-67 | Heap-buffer-overflow in ndpi_workflow_process_packet | 2020-06-24T01:51:12.608279Z | 2022-04-13T03:04:35.998509Z |
| osv-2020-641 | Use-of-uninitialized-value in bool std::__1::equal<std::__1::__wrap_iter<unsigned char const*>, std::__1::__wr | 2020-07-01T00:00:22.030129Z | 2022-04-13T03:04:35.032920Z |
| osv-2020-599 | Index-out-of-bounds in prepare_macpads | 2020-07-01T00:00:19.430674Z | 2022-04-13T03:04:35.044097Z |
| osv-2020-59 | Heap-buffer-overflow in ndpi_add_connection_as_bittorrent | 2020-06-24T01:51:12.217599Z | 2022-04-13T03:04:35.977811Z |
| osv-2020-515 | Use-of-uninitialized-value in bool std::__1::equal<std::__1::__wrap_iter<unsigned char const*>, std::__1::__wr | 2020-07-01T00:00:13.977406Z | 2022-04-13T03:04:35.049761Z |
| osv-2020-423 | Heap-buffer-overflow in stdalloc__strdup | 2020-07-01T00:00:08.690856Z | 2022-04-13T03:04:35.188247Z |
| osv-2020-384 | Heap-buffer-overflow in agentx_parse_string | 2020-07-01T00:00:06.466746Z | 2022-04-13T03:04:35.805999Z |
| osv-2020-313 | Heap-buffer-overflow in git_buf_decode_base85 | 2020-07-01T00:00:01.257082Z | 2022-04-13T03:04:35.172768Z |
| osv-2020-31 | Heap-use-after-free in AES_wrap_key | 2020-06-24T01:51:10.989967Z | 2022-04-13T03:04:35.055339Z |
| osv-2020-28 | Heap-buffer-overflow in get16 | 2020-06-24T01:51:10.866720Z | 2022-04-13T03:04:35.955967Z |
| osv-2020-249 | Heap-buffer-overflow in cipher_generic_initiv | 2020-06-26T00:00:10.386061Z | 2022-04-13T03:04:35.116242Z |
| osv-2020-245 | Heap-use-after-free in ndpi_http_check_content | 2020-06-26T00:00:09.813827Z | 2022-04-13T03:04:35.940031Z |
| osv-2020-2304 | Use-of-uninitialized-value in memory_test | 2021-01-21T00:00:02.599814Z | 2022-04-13T03:04:35.740457Z |
| osv-2020-2299 | Heap-buffer-overflow in ato16 | 2020-12-31T00:01:21.746087Z | 2022-04-13T03:04:35.695657Z |
| osv-2020-2212 | Heap-buffer-overflow in ih264d_fill_bs1_16x16mb_pslice | 2020-11-30T00:00:44.518285Z | 2022-04-13T03:04:35.380766Z |
| osv-2020-2188 | Heap-buffer-overflow in ih264d_parse_pslice | 2020-11-26T00:00:03.791789Z | 2022-04-13T03:04:35.473895Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-cassandra-2021-44521 | Remote code execution for scripted UDFs | 2024-03-06T10:50:58.097Z | 2025-05-20T10:02:07.006Z |
| bit-brotli-2020-8927 | Buffer overflow in Brotli library | 2024-03-06T10:50:45.386Z | 2025-05-20T10:02:07.006Z |
| bit-arangodb-2021-25940 | ArangoDB - Insufficient Session Expiration after Password Change | 2025-03-10T08:12:14.779Z | 2025-05-20T10:02:07.006Z |
| bit-apr-2023-49582 | Apache Portable Runtime (APR): Unexpected lax shared memory permissions | 2024-08-28T07:08:33.525Z | 2025-05-20T10:02:07.006Z |
| bit-apr-2022-28331 | Apache Portable Runtime (APR): Windows out-of-bounds write in apr_socket_sendv function | 2024-03-06T10:50:33.685Z | 2025-05-20T10:02:07.006Z |
| bit-apr-2022-24963 | Apache Portable Runtime (APR): out-of-bound writes in the apr_encode family of functions | 2024-03-06T10:50:46.060Z | 2025-05-20T10:02:07.006Z |
| bit-apr-2021-35940 | Regression of CVE-2017-12613 | 2024-03-06T10:50:57.087Z | 2025-05-20T10:02:07.006Z |
| bit-appsmith-2024-55604 | Appsmith's Broken Access Control Allows Viewer Role User to Query Datasources | 2025-04-14T10:57:31.853Z | 2025-05-20T10:02:07.006Z |
| bit-appsmith-2022-4096 | Server-Side Request Forgery (SSRF) in appsmithorg/appsmith | 2024-03-06T10:50:34.576Z | 2025-05-20T10:02:07.006Z |
| bit-apisix-2024-32638 | Apache APISIX: Forward-Auth Request Smuggling | 2024-05-04T07:16:19.720Z | 2025-05-20T10:02:07.006Z |
| bit-apisix-2022-29266 | apisix/jwt-auth may leak secrets in error response | 2024-03-06T10:50:44.063Z | 2025-05-20T10:02:07.006Z |
| bit-apisix-2022-25757 | Apache APISIX: the body_schema check in request-validation plugin can be bypassed | 2024-03-06T10:50:56.297Z | 2025-05-20T10:02:07.006Z |
| bit-apisix-2021-43557 | Path traversal in request_uri variable | 2024-03-06T10:51:17.884Z | 2025-05-20T10:02:07.006Z |
| bit-apache-2024-40898 | Apache HTTP Server: SSRF with mod_rewrite in server/vhost context on Windows | 2024-07-23T07:16:32.016Z | 2025-05-20T10:02:07.006Z |
| bit-apache-2024-40725 | Apache HTTP Server: source code disclosure with handlers configured via AddType | 2024-07-23T07:16:46.614Z | 2025-05-20T10:02:07.006Z |
| bit-apache-2024-39884 | Apache HTTP Server: source code disclosure with handlers configured via AddType | 2024-07-09T07:16:13.078Z | 2025-05-20T10:02:07.006Z |
| bit-apache-2024-38474 | Apache HTTP Server weakness with encoded question marks in backreferences | 2024-07-03T07:17:14.955Z | 2025-05-20T10:02:07.006Z |
| bit-apache-2024-38473 | Apache HTTP Server proxy encoding problem | 2024-07-03T07:17:33.455Z | 2025-05-20T10:02:07.006Z |
| bit-apache-2024-36387 | Apache HTTP Server: DoS by Null pointer in websocket over HTTP/2 | 2024-07-03T07:18:02.756Z | 2025-05-20T10:02:07.006Z |
| bit-apache-2024-24795 | Apache HTTP Server: HTTP Response Splitting in multiple modules | 2024-04-06T18:17:14.870Z | 2025-05-20T10:02:07.006Z |
| bit-apache-2023-45802 | Apache HTTP Server: HTTP/2 stream memory not reclaimed right away on RST | 2024-03-06T10:50:33.560Z | 2025-05-20T10:02:07.006Z |
| bit-apache-2023-43622 | Apache HTTP Server: DoS in HTTP/2 with initial windows size 0 | 2024-03-06T10:50:43.363Z | 2025-05-20T10:02:07.006Z |
| bit-apache-2023-31122 | Apache HTTP Server: mod_macro buffer over-read | 2024-03-06T10:50:54.601Z | 2025-05-20T10:02:07.006Z |
| bit-apache-2023-25690 | Apache HTTP Server: HTTP request splitting with mod_rewrite and mod_proxy | 2024-03-06T10:51:16.503Z | 2025-05-20T10:02:07.006Z |
| bit-apache-2022-37436 | Apache HTTP Server: mod_proxy prior to 2.4.55 allows a backend to trigger HTTP response splitting | 2024-03-06T10:51:28.975Z | 2025-05-20T10:02:07.006Z |
| bit-apache-2022-36760 | Apache HTTP Server: mod_proxy_ajp Possible request smuggling | 2024-03-06T10:51:40.066Z | 2025-05-20T10:02:07.006Z |
| bit-apache-2022-31813 | mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism | 2024-03-06T10:51:52.102Z | 2025-05-20T10:02:07.006Z |
| bit-apache-2022-30556 | Information Disclosure in mod_lua with websockets | 2024-03-06T10:52:05.387Z | 2025-05-20T10:02:07.006Z |
| bit-apache-2022-30522 | mod_sed denial of service | 2024-03-06T10:52:17.872Z | 2025-05-20T10:02:07.006Z |
| bit-apache-2022-29404 | Denial of service in mod_lua r:parsebody | 2024-03-06T10:52:28.171Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|---|---|
| var-202201-0631 | An Improper Certificate Validation weakness in the Juniper Networks Junos OS allows an at… | 2024-02-13T22:54:06.364000Z |
| var-202112-0645 | There is a memory leak vulnerability in CloudEngine 12800 V200R019C00SPC800, CloudEngine … | 2024-02-13T22:54:06.492000Z |
| var-202202-0278 | There is a directory traversal vulnerability in some home gateway products of ZTE. Due to… | 2024-02-13T22:54:05.976000Z |
| var-201006-0378 | Multiple directory traversal vulnerabilities in the web server for Motorola SURFBoard cab… | 2024-02-13T22:52:46.001000Z |
| var-201201-0118 | CRLF injection vulnerability in Cogent DataHub 7.1.2 and earlier, Cascade DataHub 6.4.20 … | 2024-02-13T22:52:43.037000Z |
| var-201602-0067 | The SSH implementation in Cisco StarOS before 19.3.M0.62771 and 20.x before 20.0.M0.62768… | 2024-02-13T22:52:40.745000Z |
| var-201704-0139 | Sierra Wireless GX 440 devices with ALEOS firmware 4.3.2 do not require authentication fo… | 2024-02-13T22:52:39.916000Z |
| var-201905-0605 | A vulnerability in the HostScan component of Cisco AnyConnect Secure Mobility Client for … | 2024-02-13T22:52:37.461000Z |
| var-202202-1182 | A stack-based buffer overflow vulnerability exists in the NBNS functionality of Sealevel … | 2024-02-13T22:52:00.182000Z |
| var-202202-1181 | A stack-based buffer overflow vulnerability exists in both the LLMNR functionality of Sea… | 2024-02-13T22:52:00.152000Z |
| var-202202-0589 | Exposure of sensitive information to an unauthorized actor vulnerability in Web Server in… | 2024-02-13T22:52:00.344000Z |
| var-202202-0295 | A CWE-400: Uncontrolled Resource Consumption vulnerability exists that could cause a deni… | 2024-02-13T22:52:00.409000Z |
| var-202203-0870 | A vulnerability in the RADIUS feature of Cisco Identity Services Engine (ISE) could allow… | 2024-02-13T22:51:59.816000Z |
| var-201505-0179 | Multiple cross-site scripting (XSS) vulnerabilities on the Cisco Email Security Appliance… | 2024-02-13T22:51:45.046000Z |
| var-201504-0285 | Open redirect vulnerability in Cisco FireSIGHT System Software 5.3.1.1, 5.3.1.2, and 6.0.… | 2024-02-13T22:51:45.105000Z |
| var-201604-0105 | The Web User Interface (WebUI) in FortiOS 5.0.x before 5.0.13, 5.2.x before 5.2.3, and 5.… | 2024-02-13T22:51:42.099000Z |
| var-201602-0121 | Directory traversal vulnerability in the GetFileList function in the SAP Manufacturing In… | 2024-02-13T22:51:42.166000Z |
| var-201809-0073 | An information disclosure vulnerability exists in the Multi-Camera interface used by the … | 2024-02-13T22:51:36.550000Z |
| var-202001-1848 | A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions)… | 2024-02-13T22:51:34.656000Z |
| var-202101-1387 | A local privilege escalation vulnerability in telnetd.real of Juniper Networks Junos OS m… | 2024-02-13T22:51:33.528000Z |
| var-202012-0731 | In BIG-IP APM versions 16.0.0-16.0.0.1, 15.1.0-15.1.0.4, 15.0.0-15.0.1.3, 14.1.0-14.1.3, … | 2024-02-13T22:51:33.717000Z |
| var-202201-1947 | On BIG-IP version 16.x before 16.1.0, 15.1.x before 15.1.4.1, 14.1.x before 14.1.4.5, and… | 2024-02-13T22:51:32.178000Z |
| var-202201-1319 | On BIG-IP versions 16.x before 16.1.0, 15.1.x before 15.1.4.1, 14.1.x before 14.1.4.4, an… | 2024-02-13T22:51:32.354000Z |
| var-202201-0626 | An Improper Validation of Specified Quantity in Input vulnerability in the routing protoc… | 2024-02-13T22:51:32.494000Z |
| var-202203-1938 | There is a stored XSS vulnerability in ZTE home gateway product. An attacker could modify… | 2024-02-13T22:51:31.040000Z |
| var-202203-1363 | An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in… | 2024-02-13T22:51:31.151000Z |
| var-202203-1362 | A memory initialization issue was addressed with improved memory handling. This issue is … | 2024-02-13T22:51:31.115000Z |
| var-202203-0540 | BigAnt Software BigAnt Server v5.6.06 was discovered to contain a Cross-Site Request Forg… | 2024-02-13T22:51:31.682000Z |
| var-202202-1048 | A vulnerability in the web-based management interface of Cisco Prime Infrastructure and C… | 2024-02-13T22:51:31.928000Z |
| var-202204-1265 | An unauthenticated, remote attacker can disrupt existing communication channels between C… | 2024-02-13T22:51:30.883000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2006-000644 | NetCommons cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000643 | 04WebServer directory traversal vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000642 | 04WebServer cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000641 | Kiri directory traversal vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000640 | Drupal cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000638 | Dokeos cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000637 | QwikiWiki cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000636 | Loudblog cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000635 | Geeklog cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000634 | ServerView directory traversal vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000633 | ServerView cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000632 | ATutor cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000631 | ACollab SQL injection vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000630 | Wiki clone products vulnerable to denial of service attacks | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000629 | Wiki clone products vulnerable to denial of service attacks | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000628 | Wiki clone products vulnerable to denial of service attacks | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000627 | Phorum cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000626 | dotProject cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000625 | CGI RESCUE WebFORM allows unauthorized email transmission | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000624 | CGI RESCUE WebFORM allows unauthorized email transmission | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000623 | Joomla! cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000622 | dotProject cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000621 | RWiki cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000620 | RWiki arbitrary Ruby script execution vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000619 | MyWeb SQL injection vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000617 | Multiple email clients vulnerable to directory traversal due to inappropriate unicode handling | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000616 | DonutP and UnDonut confirmation dialog display vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000615 | Apache Struts Validator allows to bypass input data validation | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000614 | Winny buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000613 | Trac cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2025:1131-1 | Security update for openvpn | 2025-04-03T13:10:01Z | 2025-04-03T13:10:01Z |
| suse-su-2025:1129-1 | Security update for GraphicsMagick | 2025-04-03T11:54:17Z | 2025-04-03T11:54:17Z |
| suse-su-2025:1128-1 | Security update for ffmpeg-4 | 2025-04-03T11:54:05Z | 2025-04-03T11:54:05Z |
| suse-su-2025:1127-1 | Security update for ghostscript | 2025-04-03T11:52:58Z | 2025-04-03T11:52:58Z |
| suse-su-2025:1126-1 | Security update for tomcat | 2025-04-03T11:51:06Z | 2025-04-03T11:51:06Z |
| suse-su-2025:1125-1 | Security update for libxslt | 2025-04-03T11:49:40Z | 2025-04-03T11:49:40Z |
| suse-su-2025:1123-1 | Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP3) | 2025-04-03T11:15:36Z | 2025-04-03T11:15:36Z |
| suse-su-2025:1121-1 | Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3) | 2025-04-02T16:33:30Z | 2025-04-02T16:33:30Z |
| suse-su-2025:1118-1 | Security update for ghostscript | 2025-04-02T14:49:08Z | 2025-04-02T14:49:08Z |
| suse-su-2025:1114-1 | Security update for the Linux Kernel (Live Patch 48 for SLE 15 SP3) | 2025-04-02T14:03:49Z | 2025-04-02T14:03:49Z |
| suse-su-2025:1120-1 | Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP5) | 2025-04-02T13:04:02Z | 2025-04-02T13:04:02Z |
| suse-su-2025:1119-1 | Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP3) | 2025-04-02T13:03:56Z | 2025-04-02T13:03:56Z |
| suse-su-2025:1104-1 | Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5) | 2025-04-02T10:33:56Z | 2025-04-02T10:33:56Z |
| suse-su-2025:1103-1 | Security update for MozillaFirefox | 2025-04-02T09:47:51Z | 2025-04-02T09:47:51Z |
| suse-su-2025:1102-1 | Security update for docker, docker-stable | 2025-04-02T09:39:33Z | 2025-04-02T09:39:33Z |
| suse-su-2025:1101-1 | Security update for apparmor | 2025-04-02T09:38:48Z | 2025-04-02T09:38:48Z |
| suse-su-2025:1099-1 | Security update for govulncheck-vulndb | 2025-04-02T08:14:06Z | 2025-04-02T08:14:06Z |
| suse-su-2025:1094-1 | Security update for warewulf4 | 2025-04-02T03:37:36Z | 2025-04-02T03:37:36Z |
| suse-su-2025:1092-1 | Security update for the Linux Kernel (Live Patch 60 for SLE 12 SP5) | 2025-04-01T16:34:07Z | 2025-04-01T16:34:07Z |
| suse-su-2025:1088-1 | Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5) | 2025-04-01T16:33:47Z | 2025-04-01T16:33:47Z |
| suse-su-2025:1053-2 | Security update for openvpn | 2025-04-01T12:04:36Z | 2025-04-01T12:04:36Z |
| suse-su-2025:1084-1 | Security update for corosync | 2025-04-01T10:19:03Z | 2025-04-01T10:19:03Z |
| suse-su-2025:20171-1 | Security update for libtasn1 | 2025-04-01T10:11:15Z | 2025-04-01T10:11:15Z |
| suse-su-2025:20259-1 | Security update for docker | 2025-03-31T16:54:17Z | 2025-03-31T16:54:17Z |
| suse-su-2025:1076-1 | Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP6) | 2025-03-31T16:05:04Z | 2025-03-31T16:05:04Z |
| suse-su-2025:1072-1 | Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP6) | 2025-03-31T16:04:28Z | 2025-03-31T16:04:28Z |
| suse-su-2025:20258-1 | Security update for expat | 2025-03-31T14:22:37Z | 2025-03-31T14:22:37Z |
| suse-su-2025:20257-1 | Security update for libarchive | 2025-03-31T14:21:24Z | 2025-03-31T14:21:24Z |
| suse-su-2025:1066-1 | Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP6) | 2025-03-31T13:33:27Z | 2025-03-31T13:33:27Z |
| suse-su-2025:1064-1 | Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP6) | 2025-03-31T13:03:54Z | 2025-03-31T13:03:54Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2025-25742 | Online Bidding System bidlog.php文件SQL注入漏洞 | 2025-06-27 | 2025-10-30 |
| cnvd-2025-25741 | Online Bidding System administrator文件SQL注入漏洞 | 2025-06-27 | 2025-10-30 |
| cnvd-2025-25735 | Human Resource Integrated System action.php文件跨站脚本漏洞 | 2025-08-04 | 2025-10-30 |
| cnvd-2025-25731 | Simple Grading System delete_student.php文件SQL注入漏洞 | 2025-09-02 | 2025-10-30 |
| cnvd-2025-25730 | Simple Grading System delete_account.php文件SQL注入漏洞 | 2025-09-02 | 2025-10-30 |
| cnvd-2025-25729 | Simple Grading System add_student_grade.php文件SQL注入漏洞 | 2025-09-02 | 2025-10-30 |
| cnvd-2025-25728 | Online Event Judging System create_account.php文件SQL注入漏洞 | 2025-09-02 | 2025-10-30 |
| cnvd-2025-25727 | Human Resource Integrated System login_timeee.php文件SQL注入漏洞 | 2025-09-02 | 2025-10-30 |
| cnvd-2025-25726 | Human Resource Integrated System login_query12.php文件SQL注入漏洞 | 2025-09-02 | 2025-10-30 |
| cnvd-2025-25725 | Human Resource Integrated System login_attendance2.php文件SQL注入漏洞 | 2025-09-02 | 2025-10-30 |
| cnvd-2025-25724 | Human Resource Integrated System login.php文件SQL注入漏洞 | 2025-09-02 | 2025-10-30 |
| cnvd-2025-25723 | Human Resource Integrated System log_query.php文件SQL注入漏洞 | 2025-09-02 | 2025-10-30 |
| cnvd-2025-25722 | Online Event Judging System index.php文件SQL注入漏洞 | 2025-09-10 | 2025-10-30 |
| cnvd-2025-25721 | Online Event Judging System /review_search.php文件SQL注入漏洞 | 2025-09-10 | 2025-10-30 |
| cnvd-2025-25720 | Human Resource Integrated System Childs Name字段跨站脚本漏洞 | 2025-09-18 | 2025-10-30 |
| cnvd-2025-25719 | Online Bidding System weweee.php文件SQL注入漏洞 | 2025-09-24 | 2025-10-30 |
| cnvd-2025-25718 | Online Bidding System remove.php文件SQL注入漏洞 | 2025-09-25 | 2025-10-30 |
| cnvd-2025-25717 | Online Bidding System index.php文件SQL注入漏洞 | 2025-09-25 | 2025-10-30 |
| cnvd-2025-25716 | Online Bidding System bidupdate.php文件SQL注入漏洞 | 2025-09-25 | 2025-10-30 |
| cnvd-2025-25740 | Automated Voting System存在未明漏洞 | 2025-07-11 | 2025-10-29 |
| cnvd-2025-25739 | Job Diary view-details.php文件SQL注入漏洞 | 2025-07-18 | 2025-10-29 |
| cnvd-2025-25738 | Job Diary search.php文件SQL注入漏洞 | 2025-07-18 | 2025-10-29 |
| cnvd-2025-25737 | Job Diary view-emp.php文件SQL注入漏洞 | 2025-07-21 | 2025-10-29 |
| cnvd-2025-25736 | Job Diary view-all.php文件SQL注入漏洞 | 2025-07-21 | 2025-10-29 |
| cnvd-2025-25734 | Job Diary user-apply.php文件SQL注入漏洞 | 2025-08-20 | 2025-10-29 |
| cnvd-2025-25733 | Job Diary edit-details.php文件SQL注入漏洞 | 2025-08-20 | 2025-10-29 |
| cnvd-2025-25732 | Job Diary admin-inbox.php文件SQL注入漏洞 | 2025-08-20 | 2025-10-29 |
| cnvd-2025-25715 | Automated Voting System update_user.php文件SQL注入漏洞 | 2025-10-17 | 2025-10-29 |
| cnvd-2025-25714 | Automated Voting System add_candidate_modal.php文件SQL注入漏洞 | 2025-10-17 | 2025-10-29 |
| cnvd-2025-25713 | Microsoft Inbox COM Objects代码执行漏洞(CNVD-2025-25713) | 2025-10-17 | 2025-10-29 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2024-avi-0918 | Multiples vulnérabilités dans GitLab | 2024-10-24T00:00:00.000000 | 2024-10-24T00:00:00.000000 |
| certfr-2024-avi-0917 | Vulnérabilité dans Fortinet FortiManager | 2024-10-23T00:00:00.000000 | 2024-10-24T00:00:00.000000 |
| CERTFR-2024-AVI-0921 | Vulnérabilité dans les produits Microsoft | 2024-10-24T00:00:00.000000 | 2024-10-24T00:00:00.000000 |
| CERTFR-2024-AVI-0920 | Vulnérabilité dans Microsoft Azure | 2024-10-24T00:00:00.000000 | 2024-10-24T00:00:00.000000 |
| CERTFR-2024-AVI-0919 | Multiples vulnérabilités dans les produits Cisco | 2024-10-24T00:00:00.000000 | 2024-10-24T00:00:00.000000 |
| CERTFR-2024-AVI-0918 | Multiples vulnérabilités dans GitLab | 2024-10-24T00:00:00.000000 | 2024-10-24T00:00:00.000000 |
| CERTFR-2024-AVI-0917 | Vulnérabilité dans Fortinet FortiManager | 2024-10-23T00:00:00.000000 | 2024-10-24T00:00:00.000000 |
| certfr-2024-avi-0916 | Multiples vulnérabilités dans le greffon pour Office 365 de Splunk | 2024-10-23T00:00:00.000000 | 2024-10-23T00:00:00.000000 |
| certfr-2024-avi-0915 | Multiples vulnérabilités dans les produits Centreon | 2024-10-23T00:00:00.000000 | 2024-10-23T00:00:00.000000 |
| certfr-2024-avi-0914 | Vulnérabilité dans les produits Spring | 2024-10-23T00:00:00.000000 | 2024-10-23T00:00:00.000000 |
| certfr-2024-avi-0913 | Multiples vulnérabilités dans Google Chrome | 2024-10-23T00:00:00.000000 | 2024-10-23T00:00:00.000000 |
| certfr-2024-avi-0912 | Multiples vulnérabilités dans Liferay | 2024-10-23T00:00:00.000000 | 2024-10-23T00:00:00.000000 |
| CERTFR-2024-AVI-0916 | Multiples vulnérabilités dans le greffon pour Office 365 de Splunk | 2024-10-23T00:00:00.000000 | 2024-10-23T00:00:00.000000 |
| CERTFR-2024-AVI-0915 | Multiples vulnérabilités dans les produits Centreon | 2024-10-23T00:00:00.000000 | 2024-10-23T00:00:00.000000 |
| CERTFR-2024-AVI-0914 | Vulnérabilité dans les produits Spring | 2024-10-23T00:00:00.000000 | 2024-10-23T00:00:00.000000 |
| CERTFR-2024-AVI-0913 | Multiples vulnérabilités dans Google Chrome | 2024-10-23T00:00:00.000000 | 2024-10-23T00:00:00.000000 |
| CERTFR-2024-AVI-0912 | Multiples vulnérabilités dans Liferay | 2024-10-23T00:00:00.000000 | 2024-10-23T00:00:00.000000 |
| certfr-2024-avi-0911 | Vulnérabilité dans les produits Moxa | 2024-10-22T00:00:00.000000 | 2024-10-22T00:00:00.000000 |
| certfr-2024-avi-0910 | Vulnérabilité dans MongoDB | 2024-10-22T00:00:00.000000 | 2024-10-22T00:00:00.000000 |
| certfr-2024-avi-0909 | Multiples vulnérabilités dans les produits Synology | 2024-10-21T00:00:00.000000 | 2024-10-22T00:00:00.000000 |
| certfr-2024-avi-0792 | Multiples vulnérabilités dans VMware vCenter Server | 2024-09-18T00:00:00.000000 | 2024-10-22T00:00:00.000000 |
| certfr-2024-avi-0426 | Multiples vulnérabilités dans Roundcube | 2024-05-21T00:00:00.000000 | 2024-10-22T00:00:00.000000 |
| CERTFR-2024-AVI-0911 | Vulnérabilité dans les produits Moxa | 2024-10-22T00:00:00.000000 | 2024-10-22T00:00:00.000000 |
| CERTFR-2024-AVI-0910 | Vulnérabilité dans MongoDB | 2024-10-22T00:00:00.000000 | 2024-10-22T00:00:00.000000 |
| CERTFR-2024-AVI-0909 | Multiples vulnérabilités dans les produits Synology | 2024-10-21T00:00:00.000000 | 2024-10-22T00:00:00.000000 |
| CERTFR-2024-AVI-0792 | Multiples vulnérabilités dans VMware vCenter Server | 2024-09-18T00:00:00.000000 | 2024-10-22T00:00:00.000000 |
| CERTFR-2024-AVI-0426 | Multiples vulnérabilités dans Roundcube | 2024-05-21T00:00:00.000000 | 2024-10-22T00:00:00.000000 |
| certfr-2024-avi-0908 | Vulnérabilité dans Microsoft Edge | 2024-10-21T00:00:00.000000 | 2024-10-21T00:00:00.000000 |
| certfr-2024-avi-0899 | Vulnérabilité dans Grafana | 2024-10-18T00:00:00.000000 | 2024-10-21T00:00:00.000000 |
| certfr-2024-avi-0893 | Multiples vulnérabilités dans les produits F5 | 2024-10-17T00:00:00.000000 | 2024-10-21T00:00:00.000000 |